You are on page 1of 10

SPECIAL SECTION ON INTERNET-OF-THINGS (IOT) BIG DATA TRUST MANAGEMENT

Received August 21, 2018, accepted September 15, 2018, date of publication November 9, 2018, date of current version October 24, 2019.
Digital Object Identifier 10.1109/ACCESS.2018.2876153

TMEC: A Trust Management Based on Evidence


Combination on Attack-Resistant and
Collaborative Internet of Vehicles
JI-MING CHEN1 , TING-TING LI1 , AND JOHN PANNEERSELVAM 2, (Member, IEEE)
1 School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang 212013, China
2 School of Electronic, Computing and Mathematics, University of Derby, Derby DE22 1GB, U.K.

Corresponding author: Ji-Ming Chen (jmchen@ujs.edu.cn)


This work was supported in part by the Major Projects of Natural Science Research in universities in Jiangsu Province under Grant
17KJA413001.

ABSTRACT Message transmission in vehicular networks is increasing in popularity which exploits the net-
work nodes to transmit messages using cooperative communication in a multi-hop fashion. But the increasing
number of malicious nodes in the high-speed Internet of Vehicles demands additional methodologies to
quickly detect the presence of such nodes to avoid serious security consequences. Early detection of mali-
cious nodes, and accurate assessment of complex data to assess the node reliability are of absolute importance
in vehicular networks. To this end, this paper proposes a security scheme that uses evidence combination
method to combine local data with external evidence to evaluate the reliability of multi-dimensional data
received from other peer nodes. In addition, this paper uses European Telecommunications Standards
Institute standard and Decentralized Environmental Notification Message, and proposes a trust calculation
method based on collaborative filtering by introducing a small-time interval to detect the changes in the node
behaviors. While the former solution helps more accurate computation of the direct trust value, the latter
scheme can calculate the indirect trust based on recommendations received from neighbors, ultimately to
obtain the global trust value. Finally, more effective traffic data can be obtained to help traffic prediction.
Experiments conducted under various network scenarios demonstrate that our proposed scheme outperforms
the existing trust models, such as precision or recall and can resist bad-mouth attacks, selective-misbehavior
attacks, and time-dependent attacks, especially under larger proportions of malicious nodes.

INDEX TERMS Cooperative communication, data processing, Internet of Vehicles, intrusion detection,
security management.

I. INTRODUCTION messages to vehicles for providing traffic-related status infor-


The emergence of Internet of Vehicles, as an integration of mation and event-related asynchronous warning notifications
Internet of Things (IoT) and wireless vehicular communica- and danger alerts. Such process usually involves message
tion networks, provides more effective value-added services transmission targeted at multiple people or cars, using
for vehicular users [1], [2], as is shown in Fig.1. Enhanced high-speed wireless networks. In this context, IoV exhibits
safety and intelligent traffic system is always a growing need excellent potential for developing effective and reasonable
for any road transportation system. IoV can potentially facil- routes and behavior plans for individuals involved in trans-
itate a safety-aware evaluation of road traffic conditions and portation. However, in a realistic scenario, any two vehicle
with the aid of other modern information technology, accurate nodes may not communicate directly during most of the
evaluation and prediction of traffic conditions are also possi- instances. Often, vehicles need to cooperate with other peer
ble. For example Decentralized Environmental Notification nodes for relaying information through a multi-hop broadcast
Message (DENM), as proposed by the European Telecommu- vehicles-to-vehicles communication. Thus, the reliability of
nications Standards Institute (ETSI), periodically broadcasts the relay nodes has an important role to play in such a
transmission. IoV, due to its open wireless channel charac-
The associate editor coordinating the review of this manuscript and teristics and increasing reliance on communication technol-
approving it for publication was Yulei Wu. ogy, is also more vulnerable to malicious attacks such as

This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see http://creativecommons.org/licenses/by/4.0/
VOLUME 7, 2019 148913
J.-M. Chen et al.: TMEC on Attack-Resistant and Collaborative IoV

order to enhance their respective credit ratings and submit


negative feedback to others), this paper uses the trust rec-
ommendation of collaborative filtering, and uses the Resnick
standard prediction formula [6] to calculate the recommended
trust of the neighbor nodes, finally obtains the global trust.
To evaluate the performance of proposed scheme, large-scale
experiments have been conducted. Experiment results show
that the proposed scheme can accurately evaluate node trust
and data trust, can detect malicious behavior effectively,
and can resist attacks such as bad-mouth attacks, selective-
misbehavior attacks and time-dependent attacks. Even in the
situation where the proportion of malicious nodes is relatively
large, the proposed scheme outperforms the existing tech-
niques. More specifically, this paper presents a trust manage-
FIGURE 1. IoV architecture. ment based on evidence combination called TMEC to cope
with malicious attacks, and evaluates the global node trust
bad-mouth attacks, selective-misbehavior attacks and time- and data trust. The major contributions of this work are listed
dependent attacks etc. It is common for vehicle nodes to reject as follows.
the relay request from other peer vehicles in order to save • Firstly, the evidence combination method is used to eval-
their own resources from being compromised by adversaries. uate multi-dimensional data trust based on D-S theory in
So it is important to evaluate not only the trustworthiness order to obtain more effective traffic data.
of the interacting nodes, but also the legality of the received • Secondly, we use the ETSI standard and DENM to
messages. Existing trust models mainly interrogate the user’s perceive the interactions between vehicles and to eval-
information which helps decision-making during the trust uate the direct trust in each time period, which is
evaluation process. Trust value calculation in existing models beneficial to quickly detect the change of behavior
usually depends on the integration of multiple types of data, patterns.
but this may not hold well due to the complex relation- • Thirdly, in order to avoid collusion attacks, the proposed
ship among the data [3]. Nodes sometimes may encounter TMEC scheme adopts the trust recommendation of col-
conflicting traffic information reported by multiple sources. laborative filtering and selects the trustworthy neighbors
Thus trust evaluation models should necessarily include data by using Cosine-based similarity, ultimately to get a
integration, and accurate calculation of the trust value. more accurate global trust value.
A good range of works have been previously proposed for
the trust models. The work presented in [4] evaluated the node The remainder of this paper is organized as follows.
trustworthiness by referring to the trust value of nodes, believ- In section 2, we analyze the current situation of existing trust
ing that nodes with highly recommended trust value is trust- management and the detection of dishonest behaviors, and
worthy. However, it is possible that nodes performing well point out their advantages and disadvantages. Section 3 intro-
during data forwarding (data is correctly forwarded), may duces the model definition of the TMEC scheme. The
behave maliciously later during recommendation (provides proposed scheme is presented in Section 4. In Section 5,
incorrect recommendation information). Therefore, filtering the experimental study has been conducted. Finally, the con-
out the dishonest nodes becomes a serious challenge. The clusion is drawn in Section 6.
paper [5] proposed to use data fusion technology to merge
multiple data reported by different nodes so as to extract more II. RELATED WORKS
effective messages. Collaborative cooperation usually plays a Recently, the existence of selfishness and malicious behav-
significant role in IoV, since the data contributed by a single iors has extremely motivated the research in the area of
user is often incomplete and sparse. Furthermore, the network trust management. Trust management bypasses traditional
often includes dishonest nodes, which restrains two vehicles cryptography-based security mechanisms to handle inter-
being connected. nal attackers who own certificates, which is widely used
This paper is aimed at overcoming the drawbacks of for secure communications over vehicular networks [7].
traditional trust models by resolving the aforementioned Moreover, trust model can potentially overcome the secu-
problems, based on the D-S theory. This is achieved by rity drawbacks found in existing cryptography-based solu-
analyzing the local data along with the received traffic data tions. Trust models are used to protect privacy and to
and by using the evidence combination method to help traffic ensure secure and reliable data dissemination in IoV.
prediction and management. According to the ETSI standard Trust management is divided into three categories such
and DENM, vehicles calculate direct trust based on direct as Entity-oriented Trust Models (ETM), Data-oriented
interactions. In order to reduce the impacts of collusion (that Trust Models (DTM) and Hybrid-oriented Trust Models
is, users only submit positive feedback to their friends in (HTM).

