Evolving Trust Formula to Evaluate Data Trustworthiness in VANETs Using Genetic Programming

  • Mehmet AslanEmail author
  • Sevil Sen
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11454)


Vehicular Ad Hoc Networks (VANETs) provide traffic safety, improve traffic efficiency and present infotainment by sending messages about events on the road. Trust is widely used to distinguish genuine messages from fake ones. However, trust management in VANETs is a challenging area due to their dynamically changing and decentralized topology. In this study, a genetic programming based trust management model for VANETs is proposed to properly evaluate trustworthiness of data about events. A large number of features is introduced in order to take into account VANETs’ complex characteristics. Simulations with bogus information attack scenarios show that the proposed trust model considerably increase the security of the network.


Evolutionary computation Genetic programming Trust management Data trust Vehicular Ad Hoc Networks (VANETs) 


  1. 1.
    Sakiz, F., Sen, S.: A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV. Ad Hoc Netw. 61, 33–50 (2017)CrossRefGoogle Scholar
  2. 2.
    Dorronsoro, B., Ruiz, P., Danoy, G., Pigné, Y., Bouvry, P.: Evolutionary Algorithms for Mobile Ad Hoc Networks. Wiley, West Sussex (2014)CrossRefGoogle Scholar
  3. 3.
    Dorronsoro, B., Ruiz, P., Danoy, G., Pigné, Y., Bouvry, P.: Survey on Optimization Problems for Mobile Ad Hoc Networks, pp. 49–78. Wiley, Hoboken (2014). chap. 3Google Scholar
  4. 4.
    Cho, J.H., Swami, A., Chen, R.: A survey on trust management for mobile ad hoc networks. IEEE Commun. Surv. Tut. 13(4), 562–583 (2011)CrossRefGoogle Scholar
  5. 5.
    Govindan, K., Mohapatra, P.: Trust computations and trust dynamics in mobile adhoc networks: a survey. IEEE Commun. Surv. Tut. 14(2), 279–298 (2012)CrossRefGoogle Scholar
  6. 6.
    Ma, S., Wolfson, O., Lin, J.: A survey on trust management for intelligent transportation system. In: Proceedings of the 4th ACM SIGSPATIAL International Workshop on Computational Transportation Science, pp. 18–23. ACM (2011)Google Scholar
  7. 7.
    Yu, H., Shen, Z., Miao, C., Leung, C., Niyato, D.: A survey of trust and reputation management systems in wireless communications. Proc. IEEE 98(10), 1755–1772 (2010)CrossRefGoogle Scholar
  8. 8.
    Zhang, J.: A survey on trust management for VANETs. In: IEEE International Conference on Advanced Information Networking and Applications (AINA), 2011, pp. 105–112. IEEE (2011)Google Scholar
  9. 9.
    Wei, Y.-C., Chen, Y.-M.: Efficient self-organized trust management in location privacy enhanced VANETs. In: Lee, D.H., Yung, M. (eds.) WISA 2012. LNCS, vol. 7690, pp. 328–344. Springer, Heidelberg (2012). Scholar
  10. 10.
    Van Rijsbergen, C.J.: Information Retrieval. Butterworths. London, UK (1979). Accessed 31 Jan 2019
  11. 11.
    Yao, X., Zhang, X., Ning, H., Li, P.: Using trust model to ensure reliable data acquisition in VANETs. Ad Hoc Netw. 55, 107–118 (2017)CrossRefGoogle Scholar
  12. 12.
    Reina, D.G., Ruiz, P., Ciobanu, R., Toral, S., Dorronsoro, B., Dobre, C.: A survey on the application of evolutionary algorithms for mobile multihop ad hoc network optimization problems. Int. J. Distrib. Sens. Netw. 12(2), 2082496 (2016)CrossRefGoogle Scholar
  13. 13.
    Kusyk, J., Uyar, M.U., Sahin, C.S.: Survey on evolutionary computation methods for cybersecurity of mobile ad hoc networks. Evol. Intel. 10(3), 95–117 (2018)CrossRefGoogle Scholar
  14. 14.
    Tahta, U.E., Sen, S., Can, A.B.: Gentrust: a genetic trust management model for peer-to-peer systems. Appl. Soft Comput. 34, 693–704 (2015)CrossRefGoogle Scholar
  15. 15.
    Koza, J.R.: Genetic Programming: On the Programming of Computers by Means of Natural Selection. MIT Press, Cambridge (1992)zbMATHGoogle Scholar
  16. 16.
    Koza, J.R.: Genetic programming as a means for programming computers by natural selection. Stat. Comput. 4(2), 87–112 (1994)CrossRefGoogle Scholar
  17. 17.
    The NS-3 Network Simulator. Accessed 31 Jan 2019
  18. 18.
    Luke, S.: ECJ A Java-based Evolutionary Computation Library (1998). Accessed 31 Jan 2019
  19. 19.
    Naumov, V., Baumann, R., Gross, T.: An evaluation of inter-vehicle ad hoc networks based on realistic vehicular traces. In: Proceedings of the 7th ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 108–119. ACM (2006)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.WISE Lab., Department of Computer EngineeringHacettepe UniversityAnkaraTurkey

Personalised recommendations