Next Article in Journal
Two-Dimensional Layered Nanomaterial-Based One-Dimensional Photonic Crystal Refractive Index Sensor
Next Article in Special Issue
Assessing and Mapping of Road Surface Roughness based on GPS and Accelerometer Sensors on Bicycle-Mounted Smartphones
Previous Article in Journal
Active Return-to-Center Control Based on Torque and Angle Sensors for Electric Power Steering Systems
Previous Article in Special Issue
Enrichment of OpenStreetMap Data Completeness with Sidewalk Geometries Using Data Mining Techniques
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

3VSR: Three Valued Secure Routing for Vehicular Ad Hoc Networks using Sensing Logic in Adversarial Environment

School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang 212013, China
*
Author to whom correspondence should be addressed.
Sensors 2018, 18(3), 856; https://doi.org/10.3390/s18030856
Submission received: 30 November 2017 / Revised: 15 February 2018 / Accepted: 17 February 2018 / Published: 14 March 2018
(This article belongs to the Special Issue Crowd-Sensing and Remote Sensing Technologies for Smart Cities)

Abstract

:
Today IoT integrate thousands of inter networks and sensing devices e.g., vehicular networks, which are considered to be challenging due to its high speed and network dynamics. The goal of future vehicular networks is to improve road safety, promote commercial or infotainment products and to reduce the traffic accidents. All these applications are based on the information exchange among nodes, so not only reliable data delivery but also the authenticity and credibility of the data itself are prerequisite. To cope with the aforementioned problem, trust management come up as promising candidate to conduct node’s transaction and interaction management, which requires distributed mobile nodes cooperation for achieving design goals. In this paper, we propose a trust-based routing protocol i.e., 3VSR (Three Valued Secure Routing), which extends the widely used AODV (Ad hoc On-demand Distance Vector) routing protocol and employs the idea of Sensing Logic-based trust model to enhance the security solution of VANET (Vehicular Ad-Hoc Network). The existing routing protocol are mostly based on key or signature-based schemes, which off course increases computation overhead. In our proposed 3VSR, trust among entities is updated frequently by means of opinion derived from sensing logic due to vehicles random topologies. In 3VSR the theoretical capabilities are based on Dirichlet distribution by considering prior and posterior uncertainty of the said event. Also by using trust recommendation message exchange, nodes are able to reduce computation and routing overhead. The simulated results shows that the proposed scheme is secure and practical.

1. Introduction

Recently, Vehicular ad hoc networks (VANets) are emerged as challenging and advanced networks, having lots of sensors and onboard devices for V-2-V (vehicle to vehicle), V-2-I (vehicle to infrastructure) and V-2-P (vehicle to pedestrian) communication, in addition with high speed and random topologies. As VANET is one of the important parts in implementing intelligent transportation systems (ITS) in which trust management [1,2,3] can play a vital role to improve traffic efficiency, human safety and reduce energy consumption. At the same time, with the increasing popularity of sensing technologies and hand held devices, a new sensing paradigm, mobile crowd sensing, attracts attention from both academia and industry [4]. This new sensing paradigm leverages the power of crowds for large scale sensing tasks and fuels the evolution of the Internet of Things (IoT). Today, vehicles on a highway can be a great opportunity for resource sharing, infotainment and commercial advertisement in an efficient manner. A possible future scenario of vehicular networks can be seen in Figure 1, these distributed networks will rely on each other for resource sharing, which demand secure communication to be disseminate. As VANET, due to its openness not only face security issues that described previously [5], but also come up with new challenges like high speed, large scale network that makes VANET a truly challenging network [6]. As a result, number of research efforts have been made to ensure the credibility of sensed data. [7]. Many authors tried to provide solutions using cryptographic and certificate exchange methods for securing ad hoc networks [8,9]. Similarly, most of the anonymous routing protocols like ANODR [10], AASR [11], also based on cryptographic and public key infrastructure mechanism for establishing secure connection, thus increases routing overhead. One possible solution is to establish the trust management system for evaluating the trustworthiness of volunteer contributions in participatory sensing applications [5].
Further, trust management succeeded to handle many security issues with lightweight solutions. Trust management enforcement in ad hoc networks enables system to derive collaboration, avoid untrusted and malicious nodes and improve network performance [12]. Jin et al. in [13] give a detail information about trust management in VANET and also highlight the challenges for its deployment. Kannan and parasat in [14] feasibly describe various trust computing approaches that are geared towards VANET. However, many trust management solutions rarely considered uncertainty as important notion in these ad hoc networks and that needs careful treatment. To manage uncertainty between distributed nodes author in [15] proposed subjective logic for determining probabilistic uncertain values over [0, 1]. This subjective logic succeeded to reduce computation overhead with simple network topology, while comes up as information loss by network canonization in complex and random network topology [16]. Precisely, to tackle with above situation liu et al. in [17,18] proposed Three Valued Subjective Logic to manage the uncertainty more significantly. Despite the existing methods, vehicular networks still need a comprehensive research and lightweight solutions.
In this paper, we propose a secure extended routing protocol, which is called 3VSR, to credit the user by establishing a trust and reputation system. In this system, a group of vehicles is able to authenticate each other and to distinguish the well-behaved and badly behaved vehicles according to their trust scores. To mitigate the negative impacts of those malicious user vehicle, we design an vehicle authentication algorithm for our proposed scheme to exclude their impact. The contributions of this paper can be summarized as follows:
  • First, we take advantage of the unique features of VANET [19,20], e.g., high dynamics, hybrid architecture, and vehicle-to-infrastructure (V-2-I) and vehicle-to-vehicle (V-2-V) communications, to propose our 3VSR scheme. Specifically, the high dynamics ensure the real-time update of feedback. The hybrid architecture, i.e., vehicles, roadside units (RSUs), server, and trust authority (TA), enables the storage of feedback and the computation of trust scores.
  • A secure routing is proposed using sensing logic as trust model to enhance security of VANET, as efficient multi-hop trust assessment technique. This trust model is capable of assessing trust between multi path, arbitrary and bridge topologies.
  • In our 3VSR, nodes perform trusted routing behavior mainly according to the trust relationship between them, a node that will behave malicious eventually denied from the network. Also, system performance is improved by means of 3VSR as anonymous routing, that avoid verifying and requesting certificate exchange at each step. This also helps in minimizing computation and routing overhead.
  • In this article, we have proposed sensing logic-based trust model, that despite highlighting posterior uncertainty during trust propagation also capable of correctly assess arbitrary topologies.
The rest of the paper sectioned as follows: In Section 2, we define the problem by formalizing the system model, adversary model and goals. In Section 3, we briefly highlight the AODV routing and Dirichlet distribution, which have been applied in trust model. In Section 4, we define the framework of the proposed scheme also with trust assumptions. In Section 5 trust model based on Sensing logic fundamentals are discussed in detail. In Section 6, trusted routing operation is revealed in detail. Experimental setup and results are explored in Section 7 and Section 8. Finally, related work is highlighted in Section 9, with conclusions in Section 10.

2. Problem Statement

Here our problem is defined by initiating the system model, adversary model, and design goal.

2.1. System Model

We make use of the advantage of the already existing architectural model for VANET [2] i.e., trusted authority, Server, RSUs and vehicles equipped with OBUs (On-Board Unit) and other sensing devices as shown in Figure 2. Due to high cost and commercial aspects of RSU here, we consider the limited number of RSUs. They can be installed in the main streets where many vehicles can pass and get register to the server using V-2-I communication. Further, our proposed system model can be implemented in future vehicular networks e.g., vehicular platoon.
Central Cloud Layer CCL: is a group of servers, trusted authority (TA) which have massive storage capacity and computational abilities. Central cloud can provides roadside services via V-2-I and V-2-R (vehicle to remote side unit) communication. CCL is responsible for registration of server, RSUs, and vehicles regarding brief behavioral history and profile also with digital certificate that is distributed soon after entering the coverage area.
Remote Cloud layer RCL: is a set of remote site units RSUs which gives general information and local services to vehicles on road. The main theme of our proposed system model is to enable vehicles to authenticate its neighbor without the central system to reduce extra overhead. After a complete round trip a vehicle’s group leader can update the correspondent information to the server via RSU.
Vehicle Cloud Layer VCL: is treated as local vehicles cloud on the road which can be built as a set of cooperating vehicles in different groups. Vehicles can share their resources via V-2-V communication using onboard modern sensors and computers. If the target vehicle has trust value above the minimum defined threshold then no need to verify its credibility using first and second-hand recommendation. If target vehicle has lower trust value i.e., below the threshold then the requesting vehicle can ask for certificate verification and also take first and second-hand recommendations from neighbor vehicles.

