Abstract

Vehicular ad hoc networks (VANETs) have a high degree of openness. Therefore, if a new vehicle node wants to access the network, we need to validate the vehicle node carefully to ensure the security of the entire networking. There are a large number of vehicle nodes, and the strange degree among the nodes is very high in VANETs. In addition, VANETs are human-oriented networks. All vehicle nodes in the VANET have the right to decide whether to accept a new node. To attack this challenge, this paper proposes a security authentication method based on trust evaluation. The security authentication method consists of two parts: secure authentication based on direct trust evaluation and secure authentication based on indirect trust evaluation. In the direct trust evaluation, the security vector model is established based on the security behaviors of the new vehicle node. The historical security evaluation from the authority units (AU) is collected to calculate the final direct trust. In the indirect trust evaluation, the trust degree is calculated based on the recommendation trust vectors from the vehicle nodes in the network. The method employs correlation coefficient for distinguishing the malicious vehicle. Then, the recommendations from the malicious vehicle nodes are removed. The final recommended trust is gained by calculating the average recommendation trusts of remained vehicle nodes. Simulation results show the advantage of our proposed method.

Highlights

  • Vehicular ad hoc networks (VANETs) have a high degree of openness [1]

  • 3 Multi-level security certification of VANETs To ensure the security of the VANETs, this paper presents a comprehensive vehicle node security authentication method

  • 4 Experimental results We proposed a security authentication method based on trust evaluation

Read more

Summary

Introduction

VANETs have a high degree of openness [1]. VANET needs face a diverse of security threats [2,3]. Through accessing the VANETs, the attacker can conduct privacy spy and obtain the moving track of the vehicles [4]. The openness and highly dynamic of VANETs make the malicious attacks easy to implement and difficult to detect [6]. Due to the application characteristics and application scenarios of VANETs, these attacks can threat the information security and the property safety of users [7]. How to accurately authenticate the new accessing vehicle node is becoming an urgently required research problem [8]

Methods
Results
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.