Table of Contents Author Guidelines Submit a Manuscript
Mobile Information Systems
Volume 2016, Article ID 7628231, 15 pages
http://dx.doi.org/10.1155/2016/7628231
Research Article

LSOT: A Lightweight Self-Organized Trust Model in VANETs

1School of Computer Science and Technology, Xidian University, Xi’an 710071, China
2School of Cyber Engineering, Xidian University, Xi’an 710071, China
3School of Telecommunication Engineering, Xidian University, Xi’an 710071, China

Received 23 June 2016; Accepted 13 November 2016

Academic Editor: Elio Masciari

Copyright © 2016 Zhiquan Liu et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. J. Zhang, “Trust management for VANETs: challenges, desired properties and future directions,” International Journal of Distributed Systems and Technologies, vol. 3, no. 1, pp. 48–62, 2012. View at Publisher · View at Google Scholar · View at Scopus
  2. R. Lu, X. Lin, T. H. Luan, X. Liang, and X. Shen, “Pseudonym changing at social spots: an effective strategy for location privacy in VANETs,” IEEE Transactions on Vehicular Technology, vol. 61, no. 1, pp. 86–96, 2012. View at Publisher · View at Google Scholar · View at Scopus
  3. H. Hartenstein and K. P. Laberteaux, “A tutorial survey on vehicular ad hoc networks,” IEEE Communications Magazine, vol. 46, no. 6, pp. 164–171, 2008. View at Publisher · View at Google Scholar · View at Scopus
  4. D. Zelikman and M. Segal, “Reducing interferences in VANETs,” IEEE Transactions on Intelligent Transportation Systems, vol. 16, no. 3, pp. 1582–1587, 2015. View at Publisher · View at Google Scholar · View at Scopus
  5. S. S. Tangade and S. S. Manvi, “A survey on attacks, security and trust management solutions in VANETs,” in Proceedings of the 4th International Conference on Computing, Communications and Networking Technologies (ICCCNT '13), pp. 1–6, IEEE, Tiruchengode, India, July 2013. View at Publisher · View at Google Scholar · View at Scopus
  6. S. Gillani, F. Shahzad, A. Qayyum, and R. Mehmood, “A survey on security in vehicular ad hoc networks,” in Communication Technologies for Vehicles, pp. 59–74, Springer, Berlin, Germany, 2013. View at Google Scholar
  7. J. Grover, M. S. Gaur, and V. Laxmi, “Trust establishment techniques in VANET,” in Wireless Networks and Security, Signals and Communication Technology, pp. 273–301, Springer, Berlin, Germany, 2013. View at Publisher · View at Google Scholar
  8. S. Park, B. Aslam, and C. C. Zou, “Long-term reputation system for vehicular networking based on vehicle's daily commute routine,” in Proceedings of the 2011 IEEE Consumer Communications and Networking Conference (CCNC '11), pp. 436–441, Las Vegas, Nev, USA, January 2011. View at Publisher · View at Google Scholar · View at Scopus
  9. X. Li, J. Liu, X. Li, and W. Sun, “RGTE: a reputation-based global trust establishment in VANETs,” in Proceedings of the 5th IEEE International Conference on Intelligent Networking and Collaborative Systems (INCoS '13), pp. 210–214, IEEE, Xi'an, China, September 2013. View at Publisher · View at Google Scholar · View at Scopus
  10. T. D. Huynh, N. R. Jennings, and N. R. Shadbolt, “Certified reputation: how an agent can trust a stranger,” in Proceedings of the 5th ACM International Joint Conference on Autonomous Agents and Multi-Agent Systems (AAMAS '06), pp. 1217–1224, ACM, May 2006. View at Publisher · View at Google Scholar · View at Scopus
  11. Z. Huang, S. Ruj, M. A. Cavenaghi, M. Stojmenovic, and A. Nayak, “A social network approach to trust management in VANETs,” Peer-to-Peer Networking and Applications, vol. 7, no. 3, pp. 229–242, 2014. View at Publisher · View at Google Scholar · View at Scopus
  12. Z. Liu, J. Ma, Z. Jiang, and Y. Miao, “LCT: a lightweight cross-domain trust model for the mobile distributed environment,” KSII Transactions on Internet and Information Systems, vol. 10, no. 2, pp. 914–934, 2016. View at Google Scholar
  13. F. Qu, Z. Wu, F. Wang, and W. Cho, “A security and privacy review of VANETs,” IEEE Transactions on Intelligent Transportation Systems, vol. 16, no. 6, pp. 2985–2996, 2015. View at Publisher · View at Google Scholar