2.2. Adversary Model

The connected vehicles, on the road are generally more susceptible to various adversaries, and they can be compromised at any time after the VANET is formed. The adversary can be an outsider located in the wireless range of the vehicles, or the adversary can first compromise one or more vehicles and behave as an insider later. The malicious entity is able to jam, eavesdrop, forge, modify the communication between any vehicles in the range. The main goals of the adversary may include intercepting the normal data transmission, modifying or forging data, framing the benign devices by deliberately submitting fake recommendations, etc. Here, we proposed that only insider attacks may cause to change nodes behavior and act maliciously. The internal malicious users can randomly drop packets, as we have simulated this effect by considering half of the node malicious. Let, when there is impersonation attack by the fake routing packets, 3VSR can cope with this scenario by using authentication algorithm. In contrast standard AODV suffer more by means of packet loss and minimizing throughput due to lack of authentication in between neighbor nodes.
  • Simple Attack (SA) An attacker may manipulate the compromised nodes not to follow normal network protocols and not to provide necessary services for other nodes, such as forwarding data packets or propagating route discovery requests. However, the compromised node will not provide any fake trust opinions when it is asked about other node’s trustworthiness.
  • Black Hole Attack (BH) In this case malicious node doesn’t forward data packet, still remains active as using path initiated by other nodes to save its energy. In these attacks packets can be forged, altered and tend to behave as good nodes. Black Hole attacks are known as the basic byzantine attacks.
  • Zigzag Attack (ZA): Sometimes sly attackers can alter their malicious behavior patterns so that it is even harder for the trust management scheme to detect them. For instance, they can conduct malicious behaviors for some time and then stop for a while (in that case the malicious behaviors are conducted in an on-and-off manner). In addition, the sly attackers can also exhibit different behaviors to different audiences, which can lead to inconsistent trust opinions to the same node among different audiences. Due to the insufficient evidence to accuse the adversary, it is generally more difficult to identify such sly attackers.

2.3. Design Goals

Following goals are some featured targets for the proposed scheme.
  • Overhead: To reduce computational and routing overhead by using secure routing protocol and having limited number of RSUs.
  • Resilience: How to tackle against adversary attack Modification attacks, Forgery attacks and Black Hole attacks during V-2-V authentication.
  • Efficiency: The trust management scheme should be efficient in processing and having less time for convergence.
  • Scalability and consistency: The proposed scheme should work fine even with high density of vehicles.

3. Preliminaries

To support mathematical operations on state space, we are interested in knowing the probability density function over multinomial opinion space. In case of binary opinion space it is well defined by Beta distribution but for multinomial scenario Dirichlet distribution is a solution [21].

3.1. Beta Distribution

Beta distribution is a continuous probability distribution defined over [0, 1] parametrized by two positive shape parameters, α and β [22]. These parameters appear as exponents of the random variable and control the shape of the distribution. The general expression for (PDF) of the beta distribution, for 0 x 1 , having α , β > 0 is a power function of the variable x and of its reflection ( 1 x ) as follows:
f ( P b , P d α , β ) = Γ ( α + β ) Γ ( α ) + Γ ( β ) × P b α 1 × P d β 1
The probability density over binomial event spaces expressed as beta PDF’s and denoted as Beta ( α , β ) . Also the probability expectation value of beta distribution is given by E ( x ) = α / ( α + β ) . If r and s denotes the past observations of positive and negative behavior and a is a constant formed from an existing impression without solid evidences, e.g., prejudice, preference and general opinion obtained from hearsay., then we compute α , β as
α = r + 2 a , β = s + 2 ( 1 a )
Bijective mapping between opinion space and beta PDF parameters can be obtained using following equations.
b x = r ( r + s + 2 ) r = 2 b x u x d x = n ( r + s + 2 ) s = 2 d x u x u x = 2 ( r + s + 2 ) u x 0

3.2. Dirichlet Distribution

A Dirichlet distribution provides a solid mathematical foundation for measuring the ignorance of recommendation based on initial belief of an unknown event according to prior distribution. Compared with Beta distribution, which is more appropriate in a binary satisfaction level. Dirichlet distribution is more appropriate for multivalued satisfaction levels. In our case, the evaluation trustworthiness of user vehicles is described by continuous trust values. Therefore, we will use Dirichlet distribution to estimate opinion space of user vehicle recommended in the future and then build our trust model accordingly.
The Dirichlet distribution is a continuous sequence of observation having k possible outcomes with k positive real parameters α ( x i ) , i = 1 , , k , in the form of compact vector notation p = p ( x i | 1 i k ) denotes the k-component random probability variable and a vector α = ( α i | 1 i k ) denotes random observation variable of k components such that [ α ( x i ) ] i k . The general form of Dirichlet distribution is as
f ( p α ) = Γ i = 1 k α ( x i ) i = 1 k Γ α ( x i ) i = 1 k p ( x i ) α ( x i ) 1
In sensing logic as evidences in opinion space have three condition (trust distrust, neutral), so modifying three valued evidence space to Dirichlet distribution as
f ( P b , P d , P n , P e α , β , γ n , γ e ) = Γ ( α + β + γ n + γ e ) Γ ( α ) + Γ ( β ) + Γ ( γ n ) + Γ ( γ e ) × P b α 1 × P d β 1 × P n γ 1 × P e γ 1
where ( α , β , γ n , γ e ) is the controlling vector and P ( b , d , n , e ) shows probability of belief, disbelief, posterior and prior uncertainty respectively. Let r , s and o denotes observed number of evidences that a node is trustworthy, untrustworthy or neutral. According to Dirichlet distribution, we have ( α = r + 1 , β = s + 1 , γ = o + 1 )
Let us assume that the neighboring node had one prior evidence of each event ( b , d , n ) . This assumption works satisfactorily because Dirichlet distribution can still works even when no event is observed i.e., ( α = 1 , β = 1 , γ = 1 ) and probability of each event will be 1/3. These three events are prior uncertainties, the four components in sensing logic opinion vector can be express as following after having Dirichlet distribution evidence spaces
b X A = r r + s + o + 3 , d X A = s r + s + o + 3 n X A = o r + s + o + 3 , e X A = 3 r + s + o + 3
Here prior evidences is set to 3, its ratio to the number of observed event is e X A . it is worth noting that uncertainty u defined in subject logics is actually the prior evidence in sensing logic. Since in sensing logic expected probability of each event using above equation.
E ( P b ) = α α + β + γ = r + 1 r + s + o + 3 = b X A + 1 3 e X A E ( P d ) = β α + β + γ = s + 1 r + s + o + 3 = d X A + 1 3 e X A E ( P n ) = γ α + β + γ = o + 1 r + s + o + 3 = n X A + 1 3 e X A E ( P e ) = 3 r + s + o + 3 = e X A
where the actual probability of each event is determined by baye’s rule using prior and posterior evidences.

3.3. Subjective Logic

To better understand sensing logic, we first briefly introduce the subjective logic. Subjective logic uses opinion-based probabilistic logic as input, output variables first proposed by A. Josang [16]. These opinion expresses uncertainties in probability values and identify the degree of ignorance in a particular subject such as trust. Let ω x A shows node A’s opinion about vehicle x trustworthiness in a specific context.
Evidence space in SL represented as ω = ( b , d , u , a ) where b , d , u and a show believe, disbelief and uncertainty over the range b , d , u [ 0 , 1 ] and b + d + u = 1 . The base rate a is a constant formed from an existing impression without solid evidences, e.g., prejudice, preference and general opinion obtained from hearsay. For example, if A always distrusts/trusts the persons from a certain group where X belongs to, then a A X will be smaller/greater than 0.5. Based on the Beta distribution, the discounting and combining operation in subjective logic is as follows.
Discounting operation: Let A, B and C are three vehicles and ω B A = b B A + d B A + u B A shows A’s opinion about B trustworthiness and ω C B = b C B + d C B + u C B shows B’s opinion about C trustworthiness. Based on Beta distribution, ω C A , B = b C A , B + d C A , B + u C A , B shows A opinion about C using B’s advice to A.
b C A , B = b B A b C B d C A , B = b B A d C B u C A , B = d B A + u B A + b B A u C B
Consensus operation: Let, we have three vehicles A, B and C ω C A = b C A + d C A + u C A and ω C B = b C B + d C B + u C B be the opinions that vehicles A and B have about vehicle C’s trustworthiness such that by equations.
b C A , B = b B A u C B + b C B u C A u C A + u C B u C A U C B , d C A , B = d C A u C B + d C B u C A u C A + u C B u C A U C B , u C A , B = u C A u C B u C A + u C B u C A u C B
Finally, the expected belief of an opinion w B A is computed by E ( ω B A ) = b B A + a X A u B A

