You are on page 1of 10

AEIJST - May 2016 - Vol 4 - Issue 5 ISSN - 2348 - 6732

A Survey on Repudiation on VANET


*Sonam Singh
**Rajeev Kumar Singh
*Department of CSE & IT, MITS, Gwalior (India)
**Department of CSE & IT, MITS, Gwalior (India)

Abstract
In recent times we have seen that with the co-operation between the automobiles
and transportation techniques, have tremendously increase the driver's safety
effectively and curb the environmental impact. VANETs have received immense
attention and awareness and study efforts in very small time. A large piece of Work
has been drifted out to furnish a fashioned platform to facilitate inter-car
communications (IVCs).IVC is main to understand website viewers situation
monitoring, dynamic route scheduling, emergency-message dissemination and,
most significantly, riskless driving. It's supposed that every vehicle has a wireless
communications equipment to furnish advert hoc network connectivity. VANETs
are a special class of MANETs whereas the communicating nodes are regularly
autos. As it's concerned with automobiles, its arrangement is cell and finally
dissipated onto different roads.
Keywords VANET , Repudiation , trust , security
I.

INTRODUCTION

VANETs are a subset of MANETs. VANET has two entities: roadside units (RSU)
and onboard units (OBU). In VANETs, vehicles act as the mobile nodes. The
roadside infrastructure is fixed, as a result act as distribution features for the
vehicles [1]. The 2 sorts of wireless communications exist in VANET, V2V i.e. V2V
and Vehicle to Roadside Infrastructure i.E. V2I as delineated in fig. 1.VANET differs
from MANET in phrases of following traits that are excessive mobility, dynamic
topology, self-prepared architecture, allotted verbal exchange, direction restrictions
and variable network size. These attributes as expressed before make the VANETs
environment troublesome for creating powerful directing conventions. A not
possible number of utilizations exist in VANETs, in exact, site visitors efficiency
applications, administration applications, infotainment applications, however, the
two precept purposes are: passenger relief applications and protection functions
[4]. VANETs framework outline and execution go over after challenges, for instance,
routing, safety, privacy, connectivity and quality of services (QoS).

Figure.1 VANET

Page 1 of 10
www.aeph.in

AEIJST - May 2016 - Vol 4 - Issue 5 ISSN - 2348 - 6732


In VANETs, vehicles can keep up a correspondence every single distinctive (V2V,
vehicle-to-vehicles communications) additionally they might have the capacity to
interface with a foundation (V2I to get some administration. This framework is
situated nearby the streets. Network nodes in VANETs are profoundly versatile
therefore; the community topology is regularly evolving. Accordingly, the discussion
link between two vehicles experiences the snappy variation, and it's inclined to
detachment on account of the vehicular activities. Luckily, their portability might
likewise be unsurprising along the road considering that it is subjected to the
activity systems and its regulations. VANETs have usually more noteworthy
computational capacity and more prominent transmission energy than MANETs.
VANETs application sorts are classified into safety and efficiency [2]. There are a
huge amount of inconveniences in VANETs procedures configuration and usage,
together with: safety, routing, connectivity, and first-class of services. The most
basic explanation behind routing protocols is to give perfect ways between group
nodes through insignificant overhead. Various routing protocols have been made
for VANETs environment, which may in like manner be named in loads of
strategies, in accordance with exceptional components relating to: protocols
characteristics, strategies utilized, routing understanding, nice of services, network
structures, and routing algorithms and so on.
1.1. Intelligent Transportation System (ITSs)
In wise transportation structures, Each and every auto tackles the capacity of the
sender, beneficiary and router to show know-how to the vehicular framework For a
discussion to emerge in the middle of autos and road part models (RSUs) autos
must be sorted out with some sort of radio interface or On Board Unit (OBU) that
permits short-go ad hoc network to be designed [3]. In ITS autos are furnished with
global Positioning process (GPS) or a Differential international Positioning
procedure (DGPS) beneficiary for region expectation. Altered RSUs, that are
associated with the backbone network, should be in an area to encourage
correspondence. .For instance, some protocols avenue aspect items to be allotted
evenly for the duration of the entire road network; some require avenue part things
least difficult at convergences, whilst others require road aspect units best at
neighborhood fringes. In spite of the fact that it's nontoxic to suspect that
framework exists to a degree and vehicles have entry to it discontinuously, it is
doubtful to require that cars dependably have remote passage to roadside models.
Between auto, auto to-roadside, and directing built up interchanges depend on
extremely exact and forward comprehension concerning the encompassing air
which in flip, requires the utilization of precise situating frameworks and sensible
verbal trade conventions for supplanting aptitude.
1.2. Architecture of the Vehicular Network
As appeared in figure 1, the architecture of VANETs falls in three primary classes:
Inter-vehicle communication: that is otherwise called V2V communication or
pure ad hoc networking. Networking. On this classification the automobiles keep in
touch amongst every other with no infrastructure aid. Any useful know-how
accrued from sensors on a vehicle will also be dispatched to neighboring
automobiles
Vehicle-to-roadside communication: provides greater flexibility in content
sharing. That is in some cases called vehicle-to-infrastructure (V2I)
correspondence. On this class, the autos can utilize cellular gate ways and remote
Page 2 of 10
www.aeph.in

