Computer Science ›› 2015, Vol. 42 ›› Issue (8): 157-160, 174.

Previous Articles     Next Articles

Trust Distance Based Malicious Nodes Detection Method in Vehicular Ad Hoc Network

WU Hai-qin and WANG Liang-min   

  • Online:2018-11-14 Published:2018-11-14

Abstract: With the requirement of rapid detection of malicious nodes in high-speed VANET,a trust model was proposed on the basis of bayes hypothesis,aiming at solving the issues that the topology of VANET changes quickly and is more vulnerable to malicious internal attack than traditional mobile ad-hoc network.The model intensifies the influence of negative events,to eliminate the malicious recommendations in advance and avoid collusion attack.The concept of “recommendation trust distance” is introduced as trust metric of recommendation trust when integrating recommendation trust.Compared with the current detection method based on trust,this model speeds up the detection speed and simplifies the recommend delivery.The simulation experiment shows that this trust model has rapid detection speed and good performance in detecting malicious nodes from the network packet loss rate and the detection rate of malicious nodes.

Key words: VANET,Trust model,Bayes hypothesis,Recommendation trust distance,Network packet loss rate,Detection rate

[1] Fazio P,De Rango F,Lupia A.A new application for enhancing VANET services in emergency situations using the WAVE/802.11p standard[C]∥Wireless Days(WD),2013 IFIP.IEEE,2013:1-3
[2] 乔震,刘光杰,李季,等.移动自组织网络安全接入技术研究综述[J].计算机科学,2013,0(12):1-8,0 Qiao Zhen,Liu Guang-jie,Li Ji,et al.Survey on Secure Access Technology in Mobile Ad-hoc Network[J].Computer Science,2013,0(12):1-8,0
[3] Sharma S,Mishra R,Kaur I.New trust based security approach for ad-hoc networks[C]∥2010 3rd IEEE International Con-ference on Computer Science and Information Technology(ICCSIT).Chengdu,2010,9:428-431
[4] Xia H,Jia Z,Sha E H M.Research of trust model based on fuzzy theory in mobile ad hoc networks[J].IET Information Security,2013,8(2):88-103
[5] 陈深龙,张玉清.增强ad hoc网络可生存性的健壮多维信任模型[J].通信学报,2010(5):1-9 Chen Shen-long,Zhang Yu-qing.Robust multi-dimensional trust model for improving the survivability of ad hoc networks[J].Journal on Communications,2010(5):1-9
[6] Amaresh M,Usha G.Efficient malicious detection for AODV in mobile ad-hoc network[C]∥IEEE International Conference on Recent Trends in Information Technology(ICRTIT).Chennai,2013:263-269
[7] Bhoi S K,Nayak R P,Dash D,et al.RRP:A robust routing protocol for Vehicular Ad Hoc Network against hole generation attack[C]∥IEEE International Conference on Communications and Signal Processing(ICCSP).Melmaruvathur,2013:1175-1179
[8] Bao F,Chen R,Chang M J,et al.Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection[J].IEEE Transactions on Network and Service Management,2012,9(2):169-183
[9] Josang A,Knapskog S J.A metric for trusted systems[C]∥Proceeedings of the 21st National Security Conference.1998:16-29
[10] 胡玲珑,潘巨龙,崔慧.无线传感器网络中基于信誉的恶意节点检测方法[J].中国计量学院学报,2012,3(1):41-47 Hu Ling-long,Pan Ju-long,Cui Hui.A reputation-based method for detecting malicious nodes in WSNs[J].Journal of China Ji-liang University,2012,3(1):41-47
[11] Theodorakopoulos G,Baras J S.On trust models and trust eva-luation metrics for ad hoc networks[J].IEEE Journal on Selected Areas in Communications,2006,24(2):318-328
[12] Jiang T,Baras J S.Trust Evaluation in Anarchy:A Case Study on Autonomous Networks[C]∥INFOCOM.Barcelona,Spain,2006
[13] Ding Q,Li X,Jiang M,et al.Reputation-based trust model in vehicular ad hoc networks[C]∥IEEE International Conference on Wireless Communications and Signal Processing(WCSP).Suzhou,2010:1-6
[14] Saraswat D,Chaurasia B K.AHP Based Trust Model in VANETs[C]∥2013 5th International Conference on Computational Intelligence and Communication Networks(CICN).Mathura,2013:391-393
[15] 田俊峰,鲁玉臻,李宁.基于推荐的信任链管理模型[J].通信学报,2011,2(10):1-9 Tian Jun-feng,Lu Yu-zhen,Li Ning.Trust chain management model based on recommendation[J].Journal on Communications,2011,2(10):1-9
[16] Mui L.Computational models of trust and reputation:Agents,evolutionary games,and social networks[D].Cambridge:Massachusetts Institute of Technology,2002
[17] Dellarocas C.Reputation mechanism design in online trading environments with pure moral hazard[J].Information Systems Research,2005,16(2):209-230
[18] 王良民,郭渊博,詹永照.容忍入侵的无线传感器网络模糊信任评估模型[J].通信学报,2010,31(12):37-44 Wang Liang-min,Guo Yuan-bo,Zhan Yong-zhao.Fuzzy trust model for wireless sensor networks with intrusion tolerance[J].Journal on Communications,2010,31(12):37-44

No related articles found!
Full text



[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[2] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[3] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[4] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[5] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[6] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[7] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[8] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[9] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .
[10] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99, 116 .