Next Article in Journal
Special Issue “Body Sensors Networks for E-Health Applications”
Next Article in Special Issue
Fault-Tolerant Network-On-Chip Router Architecture Design for Heterogeneous Computing Systems in the Context of Internet of Things
Previous Article in Journal
Comparison between the Airgo™ Device and a Metabolic Cart during Rest and Exercise
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

TrustWalker: An Efficient Trust Assessment in Vehicular Internet of Things (VIoT) with Security Consideration

1
School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang 212013, China
2
Faculty of Engineering Science, Technology, and Management, Ziauddin University, Karachi 74600, Pakistan
3
School of Intelligent Mechatronics Engineering, Sejong University, Seoul 05006, Korea
4
School of Engineering, Macquarie University, Sydney NSW 2109, Australia
5
Department of Information and Communication Engineering, Yeungnam University, Gyeongsan-si 38541, Korea
6
Department of Electronics and Information Engineering, Korea University, Sejong 30019, Korea
*
Authors to whom correspondence should be addressed.
Equal Contributed First Authors.
Sensors 2020, 20(14), 3945; https://doi.org/10.3390/s20143945
Submission received: 22 June 2020 / Revised: 10 July 2020 / Accepted: 15 July 2020 / Published: 16 July 2020

Abstract

:
The Internet of Things (IoT) is a world of connected networks and modern technology devices, among them vehicular networks considered more challenging due to high speed and network dynamics. Future trends in IoT allow these inter networks to share information. Also, the previous security solutions to vehicular IoT (VIoT) much emphasize on privacy protection and security related issues using public keys infrastructure. However, the primary concern about efficient trust assessment, authorized users malfunctioning, and secure information dissemination in vehicular wireless networks have not been explored. To cope with these challenges, we propose a trust enhanced on-demand routing (TER) scheme, which adopts TrustWalker (TW) algorithm for efficient trust assessment and route search technique in VIoT. TER comprised of novel three-valued subjective logic (3VSL), TW algorithm, and ad hoc on-demand distance vector (AODV) routing protocol. The simulated results validate the accuracy of the proposed scheme in term of throughput, packet drop ratio (PDR), and end to end (E2E) delay. In the simulation, the execution time of the TW algorithm is analyzed and compared with another route search algorithm, i.e., Assess-Trust (AT), by considering real-world online datasets such as Pretty Good Privacy and Advogato. The accuracy and efficiency of the TW algorithm, even with a large number of vehicle users, are also demonstrated through simulations.

1. Introduction

Vehicular Internet of Things (VIoT) network is a special wireless network where vehicles are equipped with digital computers and multiple sensors. New technologies and communication standards such as IEEE 802.11p or dedicated short-range communication (DSRC) allow vehicles to share information. VIoT differs from mobile networks in the sense that they do not have limited energy and storage capacity. Also, IoT technologies connect physical devices and share information using different wireless technologies [1,2]. According to one of the Cisco reports, there will be 400 million GB of data generated by 300 million passenger vehicles with wireless enabled devices in the near future [3]. For safety purposes, the data generated by these vehicles in VIoT must be genuine. Vehicular networks, as one of the promising applications in IoT, have changed the direction of travel plans, road safety, and entertainment. However, these networks can face serious security problems due to high speed, adversary attacks, and open nature of the network [4]. The adversaries can impede vehicular services and interrupt the whole traveling. For example, since the vehicles are driven by humans, there might be a chance of selfishness, and therefore vehicle performance is not equal. Meanwhile, the disseminated information from these vehicles in the VIoT need to be trustworthy, and this important issue should be borne in mind. If the trustworthiness of the particular vehicle is unknown, we can face the scenarios as depicted in Figure 1. In Figure 1a, a vehicle makes subjective assessment using on-board sensors that there is worksite ahead, so it informs the road-side unit (RSU). If the RSU knows that this information is received from the trusted vehicle, it will broadcast this information. In Figure 1b, the RSU gets the conflicting news about road divergence. If the RSU is unable to filter the received information as genuine or not, we can have a scenario as depicted in Figure 1c. In addition, previously proposed schemes based on public key infrastructure (PKI) in VIoT require central cloud services. Neither, it can be solved by any privacy-preserving scheme to authenticate the legitimacy of shared data [5,6]. Instead, incorporating trust can help us in building reputation system between unknown vehicle users and to evict malicious ones within its transmission range [7,8].
These new paradigms can be a unique opportunity for news sharing, emergency reports, and road safety for the connected vehicles in the VIoT technologies [1,2]. Some of the interesting use cases in vehicular internet of things can be found at (https://www.biz4intellia.com/blog/iot-applications-in-automotive-industry/)-(https://blog.westerndigital.com/top-9-iot-use-cases/). A possible scenario for information sharing among communicated devices in the future vehicular network is depicted in Figure 2. Meanwhile, the disseminated information from these integrated devices such as vehicles or RSUs needs to be trustworthy. If the false alarm and security attacks [4,7] remains undetected, then there is a chance of traffic jam or even worse false information dissemination.
In addition, many future promising applications in ITS can be supported by a hybrid structure as described in [8,9]. This hybrid structure contains trusted authorities (TA), RSUs, and vehicles on the road. However, it can be a crucial task to provide this central architecture everywhere on the whole journey. Generally, vehicles on the road may travel in close proximity by sharing different services among them. When a requesting vehicle wants to relay a message to the target vehicle, the question here is how to ensure the trustworthiness of the connecting vehicles as a truster and trustee in this VIoT. One solution is to incorporate trust management ideas among neighbor vehicles [10], which allows them to authenticate each other based on their trust score and finally to evict the malicious ones. Before relaying or receiving some traffic and safety information, a vehicle must know the credibility of the targeted vehicle. In this situation, a user vehicle establishes an efficient trust assessment and ignore misleading information sent by adversaries.
This study proposes a trust enhanced on-demand routing (TER) scheme, which takes inherent advantages of the TW algorithm for efficient trust assessment and an ad hoc on-demand distance vector (AODV). The proposed TER scheme uses the three-valued subjective logic (3VSL) and Bayesian network theory. 3VSL, which is a kind of advanced probabilistic logic, gives an accurate trust assessment result in the final computed opinion [11,12]. This feature urges us to use 3VSL in the proposed scheme because it defines trust as a threefold event by considering positive, negative, and neutral events. The neutral state expresses the posterior uncertainty which exists in trust generated by vehicles during an interaction. Prior uncertainty remains the same in most of the probabilistic trust models. Furthermore, the TW algorithm represents the vehicular network topology in the form of a matrix using 3VSL operations. The performance is analyzed to validate the accuracy of the proposed TER in terms of throughput, packet loss, and end-to-end (E2E) delay. Additionally, the execution time of the TW algorithm is analyzed by comparing it with another route search algorithm called Assess-Trust (AT) [13]. The execution times of the TW and AT schemes are evaluated by using two real-world on-line datasets i.e., Advogato and Pretty Good Privacy (PGP).

Research Contributions

  • First, based on our trust model, we propose on-demand trust enhanced routing (TER) among vehicles in VIoT, which extends trust-based source routing mechanisms by combining with the TW algorithm. Our proposed TER scheme predicts the next route-finding and efficient route discovery based on the current node threshold trust value and the TW algorithm for transmitting the information.
  • Second, for the performance evaluation of the proposed TER, we compare it with the performance of two other routing protocols even though they do not have trust mechanism among communicating nodes. One is an authenticated anonymous secure routing (AASR) scheme that uses a cryptographic operation, and the other is standard AODV routing. Based on the analytical results, it is shown that the proposed TER is a promising approach in enhancing packet delivery, minimizing E2E delay, and resisting against malicious threats.
  • Third, we argue that the proposed TER can resist certain malicious attacks by the continuous update of route trust by taking the latest interactions among peers. The TER helps us to cope with malicious attacks, e.g., black hole and zigzag.
  • Finally, taking advantage of the TW algorithm, we can efficiently assess trust in large scale vehicular networks. Therefore, it can be seen that the proposed TW algorithm can also be applicable to interpersonal trust assessment in online social networks.
The rest of the paper is organized as follows: Section 2 explains the related work in two parts, i.e., a brief history of the proposed trust models and trust-based routing schemes in VIoT. In Section 3, we define a system model and trust assumptions along with the design goals for the proposed scheme. In Section 4, fundamentals on the trust model for the proposed scheme are described in details. Section 5 expresses the framework for the proposed TER. Section 6 provides details about the TW algorithm and its related operations in the TER. In Section 7, the route maintenance operations related to route error, route hand-off, and node mobility are explained. In Section 8, the simulation setup is carried out, and results are obtained. The conclusions are provided in Section 9.

