TY - JOUR
T1 - Intrusion-aware trust model for vehicular ad hoc networks
AU - Shaikh, Riaz Ahmed
AU - Alzahrani, Ahmed Saeed
N1 - Publisher Copyright:
© 2013 John Wiley & Sons, Ltd.
PY - 2014/11/1
Y1 - 2014/11/1
N2 - In vehicular ad hoc networks, peers make decisions on the basis of the information provided by the other peers. If the received information is fake, then the result could be catastrophic, such as road accidents. Therefore, many researchers use the concept of trust to evaluate the trustworthiness of the received data. However, existing trust management schemes (proposed so far for the vehicular networks) are suffered from various limitations. For example, some schemes measure trust on the basis of the history of interactions, which is infeasible for vehicular networks due to its ephemeral nature. Also, none of the existing schemes operate in an identity anonymous environment. In order to overcome these limitations, we propose a novel trust management scheme for identity anonymous vehicular ad hoc networks. The proposed method is simple and completely decentralized that makes it easy to implement in the vehicular networks. Also, we prove that the proposed method is not only robust, but it also detects false location and time information. Furthermore, it introduces linear time complexity, which makes it suitable to use in real time.
AB - In vehicular ad hoc networks, peers make decisions on the basis of the information provided by the other peers. If the received information is fake, then the result could be catastrophic, such as road accidents. Therefore, many researchers use the concept of trust to evaluate the trustworthiness of the received data. However, existing trust management schemes (proposed so far for the vehicular networks) are suffered from various limitations. For example, some schemes measure trust on the basis of the history of interactions, which is infeasible for vehicular networks due to its ephemeral nature. Also, none of the existing schemes operate in an identity anonymous environment. In order to overcome these limitations, we propose a novel trust management scheme for identity anonymous vehicular ad hoc networks. The proposed method is simple and completely decentralized that makes it easy to implement in the vehicular networks. Also, we prove that the proposed method is not only robust, but it also detects false location and time information. Furthermore, it introduces linear time complexity, which makes it suitable to use in real time.
KW - Ad hoc networks
KW - Privacy
KW - Trust management
KW - Vehicular networks
UR - http://www.scopus.com/inward/record.url?scp=84910607074&partnerID=8YFLogxK
U2 - 10.1002/sec.862
DO - 10.1002/sec.862
M3 - Article
AN - SCOPUS:84910607074
VL - 7
SP - 1652
EP - 1669
JO - Security and Communication Networks
JF - Security and Communication Networks
SN - 1939-0114
IS - 11
ER -