scholarly journals Trust on the Ratee: A Trust Management System for Social Internet of Vehicles

2017 ◽  
Vol 2017 ◽  
pp. 1-11 ◽  
Author(s):  
Fangyu Gai ◽  
Jiexin Zhang ◽  
Peidong Zhu ◽  
Xinwen Jiang

The integration of social networking concepts with Internet of Vehicles (IoV) has led to the novel paradigm “Social Internet of Vehicles (SIoV),” which enables vehicles to establish social relationships autonomously to improve traffic conditions and service discovery. There is a growing requirement for effective trust management in the SIoV, considering the critical consequences of acting on misleading information spread by malicious nodes. However, most existing trust models are rater-based, where the reputation information of each node is stored in other nodes it has interacted with. This is not suitable for vehicular environment due to the ephemeral nature of the network. To fill this gap, we propose a Ratee-based Trust Management (RTM) system, where each node stores its own reputation information rated by others during past transactions, and a credible CA server is introduced to ensure the integrality and the undeniability of the trust information. RTM is built based on the concept of SIoV, so that the relationships established between nodes can be used to increase the accuracy of the trustworthiness. Experimental results demonstrate that our scheme achieves faster information propagation and higher transaction success rate than the rater-based method, and the time cost when calculating trustworthiness can meet the demand of vehicular networks.

2019 ◽  
Vol 15 (1) ◽  
pp. 155014771982582 ◽  
Author(s):  
Razi Iqbal ◽  
Talal Ashraf Butt ◽  
Muhammad Afzaal ◽  
Khaled Salah

The Internet of things is the next stage in the evolution of the Internet that is being materialized with the integration of billions of smart objects. The state-of-the-art communication technologies have enabled the previously isolated devices to become an active part of the Internet. This constant connectivity opens new avenues for novel applications such as the realization of social Internet of things and its subdomain the social Internet of vehicles. Socializing requires sharing of information that entails trust, especially in an open and broad social environment. This article highlights the key factors involved in conceptualizing an efficient trust model for social Internet of vehicles. Furthermore, it focuses on the unique challenges involved in designing the trust models for social Internet of vehicles. Several trust models exist in literature; however, most of the existing trust models are specific to their domains, for example, Internet of things, social Internet of things, or general vehicular networks. This article presents a brief review of the trust models that have the potential to be implemented in Social Internet of vehicles. Finally, the authors present an overview of how trending concepts and emerging technologies like blockchain and fog computing can assist in developing a trust-based social Internet of vehicles model for high-efficiency, decentralized architecture and dynamic nature of vehicular networks.


2021 ◽  
Vol 2021 ◽  
pp. 1-16
Author(s):  
Ming Mao ◽  
Peng Yi ◽  
Tao Hu ◽  
Zhen Zhang ◽  
Xiangyu Lu ◽  
...  

One of the principal missions of security in the Internet of Vehicles (IoV) is to establish credible social relationships. The trust management system has been proved to be an effective security solution in a connected vehicle environment. The use of trust management can play a significant role in achieving reliable data collection and dissemination and enhanced user security in the Internet of Vehicles. However, due to a large number of vehicles, the limited computing power of individuals, and the highly dynamic nature of the network, a universal and flexible architecture is required to realize the trust of vehicles in a dynamic environment. The existing solutions for trust management cannot be directly applied to the Internet of Vehicles. To ensure the safe transmission of data between vehicles and overcome the problems of high communication delay and low recognition rate of malicious nodes in the current trust management scheme, an efficient flow forwarding mechanism of the RSU close to the controller in the Software-Defined Vehicular Network is used to establish a hierarchical hybrid trust management architecture. This method evaluates the dynamic trust change of vehicle behavior based on the trust between vehicles and the auxiliary trust management of the infrastructure to the vehicle, combined with static and dynamic information and other indicators. The proposed trust management scheme is superior to the comparative schemes in resisting simple attacks, selective misbehavior attacks, and time-dependent attacks under the condition of ensuring superior real-time performance. Its overall accuracy is higher than that of the baseline scheme.


