2010 2nd International Conference on Information Technology Convergence and Services 2010
DOI: 10.1109/itcs.2010.5581298
|View full text |Cite
|
Sign up to set email alerts
|

A Trust Modeling Framework for Message Propagation and Evaluation in VANETs

Abstract: In this paper, we present a trust-based message propagation and evaluation framework in vehicular ad-hoc networks where peers share information regarding road condition or safety and others provide opinions about whether the information can be trusted. More specifically, our trustbased message propagation model collects and propagates peers' opinions in an efficient, secure and scalable way by dynamically controlling information dissemination. The trust-based message evaluation model allows peers to evaluate t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
79
0
1

Year Published

2013
2013
2022
2022

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 77 publications
(80 citation statements)
references
References 16 publications
0
79
0
1
Order By: Relevance
“…However, GS schemes are usually based on PKI, and message sender authentication cannot prevent legitimate nodes from sending malicious messages. [5], ESA [17], IBGS [18], GSIS [19], IBV [20], EGSS [21], iTrust [22], PMBP [23] STRM [13], TRIP [24], RaBTM [25] Non-infrastructure based ETM [26], MTM [27], LSOT [28], BTM [29] CTID [14], ITM [15], RMCV [30], ERM [31], VARS [32], TMEP [33], CRMS [34] Trust management schemes in the second category require infrastructure including roadside unit or central authority without using PKI [13,24,25]. Schemes such as Trust and Reputation Infrastructure-based Proposal (TRIP) [24] and road side unit (RSU) and Beacon-Based Trust Management (RaBTM) [25] may not work if infrastructure is not available.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…However, GS schemes are usually based on PKI, and message sender authentication cannot prevent legitimate nodes from sending malicious messages. [5], ESA [17], IBGS [18], GSIS [19], IBV [20], EGSS [21], iTrust [22], PMBP [23] STRM [13], TRIP [24], RaBTM [25] Non-infrastructure based ETM [26], MTM [27], LSOT [28], BTM [29] CTID [14], ITM [15], RMCV [30], ERM [31], VARS [32], TMEP [33], CRMS [34] Trust management schemes in the second category require infrastructure including roadside unit or central authority without using PKI [13,24,25]. Schemes such as Trust and Reputation Infrastructure-based Proposal (TRIP) [24] and road side unit (RSU) and Beacon-Based Trust Management (RaBTM) [25] may not work if infrastructure is not available.…”
Section: Related Workmentioning
confidence: 99%
“…In order to overcome the limitation of existing approaches, some researchers investigated trust management without using PKI in an infrastructure-less environment, which corresponds to the fourth category [14,15,[30][31][32][33][34]. Trust management schemes in this category such as Vehicle Ad Hoc Reputation System (VARS) [32] are more suitable for distributed VANET architecture.…”
Section: Related Workmentioning
confidence: 99%
“…[12] and [13] provide complex clustering algorithms but they mainly focus on stabilization of clusters itself in order to generalize traffic information and aim at trust modelling respectively. This approach is not suitable in our context of safety related message evaluation which demands for real-time constraints and lightweight computation complexity.…”
Section: Related Workmentioning
confidence: 99%
“…Two basic approaches exist to build up such virtual networks: AI , every vehicle within radio range is used for considering it in evaluation process, and AII , a fully cluster-based approach where vehicles with similar driving states (for instance position, speed, direction) are clustered. Thereby only messages from cluster masters are propagated to other clusters [12,13], whereas data from cluster slaves are not. AI provides highest accuracy in terms of the virtual environment, since every vehicle in range is considered.…”
Section: V2x Message Evaluation Designmentioning
confidence: 99%
“…Thus, it is very necessary to extend road safety and reduce traffic congestion. In VANET, the communication is established by transferring the updated information about the road and traffic conditions In intelligent transportation systems, every vehicle broadcast data [3] to the vehicular network or transportation company by having the role of sender, receiver, and the router by using the data to validate safe, free-flow of traffic. Vehicles should be equipped with some variety of radio interface or Onboard Unit (OBU) for communication to occur between vehicles and Road Side Units (RSUs) that enables adhoc short-range wireless networks to be created [4].…”
Section: Introductionmentioning
confidence: 99%