Table of Contents Author Guidelines Submit a Manuscript
Mobile Information Systems
Volume 2017, Article ID 9050787, 16 pages
https://doi.org/10.1155/2017/9050787
Research Article

Trustworthy Event-Information Dissemination in Vehicular Ad Hoc Networks

Department of Information and Communication Engineering, Yeungnam University, 280 Daehak-Ro, Gyeongsan-si, Gyeongsangbuk-do 712-749, Republic of Korea

Correspondence should be addressed to Seung Yeob Nam; rk.ca.uny@manys

Received 28 May 2017; Revised 1 October 2017; Accepted 17 October 2017; Published 12 November 2017

Academic Editor: Francesco Gringoli

Copyright © 2017 Rakesh Shrestha and Seung Yeob Nam. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. H. Hartenstein and L. Kenneth, VANET: Vehicular Applications and Inter-Networking Technologies, Wiley, New Jersey, NJ, USA, 1st edition, 2009.
  2. P. Papadimitratos, L. Buttyan, T. Holczer et al., “Secure vehicular communication systems: design and architecture,” IEEE Communications Magazine, vol. 46, no. 11, pp. 100–109, 2008. View at Publisher · View at Google Scholar · View at Scopus
  3. K. Govindan and P. Mohapatra, “Trust computations and trust dynamics in mobile adhoc networks: a survey,” IEEE Communications Surveys & Tutorials, vol. 14, no. 2, pp. 279–298, 2012. View at Publisher · View at Google Scholar · View at Scopus
  4. Y. L. Morgan, “Notes on DSRC & WAVE standards suite: its architecture, design, and characteristics,” IEEE Communications Surveys & Tutorials, vol. 12, no. 4, pp. 504–518, 2010. View at Publisher · View at Google Scholar · View at Scopus
  5. M. Raya, P. Papadimitratos, V. D. Gligor, and J.-P. Hubaux, “On data-centric trust establishment in ephemeral ad hoc networks,” in Proceedings of the 27th IEEE Communications Society Conference on Computer Communications (INFOCOM '08), pp. 1912–1920, Arizona, Ariz, USA, April 2008. View at Publisher · View at Google Scholar · View at Scopus
  6. R. Shrestha, S. Djuraev, and S. Y. Nam, “Sybil attack detection in vehicular network based on received signal strength,” in Proceedings of the 3rd International Conference on Connected Vehicles and Expo, ICCVE '14, pp. 745-746, November 2014. View at Publisher · View at Google Scholar · View at Scopus
  7. J. Doucer, “The Sybil Attack,” in Proceedings of the IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems, 2002.
  8. G. Martuscelli, A. Boukerche, and P. Bellavista, “Discovering traffic congestion along routes of interest using VANETs,” in Proceedings of the 2013 IEEE Global Communications Conference, GLOBECOM '13, IEEE, Atlanta, GA, USA, December 2013. View at Publisher · View at Google Scholar · View at Scopus
  9. Z. Huang, S. Ruj, M. Cavenaghi, and A. Nayak, “Limitations of trust management schemes in VANET and countermeasures,” in Proceedings of the IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC '11), pp. 1228–1232, IEEE, Toronto, Canada, September 2011. View at Publisher · View at Google Scholar · View at Scopus
  10. M. Raya, P. Papadimitratos, and J.-P. Hubaux, “Securing vehicular communications,” IEEE Wireless Communications Magazine, vol. 13, no. 5, pp. 8–15, 2006. View at Publisher · View at Google Scholar · View at Scopus
  11. Z. Li and C. T. Chigan, “On joint privacy and reputation assurance for vehicular ad hoc networks,” IEEE Transactions on Mobile Computing, vol. 13, no. 10, pp. 2334–2344, 2014. View at Publisher · View at Google Scholar · View at Scopus
  12. F. Ishmanov, S. W. Kim, and S. Y. Nam, “A secure trust establishment scheme for wireless sensor networks,” Sensors, vol. 14, no. 1, pp. 1877–1897, 2014. View at Publisher · View at Google Scholar · View at Scopus
  13. N. Yang, “A similarity based trust and reputation management framework for vanets,” International Journal of Future Generation Communication and Networking, vol. 6, no. 2, pp. 25–34, 2013. View at Google Scholar
