Profile
International Journal of Computer & Software Engineering Volume 5 (2020), Article ID 5:IJCSE-152, 13 pages
https://doi.org/10.15344/2456-4451/2020/152
Review Article
Survey: Trust Management in VANET

Nourelimane Bousmaha1, Mohamed Maachaoui2 and Rachid Chelouah1,*

University of Paris- Seine, ETIS laboratory, CNRS UMR8051, France
University of Paris- Seine, Quartz laboratory, EA 7393, France
Dr. Rachid Chelouah, University of Paris- Seine, ETIS laboratory, CNRS UMR8051, France; E-mail: rc@eisti.eu
12 June 2019; 20 January 2020; 22 January 2020
Bousmaha N, Maachaoui M, Chelouah R (2020) Survey: Trust Management in VANET. Int J Comput Softw Eng 5: 152. doi: https://doi.org/10.15344/2456-4451/2020/152

References

  1. Dhamgaye A, Chavhan N (2013) Survey on security challenges in VANET. IJCSN 1: 2277-5420 [Google Scholar]
  2. Al-Sultan S, Al-Doori MM, Al-Bayatti A, Zedan H (2014) A comprehensive survey on vehicular Ad Hoc network. Journal of Network and Computer Applications 37: 380-392 [CrossRef] [Google Scholar]
  3. Mejri MN, Ben-Othman J, Hamdi M (2014) Survey on VANET security challenges and possible cryptographic solutions. Vehicular Communications 1: 53-66 [CrossRef] [Google Scholar]
  4. Samara G, Al-Salihy WAH, Sures R (2010) Security Analysis of Vehicular Ad Hoc Networks (VANET). Second International Conference on Network Applications, Protocols and Services [CrossRef] [Google Scholar]
  5. Engoulou RG, Bellaïche M, Pierre S, Quintero A (2014) VANET security surveys. Computer Communications 44: 1-13 [CrossRef] [Google Scholar]
  6. Wex P, Breuer J, Held A, Leinmuller T, Delgrossi L, et al. (2008) Trust Issues for Vehicular Ad Hoc Networks. IEEE [CrossRef] [Google Scholar]
  7. Bißmeyer N, Mauthofer S, Kpatcha B, Kargl F (2012) Assessment of node trustworthiness in VANETs using data plausibility checks with particle filters. IEEE [CrossRef] [Google Scholar]
  8. Gazdar T, Benslimane A, Belghith A (2011) Secure Clustering Scheme Based Keys Management in VANETs. Vehicular Technology Conference IEEE [CrossRef] [Google Scholar]
  9. Rachedi A, Benslimane A (2008) A Secure and Resistant Architecture against Attacks for Mobile Ad Hoc Networks. Security and Communication Networks [CrossRef] [Google Scholar]
  10. Mármol FG, Pérez GM (2012) TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks. Journal of Network and Computer Applications [CrossRef] [Google Scholar]
  11. Zadeh LA (1965) Fuzzy sets. Information and control 8: 338-353 [CrossRef] [Google Scholar]
  12. Wang Z, Chigan C (2007) Countermeasure Uncooperative Behaviors with Dynamic Trust-Token in VANETs. IEEE [CrossRef] [Google Scholar]
  13. Minhas UF, Zhang J, Tran T, Cohen R (2011) A multifaceted approach to modeling agent trust for effective communication in the application of mobile ad hoc vehicular networks. IEEE 3: 407-420 [CrossRef] [Google Scholar]
  14. Hortelano J, Ruiz JC, Manzoni P (2010) Evaluating the usefulness of watchdogs for intrusion detection in vanets. In Communications Workshops (ICC), IEEE International Conferenc [CrossRef] [Google Scholar]
  15. Al-Sultan S, Al-Doori MM, Al-Bayatti AH, Zaden H (2014) A comprehensive survey on vehicular Ad Hoc network. Journal of Network and Computer Applications 37: 380-392 [CrossRef] [Google Scholar]
  16. Yao X, Zhang X, Ning H, Li P (2016) Using trust model to ensure reliable data acquisition in VANETs. Ad Hoc Networks [CrossRef] [Google Scholar]
  17. Gurung S, Lin D (2013) Information-oriented Trustworthiness Evaluation in Vehicular Ad-hoc Networks. International Conference on Network and System Security [Google Scholar]
  18. Shaikh RA, Alzahrani AS (2013) Intrusion-aware trust model for vehicular ad hoc networks. Secur Commun Netw [CrossRef] [Google Scholar]
  19. Wu A, Ma J, Zhang S (2011) RATE: a RSU-aided scheme for data-centric trust establishment in VANETs. IEEE [CrossRef] [Google Scholar]
  20. Liao C, Chang J, Lee I, Venkatasubramanian KK (2013) A Trust Model for Vehicular Network-Based Incident Reports. International Symposium on Wireless Vehicular Communications: WiVeC [CrossRef] [Google Scholar]
  21. Tahani G, Benslimane A, Rachedi A, Belghith A (2013) A trust-based architecture for managingcertificates in vehicular ad hoc networks. Communications and Information Technology (ICCIT), International Conference on [CrossRef] [Google Scholar]
  22. Agarwal P, Bhardwaj N (2016) Enhance the Security by using Hashing Technique and Trust Values in Vehicular Ad Hoc Networks. IJSART 2: 2395-1052. [Google Scholar]
  23. Hasrouny H, Samhat AE, Bassil C, Laouiti A (2018) Trust Model for Group Leader Selection in VANET, International Journal of Digital Information and Wireless Communications (IJDIWC). [Google Scholar]
  24. Chen YM, Wei YC (2013) A beacon-based trust management system for enhancing user centric location privacy in VANETs. J Commun Netw 15: 153-163 [CrossRef] [Google Scholar]
  25. Soleymani SA, Abdullah AH, Hassan WH, Anisi MH, Goudarzi S, et al. (2015) Trust management in vehicular ad hoc network: a systematic review. EURASIP Journal on Wireless Communications and Networking [Google Scholar]
  26. Cooper C, Frankliny D, Ros M, Safaei F, Abolhasany M, et al. (2016) A Comparative Survey of VANET Clustering Techniques. IEEE Communications Surveys & Tutorials [CrossRef] [Google Scholar]
  27. Zhang J (2011) A survey on trust management for VANETs. IEEE International Conference on Advanced Information Networking and Applications [CrossRef] [Google Scholar]
  28. Kerrache CA, Calafate CT, Cano JC, Lagraa N, Manzoni P, et al. (2016) Trust Management for Vehicular Networks: An Adversary-Oriented Overview. IEEE 4: 2169-3536 [CrossRef] [Google Scholar]