2013 ◽  
Vol 373-375 ◽  
pp. 1931-1934 ◽  
Author(s):  
Yi Min Zhou ◽  
La Yuan Li

The Wireless Sensor Network applications has widely been used over the last few years. WSN is a novel self-organization wireless network which is made up of randomly distributed sensor Nodes. Due to some resource constraints, the design of security in WSN encounters a great many of new challenges. It is vulnerable to attack, which is harmful for availability of WSN. In this paper we propose a trust-aware and location-based secure routing protocol which protects WSN against routing attacks, and also supports large-scale WSN deployments. The proposed protocol is extended from GPSR protocol, which imports security mechanism that depends on a distributed trust management system. The solution has been shown to efficiently detect and avoid malicious nodes.


2021 ◽  
Author(s):  
Cody Lewis ◽  
Nan Li ◽  
Vijay Varadharajan

Trust models play an important role in Internet of Things (IoT) as it provides a means of finding whether a given device can provide a service to a satisfactory level as well as a means for identifying potentially malicious devices in the network. Context awareness in trust models allows a trustor to filter and aggregate evidence by their relevance to the current situation. Context awareness is important in the formulation of trust in IoT networks due to their heterogeneity and due to the dynamic changes in the capabilities of IoT devices. In this paper,we have proposed a new type of context-based attack on context aware trust models for IoT systems. An adversary is able to manipulate the context and impact a target group of IoT devices, while other devices in non-targeted groups are not even aware of the attack. We have demonstrated the effectiveness of this new type of attack on six previously proposed trust models. Through practical simulations and theoretical proofs, we show that the adversaries can launch such context-based attacks against a targeted group of IoT devices in the network. The paper also proposes a new trust management system that can mitigate such context-based attacks.


Author(s):  
Farhan Ahmad ◽  
Asma Adnane ◽  
Chaker Abdelaziz Kerrache ◽  
Virginia N. L. Franqueira ◽  
Fatih Kurugollu

Vehicular ad-hoc network (VANET) and internet-of-vehicles (IoV) are complex networks which provide a unique platform for vehicles to communicate and exchange critical information (such as collision avoidance warnings) with each other in an intelligent manner. Thus, the information disseminated in the network should be authentic and originated from legitimate vehicles. Creating a trusted environment in the network can enable the vehicles to identify and revoke malicious ones. Trust is an important concept in VANET and IoV to achieve security in the network, where every vehicle equipped with an appropriate trust model can evaluate the trustworthiness of the received information and its sender. This chapter discusses trust in both VANET and IoV and identifies various trust models developed for VANET and IoV. The contribution of this chapter is threefold. First, the authors present a detailed taxonomy of trust models in VANET and IoV. Second, they provide current trends in the domain of trust management specifically for VANET and IoV, and finally, they provide various open research directions.


2021 ◽  
Vol 21 (4) ◽  
pp. 15-27
Author(s):  
Ananda Kumar Subramanian ◽  
Aritra Samanta ◽  
Sasmithaa Manickam ◽  
Abhinav Kumar ◽  
Stavros Shiaeles ◽  
...  

Abstract This paper aims at creating a new Trust Management System (TMS) for a system of nodes. Various systems already exist which only use a simple function to calculate the trust value of a node. In the age of artificial intelligence the need for learning ability in an Internet of Things (IoT) system arises. Malicious nodes are a recurring issue and there still has not been a fully effective way to detect them beforehand. In IoT systems, a malicious node is detected after a transaction has occurred with the node. To this end, this paper explores how Artificial Intelligence (AI), and specifically Linear Regression (LR), could be utilised to predict a malicious node in order to minimise the damage in the IoT ecosystem. Moreover, the paper compares Linear regression over other AI-based TMS, showing the efficiency and efficacy of the method to predict and identify a malicious node.


2019 ◽  
Vol 8 (2) ◽  
pp. 2343-2346

The present system fails to utilize the trust in the social network which is based on Peer to Peer (P2P) file sharing systems. To overcome this issue, a trust management system named “Social Link” is used to utilize the social network and predefined transaction links. The Social Link manages the novel weighted transactions and networks. The link is constructed using the historical file transaction. Two friends can share their files and increased trust can be guaranteed with the help of Social Link. The Networkof Weighted Transaction (NWT) can be calculating the successful transaction and it finds trust over the client on server. By this process, Social Link will reduce transaction misbehaving, avoids free riding and promotes nodes to transact data files to non friends. Whitewashing and collision can also be rectified using Social Links.


Sign in / Sign up

Export Citation Format

Share Document