2020
DOI: 10.1109/jiot.2020.2967568
|View full text |Cite
|
Sign up to set email alerts
|

MARINE: Man-in-the-Middle Attack Resistant Trust Model in Connected Vehicles

Abstract: Vehicular Ad-hoc NETwork (VANET), a novel technology holds a paramount importance within the transportation domain due to its abilities to increase traffic efficiency and safety. Connected vehicles propagate sensitive information which must be shared with the neighbors in a secure environment. However, VANET may also include dishonest nodes such as Man-in-the-Middle (MiTM) attackers aiming to distribute and share malicious content with the vehicles, thus polluting the network with compromised information. In t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
45
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 108 publications
(45 citation statements)
references
References 42 publications
0
45
0
Order By: Relevance
“…Different implementations of the IDS using trust models are based on watchdog, 42 Bayesian trust model, 43 and game theory‐based trust model 44,45 . In the context of IoT, a trust management scheme can be used in a distributed manner to reduce the computational overheads of resource‐constrained sensor nodes 46,47 . Similarly, game theory is widely used for the efficient designing of IDS.…”
Section: Ids: Concept and Classificationmentioning
confidence: 99%
“…Different implementations of the IDS using trust models are based on watchdog, 42 Bayesian trust model, 43 and game theory‐based trust model 44,45 . In the context of IoT, a trust management scheme can be used in a distributed manner to reduce the computational overheads of resource‐constrained sensor nodes 46,47 . Similarly, game theory is widely used for the efficient designing of IDS.…”
Section: Ids: Concept and Classificationmentioning
confidence: 99%
“…e BS has only access to gentle decreasing certificate status information (CSI) of vehicular associations, except those who are dismissing at the BS [11,12].…”
Section: Related Workmentioning
confidence: 99%
“…Several reputation systems have been proposed for peer-to-peer networks [6,7], ad hoc networks [8][9][10], wireless sensor networks [11,12] and Internet of Vehicle [13][14][15]. However, these systems cannot be applied to VANETs in their existing forms they do not consider the main VANET characteristics: dynamicity and high speed.…”
Section: Related Workmentioning
confidence: 99%
“…Some of them [16,17] were proposed to deal with a specific type of message while others [3,6,19] used decentralized trust systems, relying on interactions with neighbors, which is not practical in the highly dynamic environment of a VANET. Several works [4,10,15,23] tried to cope with a specific type of attack, which can be a limitation whereas several others were designed to handle a specific challenge such as authentication [24], privacy [20,25] or localization [18,22]. Therefore, unlike other solutions, we propose an adaptive trust-based security scheme for message exchange in VANETs based on VGA, our new clustering algorithm designed to handle the dynamicity such networks.…”
Section: Related Workmentioning
confidence: 99%