Agent based trust establishment between vehicle in vehicular cloud networks

Автор: Shailaja S. Mudengudi, Mahabaleshwar S. Kakkasageri

Журнал: International Journal of Computer Network and Information Security @ijcnis

Статья в выпуске: 7 vol.11, 2019 года.

Бесплатный доступ

In order to enhance the driving experience with increased security and privacy, a category of MANET has emerged i.e VANET. The nodes are highly mobile, uncoordinated and dynamic in nature. An progressive step in this vision is Vehicular Cloud (VC) the advancement in Intelligent Transport System (ITS).The resources are shared between the vehicle nodes to provide the services at a economical cost. In order to provide them there should be hassle free secure communication link established between the Vehicle nodes, Road side unit (RSU) and the Cloud. Trust establishment in VC between vehicle nodes enhances the security aspects in VC. In this paper we put forth an trust evaluation scheme based on Dempster Shafer theory. The trust evaluation is based on Direct trust and Indirect trust, the priority of which can be accustomed.

Еще

Vehicular clouds, Encryption, Trust, Software agents

Короткий адрес: https://sciup.org/15015702

IDR: 15015702   |   DOI: 10.5815/ijcnis.2019.07.05

Список литературы Agent based trust establishment between vehicle in vehicular cloud networks

  • R. Hussain, J. Son, H. Eun, S. Kim and H. Oh, ”Rethinking Vehicular Communications: Merging VANET with cloud computing,” 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, Taipei, 2012, pp. 606-609.
  • R. Kaur, T. P. Singh and V. Khajuria, “Security Issues in Vehicular Ad-Hoc Network (VANET),” 2nd International Conference on Trends in Electronics and Informatics (ICOEI), Tirunelveli, 2018, pp. 884-889.
  • P. Mell, “What’s Special about Cloud Security?,”in IT Professional, vol. 14, no. 4, pp. 6-8, July-Aug. 2012.
  • V. Marbukh, “Systemic Risks in the Cloud Computing Model: Complex Systems Perspective,” IEEE 9th International Conference on Cloud Computing (CLOUD), San Francisco, CA, 2016, pp. 863-866.
  • J. Shen, T. Zhou, D. He, Y. Zhang, X. Sun and Y. Xiang, ”Block Designbased Key Agreement for Group Data Sharing in Cloud Computing,” in IEEE Transactions on Dependable and Secure Computing.2017
  • K. Naseer Qureshi, F. Bashir and S. Iqbal, “Cloud Computing Model for Vehicular Ad hoc Networks,” 2018 IEEE 7th International Conference on Cloud Networking (CloudNet), Tokyo, 2018, pp. 1-3.
  • N. Hegde and S. S. Manvi, “Thesis Proposal Summary: Key Management Authentication and Non Repudiation for Information Transaction in Vehicular Cloud Environments,” 2016 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM), Bangalore, 2016, pp. 157-160.
  • G. Yan, D. B. Rawat and B. B. Bista, “Towards Secure Vehicular Clouds,” 2012 Sixth International Conference on Complex, Intelligent, and Software Intensive Systems, Palermo, 2012, pp. 370-375.
  • Soleymani, Seyed Ahmad, Abdullah, Abdul Hanan, Wan Haslina, Anisi, Mohammad Hossein, Goudarzi, Shidrokh, Rezazadeh Baee, Mir Ali, Mandala, Satria. “Trust management in vehicular ad hoc network: a systematic review”, EURASIP Journal on Wireless Communications and Networking, Vol. 2015, No. 1, pp. 146, 2015.
  • Noor, Talal H., Sheng, Quan Z., Zeadally, Sherali, Yu, Jian, “Trust Management of Services in Cloud Environments: Obstacles and Solutions”, ACM Computing Surveys (CSUR), Vol. 46, No. 1, pp. 12-30, July 2013.
  • R. Kaur, T. P. Singh and V. Khajuria, “Security Issues in Vehicular Ad- Hoc Network(VANET),” 2018 2nd International Conference on Trends in Electronics and Informatics (ICOEI), Tirunelveli, 2018, pp. 884-889.
