基于特征向量中心性和社会度量的vanet信任模型

Yu’ang Zhang, Yujie Song, Yu Wang, Yue Cao, Xuefeng Ren, Fei Yan
{"title":"基于特征向量中心性和社会度量的vanet信任模型","authors":"Yu’ang Zhang, Yujie Song, Yu Wang, Yue Cao, Xuefeng Ren, Fei Yan","doi":"10.1109/TrustCom56396.2022.00016","DOIUrl":null,"url":null,"abstract":"Vehicular Ad Hoc Networks (VANETs) rely heavily on trustworthy message exchanges between vehicles to enhance traffic efficiency and transport safety. Although cryptography-based methods are capable of alleviating threats from unauthenticated attackers, they can not prevent attacks from those legitimate network participants. This paper proposes a trust model to deal with attackers from the latter case, who can tamper with their received messages and deliberately decrease the trust value of benign vehicles. The trust evaluation process is formed by two stages: (i) the local trust evaluation at vehicles and (ii) trust aggregation on Road Side Units (RSUs). In the local trust evaluation stage, vehicles detect attacks and calculate the trust value for others in a distributed manner. Also, the social metrics of vehicles are calculated based on interaction records and trajectories. In the trust aggregation stage, each RSU collects local data from nearby vehicles and derives aggregation weights from the eigenvector centrality of the local trust network and social metrics. Then the RSU broadcasts the aggregated trust value towards vehicles in proximity. These vehicles can thus obtain a more accurate and comprehensive view. Vehicles with trust value below a preset threshold will be considered malicious. Extensive simulations based on the ONE simulator show that the proposed model (TECS) outperforms another benchmark model (IWOT-V) regarding the malicious vehicle detection and the delivery rate of authentic messages.","PeriodicalId":276379,"journal":{"name":"2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"TECS: A Trust Model for VANETs Using Eigenvector Centrality and Social Metrics\",\"authors\":\"Yu’ang Zhang, Yujie Song, Yu Wang, Yue Cao, Xuefeng Ren, Fei Yan\",\"doi\":\"10.1109/TrustCom56396.2022.00016\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Vehicular Ad Hoc Networks (VANETs) rely heavily on trustworthy message exchanges between vehicles to enhance traffic efficiency and transport safety. Although cryptography-based methods are capable of alleviating threats from unauthenticated attackers, they can not prevent attacks from those legitimate network participants. This paper proposes a trust model to deal with attackers from the latter case, who can tamper with their received messages and deliberately decrease the trust value of benign vehicles. The trust evaluation process is formed by two stages: (i) the local trust evaluation at vehicles and (ii) trust aggregation on Road Side Units (RSUs). In the local trust evaluation stage, vehicles detect attacks and calculate the trust value for others in a distributed manner. Also, the social metrics of vehicles are calculated based on interaction records and trajectories. In the trust aggregation stage, each RSU collects local data from nearby vehicles and derives aggregation weights from the eigenvector centrality of the local trust network and social metrics. Then the RSU broadcasts the aggregated trust value towards vehicles in proximity. These vehicles can thus obtain a more accurate and comprehensive view. Vehicles with trust value below a preset threshold will be considered malicious. Extensive simulations based on the ONE simulator show that the proposed model (TECS) outperforms another benchmark model (IWOT-V) regarding the malicious vehicle detection and the delivery rate of authentic messages.\",\"PeriodicalId\":276379,\"journal\":{\"name\":\"2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)\",\"volume\":\"5 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/TrustCom56396.2022.00016\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/TrustCom56396.2022.00016","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

车辆自组织网络(vanet)在很大程度上依赖于车辆之间可信的信息交换,以提高交通效率和运输安全。尽管基于加密的方法能够减轻来自未经身份验证的攻击者的威胁,但它们不能阻止来自合法网络参与者的攻击。本文提出了一种信任模型来应对后一种情况,即攻击者可以篡改接收到的消息,故意降低良性车辆的信任值。信任评估过程由两个阶段组成:(i)车辆局部信任评估和(ii)路侧单元信任聚合。在局部信任评估阶段,车辆以分布式方式检测攻击并计算对其他车辆的信任值。此外,车辆的社会指标计算基于交互记录和轨迹。在信任聚合阶段,每个RSU收集附近车辆的本地数据,并从本地信任网络的特征向量中心性和社会指标中获得聚合权值。然后,RSU向附近的车辆广播聚合的信任值。这些车辆因此可以获得更准确和全面的视野。信任值低于预设阈值的车辆将被视为恶意车辆。基于ONE模拟器的大量仿真表明,所提出的模型(TECS)在恶意车辆检测和真实消息传递率方面优于另一个基准模型(IWOT-V)。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
TECS: A Trust Model for VANETs Using Eigenvector Centrality and Social Metrics
Vehicular Ad Hoc Networks (VANETs) rely heavily on trustworthy message exchanges between vehicles to enhance traffic efficiency and transport safety. Although cryptography-based methods are capable of alleviating threats from unauthenticated attackers, they can not prevent attacks from those legitimate network participants. This paper proposes a trust model to deal with attackers from the latter case, who can tamper with their received messages and deliberately decrease the trust value of benign vehicles. The trust evaluation process is formed by two stages: (i) the local trust evaluation at vehicles and (ii) trust aggregation on Road Side Units (RSUs). In the local trust evaluation stage, vehicles detect attacks and calculate the trust value for others in a distributed manner. Also, the social metrics of vehicles are calculated based on interaction records and trajectories. In the trust aggregation stage, each RSU collects local data from nearby vehicles and derives aggregation weights from the eigenvector centrality of the local trust network and social metrics. Then the RSU broadcasts the aggregated trust value towards vehicles in proximity. These vehicles can thus obtain a more accurate and comprehensive view. Vehicles with trust value below a preset threshold will be considered malicious. Extensive simulations based on the ONE simulator show that the proposed model (TECS) outperforms another benchmark model (IWOT-V) regarding the malicious vehicle detection and the delivery rate of authentic messages.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信