Trust Management in Vehicular Ad hoc NETwork

Trust Management in Vehicular Ad hoc NETwork

Ryma Abassi (University of Carthage, Tunisia)
Copyright: © 2018 |Pages: 16
DOI: 10.4018/978-1-5225-5736-4.ch003
OnDemand PDF Download:
No Current Special Offers


A vehicular ad hoc network (VANET) is a self-organized network that can be formed by connecting vehicles equipped with on-board units. Two types of communications are provided in VANET: vehicular-to-vehicular and vehicular-to-infrastructure. In the first communication type, vehicles communicate directly, whereas in V2I, vehicles communicate through routers called road side units (RSU). Trusted authorities control the network. VANET can be used in several cases. However, the main applications of VANET are oriented to safety issues. In such context, a security problem can have disastrous consequences. In fact, an attacker can be tempted to forward false information in order to obtain some privileges such as road liberation, etc. Hence, evaluating the reliability of transmissions is vital. Trust can be used to promote such healthy collaboration. In fact, trust enables collaborating vehicles to counter their uncertainty and suspicion by establishing trustworthy relationships. The main contribution of this chapter is then the proposition of a trust-based security scheme for VANET.
Chapter Preview

Few works dealt with trust in VANET. Most of them were interested by trust establishment in VANET that relies on a security infrastructure and most often makes use of certificates (Wex, Breuer, Held, Leinmuller, & Delgrossi, 2008). However, in this work, we focus on trust models that do not fully rely on the static infrastructure and thus can be more easily deployed.

In Chuang and Lee (2014), TEAM a Trust-Extended Authentication Mechanism for Vehicular Ad hoc Networks was proposed. It involves eight procedures: initial registration, login, general authentication, password change, trust-extended authentication, key update, key revocation and secure communication. However, the main drawback of this proposition is that if an adversary node is authenticated as trustful, it may authenticate other misbehaving nodes.

Complete Chapter List

Search this Book: