Quality, Reliability, Security and Robustness in Heterogeneous Networks. 9th International Conference, QShine 2013, Greader Noida, India, January 11-12, 2013, Revised Selected Papers

Research Article

Trust Management Method for Vehicular Ad Hoc Networks

Download
474 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-37949-9_70,
        author={Riaz Shaikh and Ahmed Alzahrani},
        title={Trust Management Method for Vehicular Ad Hoc Networks},
        proceedings={Quality, Reliability, Security and Robustness in Heterogeneous Networks. 9th International Conference, QShine 2013, Greader Noida, India, January 11-12, 2013, Revised Selected Papers},
        proceedings_a={QSHINE},
        year={2013},
        month={7},
        keywords={Ad-Hoc networks Privacy Trust model Vehicular networks},
        doi={10.1007/978-3-642-37949-9_70}
    }
    
  • Riaz Shaikh
    Ahmed Alzahrani
    Year: 2013
    Trust Management Method for Vehicular Ad Hoc Networks
    QSHINE
    Springer
    DOI: 10.1007/978-3-642-37949-9_70
Riaz Shaikh1,*, Ahmed Alzahrani1,*
  • 1: King Abdulaziz University
*Contact email: rashaikh@kau.edu.sa, asalzahrani@kau.edu.sa

Abstract

In vehicular ad hoc networks, evaluating trustworthiness of data is utmost necessary for the receiver to make reliable decisions that are very crucial in safety and traffic-efficiency related applications. Existing trust management schemes that have been proposed so far for the vehicular networks has suffered from various limitations. For example, some schemes build trust based on the history of interactions. However, vehicular networks are ephemeral in nature, which makes that approach infeasible. Furthermore, in most of the existing approaches, unique identities of each vehicle must be known. This violates user privacy. In order to overcome these limitations, we have proposed a novel trust management scheme for the vehicular networks. The proposed method is simple and completely decentralized, which makes it easy to implement in the vehicular networks. We have analytically proved its robustness with respect to various security threats. Furthermore, it introduces linear time complexity, which makes it suitable to use in real-time.