Title :
Trust model with delayed verification for message relay in VANETs
Author :
Abdelaziz, Kerrache Chaker ; Lagraa, Nasreddine ; Lakas, Abderrahmane
Author_Institution :
Lab. d´Inf. et de Math., Univ. of Laghouat, Laghouat, Algeria
Abstract :
Trust management is one of the major issues for secure communication in vehicular network. Most of the existing trust models are identity-based and use excessive periodic exchange between vehicles to build a decision about trustiness of participating vehicles. Malicious data can be minimized in such models using identities reputation. In general, the nature and the quality of the data are not taken into account, despite some models which may revoke messages based on their nature and their type. In this work, we propose a new trust model for VANETs, which based on the early detection of attacks by relying on the opinion of the last forwarder and delayed verification of the exchanged messages. In our scheme, we developed an intrusion detection module which perform such operation and evaluate the trustiness of received messages. We introduce a new concept of companion vehicles which is used to filter out and select the most trusted nodes among neighboring vehicles, to be used as relays in the forwarding procedure. The deployment of this mechanism allow us to prevent vehicles identified as probable dishonest nodes from participating in the network. In this study, we simulation results show the effectiveness of our trust model in detecting dishonest nodes as well as malicious messages that are sent by honest or dishonest nodes, after a very low number of messages exchange. We also show that in the worst case scenario, our trust model offers equally good results.
Keywords :
message authentication; trusted computing; vehicular ad hoc networks; VANET; companion vehicles; delayed verification; exchanged messages; identities reputation; intrusion detection module; malicious data; malicious messages; participating vehicles; probable dishonest nodes; secure communication; trust management; trust model; trusted nodes; trustiness; vehicular network; Data models; Intrusion detection; Measurement; Peer-to-peer computing; Relays; Vehicles; Vehicular ad hoc networks; Intrusions Detection; Trust Management; Vehicular Ad-hoc Networks;
Conference_Titel :
Wireless Communications and Mobile Computing Conference (IWCMC), 2014 International
Conference_Location :
Nicosia
Print_ISBN :
978-1-4799-7324-8
DOI :
10.1109/IWCMC.2014.6906441