  14. K. Rostamzadeh, H. Nicanfar, N. Torabi, S. Gopalakrishnan, and V. C. M. Leung, “A context-aware trust-based information dissemination framework for vehicular networks,” IEEE Internet of Things Journal, vol. 2, no. 2, pp. 121–132, 2015. View at Publisher · View at Google Scholar
  15. R. A. Shaikh and A. S. Alzahrani, “Intrusion-aware trust model for vehicular ad hoc networks,” Security and Communication Networks, vol. 7, no. 11, pp. 1652–1669, 2014. View at Publisher · View at Google Scholar · View at Scopus
  16. S. A. Soleymani, A. H. Abdullah, W. H. Hassan et al., “Trust management in vehicular ad hoc network: a systematic review,” EURASIP Journal on Wireless Communications and Networking, vol. 2015, no. 1, article 146, 2015. View at Publisher · View at Google Scholar · View at Scopus
  17. M. Raya, A. Aziz, and J. P. Hubaux, “Efficient secure aggregation in VANETs,” in Proceedings of the 3rd ACM International Workshop on Vehicular Ad Hoc Networks (VANET '06), pp. 67–75, ACM, New York, NY, USA, September 2006. View at Publisher · View at Google Scholar · View at Scopus
  18. B. Qin, Q. Wu, J. Domingo-Ferrer, and L. Zhang, “Preserving security and privacy in large-scale VANETs,” in Proceedings of the 13th International Conference Information and communications security (ICICS ’11), vol. 7043 of Lecture Notes in Computer Science, pp. 121–135, Springer Berlin Heidelberg, Berlin, Germany, 2011. View at Publisher · View at Google Scholar
  19. X. Lin, X. Sun, P.-H. Ho, and X. Shen, “GSIS: a secure and privacy-preserving protocol for vehicular communications,” IEEE Transactions on Vehicular Technology, vol. 56, no. 6 I, pp. 3442–3456, 2007. View at Publisher · View at Google Scholar · View at Scopus
  20. C. Zhang, R. Lu, X. Lin, P.-H. Ho, and X. Shen, “An efficient identity-based batch verification scheme for vehicular sensor networks,” in Proceedings of the 27th IEEE Communications Society Conference on Computer Communications (INFOCOM '08), pp. 816–824, IEEE INFOCOM, Arizona, Ariz, USA, April 2008. View at Publisher · View at Google Scholar · View at Scopus
  21. A. Wasef and X. Shen, “Efficient group signature scheme supporting batch verification for securing vehicular networks,” in Proceedings of the IEEE International Conference on Communications (ICC '10), pp. 1–5, Cape Town, South Africa, May 2010. View at Publisher · View at Google Scholar · View at Scopus
  22. H. Zhu, S. Du, Z. Gao, M. Dong, and Z. Cao, “A probabilistic misbehavior detection scheme toward efficient trust establishment in delay-tolerant networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 1, pp. 22–32, 2014. View at Publisher · View at Google Scholar
  23. D. Tian, Y. Wang, H. Liu, and X. Zhang, “A trusted multi-hop broadcasting protocol for vehicular ad hoc networks,” in Proceedings of the 2012 1st International Conference on Connected Vehicles and Expo, ICCVE '12, pp. 18–22, December 2012. View at Publisher · View at Google Scholar · View at Scopus
  24. F. Gómez Mármol and G. Martínez Pérez, “TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks,” Journal of Network and Computer Applications, vol. 35, no. 3, pp. 934–941, 2012. View at Publisher · View at Google Scholar · View at Scopus
  25. Y.-C. Wei and Y.-M. Chen, “An efficient trust management system for balancing the safety and location privacy in VANETs,” in Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications ( TrustCom '12), pp. 393–400, Liverpool, UK, June 2012. View at Publisher · View at Google Scholar · View at Scopus
  26. U. F. Minhas, J. Zhang, T. Tran, and R. Cohen, “Towards expanded trust management for agents in vehicular ad-hoc networks,” International Journal of Computational Intelligence: Theory and Practice, vol. 5, no. 1, pp. 3–15, 2010. View at Google Scholar
