Trust Establishment Techniques in VANET

  • Jyoti Grover
  • Manoj Singh Gaur
  • Vijay Laxmi
Part of the Signals and Communication Technology book series (SCT)

Abstract

Establishment of trust is amongst the most critical aspects of any system’s security. For any network, trust refers to a set of relationships amongst the entities participating in the network operations. Trust establishment plays a key role in prevention of attacks in VANET. The nodes involved in defense of the network against such attacks must establish mutual trust for the network to operate smoothly. It is a major challenge as a receiving node needs to ensure authenticity and trust-ability of the received messages before reacting to them. It is assumed that each node in a VANET is equipped with a trust system to take such decisions. There are two options for trust establishment (1) Based on static infrastructure, (2) Dynamic establishment of trust in a self organized manner. Trust based on static infrastructure is more efficient and robust than dynamic infrastructure. The only concern using static infrastructure is the unavailability of fixed infrastructure in some locations. The main objective of this paper is to describe various trust establishment approaches for VANET. If all the nodes establish trust with other nodes in VANET, probability of occurrence of attacks can be drastically reduced.

Keywords

VANET Trust PKI OBU RSU 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Abdul-Rahman, A.: The PGP trust model. In: EDI-Forum (April 1997)Google Scholar
  2. 2.
    Aijazand, A., Bochow, B., Doetzer, F., Festag, A., Gerlach, M., Kroh, R., Leinmller, T.: Attacks on intervehicle communication systems - an analysis. WIT (2006)Google Scholar
  3. 3.
    Balakrishnan, V., Varadharajan, V., Tupakula, U., Lues, P.: Team: Trust enhanced security architecture for mobile ad-hoc networks. In: 15th IEEE International Conference on Networks ICON 2007, pp. 182–187 (November 2007)Google Scholar
  4. 4.
    Buchegger, S., Boudec, L., Jean-Yves: Performance analysis of the confidant protocol. In: MobiHoc 2002: Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking & Computing, pp. 226–236. ACM, New York (2002)Google Scholar
  5. 5.
    Davis, C.: A localized trust management scheme for ad hoc networks, pp. 671–675 (2004)Google Scholar
  6. 6.
    Eschenauer, L., Baras, J.S., Gligor, V.: Distributed trust establishment inmanets’ swarm intelligence. In: Collaborative Technology Alliances (CTA) Communications Networks (CN) Alliance-2003 Annual Symposium, pp. 125–129 (May 2003)Google Scholar
  7. 7.
    Eschenauer, L., Gligor, V.D., Baras, J.S.: On Trust Establishment in Mobile Ad-Hoc Networks. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2002. LNCS, vol. 2845, pp. 47–66. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  8. 8.
    Theodorakopoulos, G., Baras, J.S.: On trust models and trust evaluation metrics for ad hoc networks. IEEE Journal on Selected Areas in Communications 24(2), 318–328 (2006)CrossRefGoogle Scholar
  9. 9.
    Hong, X., Huang, D., Gerla, M., Cao, Z.: SAT: situation-aware trust architecture for vehicular networks. In: MobiArch 2008: Proceedings of the 3rd International Workshop on Mobility in the Evolving Internet Architecture, pp. 31–36. ACM, New York (2008)Google Scholar
  10. 10.
    Sen, J., Chowdhury, P.R., Sengupta, I.: A distributed trust establishment scheme for mobile ad hoc networks. In: International Conference Computing: Theory and Applications, ICCTA 2007, pp. 51–58 (March 2007)Google Scholar
  11. 11.
    Serna, J., Luna, J., Medina, M.: Geolocation-based trust for vanet’s privacy. In: Fourth International Conference on Information Assurance and Security, ISIAS 2008, pp. 287–290 (2008)Google Scholar
  12. 12.