2. Related Work

The application of the fifth-generation (5G) networks to VIoT promotes the interaction of V2X technology. In this scenario, the authenticity and credibility of disseminated information by integrated participants in the V2X technology is very important [2,14]. Furthermore, most of the existing trust management schemes in vehicular networks are based on public key infrastructure, batch authentication, and cloud-based trust management [15,16]. The author in [17] relied on a cryptographic routing operation. Rasool et al. proposed multi-channel operational medium access control protocols for vehicular environment [18]. Although some of these schemes are good enough to solve privacy preserving and authentication problems but fail to highlight the uncertainty issue and efficient trust assessment among unknown participants, e.g., unknown vehicles on the road. Therefore, a trust assessment mechanism among communicating vehicles is really required. A trust management system allows participants on whom they should trust or not. We summarized some of the research work related to our proposed scheme into two parts, first is the trust model in vehicular networks, and second is secure routing in vehicular networks.

2.1. Trust Models in Vehicular Networks

Only a few trust models were defined in vehicular networks for honest information sharing. Here, we will summarize them and highlight their drawbacks. Although a lot of research regarding the security and privacy of vehicles has been conducted, it is mostly based on the security infrastructure or certificate distribution mechanisms by a central agent. In this study, however, we focus on a trust model that does not entirely rely on a central agent and the peers may establish trust relationship based on direct-indirect interactions and the short history of recent behaviors by forming VIoT.

2.1.1. Entry-Oriented Trust Models

Entity-oriented trust models can be divided into two categories: one proposed by Gerlach is based on sociological models [19], and the other suggested by Minhas et al. is a multi-faceted trust model [20]. In the first approach, trust intention is derived by using four input parameters as trust metrics. First, a situational decision that is based on the situation of an event irrespective of the trustee. Second, dis-positional trust irrespective of both trustee and the event situation, e.g., a kind of inherent optimism of the truster. Third, the central system-dependent trust mechanism in which both truster and trustees are included and provide assurance. Finally, a belief process is the assessment of the available data with a person’s own confidence in the final computed opinion, form the truster belief about a trustee in a specific context. However, one drawback of Gerlach’s work is the deficiency in the formalization of the architecture, i.e., a way to gather trust from different peers into a single opinion. The trust models such as multi-faceted features the quality of role-based and experience-based models as an evaluation standard to know vehicles trustworthiness. This method permits the vehicle to tell about others by sending the request, but limits the number of received reports. Perez and Marmol in [21] proposed TRIP and relied on reputation-based infrastructure to evict malicious nodes. In this method, the authors used three kinds of information sources, i.e., direct self-experience, a recommendation from neighbors, and recent history from a central authority. However, this idea fails to describe its genuineness in case of data sparsity and high speed of vehicles.

2.1.2. Data-Oriented Trust Models

Data-oriented trust models come up as one of the great efforts as they evaluate the authenticity of the shared data among vehicles. Raya et al. in [22] proposed the data-oriented trust models for VIoT. In these trust models, a user is more interested in the trustworthiness of the shared data than that of a an important evaluation metric. Data-oriented trust models need cooperation among neighbor vehicles to assess the authenticity of the disseminated data. Huang et al. [23] proposed a voting-based system with different voting weights depending on its closeness to the place of the event. The authors in [24] proposed a deterministic approach to measuring the trust level of the received message by using the received signal strength (RSS) to calculate the distance and vehicle’s geolocation, i.e., position coordinate. Sohail et al. [13] proposed a multi-hop trust assessment scheme using a subjective logic framework among vehicle groups. This scheme describes the multi-hop trust assessment by considering prior and generated uncertainties in the shared data among vehicles. However, a major concern in data-oriented trust models is in latency and sparsity. As various sources will generate a large amount of data, a central entity is needed to perform operations efficiently. Subsequently, it increases the communication delay.

2.1.3. Combined Trust Models

Combined trust models [25] overcome the drawbacks of the above mentioned trust models in VIoT. This trust model has an advantage to find the trustworthiness of both the shared data and the node itself. An attack-resistant trust (ART) scheme proposed in [26] calculates the trustworthiness of both data and shared messages among vehicles to resist against malicious attacks. The authors in [26] took functional and recommended trust to reach the final trust value, but they did not describe a data-sparsity problem in VANET. On the other hand, the author in [11] proposed centralized and distributive propositions so that it can handle a data-sparsity issue in high density vehicular network using a TW algorithm. The disseminated data is assessed first by taking direct interaction and recommendations, while the centralized authority (CA) acts to testify the authenticity of vehicles every time, which join or leave a network. Also, the storage server link with the central cloud is used to maintain vehicle social groups and manage trust regarding different vehicle behavior. In this way, the CA can have double check to evict the malicious vehicle in the network.

2.2. Secure Routing in Vehicular Networks

Routing protocols [27] act as a binding force among users in ad-hoc networks. Generally, we have two routing conditions, i.e., reactive and proactive routing protocols. Typically, the proactive routing protocol requires much bandwidth because paths among interacting users are maintained even if they are out of services. AODV is one of most popular approaches as the reactive routing protocol for mobile ad hoc networks because of its on-demand feature [28], which means that a node will only perform routing operations when it wants to discover a routing path towards other nodes for communication.
Moreover, the authors in [29] used real time traffic monitoring information with the help of GPS map and Sumo simulators as an enhanced version of AODV. Bravo et al. in [30] used the optimized reactive AODV routing over virtual nodes to gain some promising route results. Furthermore, some researchers used a complex cryptographic processing operation called authenticated anonymous secure routing in wireless ad hoc networks combined with AODV [17]. The authors in [31,32] proposed reactive and multi-path routing for MANET based on fuzzy logic and Markov chain phenomena. Li et al. in [33] proposed trust-based secure routing using subjective logic. Although the authors gain some promising results in above mentioned schemes, we argue that subject logic [34] is a more powerful probabilistic tool to highlight uncertainty and suspicious factor of unknown participants. Based on the existing work, we argue that the proposed TER secure routing is also suitable in this environment. The TER using the TW algorithm efficiently searches routes and solves massive trust assessment problem with uncertainty consideration.

3. System Model, Trust Model and Design Goals

3.1. System Model

A typical ITS scenario with a central authority, server, RSUs, and vehicles equipped with digital computers and on-board sensors is under consideration as shown in Figure 2. In particular, we consider a vehicular network topology, in which an individual user vehicle wants to assess trust of all other users vehicle within its transmission range. It is assumed that a centralized architecture is adopted to initialize the network and maintain a brief history of the vehicles, i.e., an opinion table and trust score. After the initial setup, the vehicles can authenticate each other by using the proposed scheme to reduce extra routing overhead, bandwidth, and time. The role of each network entity is as follows:
TA: A TA has a very significant role regarding registration of all RSUs, servers, and vehicles. Also, it has sufficient storage space for data servers, so it can maintain all evaluations records and a brief history of vehicles.
RSUs: RUSs communicate with vehicles through wireless channels such as base stations in cellular networks. The RSUs can be the first step to the network initialization and baseline for the first step towards security.
Vehicles: Vehicles on the road can be considered to be mobile nodes equipped with the on board unit (OBU). The vehicles within the specified transmission range can use the proposed TER scheme to search the routes among neighbor vehicles in VIoT. Among these vehicles, there are requesting and target vehicles.

