4.7 Article

An Attack-Resistant Trust Inference Model for Securing Routing in Vehicular Ad Hoc Networks

期刊

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
卷 68, 期 7, 页码 7108-7120

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TVT.2019.2919681

关键词

Vehicular ad hoc network; routing security; trust-based solution; trust inference model; light-weight trust-aware multicast routing protocol

资金

  1. Natural Science Foundation of China [61872205, 61402245, 61772195]
  2. Shandong Provincial Natural Science Foundation [ZR2019MF018]
  3. Key Program of the National Natural Science Foundation of China [61832012]
  4. Project of Shandong Province Higher Educational Science and Technology Program [J16LN06]
  5. Source Innovation Project of Qingdao [18-2-2-56-jch]
  6. Open Research Fund from Shandong Provincial Key Laboratory of Computer Networks [SDKLCN-2018-07]
  7. State Foundation for Studying Abroad to Visit the United States

向作者/读者索取更多资源

The problem of routing security in vehicular ad hoc networks has become a major concern for researchers. Compared with cryptography-based solutions, trust-based solutions are considered to be more acceptable as a promising approach, which mainly define two operations: trust computing and security application. In this paper we first study trust properties and construct a novel trust inference model, where two trust attributes named subjective trust and recommendation trust, are selected to quantify the trust level of a specific vehicle. The SCGM(1,1)-weighted Markov prediction algorithm based on fluctuation recognition is utilized to calculate the subjective trust accurately, meanwhile a new evaluation method of recommendation credibility based on the feedback mechanism is introduced for the calculation of recommendation trust. We subsequently exploit the advantages of mesh structure and design a light-weight trust-aware multicast routing protocol (i.e., LTMRP), which can establish secure and reliable communication paths by selecting trusted relay vehicles. To further improve the routing efficiency, two mechanisms including forwarding nodes reuse mechanism and trust-aware route handoff mechanism are proposed. Simulation verification and comparison of the relevant trust models and trust-based protocols are accomplished by three simulation platforms (i.e., Netlogo, SUMO, and NS-2). The convincing results show that our trust model obtains strong resistibility to multiple malicious attacks. Moreover, examined in four routing metrics, the experimental results indicate that LTMRP performs better than the other relevant protocols.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据