  14. J. Zhang, “A survey on trust management for VANETs,” in Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications (AINA '11), pp. 105–112, Singapore, March 2011. View at Publisher · View at Google Scholar · View at Scopus
  15. J. Jakubiak and Y. Koucheryavy, “State of the art and research challenges for VANETs,” in Proceedings of the 5th IEEE Consumer Communications and Networking Conference (CCNC '08), pp. 912–916, IEEE, Las Vegas, Nev, USA, January 2008. View at Publisher · View at Google Scholar · View at Scopus
  16. D. Wang, T. Muller, Y. Liu, and J. Zhang, “Towards robust and effective trust management for security: a survey,” in Proceedings of the 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom '14), pp. 511–518, IEEE, Beijing, China, September 2014. View at Publisher · View at Google Scholar · View at Scopus
  17. N. J. Patel and R. H. Jhaveri, “Trust based approaches for secure routing in VANET: a survey,” Procedia Computer Science, vol. 45, pp. 592–601, 2015. View at Publisher · View at Google Scholar
  18. A. Wu, J. Ma, and S. Zhang, “RATE: a RSU-aided scheme for data-centric trust establishment in VANETs,” in Proceedings of the 7th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM '11), pp. 1–6, IEEE, Wuhan, China, September 2011. View at Publisher · View at Google Scholar · View at Scopus
  19. F. Gómez Mármol and G. Martínez Pérez, “TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks,” Journal of Network and Computer Applications, vol. 35, no. 3, pp. 934–941, 2012. View at Publisher · View at Google Scholar · View at Scopus
  20. N. Yang, “A similarity based trust and reputation management framework for VANETs,” International Journal of Future Generation Communication and Networking, vol. 6, no. 2, pp. 25–34, 2013. View at Publisher · View at Google Scholar
  21. W. Bamberger, J. Schlittenlacher, and K. Diepold, “A trust model for intervehicular communication based on belief theory,” in Proceedings of the 2nd IEEE International Conference on Social Computing (SocialCom '10), pp. 73–80, IEEE, Minneapolis, Minn, USA, August 2010. View at Publisher · View at Google Scholar · View at Scopus
  22. X. Hong, D. Huang, M. Gerla, and Z. Cao, “SAT: situation-aware trust architecture for vehicular networks,” in Proceedings of the 3rd International Workshop on Mobility in the Evolving Internet Architecture, MobiArch'08, pp. 31–36, USA, August 2008. View at Publisher · View at Google Scholar · View at Scopus
  23. Z. Huang, S. Ruj, M. Cavenaghi, and A. Nayak, “Limitations of trust management schemes in VANET and countermeasures,” in Proceedings of the IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC '11), pp. 1228–1232, IEEE, Toronto, Canada, September 2011. View at Publisher · View at Google Scholar · View at Scopus
  24. P. Wex, J. Breuer, A. Held, T. Leinmüller, and L. Delgrossi, “Trust issues for vehicular ad hoc networks,” in Proceedings of the IEEE 67th Vehicular Technology Conference (VTC '08), pp. 2800–2804, Singapore, May 2008. View at Publisher · View at Google Scholar · View at Scopus
  25. U. F. Minhas, J. Zhang, T. Tran, and R. Cohen, “A multifaceted approach to modeling agent trust for effective communication in the application of mobile Ad Hoc vehicular networks,” IEEE Transactions on Systems, Man and Cybernetics Part C: Applications and Reviews, vol. 41, no. 3, pp. 407–420, 2011. View at Publisher · View at Google Scholar · View at Scopus
  26. C. Chen, J. Zhang, R. Cohen, and P.-H. Ho, “A trust modeling framework for message propagation and evaluation in VANETs,” in Proceedings of the 2nd International Conference on Information Technology Convergence and Services (ITCS '10), pp. 1–8, August 2010. View at Publisher · View at Google Scholar · View at Scopus
  27. M. Saini, A. Alelaiwi, and A. El Saddik, “How close are we to realizing a pragmatic VANET solution? A meta-survey,” ACM Computing Surveys, vol. 48, no. 2, article 29, 2015. View at Publisher · View at Google Scholar · View at Scopus