3.4. Sensing Logic Fundamental

Opinion space in sensing logic is combined with these multiple values.
ω B A = b B A , d B A , n B A , e B A a B A
b B A + d B A + n B A + e B A a B A = 1
where b B A , d B A , n B A , e B A a B A represents belief, disbelief, posterior uncertainty during trust propagation and prior uncertain values. Where a B A shows base rate, which is minimal probability value before the operation between A and B. It has the same definition in both SL and sensing logic, so we will ignore this notion unless it is necessary. The certainty of an opinion comes from b B A , d B A , where n B A , e B A gives posterior and prior uncertainty values. For example if A has no interaction with B, then its opinion about trustworthiness of vehicle B is ω B A = ( 0 , 0 , 0 , 1 ) . Later on, after some interaction with the neighbor vehicle B its opinion space can change like ω B A = ( 0.4 , 0.3 , 0.2 , 0.1 ) depending on successful and failed communication.
Further, unlike subjective logic, we define interpersonal trust as a trinary event (belief, distrust, neutral) instead of a binary event (belief, distrust), hence extend Beta distribution to Dirichlet distribution. Neutral state expresses the posteriori uncertainty generated by trust propagation, which is ignored in subjective logic. The introduction of neural state makes the operations in sensing logic different from subjective logic. Leveraging on this new definition, operations (discounting and combining) on trust are redesigned in sensing logic

3.5. Ad Hoc Routing Protocols

In ad hoc networks, we have mainly proactive and reactive routing protocols. Proactive routing requires high bandwidth space as, it maintains paths between source and destination even if they are not interacting. In AODV reactive routing paths are made on demand, so highly popular with ad hoc networks [23]. Trust model based on demand reactive routing is suitable for the distributed and pure ad hoc network [24].

Ad-Hoc on Demand Distance Vector Routing (AODV)

AODV is the most efficient reactive routing protocol for the ad hoc networks as paths are made on fly that is why called ad hoc on demand distance vector. On-demand is a key feature in AODV routing which means that paths are made on fly and maintained till they require each other services. In AODV each route request packet contains broadcast id, source sequence number, destination Ip address, hop counts and control flags. The sequence number identify the freshness of the routing packet and hop count contains the distance between the source node and the current node.
When source node S broadcast RREQ packet in search of destination node, each recipient of the RREQ packet looks up in its routing table. If receiving node doesn’t contain any information about the destination. It will create a backward path towards RREQ packet initiator and rebroadcast the routing request. Intermediate node receiving this RREQ and will generate a RREP message either if it has fresh route request information to satisfy or itself a destination. After that, this intermediate node will generate RREP packet and will forward it to the next hop towards RREQ initiator intermediary node, as indicated by source node routing table entry. when a node receives RREP packet, it update some fields in the routing table of RREP packet, and then forward it to the next hop and towards the originator (source node). After that a bidirectional path is setup and maintained as long as they required each other services [25].
Route maintenance is performed by either sending hello messages which acknowledged about the positive connectivity about the nodes and sender can listen these hello messages. Another way is to maintain local connectivity by some link or network layer intrusion detection mechanism [26]. Route maintenance can also be achieved using packet acknowledge in which nodes are in promiscuous mode and can overhear the packet transmission and easily detect malicious attacks [27].

4. Overview of Trusted AODV

4.1. Trusted Assumptions

Here, we made some assumptions for specific roles of entities, further we argue that we are mainly focuses on security solution to the routing behavior of network layer.
  • Server: The server in central cloud layer is capable of having high storage capacity regarding brief history and profile also with vehicle Id and digital certificate that is distributed soon after entering the coverage area via RSU. Further, it is proposed that central server is under strong physical protection and not affected by adversaries.
  • Remote Site Unit RSU: Here, we proposed that RSUs act as local trust manager for vehicles on road, but have limited storage capabilities as compared with server in CCL. Here RSU is used to manage the vehicle information e.g., IP address, public or private key etc for short time and update server after one complete trip via V-2-R communication.
  • Vehicle: A vehicle can access all its neighbor vehicles and broadcast initial information about itself using V-2-V communication. A user vehicle after interacting provide their feedback about other vehicle. When a new vehicle join the group, the uncertainty towards it is normally high, so its trust value is evaluated after observing its behavior also taking advise from neighbor vehicles. At start, the new incoming vehicle also prove its credibility via exchange of digital certificate, which helps other vehicles to reduce uncertain opinion about it. Once the trust relationship establish vehicles can use our secure routing protocol to reduce extra communication overhead.

4.2. Framework for 3VSR

There are mainly three parts in the 3VSR framework i.e., standard AODV routing protocol, trust model and secure routing. Using our trust model, the 3VSR completes the procedure as trust recommendation, trust combination, trust judging, trusted routing behaviors, advance cryptographic routing behaviors and trust updating. From Figure 3, we can see that the relationship and structure between these entities. The general procedure for establishing trust relationships among nodes and for performing routing discovery is described as follows.
Let us consider the beginning stage when new nodes initiates communication with the network but they are uncertain about each other at beginning. In distributed VANET a node is free to move and join different network, their recent partners will evaluate their trust levels. In most previous work, the new comers are not aware of their forwarding behavior and thus set the trust level to null. This raises the alarm that the node will possibly be excluded from future routing. This approach is not feasible with a highly dynamic network. In our scheme, we did not considered the extreme values for new comers i.e., (honest, dishonest) till the network initialization. However, the uncertain opinion toward new joining node is set as u = ( 0 , 0 , 0 , 1 ) , so at least it has a chance to prove its credibility by verifying digital certificate and minimize uncertainty.
After this initial activity, having some successful or failed, the communication node A can change its opinion about node B’s behavior using a trust update algorithm. After establishing bidirectional communicating path nodes can use our secure routing protocol for operation. As trust is asymmetric, mobile nodes uses second hand observation given by its neighbors, and finally combines into a single trust value. Notice that a node can join the existing VANET through many ways and several security algorithms can be used to run this operation. In this framework trust establishment and the route discovery are all treated by node’s cooperation without any third or central party.

