Multi‐hop interpersonal trust assessment in vehicular ad‐hoc networks using three‐valued subjective logic

التفاصيل البيبلوغرافية
العنوان: Multi‐hop interpersonal trust assessment in vehicular ad‐hoc networks using three‐valued subjective logic
المؤلفون: Shunrong Jiang, Muhammad Sohail, Rana Umair Ashraf, Samar Zaineldeen, Liangmin Wang
المصدر: IET Information Security. 13:223-230
بيانات النشر: Institution of Engineering and Technology (IET), 2019.
سنة النشر: 2019
مصطلحات موضوعية: Routing protocol, Vehicular ad hoc network, Computer Networks and Communications, Wireless ad hoc network, Computer science, business.industry, Routing table, ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS, 020206 networking & telecommunications, 0102 computer and information sciences, 02 engineering and technology, Trusted Computing, 01 natural sciences, Public-key cryptography, Distance-vector routing protocol, 010201 computation theory & mathematics, 0202 electrical engineering, electronic engineering, information engineering, business, Subjective logic, Software, Information Systems, Computer network
الوصف: Future vehicular networks need multi-hop trusted information among car manoeuvres as a solution to the persistent problem of road safety, and news sharing. However, malicious users in vehicular networks can also disseminate fake information among each other. Traditional public key infrastructure is not an efficient solution for recognising these malicious users, as they all have authorised entities. To cope with this problem, this study highlights novel idea, i.e. three-valued subjective logic (3VSL) as a trust model for multi-hop trust assessment among users in vehicular ad-hoc network (VANET). Trust among vehicle users is represented in the form of opinion derived from 3VSL and updated frequently due to vehicles random movement on the road. To support the authors' proposed scheme, this study contains two parts in simulation, i.e. numerical and experimental analyses. Numerical analysis shows that 3VSL gives accurate trust assessment even with a bridge or random network topology, which is ignored previously by edge splitting. In the experimental part, we extend widely accepted ad-hoc on-demand distance vector routing protocol by directly applying trust fields to the routing table. The simulation experiment shows that their scheme achieves better performance in term of throughput and latencies in low mobility VANET scenario.
تدمد: 1751-8717
DOI: 10.1049/iet-ifs.2018.5336
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::a41dd6a45b5e4a5d61985f0e975315a4
https://doi.org/10.1049/iet-ifs.2018.5336
Rights: OPEN
رقم الانضمام: edsair.doi...........a41dd6a45b5e4a5d61985f0e975315a4
قاعدة البيانات: OpenAIRE
الوصف
تدمد:17518717
DOI:10.1049/iet-ifs.2018.5336