Table of Contents Author Guidelines Submit a Manuscript
Wireless Communications and Mobile Computing
Volume 2017, Article ID 7089259, 11 pages
https://doi.org/10.1155/2017/7089259
Research Article

Trust on the Ratee: A Trust Management System for Social Internet of Vehicles

1School of Computer, National University of Defense Technology, Changsha, China
2Department of Electronic Information and Electrical Engineering, Changsha University, Changsha, China
3The MOE Laboratory of Intelligent Computing & Information Processing, Xiangtan University, Xiangtan, China

Correspondence should be addressed to Peidong Zhu; nc.ude.tdun@uhzdp

Received 2 August 2017; Accepted 19 November 2017; Published 10 December 2017

Academic Editor: Zhipeng Cai

Copyright © 2017 Fangyu Gai et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. F. Gai, J. Zhang, P. Zhu, and X. Jiang, “Ratee-based trust management system for internet of vehicles,” in Proceedings of the International Conference on Wireless Algorithms, Systems, and Applications, pp. 344–355, Springer, 2017.
  2. M. Nitti, R. Girau, A. Floris, and L. Atzori, “On adding the social dimension to the Internet of Vehicles: Friendship and middleware,” in Proceedings of the 2014 IEEE International Black Sea Conference on Communications and Networking, BlackSeaCom 2014, pp. 134–138, May 2014. View at Publisher · View at Google Scholar · View at Scopus
  3. A. Dua, N. Kumar, and S. Bawa, “A systematic review on routing protocols for Vehicular Ad Hoc Networks,” Vehicular Communications, vol. 1, no. 1, pp. 33–52, 2014. View at Publisher · View at Google Scholar · View at Scopus
  4. F. Yang, S. Wang, J. Li, Z. Liu, and Q. Sun, “An overview of internet of vehicles,” Wireless Communication Over Zigbee for Automotive Inclination Measurement China Communications, vol. 11, no. 10, pp. 1–15, 2014. View at Publisher · View at Google Scholar · View at Scopus
  5. M. Gerla, E.-K. Lee, G. Pau, and U. Lee, “Internet of vehicles: from intelligent grid to autonomous cars and vehicular clouds,” in Proceedings of the IEEE World Forum on Internet of Things (WF-IoT '14), pp. 241–246, March 2014. View at Publisher · View at Google Scholar · View at Scopus
  6. L. Atzori, A. Iera, G. Morabito, and M. Nitti, “The social internet of things (SIoT)—when social networks meet the internet of things: concept, architecture and network characterization,” Computer Networks, vol. 56, no. 16, pp. 3594–3608, 2012. View at Publisher · View at Google Scholar · View at Scopus
  7. M. Nitti, R. Girau, and L. Atzori, “Trustworthiness management in the social internet of things,” IEEE Transactions on Knowledge and Data Engineering, vol. 26, no. 5, pp. 1253–1266, 2014. View at Publisher · View at Google Scholar · View at Scopus
  8. K. M. Alam, M. Saini, and A. El Saddik, “Toward social internet of vehicles: concept, architecture, and applications,” IEEE Access, vol. 3, pp. 343–357, 2015. View at Publisher · View at Google Scholar · View at Scopus
  9. L. Atzori, A. Iera, and G. Morabito, “SIoT: giving a social structure to the internet of things,” IEEE Communications Letters, vol. 15, no. 11, pp. 1193–1195, 2011. View at Publisher · View at Google Scholar · View at Scopus
  10. G. Karagiannis, O. Altintas, E. Ekici et al., “Vehicular networking: a survey and tutorial on requirements, architectures, challenges, standards and solutions,” IEEE Communications Surveys & Tutorials, vol. 13, no. 4, pp. 584–616, 2011. View at Publisher · View at Google Scholar · View at Scopus