5. Trust Model

We have used advanced sensing logic framework defined in preliminary section as our trust model. Following are the major definitions in sensing logic.
Definition 1.
“Trust representation”
An opinion metric in sensing logic can be represented as T = [ B , D , N , E ] , where ( B , D , N , E ) [ 0 , 1 ] and B + D + N + E = 1 also B , D showing probability of belief and disbelief and N , E correspond posterior and prior uncertainty of said event. An opinion metric T 1 = [ 0.7 , 0.2 , 0 , 0.1 ] and T 2 = [ 0.4 , 0.5 , 0 , 0.1 ] , shows high and low trust values respectively.
Definition 2.
“Mapping”
Let’s T Y X = [ B , D , N , E ] be vehicle Y’s opinion about vehicle X’s trustworthiness in a VANET, and let r , s and o denote the observed piece of evidence that a vehicle is reliable, fake or neutral. Using Equation (5), given in preliminary section, we can map evidence space to opinion spaces.
Definition 3.
“Trust Combination”
In our trust model, A vehicle will make a relative judgment about the neighbor vehicle by means of first and second hand observation. First hand observation comes from direct or self experience and second hand observation comes as advise by other neighbors or friends. These two observation are combined through consensus and discounting operations, and a final opinion is computed towards target vehicle.
Consensus combination: Let S X , S Y and S Z be three vehicles. Then T Y X = [ B Y X , D Y X , N Y X , E Y X ] and T Z X = [ B Z X , D Z X , N Z X , E Z X ] , shows opinions of vehicle S Y and S Z about truthfulness of vehicle S X . Their consensus opinion space is defined as
B Y , Z X = E Z X B Y X + E Y X B Z X E Y X + E Z X E Y X E Z X , D Y , Z X = E Z X D Y X + E Y X D Z X E Y X + E Z X E Y X E Z X N Y , Z X = E Z X N Y X + E Y X N Z X E Y X + E Z X E Y X E Z X , E Y , Z X = E Y X E Z X E Y X + E Z X E Y X E Z X
The trust value using subjective opinions with consensus combining provide more flexible trust model of the real world. By referring to Equation (9), the consensus of trust opinions generated by vehicles s i i = 1 n j in time interval t about vehicle s j is
T 1 j , t T i j , t . T n j j , t = T 1 , , i , , n j j , t
Discounting combination: Let S X , S Y , and S Z be three vehicles. Then, we can present algebraically as T X Y = [ B X Y , D X Y , N X Y , E X Y ] and T Y Z = [ B Y Z , D Y Z , N Y Z , E Y Z ] shows opinions of S X about S Y trustworthiness and S Y about truthfulness of vehicle S Z . Their discounting opinion is defined as T X , Y Z = T X Y T Y Z = [ B X , Y Z , D X , Y Z , N X , Y Z , E X , Y Z ] , shows S X opinion on vehicle S Z as advised by vehicle S Y .
B X , Y Z = B X Y B Y Z , D X , Y Z = B X Y D Y Z N X , Y Z = 1 B X , Y Z D X , Y Z E Y Z , E X , Y Z = E Y Z
The discounting operation is used along a recommendation path of multiple vehicles about the particular one.
Definition 4.
Let S X and S Y be two vehicles. Then [ T Y X , t 1 , , T Y X , t n ] shows opinions of vehicle S Y about trustworthiness of S X for time intervals [ t 1 , , t n ] respectively, where T Y X , t n = [ B Y X , t n , D Y X , t n , N Y X , t n , E Y X , t n ] . Vehicle S Y ’s opinion on S X trustworthiness in different time intervals can be combined as [ t 1 , , t n ] is defined as
T Y c e r t a i n t y X , t 1 t n = [ B Y X , t 1 t n , D Y X , t 1 t n ] , T Y U n c e r t a i n t y X , t 1 t n = [ N Y X , t 1 t n , E Y X , t 1 t n ] B X , t 1 t n = 1 / n ( B Y X , t 1 + + B Y X , t n ) , D X , t 1 t n = 1 / n ( D Y X , t 1 + + D Y X , t n ) N X , t 1 t n = 1 / n ( N Y X , t 1 + + N Y X , t n ) , E X , t 1 t n = 1 / n ( E Y X , t 1 + + E Y X , t n )
The certainty of an event mainly comes from belief and disbelief, while uncertainty includes prior and posterior state of an event. Using Definition 3 and 4, we define trustworthiness γ j using entities consensus operation to combine trust opinions generated by vehicles S j , i i = 1 n j in time interval t t = t 1 t n as
γ j = T 1 , , i , , n j j , t i t n
The γ j can be calculated with respect to vehicle consensus or time interval method. The vehicle consensus is given as:
γ j = T 1 , , i , , n j j , t i t n = T 1 j , t i t n T i j , t i t n T n j j , t i t n
and second with respect to time as follow
γ j = T 1 , , i , , n j j , t i t n = B 1 , , i , , n j j , t i t n , D 1 , , i , , n j j , t i t n , N 1 , , i , , n j j , t i t n , E 1 , , i , , n j j , t i t n
where
B 1 , , i , , n j j , t i t n = 1 / n ( B 1 , , i , , n j j , t 1 + + B 1 , , i , , n j j , t n ) , D 1 , , i , , n j j , t i t n = 1 / n ( D 1 , , i , , n j j , t 1 + + D 1 , , i , , n j j , t n ) N 1 , , i , , n j j , t i t n = 1 / n ( N 1 , , i , , n j j , t 1 + + N 1 , , i , , n j j , t n ) , E 1 , , i , , n j j , t i t n = 1 / n ( E 1 , , i , , n j j , t 1 + + E 1 , , i , , n j j , t n )
According to Definition 3, each trust opinion has the same impact over time. Further, it is important that newer trust opinions have higher impact on trustworthiness, while previous trust opinions also taken into account. One solution is to use a time factor e.g., T [ 0 , 1 ] adding time impact into prior trust opinion, where greater T indicates newer opinion. More specifically, the time-aware trust opinion can be computed
T i c e r t a i n t y j , t i t n = B i j , t i t n , D i j , t i t n , T i u n c e r t a i n t y j , t i t n = N i j , t i t n , E i j , t i t n B i j , t i t n = 1 / n ( T n 1 B i j , t 1 + + T B i j , t n 1 + B i j , t n ) , D i j , t i t n = 1 / n ( T n 1 D i j , t 1 + + T D i j , t n 1 + D i j , t n ) E i j , t i t n = 1 B i j , t i t n D i j , t i t n , N i j , t i t n = 0
However, this extension is not considered here, and will be highlighted in future work. The reason is because assigning a suitable value of T is a challenging task and it needs careful investigation. For example T = 0.99 and T = 0.78 , it is not clear, which one is more reasonable and how T varies over time. As the scope of this paper is secure routing using sensing logic, so we did not mention any results on time-aware solutions.
Definition 5.
“Original and Distorted opinion in sensing logic”
Consider a discounting operation on two opinions as ( w 1 , w 2 ) , we treat w 1 as distorting opinion w 2 as original opinion in trust propagation. Let, we have three vehicles A, B and C in series in which w 2 is actually direct opinion between vehicle B and C and w 1 is indirect (distorting) opinion between A and C.
Since certain evidence from w 2 is distorted by w 1 ’s discounting operation and transferred to the posterior uncertainty of w 2 the evidence space of opinion ( w 1 , w 2 ) remains same as of w 2 ’s. So it is concluded that resulting opinion of a discounting operation shares exactly same evidence space as of original opinion. It is easy to prove that discounting operation is associative but not commutative.
( w 1 , w 2 ) ( w 2 , w 1 )
( ( w 1 , w 2 ) , w 3 ) ( w 1 , ( w 2 , w 3 )
( ( ( w 1 , w 2 ) , ) , w n ) ( w 1 , w 2 , w n )
Here, posteriori uncertainty is introduced using sensing logic to store neutral evidence eliminated from certainty space as trust propagates, while prior uncertainty is kept unchanged. Now consider these following equations.
Lemma 1.
( w 1 , Θ ( w 2 , w 3 ) ) Θ ( ( w 1 , w 2 ) , ( w 1 , w 3 ) )
( Θ ( w 1 , w 2 ) , w 3 ) Θ ( ( w 1 , w 3 ) , ( w 2 , w 3 ) )
Proof of Lemma 1.
Proof of Lemma 1 is easy, so we omit the details here. Hence from the above discussion we concluded that in a “trust computation original opinions can be combined only once, while distorting opinion can be used number of times because they have minor effect on amount of evidence in resulted opinion”. ☐

6. Trusted Routing Operation in AODV

6.1. Node Model

In our trust model, we have added trust field to the existing routing table i.e., positive and negative sensing as can be seen in Figure 4, which take place between the neighboring nodes and corresponding opinion metric is updated using Equation (5), with an increase or decrease of trust score.

6.2. Trust Judging Rules

For trust judgment, we have set the threshold 0.5 , as can be seen in Table 1. This threshold value can be changed depending upon one’s system design and security level.
  • If node A want to communicate with node B and if belief of A in B is ≥0.5, then A will trust B and start to route packet to node B.
  • If disbelief opinion of A in node B i.e., >0.5, then A will not trust node B and will not route packets unless to verify it by certification or destroy it.
  • If uncertainty of node A in node B is >0.5, then A will ask for digital signature for node B and waits for the verifying. If A successfully verifies B’s signature then A will start communication with B and reverse is also true.

6.3. Trust Updating Rule

When we talk about trust assessment then trust update is very important because it also counts good history of nodes and recommendation. We keep updating our repository due to dynamic nature of mobile ad hoc networks.
  • If node A had successful communication with node B then its update the trust value by incrementing trust in that node. By successful communication we mean normal packet forward or RREP with in the time interval.
  • If node A had failed communication with node B then it degrades trust values by decrementing the update counter.
  • Every time field of successful or failed event is changed, opinion space values are recalculated using Equation (5).
  • If node B’s routing entry is deleted from node A routing table due to expiry, then new opinion will set as ω B A = ( 0 , 0 , 0 , 1 ) .

6.4. Trusted Information Exchange

Existing trust models rarely consider exchange of trust information. However, trust information exchange is important in trust model applications and succeeded to reduce extra routing overhead. In our trust model, we derive an efficient trust information exchange mechanism by using three kind of messages that to be exchanged between neighbor nodes i.e., Trust Request Message (TREQ), TWARN (warning message) and Trust Reply Message (TREP) as shown in Figure 5. When a vehicle A wants to know neighbor vehicle B’s updated trust score, it will broadcast a TREQ message to its neighbors. This TREQ message follows the format given in Figure 5, with the Type field set to 0 and the trustee field filled with the IP address of vehicle B. In the same manner ,if destination node let say vehicle C receive this TREQ message, node C will reply with an TREP message. The Type field of this TREP is set to 1 and the opinion field is filled with the opinion values from C to B. Note that, in this recommendation protocol, a node can request or reply several opinion values of different vehicles simultaneously in one TREQ or TREP packet. In this way, we can efficiently exchange trust information without introducing much packets overhead.
In trusted routing discovery procedures, every routing request and reply carries trust information, including opinions towards originator vehicle A and destination vehicle B, which will be employed to calculate the credibility of A and B. When a vehicle is required to provide its certificate information, it will fill the fields of trust information with its own signature, as proposed by some traditional security solutions for mobile ad hoc networks.
A TWARN message, which is sent by a node to report invalid activity in original AODV procedure by type field set to 2, alarms other nodes to the worst trust warning. That is, If a vehicle A cannot verify certification then its opinion from the neighbor point of view set to be ( 0 , 1 , 0 , 0 ) , which means total disbelief, and neighbor will broadcast an TWARN message and type field set to 2. Every vehicle before making any path to vehicle B first verify B’s trustworthiness then perform the corresponding update.

