Ratee-Based Trust Management System for Internet of Vehicles

  • Fangyu Gai
  • Jiexin Zhang
  • Peidong ZhuEmail author
  • Xinwen Jiang
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10251)


There is a growing requirement for effective trust management in Internet of Vehicles (IoV), considering the critical consequences of acting on misleading information spread by malicious nodes. Most existing trust models for IoV are rater-based, where the reputation information of each node is stored in other nodes it has interacted with. This is not suitable for IoV environment due to the ephemeral nature of vehicular networks. To fill this gap, we propose a Ratee-based Trust Management (RTM) system, where each node stores its own reputation information rated by others during past transactions, and a credible CA server is introduced to ensure the integrality and the undeniability of the trust information. Additionally, we built a V2V/V2I trust simulator as an extension to the open source VANET simulator to verify our scheme. Experimental results demonstrate that our scheme achieves faster information propagation and higher transaction success rate than conventional rater-based methods.


Internet of Things Internet of Vehicles Ratee-based Trust management 



This work is supported by the National Science Foundation of China under Grants Nos. 61272010 and 61572514.


  1. 1.
    Atzori, L., Iera, A., Morabito, G.: Siot: giving a social structure to the internet of things. IEEE Commun. Lett. 15(11), 1193–1195 (2011)CrossRefGoogle Scholar
  2. 2.
    Buchegger, S., Boudec, J.Y.L.: Performance analysis of the CONFIDANT protocol. In: ACM Interational Symposium on Mobile Ad Hoc NETWORKING and Computing, MOBIHOC 2002, Lausanne, Switzerland, 9–11 June 2002, pp. 226–236 (2002)Google Scholar
  3. 3.
    Buchegger, S., Le Boudec, J.-Y.: A robust reputation system for mobile ad-hoc networks. Technical report (2003)Google Scholar
  4. 4.
    Gerla, M., Lee, E.K., Pau, G., Lee, U.: Internet of vehicles: from intelligent grid to autonomous cars and vehicular clouds. In: IEEE World Forum on Internet of Things, pp. 241–246 (2014)Google Scholar
  5. 5.
    Huang, D., Hong, X., Gerla, M.: Situation-aware trust architecture for vehicular networks. IEEE Commun. Mag. 48(11), 128–135 (2010)CrossRefGoogle Scholar
  6. 6.
    Li, W., Joshi, A., Finin, T.: Coping with node misbehaviors in ad hoc networks: a multi-dimensional trust management approach. In: 2010 Eleventh International Conference on Mobile Data Management (MDM), pp. 85–94. IEEE (2010)Google Scholar
  7. 7.
    Li, W., Song, H.: ART: an attack-resistant trust management scheme for securing vehicular ad hoc networks. IEEE Trans. Intell. Transp. Syst. 17(4), 1–10 (2016)CrossRefGoogle Scholar
  8. 8.
    Michiardi, P., Molva, R.: Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Jerman-Blažič, B., Klobučar, T. (eds.) Advanced Communications and Multimedia Security. ITIFIP, vol. 100, pp. 107–121. Springer, Boston, MA (2002). doi: 10.1007/978-0-387-35612-9_9 CrossRefGoogle Scholar
  9. 9.
    Minhas, U.F., Zhang, J., Tran, T., Cohen, R.: Intelligent agents in mobile vehicular ad-hoc networks: leveraging trust modeling based on direct experience with incentives for honesty. In: IEEE/WIC/ACM International Conference on Intelligent Agent Technology, IAT 2010, Toronto, Canada, 31 August–September, pp. 243–247 (2010)Google Scholar
  10. 10.
    Nitti, M., Girau, R., Atzori, L.: Trustworthiness management in the social internet of things. IEEE Trans. Knowl. Data Eng. 26(5), 1253–1266 (2014)CrossRefGoogle Scholar
  11. 11.
    Nitti, M., Girau, R., Floris, A., Atzori, L.: On adding the social dimension to the internet of vehicles: friendship and middleware. In: IEEE International Black Sea Conference on Communications and NETWORKING, pp. 134–138 (2014)Google Scholar
  12. 12.
    Patwardhan, A., Joshi, A., Finin, T., Yesha, Y.: A data intensive reputation management scheme for vehicular ad hoc networks. In: Annual International Conference on Mobile and Ubiquitous Systems, pp. 1–8 (2006)Google Scholar
  13. 13.
    Tomandl, A., Herrmann, D., Fuchs, K.P., Federrath, H.: VANETsim: an open source simulator for security and privacy concepts in VANETs. In: International Conference on High PERFORMANCE Computing and Simulation, pp. 543–550 (2014)Google Scholar
  14. 14.
    Zhang, J.: A survey on trust management for VANETs. In: 2011 IEEE International Conference on Advanced Information Networking and Applications (AINA), pp. 105–112. IEEE (2011)Google Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  • Fangyu Gai
    • 1
  • Jiexin Zhang
    • 1
  • Peidong Zhu
    • 1
    Email author
  • Xinwen Jiang
    • 1
  1. 1.School of ComputerNational University of Defense TechnologyChangshaChina

Personalised recommendations