Processing, Please wait...

  • Home
  • About Us
  • Search:
  • Advanced Search

Growing Science » International Journal of Data and Network Science » A trust management model in internet of vehicles

Journals

  • IJIEC (726)
  • MSL (2637)
  • DSL (649)
  • CCL (508)
  • USCM (1092)
  • ESM (404)
  • AC (562)
  • JPM (247)
  • IJDS (912)
  • JFS (91)
  • HE (26)
  • SCI (26)

IJDS Volumes

    • Volume 1 (8)
      • Issue 1 (5)
      • Issue 2 (3)
    • Volume 2 (12)
      • Issue 1 (3)
      • Issue 2 (3)
      • Issue 3 (3)
      • Issue 4 (3)
    • Volume 3 (27)
      • Issue 1 (4)
      • Issue 2 (9)
      • Issue 3 (8)
      • Issue 4 (6)
    • Volume 4 (37)
      • Issue 1 (6)
      • Issue 2 (15)
      • Issue 3 (7)
      • Issue 4 (9)
    • Volume 5 (86)
      • Issue 1 (9)
      • Issue 2 (11)
      • Issue 3 (32)
      • Issue 4 (34)
    • Volume 6 (163)
      • Issue 1 (30)
      • Issue 2 (33)
      • Issue 3 (40)
      • Issue 4 (60)
    • Volume 7 (200)
      • Issue 1 (53)
      • Issue 2 (46)
      • Issue 3 (46)
      • Issue 4 (55)
    • Volume 8 (243)
      • Issue 1 (60)
      • Issue 2 (61)
      • Issue 3 (60)
      • Issue 4 (62)
    • Volume 9 (96)
      • Issue 1 (20)
      • Issue 2 (6)
      • Issue 3 (30)
      • Issue 4 (40)
    • Volume 10 (40)
      • Issue 1 (40)

Keywords

Supply chain management(163)
Jordan(161)
Vietnam(148)
Customer satisfaction(120)
Performance(113)
Supply chain(108)
Service quality(98)
Tehran Stock Exchange(94)
Competitive advantage(93)
SMEs(86)
optimization(84)
Financial performance(83)
Trust(81)
TOPSIS(80)
Job satisfaction(79)
Sustainability(79)
Factor analysis(78)
Social media(78)
Knowledge Management(77)
Genetic Algorithm(76)


» Show all keywords

Authors

Naser Azad(82)
Mohammad Reza Iravani(64)
Zeplin Jiwa Husada Tarigan(60)
Endri Endri(45)
Muhammad Alshurideh(42)
Hotlan Siagian(39)
Jumadil Saputra(36)
Dmaithan Almajali(36)
Muhammad Turki Alshurideh(35)
Barween Al Kurdi(32)
Ahmad Makui(32)
Basrowi Basrowi(31)
Hassan Ghodrati(31)
Mohammad Khodaei Valahzaghard(30)
Shankar Chakraborty(29)
Ni Nyoman Kerti Yasa(29)
Sulieman Ibraheem Shelash Al-Hawary(28)
Prasadja Ricardianto(28)
Sautma Ronni Basana(27)
Haitham M. Alzoubi(27)


» Show all authors

Countries

Iran(2177)
Indonesia(1278)
Jordan(784)
India(782)
Vietnam(500)
Saudi Arabia(440)
Malaysia(438)
United Arab Emirates(220)
China(182)
Thailand(151)
United States(110)
Turkey(103)
Ukraine(102)
Egypt(97)
Canada(92)
Pakistan(84)
Peru(83)
Morocco(79)
United Kingdom(79)
Nigeria(77)


» Show all countries

International Journal of Data and Network Science

ISSN 2561-8156 (Online) - ISSN 2561-8148 (Print)
Quarterly Publication
Volume 7 Issue 2 pp. 745-756 , 2023

A trust management model in internet of vehicles Pages 745-756 Right click to download the paper Download PDF

Authors: Fayez Alazemi, Ahmed Al-Mulla, Mousa Al-Akhras, Mohammed Alawairdhi, Marwah Al-Masri, Hani Omar, Hazza Alshareef

DOI: 10.5267/j.ijdns.2023.2.003

Keywords: Internet of Things (IoT), IoT, Internet of Vehicles, IoV, Trust Management, Traffic, Accident, Vehicle, Model, Authentication

Abstract: The Internet of Things (IoT) is one of the most evolving technologies, which has a major impact on our daily life. Almost all new devices will have a feature to be connected and controlled over the Internet. Several applications are utilizing IoT to enhance routine processes and actions efficiently. The Internet of Vehicles (IoV) evolved from IoT, where vehicles communicate with each other or with other objects to have a better transportation environment to reduce the number of accidents and save people’s lives. IoV is considered new fields that need security requirements including confidentiality, integrity, availability, authentication, and trust. Trust management technique is used to validate entities behaviors automatically against well-defined policies. The major categories of trust model in IoV are based on entity, data, or a combination of both. This paper proposes a trust model which is based on a combination of entity and data to define the trust of vehicles and utilize the public key infrastructure to distribute certificates to vehicles. Based on certificate validation, messages will be trusted and accepted. This model has been tested across different simulation scenarios which showed that the proposed model detected malicious vehicles and trusted vehicles did not accept their messages.

