2015
DOI: 10.1109/tvt.2014.2360883
|View full text |Cite
|
Sign up to set email alerts
|

A Job Market Signaling Scheme for Incentive and Trust Management in Vehicular Ad Hoc Networks

Abstract: International audienceIn collaborative wireless networks with a low infrastructure, the presence of misbehaving nodes can have a negative impact on network performance. In particular, we are interested in dealing with this nasty presence in road safety applications, based on vehicular ad hoc networks (VANETs). In this work, we consider as harmful the presence of malicious nodes, which spread false and forged data; and selfish nodes, which cooperate only for their own benefit. To deal with this, we propose a Di… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
66
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 98 publications
(66 citation statements)
references
References 30 publications
0
66
0
Order By: Relevance
“…,Lei et al (2017),Wan et al (2016),Zhu et al (2017) AuthenticationChuang and Lee (2014),Yang et al (2017),Mamun et al (2014),Ying and Nayak (2017), Sun et al . (2012), Kerrache et al (2016b), Patel and Jhaveri (2015), Wei et al (2014), Abdelaziz et al (2014), Golle et al (2004), Yang (2013), Ding et al (2010a), Dixit et al (2016), Rostamzadeh et al (2015) Li et al (2013), Khan et al (2015), Shen et al (2013).Rewarding schemeHaddadou et al (2013),Haddadou et al (2015),Jesudoss et al et al (2010),Jahan and Suman (2016),Zhang et al (2016) Overview of the surveyed research works -Classified according to the security methods.…”
mentioning
confidence: 99%
“…,Lei et al (2017),Wan et al (2016),Zhu et al (2017) AuthenticationChuang and Lee (2014),Yang et al (2017),Mamun et al (2014),Ying and Nayak (2017), Sun et al . (2012), Kerrache et al (2016b), Patel and Jhaveri (2015), Wei et al (2014), Abdelaziz et al (2014), Golle et al (2004), Yang (2013), Ding et al (2010a), Dixit et al (2016), Rostamzadeh et al (2015) Li et al (2013), Khan et al (2015), Shen et al (2013).Rewarding schemeHaddadou et al (2013),Haddadou et al (2015),Jesudoss et al et al (2010),Jahan and Suman (2016),Zhang et al (2016) Overview of the surveyed research works -Classified according to the security methods.…”
mentioning
confidence: 99%
“…The identity of SetId is the same as NodID. All VSN entities have an initial score for the Tm . Every VSN node has the following status: NodId; flag_color = white; SetId=NodId; miner_score is unavailable. …”
Section: The Miners Selection Based On Cds Algorithmmentioning
confidence: 99%
“…The reputation pattern is proposed to create a credible and honest link among selected nodes acting as miners. We apply the design discussed by Haddadou et al, in which the VSN entities are in possession of a hardware device proposed by the TPM group,() which is used in the works of Guette et al() and Wang et al Our proposed solution is semidistributed. The VSN entities intercommunicate with each other without passing by RSUs.…”
Section: Security Analysismentioning
confidence: 99%
“…To deal with blackholes and the selective forwarding (greyholes) procedure, some hybrid trust models are also available . The first solution, proposed by Sedjelmaci et al is a two‐level intrusion detection system, the first one being based on a collaborative in‐cluster detection and the second one on a global detection processed by the RSU.…”
Section: Related Workmentioning
confidence: 99%
“…The work of Haddadou et al , called DTM 2 , proposes forcing nodes to be cooperative by establishing a communication cost. The latter is higher for selfish nodes, decreasing alongside with in‐network collaborativity.…”
Section: Related Workmentioning
confidence: 99%