Skip to main content

Trust Establishment Techniques in VANET

  • Chapter
Wireless Networks and Security

Part of the book series: Signals and Communication Technology ((SCT))

Abstract

Establishment of trust is amongst the most critical aspects of any system’s security. For any network, trust refers to a set of relationships amongst the entities participating in the network operations. Trust establishment plays a key role in prevention of attacks in VANET. The nodes involved in defense of the network against such attacks must establish mutual trust for the network to operate smoothly. It is a major challenge as a receiving node needs to ensure authenticity and trust-ability of the received messages before reacting to them. It is assumed that each node in a VANET is equipped with a trust system to take such decisions. There are two options for trust establishment (1) Based on static infrastructure, (2) Dynamic establishment of trust in a self organized manner. Trust based on static infrastructure is more efficient and robust than dynamic infrastructure. The only concern using static infrastructure is the unavailability of fixed infrastructure in some locations. The main objective of this paper is to describe various trust establishment approaches for VANET. If all the nodes establish trust with other nodes in VANET, probability of occurrence of attacks can be drastically reduced.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Abdul-Rahman, A.: The PGP trust model. In: EDI-Forum (April 1997)

    Google Scholar 

  2. Aijazand, A., Bochow, B., Doetzer, F., Festag, A., Gerlach, M., Kroh, R., Leinmller, T.: Attacks on intervehicle communication systems - an analysis. WIT (2006)

    Google Scholar 

  3. Balakrishnan, V., Varadharajan, V., Tupakula, U., Lues, P.: Team: Trust enhanced security architecture for mobile ad-hoc networks. In: 15th IEEE International Conference on Networks ICON 2007, pp. 182–187 (November 2007)

    Google Scholar 

  4. Buchegger, S., Boudec, L., Jean-Yves: Performance analysis of the confidant protocol. In: MobiHoc 2002: Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking & Computing, pp. 226–236. ACM, New York (2002)

    Google Scholar 

  5. Davis, C.: A localized trust management scheme for ad hoc networks, pp. 671–675 (2004)

    Google Scholar 

  6. Eschenauer, L., Baras, J.S., Gligor, V.: Distributed trust establishment inmanets’ swarm intelligence. In: Collaborative Technology Alliances (CTA) Communications Networks (CN) Alliance-2003 Annual Symposium, pp. 125–129 (May 2003)

    Google Scholar 

  7. Eschenauer, L., Gligor, V.D., Baras, J.S.: On Trust Establishment in Mobile Ad-Hoc Networks. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2002. LNCS, vol. 2845, pp. 47–66. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  8. Theodorakopoulos, G., Baras, J.S.: On trust models and trust evaluation metrics for ad hoc networks. IEEE Journal on Selected Areas in Communications 24(2), 318–328 (2006)

    Article  Google Scholar 

  9. Hong, X., Huang, D., Gerla, M., Cao, Z.: SAT: situation-aware trust architecture for vehicular networks. In: MobiArch 2008: Proceedings of the 3rd International Workshop on Mobility in the Evolving Internet Architecture, pp. 31–36. ACM, New York (2008)

    Google Scholar 

  10. Sen, J., Chowdhury, P.R., Sengupta, I.: A distributed trust establishment scheme for mobile ad hoc networks. In: International Conference Computing: Theory and Applications, ICCTA 2007, pp. 51–58 (March 2007)

    Google Scholar 

  11. Serna, J., Luna, J., Medina, M.: Geolocation-based trust for vanet’s privacy. In: Fourth International Conference on Information Assurance and Security, ISIAS 2008, pp. 287–290 (2008)

    Google Scholar 

  12. Khalili, A., Katz, J., Arbaugh, W.A.: Toward secure key distribution in truly ad-hoc networks. In: SAINT-W 2003: Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT 2003 Workshops), p. 342. IEEE Computer Society, Washington, DC (2003)

    Google Scholar 

  13. Li, W., Joshi, A.: Outlier detection in ad hoc networks using dempster-shafer theory. IEEE International Conference on Mobile Data Management, 112–121 (2009)

    Google Scholar 

  14. Gligor, V.D., Raya, M., Papadimitratos, P., Hubaux, J.-P.: On data-centric trust establishment in ephemeral ad hoc networks (2007)