3.2. Trust Model

We have made the following assumptions regarding the trustful roles of the entities in VIoT.
TA: A TA, which a central agent of the whole system, is under strong physical protection and not affected by adversaries.
RSU: RSUs are connected to the server through a secure communication channel. They will tackle to adversaries and never disclose internal information. However, it might be possible that some strong adversaries can hack this or even deploy bogus RSU. Nevertheless, The TA can inspect and recover RSU at a high level, if detected to be compromised.
Requesting Vehicle: It is assumed that the requesting vehicle is honest when computing the trust of a target vehicle for relaying information. Meanwhile, it also concerns about the privacy of the target vehicle.
Target Vehicle: Because vehicles are driven by humans, there is a chance to be selfish for saving its resources and to drop messages deliberately. To minimize this effect, an opinion table is built on each vehicle which is maintained and updated by the TA.

3.3. Design Goals

Vehicular networks are challenging due to network dynamics and high speed. Having these challenges, it is not easy to accurately assess trust among vehicles. To cope with these challenges, the following design goals are desirable.
  • Accurate trust assessment: Many malicious attacks can interrupt vehicular networks. During the aforementioned situation, a trust management scheme is urgently needed to rank good and bad vehicles.
  • The relay ratio improvement: The target vehicle in VIoT may drop the information due to selfishness or other packet dropping attacks. In this situation, if a requesting vehicle randomly selects a target vehicle, then the relay ratio will be degraded. Therefore, we need an efficient trust assessment scheme to improve the relay ratio by selecting a reliable vehicle.
  • Robustness against adversaries: The central security architecture should be capable of tackling adversaries, i.e., the collusion of vehicles to provide bogus feedback to RSU [35]. The central authority also makes sure that RSUs are not compromised in VIoT.

3.4. Adversary Model

Due to openness and high-speed, vehicular networks are more susceptible to security attacks. In VIoT most of the outside adversary may be tackled by central architecture. The inside malicious attacks are difficult to recognize and need a suitable trust algorithm to evict them. Following malicious attacks are considered in this paper.
  • Simple Attack (SA): In this attack, an attacker manipulates other nodes to interrupt the normal communication going on by altering the route information and data forwarding packets.
  • Black Hole Attack (BH): In the Black hole attack, an attacker first convinces the normal node by claiming that it has the shortest path to its desired destination. Once this normal node sends all packet to the attacker and after getting all packets, it drops all packets, and the normal node becomes a victim. The attacker is difficult to recognize and remains active in the system.
  • Zigzag (On-and-off) Attack (ZA): In this attack, the malicious nodes may act good and bad with changing alternative behavior. The malicious node on for a few seconds to send some packets and then suddenly gets off and drops the packets due to many selfish reasons.

4. Trust Model

We describe our trust model in two parts. The first is to calculate node trust with the help of direct and indirect trust using the Bayesian and subjective logic framework. The second is to calculate the path trust, which is evaluated by combining the trust values of all the vehicle users along a path with the efficiency of the TW algorithm.

4.1. Classification of Trust Types

(a) Vehicle historical trust: A brief history of vehicle trust can be taken from the central system. However, when two vehicles interact, we used data packet forwarding (DFR) and control packet forwarding ratio (CFR) as trust factors. Also, we assign weights to these trust factors to monitor the overall historical trust of the targeted vehicle.
(b) Vehicle current trust: A vehicle current trust is evaluated by the latest interactions among vehicles to predict future vehicle behavior using Bayesian network theory. It is computed by the latest interactions among vehicles to predict future vehicle behavior using Bayesian network theory. It is computed as a direct trust assessment based on physical vehicle interactions. Meanwhile, to accurately assess trust among vehicles, recommended or indirect trust is assessed with the help of novel 3VSL, which also highlights the generated uncertainty of an event. The prior uncertainty of an event remains fix or unchanged.
(c) Route trust: We choose to find the credibility of route in term of packets forwarding, and denoted as route trust value (RouteTV). When TW starts to discover a route, it must assure selected route authenticity. The route trust is calculated by combining the trust of intermediate nodes [36]. Also, the total route must be higher than the threshold level.

4.2. Direct Trust

In evaluating direct trust we used sliding window mechanism to take the latest interactions first. The latest event E can be divided into t time periods, i.e., E = [ E 1 , E 2 , E 3 , , E t ] . It is supposed that in each event E i , node x can monitor n i times the forwarding behavior of node z. The packet forwarding ratios of node z in time event E i is denoted by a vector V n i = [ V n 1 , V n 2 , V n 3 , , V n i ] . Here, we set threshold level (L), if the number of time for which packet forwarding ratio is higher then threshold (L). If the number of times of which packet forwarding ratio m i is below threshold then L is n i m i . We adopted the Bayes theorem framework to reduce errors in computing the reputation of a targeted node. Reputation in Bayes theorem is calculated using the previous reputation level and likelihood function.
The Dirichlet distribution [37] has three parameters [ α , β , γ ] , showing positive, negative, and neutral evidence, while the total sum of an event is not greater than 1. Dirichlet distributions are commonly used as prior distributions in Bayesian statistics. Here, the current reputation vector represents the posterior and the last reputation vector shows prior probability. The general form of Dirichlet distribution function for these two functions is D i r ( a , b ) = x a 1 ( 1 x ) b 1 / D ( a , b ) , where D ( a , b ) in this equation is a normalization constant and ensure that the total probability is 1. We set D i r ( a , b ) = a b x a 1 ( 1 x ) b 1 d x , where x implies [0, 1]. We assume that R i represents the value of the ith reputation evaluation vector according to the Dirichlet distribution, and then calculation of posterior probability is R i = ( f i ( x ) a b f i ( x ) R i 1 d x ) R i 1 , where a and b are integration interval. In this paper, two mutually independent events that are satisfy by Dirichlet distribution are taken as whether the forwarding rate is higher than the threshold value L, then it can be obtained f i ( x ) = C n i m i x m i ( 1 x ) n i m i . The reputation evaluation vector sequence of node x to z is R n = [ R 1 , R 2 , R 3 , , R t ] . As mentioned above, if R i 1 D i r ( a i 1 , b i 1 ) , then R i D i r ( a i 1 + m i , b i 1 + n i m i ) then the values a 1 = m 1 , b 1 = n 1 m 1 , , a i = a i 1 + m i , b i = b i 1 + n i m i . Therefore, at beginning, i.e., t 0 , we can set a 0 = b 0 = 1 , R 0 b e t a ( 1 , 1 ) where b e t a ( α , β ) denotes a beta distribution. One of the trust metrics t d i in E i time period can be computed and updated by using the expectation of beta distribution. The formula given as follow:
t d i = a i a i + b i ,
for i = 1 , 2 , 3 , . The direct trust of node z concerning node x observation is also affected by the amount of packet forwarded and interaction time. Therefore we use total packets forwarded and time attenuation factors for the above scenario. Then we use the following equation to compute direct trust.
d t x z = i = 1 t ρ t i M x z i M t d i ,
where i = 1 t ρ t i ( 0 < ρ < 1 ) denotes the time attenuation function with a weighting (or forgetting) factor ρ , and M x z i denotes the amount of packets forwarded by node z for node x during the time event E i . As more packets are forwarded, the confidence of the obtained trust value increases.

4.3. Indirect/Recommended Trust

For computing indirect trust, we choose subjective logic probabilistic theory as an advantage to highlight uncertainty and misbehavior detection [38,39,40,41]. Random vehicular network topology and dynamic communication patterns involve reasonable uncertainty among concerning vehicles. To cope with it, we adopted a novel 3VSL framework [12]. 3VSL express evidence as ternary opinion space vector and uses Dirichlet distribution to model this opinion vector, which can be expressed as
w z x = [ b z x , d z x , n z x , e z x ] , b z x + d z x + n z x + e z x = 1 ,
where w z x is a opinion vector and shows x direct opinion in z. The elements in opinion vector are b z x , d z x , n z x , and e z x . Here, b z x and d z x show solid evidence in favor and disfavor of an event to reach some conclusions, respectively. Neutral evidence includes prior e z x and posterior uncertainty n z x , which neither supports positive or negative evidence. A vehicle may gain recommended trust if its subjective opinion is not enough to reach on solid conclusion.

