TY - GEN
T1 - Trust management method for vehicular ad hoc networks
AU - Shaikh, Riaz Ahmed
AU - Alzahrani, Ahmed Saeed
N1 - Publisher Copyright:
© Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2013.
PY - 2013
Y1 - 2013
N2 - In vehicular ad hoc networks, evaluating trustworthiness of data is utmost necessary for the receiver to make reliable decisions that are very crucial in safety and traffic-efficiency related applications. Existing trust management schemes that have been proposed so far for the vehicular networks has suffered from various limitations. For example, some schemes build trust based on the history of interactions. However, vehicular networks are ephemeral in nature, which makes that approach infeasible. Furthermore, in most of the existing approaches, unique identities of each vehicle must be known. This violates user privacy. In order to overcome these limitations, we have proposed a novel trust management scheme for the vehicular networks. The proposed method is simple and completely decentralized, which makes it easy to implement in the vehicular networks. We have analytically proved its robustness with respect to various security threats. Furthermore, it introduces linear time complexity, which makes it suitable to use in real-time.
AB - In vehicular ad hoc networks, evaluating trustworthiness of data is utmost necessary for the receiver to make reliable decisions that are very crucial in safety and traffic-efficiency related applications. Existing trust management schemes that have been proposed so far for the vehicular networks has suffered from various limitations. For example, some schemes build trust based on the history of interactions. However, vehicular networks are ephemeral in nature, which makes that approach infeasible. Furthermore, in most of the existing approaches, unique identities of each vehicle must be known. This violates user privacy. In order to overcome these limitations, we have proposed a novel trust management scheme for the vehicular networks. The proposed method is simple and completely decentralized, which makes it easy to implement in the vehicular networks. We have analytically proved its robustness with respect to various security threats. Furthermore, it introduces linear time complexity, which makes it suitable to use in real-time.
KW - Ad-Hoc networks
KW - Privacy
KW - Trust model
KW - Vehicular networks
UR - http://www.scopus.com/inward/record.url?scp=84982295120&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-37949-9_70
DO - 10.1007/978-3-642-37949-9_70
M3 - Conference contribution
AN - SCOPUS:84982295120
SN - 9783642379482
T3 - Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
SP - 801
EP - 815
BT - Quality, Reliability, Security and Robustness in Heterogeneous Networks - 9th International Conference, QShine 2013, Revised Selected Papers
A2 - Singh, Karan
A2 - Awasthi, Amit K.
PB - Springer-Verlag Berlin Heidelberg
T2 - 9th International Conference on Quality, Reliability, Security and Robustness in Heterogeneous Networks, QShine 2013
Y2 - 11 January 2013 through 12 January 2013
ER -