2015
DOI: 10.1016/j.procs.2015.03.112
|View full text |Cite
|
Sign up to set email alerts
|

Trust Based Approaches for Secure Routing in VANET: A Survey

Abstract: Vehicular Ad-hoc networks (VANETs) require trusted vehicles to vehicles communication. VANET is multidimensional network in which the vehicles continuously change their locations. Secure routing is imperative during the routing process to incorporate mutual trust between these nodes. Sometimes, the malicious node broadcast the bogus information among other nodes. Establishing trust is a challenge while one or more malicious nodes attempt to disrupt route discovery or data transmission in the network. A lot of … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
42
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 81 publications
(42 citation statements)
references
References 28 publications
(31 reference statements)
0
42
0
Order By: Relevance
“…Relative speed estimation results from our proposed RSEA can be collected from a Trusted Central Authority (TCA) that exists in the area. Analyzing these collected data records, the TCA make deductions based on the SINR value, notify approaching vehicles and even propose jamming free routes [52].…”
Section: Discussionmentioning
confidence: 99%
“…Relative speed estimation results from our proposed RSEA can be collected from a Trusted Central Authority (TCA) that exists in the area. Analyzing these collected data records, the TCA make deductions based on the SINR value, notify approaching vehicles and even propose jamming free routes [52].…”
Section: Discussionmentioning
confidence: 99%
“…Generally, trust is the expectation and level of confidence of one vehicle about the other vehicle's action in VANETs [75,76]. In VANETs, a high dynamic environment and an adapted trust establishment are needed.…”
Section: Trust-based Detectionmentioning
confidence: 99%
“…Basic pseudonym approaches [23] are adopted in this paper because we mainly focus on the combination of "trust" and "pseudonym" rather than the "pseudonym" technique itself. More complicated signature and certificate schemes for realizing pseudonyms are surveyed in [24].…”
Section: Reputation Management Mechanismmentioning
confidence: 99%