How to cite this paper
Alazemi, F., Al-Mulla, A., Al-Akhras, M., Alawairdhi, M., Al-Masri, M., Omar, H & Alshareef, H. (2023). A trust management model in internet of vehicles.International Journal of Data and Network Science, 7(2), 745-756.

Refrences
Ahmad, F., Adnane, A., Kerrache, C. A., Franqueira, V. N., & Kurugollu, F. (2020). Trust management in vehicular ad-hoc networks and Internet-of-Vehicles: Current trends and future research directions. In Global Advancements in Connect-ed and Intelligent Mobility: Emerging Research and Opportunities (pp. 135-165). IGI Global.
Airehrour, D., Gutierrez, J., & Ray, S. K. (2016). Secure routing for internet of things: A survey. Journal of Network and Computer Applications, 66, 198-213.
Amoozadeh, M., Deng, H., Chuah, C. N., Zhang, H. M., & Ghosal, D. (2015). Platoon management with cooperative adap-tive cruise control enabled by VANET. Vehicular communications, 2(2), 110-123.
Chai, H., Leng, S., Zhang, K., & Mao, S. (2019). Proof-of-reputation based-consortium blockchain for trust resource shar-ing in internet of vehicles. IEEE Access, 7, 175744-175757.
Chen, J. M., Li, T. T., & Panneerselvam, J. (2018). TMEC: a trust management based on evidence combination on attack-resistant and collaborative internet of vehicles. IEEE Access, 7, 148913-148922.
Djedjig, N., Tandjaoui, D., Romdhani, I., & Medjek, F. (2018). Trust management in the internet of things. In Security and Privacy in Smart Sensor Networks (pp. 122-146). IGI Global.
Ferrari, P., Sisinni, E., Depari, A., Flammini, A., Rinaldi, S., Bellagente, P., & Pasetti, M. (2020). On the performance of cloud services and databases for industrial IoT scalable applications. Electronics, 9(9), 1435.
Gai, F., Zhang, J., Zhu, P., & Jiang, X. (2017). Ratee-based trust management system for internet of vehicles. In Wireless Algorithms, Systems, and Applications: 12th International Conference, WASA 2017, Guilin, China, June 19-21, 2017, Proceedings 12 (pp. 344-355). Springer International Publishing.
Garcia-Magarino, I., Sendra, S., Lacuesta, R., & Lloret, J. (2018). Security in vehicles with IoT by prioritization rules, ve-hicle certificates, and trust management. IEEE Internet of Things Journal, 6(4), 5927-5934.
Gazdar, T., Belghith, A., & Abutair, H. (2017). An enhanced distributed trust computing protocol for VANETs. IEEE Ac-cess, 6, 380-392.
Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT): A vision, architectural elements, and future directions. Future generation computer systems, 29(7), 1645-1660.
Halabi, T., & Zulkernine, M. (2019, May). Trust-based cooperative game model for secure collaboration in the internet of vehicles. In ICC 2019-2019 IEEE International Conference on Communications (ICC) (pp. 1-6). IEEE.
Hassija, V., Chamola, V., Saxena, V., Jain, D., Goyal, P., & Sikdar, B. (2019). A survey on IoT security: application areas, security threats, and solution architectures. IEEE Access, 7, 82721-82743.
Hbaieb, A., Ayed, S., & Chaari, L. (2022). A survey of trust management in the Internet of Vehicles. Computer Net-works, 203, 108558.
Hernandez, P. (2020, February 21). McAfee reports: About 2.5 million IoT devices were infected by Mirai botnet in Q4 of 2016.
Iqbal, R., Butt, T. A., Afzaal, M., & Salah, K. (2019). Trust management in social internet of vehicles: factors, challenges, blockchain, and fog solutions. International Journal of Distributed Sensor Networks, 15(1), 1550147719825820.
Javaid, U., Aman, M. N., & Sikdar, B. (2020). A scalable protocol for driving trust management in internet of vehicles with blockchain. IEEE Internet of Things Journal, 7(12), 11815-11829.
Khan, U., Agrawal, S., & Silakari, S. (2015). Detection of malicious nodes (DMN) in vehicular ad-hoc networks. Procedia computer science, 46, 965-972.
Kouicem, D. E., Bouabdallah, A., & Lakhlef, H. (2018). Internet of things security: A top-down survey. Computer Net-works, 141, 199-221.
Kuzin, M., Shmelev, Y., & Kuskov, V. (2018). New trends in the world of IoT threats. Kaspersky Lab.
Liang, L., Peng, H., Li, G. Y., & Shen, X. (2017). Vehicular communications: A physical layer perspective. IEEE Transac-tions on Vehicular Technology, 66(12), 10647-10659.
