Please log in

Paper / Information search system

日本語

ENGLISH

Help

Please log in

  • Summary & Details

A Trust Establishment Mechanism of VANETs based on Fuzzy Analytical Hierarchy Process (FAHP)

Detailed Information

Author(E)1) Feng Luo, 2) Yifan Jiang, 3) Zhaojing Zhang
Affiliation(E)1) Tongji University, 2) Tongji University, 3) Tongji University
Abstract(E)As the connectivity of vehicles increases rapidly, more vehicles have the capability to communicate with each other. Because Vehicular Ad-hoc NETworks (VANETs) have the characteristics of solid mobility and decentralization, traditional security strategies such as authentication, firewall, and access control are difficult to play an influential role. As a soft security method, trust management can ensure the security attributes of VANETs. However, the rapid growth of newly encountered nodes of the trust management system also increases the requirements for trust establishing mechanisms. Without a proper trust establishment mechanism, the trust value of the newly encountered nodes will deviate significantly from its actual performance, and the trust management system will suffer from newcomer attacks. In this article, we propose a trust establishment mechanism based on the Fuzzy Analytic Hierarchy Process (FAHP), which takes into account the historical trust value of the encountered node, the historical driving mileage of the vehicle, the risk values of six factors obtained from the threat analysis and risk assessment (TARA) model STRIDE (Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of privilege), the road segment trust value of the access point and the interval of separation from the trust management system. Then we use Python to simulate our proposed trust establishment mechanism. It can be seen from the experimental results that the trust establishment mechanism we proposed can make the trust value of the newly accessed node closer to its actual historical performance. The trust establishment mechanism can also improve the identification accuracy of malicious nodes who want to implement newcomer attacks.

About search

close

How to use the search box

You can enter up to 5 search conditions. The number of search boxes can be increased or decreased with the "+" and "-" buttons on the right.
If you enter multiple words separated by spaces in one search box, the data that "contains all" of the entered words will be searched (AND search).
Example) X (space) Y → "X and Y (including)"

How to use "AND" and "OR" pull-down

If "AND" is specified, the "contains both" data of the phrase entered in the previous and next search boxes will be searched. If you specify "OR", the data that "contains" any of the words entered in the search boxes before and after is searched.
Example) X AND Y → "X and Y (including)"  X OR Z → "X or Z (including)"
If AND and OR searches are mixed, OR search has priority.
Example) X AND Y OR Z → X AND (Y OR Z)
If AND search and multiple OR search are mixed, OR search has priority.
Example) W AND X OR Y OR Z → W AND (X OR Y OR Z)

How to use the search filters

Use the "search filters" when you want to narrow down the search results, such as when there are too many search results. If you check each item, the search results will be narrowed down to only the data that includes that item.
The number in "()" after each item is the number of data that includes that item.

Search tips

When searching by author name, enter the first and last name separated by a space, such as "Taro Jidosha".