1,720 research outputs found

    Fuzzy logic‐based trusted routing protocol using vehicular cloud networks for smart cities

    Get PDF
    Due to the characteristics of vehicular ad hoc networks, the increased mobility of nodes and the inconsistency of wireless communication connections pose significant challenges for routing. As a result, researchers find it to be a fascinating topic to study. Furthermore, since these networks are vulnerable to various assaults, providing an authentication method between the source and destination nodes is crucial. How to route in such networks more efficiently, taking into account node mobility characteristics and accompanying massive historical data, is still a matter of discussion. Fuzzy logic-based Trusted Routing Protocol for vehicular cloud networks (FTRP) is proposed in this study that determines the secure path for data dissemination. Fuzzy Logic determines the node candidacy value and selects or rejects a path accordingly. The cloud assigns a confidence score to each vehicle based on the data it collects from nodes after each interaction. Our study identifies the secure path on the basis of trust along with factors such as speed, closeness to other nodes, signal strength and distance from the neighbouring nodes. Simulations of the novel protocol demonstrate that it can keep the packet delivery ratio high with little overhead and low delay. FTRP has significant implications for deploying Vehicular Cloud Networks using electric vehicle technologies in smart cities. The routing data is collected with the help of Internet of Technology (IOT) sensors. The information is transmitted between vehicles using IOT gateways

    T-VNets: a novel Trust architecture for Vehicular Networks using the standardized messaging services of ETSI ITS

    Full text link
    In this paper we propose a novel trust establishment architecture fully compliant with the ETSI ITS standard which takes advantage of the periodically exchanged beacons (i.e. CAM) and event triggered messages (i.e. DENM). Our solution, called T-VNets, allows estimating the traffic density, the trust among entities, as well as the dishonest nodes distribution within the network. In addition, by combining different trust metrics such as direct, indirect, event-based and RSU-based trust, T-VNets is able to eliminate dishonest nodes from all network operations while selecting the best paths to deliver legal data messages by taking advantage of the link duration concept. Since our solution is able to adapt to environments with or without roadside units (RSUs), it can perform adequately both in urban and highway scenarios. Simulation results evidence that our proposal is more efficient than other existing solutions, being able to sustain performance levels even in worst-case scenarios. © 2016 Published by Elsevier B.VThis work was partially supported by both the Ministerio de Economia y Competitividad, Programa Estatal de Investigacion, Desarrollo e Innovacion Orientada a los Retos de la Sociedad, Proyectos I+D+I 2014, Spain, under Grant TEC2014-52690-R, and the Ministere de l'enseignement superieur et de la recherche scientifique, Programme National Exceptionnel P.N.E 2015/2016, Algeria.Kerrache, CA.; Lagraa, N.; Tavares De Araujo Cesariny Calafate, CM.; Cano Escribá, JC.; Manzoni, P. (2016). T-VNets: a novel Trust architecture for Vehicular Networks using the standardized messaging services of ETSI ITS. Computer Communications. 93:68-83. https://doi.org/10.1016/j.comcom.2016.05.013S68839

    Fixed Cluster Based Cluster Head Selection Algorithm in Vehicular Adhoc Network

    Get PDF
    The emergence of Vehicular Adhoc Networks (VANETs) is expected support variety of applications for driver assistance, traffic efficiency and road safety. For proper transmission of messages in VANET, one of the proposed solutions is dividing the network into clusters and then selecting a cluster head (CH) in each cluster. This can decrease the communication overhead between road side units (RSUs) and other components of VANETs, because instead of every node communicating with RSU, only CH communicates with RSU and relays relevant messages. In clustering, an important step is the selection of CH. In this thesis, we implemented vehicle to vehicle (V2V), cluster head to road side unit and road side unit to trusted authority authentication for the clustered network. We also presented a heuristic algorithm for selecting a suitable vehicle as the cluster head in a cluster. For the selection of head vehicle, we used weighted fitness values based on three parameters; trust value, position from the cluster boundary and absolute relative average speed. Simulation results indicate that the proposed approach can lead to improvements in terms of QoS metrics like delay, throughput and packet delivery ratio