4.3.1. Consensus Combination

Let, w y x and w y z , be x’s and z’s trust in y respectively. Then w y x = [ b y x , d y x , n y x , e y x ] and w y z = [ b y z , d y z , n y z , e y z ] . Then consensus operation of x and z about trustworthiness of y is given by w y x , z = w y x Θ w y z = [ b y x , z , d y x , z , n y x , z , e y x , z ] . Four elements of w y x , z are as follows:
b y x , z = b y x e y z + b y z e y x e y x + e y z e y x e y z , d y x , z = d y x e y z + d y z e y x e y x + e y z e y x e y z , n y x , z = n y x e y z + n y z e y x e y x + e y z e y x e y z , e y x , z = e y x e y z e y x + e y z e y x e y z .
The consensus operation Θ decreases uncertainty as it comes from both vehicles subjective experience about the particular vehicle.

4.3.2. Discounting Combination

Assume two vehicles x and z where x trusts z, denoted by w z x = [ b z x , d z x , n z x , e z x ] , for the purpose of judging the trustworthiness of y. In addition z has trust in y, denoted by w y z = [ b y z , d y z , n y z , e y z ] . Vehicle x can then derive its trust in y by discounting z’s trust in y with x’s trust in z, denoted by w y x : z = w z x w y z = [ b y x , z , d y x , z , n y x , z , e y x , z ] . Four elements of w y x : z are as follows:
b y x : z = b z x b y z , d y x : z = b z x d y z , n y x : z = 1 b z x b y z b z x d y z e y z , e y x : z = e y z .
The discounting operation △ increases uncertainty as it comes from building one vehicle subjective opinion on other vehicle’s objective assessment.

5. Framework for Proposed TER

In our proposed framework, we have three stages. In the first stage, a basic routing protocol is operated among neighbor vehicles and nodes observation. At the second stage, nodes perform trust establishment operations such as trust recommendation, consensus, trust judgment, trusted routing operations, and trust update. In the third stage, vehicles can manage trust relationships using the proposed TER. The general procedure for a vehicle to join or leave the existing VIoT is as follows: In the beginning, most of the vehicles are uncertain towards each other, i.e., with less trust and high uncertainty. Therefore, at the start, vehicles are unable to fully trust or distrust a vehicle due to a lack of interactions. For example, a vehicle A wants to discover a path towards a vehicle B but yet unsuccessful as due to high uncertainty. At this stage, the vehicle A can use some basic routing operation to interact with the vehicle B, which helps to reduce its opinion towards the vehicle B. After the initialization of VIoT, each vehicle will have some positive or negative interactions towards each other, and uncertainty will be reduced.
At network initialization vehicles use the TER scheme, which is based on the trust model to perform routing operations. In our scheme to reduce extra routing overhead, vehicles can use a trust recommendation protocol by exchanging trust scores with their routing request. A receiving vehicle will use their trust scores and combine all the recommended and observed opinions into the final one. A vehicle will follow the route discovery and maintenance operations proposed in the TER scheme. At network start, how a vehicle will join or leave the VIoT, depends on the proposed algorithm and security requirements.

5.1. Routing Table Extension

In the proposed TER, the trust repository counter is added to the original AODV routing table, as given in Table 1. Once the initial setup among vehicles in VIoT is established, vehicles can use the TER scheme, which is based on the above mentioned framework.

5.2. Trust Judging and Update Rules

In our scheme, we choose the threshold level to be 0.5, and intermediate nodes actions with respect to this threshold are given in Table 2. We can use a high threshold value if the system is sensitive to security requirements.
  • If the belief of neighbor vehicle x in z is greater than the given threshold, then it will trust vehicle z and vise versa.
  • If the uncertainty of vehicle x in vehicle z is greater than 0 . 5 , x ask for a digital signature verification from vehicle z and waits for it. If x successfully verifies z’s signature then x will start communicating with vehicle z.
  • If two neighbor vehicles had positive interaction, then the trust repository is updated by increment the trust in the correspondent vehicle, and the inverse is true also.
  • If two vehicles have any uncertainty between each other, then we use w z x = ( 0 , 0 , 0 , u ) . Here, u is the maximum uncertainty from vehicle x to vehicle z. It is because the two vehicles never interacted by the given expiry time of 5 s.

5.3. Information Exchange Protocol

Previously, proposed trust models rarely considered trust recommendation exchange protocol among these distributed vehicle users in VIoT. However, this information exchange helps us to reduce extra routing overhead between neighbor vehicles. This mechanism contains three types of messages, i.e., TREQ (Trust Request), TREP (Trust Reply), and TWARN (Warning), as can be seen in Figure 3. Generally, if a vehicle x wants to check the neighbor vehicle y’s trustworthiness, it will broadcast a trust request TREQ message. The format for TREQ is given in Figure 3, the truster type is filled with 0, and the trustee field filled with IP address of vehicle y. If one of x’s neighbor let say, z receives this broadcast message TREquation Vehicle z will reply by setting the type field to 1, and the opinion field is filled with the updated value from vehicle y to z. In this recommendation a vehicle can send route request or route reply to multiple vehicles in one routing packet.
The third type of message is TWARN that is used to report invalidation in standard reactive routing process by type field set to 2 after that neighbor vehicle can know about the trust warning.

6. Route Discovery by TW

In this section, we have used two algorithms, i.e., TW and authentication. TW, which is used to search for routes efficiently. The second algorithm is based on trust judgment rules given in Table 2. These two algorithms complete trusted route discovery.

6.1. Design of TW

The TW algorithm uses the Breadth-First Search (BFS) method to search routes more efficiently. We have taken vehicular topology with n users and form opinion matrix of n × n as follow
O M = w 11 w 12 w 1 n w 21 w 22 w 2 n w n 1 w n 2 w n n ,
while opinion w i j shows i’s direct relation on j, similarly each element in O M shows direct relationship between each other. From user i (truster) point of view other elements can be shown in individual opinion vector as follow
y i k = [ Ω i 1 k , Ω i 2 k , , Ω i j k , , Ω i n k ] T ,
where Ω i j k represents user i’s opinion on j as TW algorithm walks k hops on the network. The initial form of single element Ω i 1 ( 1 ) in opinion vector is represented as
Ω i 1 ( 1 ) = w i j , i f u s e r i d i r e c t l y c o n n e c t s t o j u , u n c e r t a i n o p i n i o n o t h e r w i s e
where w i j shows direct relation from i to j. If i is not connected to j then it is replaced by uncertain opinion u. In this way, the TW algorithm update the individual vector in iterative manner by searching the network hop by hop fashion.
y i k = O M T y i ( k 1 ) .

6.2. Operations in TW

The TW algorithm starts from user i and searches the network as depicted in Figure 4. Suppose the TW algorithm finds users that are not in his territory and ( k 1 ) -hop away from user i. Among these users, we assume that user j is k-hop away from user i, and among these users, m are directly connected to j. We label these m users as s 1 , s 2 , , s m .
When the TW algorithm moves from the previous level to the next level, i.e., from the ( k 1 ) th level to the kth level, it updates the corresponding opinion of the user i’s on user j as follows:
Ω i j k = Θ ( Ω i s 1 ( K 1 ) , w s 1 j ) , . . . , ( Ω i s m ( K 1 ) , w s m j ) Ω i j k 1 = Θ ( Ω i s 1 ( K 2 ) , w s 1 j ) , . . . , ( Ω i s m ( K 2 ) , w s m j ) ,
The Equation (10) combines all m opinions that are computed as discounting w s 1 j by Ω i s l , for all l = 1 , 2 , , m . If Ω i j k u , i.e., the TW algorithm already had user i’s opinion on user j from the previous interaction. In this case, user i’s opinion on user j is replaced with Ω i j k . In other words, only the opinions Ω i s k 1 where w s j u are used in individual opinion vector updating. Finally, the TW operation multiplies matrix and individual vector y i k 1 to yield an updated vector y i k as follows:
y i k = O M T y i ( k 1 )
= Θ ( Ω i 1 k 1 , w 11 ) , , ( Ω i n k 1 , w n 1 ) Θ ( Ω i 1 k 1 , w 12 ) , , ( Ω i n k 1 , w n 2 ) Θ ( Ω i 1 k 1 , w 1 n ) , , ( Ω i n k 1 , w n n )
= [ Ω i 1 k , Ω i 2 k , , Ω i j k , · , Ω i n k ] T .
In a matrix-vector multiplication, we use the operations defined in 3VSL. Let us look at element Ω i j k in y i k , where i j . It is computed by multiplying vectors [ Ω i 1 k 1 , Ω i 2 k 1 , . . . , Ω i n k 1 ] T and [ w 1 j , w 2 j , . . . , w n j ] .

