Trust ManagementTrust Management for Software-Defined Heterogeneous Vehicular Ad Hoc NetworksVehicular Ad hoc Networks

In Zaigham Mahmood (ed.), Security, Privacy and Trust in the Iot Environment. Springer Verlag. pp. 203-226 (2019)
  Copy   BIBTEX

Abstract

Over the past few decades, a considerable amount of interest has been observed for improving the overall road transportation across the globe, primarily to enhance the safety of vehicular passengers and vulnerable road pedestrians. Vehicular Ad hoc NetworksVehicular Ad hoc Networks are anticipated to play a critical role in smart cities and Internet of Things domain. Instead, it is expected that a new paradigm of Internet of VehiclesInternet of Vehicles will soon become an important component of the IoT. Also, since the connected vehicles primarily disseminate safety-critical information, it is imperative to have an extremely secure and trusted network so that critical data information could be traversed with extreme reliability and authenticity. Unlike conventional wired networks, vehicular networks are highly dynamic, distributed and of open nature, and are, therefore, susceptible to various attacks such as replayReplay, spoofingSpoofing, eavesdroppingEavesdropping, man-in-the-middleMan-in-the-middle, distributed denial-of-serviceDenial-of-service, blackhole, grayhole, SybilSybil and other malware attacksMalware attacks. To address the same, numerous mechanisms have been proposed in the literature, mainly relying on traditional cryptographyCryptography techniques. Nevertheless, cryptography-based solutions are not effective in VANETs since nodes in this network are highly dynamic and distributed across the network. Moreover, the network infrastructure cannot be guaranteed permanently, and cryptographic solutions may also get compromised due to insider attacks in a network. This chapter aims to provide an in-depth investigation of a diverse range of security attacks challenging the actual realisation of vehicular networks. In contrast to conventional security solutions, it brings forth the need for trust management for securing vehicular networks for ensuring reliability, authenticity and relevance by revoking both malicious and selfish nodes. It also briefly highlights the need for trust models and illustrates the characteristics of data-oriented trust models, entity-oriented trust models and hybrid trust models. Furthermore, since the conventional networks are being transformed via the promising yet emerging notion of software-defined networking, a brief discussion is presented so as to illustrate how a reconfigurable, reprogrammable and agile infrastructure can help in guaranteeing more secure vehicular networking platforms which are indispensable for futuristic Intelligent Transportation SystemIntelligent Transportation System applications and services.

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 92,410

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Can We Manage Trust?N. V. Kazarinova & E. S. Dubovik - 2017 - Дискурс 6:65-75.
Selective Software Project Management Methodology.Hisham Khdair - 2017 - IJournals: International Journal of Software and Hardware Research in Engineering 5.
A bundle of software rights and duties.David M. Douglas - 2011 - Ethics and Information Technology 13 (3):185-197.
Trust and Rule.Charles Tilly - 2005 - Cambridge University Press.
Creating Trust.Robert C. Solomon - 1998 - Business Ethics Quarterly 8 (2):205-232.

Analytics

Added to PP
2021-09-03

Downloads
10 (#1,200,215)

6 months
5 (#648,618)

Historical graph of downloads
How can I increase my downloads?

Author's Profile

Citations of this work

No citations found.

Add more citations

References found in this work

No references found.

Add more references