  27. U. F. Minhas, J. Zhang, T. Tran, and R. Cohen, “A multifaceted approach to modeling agent trust for effective communication in the application of mobile Ad Hoc vehicular networks,” IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, vol. 41, no. 3, pp. 407–420, 2011. View at Publisher · View at Google Scholar · View at Scopus
  28. Z. Liu, J. Ma, Z. Jiang, H. Zhu, and Y. Miao, “LSOT: a lightweight self-organized trust model in VANETs,” Mobile Information Systems, vol. 2016, no. 1, Article ID 7628231, pp. 1–15, 2016. View at Publisher · View at Google Scholar · View at Scopus
  29. Y.-M. Chen and Y.-C. Wei, “A beacon-based trust management system for enhancing user centric location privacy in VANETs,” Journal of Communications and Networks, vol. 15, no. 2, Article ID 6512239, pp. 153–163, 2013. View at Publisher · View at Google Scholar · View at Scopus
  30. S. Gurung, D. Lin, A. Squicciarini, and E. Bertino, “Information-oriented trustworthiness evaluation in vehicular ad-hoc networks,” Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface, vol. 7873, pp. 94–108, 2013. View at Publisher · View at Google Scholar · View at Scopus
  31. Q. Ding, X. Li, M. Jiang, and X. Zhou, “Reputation-based trust model in vehicular ad-hoc networks,” in Proceedings of the International Conference on Wireless Communications And Signal Processing (WCSP), 2010.
  32. F. Dötzer, L. Fischer, and P. Magiera, “VARS: a vehicle ad-hoc network reputation system,” in Proceedings of the 6th IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks, WoWMoM '05, pp. 454–456, June 2005. View at Publisher · View at Google Scholar · View at Scopus
  33. C. Chen, J. Zhang, R. Cohen, and P.-H. Ho, “A trust modeling framework for message propagation and evaluation in VANETs,” in Proceedings of the 2nd International Conference on Information Technology Convergence and Services (ITCS '10), IEEE, Cebu, Phillippines, August 2010. View at Publisher · View at Google Scholar · View at Scopus
  34. A. Patwardhan, A. Joshi, T. Finin, and Y. Yesha, “A data intensive reputation management scheme for vehicular ad hoc networks,” in Proceedings of the 2006 3rd Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, MobiQuitous, July 2006. View at Publisher · View at Google Scholar · View at Scopus
  35. J. Zhang, “A survey on trust management for VANETs,” in Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications (AINA '11), pp. 105–112, Biopolis, Singapore, March 2011. View at Publisher · View at Google Scholar · View at Scopus
  36. P. Wex, J. Breuer, A. Held, T. Leinmüller, and L. Delgrossi, “Trust issues for vehicular ad hoc networks,” in Proceedings of the IEEE 67th Vehicular Technology Conference-Spring (VTC '08), pp. 2800–2804, Singapore, May 2008. View at Publisher · View at Google Scholar · View at Scopus
  37. J. Petit, F. Schaub, M. Feiri, and F. Kargl, “Pseudonym schemes in vehicular networks: a survey,” IEEE Communications Surveys & Tutorials, vol. 17, no. 1, pp. 228–255, 2015. View at Publisher · View at Google Scholar · View at Scopus
  38. Z. Malik and A. Bouguettaya, “Reputation bootstrapping for trust establishment among web services,” IEEE Internet Computing, vol. 13, no. 1, pp. 40–47, 2009. View at Publisher · View at Google Scholar · View at Scopus
  39. W. R. J. Joo and D. S. Han, “An enhanced broadcasting scheme for IEEE 802.11p according to lane traffic density,” in Proceedings of the 20th International Conference on Software, Telecommunications and Computer Networks (SoftCOM '12), September 2012.
  40. W. Fehr, Security system design for cooperative vehicleto-vehicle crash avoidance applications using 5.9 GHz Dedicated Short Range Communications (DSRC) wireless communications, 2012.