    Design Models for Trusted Communications in Vehicle-to-Everything (V2X) Networks

    Get PDF
    Intelligent transportation system is one of the main systems which has been developed to achieve safe traffic and efficient transportation. It enables the road entities to establish connections with other road entities and infrastructure units using Vehicle-to-Everything (V2X) communications. To improve the driving experience, various applications are implemented to allow for road entities to share the information among each other. Then, based on the received information, the road entity can make its own decision regarding road safety and guide the driver. However, when these packets are dropped for any reason, it could lead to inaccurate decisions due to lack of enough information. Therefore, the packets should be sent through a trusted communication. The trusted communication includes a trusted link and trusted road entity. Before sending packets, the road entity should assess the link quality and choose the trusted link to ensure the packet delivery. Also, evaluating the neighboring node behavior is essential to obtain trusted communications because some misbehavior nodes may drop the received packets. As a consequence, two main models are designed to achieve trusted V2X communications. First, a multi-metric Quality of Service (QoS)-balancing relay selection algorithm is proposed to elect the trusted link. Analytic Hierarchy Process (AHP) is applied to evaluate the link based on three metrics, which are channel capacity, link stability and end-to-end delay. Second, a recommendation-based trust model is designed for V2X communication to exclude misbehavior nodes. Based on a comparison between trust-based methods, weighted-sum is chosen in the proposed model. The proposed methods ensure trusted communications by reducing the Packet Dropping Rate (PDR) and increasing the end-to-end delivery packet ratio. In addition, the proposed trust model achieves a very low False Negative Rate (FNR) in comparison with an existing model

    GSTR: Secure Multi-hop Message Dissemination in Connected Vehicles using Social Trust Model

    Full text link
    The emergence of connected vehicles paradigm has made secure communication a key concern amongst the connected vehicles. Communication between the vehicles and Road Side Units (RSUs) is critical to disseminate message among the vehicles. We focus on secure message transmission in connected vehicles using multi_hop social networks environment to deliver the message with varying trustworthiness. We proposed a Geographic Social Trust Routing (GSTR) approach; messages are propagated using multiple hops and by considering the various available users in the vehicular network. GSTR is proposed in an application perspective with an assumption that the users are socially connected. The users are selected based on trustworthiness as defined by social connectivity. The route to send a message is calculated based on the highest trust level of each node by using the nodes social network connections along the path in the network. GSTR determines the shortest route using the trusted nodes along the route for message dissemination. GSTR is made delay tolerant by introducing message storage in the cloud if a trustworthy node is unavailable to deliver the message. We compared the proposed approach with Geographic and Traffic Load based Routing (GTLR), Greedy Perimeter Stateless Routing (GPSR), Trust-based GPSR (T_GPSR). The performance results obtained show that GSTR ensures efficient resource utilization, lower packet losses at high vehicle densities

    Fuzzy Logic-based Trusted and Power-aware Routing Protocol in Mobile Ad-hoc Networks

    Get PDF
    Mobile ad-hoc networks (MANETs) have attracted much attention from researchers lately because MANETs are able to provide networks in areas with unavailable fixed network infrastructure. However, some mobile nodes may misbehave by dropping packets to conserve power usage because mobile ad-hoc networks nodes are usually battery operated. In this paper, a fuzzy logic-based routing protocol that considers the battery level of nodes, hop count, and trust among the nodes is proposed. The proposed routing protocol adaptively selects routes that use minimum hop count with the highest level of trust and a sufficient battery level to enhance the reliability of route selection while maintaining the percentage of successfully delivered packets. The result of the simulation shows that the proposed protocol can achieve a high ratio of successfully delivered packets, a lower average end-to-end delay, and a normalized routing load

    MARINE: Man-in-the-middle attack resistant trust model IN connEcted vehicles

    Get PDF
    Vehicular Ad-hoc NETwork (VANET), a novel technology holds a paramount importance within the transportation domain due to its abilities to increase traffic efficiency and safety. Connected vehicles propagate sensitive information which must be shared with the neighbors in a secure environment. However, VANET may also include dishonest nodes such as Man-in-the-Middle (MiTM) attackers aiming to distribute and share malicious content with the vehicles, thus polluting the network with compromised information. In this regard, establishing trust among connected vehicles can increase security as every participating vehicle will generate and propagate authentic, accurate and trusted content within the network. In this paper, we propose a novel trust model, namely, Man-in-the-middle Attack Resistance trust model IN connEcted vehicles (MARINE), which identifies dishonest nodes performing MiTM attacks in an efficient way as well as revokes their credentials. Every node running MARINE system first establishes trust for the sender by performing multi-dimensional plausibility checks. Once the receiver verifies the trustworthiness of the sender, the received data is then evaluated both directly and indirectly. Extensive simulations are carried out to evaluate the performance and accuracy of MARINE rigorously across three MiTM attacker models and the bench-marked trust model. Simulation results show that for a network containing 35% MiTM attackers, MARINE outperforms the state of the art trust model by 15%, 18%, and 17% improvements in precision, recall and F-score, respectively.N/A
    corecore