6.3. TW Algorithms

TW algorithm uses two nested loops, so each loop has a time complexity of O ( n ) × O ( n ) = O ( n 2 ) . If H is searching depth of network and H = K time complexity its will be O ( K n 2 ) . It is much suitable for a highly dense network as compared to other route search algorithm, i.e., AT [11]. AT algorithm has high time complexity because it needs to search one to one user in network. However, this is not feasible for trust assessment in high-density VIoT. The time complexity in computing each user trustworthiness will be O ( ( n 1 ) n k 1 ) = O ( n k ) . Here, k shows the total searching depth in the network.
Algorithm 1 starts from line 3, defining a minimum number of hops. Line 4, iteratively search the number of hops on the network. In TW, we used two nestle loops in which line 5–14 updates the indirect opinion Ω i j , and lines 7–12 compute all opinions from w s j u . Line 8 shows i’s direct opinion on one of the sibling of j, i.e., s. At line 9 i discount s’s opinion on j to update Ω i j ( k ) . Line 10 combine all previously computed opinion from w s j u .
Θ ( ( Ω i 1 ( K 1 ) , w 1 j ) , . . , ( Ω i n 1 ( K 1 ) , w n 1 j , ( Ω i n ( K 1 ) , w n j ) .
Line 13 uses Ω i j to updates corresponding elements in individual opinion vector. After updating All possible opinions at line 14, TW search next level.
Algorithm 1: Route Discovery by TW
REQUIRE: A directed graph G with a truster i and the maximum searching level H
ENSURE: i s opinion on J where i j
1. Initialize O M and O V i ( 1 ) based on G
2. k 1
3. While k < H do
4. k k + 1
5. for all columns C j O M s.t. j i do
6. Ω i j k U
7. for all direct opinion w s j C j s.t. w s j u do
8. Ω i s ( k 1 ) y i ( k 1 ) [ s ]
9. if Ω i s ( k 1 ) u then
10. Ω i j k Θ Ω i j K , Δ ( Ω i s K 1 , w s j )
11. end if
12. end for
13. y i ( k ) [ j ] Ω i j ( K )
14. end for
15. end while
16. return y i k
The pseudo-code for user authentication is described in Algorithm 2. Here, we set the threshold with 0 . 5 for user authentication and make decisions to update Ω i j k according to the rules given in Table 2.
Algorithm 2: Authentication from user i to j in k-hop by TW
Exchange opinion about opinion matrix i with all neighbors of individual vector j using the TW information exchange protocol.;
1. /* Verify the trustworthiness of i j */
2. /* Ω i j k u and judge the next step using conditions set in Table 1 */
3. if  Ω i j , b k 0 . 5
4. trust i j and forward RREQ/RREP
5. elseif  Ω i j , d k 0 . 5
6. distrust i j for expiry time
7. elseif Ω i j , u k 0 . 5 request and verify digital certificate
8. else
9. /* the confidence about trustworthiness is decreased*/
request and verify j’s certificates, by default
10. endif

7. Route Maintenance

Route maintenance is the procedure by which a source node is able to detect the faults of the forwarding path towards the destination node. These faults can be due to some malicious attack pattern, with link broken event, and even below defined threshold trust level. In this scenario, the source node needs to reroute the information with an alternative route. In case of link broken event, i.e., the topology has changed, or the route trust does not meet the criteria so that it will trigger new trust judgment. Another thing Route maintenance assures the packet delivery within a specific time interval after a route cache crosses the maximum valid time, the packet will expire automatically.

7.1. Computation of Route Trust

Refer to the axiom [36]; the total is equal to the route trust values of intermediate nodes. The route trust at time t (denoted by RouteTV(t)) is computed by route search algorithm TW and it will be equal to combined trust values of the intermediate nodes.

7.2. Route Hand-Off

When the target node has detected that the current route trust is going to be un-trusted, a Flow-Hand-off message is generated by the target and propagated using FLOW-REQ message. After the source receives a Flow-Hand-off message, it chooses the best route to forward the received information.
After detecting another best route that completes the minimum trust threshold requirement, the source node sends the FLOW-SETUP message. This FLOW-SETUP message is the same as it was sent the first time during route setup, except it has changed the path from source to target node. The Route Hand-off process is depicted in Figure 5. If the RouteTV (Route trust value) for the requirement of packet forwarding is above 0.5. In Figure 5a, the old route is along of nodes (i.e., A B , C , E , F , R o u t e T v = 0 . 53 ) and if this route trust value RTv is about to un-trusted ( R o u t e T V p = 0 . 43 ) , so the Route Hand-off is performed and the new route is now (i.e., A B , D , E , F , R o u t e T v = 0 . 55 ).

7.3. Route Error

The target node generates route error request RERR by link layer feed back that is sent back to the source node to acknowledge link failure. Also, if a particular path remains unused for a specific period of time, then it will be considered invalid and removed from the source node cache.

7.4. Dealing with Node Mobility

Based on our proposed trust model, nodes could identify malicious or normal users along its path. The trust values among neighbor nodes can also be shared with the help of information exchange protocol in our scheme to reduce routing overhead [36]. At start generally, the uncertainty towards each other is normally high, still, when these nodes start to move and interact with each other, this uncertainty gradually decreases by positive or negative interaction, and trust mechanism is there for the entire network. For nodes with lower trust values the network does not send route query packets again, which reduces routing overhead and latency between end to end users. Also, we propose the latest trust interaction among neighbor nodes that comes along the last used route information along the path. Since vehicular network topology changes the time being to update the trust of the connection and time inform about Hand-off process.
A single node only stores recent interaction history and trust values of neighbor nodes, not all route-cache history as network topology in the vehicular network changes frequently. So a node is free to join or release the network any time. Also, if a particular path remains unused for a specific period of time, then it will be considered invalid and removed from the source node cache. Meanwhile, a node can learn and cache multiple routes to the target node using the extension of the TW algorithm. It allows that if the route changes rapidly, a node with multiple route cache to the target node can try to find alternatives in case if certain links get failed. This multiple route-cache also reduces overhead as it does not need to perform new route discovery every time the link failure is detected.

8. Simulation Setup and Results

In the experimental setup, we have considered a scenario in which neighbor vehicles make small social groups in VIoT. To evaluate trustworthy of the target vehicle for relay/receive information within this group, we have used NS-2.35 [42] network simulator. Performance analysis in terms of throughput, latencies, packet loss, is conducted to validate our proposed TER scheme. These simulations are performed using Intel Core-i3 and 4 GB SDRAM with 2.66 GHz Lenovo machine running on Ubuntu-12.04, 64-bit operating system. The basic parameters of our simulation are listed in Table 3.

8.1. Attack Pattern and Evaluation Metrics

To resist against different kinds of internal malicious attacks, the three routing protocols behave as follows, (1) AASR applies an initial complex cryptographic algorithm during initialization. (2) AODV takes no action against these attacks and forwards the packet as it gets. (3) TER can detect the malicious user via the updated trust score and get rid of the attackers. Furthermore, we have considered the zigzag and black-hole attacks as an adversary model.
Also, packet throughput, latency, and packet loss are evaluation metrics. First, the performance analysis is carried out among our proposed TER, Authenticated Anonymous Secure Routing AASR, and original Ad-hoc On-demand distance vector routing AODV using different vehicle mobility and increasing malicious nodes. In other performance analysis, TER and AODV are tested under black-hole and zigzag attack pattern. The time complexity analysis to validate the efficiency of TW is also carried out by considering two real-world data sets, i.e., (Advogato and PGP). Third, uncertainty analysis is also done that predicts the general behavior of vehicles during network initialization and setup.

