2012 International Conference on Communications and Information Technology (ICCIT) 2012
DOI: 10.1109/iccitechnol.2012.6285787
|View full text |Cite
|
Sign up to set email alerts
|

A trust-based architecture for managing certificates in vehicular ad hoc networks

Abstract: International audienceIn this paper, we propose a secure and distributed public key infrastructure for VANETs. It is based on an hybrid trust model which is used to determine the trust metric (Tm) of vehicles. It consists on a monitoring system processing on two aspects: the cooperation of vehicles and the legitimacy of the broadcasted data. We propose a fuzzy-based solution in order to decide about the honesty of vehicles. Then, the vehicles which are trusted (Tm = 1), also, they have at least one trusted nei… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 12 publications
(8 citation statements)
references
References 11 publications
0
8
0
Order By: Relevance
“…Tahani g. et al [14], proposed hybrid trust model for determines trust metric. Two terms used for monitoring trust: cooperation with other vehicles in network and broadcast legitimate data.…”
Section: Related Workmentioning
confidence: 99%
“…Tahani g. et al [14], proposed hybrid trust model for determines trust metric. Two terms used for monitoring trust: cooperation with other vehicles in network and broadcast legitimate data.…”
Section: Related Workmentioning
confidence: 99%
“…After the completion of clusteringTime, the cluster-head announce its ID within the cluster (lines [31][32][33][34][35]. The leader nodes also announce themselves as leaders to other cluster members and update their cluster-head ID (CID) to the ID of the new cluster-head (lines 38 to 45).…”
Section: Leadership Formationmentioning
confidence: 99%
“…In [34], a two stage distributed intrusion detection system is proposed. Each stage consists of two detection systems as-maxima detection system (MDS) and cross-correlative detection system (CCDS).…”
Section: Intrusion Detection Mechanismsmentioning
confidence: 99%
“…The route verification is performed securely for the selection of most secure route among the nodes in the network. Gazdar et al [19] proposed a trust-based architecture for public key infrastructure in VANETs for calculating the trust of vehicles. The fuzzy-based inference system is used to calculate the trust of the vehicles where the vehicles that are trusted and have at least one trusted neighbor could be used as the contender for certification authority (CA) within its cluster, whereas managing the cluster formation in such dynamic network is itself a major concern.…”
Section: Related Workmentioning
confidence: 99%