A trust model using edge nodes and cuckoo filter for securing vanet under nlos conditions

Trust, as a key element of security, has a vital role in securing vehicular ad-hoc networks (VANETs). Malicious and selfish nodes by generating inaccurate information, have undesirable impacts on the trustworthiness of the VANET environment. Obstacles also have a negative impact on data trustworthin...

Full description

Saved in:
Bibliographic Details
Main Authors: Soleymani, S. A., Goudarzi, S., Anisi, M. H., Kama, N., Ismail, S. A., Azmi, A., Zareei, M., Abdullah, A. H.
Format: Article
Language:English
Published: MDPI AG 2020
Subjects:
Online Access:http://eprints.utm.my/id/eprint/87084/1/SeyedAhmadSoleymani2020_ATrustModelusingEdgeNodes.pdf
http://eprints.utm.my/id/eprint/87084/
http://www.dx.doi.org/10.3390/SYM12040609
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Trust, as a key element of security, has a vital role in securing vehicular ad-hoc networks (VANETs). Malicious and selfish nodes by generating inaccurate information, have undesirable impacts on the trustworthiness of the VANET environment. Obstacles also have a negative impact on data trustworthiness by restricting direct communication between nodes. In this study, a trust model based on plausibility, experience, and type of vehicle is presented to cope with inaccurate, incomplete and uncertainty data under both line of sight (LoS) and none-line of sight (NLoS) conditions. In addition, a model using the k-nearest neighbor (kNN) classification algorithm based on feature similarity and symmetry is developed to detect the NLoS condition. Radio signal strength indicator (RSSI), packet reception rate (PDR) and the distance between two vehicle nodes are the features used in the proposed kNN algorithm. Moreover, due to the big data generated in VANET, secure communication between vehicle and edge node is designed using the Cuckoo filter. All obtained results are validated through well-known evaluation measures such as precision, recall, overall accuracy, and communication overhead. The results indicate that the proposed trust model has a better performance as compared to the attack-resistant trust management (ART) scheme and weighted voting (WV) approach. Additionally, the proposed trust model outperforms both ART and WV approaches under diffierent patterns of attack such as a simple attack, opinion tampering attack, and cunning attack. Monte-Carlo simulation results also prove validity of the proposed trust model.