    Khalili, A., Katz, J., Arbaugh, W.A.: Toward secure key distribution in truly ad-hoc networks. In: SAINT-W 2003: Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT 2003 Workshops), p. 342. IEEE Computer Society, Washington, DC (2003)Google Scholar
  13. 13.
    Li, W., Joshi, A.: Outlier detection in ad hoc networks using dempster-shafer theory. IEEE International Conference on Mobile Data Management, 112–121 (2009)Google Scholar
  14. 14.
    Gligor, V.D., Raya, M., Papadimitratos, P., Hubaux, J.-P.: On data-centric trust establishment in ephemeral ad hoc networks (2007)Google Scholar
  15. 15.
    Martucci, L.A., Kohlweiss, M., Anderssonand, C., Panchenko, A.: Selfcertified sybil-free pseudonyms. In: WiSec 2008: Proceedings of the First ACM Conference on Wireless Network Security, pp. 154–159. ACM, New York (2008)Google Scholar
  16. 16.
    Papageorgiou, C., Birkos, K., Dagiuklas, T., Kotsopoulos, S.: Dynamic trust establishment in emergency ad hoc networks. In: IWCMC 2009: Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing, pp. 26–30. ACM, New York (2009)Google Scholar
  17. 17.
    Pirzada, A.A., McDonald, C.: Establishing trust in pure ad-hoc networks. In: ACSC 2004: Proceedings of the 27th Australasian Conference on Computer Science, pp. 47–54. Australian Computer Society, Inc., Darlinghurst (2004)Google Scholar
  18. 18.
    Raya, M., Hubaux, J.-P.: Securing vehicular ad hoc networks. J. Comput. Secur. 15(1), 39–68 (2007)Google Scholar
  19. 19.
    Ren, K., Li, T., Wan, Z., Bao, F., Deng, R.H., Kim, K.: Highly reliable trust establishment scheme in ad hoc networks. Comput. Netw. 45(6), 687–699 (2004)Google Scholar
  20. 20.
    Ren, Y., Boukerche, A.: Modeling and managing the trust for wireless and mobile ad hoc networks. In: IEEE International Conference on Communications, ICC 2008, pp. 2129–2133 (May 2008)Google Scholar
  21. 21.
    Repantis, Thomas, Kalogeraki, Vana: Decentralized trust management for ad-hoc peer-to-peer networks. In: MPAC 2006: Proceedings of the 4th International Workshop on Middleware for Pervasive and Ad-Hoc Computing (MPAC 2006), p. 6. ACM, New York (2006)CrossRefGoogle Scholar
  22. 22.
    Samian, N., Maarof, M.A., Razak, S.A.: Towards identifying features of trust in mobile ad hoc network. In: AMS 2008: Proceedings of the 2008 Second Asia International Conference on Modelling & Simulation (AMS), pp. 271–276. IEEE Computer Society, Washington, DC (2008)Google Scholar
  23. 23.
    Schmidt, R.K., Leinmller, T., Schoch, E., Held, A., Schfer, G.: Vehicle behavior analysis to enhance security in vanets. In: Fourth Workshop on Vehicle to Vehicle Communications, V2VCOM 2008 (June 2008)Google Scholar
  24. 24.
    Sun, X., Lin, X., Ho, P.-H.: Secure vehicular communications based on group signature and id-based signature scheme. In: IEEE International Conference on Communications ICC 2007, pp. 1539–1545 (June 2007)Google Scholar
  25. 25.
    Theodorakopoulos, G., Baras, J.S.: Trust evaluation in ad-hoc networks. In: WiSe 2004: Proceedings of the 3rd ACM Workshop on Wireless Security, pp. 1–10. ACM, New York (2004)CrossRefGoogle Scholar
  26. 26.
    Tsetsos, V., Marias, G.F., Paskalis, S.: Trust Management Issues for Ad Hoc and Self-organized Networks. In: Stavrakakis, I., Smirnov, M. (eds.) WAC 2005. LNCS, vol. 3854, pp. 153–164. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  27. 27.
    Wex, P., Breuerand, J., Held, A., Leinmullerand, T., Delgrossi, L.: Trust issues for vehicular ad hoc networks. In: Vehicular Technology Conference, VTC Spring 2008, pp. 2800–2804. IEEE (May 2008)Google Scholar
  28. 28.
    Virtanen, T., Yan, Z., Zhang, P.: Trust evaluation based security solution in ad hoc networks. In: Proceedings of the Seventh Nordic Workshop on Security IT Systems (2003)Google Scholar
  29. 29.
