2022
DOI: 10.3390/s22218285
|View full text |Cite
|
Sign up to set email alerts
|

A Multi-Tier Trust-Based Security Mechanism for Vehicular Ad-Hoc Network Communications

Abstract: Securing communications in vehicle ad hoc networks is crucial for operations. Messages exchanged in vehicle ad hoc network communications hold critical information such as road safety information, or road accident information and it is essential these packets reach their intended destination without any modification. A significant concern for vehicle ad hoc network communications is that malicious vehicles can intercept or modify messages before reaching their intended destination. This can hamper vehicle ad h… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 51 publications
0
6
0
Order By: Relevance
“…In recent years, there has been an increase in research on trust management in the IoV [2,5,11,[19][20][21][22][23][24]. We can divide the existing trust management models into: learningbased and traditional methods-based trust management models.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…In recent years, there has been an increase in research on trust management in the IoV [2,5,11,[19][20][21][22][23][24]. We can divide the existing trust management models into: learningbased and traditional methods-based trust management models.…”
Section: Related Workmentioning
confidence: 99%
“…Epinions, in essence, is a publicly available trust dataset that encompasses six parameters: userid, productid, categoryid, rating, helpfulness, and timestamps. For instance, a data trace of [1,2,3,4,5,6] in the Epinions dataset implies that user 1 accords a rating of 4 to product 2 belonging to category 3 at timestamp 6. The helpfulness of the accorded rating is 5.…”
Section: Simulation Setup and Feature Extractionmentioning
confidence: 99%
See 1 more Smart Citation
“…Nevertheless, vehicular networks are highly susceptible to both outsider attacks, wherein the adversary is not an authenticated user of the network, and insider attacks, where the attacker is a legitimate participant of the network. These vehicles with their malevolent intentions are capable of introducing unnecessary delays while forwarding, forging and/or altering safety-related information, causing accidents and endangering human lives [ 17 , 18 ]. An extensive study of the existing research exhibits that several solutions for vehicular network security employing cryptography have been presented.…”
Section: Introductionmentioning
confidence: 99%
“…Consequently, road safety, traffic efficiency, and the performance of the network can be adversely affected by malicious vehicles and their false/bogus messages. Therefore, a key challenge to the actual deployment of VANETs is communication security [ 6 , 7 , 8 ]. To provide secure communication for message propagation, the network must meet VANET users’ most important requirements, which are privacy, security, and trust [ 9 ].…”
Section: Introductionmentioning
confidence: 99%