Trust model for secure group leader-based communications in VANET

  • Hamssa Hasrouny
  • Abed Ellatif Samhat
  • Carole Bassil
  • Anis Laouiti
Article
  • 16 Downloads

Abstract

VANET aims to improve safety for all road users. Vehicles exchange safety messages over wireless communication links which are prone to multiple attacks. To enhance the existing security of V2V communications, we propose in this paper a security framework based on vehicles behavior analysis. We define a Hybrid Trust Model (HTM) and a misbehavior detection system (MDS) where a trust metric is assigned to every vehicle depending on its behavior. Using this trust metric, a classification of the vehicles into malicious or honest is done. HTM is based on-the-fly group formation which helps to manage the communication between vehicles and the back-end system by selecting the most trustworthy node as group leader (GL). Vehicles and GL will cooperate with each other within the group and with the back-end system to detect the malicious node and to notify the Misbehavior Authority. The latter takes appropriate actions to limit the consequences of the malicious behaving node. Performance evaluation of HTM and MDS is carried out using Groovenet Simulator. Results show the efficiency of the proposed model to select the trustworthy vehicles and to monitor their behaviors, as well as to classify them and to deactivate the malicious ones.

Keywords

Trust evaluation Performance Misbehavior detection Security Group formation Decentralized 

References

  1. 1.
    Hasrouny, H., Samhat, A. E., Bassil, C., & Laouiti, A. (2017). VANET security challenges and solutions: A survey. Vehicular Communications, 7, 7–20.CrossRefGoogle Scholar
  2. 2.
    ETSI TS 102 940 V1.1.1- ITS—Communications security architecture and security management (2012).Google Scholar
  3. 3.
    IEEE Standard for Wireless Access in Vehicular Environments-Security Services for Applications and Management Messages: IEEE Std 1609.2-2016.Google Scholar
  4. 4.
    Karagiannis, G., Altintas, O., Ekici, E., Heijenk, G., Jarupan, B., Lin, K., et al. (2011). Vehicular networking: A survey and tutorial on requirements, architectures, challenges, standards and solutions. IEEE Communications Surveys & Tutorials, 13(4), 584–616.CrossRefGoogle Scholar
  5. 5.
    Rawat, D. B., Yan, G., Bista, B. B., & Weigle, M. C. (2015). Trust on the security of wireless vehicular ad hoc networking. Ad Hoc & Sensor Wireless Networks, 24(3–4), 283–305.Google Scholar
  6. 6.
    Hasrouny, H., Bassil, C., Samhat, A. E., & Laouiti, A. (2016). Security risk analysis of a trust model for secure group leader-based communication in VANET. In Ad hoc networks for smart cities book, IWVSC Malaysia, Springer, Ch.6 (pp. 71–83).Google Scholar
  7. 7.
    Hartenstein, H., & Laberteaux, K. P. (2008). A tutorial survey on vehicular ad hoc networks. IEEE Communications Magazine, 46(6), 164–171.CrossRefGoogle Scholar
  8. 8.
    Cooper, C., Franklin, D., Ros, M., et al. (2017). A comparative survey of VANET clustering techniques. IEEE Communications Surveys & Tutorials, 19(1), 657–681.CrossRefGoogle Scholar
  9. 9.
    Boneh, D., Boyen, X., & Shacham, H. (2004). Short group signatures. In Annual international cryptography conference (pp. 41–55).Google Scholar
  10. 10.
    Wu, Q., Domingo-Ferrer, J., & Gonzalez-Nicolas, U. (2010). Balanced trustworthiness, safety, and privacy in vehicle-to-vehicle communications. IEEE Transactions on Vehicular Technology, 59(2), 559–573.CrossRefGoogle Scholar
  11. 11.
    Hasrouny, H., Bassil, C., Samhat, A. E., & Laouiti, A. (2015). Group-based authentication in V2V communications. In Proceedings of IEEE fifth international conference on DICTAP (pp. 173–177).Google Scholar
  12. 12.
    Wang, J., Jiang, Ch., Zhang, K., et al. (2017). Vehicular sensing networks in a smart city: Principles, technologies and applications. IEEE Wireless Communications, 25(99), 1–11.Google Scholar