6.5. Trusted Routing Discovery

In this section, we have described a general procedure for trust route discovery with an example shown in Figure 6a, also the route path from the source S to the destination D is uncovered. S will broadcast an TREQ message to discover a route path to D. Node V is an intermediate node along this path, and nodes V 1 to V 4 are its four neighbors. When V receives the re-broadcast TREQ message from V 1 , it will perform such operations as illustrated in Algorithm 1.
Specifically, in the above algorithm, node V wants to verify node V 1 ’s trustworthiness. It then collects its neighbors recommendations towards V 1 , and combines these opinions together using the combination operation as described in Section 5. Node V originally has opinions about V 1 as w V 1 V . The indirect opinions it receives from its neighbors are: w V 1 V V 2 , w V 1 V V 3 , w V 1 V V 4 , where w V 1 V V 2 , shows opinion of V on V 1 as advised by node V 2 and so on. We can illustrate the trust recommendation relationships using Figure 6b, where the arrows denote opinion directions. First, V 1 calculates the following opinions using Discounting operation:
w V 1 V V 2 = ( w V 2 V , w V 1 V 2 ) w V 1 V V 3 = ( w V 3 V , w V 1 V 3 ) w V 1 V V 4 = ( w V 4 V , w V 1 V 4 )
Second the new opinion can be combined as w V 1 V = w V 1 V ( V 2 , V 3 , V 4 ) , also by using Lemma 1
( w V 1 V , Θ ( w V 1 V ( V 2 , V 3 , V 4 ) ) ) Θ ( ( w V 2 V , w V 1 V 2 ) , ( w V 3 V , w V 1 V 3 ) ) , , ( w V 4 V , w V 1 V 4 ) )
After that newly computed opinion is judged according to our rules given in Algorithm 1.
Algorithm 1 Trusted Routing Discovery.
Receive an T R E Q ( S , D ) or an T R E P ( S , D ) from V1;
/*Verify the trustworthiness of V 1 */
Broadcast T R E Q ( V 1 ) to request the opinions from V s neighbors to V 1 ;
Receive opinions from V s neighbors: ω V 1 V 2 , ω V 1 V 3 , ω V 1 V 4
Combine these opinions together and get a latest: ω V 1 V
Exchange opinions about V 1 with its neighbors w V 2 , V 3 , V 4 V .
/* ω V 1 V U and Judge the next step using conditions set in Table 1 */
if b V 1 V 0.5
trust V 1 and forward RREQ/RREP
elseif d V 1 V 0.5
distrust V 1 for expiry time
elseif u V 1 V 0.5 request and verify digital certificate
else
/* the confidence about trustworthiness is decreased*/
request and verify V 1 certificates, by default
endif

6.6. Initiation of a Secure VANET

Let, we have a simple VANET having three vehicles ( V 1 , V , V 3 ) moving in a forward direction. V 1 has one neighbor and node V has two neighbor i.e., V 1 and V 3 . At beginning each node has no entry in neighbor routing table, so the opinion metric is u = ( 0 , 0 , 0 , 1 ) .
Now V 1 want to discover a route to node V 3 the process of node V 1 , V and V 3 can be describe as
(1)
V 1 broadcast RREQ requesting route path to node V 3 and waits for RREP in time t from V.
(2)
V receive RREQ packet after that node V will check route to V 3 by checking opinion ω V 1 V and ω V 3 V . As it is network initial stage so uncertainty will be high and currently no route to V 3 .
  • Node V authenticates both the neighbors to verify certificate if V 1 passes, the successful event is increased by 1 and the new opinion ω V 1 V = ( 0.33 , 0 , 0 , 0.67 ) is made. V also authenticates V 3 and revises the same process. If node V 1 fails the authentication, then new opinion will be ω V 1 V = ( 0 , 0.33 , 0 , 0.67 ) . V will not forward the packet till the expiry time.
  • If V 3 has also been authorized and V’s route table will be updated and V will re-broadcast the RREQ to V 3 after V 3 passed the authentication, V will forward the RREQ. If V 3 fails authentication process then opinion ω V 3 V will be re-calculated accordingly.
(3)
Node V 3 will also check ω V V 3 and node V’s trustworthiness if V passes authentication, V 3 will generate an RREP packet to V and update its route table. If not, V 3 will drop the RREQ packet.

6.7. Trusted Route Maintenance

Route maintenance is analogous to trusted route discovery. Nodes uses trust information exchange rule to evaluate node trustworthiness and forward node authentication. So here extra detail about route maintenance algorithm is not mentioned.

7. Experimental Setup

We have performed a set of simulations using NS-2.35 [28,29] developed by Monarch research group. The simulations are conducted on a Lenovo G-580 machine with Intel Core-i3 processors of 2.66 GHz and 4-GB SDRAM running in a Ubuntu-16-Intel-64 bit operating system. NS-2 simulator has good support for simulating complete wireless network protocol model from physical and data link layer, Mac layer and routing layer to application layer. The basic parameters of our simulation are defined in Table 2.

Evaluation Metrics

Following metrics has been evaluated to validate our proposed scheme.
  • Packet Delivery Ratio (PDR): The ratio of the total number of data packets successfully delivered to the total number of data packets sent out by a source node.
  • Packet Loss Ratio: It occurs when certain data packets traveling across a network fail to reach their destination. Packet loss is typically caused by network congestion. Packet loss is measured as a percentage of packets lost with respect to packets sent.
  • Throughput: This value is calculated by dividing the overall number of messages received at destination node by the total messages sent from source nodes according to the following equation:
    Throughput = T o t a l p a c k e t s r e c e i v e d T o t a l p a c k e t s s e n t
  • Delay: It is very important factor to measure the efficiency of any communication system. Delay represents the time period that needs to route a packet from the source to the desired destination which depends on PDR value in the system and can be calculated using the following equation
    Delay = N u m b e r o f s e n d i n g b i t s i n t h e p a c k e t T h r o u g h p u t
  • Probability of Detection: It is the ratio between number of malicious nodes to the actual nodes present in the network. The malicious nodes are unable to make trust score up to threshold level, therefore 3VSR has high probability to detect these nodes.

8. Results and Discussions

  • Test 1: Uncertainty analysis from initial stage to secure VANET.
  • Test 2: Comparison between standard, AASR and our proposed AODV routing over different metric.
  • Test 3: Comparison between Trusted vs standard AODV over different attack pattern.

8.1. Uncertainty Analysis from Initial Stage to Stable VANET

In this scenario, we presented general behavior of vehicles at start of the network, as can be seen in Figure 7a. The uncertainty at the start is very high because the entities do not know much about each other, as w B A = ( 0 , 0 , 0 , 1 ) . After some interaction and gathering first and second hand observation, the opinion of entities are changes and uncertainty decreases. Keeping uncertainty high at start also help us to detect and tackle many malicious attacks, such as Modification, Forgery and Black Hole attacks.
In Figure 7b, a general behavior of nodes after some interaction is depicted. We can see that trusted nodes having values t 1 = 0.95 and t 2 = 0.8 are secure for communication. We can also see that once the user is attacked by an adversary they gradually decrease their trust score as they are unable to make good interaction with other entities. New incoming vehicle have less recommendation from neighbors at start, so its trust value increases with time after having some good actions.

8.2. Performance Comparison between Standard, AASR and Our Proposed 3VSR under Different Mobility and Attack Pattern

Here we have considered two different scenarios and observed the behavior of our proposed scheme with other protocol also.

8.2.1. The Effect of Mobility Scenario

To simulate the adversarial effect, we have considered half of the nodes malicious i.e., 25 nodes having speed from 0 to 10 m/s in an arbitrary fashion. From Figure 8, we can see that 3VSR is better in throughput and packet loss ratio as compared with other routing protocols i.e., AODV and AASR. The performance of these protocols may be degraded under different mobility scenario. Despite the performance variation, our proposed scheme always achieves better throughput and lower packet loss as can be seen in Figure 8a,b, because it reduce computational overhead by avoiding complex cryptographic techniques. Meanwhile, AODV has lower delay values then AASR because if AASR is attacked by adversary it requires more cryptographic processing, which increases the delay. As a result, sometimes AASR performs worse than AODV, e.g., in the “slow” movement scenarios. The curves of the end-to-end delay are shown in Figure 8c, thus 3VSR is a better choice to adopt.