    Zouridaki, C., Mark, B.L., Hejmo, M., Thomas, R.K.: Robust cooperative trust establishment for manets. In: SASN 2006: Proceedings of the Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 23–34. ACM, New York (2006)CrossRefGoogle Scholar
  30. 30.
    Chen, C., Zhang, J., Cohen, R., Ho, P.-H.: A Trust Modeling Framework for Message Propagation and Evaluation in VANETs. In: Proceedings of 2nd International Conference on Information Technology Convergence and Services (ITCS), pp. 1–8 (August 2010)Google Scholar
  31. 31.
    Sumra, I.A., Hasbullah, H., Ahmad, I., Bin Ab Manan, J.L.: Forming Vehicular Web of Trust in VANET. In: Proceedings of Saudi International Electronices Communications and Photonics Conference (SIECPC), pp. 1–6 (April 2011)Google Scholar
  32. 32.
    Huang, Z., Ruj, S., Cavenghi, M., Nayak, A.: Limitations of Trust Management Schemes in VANET and Countermeasures. In: Proceedings of 22nd International Symposium on Personal Indoor and Mobile Radio Communications (PIMRC), pp. 1228–1232 (September 2011)Google Scholar
  33. 33.
    Huang, Z., Ruj, S., Cavenghi, M., Stojmenovic, M., Nayak, A.: A social network approach to trust management in VANETs. Peer-to-Peer Networking and Applications Journal, 1–14 (2012)Google Scholar
  34. 34.
    Gowtham, G., Samlinson, E.: A secured trust creation in VANET environment using random password generator. In: Proceedings of International Conference on Computing, Electronics and Electrical Technologies (ICCEET), pp. 781–784 (March 2012)Google Scholar
  35. 35.
    Zhang, J.: A Survey on Trust Management for VANETs. In: Proceedings of International Conference on Advanced Information Networking and Applications (AINA), pp. 105–112 (March 2011)Google Scholar
  36. 36.
    Abumansoor, O., Boukerche, A.: Towards a Secure Trust Model for Vehicular Ad Hoc Networks Services. In: Proceedings of Global Telecommunications Conference (GLOBECOM 2011), pp. 1–5 (December 2011)Google Scholar
  37. 37.
    Zhang, J., Chen, C., Cohen, R.: A Scalable and Effective Trust based Framework for Vehicular Ad-Hoc Networks. Journal of Wireless Mobile Networks, Ubiquitous and Dependable Applications (JoWUA) 1(4), 3–15 (2010)Google Scholar
  38. 38.
    Wu, A., Ma, J., Zhang, S.: RATE: A RSU-Aided Scheme for Data-Centric Trust Establishment in VANETs. In: Proceedings of 7th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM), pp. 1–6 (September 2011)Google Scholar
  39. 39.
    Wagan, A.A., Mughal, B.M., Hasbullah, H.: VANET Security Framework for Trusted Grouping using TPM Hardware. In: Proceedings of Second International Conference on Communication Software and Networks, pp. 309–312 (February 2010)Google Scholar
  40. 40.
    Minhas, U.F., Zhang, J., Tran, T., Cohen, R.: Towards expanded trust management for agents in vehicular ad-hoc networks. International Journal of Computational Intelligence Theory and Practice (IJCITP) 5(1) (2010)Google Scholar
  41. 41.
    Minhas, U.F., Zhang, J., Tran, T., Cohen, R.: Intelligent Agents in mobile vehicular ad-hoc networks: Leveraging trust modeling based on direct experience with incentives for honesty. In: Proceedings of the IEEE/WIC/ACM International Conference on Intelligent Agent Technology, IAT (2010)Google Scholar
  42. 42.
    Gerlach, M.: Trust for Vehicular Applications. In: Proceedings of the International Symposium on Autonomous Decentralized Systems (2007)Google Scholar
  43. 43.
    Golle, P., Greenen, D., Staddon, J.: Detecting and Correcting Malicious Data in VANETs. In: Proceedings of VANET (2004)Google Scholar
  44. 44.
    Guette, G., Heen, O.: A TPM-based architecture for improved security and anonymity in vehicular ad hoc networks. In: Vehicular Networking Conference (VNC), pp. 1–7 (2009)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Jyoti Grover
    • 1
  • Manoj Singh Gaur
    • 1
  • Vijay Laxmi
    • 1
  1. 1.Malaviya National Institute of TechnologyJaipurIndia

Personalised recommendations