  41. H. Xiong, K. Beznosov, Z. Qin, and M. Ripeanu, “Efficient and spontaneous privacy-preserving protocol for secure vehicular communication,” in Proceedings of the 2010 IEEE International Conference on Communications, ICC 2010, May 2010. View at Publisher · View at Google Scholar · View at Scopus
  42. F. Jiménez, J. E. Naranjo, and Ó. Gómez, “Autonomous manoeuvring systems for collision avoidance on single carriageway roads,” Sensors, vol. 12, no. 12, pp. 16498–16521, 2012. View at Publisher · View at Google Scholar · View at Scopus
  43. X. Tang, D. Hong, and W. Chen, “Data Acquisition Based on Stable Matching of Bipartite Graph in Cooperative Vehicle–Infrastructure Systems,” Sensors, vol. 17, no. 6, p. 1327, 2017. View at Publisher · View at Google Scholar
  44. P. B. Velloso, R. P. Laufer, D. D. O. O. Cunha, O. C. M. B. Duarte, and G. Pujolle, “Trust management in mobile ad hoc networks using a scalable maturity-based model,” IEEE Transactions on Network and Service Management, vol. 7, no. 3, pp. 172–185, 2010. View at Publisher · View at Google Scholar
  45. F. Bao, I. Chen, M. Chang, and J. Cho, “Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection,” IEEE Transactions on Network and Service Management, vol. 9, no. 2, pp. 169–183, 2012. View at Publisher · View at Google Scholar · View at Scopus
  46. A. Wald, Sequential Analysis, John wiley ad Sons, New York, NY, USA, 7th edition, 1965.
  47. J. Jung, V. Paxson, A. W. Berger, and H. Balakrishnan, “Fast portscan detection using sequential hypothesis testing,” in Proceedings of the IEEE Symposium on Security and Privacy, IEEE, California, Calif, USA, 2004.
  48. G. Peter, S. Zsolt, and A. Szilard, “Highly automated Vehilce Systems,” Mechatronics Engineer MSc Curriculum Development, BME MOGI, 2014.
  49. C. Sommer, R. German, and F. Dressler, “Bidirectionally coupled network and road traffic simulation for improved IVC analysis,” IEEE Transactions on Mobile Computing, vol. 10, no. 1, pp. 3–15, 2011. View at Publisher · View at Google Scholar · View at Scopus
  50. A. Varga and R. Hornig, “An overview of the OMNeT++ simulation environment,” in Proceedings of the 1st International ICST Conference on Simulation Tools and Techniques for Communications, Networks and Systems (SIMUTools '08), March 2008. View at Publisher · View at Google Scholar · View at Scopus
  51. D. Krajzewicz, J. Erdmann, M. Behrisch, and L. Bieker, “Recent Development and Applications of SUMO - Simulation of Urban MObility,” in Proceedings of the Recent Development and Applications of SUMO - Simulation of Urban MObility, vol. 5, pp. 128–138, December 2012.
  52. W. Ben Jaballah, M. Conti, M. Mosbah, and C. E. Palazzi, “The impact of malicious nodes positioning on vehicular alert messaging system,” Ad Hoc Networks, vol. 52, pp. 3–16, 2016. View at Publisher · View at Google Scholar · View at Scopus
  53. A. Tajeddine, A. Kayssi, and A. Chehab, “A privacy-preserving trust model for VANETs,” in Proceedings of the 10th IEEE International Conference on Computer and Information Technology, CIT-2010, 7th IEEE International Conference on Embedded Software and Systems, ICESS-2010, 10th IEEE Int. Conf. Scalable Computing and Communications, ScalCom '10, pp. 832–837, July 2010. View at Publisher · View at Google Scholar · View at Scopus
  54. J. Petit and Z. Mammeri, “Dynamic consensus for secured vehicular ad hoc networks,” in Proceedings of the 2011 IEEE 7th International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob '11, pp. 1–8, October 2011. View at Publisher · View at Google Scholar · View at Scopus
  55. B. Ostermaier, F. Dötzer, and M. Strassberger, “Enhancing the security of local danger warnings in VANETs - A simulative analysis of voting schemes,” in Proceedings of the 2nd International Conference on Availability, Reliability and Security, ARES '07, pp. 422–431, April 2007. View at Publisher · View at Google Scholar · View at Scopus