Lopez, P. A., Behrisch, M., Bieker-Walz, L., Erdmann, J., Flötteröd, Y. P., Hilbrich, R., & Wießner, E. (2018, November). Microscopic traffic simulation using sumo. In 2018 21st international conference on intelligent transportation systems (ITSC) (pp. 2575-2582). IEEE.
Mármol, F. G., & Pérez, G. M. (2012). TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks. Journal of network and computer applications, 35(3), 934-941.
Nanda, A., Puthal, D., Rodrigues, J. J., & Kozlov, S. A. (2019). Internet of autonomous vehicles communications security: overview, issues, and directions. IEEE Wireless Communications, 26(4), 60-65.
Rose, K., Eldridge, S., & Chapin, L. (2015). The internet of things: An overview. The internet society (ISOC), 80, 1-50.
Shaikh, R. A., & Alzahrani, A. S. (2014). Intrusion‐aware trust model for vehicular ad hoc networks. Security and commu-nication networks, 7(11), 1652-1669.
Sharma, N., Chauhan, N., & Chand, N. (2018, December). Security challenges in Internet of Vehicles (IoV) environment. In 2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC) (pp. 203-207). IEEE.
Sharma, S., & Kaushik, B. (2019). A survey on internet of vehicles: Applications, security issues & solutions. Vehicular Communications, 20, 100182.
Shrestha, R., & Nam, S. Y. (2017). Trustworthy event-information dissemination in vehicular ad hoc networks. Mobile In-formation Systems, 2017.
Siddiqui, S. A., Mahmood, A., Sheng, Q. Z., Suzuki, H., & Ni, W. (2021). A survey of trust management in the internet of vehicles. Electronics, 10(18), 2223.
Singh, P. K., Singh, R., Nandi, S. K., Ghafoor, K. Z., Rawat, D. B., & Nandi, S. (2020). Blockchain-based adaptive trust management in internet of vehicles using smart contract. IEEE Transactions on Intelligent Transportation Sys-tems, 22(6), 3616-3630.
Talal, M., Zaidan, A. A., Zaidan, B. B., Albahri, A. S., Alamoodi, A. H., Albahri, O. S., ... & Mohammed, K. I. (2019). Smart home-based IoT for real-time and secure remote health monitoring of triage and priority system using body sen-sors: Multi-driven systematic review. Journal of medical systems, 43, 1-34.
Tang, Z., Liu, A., Li, Z., Choi, Y. J., Sekiya, H., & Li, J. (2016). A trust-based model for security cooperating in vehicular cloud computing. Mobile information systems, 2016.
Wehrle, K., Günes, M., & Gross, J. (Eds.). (2010). Modeling and tools for network simulation. Springer Science & Busi-ness Media.
World Health Organization. (2015). Global status report on road safety 2015. World Health Organization.
Wu, A., Ma, J., & Zhang, S. (2011, September). RATE: a RSU-aided scheme for data-centric trust establishment in VANETs. In 2011 7th International Conference on Wireless Communications, Networking and Mobile Computing (pp. 1-6). IEEE.
Yang, F., Wang, S., Li, J., Liu, Z., & Sun, Q. (2014). An overview of internet of vehicles. China communications, 11(10), 1-15.
Yang, N. (2013). A similarity based trust and reputation management framework for vanets. International Journal of Fu-ture Generation Communication and Networking, 6(2), 25-34.
Yang, Z., Yang, K., Lei, L., Zheng, K., & Leung, V. C. (2018). Blockchain-based decentralized trust management in ve-hicular networks. IEEE internet of things journal, 6(2), 1495-1505.
  • 85
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: International Journal of Data and Network Science | Year: 2023 | Volume: 7 | Issue: 2 | Views: 1084 | Reviews: 0

Related Articles:
  • Simulation and analysis performance of ad-hoc routing protocols under DDoS ...
  • Delay-based network coding packet selection
  • Increased longevity of wireless Ad hoc network through fuzzy system
  • Using Apriori algorithm to prevent black hole attack in mobile Ad hoc netwo ...
  • A new method for improving security in MANETs AODV Protocol

Add Reviews

Name:*
E-Mail:
Review:
Bold Italic Underline Strike | Align left Center Align right | Insert smilies Insert link URLInsert protected URL Select color | Add Hidden Text Insert Quote Convert selected text from selection to Cyrillic (Russian) alphabet Insert spoiler
winkwinkedsmileam
belayfeelfellowlaughing
lollovenorecourse
requestsadtonguewassat
cryingwhatbullyangry
Security Code: *
Include security image CAPCHA.
Refresh Code

® 2010-2025 GrowingScience.Com