8.2.2. The Effect of Malicious Attacks

Here, we have simulated the effect of malicious attacks i.e., half of the nodes are malicious under different mobility scenario i.e., node speed is 0 to 10 m/s. The results are plotted in Figure 9. From Figure 9a, we can see that the throughput of these protocol degraded with increase of malicious nodes. Since 3VSR has better ability to detect and tackle malicious attacks it outperform other routing protocols. Similarly, in Figure 9b our proposed scheme has less packet loss ratio than standard AODV and AASR. Since AODV is blind to the malicious attacks and takes no additional actions, its delay does not vary in the presence of different numbers of malicious nodes. Since AASR spends time in the route discovery after making security processing, their delay is higher than AODV, while 3VSR minimize this effect by using trust information exchange between neighbor nodes as can be seen in Figure 9c. Similarly, the probability of detection is higher in 3VSR as they denied the malicious users based on their threshold valued as can be seen in Figure 9d.

8.3. Performance Comparison between 3VSR vs. Standard AODV under Black Hole and Zigzag Attacks

In this simulation, we have made comparisons between trusted and malicious AODV under Black hole and On-off attack patterns. In Figure 10, we can see that secure routing has every aspect better than standard AODV. In Figure 10a, we can see the effect of an on-off attack, this scenario is also known as the changing behavior attack. As soon as nodes starts to behave badly with her neighbors their opinion metric changes in term of getting bad recommendation, thus lowering trust score as can be seen in Figure 10a. These on-off attacks are easily handled in our proposed secure routing, because intermediate nodes make forward node selection by calculating their trust score. Also in Figure 10b, we can see that the packet drop in secure routing is still much lower than standard AODV. The standard AODV do not care about malicious packets, so forward as gets from neighbor nodes. This factor though keeps minimizing the delay in standard AODV. Although in our scheme, routing overhead is reduced because of the established trust relationship between neighbor nodes, which helps in minimizing end to end delay, that can be seen in Figure 10c.
The effect of a Black hole attack is strong, as nodes are completely compromised by altering or changing route packets and tend to behave well. In Figure 11a, we can see that nodes gets compromised by an adversary at start, so their packet throughput minimizes. Similarly, in Figure 11b, the number of packets dropped by secure and malicious AODV can be seen. The AODV routing without enabling trust model cannot tackle malicious attacks, nodes are compromised by these adversaries, which results in increase number of packets drop. Further, talking about end to end delay between secure and standard AODV. The delay factor increases due to high uncertainty and less interaction between malicious nodes over simulation time, while secure routing has capable of recognizing malicious nodes and ignoring interaction with them as can be seen in Figure 11c, thus able to minimize end to end delay.

9. Related Work

The related work can be divided into two parts, which are described as follows.

9.1. Misbehavior Detection for Ad hoc Networks

In recent years, many anonymous security solutions such as trapdoor, onion routing and group-based signature [30], and On-demand routing protocols [31], AASR [11] were proposed to detect the internal and external misbehavior actions by adversaries. These solutions heavily rely on cryptographic and signature-based mechanism to detect misbehavior activity. Another popular anonymous routing protocol i.e., ANODR also uses “ broadcasts with trapdoor information” for its design [10]. Although this scheme deals well with route anonymity and location privacy in MANET, although unsuitable for highly dynamic VANET as ANODR also relies on key exchange methods and lack of trust management and uncertainty concern between distributed nodes. Some authors proposed gathering trust information by setting nodes in promiscuous mode for neighbor nodes monitoring [27]. The possible drawback is depending on the success of the ability to access the content of packets in a header. Some researchers used intrusion detection system (IDS) in which there is an IDS probe on each node for monitoring purposes, which actually not an energy efficient solution for such distributed environment [26]. Many algorithms tend to give accurate trust assessment as trust is model with real number values [32,33], which totally ignore uncertainty between distributed nodes and the trust assessments are considered as inaccurate. The existing solutions rely heavily on the cryptographic mechanism and cause a huge delay in VANET. In modern vehicular networks e.g., intelligent transportation system (ITS) car maneuvers will rely more on disseminated information by neighbors, so building trust management can help in bringing lightweight solutions.

9.2. Trust Establishment and Management in Ad Hoc Networks

Trust management can help in building cooperation with unknown nodes to access the various observations and based on this make a reputation system to rank a good and badly behaved vehicle. The reputation system can be categorized to make sure credibility on which vehicle to cooperate with, and even to punish the untrusted vehicle. In our 3VSR, we have used two kind of sensing between neighbor vehicles, one is direct sensing that is comes from self experience with neighbor vehicle or through passive collection of some evidence by putting node into promiscuously mode or by packet acknowledgment in route discovery process. The second kind of sensing is indirect observation, it comes from one to many users as generally advise by fried or neighbor for a particular node. The indirect observation can be collected through surveys, monitoring past behaviors and recommendation of others. The main drawback of indirect observations are related to overhead, false report, trust distortion and collusion attacks [34].
Meanwhile, previously proposed secure routing protocols like CONFIDANT in [35] (Cooperation Of Nodes, Fairness In Dynamic Ad-Hoc Networks), to encourage the node cooperation and punish malicious nodes. A possible drawback of CONFIDANT is that an attacker may intentionally spread false alerts to other nodes that a node is misbehaving while it is actually a well-behaved node. Michiardi et al. [36] presented a solution called CORE to identify selfish nodes, and then compel them to cooperate in the following routing activities. Similar to CONFIDANT, CORE uses both a surveillance system and a reputation system to observe and evaluate node behaviors, but CORE only uses positive observation to be shared among nodes, this way, malicious nodes cannot spread fake charges to frame the well-behaved nodes. Patwardhan et al. [37] studied an approach in which the reputation of a node is determined by data validation. In this approach, a few nodes, which are named as Anchor nodes here, are assumed to be reliable, and thus the data they provide are regarded as trustworthy. In addition, there have been some other research efforts that aim to enhance the security, trust and privacy in ad hoc networks [38,39].
In addition, most of the existing trust management methods for ad hoc networks focus on assessing the trustworthiness of mobile nodes by collecting multiple evidences and analyzing behavioral history of the nodes. However, little attention has been paid to evaluate the trustworthiness of the data shared among these nodes and uncertainty management. Further, the lower uncertain values leads to high confidence in data shared between these distributed vehicles. Starting from probabilistic subjective logic, which comes up as promising technique to manage uncertainty between distributed nodes [40,41]. Xiaoqi et al. in [42] used subjective logic as advantage for forward node selection using trusted routing, which reduces extra computation and routing overhead. Some researchers also make use of fuzzy theory as logical reasoning [43]. These works contribute a lot to solve the uncertainty problem, although uncertainty generated as result of trust propagation rarely counted. Comparing to subjective logic, sensing logic distinguishes certain evidences that are distorted and transferred into the neutral state, referred as posterior uncertainty. Sensing logic also considers trust as distortion if it comes from one to many users as recommendation and separate them as original and distorted opinion by using Lemma 1, that already discussed in Section 5. Therefore, we rely on this new sensing logic for accurate trust assessment in vehicular ad hoc networks.

10. Conclusions

This manuscript proposed a three valued secure routing protocol between users vehicle in adversarial environment. The proposed scheme mainly focuses on establishing a trust model to improve the sensed data reliability and accuracy of the whole system. Our proposed trust model is capable of handing random network topologies and make accurate trust assessment by considering prior and posterior uncertainties between entities. Compared with standard and traditional routing protocols, 3VSR provides better throughput and lower packet loss ratio in different mobility scenarios. In our secure routing protocols using trust recommendation protocol, computational and routing overhead is reduced as vehicles after making trustful relationship, not really required certificate verification all the time. In addition, a silent feature of using a sensing logic-based trust model is to make the system design more flexible, the node threshold value can be set as per system requirements. In summary, the proposed trust mechanism with secure routing protocol using the sensing logic is able to reduce computation and extra routing overhead.

Acknowledgments

This research is supported by the National Natural Science Foundation of China (U1736216, 61472001, 61702231,U1405255), the National Key Research and Development Program of China (2017YFB1400703), the Key Research and Development Plan Project of Jiangsu Province (BE2015136) and the Natural Science Foundation of Jiangsu Province (BK20170556).

