International Journal of Computer & Software Engineering Volume 5 (2020), Article ID 5:IJCSE-152, 13 pages
https://doi.org/10.15344/2456-4451/2020/152
https://doi.org/10.15344/2456-4451/2020/152
Review Article
Survey: Trust Management in VANET
References
- Dhamgaye A, Chavhan N (2013) Survey on security challenges in VANET. IJCSN 1: 2277-5420 [Google Scholar]
- Al-Sultan S, Al-Doori MM, Al-Bayatti A, Zedan H (2014) A comprehensive survey on vehicular Ad Hoc network. Journal of Network and Computer Applications 37: 380-392 [CrossRef] [Google Scholar]
- Mejri MN, Ben-Othman J, Hamdi M (2014) Survey on VANET security challenges and possible cryptographic solutions. Vehicular Communications 1: 53-66 [CrossRef] [Google Scholar]
- Samara G, Al-Salihy WAH, Sures R (2010) Security Analysis of Vehicular Ad Hoc Networks (VANET). Second International Conference on Network Applications, Protocols and Services [CrossRef] [Google Scholar]
- Engoulou RG, Bellaïche M, Pierre S, Quintero A (2014) VANET security surveys. Computer Communications 44: 1-13 [CrossRef] [Google Scholar]
- Wex P, Breuer J, Held A, Leinmuller T, Delgrossi L, et al. (2008) Trust Issues for Vehicular Ad Hoc Networks. IEEE [CrossRef] [Google Scholar]
- Bißmeyer N, Mauthofer S, Kpatcha B, Kargl F (2012) Assessment of node trustworthiness in VANETs using data plausibility checks with particle filters. IEEE [CrossRef] [Google Scholar]
- Gazdar T, Benslimane A, Belghith A (2011) Secure Clustering Scheme Based Keys Management in VANETs. Vehicular Technology Conference IEEE [CrossRef] [Google Scholar]
- Rachedi A, Benslimane A (2008) A Secure and Resistant Architecture against Attacks for Mobile Ad Hoc Networks. Security and Communication Networks [CrossRef] [Google Scholar]
- Mármol FG, Pérez GM (2012) TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks. Journal of Network and Computer Applications [CrossRef] [Google Scholar]
- Zadeh LA (1965) Fuzzy sets. Information and control 8: 338-353 [CrossRef] [Google Scholar]
- Wang Z, Chigan C (2007) Countermeasure Uncooperative Behaviors with Dynamic Trust-Token in VANETs. IEEE [CrossRef] [Google Scholar]
- Minhas UF, Zhang J, Tran T, Cohen R (2011) A multifaceted approach to modeling agent trust for effective communication in the application of mobile ad hoc vehicular networks. IEEE 3: 407-420 [CrossRef] [Google Scholar]
- Hortelano J, Ruiz JC, Manzoni P (2010) Evaluating the usefulness of watchdogs for intrusion detection in vanets. In Communications Workshops (ICC), IEEE International Conferenc [CrossRef] [Google Scholar]
- Al-Sultan S, Al-Doori MM, Al-Bayatti AH, Zaden H (2014) A comprehensive survey on vehicular Ad Hoc network. Journal of Network and Computer Applications 37: 380-392 [CrossRef] [Google Scholar]
- Yao X, Zhang X, Ning H, Li P (2016) Using trust model to ensure reliable data acquisition in VANETs. Ad Hoc Networks [CrossRef] [Google Scholar]
- Gurung S, Lin D (2013) Information-oriented Trustworthiness Evaluation in Vehicular Ad-hoc Networks. International Conference on Network and System Security [Google Scholar]
- Shaikh RA, Alzahrani AS (2013) Intrusion-aware trust model for vehicular ad hoc networks. Secur Commun Netw [CrossRef] [Google Scholar]
- Wu A, Ma J, Zhang S (2011) RATE: a RSU-aided scheme for data-centric trust establishment in VANETs. IEEE [CrossRef] [Google Scholar]
- Liao C, Chang J, Lee I, Venkatasubramanian KK (2013) A Trust Model for Vehicular Network-Based Incident Reports. International Symposium on Wireless Vehicular Communications: WiVeC [CrossRef] [Google Scholar]
- Tahani G, Benslimane A, Rachedi A, Belghith A (2013) A trust-based architecture for managingcertificates in vehicular ad hoc networks. Communications and Information Technology (ICCIT), International Conference on [CrossRef] [Google Scholar]
- Agarwal P, Bhardwaj N (2016) Enhance the Security by using Hashing Technique and Trust Values in Vehicular Ad Hoc Networks. IJSART 2: 2395-1052. [Google Scholar]
- Hasrouny H, Samhat AE, Bassil C, Laouiti A (2018) Trust Model for Group Leader Selection in VANET, International Journal of Digital Information and Wireless Communications (IJDIWC). [Google Scholar]
- Chen YM, Wei YC (2013) A beacon-based trust management system for enhancing user centric location privacy in VANETs. J Commun Netw 15: 153-163 [CrossRef] [Google Scholar]
- Soleymani SA, Abdullah AH, Hassan WH, Anisi MH, Goudarzi S, et al. (2015) Trust management in vehicular ad hoc network: a systematic review. EURASIP Journal on Wireless Communications and Networking [Google Scholar]
- Cooper C, Frankliny D, Ros M, Safaei F, Abolhasany M, et al. (2016) A Comparative Survey of VANET Clustering Techniques. IEEE Communications Surveys & Tutorials [CrossRef] [Google Scholar]
- Zhang J (2011) A survey on trust management for VANETs. IEEE International Conference on Advanced Information Networking and Applications [CrossRef] [Google Scholar]
- Kerrache CA, Calafate CT, Cano JC, Lagraa N, Manzoni P, et al. (2016) Trust Management for Vehicular Networks: An Adversary-Oriented Overview. IEEE 4: 2169-3536 [CrossRef] [Google Scholar]