Wireless Personal Communications

, Volume 105, Issue 1, pp 121–143 | Cite as

A Trust Scheme Based on Vehicles Reports of Events in VANETs

  • Jie Wan
  • Xiang GuEmail author
  • Jin Wang
  • Liang Chen


In this paper, we propose a scheme allow vehicles in a Vehicular Ad hoc Network share running information among them. We developed a mechanism that can help a vehicle to judge the trustworthiness of a message. We classify information into two types: one is emergency warning message, and the other is event reporting message. By collecting reports from other vehicles who pass through the place where an event occurs on claimed by a message, a vehicle can make a decision whether the message is true or false by using algorithms proposed in the paper. Simulation experiments show the scheme can work well and efficiently. The scheme can resist certain attacks that are hardly identified by other schemes as it avoids using vehicle’s ID. It can also protect a driver’s privacy in some extent which is a hot issue in recent research.


VANETs Reputation Trust mechanism 



This work is supported by Jiangsu Overseas Research & Training Program for University Prominent Young &Middle-aged Teachers and Presidents Project, and in part by the Natural Science Foundation of the Jiangsu Higher Education Institutions (15KJB520029) and the Science Foundation of Nantong of Jiangsu Grants (BK2014064). The authors also gratefully acknowledge the helpful comments and suggestions of the reviewers, which have improved the presentation.


  1. 1.
  2. 2.
  3. 3.
    Resnick, P., Kuwabara, K., Zeckhauser, R., & Friedman, E. (2000). Reputation Systems. Communications of the ACM, 43(12), 45–48.CrossRefGoogle Scholar
  4. 4.
    Douceur, J. (2002). The Sybil attack. In Proceedings of the first international workshop on peer-to-peer systems (IPTPS). Google Scholar
  5. 5.
    Dellarocas, C. (2000). Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior. In Proceedings of the ACM conference on electronic commerce (EC), (pp. 150–157)Google Scholar
  6. 6.
    Zhang, J. (2011) A survey on trust management for VANETs. In: 2011 International conference on advanced information networking and applications (pp.105–112). IEEEGoogle Scholar
  7. 7.
    Li, Q., Malip, A., Martin, K. M., Ng, S.-L., & Zhang, J. (2012). A reputation-based announcement scheme for VANETs. IEEE Transactions on Vehicular Technology, 61(9), 4095–4108.CrossRefGoogle Scholar
  8. 8.
    Wei, Y. C., & Chen, Y. M. (2014). Adaptive decision making for improving trust establishment in VANETS. In 16th Asia-Pacific network operation and management symposium (APNOMS) (pp. 1–4)Google Scholar
  9. 9.
    Abdelaziz, K. C., Lagraa, N., & Lakas, A. (2014). Trust model with delayed verification for message relay in VANETs. In Wireless communications and mobile computing conference (IWCMC) (pp. 700–705)Google Scholar
  10. 10.
    Minhas, U. F., Zhang, J., Tran, T., & Cohen, R. (2010). Towards expanded trust management for agents in vehicular ad-hoc networks. International Journal of Computational Intelligence: Theory and Practice (IJCITP), 5(1), 03–15.Google Scholar
  11. 11.
    Raya, M., Papadimitratos, P., Gligor, V. D., & Hubaux, J. P. (2008). On data-centric trust establishment in ephemeral ad hoc networks. In Technical Report, LCS-REPORT-2007-003.Google Scholar
  12. 12.
    Dotzer, F., Fischer, L., & Magiera, P. (2005). Vars, a vehicle ad hoc networks reputation system. In Proceedings of the IEEE international symposium on a world of wireless, mobile and multimedia networks.Google Scholar
  13. 13.
    Huang, Z., Ruj, S., Cavenahi, M. A., Stojmenovic, M., & Nayak, A. (2014). A scocial network approach to trust management in VANETs. Peer-to-Peer Networking and Applications, 7(3), 229–242.CrossRefGoogle Scholar
  14. 14.
    Chen, Y.-M., & Wei, Y.-C. (2013). A beacon-based trust management system for enhancing user centric location privacy in VANETs. Journal of Communications and Networks, 15(2), 153–163.CrossRefGoogle Scholar
  15. 15.
    Wang, G., & Wu, Y. (2014). BIBRM: A bayesian inference based road message trust model in vehicular ad hoc networks. In 2014 IEEE 13th international conference trust, security and privacy in computing and communications (TrustCom) (pp. 481–486). IEEE.Google Scholar
  16. 16.
    Chen, C., Zhang, J., Cohen, R., & Ho, P. H. (2010). A trust-based message propagation and evaluation framework in VANETs. In Proceedings of the international conference on information technology convergence and services Google Scholar
  17. 17.
    Koster, A., Tettamanzi, A. G., Bazzan, A., & Pereira, C. D. C. (2013). Using trust and possibilistic reasoning to deal with untrustworthy communication in VANETs. In IEEE-ITS2013 (pp 2355–2360). IEEE.Google Scholar
  18. 18.
    Gerlach, M. (2007) Trust for vehicular applications. In 8th International symposium on ISADS’07. Autonomous decentralized systems (pp. 295–304)Google Scholar
  19. 19.
    Rostamzadeh, K., Nicanfar, H., Torabi, N., Gopalakrishnan, S., & Leung, V. (2015). A context-aware trust-based information dissemination framework for vehicular networks. IEEE Internet of Things Journal, 2(2), 121–132.CrossRefGoogle Scholar
  20. 20.
    Chunjie, Y., Jinxu, G., & Xinyou, L. (2014). The design and realization of OBU in free-flow ETC system [C]. Applied Mechanics and Materials, 556–562, 2081–2084.Google Scholar
  21. 21.
    Azaola M., Moriana C., Navarro P., Valdes D., Bonardi L., Toledo M., & Cosmen J. (2013) Experimental evaluation for road user charging of GPS/GLONASS/MEMS OBU [C]. In 26th international technical meeting of the satellite division of the institute of navigation (Vol. 1, pp. 656–666)Google Scholar
  22. 22.
    Sommer, C., Joerer, S., & Dressler, F. (2012). On the applicability of two-ray path loss models for vehicular networks simulation. IEEE Vehicular Networking Conference (VNC), 2012, 64–69.Google Scholar
  23. 23.
    Mujcic, R., & Frijters, P. (2011). Altrusim in society: Evidence from a natural experiment involving commuters. IZA Discussion Papers, Technical Report 5648.
  24. 24.
    Santamaria, A. F., Sottile, C., De Rango, F., & Marano, S. (2015). Safety enhancement and carbon dioxide (CO2) reduction in VANETs. Mobile Networks and Applications, 20(2), 220–238.CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.School of Computer Science and TechnologyNantong UniversityNantongChina

Personalised recommendations