Smart Trust Management for Vehicular Networks
Authors: Amel Ltifi, Ahmed Zouinkhi, Med Salim Bouhlel
Abstract:
Spontaneous networks such as VANET are in general deployed in an open and thus easily accessible environment. Therefore, they are vulnerable to attacks. Trust management is one of a set of security solutions dedicated to this type of networks. Moreover, the strong mobility of the nodes (in the case of VANET) makes the establishment of a trust management system complex. In this paper, we present a concept of ‘Active Vehicle’ which means an autonomous vehicle that is able to make decision about trustworthiness of alert messages transmitted about road accidents. The behavior of an “Active Vehicle” is modeled using Petri Nets.
Keywords: Component, active vehicle, cooperation, petri nets, trust management, VANET.
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1127494
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1128References:
[1] V. Manzoni, F. Codecà, S. Savaresi, P. Cravini, “The Implementation of the Safespot Architecture on a Powered Two-Wheeler Vehicle”, 12th IFAC Symposium on Control in Transportation Systems, CTS 2009.
[2] J.-H. Cho, A. Swami, and I.-R. Chen, “A survey on trust management for mobile ad hoc networks,” IEEE Communications Surveys and Tutorials 13(4): 562-583 (2011)
[3] V. Balakrishnan, V. Varadharajan, and U. Tupakula, “Trust management in mobile ad hoc networks,” in Handbook of Wireless Ad hoc and Sensor Networks, Springer, 2009, pp. 473–502.
[4] A.V. Ratzer, L. Wells, H.M. Larsen, M. Laursen, J.F. Qvortrup, M.S. Stissing, M. Westergaard, S. Christensen, and K. Jensen, “Cpn-tools for editing, simulating, and analysing coloured petri net”, LNC, 2679, pp. 450– 462, 2003.
[5] C. Chen, J. Zhang, R. Cohen, P. Ho, A Trust-based Message Propagation and Evaluation Framework in VANETs, In Proc. of the 4th IFIP International Conference on Trust Management (IFIPTM2010), pp.103-110, 2010.
[6] M. M. Elsalih Abdelsalam Mahmoud, S. Shen, Secure Cooperation Incentive Scheme with Limited Use of Public Key Cryptography for Multi-hop Wireless Network, Proceedings of GLOBECOM'2010, Miami Florida, USA, 6-10 Déc. 2010, pp.1-5
[7] Raya, M., Papadimitratos, P., Gligory, V.D., Hubaux, J.P.: On data-centric trust establishment in ephemeral ad hoc networks. In: Proceedings of the IEEE Conference on Computer Communications. (2008) pp. 1238–1246
[8] D. Huang, Z. Zhou, X. Hong et M. Gerla, Establishing Email-based Social Network Trust for Vehicular Networks, IEEE Consumer Communications and Networking Conference (CCNC 2010), Jan 9 – 12, Las Vegas, Nevada 2010
[9] I. A. Soomro, H.B. Hasbullah, and J.lb.Ab Manan,"User requirements model for vehicular ad hoc network applications," International Symposium on Information Technology 2010 (ITSim 2010), Malaysia.
[10] P. Caballero-Gil, J. Molina-Gil, and C. Caballero-Gil, "Data aggregation based on fuzzy logic for VANETs," in Proc. of International Conference on Complex, Intelligent, and Software Intensive (CISIS), pp.33-40, 2011.
[11] T. Gazdar, A. Belghith, and A. BenSlimane, "A Cluster Based Secure Architecture for Vehicular Ad Hoc Networks," The 8th ACS/IEEE International Conference ACS/IEEE AICCSA'10, Hammamet, Tunisia, May 16-19, 2010 N.
[12] (Bajic, 2009) Eddy Bajic, “A Service-Based Methodology for RFID-Smart Objects Interactions in Supply Chain”, International Journal of Multimedia and Ubiquitous Engineering, Vol. 4, No. 3, pp. 37-54, 2009.
[13] (McFarlane, 2003) D. McFarlane, “Product Identity and Its Impact on Discrete Event Observability”, European Control Conference ECC 2003, Cambridge, Septembre 2003.
[14] J. Grover, N. K. Prajapati, V. Laxmi, M. S. Gaur, “Machine Learning Approach for Multiple Misbehavior Detection in VANET”, First International Conference on Advances in Computing and Communications (ACC-2011), July. 22-24, Kochi Kerala, India, pp. 644-653, 2011.
[15] A. Giua, M.P. Fanti, and C. Seatzu, "Monitor design for colored Petri nets: an application to deadlock prevention in railway networks," Control Engineering Practice, Vol. 14, No. 10, pp. 1231-1247, October 2006.
[16] M. Bitam, "Modélisation et étude de comportement d’une ligne de communication TCP/IP, " 2005, Université Josef Fourier - Grenoble 1, juin, 2005.
[17] B. Brahimi, C. Aubrun, and E. Rondeau, “Modelling and simulation of scheduling policies implemented in Ethernet switch by using colored petri nets,” 11th IEEE International Conference on Emerging Technologies and Factory Automation, Czech Republic, 2006.