Call for Paper - November 2022 Edition
IJCA solicits original research papers for the November 2022 Edition. Last date of manuscript submission is October 20, 2022. Read More

A Trust Management Scheme for Securing Transport Networks

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2017
Authors:
E. Harika, Ch. Satyananda Reddy
10.5120/ijca2017916070

E Harika and Ch. Satyananda Reddy. A Trust Management Scheme for Securing Transport Networks. International Journal of Computer Applications 180(8):38-42, December 2017. BibTeX

@article{10.5120/ijca2017916070,
	author = {E. Harika and Ch. Satyananda Reddy},
	title = {A Trust Management Scheme for Securing Transport Networks},
	journal = {International Journal of Computer Applications},
	issue_date = {December 2017},
	volume = {180},
	number = {8},
	month = {Dec},
	year = {2017},
	issn = {0975-8887},
	pages = {38-42},
	numpages = {5},
	url = {http://www.ijcaonline.org/archives/volume180/number8/28824-2017916070},
	doi = {10.5120/ijca2017916070},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

VANET (Vehicular Adhoc Network) a wireless communication network between the vehicles without the need for any network administrator and network infrastructure. Wherein the recent years exchanging information, security and privacy are the most important concerns. To increase the efficiency of road transportation, automobile manufacturers integrated wireless networking into vehicles called VANETS. Vehicular information provided by the different vehicular nodes in the wireless network should be trustworthy all the times. Due to the different attacks possible in the VANET, some nodes may possibly act as malicious. These malicious nodes are handled on the way towards secure and reliable data. In this paper Fuzzy logic trust model is proposed to deal with uncertainties, unreliable, inaccurate and imprecise information collected by vehicles in the VANET. It conducts a series of security checks to make sure of the correctness of information from the authorized vehicles.

References

  1. R. G. Engoulou, M. Bellache, S. Pierre, and A. Quintero, “VANET security surveys,” Comput. Commun., vol. 44, pp. 1–13, May 2014..
  2. M. Kakkasageri and S. Manvi, “Information management in vehicular ad hoc networks: A review,” J. Netw. Comput. Appl., vol. 39, pp. 334–350,Mar. 2014.
  3. B. T. Sharef, R. A. Alsaqour, and M. Ismail, “Vehicular communication ad hoc routing protocols: A survey,” J. Netw. Comput. Appl., vol. 40,pp. 363–396, Apr. 2014.
  4. S. Al-Sultan, M. M. Al-Doori, A. H. Al-Bayatti, and H. Zedan, “A comprehensive survey on vehicular ad hoc network,” J. Netw. Comput. Appl.,vol. 37, pp. 380–392, Jan. 2014.
  5. M. Raya and J.-P. Hubaux, “Securing vehicular ad hoc networks,”J. Comput. Security, vol. 15, no. 1, pp. 39–68, Jan. 2007.Brown, L. D., Hua, H., and Gao, C. 2003. A widget framework for augmented interaction in SCAPE.
  6. Y. Lin and H. Song, “DynaCHINA: Real-time traffic estimation and prediction,”IEEE PervasiveComput., vol. 5, no. 4, pp. 65–65, Oct.–Dec. 2006..
  7. J. R. Douceur, “The sybil attack,” in International Workshop on Peerto-Peer Systems, ser. Lecture Notes in Computer Science, P. Druschel,F. Kaashoek, and A. Rowstron, vol. 2429. Berlin, Germany: Springer-
  8. Y.-C. Hu, A. Perrig, and D. B. Johnson, “Ariadne: A secure on-demandrouting protocol for ad hoc networks,” in Proc. 8th Annu. Int. Conf.MobiCom Netw., Atlanta, GA, USA, 2002, pp. 12–23.
  9. S. Buchegger and J.-Y. Le Boudee, “Self-policing mobile ad hoc networks by reputation systems,” IEEE Commun. Mag., vol. 43, no. 7, pp. 101–107,Jul. 2005
  10. P.-W. Yau and C. J. Mitchell, “Security vulnerabilities in ad hoc networks,” in Proc. 7th Int. Symp. Commun. Theory Appl., 2003,pp. 99–104.
  11. M. N. Mejri, J. Ben-Othman, and M. Hamdi, “Survey on VANET security challenges and possible cryptographic solutions,” Veh. Commun., vol. 1,no. 2, pp. 53–66, Apr. 2014.
  12. J. Molina-Gil, P. Caballero-Gil, and C. Caballero-Gil, “Aggregation and probabilistic verification for data authentication in VANETs,” Inf. Sci.,vol. 262, pp. 172–189,Mar.2014.25822589,ISSN00313203,10.1016/j.patcog.2010.01.008.
  13. Y. Lin and H. Song, “DynaCHINA: Real-time traffic estimation and prediction,”IEEE PervasiveComput., vol. 5, no. 4, pp. 65–65, Oct.–Dec. 2006..
  14. B. T. Sharef, R. A. Alsaqour, and M. Ismail, “Vehicular communicationad hoc routing protocols: A survey,” J. Netw. Comput. Appl., vol. 40,pp. 363–396, Apr. 2014.
  15. S. Al-Sultan, M. M. Al-Doori, A. H. Al-Bayatti, and H. Zedan, “A comprehensive survey on vehicular ad hoc network,” J. Netw. Comput. Appl.,vol. 37, pp. 380–392, Jan. 2014.
  16. M. Raya and J.-P. Hubaux, “Securing vehicular ad hoc networks,”J. Comput. Security, vol. 15, no. 1, pp. 39–68, Jan. 2007.Brown, L. D., Hua, H., and Gao, C. 2003. A widget framework for augmented interaction in SCAPE.
  17. Y. Zhang and W. Lee, “Intrusion detection in wireless ad-hoc networks,”in Proc. ACM 6th Annu. Int. Conf. MobiCom Netw., Boston, MA, USA,2000, pp. 275–283.

Keywords

VANET (vehicular Adhoc Network), RSU (Road Side Units), IDS (Intrusion Detection System), security, privacy, ART (Attack Resistant Trust Management), fuzzy decision making logic.

Learn about the IJCA article correction policy and process
Dealing with any form of infringement.
‘Peer Review – A Critical Inquiry’ by David Shatz
Directly place requests for print/ hard copies of IJCA via Google Docs