8.2. Performance Analysis

8.2.1. Test: 1 Packet Throughput, PDR, and E2E Delay with Different Vehicles Mobility and Increasing Malicious Nodes

In this part, we first carried out performance analysis among our proposed scheme TER, original AODV, and AASR. Under different vehicles mobility and an increasing number of malicious nodes, the performance of these three schemes varies over time. From Figure 6, it is clear that TER outperforms the other two routing schemes, i.e., AASR and AODV. As vehicles reaches up to 10 m/s our scheme still have 50 % of throughput, see Figure 6a. In second Figure 6b, as half of nodes become malicious (25 nodes) our scheme TER can achieves 45 % packet throughput, AASR gives 35 % , and AODV gives 30 % . So it favors the TER scheme under these two scenarios.
Second, Packet loss is also an important metric to check any communication network performance. In Figure 6c, our proposed scheme has less packet loss drop. Since AODV takes no additional actions, so it has a high packet loss of 75 % at V = 10 m/s. AASR spend some time on initial cryptographic processing, so packet loss is 70 % at V = 10 m/s. TER minimizes this effect by using trusted information exchange among neighbor vehicles. TER has minimum packet loss of 55 % at V = 10 m/s. Also, when we have half of the nodes malicious, i.e., (25 nodes are malicious), the performance of these three schemes varies. AODV has 65 % of packet loss, AASR has 55 % of packet loss, and TER has 45 % of packet loss, which is minimum among these schemes, see Figure 6d.
Third, E2E delay is a vital metric for measuring any network performance, especially for a delay-sensitive network such as VIoT. In this analysis, we compared our proposed scheme TER with AASR and AODV. AODV has E2E delay of 150 (ms) at V = 10 m/s. However, AASR spends time in the route discovery and making some initial security processing, so it has a high E2E delay of 190 (ms) at V = 10 m/s. TER minimizes this effect by using trusted information exchange among neighbor vehicles. TER has E2E delay of 130 (ms) at V = 10 m/s, see Figure 6e. Similarly, in the presence of 50 % malicious nodes, TER has a minimum E2E delay of 50 (ms). TER outperforms the other two routing schemes as AODV and AASR have E2E delay of 110 (ms) and 90 (ms) respectively, see Figure 6f.

8.2.2. Test: 2 Packet Throughput, PDR, and E2E Delay under Black Hole and Zigzag Attacks

In this part, first, we carried out a performance analysis between our proposed scheme TER and AODV. Under the malicious attacks, the performance of these schemes varies. From Figure 7, it is clear that TER outperforms original AODV schemes. At start of simulation our scheme achieves 350 (bits/s), while AODV gives 270 (bits/s), please refer Figure 7a. In Figure 7b, zigzag attacks frequently change its pattern as good or bad nodes, so our scheme enabling trust mechanism outperforms AODV and achieves better throughput. TER and AODV have an average throughput of 300 (bits/s) and 230 (bits/s) respectively under zigzag attack.
Second, under the black hole attack, as the start of the simulation, both schemes have lower packet loss ratio, after a few seconds, the packet loss of AODV is 45 % , and our scheme has 20 % , see Figure 7c. In Figure 7d, zigzag attacks frequently change its pattern as on-off, our scheme outperforms AODV scheme and achieves minimum packet loss. TER minimizes this effect using trust information exchange; after a few seconds, TER gives 30 % of packet loss. However, the original AODV has no mechanism of trust-based information; it simply routes packets, so it gives a 50 % packet loss ratio.
Third, at the start of the simulation, both schemes have less E2E delay, after a few seconds, the E2E delay of AODV is 3 (s), and TER has a delay of 1 (s), see Figure 7e. In Figure 7f, zigzag attack frequently changes its pattern as on-off, our scheme outperforms the AODV scheme and achieves minimum E2E delay. TER minimize this effect using trust information exchange; after a few seconds, TER gives 0 . 5 (s). The original AODV has no mechanism of trust-based information, and it simply routes the received packets, so increases E2E delay as 2 (s).

8.3. Execution Time

We analyzed the execution time in the route discovery phase with the help of two online software development communities, namely Pretty good privacy PGP and Advogato [43,44]. George’s opinion is used to build the honesty of Alice in the previously mentioned software development. This trustworthiness among connected users is categorized as given in Table 4. The execution time of these two software development communities is analyzed with AT [11] and TW algorithm.
In PGP and Advogato datasets, the edge weights are given in ordinal values. To convert these values into real numbers on a scale of 1, we used linear transformation techniques [45,46]. Table 5 lists enumeration of these datasets trust values to trust levels.
The accuracy of the AT and TW algorithm is checked in addressing the execution time of the trust assessment problem efficiently. We used Python 3.7 [47] on Window-7-64 bit operating system. We run these algorithms on the sub-graphs containing the edge from truster to trustees. The PGP and Advogato datasets are divided into three parts based on the users. The user’s category in Advogato and PGP are (<1K, 1K–3K, and >3K), (<7K, 7K–15K, and >15K). After that, we plot the execution time of AT and TW algorithms based on the above-mentioned user categories in Figure 8.
For highly dense network AT algorithm need to execute O ( n K ) times to solve massive trust assessment problem, which corresponds to a larger searching depth and becomes extremely slow. On the other hand, TW is much efficient for trust assessment in VIoT, as execution time converges to O ( n 2 ) . Combining and discounting operation in TW is a little complex as compared to summation and multiplication. However, considering both convergence time and accuracy, TW is an optimal solution to the efficient trust assessment problem in large scale VIoT.

9. Conclusions

The increasing number of vehicles on the road can be an excellent source for crowd-sourced applications, VIoT, and V2X services. In all of these applications, the authenticity of disseminated information among neighbor vehicles is much needed, as vehicular networks are highly affected by human factors and malicious attacks. Furthermore, previously proposed security solutions are mostly based on public key infrastructure. These traditional solutions much emphasis on security and privacy issues, but ignores the notion of uncertainty and trust management among vehicles in VIoT. Therefore, this paper proposes trust enhances routing TER by taking advantage of the TW algorithm for efficient route discovery. Also, trust assessment is efficiently achieved by the TW algorithm in terms of better execution time in a large vehicular network. A performance analysis is carried out to compare our proposed TER scheme with two other AODV and AASR routing schemes. Experimental results validate the accuracy of our proposed scheme in terms of better throughput, lower packet drop, and the end to end delay. In the future, we will enhance this research by considering more recent attack patterns e.g., Man in the middle attack, Masquerading attack, and so on, and try to establish an algorithm to tackle these attacks in vehicular networks.

Author Contributions

Conceptualization, M.S. and R.A.; Data curation, M.S.; Formal analysis, M.S., R.A. and M.K.; Investigation, M.S., R.A., M.K., S.A. and S.M.; Methodology, M.S., R.A., S.A., S.M., Y.B.Z. and H.Y.; Resources, M.K., S.A. and S.M.; Software, M.S., M.K., S.A. and S.M.; Supervision, Y.B.Z. and H.Y.; Validation, Y.B.Z. and H.Y.; Visualization, Y.B.Z. and H.Y.; Writing—original draft, M.S. and R.A.; Writing—review & editing, Y.B.Z. and H.Y. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Acknowledgments

This research was supported by the National Research Foundation of Korea grant funded by the Korean government (Ministry of Science and ICT; 2019R1A2C1083988) and by the Ministry of Science and ICT, Korea, under the Information Technology Research Center support program (IITP-2020-2016-0-00313) supervised by the Institute for Information & Communications Technology Planning & Evaluation.

Conflicts of Interest

The authors declare no conflict of interest in the publication of this paper.

