View Article

Article Details

File Missing!
JournalInternational Journal of Computer Applications
TitleA Trust Management Scheme for Securing Transport Networks
Index TermSecurity
AbstractVANET (Vehicular Adhoc Network) a wireless communication network between the vehicles without the need for any network administrator and network infrastructure. Wherein the recent years exchanging information, security and privacy are the most important concerns. To increase the efficiency of road transportation, automobile manufacturers integrated wireless networking into vehicles called VANETS. Vehicular information provided by the different vehicular nodes in the wireless network should be trustworthy all the times. Due to the different attacks possible in the VANET, some nodes may possibly act as malicious. These malicious nodes are handled on the way towards secure and reliable data. In this paper Fuzzy logic trust model is proposed to deal with uncertainties, unreliable, inaccurate and imprecise information collected by vehicles in the VANET. It conducts a series of security checks to make sure of the correctness of information from the authorized vehicles.
KeywordsVANET (vehicular Adhoc Network), RSU (Road Side Units), IDS (Intrusion Detection System), security, privacy, ART (Attack Resistant Trust Management), fuzzy decision making logic.
No. of Pages5
Author NamesE. Harika, Ch. Satyananda Reddy
Author Emailsemanharika@gmail.com, sathyanandau@yahoo.com
References
  1. R. G. Engoulou, M. Bellache, S. Pierre, and A. Quintero, “VANET security surveys,” Comput. Commun., vol. 44, pp. 1–13, May 2014..
  2. M. Kakkasageri and S. Manvi, “Information management in vehicular ad hoc networks: A review,” J. Netw. Comput. Appl., vol. 39, pp. 334–350,Mar. 2014.
  3. B. T. Sharef, R. A. Alsaqour, and M. Ismail, “Vehicular communication ad hoc routing protocols: A survey,” J. Netw. Comput. Appl., vol. 40,pp. 363–396, Apr. 2014.
  4. S. Al-Sultan, M. M. Al-Doori, A. H. Al-Bayatti, and H. Zedan, “A comprehensive survey on vehicular ad hoc network,” J. Netw. Comput. Appl.,vol. 37, pp. 380–392, Jan. 2014.
  5. M. Raya and J.-P. Hubaux, “Securing vehicular ad hoc networks,”J. Comput. Security, vol. 15, no. 1, pp. 39–68, Jan. 2007.Brown, L. D., Hua, H., and Gao, C. 2003. A widget framework for augmented interaction in SCAPE.
  6. Y. Lin and H. Song, “DynaCHINA: Real-time traffic estimation and prediction,”IEEE PervasiveComput., vol. 5, no. 4, pp. 65–65, Oct.–Dec. 2006..
  7. J. R. Douceur, “The sybil attack,” in International Workshop on Peerto-Peer Systems, ser. Lecture Notes in Computer Science, P. Druschel,F. Kaashoek, and A. Rowstron, vol. 2429. Berlin, Germany: Springer-
  8. Y.-C. Hu, A. Perrig, and D. B. Johnson, “Ariadne: A secure on-demandrouting protocol for ad hoc networks,” in Proc. 8th Annu. Int. Conf.MobiCom Netw., Atlanta, GA, USA, 2002, pp. 12–23.
  9. S. Buchegger and J.-Y. Le Boudee, “Self-policing mobile ad hoc networks by reputation systems,” IEEE Commun. Mag., vol. 43, no. 7, pp. 101–107,Jul. 2005
  10. P.-W. Yau and C. J. Mitchell, “Security vulnerabilities in ad hoc networks,” in Proc. 7th Int. Symp. Commun. Theory Appl., 2003,pp. 99–104.
  11. M. N. Mejri, J. Ben-Othman, and M. Hamdi, “Survey on VANET security challenges and possible cryptographic solutions,” Veh. Commun., vol. 1,no. 2, pp. 53–66, Apr. 2014.
  12. J. Molina-Gil, P. Caballero-Gil, and C. Caballero-Gil, “Aggregation and probabilistic verification for data authentication in VANETs,” Inf. Sci.,vol. 262, pp. 172–189,Mar.2014.25822589,ISSN00313203,10.1016/j.patcog.2010.01.008.
  13. Y. Lin and H. Song, “DynaCHINA: Real-time traffic estimation and prediction,”IEEE PervasiveComput., vol. 5, no. 4, pp. 65–65, Oct.–Dec. 2006..
  14. B. T. Sharef, R. A. Alsaqour, and M. Ismail, “Vehicular communicationad hoc routing protocols: A survey,” J. Netw. Comput. Appl., vol. 40,pp. 363–396, Apr. 2014.
  15. S. Al-Sultan, M. M. Al-Doori, A. H. Al-Bayatti, and H. Zedan, “A comprehensive survey on vehicular ad hoc network,” J. Netw. Comput. Appl.,vol. 37, pp. 380–392, Jan. 2014.
  16. M. Raya and J.-P. Hubaux, “Securing vehicular ad hoc networks,”J. Comput. Security, vol. 15, no. 1, pp. 39–68, Jan. 2007.Brown, L. D., Hua, H., and Gao, C. 2003. A widget framework for augmented interaction in SCAPE.
  17. Y. Zhang and W. Lee, “Intrusion detection in wireless ad-hoc networks,”in Proc. ACM 6th Annu. Int. Conf. MobiCom Netw., Boston, MA, USA,2000, pp. 275–283.
Files

Publishing Information

StatePublished
Volume180
Issue8
Start Page No.38
Editor's Choice