  • R. Hussain, J. Son, H. Eun, S. Kim and H. Oh, “Rethinking Vehicular Communications: Merging VANET with cloud computing,” 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, Taipei, 2012, pp. 606-609.
  • Deeksha, A. Kumar and M. Bansal, “A review on VANET security attacks and their countermeasure,” 2017 4th International Conference on Signal Processing, Computing and Control (ISPCC), Solan, 2017, pp. 580-585.
  • Z. M. Aljazzaf, M. Perry and M. A. M. Capretz, “Towards a unified trust framework for trust establishment and trust based service selection,” 2011 24th Canadian Conference on Electrical and Computer Engineering (CCECE), Niagara Falls, ON, 2011, pp. 001175-001178.
  • S. Ahmed and K. Tepe, “Evaluating trust models for improved event learning in VANETs,” 2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE), Windsor, ON, 2017, pp. 1-4.
  • D. Saraswat and B. K. Chaurasia, “AHP Based Trust Model in VANETs,” 2013 5th International Conference and Computational Intelligence and Communication Networks, Mathura, 2013, pp. 391-393.
  • Y. Wei and Y. Chen, “Adaptive decision making for improving trust establishment in VANET,” The 16th Asia-Pacific Network Operations and Management Symposium, Hsinchu, 2014, pp. 1-4.
  • R. Kaur and J. Kaur, “Cloud computing security issues and its solution: A review,” 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, 2015, pp. 1198-1200.
  • S. Sasirehka, S. Vijayakumar, K. Abinaya, “Unified trust management scheme that enhances the security in MANET using uncertain reasoning”, International Conference on Electronics and Communication Systems (ICECS), pp. 1497-1505, 2015.
  • K. Sharma, B. K. Chaurasia, “Trust Based Location Finding Mechanism in VANET Using DST”, Fifth International Conference on Communication Systems and Network Technologies, pp. 763-766, April 2015.
  • B. Yang, R. Yamamoto, Y. Tanaka, “Dempster-Shafer evidence theory based trust management strategy against cooperative black hole attacks and gray hole attacks in MANETs”, International Conference on Advanced Communication Technology, pp. 223-232, February 2014.
  • Gayathri Dhananjayan,Janakiraman Subbiah, “T2AR: trust-aware ad-hoc routing protocol for MANET”, http://springerplus.springeropen.com/articles/10.1186/s40064-016- 2667-6, 2016.
  • Taroun, Abdulmaten and Yang, Jian-Bo. “Dempster-Shafer Theory of Evidence: Potential usage for decision making and risk analysis in construction project management”,The Built ‘I&’ Human Environment Review. Vol. 4.2011.
  • M. S. Kakkasageri, S. S. Manvi, Jeremy Pitt, “Cognitive Agent Based Critical Information Gathering and Dissemination in Vehicular Ad hoc Networks”, Wireless Personal Communications, Vol. 69, No. 4, pp. 1107- 129, 2013.
  • Ritu, S. Jain, “A trust model in cloud computing based on fuzzy logic”, IEEE International Conference on Recent Trends in Electronics, Information Communication Technology (RTEICT), pp. 47-52, May 2016.
  • M. S. Kakkasageri and S. S. Manvi, “Safety information aggregation in VANETs using vehicle beliefs,” 2011 Fifth IEEE International Conference on Advanced Telecommunication Systems and Networks (ANTS), Bangalore, 2011, pp. 1-6.
  • A. Leite, R. Girardi and P. Novais, “Using Ontologies in Hybrid Software Agent Architectures,” 2013 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT), Atlanta, GA, 2013, pp. 155-158.
  • M. K. Kona and Cheng-Zhong Xu, “A framework for network management using mobile agents,” Proceedings 16th International Parallel and Distributed Processing Symposium, Ft. Lauderdale, FL, 2002,
  • Y. Wei and Y. Chen, “Adaptive decision making for improving trust establishment in VANET,” The 16th Asia-Pacific Network Operations and Management Symposium, Hsinchu, 2014, pp. 1-4.
Еще
Статья научная