  11. S. Buchegger and J. Y. Le Boudec, “Performance analysis of the confidant protocol,” in Proceedings of the ACM Interational Symposium on Mobile Ad Hoc NETWORKING and Computing, MOBIHOC 2002, pp. 226–236, Lausanne, Switzerland, June 2002.
  12. P. Michiardi and R. Molva, Core: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks, vol. 100, IFIP — the International Federation for Information Processing, 2002.
  13. A. Patwardhan, A. Joshi, T. Finin, and Y. Yesha, “A data intensive reputation management scheme for vehicular ad hoc networks,” in Proceedings of the 2006 3rd Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, MobiQuitous, pp. 1–8, July 2006. View at Publisher · View at Google Scholar · View at Scopus
  14. S. Buchegger, “A Robust Reputation System for Mobile Ad-Hoc Networks,” Tech. Rep., P2pecon, 2003. View at Google Scholar
  15. J. Zhang, “A survey on trust management for vanets,” in Proceedings of the Advanced Information Networking and Applications (AINA), 2011 IEEE International Conference on. IEEE, pp. 105–112, 2011.
  16. F. Kargl, P. Papadimitratos, L. Buttyan et al., “Secure vehicular communication systems: implementation, performance, and research challenges,” IEEE Communications Magazine, vol. 46, no. 11, pp. 110–118, 2008. View at Publisher · View at Google Scholar
  17. D. Huang, X. Hong, and M. Gerla, “Situation-Aware Trust architecture for vehicular networks,” IEEE Communications Magazine, vol. 48, no. 11, pp. 128–135, 2010. View at Publisher · View at Google Scholar · View at Scopus
  18. W. Li and H. Song, “ART: an attack-resistant trust management scheme for securing vehicular ad hoc networks,” IEEE Transactions on Intelligent Transportation Systems, vol. 17, no. 4, pp. 1–10, 2016. View at Publisher · View at Google Scholar · View at Scopus
  19. U. F. Minhas, J. Zhang, T. Tran, and R. Cohen, “Intelligent Agents in Mobile Vehicular Ad-Hoc Networks: Leveraging Trust Modeling Based on Direct Experience with Incentives for Honesty,” in Proceedings of the 2010 IEEE/ACM International Conference on Web Intelligence-Intelligent Agent Technology (WI-IAT), pp. 243–247, Toronto, AB, Canada, August 2010. View at Publisher · View at Google Scholar
  20. K. Hoffman, D. Zage, and C. Nita-Rotaru, “A survey of attack and defense techniques for reputation systems,” ACM Computing Surveys, vol. 42, no. 1, article 1, 2009. View at Publisher · View at Google Scholar · View at Scopus
  21. J. R. Douceur, “The sybil attack,” in Proceedings of the International Workshop on Peer-to-Peer Systems, pp. 251–260, Springer, 2002.
  22. M. P. Silverman, “The wisdom of crowds,” American Journal of Physics, vol. 75, no. 2, pp. 190–192, 2007. View at Publisher · View at Google Scholar
  23. G. Calandriello, P. Papadimitratos, J.-P. Hubaux, and A. Lioy, “Efficient and robust pseudonymous authentication in vanet,” in In Proceedings of the Proceedings of the Fourth ACM International Workshop on Vehicular Ad Hoc Networks, VANET’07, pp. 19–28, ACM, New York, NY, USA, 2007.
  24. A. Tomandl, D. Herrmann, K. Fuchs, H. Federrath, and F. Scheuer, “VANETsim: An open source simulator for security and privacy concepts in VANETs,” in Proceedings of the 2014 International Conference on High Performance Computing & Simulation (HPCS), pp. 543–550, Bologna, Italy, July 2014. View at Publisher · View at Google Scholar
  25. M. Haklay and P. Weber, “Openstreetmap: user-generated street maps,” IEEE Pervasive Computing, vol. 7, no. 4, pp. 12–18, 2008. View at Publisher · View at Google Scholar · View at Scopus