Author Contributions

Muhammad Sohail proposed the idea of the research, conceived the design and performed the experiments. Liangmin Wang designed the structure and instructed Muhammad Sohail to write the paper.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
VANETVehicular Ad-Hoc Network
3VSRThree Valued Secure Routing
AODVAd-Hoc On-Demand Distance Vector Routing
ITSIntelligent Transportation System
RSURemote Side Unit
OBUOnboard Unit
V-2-VVehicle to Vehicle communication
V-2-RVehicular to RSU
V-2-IVehicle to Infrastructure
CCLCentral Cloud Layer
RCLRemote Cloud Layer
VCLVehicle Cloud Layer

References

  1. Yan, Z.; Zhang, P.; Vasilakos, A.V. A survey on trust management for Internet of things. J. Netw. Comput. Appl. 2014, 42, 120–134. [Google Scholar] [CrossRef]
  2. Chen, X.; Wang, L. A cloud-based trust management framework for vehicular social networks. IEEE ACCS 2017, 5, 2967–2980. [Google Scholar] [CrossRef]
  3. Nogueira, M.; Silva, H.; Santos, A.; Pujolle, G. A security management architecture for supporting routing services on Wanets. IEEE. Trans. Netw. Serv. Manag. 2012, 9, 156–168. [Google Scholar] [CrossRef]
  4. Guo, B.; Yu, Z.; Zhou, X.; Zhang, D. From participatory sensing to mobile crowd sensing. In Proceedings of the IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom 2014 Workshops), Budapest, Hungary, 24–28 March 2014; pp. 593–598. [Google Scholar]
  5. Huang, K.L.; Kanhere, S.S.; Hu, W. Are you contributing trustworthy data: The case for a reputation system in participatory sensing. In Proceedings of the 13th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems (MSWiM 2010), Bodrum, Turkey, 17–21 October 2010; pp. 14–22. [Google Scholar]
  6. Karagiannis, G.; Altintas, O.; Ekici, E.; Heijenk, G.; Jarupan, B.; Lin, K.; Weil, T. Vehicular Networking: A Survey and Tutorial on Requirements, Architectures, Challenges, Standards and Solutions. IEEE Commun. Surv. Tutor. 2011, 13, 584–616. [Google Scholar] [CrossRef]
  7. Wang, X.O.; Cheng, W.; Mohapatra, P.; Abdelzaher, T.F. Artsense: Anonymous reputation and trust in participatory sensing. In Proceedings of the IEEE INFOCOM 2013, Turin, Italy, 14–19 April 2013; pp. 2517–2525. [Google Scholar]
  8. Jiang, S.; Zhu, X.; Wang, L. An efficient anonymous batch authentication scheme based on hmac for vanets. IEEE Trans. Intell. Transp. Syst. 2016, 17, 2193–2204. [Google Scholar] [CrossRef]
  9. Zhu, X.; Jiang, S.; Wang, L.; Li, H. Efficient privacy-preserving authentication for vehicular ad hoc networks. IEEE Trans. Veh. Technol. 2014, 63, 907–919. [Google Scholar] [CrossRef]
  10. Jiejun, K.; Xiaoyan, H. Anodr: Anonymous on demand routing with untraceable routes for mobile ad-hoc networks. In Proceedings of the 4th ACM International Symposium on Mobile Ad hoc Networking and Computing (Mobi-Hoc’03), Annapolis, MD, USA, 1–3 June 2003; pp. 291–302. [Google Scholar]
  11. Liu, W.; Yu, M. Aasr: Authenticated anonymous secure routing for manets in adversarial environments. IEEE Trans. Veh. Technol. 2014, 63, 4585–4593. [Google Scholar] [CrossRef]
  12. Xia, H.; Jia, Z.; Sha, E.H. Research of trust model based on fuzzy theory in mobile ad hoc networks. IET Inf. Secur. 2014, 8, 88–103. [Google Scholar] [CrossRef]
  13. Cho, J.H.; Swami, A.; Chen, I.R. A survey on trust management for mobile ad hoc networks. IEEE Commun. Surv. Tutor. 2011, 13, 562–583. [Google Scholar] [CrossRef]
  14. Govindan, K.; Mohapatra, P. Trust computations and trust dynamics in mobile adhoc networks: A survey. IEEE Commun. Surv. Tutor. 2012, 14, 279–298. [Google Scholar] [CrossRef]
  15. Josang, A. A logic for uncertain probabilities. Int. J. Uncertain. Fuzziness Knowl. Syst. 2001, 9, 279–311. [Google Scholar] [CrossRef]
  16. Josang, A.; Bhuiyan, T. Optimal trust network analysis with subjective logic. In Proceedings of the Second International Conference on Emerging Security Information, Systems and Technologies, Washington, DC, USA, 25–31 August 2008; pp. 179–184. [Google Scholar]
  17. Liu, G.; Yang, Q.; Wang, H.; Lin, X.; Wittie, M.P. Assessment of multi-hop interpersonal trust in social networks by three-valued subjective logic. In Proceedings of the IEEE INFOCOM 2014—IEEE Conference on Computer Communications, Toronto, ON, Canada, April 27–May 2 2014; pp. 1698–1706. [Google Scholar]
  18. Liu, G.; Chen, Q.; Yang, Q.; Wang, H.; Zhu, B.; Wang, W. Opinionwalk: An efficient solution to massive trust assessment in online social networks. In Proceedings of the IEEE INFOCOM 2017—IEEE Conference on Computer Communications, Atlanta, GA, USA, 1–4 May 2017; pp. 1–9. [Google Scholar]
  19. Hao, H.; Lu, R.; Cheng, H.; Zhang, Z. Tripsense: A trust-based vehicular platoon crowdsensing scheme with privacy preservation in vanets. Sensors 2016, 16, E803. [Google Scholar] [CrossRef]
  20. Hu, H.; Lu, R.; Zhang, Z.; Shao, J. Replace: A reliable trust-based platoon service recommendation scheme in vanet. IEEE Trans. Veh. Technol. 2017, 66, 1786–1797. [Google Scholar] [CrossRef]
  21. Fung, C.J.; Zhang, J.; Aib, I.; Boutaba, R. Dirichlet-based trust management for effective collaborative intrusion detection networks. IEEE Trans. Netw. Serv. Manag. 2011, 8, 79–91. [Google Scholar] [CrossRef]
  22. Hafez, A.; Xu, Y. Exploiting the Beta Distribution-Based Reputation Model in Recommender System. In Proceedings of the Australasian Joint Conference on Artificial Intelligence, Canberra, ACT, Australia, 30 November–December 4 2015; Springer: Cham, Switzerland, 2015; pp. 1–13. [Google Scholar]
  23. Omid, A.; Mahmood, F.; Jamshid, T. Enhancing AODV routing protocol using mobility parameters in VANET. In Proceedings of the IEEE International Conference on Computer Systems and Applications, Doha, Qatar, 31 March–4 April 2008; pp. 229–235. [Google Scholar]
  24. Zhang, C.; Zhu, X.; Song, Y.; Fang, Y. A formal study of trust-based routing in wireless ad hoc networks. In Proceedings of the IEEE INFOCOM, San Diego, CA, USA, 15–19 March 2010; pp. 1–9. [Google Scholar]
  25. Perkins, C.E.; Royer, E.M. Ad-Hoc on-demand distance vector routing. In Proceedings of the IEEE Workshop on Mobile Computing Systems and Applications WMCSA ’99, New Orleans, LA, USA, 25–26 Feburay 1999; pp. 90–100. [Google Scholar]
  26. Panos, C.; Xenakis, C.; Kotzias, P.; Stavrakakis, I. A specification-based intrusion detection engine for infrastructure-less networks. J. Comput. Commun. 2014, 54, 67–83. [Google Scholar] [CrossRef]
  27. Xia, H.; Jia, Z.; Li, X.; Ju, L.; Sha, E.H. Trust prediction and trust-based source routing in mobile ad hoc networks. Ad Hoc Netw. 2013, 11, 2096–2114. [Google Scholar] [CrossRef]
  28. Ns: The Network Simulator. Available online: https://www.isi.edu/nsnam/ns/ (accessed on 22 December 2018).
  29. Issariyakul, T.; Hossain, E. Introduction to Network Simulator 2 (NS2); Springer: Boston, MA, USA, 2012; pp. 21–40. ISBN 978-1-4614-1406-3. [Google Scholar]
  30. Libert, B.; Peters, T.; Yung, M. Short Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple Assumptions. In Cryptology Conference; Springer: Berlin, Heidelberg, 2015; pp. 296–316. [Google Scholar]
  31. Defrawy, K.E.; Tsudik, G. ALARM: Anonymous location-aided routing in suspicious MANETs. IEEE Trans. Mob. Comput. 2011, 10, 1345–1358. [Google Scholar] [CrossRef]
  32. Zhang, L.; Tan, C.P.; Li, S.; Fang, H.; Rai, R.; Chen, Y.; Luthra, R.; Ng, W.K.; Zhang, J. The Influence of Interaction Attributes on Trust in Virtual Communities. In Proceedings of the International Conference on User Modeling, Adaptation, and Personalization, Girona, Spain, 11–15 July 2011; pp. 268–279. [Google Scholar]
