Abstract

The Internet of things (IoT) and advancements of wireless technology have evolved intelligent transport systems to integrate billion of smart objects ready to connect to the Internet. The modern era of the Internet of things (IoT) has brought significant development in vehicular ad hoc networks (VANETs) which transformed the conventional VANET into the Internet of Vehicle (IoV) to improve road safety and diminished road congestion. However, security threats are increasing due to dependency on infrastructure, computing, dynamic nature, and control technologies of VANET. The security threats of VANETs could be addressed comprehensively by increasing trustworthiness on the message received and transmitting node. Conversely, the presence of dishonest vehicles, for instance, Man in the Middle (MiTM) attackers, in the network sharing malicious content could be posed as a severe threat to VANET. Thus, increasing trustworthiness among nodes can lead to increased authenticity, privacy, accuracy, security, and trusted information sharing in the VANET. In this paper, a lightweight trust model is proposed, presented model identifying dishonest nodes and revoking its credential in the MiTM attack scenario. Furthermore, addressing the privacy and security requirement, the pseudonym scheme is used. All nodes in the VANET established trust provided by initially RSU, which is a trusted source in the network. Extensive experiments are conducted based on a variety of network scenarios to evaluate the accuracy and performance of the presented lightweight trust model. In terms of recall, precision, and F-score, our presented model significantly outperformed compared to MARINE. The simulation results have validated that the proposed lightweight model realized a high trust level with 40% of MiTM attackers and in terms of F-score 95%, whereas the MARINE model has 90%, which leads to the model to attain high detection accuracy.

Highlights

  • In our daily lives, the transport system plays an undeniable role

  • For the trust model in terms of lightweight, fewer arithmetic operations are used to reduce the complexity, such as square root log and complex geometry of the model. e performance of the trust model is measured in the presence of four variants of Man in the Middle (MiTM) attacker and compared with a MARINE trust model based on the weighted voting method

  • All nodes in the vehicular ad hoc networks (VANETs) established trust provided by Road Side Units (RSU) initially, which is a trusted source in the network; once the trustworthiness of the sender is verified the content can be processed. e results have validated the lightweight features of the trust model such as less arithmetic complexity, and low memory consumption leads the model to attain high detection accuracy in MiTM attacks

Read more

Summary

Introduction

The transport system plays an undeniable role. It is projected that this increasing number of vehicles on roads reaches up to 2 billion or more in the coming decades [1]. (1) An attack-resistant trust model for VANETs that efficiently addresses the privacy issue by using the pseudonym scheme (2) Propose a trust model, identifying dishonest nodes and revoking its credential in a MiTM attack scenario (3) e RSU is a trusted source in the network, RSU assigns an initial trusted value in the coverage area and based on the presented scenario generates a peer alert message to inform vehicle in the coverage area about the presence of a malicious vehicle.

Related Work e trust established between the nodes can be classified into two:
Evaluations
Attacker Scenario 1
Findings
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.