Title | BayesTrust and VehicleRank: Constructing an Implicit Web of Trust in VANET |
Publication Type | Journal Article |
Year of Publication | 2019 |
Authors | Xiao, Yonggang, Liu, Yanbing |
Journal | IEEE Transactions on Vehicular Technology |
Volume | 68 |
Pagination | 2850–2864 |
ISSN | 1939-9359 |
Keywords | BayesTrust, composability, Computational modeling, cooperative intelligent transport system, explicit link structure, global trust relationships, implicit Web of trust, intelligent transportation systems, IWOT-V, local trust information, local trust relationships, mobile ad hoc networks, pagerank, Peer-to-peer computing, pubcrawl, random topology, Resiliency, Social network services, social trust relationship, telecommunication network topology, telecommunication security, threat models, Topology, trust model, untrusted nodes, VANET, VehicleRank, vehicular ad hoc network, vehicular ad hoc networks, web of trust, Web page ranking algorithms, Web pages |
Abstract | As Vehicular Ad hoc Network (VANET) features random topology and accommodates freely connected nodes, it is important that the cooperation among the nodes exists. This paper proposes a trust model called Implicit Web of Trust in VANET (IWOT-V) to reason out the trustworthiness of vehicles. Such that untrusted nodes can be identified and avoided when we make a decision regarding whom to follow or cooperate with. Furthermore, the performance of Cooperative Intelligent Transport System (C-ITS) applications improves. The idea of IWOT-V is mainly inspired by web page ranking algorithms such as PageRank. Although there does not exist explicit link structure in VANET because of random topology and dynamic connections, social trust relationship among vehicles exists and an implicit web of trust can be derived. To accomplish the derivation, two algorithms are presented, i.e., BayesTrust and VehicleRank. They are responsible for deriving the local and global trust relationships, respectively. The simulation results show that IWOT-V can accurately identify trusted and untrusted nodes if enough local trust information is collected. The performance of IWOT-V affected by five threat models is demonstrated, and the related discussions are also given. |
DOI | 10.1109/TVT.2019.2894056 |
Citation Key | xiao_bayestrust_2019 |