  33. Wu, D.; Zhang, G.; Lu, J. A Fuzzy Preference Tree-Based Recommender System for Personalized Business-to-Business E-Services. IEEE Trans. Fuzzy Syst. 2014, 23, 29–43. [Google Scholar] [CrossRef]
  34. He, Q.; Wu, D.; Khosla, P. SORI: A secure and objective reputation based incentive scheme for ad-hoc networks. In Proceedings of the IEEE WCNC, Atlanta, Georgia, USA, 21–25 March 2004; pp. 825–830. [Google Scholar]
  35. Buchegger, S.; Le Boudec, J.Y. Performance analysis of the confidant protocol. In Proceedings of the IEEE 3rd ACM International Symposium on Mobile Ad Hoc Networking and Computing, Lausanne, Switzerland, 9–11 June 2002; pp. 226–236. [Google Scholar]
  36. Michiardi, P.; Molva, R. CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In Proceedings of the IEEE 6th Joint Working Conference on Communications and Multimedia Security, Portoroz, Slovenia, 26–27 September 2002; pp. 107–121. [Google Scholar]
  37. Patwardhan, A.; Joshi, A.; Finin, T.; Yesha, Y. A data intensive reputation management scheme for vehicular ad hoc networks. In Proceedings of the IEEE 3rd International Conference on Mobile and Ubiquitous Systems, San Jose, CA, USA, 17–21 July 2006; pp. 1–8. [Google Scholar]
  38. Eldin, B.; Ayman, M. TARA: Trusted Ant Colony Multi Agent Based Routing Algorithm for Mobile Ad-Hoc Networks. In Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations; Springer: Berlin/Heidelberg, Germany, 2014; pp. 38–72. [Google Scholar]
  39. Xia, H.; Yu, J.; Pan, Z.K.; Cheng, X.G.; Sha, E.H. Applying trust enhancements to reactive routing protocols in mobile ad hoc networks. Wirel. Netw. 2016, 22, 2239–2257. [Google Scholar] [CrossRef]
  40. Balakrishnan, V.; Varadharajan, V.; Tupakula, U. Subjective logic based trust model for mobile ad hoc networks. In Proceedings of the 4th International Conference on Security and Privacy in Communication Netowrks (SecureComm ’08), Istanbul, Turkey, 22–25 September 2008; pp. 30:1–30:11. [Google Scholar]
  41. Ren, Y.; Zadorozhny, V.I.; Oleshchuk, V.A.; Li, F.Y. A novel approach to trust management in unattended wireless sensor networks. IEEE Trans. Mob. Comput. 2014, 13, 1409–1423. [Google Scholar] [CrossRef]
  42. Li, X.; Lyu, M.R.; Liu, J. A trust model based routing protocol for secure ad hoc networks. In Proceedings of the IEEE Aerospace Conference, Big Sky, MT, USA, 6–13 March 2004; pp. 1286–1295. [Google Scholar]
  43. Tan, S.; Li, X.; Dong, Q. A trust management system for securing data plane of ad-hoc networks. IEEE. Trans. Veh. Technol. 2016, 65, 7579–7592. [Google Scholar] [CrossRef]
Figure 1. A possible future scenario in vehicular networks.
Figure 1. A possible future scenario in vehicular networks.
Sensors 18 00856 g001
Figure 2. Three level layered Architectural network model for Vehicular ad hoc networks.
Figure 2. Three level layered Architectural network model for Vehicular ad hoc networks.
Sensors 18 00856 g002
Figure 3. Frame work for the proposed scheme, the standard AODV is applied at second stage with enabling sensing logic-based trust model, while cryptographic technology is considered to take effect before this operation.
Figure 3. Frame work for the proposed scheme, the standard AODV is applied at second stage with enabling sensing logic-based trust model, while cryptographic technology is considered to take effect before this operation.
Sensors 18 00856 g003
Figure 4. Extended routing table for AODV routing protocol having trust fields i.e., positive and negative sensing.
Figure 4. Extended routing table for AODV routing protocol having trust fields i.e., positive and negative sensing.
Sensors 18 00856 g004
Figure 5. Trust information exchange between interacting nodes using three kind of route information i.e., TREQ, TREP and TWARN are shown with yellow green and red colors.
Figure 5. Trust information exchange between interacting nodes using three kind of route information i.e., TREQ, TREP and TWARN are shown with yellow green and red colors.
Sensors 18 00856 g005
Figure 6. (a) General behavior of vehicles in performing trusted route discovery. (b) An example of trust recommendation from node V to node V 1 .
Figure 6. (a) General behavior of vehicles in performing trusted route discovery. (b) An example of trust recommendation from node V to node V 1 .
Sensors 18 00856 g006
Figure 7. (a) Simulated analysis of belief, disbelief and uncertainty at network start. (b) Simulated behavior of trusted, malicious and new comers After some interaction.
Figure 7. (a) Simulated analysis of belief, disbelief and uncertainty at network start. (b) Simulated behavior of trusted, malicious and new comers After some interaction.
Sensors 18 00856 g007
Figure 8. Performance comparison under different mobility setting: (a) Packet throughput. (b) Packet loss ratio. (c) End-to-end delay.
Figure 8. Performance comparison under different mobility setting: (a) Packet throughput. (b) Packet loss ratio. (c) End-to-end delay.
Sensors 18 00856 g008
Figure 9. Performance comparison under different attack pattern: (a) Packet throughput. (b) Packet loss ratio. (c) End-to-end delay. (d) Probability of detection in between benevolent and malicious nodes.
Figure 9. Performance comparison under different attack pattern: (a) Packet throughput. (b) Packet loss ratio. (c) End-to-end delay. (d) Probability of detection in between benevolent and malicious nodes.
Sensors 18 00856 g009
Figure 10. Effects of proportions of On-off attackers on the performances with parameter R = 250 m, V = 5 m/s, and N = 20: (a) Packet throughput (b) Packet drop ratio. (c) End-to-end delay.
Figure 10. Effects of proportions of On-off attackers on the performances with parameter R = 250 m, V = 5 m/s, and N = 20: (a) Packet throughput (b) Packet drop ratio. (c) End-to-end delay.
Sensors 18 00856 g010
Figure 11. Comparison results between the original AODV and the trusted AODV under Black Hole attacks with parameters R = 250 m, V = 5 m/s, and N = 20: (a) packet Throughput. (b) Packet Drop in (%). (c) End-to-end delay.
Figure 11. Comparison results between the original AODV and the trusted AODV under Black Hole attacks with parameters R = 250 m, V = 5 m/s, and N = 20: (a) packet Throughput. (b) Packet Drop in (%). (c) End-to-end delay.
Sensors 18 00856 g011
Table 1. Trust judgment rules to authenticate a node at a certain security level.
Table 1. Trust judgment rules to authenticate a node at a certain security level.
b X A d X A u ( n X A , e X A ) Action
⩾0.5Request to verify digital signature.
>0.5 Distrust node till next request.
>0.5 Trust a node and share resources.
≤0.5≤0.5≤0.5Request and verify authentication.
Table 2. Simulation parameters.
Table 2. Simulation parameters.
Examined Protocol3VSR
Simulation time100 (s)
Trust modelSensing logic
Simulation area1000 × 1000 (m)
Number of nodes50
Transmission range250 (m)
Propagation modelTwo way ground reflection
Maximum speed0–10 m/s
Physical link bandwidth11 Mb
traffic typeCBR
Payload size512 bytes
Packet rate4 pkt/s
Routing AttacksBlack and Modification
Number of malicious nodes0–25

Share and Cite

MDPI and ACS Style

Sohail, M.; Wang, L. 3VSR: Three Valued Secure Routing for Vehicular Ad Hoc Networks using Sensing Logic in Adversarial Environment. Sensors 2018, 18, 856. https://doi.org/10.3390/s18030856

AMA Style

Sohail M, Wang L. 3VSR: Three Valued Secure Routing for Vehicular Ad Hoc Networks using Sensing Logic in Adversarial Environment. Sensors. 2018; 18(3):856. https://doi.org/10.3390/s18030856

Chicago/Turabian Style

Sohail, Muhammad, and Liangmin Wang. 2018. "3VSR: Three Valued Secure Routing for Vehicular Ad Hoc Networks using Sensing Logic in Adversarial Environment" Sensors 18, no. 3: 856. https://doi.org/10.3390/s18030856

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop