Abstract

Establishing trust and reputation for evaluation of message reliability is key to the vehicular ad hoc networks (VANETs). Most of the previous reputation management systems focus on the effectiveness of the reputation management system in handling the liars who send false service messages. However, these reputation management systems have two drawbacks. One is that they are vulnerable to tactical attacks such as self-promoting attacks and bad-mouthing attacks. The other is that they may violate location privacy because they assume every vehicle communicates with a unique ID. Our research particularly investigates the robustness against these tactical attacks, as well as the preservation of privacy by integrating trust management with the pseudonym technique. To resist the tactical attacks in VANETs, we present a reputation model which builds both service reputation and feedback reputation. Moreover, we apply the information entropy and the majority rule to the reputation accumulation algorithms to counter false feedback. To defend the reputation link attack during pseudonym changes, we propose hidden-zone strategy and k-anonymity strategy. The simulation results show that our scheme is robust to these tactical attacks and preserves privacy against the reputation link attack during the pseudonym changes.

Highlights

  • A vehicular ad hoc network (VANET) typically consists of roadside infrastructure and vehicles that are connected in a self-organized way

  • The objective of the attack is to track the vehicles and breach their location privacies. Such an attacker can be abstracted as (i) global passive attacker (GPA) [22] that can eavesdrop all communications of any vehicle in a monitored area and (ii) local active attacker (LAA) [22] that can follow a target and eavesdrop its messages

  • We evaluate the effectiveness of RPRep in countering liars

Read more

Summary

Introduction

A vehicular ad hoc network (VANET) typically consists of roadside infrastructure and vehicles that are connected in a self-organized way. The classical mix-zone (a zone designed for pseudonym changes and trying to decrease the probability of linking) [20] can deal with linking of velocity, location, acceleration, and so forth, but it does not work on the reputation link attack. The reputation link attack, which may violate the untraceability of VANETs, is an important issue in designing a trust management system because the reputation link attack makes it easier for an attacker to keep track of a target’s location information. We propose a reputation model, which is effective in dealing with false messages, and robust to the tactical attacks. We present a hidden-zone strategy and a kanonymity strategy to preserve location privacy against reputation link attacks.

System Overview
Reputation Model
Location Privacy Preservation
B A LAA A
Evaluation
Robustness
Related Work
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call