  28. K. Zheng, Q. Zheng, P. Chatzimisios, W. Xiang, and Y. Zhou, “Heterogeneous vehicular networking: a survey on architecture, challenges, and solutions,” IEEE Communications Surveys and Tutorials, vol. 17, no. 4, pp. 2377–2396, 2015. View at Publisher · View at Google Scholar
  29. T. Ma, J. Zhou, M. Tang et al., “Social network and tag sources based augmenting collaborative recommender system,” IEICE Transactions on Information and Systems, vol. E98.D, no. 4, pp. 902–910, 2015. View at Publisher · View at Google Scholar · View at Scopus
  30. H. Li, D. Liu, Y. Dai, and T. H. Luan, “Engineering searchable encryption of mobile cloud networks: when QoE meets QoP,” IEEE Wireless Communications, vol. 22, no. 4, pp. 74–80, 2015. View at Publisher · View at Google Scholar · View at Scopus
  31. A. M. Shabut, K. P. Dahal, S. K. Bista, and I. U. Awan, “Recommendation based trust model with an effective defence scheme for MANETs,” IEEE Transactions on Mobile Computing, vol. 14, no. 10, pp. 2101–2115, 2015. View at Publisher · View at Google Scholar · View at Scopus
  32. J. Jiang, G. Han, F. Wang, L. Shu, and M. Guizani, “An efficient distributed trust model for wireless sensor networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 26, no. 5, pp. 1228–1237, 2015. View at Publisher · View at Google Scholar · View at Scopus
  33. J. Shen, H. W. Tan, J. Wang, J. W. Wang, and S. Y. Lee, “A novel routing protocol providing good transmission reliability in underwater sensor networks,” Journal of Internet Technology, vol. 16, no. 1, pp. 171–178, 2015. View at Publisher · View at Google Scholar · View at Scopus
  34. S. Xie and Y. Wang, “Construction of tree network with limited delivery latency in homogeneous wireless sensor networks,” Wireless Personal Communications, vol. 78, no. 1, pp. 231–246, 2014. View at Publisher · View at Google Scholar · View at Scopus
  35. B. Qureshi, G. Min, and D. Kouvatsos, “A distributed reputation and trust management scheme for mobile peer-to-peer networks,” Computer Communications, vol. 35, no. 5, pp. 608–618, 2012. View at Publisher · View at Google Scholar · View at Scopus
  36. T. D. Huynh, N. R. Jennings, and N. R. Shadbolt, “An integrated trust and reputation model for open multi-agent systems,” Autonomous Agents and Multi-Agent Systems, vol. 13, no. 2, pp. 119–154, 2006. View at Publisher · View at Google Scholar · View at Scopus
  37. T. Tran and R. Cohen, “A reliability modelling based strategy to avoid infinite harm from dishonest sellers in electronic marketplaces,” Journal of Business and Technology, Special Issue on Business Agents and the Semantic Web, vol. 1, no. 1, pp. 69–76, 2005. View at Google Scholar
  38. Z. Liu, J. Ma, Z. Jiang, Y. Miao, and C. Gao, “IRLT: integrating reputation and local trust for trustworthy service recommendation in service-oriented social networks,” PLoS ONE, vol. 11, no. 3, Article ID e0151438, 2016. View at Publisher · View at Google Scholar
  39. G. Liu, Y. Wang, and M. A. Orgun, “Trust transitivity in complex social networks,” in Proceedings of the 25th AAAI Conference on Artificial Intelligence (AAAI '11), vol. 11, pp. 1222–1229, San Francisco, Calif, USA, August 2011. View at Scopus
  40. Y. A. Kim and H. S. Song, “Strategies for predicting local trust based on trust propagation in social networks,” Knowledge-Based Systems, vol. 24, no. 8, pp. 1360–1371, 2011. View at Publisher · View at Google Scholar · View at Scopus
  41. A. Jøsang and J. Golbeck, “Challenges for robust trust and reputation systems,” in Proceedings of the 5th International Workshop on Security and Trust Management (SMT '09), Saint Malo, France, September 2009.
  42. S. Liu, H. Yu, C. Miao, and A. C. Kot, “A fuzzy logic based reputation model against unfair ratings,” in Proceedings of the 12th International Conference on Autonomous Agents and Multi-Agent Systems (AAMAS '13), pp. 821–828, St. Paul, Minn, USA, May 2013. View at Scopus