    Google Scholar 

  15. Martucci, L.A., Kohlweiss, M., Anderssonand, C., Panchenko, A.: Selfcertified sybil-free pseudonyms. In: WiSec 2008: Proceedings of the First ACM Conference on Wireless Network Security, pp. 154–159. ACM, New York (2008)

    Google Scholar 

  16. Papageorgiou, C., Birkos, K., Dagiuklas, T., Kotsopoulos, S.: Dynamic trust establishment in emergency ad hoc networks. In: IWCMC 2009: Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing, pp. 26–30. ACM, New York (2009)

    Google Scholar 

  17. Pirzada, A.A., McDonald, C.: Establishing trust in pure ad-hoc networks. In: ACSC 2004: Proceedings of the 27th Australasian Conference on Computer Science, pp. 47–54. Australian Computer Society, Inc., Darlinghurst (2004)

    Google Scholar 

  18. Raya, M., Hubaux, J.-P.: Securing vehicular ad hoc networks. J. Comput. Secur. 15(1), 39–68 (2007)

    Google Scholar 

  19. Ren, K., Li, T., Wan, Z., Bao, F., Deng, R.H., Kim, K.: Highly reliable trust establishment scheme in ad hoc networks. Comput. Netw. 45(6), 687–699 (2004)

    Google Scholar 

  20. Ren, Y., Boukerche, A.: Modeling and managing the trust for wireless and mobile ad hoc networks. In: IEEE International Conference on Communications, ICC 2008, pp. 2129–2133 (May 2008)

    Google Scholar 

  21. Repantis, Thomas, Kalogeraki, Vana: Decentralized trust management for ad-hoc peer-to-peer networks. In: MPAC 2006: Proceedings of the 4th International Workshop on Middleware for Pervasive and Ad-Hoc Computing (MPAC 2006), p. 6. ACM, New York (2006)

    Chapter  Google Scholar 

  22. Samian, N., Maarof, M.A., Razak, S.A.: Towards identifying features of trust in mobile ad hoc network. In: AMS 2008: Proceedings of the 2008 Second Asia International Conference on Modelling & Simulation (AMS), pp. 271–276. IEEE Computer Society, Washington, DC (2008)

    Google Scholar 

  23. Schmidt, R.K., Leinmller, T., Schoch, E., Held, A., Schfer, G.: Vehicle behavior analysis to enhance security in vanets. In: Fourth Workshop on Vehicle to Vehicle Communications, V2VCOM 2008 (June 2008)

    Google Scholar 

  24. Sun, X., Lin, X., Ho, P.-H.: Secure vehicular communications based on group signature and id-based signature scheme. In: IEEE International Conference on Communications ICC 2007, pp. 1539–1545 (June 2007)

    Google Scholar 

  25. Theodorakopoulos, G., Baras, J.S.: Trust evaluation in ad-hoc networks. In: WiSe 2004: Proceedings of the 3rd ACM Workshop on Wireless Security, pp. 1–10. ACM, New York (2004)

    Chapter  Google Scholar 

  26. Tsetsos, V., Marias, G.F., Paskalis, S.: Trust Management Issues for Ad Hoc and Self-organized Networks. In: Stavrakakis, I., Smirnov, M. (eds.) WAC 2005. LNCS, vol. 3854, pp. 153–164. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  27. Wex, P., Breuerand, J., Held, A., Leinmullerand, T., Delgrossi, L.: Trust issues for vehicular ad hoc networks. In: Vehicular Technology Conference, VTC Spring 2008, pp. 2800–2804. IEEE (May 2008)

    Google Scholar 

  28. Virtanen, T., Yan, Z., Zhang, P.: Trust evaluation based security solution in ad hoc networks. In: Proceedings of the Seventh Nordic Workshop on Security IT Systems (2003)

    Google Scholar 

  29. Zouridaki, C., Mark, B.L., Hejmo, M., Thomas, R.K.: Robust cooperative trust establishment for manets. In: SASN 2006: Proceedings of the Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 23–34. ACM, New York (2006)