  13. 13.
    Zhang, J. (2011). A survey on trust management for VANETs. In IEEE international conference on advanced information networking and applications (AINA) (pp. 105–112).Google Scholar
  14. 14.
    Tangade, Sh. S., & Manvi, S. S. (2013). A survey on attacks, security and trust management solutions in VANETs. In IEEE, 4th ICCCNT, Tiruchengode, India (pp. 1–6).Google Scholar
  15. 15.
    Patel, N., & Jhaveri, R. (2015). Trust based approaches for secure routing in VANET: A Survey. Procedia Computer Science, Elsevier, 45, 592–601.CrossRefGoogle Scholar
  16. 16.
    Kavitha, M., Tangade, Sh. S., & Manvi, S. S. (2013). Distributed trust & time management strategy in VANETs. In IEEE, 4th ICCCNT, Tiruchengode, India (pp. 1–6).Google Scholar
  17. 17.
    Li, X., Liu, J., Li, X., & Sun, W. (2013). RGTE: A reputation-based global trust establishment in VANETs. In Proceedings of the 5th IEEE international conference on intelligent networking and collaborative systems (INCoS ‘13), China (pp. 210–214).Google Scholar
  18. 18.
    Lo, N.-W., & Tsai, H.-Ch. (2009). A reputation system for traffic safety event on vehicular ad hoc networks. EURASIP Journal on Wireless Communications and Networking, 2009, 125348.CrossRefGoogle Scholar
  19. 19.
    Primiero, G., Raimondi, F., Chen, T., & Nagarajan, R. (2017). A proof-theoretic trust and reputation model for VANET. In IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) (pp. 146–152).Google Scholar
  20. 20.
    Hu, H., Lu, R., Zhang, Z., & Shao, J. (2017). REPLACE: A reliable trust-based platoon service recommendation scheme in VANET. IEEE Transactions on Vehicular Technology, 66(2), 1786–1797.CrossRefGoogle Scholar
  21. 21.
    Dixit, K., Pathak, P., & Gupta, S. (2016). A new technique for trust computation and routing in VANET. In Colossal Data Analysis and Networking (CDAN), Symposium on, IEEE (pp. 1–6).Google Scholar
  22. 22.
    Diep, P. T. N., & Yeo, C. K. (2016). A trust-privacy framework in vehicular ad hoc networks (VANET). In Wireless telecommunications symposium WTS (pp. 1–7).Google Scholar
  23. 23.
    Kothari, A., Shukla, P., & Pandey, R. (2016). Trust centric approach based on similarity in VANET. In International conference on signal processing, communication, power and embedded system (SCOPES) (pp. 1923–1926).Google Scholar
  24. 24.
    Rivero-Garcıa, A., Santos-Gonzalez, I., Caballero-Gil, P., & Caballero-Gil, C. (2016). VANET event verification based on user trust. In 24th Euromicro international conference on parallel, distributed, and network-based processing (pp. 313–316).Google Scholar
  25. 25.
    Mármol, F. G., & Pérez, G. M. (2012). TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks. Journal of Network and Computer Applications, 35(3), 934–941.CrossRefGoogle Scholar
  26. 26.
    Zhou, A., Li, J., Sun, Q., Fan, C., Lei, T., & Yang, F. (2015). A security authentication method based on trust evaluation in VANETs. EURASIP Journal on Wireless Communications and Networking, 1, 1–8.Google Scholar
  27. 27.
    Liu, Z., Ma, J., Jiang, Z., Zhu, H., & Miao, Y. (2016). LSOT: A lightweight self-organized trust model in VANETs. Mobile Information Systems Journal. https://www.hindawi.com/journals/misy/2016/7628231/.
  28. 28.
    Chaurasia, B. K., & Verma, Sh. (2013). Trust based group formation in VANET. MTTER, 2(2), 121–125.Google Scholar
  29. 29.
    Tajeddine, A., Kayssi, A., & Chehab, A. (2010). A privacy-preserving trust model for VANETs. In 10th IEEE international conference on computer and information technology (CIT 2010).Google Scholar
  30. 30.
    Gazdar, T., Benslimane, A., Rachedi, A., Belghith, A. (2012). A trust-based architecture for managing certificates in vehicular adhoc networks. In IEEE International Conference on (ICCIT) (pp. 180–185).Google Scholar
