CFP last date
22 April 2024
Reseach Article

A Trust Management Scheme for Securing Transport Networks

by E. Harika, Ch. Satyananda Reddy
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 180 - Number 8
Year of Publication: 2017
Authors: E. Harika, Ch. Satyananda Reddy
10.5120/ijca2017916070

E. Harika, Ch. Satyananda Reddy . A Trust Management Scheme for Securing Transport Networks. International Journal of Computer Applications. 180, 8 ( Dec 2017), 38-42. DOI=10.5120/ijca2017916070

@article{ 10.5120/ijca2017916070,
author = { E. Harika, Ch. Satyananda Reddy },
title = { A Trust Management Scheme for Securing Transport Networks },
journal = { International Journal of Computer Applications },
issue_date = { Dec 2017 },
volume = { 180 },
number = { 8 },
month = { Dec },
year = { 2017 },
issn = { 0975-8887 },
pages = { 38-42 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume180/number8/28824-2017916070/ },
doi = { 10.5120/ijca2017916070 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:00:08.070127+05:30
%A E. Harika
%A Ch. Satyananda Reddy
%T A Trust Management Scheme for Securing Transport Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 180
%N 8
%P 38-42
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

VANET (Vehicular Adhoc Network) a wireless communication network between the vehicles without the need for any network administrator and network infrastructure. Wherein the recent years exchanging information, security and privacy are the most important concerns. To increase the efficiency of road transportation, automobile manufacturers integrated wireless networking into vehicles called VANETS. Vehicular information provided by the different vehicular nodes in the wireless network should be trustworthy all the times. Due to the different attacks possible in the VANET, some nodes may possibly act as malicious. These malicious nodes are handled on the way towards secure and reliable data. In this paper Fuzzy logic trust model is proposed to deal with uncertainties, unreliable, inaccurate and imprecise information collected by vehicles in the VANET. It conducts a series of security checks to make sure of the correctness of information from the authorized vehicles.

References
  1. R. G. Engoulou, M. Bellache, S. Pierre, and A. Quintero, “VANET security surveys,” Comput. Commun., vol. 44, pp. 1–13, May 2014..
  2. M. Kakkasageri and S. Manvi, “Information management in vehicular ad hoc networks: A review,” J. Netw. Comput. Appl., vol. 39, pp. 334–350,Mar. 2014.
  3. B. T. Sharef, R. A. Alsaqour, and M. Ismail, “Vehicular communication ad hoc routing protocols: A survey,” J. Netw. Comput. Appl., vol. 40,pp. 363–396, Apr. 2014.
  4. S. Al-Sultan, M. M. Al-Doori, A. H. Al-Bayatti, and H. Zedan, “A comprehensive survey on vehicular ad hoc network,” J. Netw. Comput. Appl.,vol. 37, pp. 380–392, Jan. 2014.
  5. M. Raya and J.-P. Hubaux, “Securing vehicular ad hoc networks,”J. Comput. Security, vol. 15, no. 1, pp. 39–68, Jan. 2007.Brown, L. D., Hua, H., and Gao, C. 2003. A widget framework for augmented interaction in SCAPE.
  6. Y. Lin and H. Song, “DynaCHINA: Real-time traffic estimation and prediction,”IEEE PervasiveComput., vol. 5, no. 4, pp. 65–65, Oct.–Dec. 2006..
  7. J. R. Douceur, “The sybil attack,” in International Workshop on Peerto-Peer Systems, ser. Lecture Notes in Computer Science, P. Druschel,F. Kaashoek, and A. Rowstron, vol. 2429. Berlin, Germany: Springer-
  8. Y.-C. Hu, A. Perrig, and D. B. Johnson, “Ariadne: A secure on-demandrouting protocol for ad hoc networks,” in Proc. 8th Annu. Int. Conf.MobiCom Netw., Atlanta, GA, USA, 2002, pp. 12–23.
  9. S. Buchegger and J.-Y. Le Boudee, “Self-policing mobile ad hoc networks by reputation systems,” IEEE Commun. Mag., vol. 43, no. 7, pp. 101–107,Jul. 2005
  10. P.-W. Yau and C. J. Mitchell, “Security vulnerabilities in ad hoc networks,” in Proc. 7th Int. Symp. Commun. Theory Appl., 2003,pp. 99–104.
  11. M. N. Mejri, J. Ben-Othman, and M. Hamdi, “Survey on VANET security challenges and possible cryptographic solutions,” Veh. Commun., vol. 1,no. 2, pp. 53–66, Apr. 2014.
  12. J. Molina-Gil, P. Caballero-Gil, and C. Caballero-Gil, “Aggregation and probabilistic verification for data authentication in VANETs,” Inf. Sci.,vol. 262, pp. 172–189,Mar.2014.25822589,ISSN00313203,10.1016/j.patcog.2010.01.008.
  13. Y. Lin and H. Song, “DynaCHINA: Real-time traffic estimation and prediction,”IEEE PervasiveComput., vol. 5, no. 4, pp. 65–65, Oct.–Dec. 2006..
  14. B. T. Sharef, R. A. Alsaqour, and M. Ismail, “Vehicular communicationad hoc routing protocols: A survey,” J. Netw. Comput. Appl., vol. 40,pp. 363–396, Apr. 2014.
  15. S. Al-Sultan, M. M. Al-Doori, A. H. Al-Bayatti, and H. Zedan, “A comprehensive survey on vehicular ad hoc network,” J. Netw. Comput. Appl.,vol. 37, pp. 380–392, Jan. 2014.
  16. M. Raya and J.-P. Hubaux, “Securing vehicular ad hoc networks,”J. Comput. Security, vol. 15, no. 1, pp. 39–68, Jan. 2007.Brown, L. D., Hua, H., and Gao, C. 2003. A widget framework for augmented interaction in SCAPE.
  17. Y. Zhang and W. Lee, “Intrusion detection in wireless ad-hoc networks,”in Proc. ACM 6th Annu. Int. Conf. MobiCom Netw., Boston, MA, USA,2000, pp. 275–283.
Index Terms

Computer Science
Information Sciences

Keywords

VANET (vehicular Adhoc Network) RSU (Road Side Units) IDS (Intrusion Detection System) security privacy ART (Attack Resistant Trust Management) fuzzy decision making logic.