4.7 Article

An Attack-Resistant Trust Inference Model for Securing Routing in Vehicular Ad Hoc Networks

Journal

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
Volume 68, Issue 7, Pages 7108-7120

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TVT.2019.2919681

Keywords

Vehicular ad hoc network; routing security; trust-based solution; trust inference model; light-weight trust-aware multicast routing protocol

Funding

  1. Natural Science Foundation of China [61872205, 61402245, 61772195]
  2. Shandong Provincial Natural Science Foundation [ZR2019MF018]
  3. Key Program of the National Natural Science Foundation of China [61832012]
  4. Project of Shandong Province Higher Educational Science and Technology Program [J16LN06]
  5. Source Innovation Project of Qingdao [18-2-2-56-jch]
  6. Open Research Fund from Shandong Provincial Key Laboratory of Computer Networks [SDKLCN-2018-07]
  7. State Foundation for Studying Abroad to Visit the United States

Ask authors/readers for more resources

The problem of routing security in vehicular ad hoc networks has become a major concern for researchers. Compared with cryptography-based solutions, trust-based solutions are considered to be more acceptable as a promising approach, which mainly define two operations: trust computing and security application. In this paper we first study trust properties and construct a novel trust inference model, where two trust attributes named subjective trust and recommendation trust, are selected to quantify the trust level of a specific vehicle. The SCGM(1,1)-weighted Markov prediction algorithm based on fluctuation recognition is utilized to calculate the subjective trust accurately, meanwhile a new evaluation method of recommendation credibility based on the feedback mechanism is introduced for the calculation of recommendation trust. We subsequently exploit the advantages of mesh structure and design a light-weight trust-aware multicast routing protocol (i.e., LTMRP), which can establish secure and reliable communication paths by selecting trusted relay vehicles. To further improve the routing efficiency, two mechanisms including forwarding nodes reuse mechanism and trust-aware route handoff mechanism are proposed. Simulation verification and comparison of the relevant trust models and trust-based protocols are accomplished by three simulation platforms (i.e., Netlogo, SUMO, and NS-2). The convincing results show that our trust model obtains strong resistibility to multiple malicious attacks. Moreover, examined in four routing metrics, the experimental results indicate that LTMRP performs better than the other relevant protocols.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available