References

  1. Zikria, Y.B.; Afzal, M.K.; Kim, S.W. Internet of Multimedia Things (IoMT): Opportunities, Challenges and Solutions. Sensors 2020, 20, 2334. [Google Scholar] [CrossRef] [PubMed]
  2. Schmidt, T.; Philipsen, R.; Themann, P.; Ziefle, M. Public perception of V2x-technology-evaluation of general advantages, disadvantages and reasons for data sharing with connected vehicles. IEEE Intell. Veh. Symp. 2016, 1, 1344–1349. [Google Scholar]
  3. Mai, A.; Schlesinger, D. Connected Vehicles. 2011. Available online: https://www.cisco.com/c/dam/en_us/about/ac79/docs/mfg/Connected-Vehicles_Service_Provider.pdf (accessed on 15 May 2020).
  4. Mejri, M.N.; Ben-Othman, J.; Hamdi, M. Survey on VANET security challenges and possible cryptographic solutions. Veh. Commun. 2014, 1, 53–66. [Google Scholar] [CrossRef]
  5. Wang, L.; Liu, X. NOTSA: Novel OBU with three-level security architecture for internet of vehicles. IEEE Internet Things J. 2018, 5, 3548–3558. [Google Scholar] [CrossRef]
  6. Jiang, S.; Zhu, X.; Wang, L. An efficient anonymous batch authentication scheme based on HMAC for VANETs. IEEE Trans. Intell. Transp. Syst. 2016, 17, 2193–2204. [Google Scholar] [CrossRef]
  7. Al-Kahtani, M.S. Survey on security attacks in vehicular ad hoc networks (VANETs). In Proceedings of the IEEE 6th International Conference on Signal Processing and Communication Systems, Gold Coast, QLD, Australia, 12–14 December 2012; pp. 1–9. [Google Scholar]
  8. Hu, H.; Lu, R.; Zhang, Z.; Shao, J. REPLACE: A reliable trust-based platoon service recommendation scheme in VANET. IEEE Trans. Veh. Technol. 2016, 66, 1787–1797. [Google Scholar] [CrossRef]
  9. Sohail, M.; Wang, L.; Ali, R.; Rahim, S.; Yao, J. Efficient data handover and intelligent information assessment in software-defined vehicular social networks. IET Intell. Transp. Syst. 2019, 13, 1814–1821. [Google Scholar] [CrossRef]
  10. Zhang, J. A Survey on Trust Management for VANETs. In Proceedings of the IEEE International Conference on Advanced Information Networking and Applications, Singapore, 22–25 March 2011; pp. 105–112. [Google Scholar]
  11. Sohail, M.; Wang, L. 3VSR: Three valued secure routing for vehicular ad hoc networks using sensing logic in adversarial environment. Sensors 2018, 18, 856. [Google Scholar] [CrossRef] [Green Version]
  12. Liu, G.; Yang, Q.; Wang, H.; Lin, X.; Wittie, M.P. Assessment of multi-hop interpersonal trust in social networks by Three-Valued Subjective Logic. In Proceedings of the IEEE conference on Computer Communications (INFOCOM), Toronto, ON, Canada, 27 April–2 May 2014; pp. 1698–1706. [Google Scholar]
  13. Sohail, M.; Wang, L.; Jiang, S.; Zaineldeen, S.; Ashraf, R.U. Multi-hop interpersonal trust assessment in vehicular ad-hoc networks using three-valued subjective logic. IET Inf. Secur. 2018, 13, 223–230. [Google Scholar] [CrossRef]
  14. Yu, H.; Lee, H.; Jeon, H. What is 5G? Emerging 5G Mobile Services and Network Requirements. Sustainability 2019, 9, 1848. [Google Scholar] [CrossRef] [Green Version]
  15. Liu, Y.; Wang, L.; Chen, H.H. Message authentication using proxy vehicles in vehicular ad hoc networks. IEEE Trans. Veh. Technol. 2014, 64, 3697–3710. [Google Scholar] [CrossRef]
  16. Chen, X.; Wang, L. A cloud-based trust management framework for vehicular social networks. IEEE Access 2017, 5, 2967–2980. [Google Scholar] [CrossRef]
  17. Liu, W.; Yu, M. AASR: Authenticated anonymous secure routing for MANETs in adversarial environments. IEEE Trans. Veh. Technol. 2014, 63, 4585–4593. [Google Scholar] [CrossRef]
  18. Rasool, I.U.; Zikria, Y.B.; Kim, S.W. A Review of WAVE Multichannel Operational MAC Protocols: QoS Analysis and Other Related Issues. Int. J. Distrib. Sens. Netw. 2017, 13, 1–22. [Google Scholar] [CrossRef] [Green Version]
  19. Gerlach, M. Trust for Vehicular Applications. In Proceedings of the IEEE Eighth International Symposium on Autonomous Decentralized Systems (ISADS’07), Sedona, AZ, USA, 21–23 March 2007; pp. 295–304. [Google Scholar]
  20. Minhas, U.F.; Zhang, J.; Tran, T.; Cohen, R. A multifaceted approach to modeling agent trust for effective communication in the application of mobile ad hoc vehicular networks. IEEE Trans. Syst. Man Cybern. Part C Appl. Rev. 2010, 41, 407–420. [Google Scholar] [CrossRef]
  21. Mármol, F.G.; Pérez, G.M. TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks. J. Netw. Comput. Appl. 2012, 35, 934–941. [Google Scholar] [CrossRef]
  22. Raya, M.; Papadimitratos, P.; Gligor, V.D.; Hubaux, J.P. On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks. In Proceedings of the IEEE 27th Conference on Computer Communications (INFOCOM), Phoenix, AZ, USA, 13–18 April 2008; pp. 1238–1246. [Google Scholar]
  23. Huang, Z.; Ruj, S.; Cavenaghi, M.A.; Stojmenovic, M.; Nayak, A. A social network approach to trust management in VIoT. P2P Netw. Appl. 2014, 7, 229–242. [Google Scholar]
  24. Soleymani, S.A.; Abdullah, A.H.; Hassan, W.H.; Anisi, M.H.; Goudarzi, S.; Baee, M.A.R.; Mandala, S. Trust management in vehicular ad hoc network: A systematic review. EURASIP J. Wirel. Commun. Netw. 2015, 1, 146. [Google Scholar] [CrossRef] [Green Version]
  25. Monir, M.; Abdel-Hamid, A.; El Aziz, M.A. A categorized trust-based message reporting scheme for VIoT. In International Conference on Security of Information and Communication Networks; Springer: Berlin/Heidelberg, Germany, 2013; pp. 65–83. [Google Scholar]
  26. Li, W.; Song, H. ART: An attack-resistant trust management scheme for securing vehicular ad hoc networks. IEEE Trans. Intell. Transp. Syst. 2015, 17, 960–969. [Google Scholar] [CrossRef]
  27. Patel, N.J.; Jhaveri, R.H. Trust based approaches for secure routing in VANET: A Survey. Procedia Comput. Sci. 2015, 45, 592–601. [Google Scholar] [CrossRef] [Green Version]
  28. Perkins, C.E.; Royer, E.M. Ad-hoc on-demand distance vector routing. In Proceedings of the WMCSA’99. Second IEEE Workshop on Mobile Computing Systems and Applications, New Orleans, LA, USA, 25–26 February 1999; pp. 90–100. [Google Scholar]
  29. Nzouonta, J.; Rajgure, N.; Wang, G.; Borcea, C. VANET routing on city roads using real-time vehicular traffic information. IEEE Trans. Veh. Technol. 2009, 58, 3609–3626. [Google Scholar] [CrossRef] [Green Version]
  30. Bravo-Torres, J.F.; López-Nores, M.; Blanco-Fernández, Y.; Pazos-Arias, J.J.; Ramos-Cabrer, M.; Gil-Solla, A. Optimizing reactive routing over virtual nodes in VANETs. IEEE Trans. Veh. Technol. 2015, 65, 2274–2294. [Google Scholar] [CrossRef]
  31. Xia, H.; Jia, Z.; Li, X.; Ju, L.; Sha, E.H.M. Trust prediction and trust-based source routing in mobile ad hoc networks. Ad Hoc Netw. 2013, 11, 2096–2114. [Google Scholar] [CrossRef]
  32. Xia, H.; Yu, J.; Tian, C.L.; Pan, Z.K.; Sha, E. Light-weight trust-enhanced on-demand multi-path routing in mobile ad hoc networks. J. Netw. Comput. Commun. 2016, 62, 112–127. [Google Scholar] [CrossRef] [Green Version]
  33. Li, X.; Lyu, M.R.; Liu, J. A trust model based routing protocol for secure ad hoc networks. In Proceedings of the IEEE Aerospace Conference Proceedings (IEEE Cat. No.04TH8720), Big Sky, MT, USA, 6–13 March 2004; pp. 1286–1295. [Google Scholar]
  34. Jøsang, A. A logic for uncertain probabilities. Fuzziness Knowl. Based Syst. 2001, 9, 279–311. [Google Scholar] [CrossRef]
  35. Yao, J.; Han, Z.; Sohail, M.; Wang, L. A Robust Security Architecture for SDN-Based 5G Networks. Future Internet 2019, 11, 85. [Google Scholar] [CrossRef] [Green Version]
  36. Pirzada, A.A.; Datta, A.; McDonald, C. Propagating trust in ad-hoc networks for reliable routing. In Proceedings of the International Workshop on Wireless Ad-Hoc Networks, Oulu, Finland, 31 May–3 June 2004; pp. 58–62. [Google Scholar]
  37. Fung, C.J.; Zhang, J.; Aib, I.; Boutaba, R. Dirichlet-based trust management for effective collaborative intrusion detection networks. IEEE Trans. Netw. Serv. Manag. 2011, 8, 79–91. [Google Scholar] [CrossRef]
  38. Cardoso, R.C.; Gomes, A.J.; Freire, M.M. A user trust system for online games—Part II: A subjective logic approach for trust inference. IEEE Trans. Comput. Intell. AI Games 2016, 9, 354–368. [Google Scholar] [CrossRef]
  39. Van, D.H.; Kargl, F.; Abu-Sharkh, O.M. Enhanced position verification for VIoT using subjective logic. In Proceedings of the IEEE 84th Vehicular Technology Conference (VTC-Fall), Montreal, QC, Canada, 18–21 September 2016; pp. 1–7. [Google Scholar]
  40. Sohail, M.; Wang, L.; Yamin, B. Trust model based uncertainty analysis between multi-path routes in MANET using subjective logic. In China Conference on Wireless Sensor Networks; Springer: Singapore, 2017; pp. 319–332. [Google Scholar]
  41. Sohail, M.; Wang, L.; Yamin, B. Trust mechanism based AODV routing protocol for forward node authentication in mobile ad hoc network. In International Conference on Mobile Ad-Hoc and Sensor Networks; Springer: Singapore, 2017; pp. 338–349. [Google Scholar]
  42. NS. The Network Simulator. Available online: http://www.isi.edu/nsnam/ns/ (accessed on 15 May 2020).
  43. Online. Advogato. Available online: http://konect.uni-koblenz.de/networks/advogato (accessed on 15 May 2020).
  44. Online. Pretty Good Privacy PGP. Available online: http://konect.uni-koblenz.de/networks/arenas-pgp (accessed on 15 May 2020).
  45. Golbeck, J.; Hendler, J. Filmtrust: Movie recommendations using trust in web-based social networks. In Proceedings of the IEEE Consumer Communications and Networking Conference (CCNC), Las Vegas, NV, USA, 8–10 January 2006; pp. 282–286. [Google Scholar]
  46. Hang, C.W.; Wang, Y.; Singh, M.P. Operators for Propagating Trust and Their Evaluation in Social Networks; Dept. of Computer Science, North Carolina State University: Raleigh, NC, USA, 2008. [Google Scholar]
  47. Online. Python. Available online: http://www.python.org/ (accessed on 15 May 2020).
Figure 1. Traffic monitoring results in VIoT (a) Result of trust information which makes vehicles divert timely. (b) Conflicting news from two vehicles. (c) Result of unfiltered information from untrusted vehicles.
Figure 1. Traffic monitoring results in VIoT (a) Result of trust information which makes vehicles divert timely. (b) Conflicting news from two vehicles. (c) Result of unfiltered information from untrusted vehicles.
Sensors 20 03945 g001
Figure 2. A possible scenario in future vehicular Internet of Things.
Figure 2. A possible scenario in future vehicular Internet of Things.
Sensors 20 03945 g002
Figure 3. Information exchange format among neighbor vehicles using three kinds of route information.
Figure 3. Information exchange format among neighbor vehicles using three kinds of route information.
Sensors 20 03945 g003
Figure 4. Matrix formation and initialization in TW route discovery.
Figure 4. Matrix formation and initialization in TW route discovery.
Sensors 20 03945 g004
Figure 5. The Hand-off process: (a) the original route, from A to F; (b) the new route after the Hand-off process.
Figure 5. The Hand-off process: (a) the original route, from A to F; (b) the new route after the Hand-off process.
Sensors 20 03945 g005
Figure 6. Packet throughput, PDR, and E2E delay with different vehicles mobility and increasing malicious nodes.
Figure 6. Packet throughput, PDR, and E2E delay with different vehicles mobility and increasing malicious nodes.
Sensors 20 03945 g006
Figure 7. Packet throughput, PDR, and E2E delay under Black Hole and zigzag attacks.
Figure 7. Packet throughput, PDR, and E2E delay under Black Hole and zigzag attacks.
Sensors 20 03945 g007
Figure 8. Execution time of AT and TW algorithm.
Figure 8. Execution time of AT and TW algorithm.
Sensors 20 03945 g008
Table 1. Trust field extension added in proposed TER.
Table 1. Trust field extension added in proposed TER.
Standard On-Demand RoutingTrust Enhanced Routing
Sending node IP addressReceiving node IP address
Sending node seq numberReceiving node seq number
hop countsame
Expire timeExpire time
Positive evidence (trust field)
Negative evidence (trust field)
Opinion metric
Trust update
Table 2. Node security level authentication based on trust adjustment rules.
Table 2. Node security level authentication based on trust adjustment rules.
Ω xz , b k Ω xz , d k Ω xz , u k Action
>0.5Verify signature.
>0.5 Distrust a vehicle till expiry time.
>0.5 Trust a vehicle.
≤0.5≤0.5≤0.5Request and verify authentication.
Table 3. Simulation parameters in trust enhanced routing.
Table 3. Simulation parameters in trust enhanced routing.
Examined ProtocolTER
Simulation time100 (s)
Number of nodes50
Simulation area1000 m × 1000 m
Movement modelRandom way point
Vehicle speed0~10 m/s
Transmission range250 m
Physical link bandwidth11 Mb
Traffic typeCBR/UDP
Packet size512 bytes
Connection rate4 pkt/s
Pause time5 s
Routing AttacksBlack Hole, On-off attack
Number of malicious nodes0~25
Table 4. Statistics of the Advogato and PGP datasets.
Table 4. Statistics of the Advogato and PGP datasets.
DatasetsVertices’sEdgesAve. DegDiameter
Advogato654251,22719.54.83
PGP10,68224,315244.52
Table 5. Statistics of data-sets into real number values using four trust levels.
Table 5. Statistics of data-sets into real number values using four trust levels.
Trust LevelTrust OpinionTrust Value
1(0.08,0.82,0,0.1)0.08
2(0.26,0.64,0,0.1)0.26
3(0.63,0.27,0,0.1)0.63
4(0.85,0.05,0,0.1)0.85