AEIJST - May 2016 - Vol 4 - Issue 5 ISSN - 2348 - 6732


adjacent control system section features to interface with the internet and
encourage vehicular applications.
Intra-vehicle (inter roadside) communication: this is otherwise called half
breed vehicles-to-roadside. Vehicles can utilize framework to keep up a
correspondence with each diverse and offer the comprehension got from foundation
with different autos in a peer-to-peer mode by method for of ad hoc
communication. This architecture includes V2V and gives more prominent
adaptability in substance sharing.
1.3. Special Characteristics of VANET
The capacity of VANET ordinarily takes after the operation study of MANET inside
of the vibe that the strategy of self-gathering, self-organization, low bandwidth and
shared radio transmission criteria stay square with. However the key predicament
in operation of VANET originates from the inordinate velocity and uncertain
mobility of the mobile nodes (automobiles) nearby the ways [1]. Also, VANETs have
unmistakable attractive components over MANETs as takes after:
a) Greater transmission vigor and storage: The group nodes (cars) in VANETs
are all the more ordinarily furnished with more noteworthy vitality and capacity
than these in MANETs.
b) Better computational potential: running vehicles can figure out how to pay for
more prominent processing, correspondence and detecting capacities than
MANETs.
c) Predictable Mobility: dislike MANETs, the development of the network nodes in
a VANET may likewise be foreseen on record that they exchange on a road network.
On the off chance that the present pace and road trajectory data are perceived,
then the long run part of the car can be evaluated.
1.4.

ROUTING PROTOCOLS OF VANET

VANETs are a targeted classification of ad hoc networks; the normally utilized ad


hoc routing protocols at first connected for MANETs were demonstrated and
evaluated for use in a VANET circumstance Utilization of this arrangement with
established and topology headquartered routing protocols requires that everything
about taking an interest nodes is relegated a specific handle. This suggests we
require a mechanism that can be used to appoint one of a kind locations to
automobiles however these protocols don't affirmation the evasion of the portion of
imitation locations in the group. Thus, current apportioned tending to calculations
utilized as a part of cell specially appointed systems are such a great deal less
suitable in a VANET domain. Point by point VANET related disarranges similar to
network topology, mobility designs, density of vehicles at specific events of the day,
quick alterations in vehicles arriving and leaving the VANET and the way that the
width of the parkway is, all things considered, littler than the transmission amplify
all make using these ad hoc routing protocols deficient.

Page 3 of 10
www.aeph.in

AEIJST - May 2016 - Vol 4 - Issue 5 ISSN - 2348 - 6732

ROUTING
PROTOCOLS OF
VANET

Proactive
Routing
Protocols

Figure.

Reactive
(On
Demand)
Routing
Protocols
Destination
Ad Hoc
Sequenced
on
Distance
Demand
Vector
Distance
2(DSDV)
Classification
of
Vector
(AODV)

Position
Based
Routing
Protocol
s
Motion
Vector
Routing
Algorith
RoutingmProtocols

of VANET

The routing protocol of VANET will likewise be ordered into two classes, for
example, Topology based routing protocols and position focused routing protocols.
Topology established routing is additional characterized into Proactive and Reactive
Protocols [4].This classification of Routing Protocols is shown in fig.2.
(i) Proactive Routing Protocols
Proactive protocols permit a network node to make utilization of the routing desk to
retailer courses understanding for every single diverse node, every single section in
the table includes the following hop node utilized as a part of the course to the getaway spot, paying little respect to regardless of whether the course is really needed
or not. The table must be overhauled by and large to reflect the network topology
modifications, and must be show occasionally to the neighbors. This plan may
simply intention all the more overhead particularly in the high portability system.
All things considered, courses to destinations will persistently be to be had when
required. Proactive protocols most likely depend on briefest course algorithms to
check which course should be picked; they quite often utilize two routing tactics:
join state technique and distance vector approach.
Destination Sequenced Distance Vector (DSDV):
DSDV is a Proactive protocol protocol that settles the essential difficulty identified
with the space Vector routing of wired networks i.e., depend to-vastness, with the
guide of utilizing destination succession numbers [5]. Excursion spot succession
number is the grouping amount as toward the begin stamped with the guide of the
destination. The DSDV protocol requires every cell station to advertise,, to every
single of its present neighbors, its have routing desk (for instance, by method for
television its entries).The passages on this rundown may trade progressively after
some time, so the business should be made all the time adequate to guarantee that
each cell node can as a general rule find each distinctive mobile node. Moreover,
every cell node agrees to hand-off data packets to different h nodes upon request.
In any appreciation moments, the DSDV protocol ensures loop free ways to every
single destination. Routes with additional exceptional grouping numbers are
typically favored as the establishment for making sending determinations, yet no
more essentially marketed. Of the ways with the same grouping number, these with
the smallest metric will likely be utilized. The directing overhauls are sent in two
strategies: a "full dump" or incremental supplant. A full dump sends the whole
steering table to the neighbors and would traverse numerous parcels while, in an
incremental supplant just these passages from the routing table are dispatched
Page 4 of 10
www.aeph.in

AEIJST - May 2016 - Vol 4 - Issue 5 ISSN - 2348 - 6732


that has a metric interchange because of the actuality the last upgrade and it need
to fit in a packet. At the point when the network is reasonably stable, incremental
redesigns are sent to limit further visitors and whole dump are to some degree
infrequent. The supplant will likewise be time intermittent or event periodic.
Reactive (On Demand) Routing Protocols
Receptive routing protocols for example, Dynamic source Routing (DSR), and ad
hoc On-demand Distance Vector (AODV) routing put into impact route
determination on an interest or need establishment and hold handiest the courses
which are as of now being used, in this manner diminishing the weight on the
group when just a subset of to be had routes is being used whenever.
Correspondence amongst automobiles will best utilize an uncommonly confined
amount of courses, and subsequently reactive routing is especially suitable for this
utility situation.
Ad Hoc on Demand Distance Vector (AODV):
In AODV routing, upon receipt of a broadcast query (RREQ), nodes record the
location of the node sending the inquiry in their routing desk. This strategy for
recording its past bounce is known as in reverse discovering. After touching base at
the destination, an reply packet (RREP) is then despatched by method for the
complete way got from backward finding out to the source. At each end of the trail,
the node would record its previous hop, thus opening the forward route from the
supply. The flooding of question and sending of answer build up a full duplex
direction. After the way has been focused, it is kept up the length of the source
utilizes it [6].
i. Position Based Routing Protocols
Position or geographic routing protocol depends on the positional ability in routing
system; where the source sends a packet to the get-away spot making utilization of
its geographic part as an option than using the group address. This protocol
required every node is skilled to settle on a choice its place and the area of its
neighbors by method for the Geographic position framework (GPS) help. The node
recognizes its neighbor as a node that situated all through the nodes radio reach.
At the point when the source need to send a parcel, it normally outlets the capacity
of the destination inside of the bundle header so they can help in sending the
packet to the estimation without need to course disclosure, course upkeep, or even
cognizance of the community topology . Appropriately the position routing protocols
are seen to be all the more relentless and suitable for VANET with a high mobility
environment, in comparison with topology- founded routing protocols.
Motion Vector Routing Algorithm (MOVE):
MOVE algorithm is intended for gentle networks, specifically for road facet car
discussion. This protocol expects that every last node has worldwide areas knowhow that is adjacent to the abilities of a mobile router pace and its neighboring
nodes speed. From this learning the node can gauge the nodes which can be the
nearest separation to the destination. In this convention each node overall declares
a decent day message; and its neighbor replays by a RESPONSE message; by
method for this replayed message the node will comprehend its neighbors and their
places. Given this ability, the node can gauge the most limited separation to
vacation spot, if so the node chooses how to ahead the message as per the skill
about nodes which are in the blink of an eye found adjacent the vacation spot.
Move protocol makes utilization of a great deal less memory size contrasted and
Non DTN capacity focused directing; it additionally has a superior knowledge
transmission cost in gentle environments [3].
Page 5 of 10
www.aeph.in

AEIJST - May 2016 - Vol 4 - Issue 5 ISSN - 2348 - 6732


II.

APPLICATIONS OF VANET

a) Safety Related Application

These applications are utilized to build the safety on the roads. These applications
can be further classified in taking after way.
i. Collision Avoidance: According to a few experiences, 60% accidents can likewise
be ceased from if drivers have been supplied a notice a large portion of a second
sooner than collision [9]. On the off chance that a driver get a notice message on
time impact can likewise be avoided.
ii. Cooperative Driving: Drivers can get cautions for traffic related notices like bend
velocity warning, Lane interchange warning and so on. These markers can co-work
the driver for a continuous and nontoxic riding
iii. Traffic optimization: Traffic can upgraded by method for sending alarms like
jam, mishaps et cetera. To the autos with the goal that they can favor their
alternate route to go and may keep time.
b) User Based Application

These applications give the user infotainment. A VANET will likewise be used to
give taking after services for the user beside protection:
i. Peer to peer application: These utility are significant to give offerings like
sharing tune, movies and numerous others. Among the numerous vehicles in the
network.
ii. Internet Connectivity: People consistently need to interface with the web at all
times. Therefore VANET presents the normal network of the web to the customers.
iii. Other services: VANET may likewise be used in various client focused utility
like installment supplier to gather the tall duties, to discover the fuel station, eatery
and numerous others.
III.

SECURITY ISSUES IN VANET

Among the greater part of the challenges of the VANET, security got essentially less
attention to this point. VANET bundles contain life pivotal skill consequently it's
critical to confirm that these packets more often than not will be not embedded or
altered with the aid of the attacker; in like manner, the simply commitment of
drivers should moreover be engaged that they light up the visitors environment
safely and inside time. These wellbeing issues don't just like basic communication
community. The scale of network, mobility, geographic significance thus on makes
the use intricate and specific from other system security.
The difficulties of security should be seen for the length of the design of VANET
structure, safety protocols, cryptographic algorithm and so forth. The following
record allows some safety challenges [9]:
i. Real time Constraint: VANET is time important the place Security related
message must be delivered with 100ms transmission lengthen. With the intention
to accomplish genuine time requirement, quick cryptographic algorithm ought to be
utilized. Message and substance validation should be accomplished in time.
ii. Data Consistency Liability: In VANET even authenticate node can take an
interest in malicious routine that may reason accidents or bother the network. In
this way a system will must be intended to deflect this irregularity. Relationship
among the got learning from particular node on specific ability may simply confine
this kind of inconsistency.
Page 6 of 10
www.aeph.in

AEIJST - May 2016 - Vol 4 - Issue 5 ISSN - 2348 - 6732


iii. Low tolerance for error: Some protocols are outlined on the premise of
probability. VANET utilizes ways of life indispensable aptitude on which activity is
done in exceptionally concise time. A little error in probabilistic algorithm may
simply reason harm.
iv. Key Distribution: All of the security mechanisms carried out VANET in view of
keys. Every single message is encoded and should decode at recipient complete
both with equivalent key or particular key. Moreover particular producer can set up
keys in various routes and out in the open key framework trust on CA end up being
imperative confinement. Along these lines dispersion of keys among vehicles is a
critical mission in planning a security protocols.
v. High Mobility: The computational limit and power supply in VANET is
indistinguishable as the wired network node yet the over the top mobility of VANET
nodes requires the less execution time of safety protocols for equivalent throughput
that wired network produces. Consequently the outline of safety protocols must
utilize the techniques to chop down the execution time. Two procedures will
likewise be implementing to fulfill this prerequisite.
A security framework in VANET ought to fulfill the accompanying necessities [8]:
i. Authentication: Authentication ensuring that the message created by the
legitimate user. In VANET a vehicle responds upon the data originated from the
other vehicle henceforth authentication must be fulfilled.
ii. Availability: Availability requires that the data must be accessible to the
honest to legitimate users
iii. Non-Repudiation: Non-denial implies a hub can't deny that he/she doesn't
transmit the message.
iv. Privacy: The privacy of a node against the unauthorized node must be
assured. This is needed for eliminating the massage delay attacks.
IV.

REPUDIATION IN VANET

In VANET, a critical issue is that how to believe the particular vehicle or message.
For example, on the off chance that an car sends the message that there is clog at
region X, ought to different vehicles trust this car and, in addition, this message
and afterward make a relating activity? Analysts think of the technique which
called reputation system to solve this issue Vehicular networks guarantee that the
data got from any vehicle is expeditiously and effectively spread to adjacent
vehicles. A pivotal point is a manner by which to believe the data transmitted
particularly in life-critical circumstances since any small misstep can cause serious
consequence. Subsequently, a successful reputation system for VANET is critically
required.
The following characteristics indicate that the existing reputation systems for
MANET are not suitable for VANET:
i.
VANET is an ephemeral network in which cars are always meandering
around and is highly dynamic. The speed on a highway is up to 150 per hour. At
this rapid, the contact and response time is too short to manufacture trust among
themselves.
ii.
VANET is a large scale network where the quantity of nodes and the
thickness is much higher than that in MANET. Network traffic can be high. Thus,
there ought to be astute vehicle communication frameworks that are adaptable and
can prevent data blockage by choosing which peers to interact [14] with.
Page 7 of 10
www.aeph.in

AEIJST - May 2016 - Vol 4 - Issue 5 ISSN - 2348 - 6732

iii. Almost all the current reputation systems register trust esteem in light of the
past cooperation with target node. In any case, this supposition is not legitimate in
VANET because of the dynamic and open environment. Truth be told, if a vehicle is
speaking with another vehicle, it is not ensured that it will communicate with the
same vehicle later on. In this manner, the existing algorithm which depends on
long term relationship is not suitable for VANET.
iv. Some of the reputation models [15] rely on upon a focal element to assemble the
data. Notwithstanding, the huge number of nodes and high dynamic environment
require a decentralized framework in VANET. Accumulation ought to be a nearby
activity rather than a global action.
v. Another essential issue is pseudonymous authentication which is disregarded by
numerous researchers. As talked about above, for security thought, every vehicle is
issued a large number of identities, and just CA knows the connection between
genuine ID with pseudonymous identities. Hence, it is infeasible to get significant
notoriety values since vehicles change pe identity over time. Case in point, if vehicle
A connects with B then A has a reputation value for B, yet at next minute if B
transforms it pseudonyms to C, the reputation value put away in An is no more
valuable.
V.

LITERATURE SURVEY

Timpner et al [16], implemented Parking Communities, which provide a allotted


and dynamic approach to set up depended on companies of vehicles serving to each
other to soundly to find parking of their respective neighborhood field. Our
procedure is centered on excessive-efficiency most recent encryption and signature
algorithms and additionally a surely knew mathematical trust positioning
component. Give a thorough examination diverse security designs and reproduction
results demonstrating the feasibility of this procedure.
Wei et al [17] concocted an adaptive selection making model which can make
determination rapidly by method for the forceful and quick help of the RSUs. To
assess the location precision and effectively of our proposed framework, we directed
a few simulations below special believe assaults. In the test outcome, the motive
mannequin can shorten resolution delay even as raising the detection accuracy.
Rehman et al [18], devised a thread centered trust model in order to evaluation
the trustworthiness of the message on the go. The mannequin is founded on
growing more than one threads of single predicament. An awfully successful model
for VANET message accept is proposed, with a specific end order to extend
reliability of VANET messages, the mannequin is exceptionally selective in its
procedure and usable progressively emergency predicament, it has additionally
another strength that the trust sets up only for an unmistakable event and for
subsequent trouble it again assesses the message esteemed at to be acted upon.
Gowtham et al [19], the focal trusted power will distribute a password to the
child nodes it has. When one node is attempting to have correspondence with the
legal node, the lawful one will handle the password test. The communicating one
must finish the password test. by giving appropriate password. On the off chance
that the node passes through the test then it will be pronounced as a legitimate one
and correspondence solicitation will be acknowledged and key/message sharing
will occur. On the off chance that the communicating node neglects to breeze
through the secret key test, it is pronounced as a malicious one and
Page 8 of 10
www.aeph.in

AEIJST - May 2016 - Vol 4 - Issue 5 ISSN - 2348 - 6732


correspondence with that node is banned completely so that remaining nodes will
be spared from it. The password might be of any desired length.
Huang et al [20], In this paper the limitations of reputation schemes in VANET
are discussed. We study trust administration plans in VANET and point out their
drawbacks and limitations. We demonstrate that trust administration plans in
MANETs can't be utilized for VANET.
Ding et al [21], in this paper, a reputation management framework is displayed to
improve trust for VANETs. Creator planned an event-based protocol for gathering
and aggregating reputation data. The proposed trust model adopts fuzzy logic
theory to speak to reputations and synthesizing an arrangement of opinions..
Taking into account part meaning of all vehicles who experience the same traffic
event and the time when message is gotten, diverse weights are allocated to
gathered opinions Network
reproduction tests demonstrate that noteworthy
execution additions can be gotten utilizing this structure.
conclusion
Currently a day's auto-to-auto and the auto-to-infrastructure discussion have
ended up being a promising stage for absolutely mobile applications. When you
consider that the effect of vehicle enterprise, embedding application-founded
intelligence into automobiles has the ability to significantly upgrade the buyer's
best of ways of life. In the wake of working out this effect expanding market interest
for diversion, well being and unwavering quality in automobiles has brought about
giant advancement and the help of vehicular networks and applications. These
emerging functions are developed crosswise over numerous fields from the web on
wheels satisfying video games, shopping to crime fixing, and so forth.
References
[1] Altayeb, M., and Mahgoub, I., A Survey of Vehicular Ad-hoc Networks Routing
Protocols, International Journal of Innovation and Applied Studies, Vol.3, pp.829846, 2013.
[2] Suthaputchakun, C, and Sun, Z . , Routing Protocol in Inter-vehicle
Communication Systems: A Survey, IEEE Communications Magazine, December
2011.
[3] Marwa Altayeb and Imad Mahgoub A Survey of Vehicular Ad hoc Networks
Routing Protocols International Journal of Innovation and Applied Studies, Vol. 3
No. 3, pp. 829-846, July 2013
[4] Mahmoud

Hashem Eiza, Qiang Ni, Thomas Owens and Geyong Min


Investigation of routing reliability of vehicular ad hoc networks EURASIP Journal
on Wireless Communications and Networking 2013, pp.179 , 1 July 2013.
[5] Avdhesh Kumar Sharma Ad-Hoc Network International Journal of Engineering
Research & Technology (IJERT) Vol. 2 Issue 7, July 2013.
[6] T.

Taleb, M. Ochi, A. Jamalipour, N. Kato, and Y. Nemoto, An efficient vehicleheading based routing protocol for VANET networks, in Proc.IEEE Wireless
Commun. Netw. Conf., 2006, pp. 21992204.
[7] Yaseer Toor et al., Vehicle Ad Hoc Networks: Applications and Related
Technical issues, IEEE Communications surveys & Tutorials, 3rd quarter 2008,
vol 10, No 3,pp. 74-88.
[8] Moustafa,H., Zhang,Y.: Vehicular networks: Techniques, Standards, and
Applications. CRC Press, (2009).

Page 9 of 10
www.aeph.in

AEIJST - May 2016 - Vol 4 - Issue 5 ISSN - 2348 - 6732


[9] Hannes Hartenstein et al., A tutorial survey on vehicular Ad Hoc Networks ,
IEEE Communication Magazine, June 2008, pp. 164-171.
[10]
Jose Maria de Fuentes, Ana Isabel Gonzalez-Tablas, and Arturo Ribagorda,
"Overview of Security issues in Vehicular Ad Hoc Networks", Handbook of Research
on Mobility and Computing, 2010.
[11]
Murthy, C. S. R.,Manoj, B. S.: Ad Hoc Wireless Networks: Architectures and
Protocols. PEARSON,ISBN 81-317-0688-5, (2011).
[12]
Ram Shringar Raw, Manish Kumar, Nanhay Singh; Security Challenges,
Issues And Their Solutions For VANET. International Journal Of Network Security
& Its Applications (IJNSA), Vol.5, No.5, September 2013.

Jie Zhang. A survey on trust management for vanets. In 25th IEEE


International Conference on Advanced Information Networking and Applications,
AINA 2011, Biopolis, Singapore, pages 105112, 2011.
[13]

[14]
Jie Zhang and Robin Cohen.Trusting advice from other buyers in
emarketplaces: the problem of unfair ratings. In 8th International Conference on
Electronic Commerce: The new e-commerce - Innovations for Conquering Current
Barriers, Obstacles and Limitations to Conducting Successful Business on the
Internet, pages 225234, 2006.
[15]
Julian Timpner, Dominik Schurmann, and Lars Wolf; Trustworthy Parking
Communities: Helping Your Neighbor to Find a Space. IEEE TRANSACTIONS ON
DEPENDABLE AND SECURE COMPUTING,2015.
[16]

Yu-Chih Wei, Yi-Ming Chen, Adaptive Decision Making for Improving Trust.

[17]
Establishment in VANET. IEICE - Asia-Pacific Network Operation and
Management Symposium (APNOMS) 2014.
[18]
Abdul Rehman, Asad Ali, Riaz ul Amin, Attique Shah; VANET Thread Based
Message Trust Model. IEEE, 2013.
[19]
G.Gowtham, E.Samlinson; A Secured Trust Creation In V Anet Environment
Using Random Password Generator. International Conference On Computing,
Electronics And Electrical Technologies [ICCEET], 2012.
[20]
Zhen Huang, Sushmita Ruj, Marcos Cavenaghiy, Amiya Nayak; Limitations
of Trust Management Schemes in VANET and Countermeasures. IEEE 22nd
International Symposium on Personal, Indoor and Mobile Radio Communications,
2011.
[21]
Qing Ding, Ming Jiang, Xi Li, XueHai Zhou; Reputation Management in
Vehicular Ad Hoc Networks. IEEE, 2010.

Page 10 of 10
www.aeph.in

You might also like