TY - GEN
T1 - Information-oriented trustworthiness evaluation in vehicular ad-hoc networks
AU - Gurung, Sashi
AU - Lin, Dan
AU - Squicciarini, Anna
AU - Bertino, Elisa
PY - 2013
Y1 - 2013
N2 - In Vehicular Ad-Hoc Networks (VANETs), applications are typically realized by forwarding and exchanging messages among vehicles. The integrity and trustworthiness of messages directly impacts the quality of the applications. Though there have been extensive works on authentication protocols in VANETs, authentication can only certify message origin but cannot guarantee that the identity holders will send truthful and accurate messages. Therefore, in this paper, we propose a novel trust model to directly evaluate the trustworthiness of the content of a message received from other vehicles. The model is built based on various factors such as content similarity, content conflict and route similarity. Trustworthiness of message content will be evaluated at the individual vehicle level and will not introduce any additional architectural assumptions. We have conducted extensive experiments and the results indicate both efficiency and effectiveness of the proposed approach.
AB - In Vehicular Ad-Hoc Networks (VANETs), applications are typically realized by forwarding and exchanging messages among vehicles. The integrity and trustworthiness of messages directly impacts the quality of the applications. Though there have been extensive works on authentication protocols in VANETs, authentication can only certify message origin but cannot guarantee that the identity holders will send truthful and accurate messages. Therefore, in this paper, we propose a novel trust model to directly evaluate the trustworthiness of the content of a message received from other vehicles. The model is built based on various factors such as content similarity, content conflict and route similarity. Trustworthiness of message content will be evaluated at the individual vehicle level and will not introduce any additional architectural assumptions. We have conducted extensive experiments and the results indicate both efficiency and effectiveness of the proposed approach.
UR - http://www.scopus.com/inward/record.url?scp=84883345252&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84883345252&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-38631-2_8
DO - 10.1007/978-3-642-38631-2_8
M3 - Conference contribution
AN - SCOPUS:84883345252
SN - 9783642386305
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 94
EP - 108
BT - Network and System Security - 7th International Conference, NSS 2013, Proceedings
T2 - 7th International Conference on Network and System Security, NSS 2013
Y2 - 3 June 2013 through 4 June 2013
ER -