Share and Cite

MDPI and ACS Style

Sohail, M.; Ali, R.; Kashif, M.; Ali, S.; Mehta, S.; Zikria, Y.B.; Yu, H. TrustWalker: An Efficient Trust Assessment in Vehicular Internet of Things (VIoT) with Security Consideration. Sensors 2020, 20, 3945. https://doi.org/10.3390/s20143945

AMA Style

Sohail M, Ali R, Kashif M, Ali S, Mehta S, Zikria YB, Yu H. TrustWalker: An Efficient Trust Assessment in Vehicular Internet of Things (VIoT) with Security Consideration. Sensors. 2020; 20(14):3945. https://doi.org/10.3390/s20143945

Chicago/Turabian Style

Sohail, Muhammad, Rashid Ali, Muhammad Kashif, Sher Ali, Sumet Mehta, Yousaf Bin Zikria, and Heejung Yu. 2020. "TrustWalker: An Efficient Trust Assessment in Vehicular Internet of Things (VIoT) with Security Consideration" Sensors 20, no. 14: 3945. https://doi.org/10.3390/s20143945

APA Style

Sohail, M., Ali, R., Kashif, M., Ali, S., Mehta, S., Zikria, Y. B., & Yu, H. (2020). TrustWalker: An Efficient Trust Assessment in Vehicular Internet of Things (VIoT) with Security Consideration. Sensors, 20(14), 3945. https://doi.org/10.3390/s20143945

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop