IDENTIFYING TRUST NODES BASED ON STAY TIME FOR SECURITY IN VANET

Main Article Content

Bonish Koirala
Shrikant S. Tangade
Sunilkumar S Manvi

Abstract

Many published works for security in VANET considers that Road Side Units are stable nodes and on board units are always mobile. In general scenario, there are also an abundant number of vehicles in a network which are not always mobile. Since each vehicle has high computation, power and storage capability, they can be used to provide better network stability and compute trust for other nodes. Mostly those nodes which belong to a network or stays in it for a longer period of time can be used for this purpose. In this paper, we consider this nature of the vehicles to maintain security in the network.


Downloads

Download data is not yet available.

Article Details

Section
Articles

References

C Kerrache, C T Calafate, J Cano, N Lagraa& Pietro, Trust Management for Vehicular Networks: An Adversary-Oriented Overview, IEEE Access 2016,pp. 9293-9307, vol 4, Dec., 2016. [2] N. Yang, A similarity based trust and reputation management framework for VANETs, Int. J. Future Generat. Commun. Netw., vol. 6, no. 2, pp. 25-34,2013 [3] U. Khan, S. Agrawal,& S. Silakari, Detection of malicious nodes (DMN) in vehicular ad-hoc networks, Procedia Comput. Sci., vol. 46, pp. 965- 972, Apr.2015. [4] N. Haddadou, A. Rachedi, & Y. Ghamri- Doudane, Trustand exclusion in vehicular adhoc networks: An economic incentive model based approach, Comput., Commun. IT Appl. Conf.(ComComAp), pp. 13-18, Apr.2013 [5] P.Golle,D.Greene,&J.Staddon,Detecting and correcting malicious data in VANETs, 1st ACM Int. Workshop Veh. Ad Hoc Netw., Oct. 2004, pp. 29-37. [6] S. Gurung, D. Lin, A. C. Squicciarini,& E. Bertino, Information-oriented trustworthiness evaluation in vehicular ad-hoc networks, NSS, pp. 94- 108,2013. [7] R.A.Shaikh&A.S.Alzahrani,Intrusion-aware trust model for vehicular ad hoc networks, Secur. Commun. Netw., vol. 7, no. 11, pp. 1652-1669, Nov.2014. [8] F. G. Mrmol& G. M. Prez, TRIP, a trust and reputation infrastructure- based proposal for vehicular ad hoc networks, J. Netw. Comput. Appl., vol.35,no.3,pp.934-941,2012. [9] H. Sedjelmaci& S. M. Senouci, An accurate and efficient collaborative intrusion detection framework to secure vehicular networks,Comput. Elect. Eng., vol. 43, pp. 33-47,Apr. 2015.