  31. 31.
    Yang, N. (2013). A similarity based trust and reputation management framework for VANET. International Journal of Future Generation Communication and Networking, 6(2), 25–34.Google Scholar
  32. 32.
    Rehman, A., Ali, A., Amin, R., Shah, A. (2013). VANET thread based message trust model. In Eighth international conference on digital information management (ICDIM).Google Scholar
  33. 33.
    Xu, H., Hua, L., Ning, Y., & Xue, X. (2013). Detecting the incorrect safety message in VANETS. Research Journal of Applied Sciences, Engineering and Technology, 5(17), 4406–4410.CrossRefGoogle Scholar
  34. 34.
    Sahoo, R. R., Panda, R., Beherab, D. K., & Naskarcm, M. K. (2012). A trust based clustering with ant colony routing in VANET. In Third international conference on computing communication & networking technologies (ICCCNT).Google Scholar
  35. 35.
    Ltifi, A., Zouinkhi, A., & Bouhlel, M. S. (2015). Trust-based scheme for alert spreading in VANET. In International conference on advanced wireless, information, and communication technologies (AWICT).Google Scholar
  36. 36.
    Ding, Q., Jiang, M., Li, X., & Zhou, X. (2010). Reputation-based trust model in vehicular ad hoc networks. In IEEE conference on wireless communications and signal processing (WCSP).Google Scholar
  37. 37.
    Roy, D., & Das, P. (2017). Trust and group leader based model to avoid broadcast storm problem in vehicular ad hoc networks. Advances in Computational Sciences and Technology, 10(4), 575–597.Google Scholar
  38. 38.
    Khana, U., Agrawala, Sh, & Silakari, S. (2015). Detection of malicious nodes (DMN) in vehicular ad-hoc networks. Procedia Computer Science, 46, 965–972.CrossRefGoogle Scholar
  39. 39.
    Alriyami, Q., Adnane, A., & Smith, A. K. (2014). Evaluation criterias for trust management in vehicular ad hoc networks (VANET). International Conference on Connected Vehicles and Expo (ICCVE) (pp. 118–123).Google Scholar
  40. 40.
    Whyte, W., Weimerskirch, A., Kumar, V., & Hehn, T. (2013). A security credential management system for V2V communications. In IEEE Vehicular Networking Conference (pp. 1–8).Google Scholar
  41. 41.
    Manulis, M., Fleischhacker, N., Gunther, F., Kiefer, F., & Poettering, B. (2012). Group signatures: Authentication with privacy. Cryptographic Protocols Group, Department of Computer Science, Technische Universit¨at Darmstadt.Google Scholar
  42. 42.
    NHTSA, Preliminary Regulatory Impact Analysis FMVSS No. 150 Vehicle-to-Vehicle Communication Technology for Light Vehicles, Report No. DOT HS 812 359 (2016).Google Scholar
  43. 43.
    Dedicated Short Range Communications (DSRC) Message Set Dictionary, SAE Std. J2735 201 603, March 2016.Google Scholar
  44. 44.
    Bullen, P. S. (2003). Handbook of means and their inequalities. Berlin: Springer Netherlands.CrossRefMATHGoogle Scholar
  45. 45.
    GroovNet v2.0.1. (2006). Vehicle network simulator. In Second international workshop on vehicle-to-vehicle communications (V2VCOM), San Jose, USA, July 2006, https://github.com/mlab/GrooveNet. Last updated on 2012.
  46. 46.
  47. 47.
    Wang, J., Jiang, Ch., Zhang, K., et al. (2017). Taking drones to the next level: Cooperative distributed unmanned-aerial-vehicular networks for small and mini drones. IEEE Vehicular Technology Magazine, 2(3), 73–82.CrossRefGoogle Scholar
  48. 48.
    Islam, N., Kowsar Hossain, Md., Nawaz Ali, G. G. Md., & Chong, P. H. J. (2016). An expedite group key establishment protocol for Flying Ad-Hoc Network (FANET). In 5th interenational conference on informatics, electronics, and vision (ICIEV).Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Telecom SudParis, SAMOVAR, CNRSUniversity Paris-SaclayEvry CedexFrance
  2. 2.Faculty of Engineering-CRSILebanese UniversityHadathLebanon
  3. 3.Faculty of Science IILebanese UniversityFanarLebanon

Personalised recommendations