    Chapter  Google Scholar 

  30. Chen, C., Zhang, J., Cohen, R., Ho, P.-H.: A Trust Modeling Framework for Message Propagation and Evaluation in VANETs. In: Proceedings of 2nd International Conference on Information Technology Convergence and Services (ITCS), pp. 1–8 (August 2010)

    Google Scholar 

  31. Sumra, I.A., Hasbullah, H., Ahmad, I., Bin Ab Manan, J.L.: Forming Vehicular Web of Trust in VANET. In: Proceedings of Saudi International Electronices Communications and Photonics Conference (SIECPC), pp. 1–6 (April 2011)

    Google Scholar 

  32. Huang, Z., Ruj, S., Cavenghi, M., Nayak, A.: Limitations of Trust Management Schemes in VANET and Countermeasures. In: Proceedings of 22nd International Symposium on Personal Indoor and Mobile Radio Communications (PIMRC), pp. 1228–1232 (September 2011)

    Google Scholar 

  33. Huang, Z., Ruj, S., Cavenghi, M., Stojmenovic, M., Nayak, A.: A social network approach to trust management in VANETs. Peer-to-Peer Networking and Applications Journal, 1–14 (2012)

    Google Scholar 

  34. Gowtham, G., Samlinson, E.: A secured trust creation in VANET environment using random password generator. In: Proceedings of International Conference on Computing, Electronics and Electrical Technologies (ICCEET), pp. 781–784 (March 2012)

    Google Scholar 

  35. Zhang, J.: A Survey on Trust Management for VANETs. In: Proceedings of International Conference on Advanced Information Networking and Applications (AINA), pp. 105–112 (March 2011)

    Google Scholar 

  36. Abumansoor, O., Boukerche, A.: Towards a Secure Trust Model for Vehicular Ad Hoc Networks Services. In: Proceedings of Global Telecommunications Conference (GLOBECOM 2011), pp. 1–5 (December 2011)

    Google Scholar 

  37. Zhang, J., Chen, C., Cohen, R.: A Scalable and Effective Trust based Framework for Vehicular Ad-Hoc Networks. Journal of Wireless Mobile Networks, Ubiquitous and Dependable Applications (JoWUA) 1(4), 3–15 (2010)

    Google Scholar 

  38. Wu, A., Ma, J., Zhang, S.: RATE: A RSU-Aided Scheme for Data-Centric Trust Establishment in VANETs. In: Proceedings of 7th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM), pp. 1–6 (September 2011)

    Google Scholar 

  39. Wagan, A.A., Mughal, B.M., Hasbullah, H.: VANET Security Framework for Trusted Grouping using TPM Hardware. In: Proceedings of Second International Conference on Communication Software and Networks, pp. 309–312 (February 2010)

    Google Scholar 

  40. Minhas, U.F., Zhang, J., Tran, T., Cohen, R.: Towards expanded trust management for agents in vehicular ad-hoc networks. International Journal of Computational Intelligence Theory and Practice (IJCITP) 5(1) (2010)

    Google Scholar 

  41. Minhas, U.F., Zhang, J., Tran, T., Cohen, R.: Intelligent Agents in mobile vehicular ad-hoc networks: Leveraging trust modeling based on direct experience with incentives for honesty. In: Proceedings of the IEEE/WIC/ACM International Conference on Intelligent Agent Technology, IAT (2010)

    Google Scholar 

  42. Gerlach, M.: Trust for Vehicular Applications. In: Proceedings of the International Symposium on Autonomous Decentralized Systems (2007)

    Google Scholar 

  43. Golle, P., Greenen, D., Staddon, J.: Detecting and Correcting Malicious Data in VANETs. In: Proceedings of VANET (2004)

    Google Scholar 

  44. Guette, G., Heen, O.: A TPM-based architecture for improved security and anonymity in vehicular ad hoc networks. In: Vehicular Networking Conference (VNC), pp. 1–7 (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Grover, J., Gaur, M.S., Laxmi, V. (2013). Trust Establishment Techniques in VANET. In: Khan, S., Khan Pathan, AS. (eds) Wireless Networks and Security. Signals and Communication Technology. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36169-2_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-36169-2_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-36168-5

  • Online ISBN: 978-3-642-36169-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics