首页> 外文期刊>Information Security, IET >Multi-hop interpersonal trust assessment in vehicular ad-hoc networks using three-valued subjective logic
【24h】

Multi-hop interpersonal trust assessment in vehicular ad-hoc networks using three-valued subjective logic

机译:使用三值主观逻辑的车辆 ad-hoc 网络中的多跳人际信任评估

获取原文
获取原文并翻译 | 示例
           

摘要

Future vehicular networks need multi-hop trusted information among car manoeuvres as a solution to the persistent problem of road safety, and news sharing. However, malicious users in vehicular networks can also disseminate fake information among each other. Traditional public key infrastructure is not an efficient solution for recognising these malicious users, as they all have authorised entities. To cope with this problem, this study highlights novel idea, i.e. three-valued subjective logic (3VSL) as a trust model for multi-hop trust assessment among users in vehicular ad-hoc network (VANET). Trust among vehicle users is represented in the form of opinion derived from 3VSL and updated frequently due to vehicles random movement on the road. To support the authors' proposed scheme, this study contains two parts in simulation, i.e. numerical and experimental analyses. Numerical analysis shows that 3VSL gives accurate trust assessment even with a bridge or random network topology, which is ignored previously by edge splitting. In the experimental part, we extend widely accepted ad-hoc on-demand distance vector routing protocol by directly applying trust fields to the routing table. The simulation experiment shows that their scheme achieves better performance in term of throughput and latencies in low mobility VANET scenario.
机译:未来的车载网络需要在汽车操纵之间获得多跳可信赖的信息,以解决道路安全和新闻共享这一持续存在的问题。但是,车载网络中的恶意用户也可以相互传播假信息。传统的公用密钥基础结构不是识别这些恶意用户的有效解决方案,因为它们都具有授权实体。为了解决这个问题,本研究重点介绍了新颖的想法,即三值主观逻辑(3VSL)作为用于车辆自组织网络(VANET)用户之间多跳信任评估的信任模型。车辆用户之间的信任以源自3VSL的意见的形式表示,并由于车辆在道路上随机移动而经常更新。为了支持作者提出的方案,本研究在仿真中包含两个部分,即数值分析和实验分析。数值分析表明,即使采用网桥或随机网络拓扑结构,3VSL仍可提供准确的信任评估,而边缘拆分先前已将其忽略。在实验部分,我们通过直接将信任字段应用于路由表来扩展广泛接受的即席按需距离矢量路由协议。仿真实验表明,在低移动性VANET场景下,他们的方案在吞吐量和延迟方面都达到了更好的性能。

著录项

  • 来源
    《Information Security, IET》 |2019年第3期|223-230|共8页
  • 作者单位

    Jiangsu Univ, Sch Comp Sci & Commun Engn, Zhenjiang 212013, Jiangsu, Peoples R China;

    Jiangsu Univ, Sch Comp Sci & Commun Engn, Zhenjiang 212013, Jiangsu, Peoples R China;

    Jiangsu Univ, Sch Comp Sci & Commun Engn, Zhenjiang 212013, Jiangsu, Peoples R China;

    Jiangsu Univ, Sch Comp Sci & Commun Engn, Zhenjiang 212013, Jiangsu, Peoples R China;

    Jiangsu Univ, Sch Comp Sci & Commun Engn, Zhenjiang 212013, Jiangsu, Peoples R China;

  • 收录信息
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号