148914 VOLUME 7, 2019


J.-M. Chen et al.: TMEC on Attack-Resistant and Collaborative IoV

A. ETM C. HTM
In order to ensure secure communication and to prevent HTM is designed to ensure reliable communication between
malicious nodes from sending fake messages or from for- nodes, and to recuperate malicious nodes and messages
warding any messages, ETM evaluates the reputation of the that could potentially cause an interruption, mainly based
nodes in a distributed mode without the need for process- on node reputation ratings, which is similar to ETM.
ing the exchanged data. Buchegger et al. [8] presented the Marmol et al. [13] proposed a scheme to support VANETs
CONFIDANT protocol, which encourages nodes collabo- trust and reputation management, where the nodes have been
ration to penalize misbehaving nodes. CONFIDANT sets divided into three different trust levels and the protocol has
up four components in each node: a Monitor, a Reputation been associated with the confidence of each messages. Com-
System, a Trust Manager and a Path Manager. The Monitor parisons have been made with the three fuzzy sets (untrusted,
is used to observe and identify abnormal routing behaviors. +/− trust, trust) by combining the node category, the mes-
The Reputation System calculates the reputation of each sage confidence level and the recommended messages from
node based on the observed behaviors. The Trust Manager RSUs and other nodes. Then decisions have been made upon
exchanges alerts with other trust managers about node mis- whether the received messages can be forwarded or not.
behaviors. The Path Manager maintains path rankings and A given message will be dropped if it belongs to the first set,
responds to various routing messages. The possible down- accepted but not forwarded if it belongs to the second set, and
side of CONFIDANT is that an attacker could deliberately both accepted and forwarded for the trusted ones. However,
propagate a false alarm to other nodes, whereby altering a this scheme has pitfalls in the number of recommendations
good node as malicious. In order to detect and eliminate mali- and the trust value of the recommended nodes. Li et al. [14]
cious nodes, Haddadou et al. [9] used the trust value based on proposed a trust management scheme based on the repu-
the node’s behaviors to estimate its sending cost. Malicious tation, which evaluated the credibility of the senders and
nodes usually characterize a higher sending cost, which limits the messages sent by senders under three dimensions: direct
the activities of malicious nodes in the network. Unfortu- trust, indirect trust and node reputation. However, using an
nately, communication overheads increase with a decrease in additional infrastructure, called the reputation management
the network cooperation ability. Choosing the initial cost and center to achieve the centralized trust computation increases
distinguishing the selfish behaviors and resolving the packet the communication overhead.
loss issues during transmission are quite challenging in this Under the assumption that all application messages are
scheme. encrypted, Chen et al. [15] proposed a beacon-based trust
model to enhance the user’s location privacy protection.
B. DTM The proposed scheme used beacons and event-based mes-
In order to avoid the removal of malicious nodes leading to sages to protect the privacy of VANETs. The main idea is
connection interruption between nodes, we only consider fil- to cross-check the feasibility of these two types of mes-
tering malicious data without revocation of malicious nodes sages to determine whether other messages are trusted or
in DTM. Zhang et al. [10] proposed a semi-distributed trust not. Although this solution can achieve privacy protection
management for message dissemination and evaluation. The of multi-hop vehicles (more than one hop), it cannot effec-
cluster head is responsible for broadcasting and collecting tively evaluate various kinds of information and cannot detect
the broadcast opinions, and for discarding the untrustworthy attacks that take place on the upper layer (application, routing
messages and/or relays those are not legitimate. But the main and etc.). T-CLAIDS [16] proposed a trust-aware intrusion
problem of this scheme lies in the choice of cluster heads, detection solution, where the node density, mobility and the
particularly when malicious nodes become the cluster heads. vehicle movement direction have been taken into account.
Gurung et al. [11] used three key metrics such as content This solution maintains probability matrices of all actions,
similarity, content conflicts, and routing path similarity to which is updated in the iteration until a convergence value
determine whether the received message is legal or not. is achieved, in order to provide an approximate representa-
However, this scheme have not considered the high time tion of the global trust. This scheme performs well when
complexity, high mobility and the case of node sparsity into the malicious behaviors are stable throughout a given time,
account. A data-based trust model has been proposed in [12], but not very efficient in the case of unpredictable events.
in which the trust of any entity depends on its role (e.g. the Furthermore, the convergence time of the vector becomes
trust value T [police vehicle = 1; common vehicle = 0.5]). very long when the nodes are sparse. Using standardized
This model used different trust metrics to determine whether message services of ETSI-ITS [17], [18], T-VNets [19] can
the reported events are real. Finally, Dempster-Shafer theory predict traffic and assess the distribution of attackers within
and Bayesian inference have been used to assess the evidence the network. The T-VNets protocol achieves high detection
associated with the events. However, this method exhibits rates and low overhead, which now is the only Standardized
good performance only for the cases of non-redundant and Trust Architecture.
sufficient data but does not have obvious advantages when Table 1 illustrates the performance comparison√of a few
vehicles is sparse in the network. typical schemes of different requirements, where ‘‘ ’’ shows

VOLUME 7, 2019 148915


J.-M. Chen et al.: TMEC on Attack-Resistant and Collaborative IoV

TABLE 1. Performance comparison.

that the scheme satisfies the requirements. ‘‘×’’ represents


the scheme do not satisfy the requirements and ‘‘−’’ rep-
resents that the paper did not consider this requirement.
As shown in Table 1, existing works still characterize sev-
eral deficiencies, such as data trust and the characteristic of
Attack-Resistant. But the TMEC scheme can fully meet the
requirements of anti-attack in IoV.

III. DEFINITION
This section discusses the recent research problem, and intro-
duces the network model and the attack model.

A. NETWORK MODEL
IoV refers to a mobile communication network which com-
bines wireless communication technology with IoV, and pro-
vides value-added services for vehicular users based on the
social relationship between vehicles communicating with FIGURE 2. Improved trust architecture.
each other through collaboration.
IoV can continuously monitor and share road and traffic
conditions. The upper IoV server is usually a set of pow- malicious nodes if necessary [21]. Each user can only derive
erful server clusters, whose powerful computing and stor- the trust value of a given part of the nodes, and the trusted
age capabilities provide roadside communication services nodes will also trust another part of the nodes. As this
and store information such as vehicle identity and historical phenomenon is propagated, starting from any node, this
interactions, which is equivalent to car cloud. The middle trust relationship will continue to spread along the network.
layer is designed to create a virtual environment for vehi- So, vehicles never directly interacted before in IoV can also
cles’ trust assessment and to undertake communication with agree with a basic understanding and establish an appro-
neighboring roadside units in a light-weight environment. priate trust relationship. In IoV, message filtering is imple-
The lower layer is aimed to solve the vehicle cooperation. The mented through the mutual trust evaluation between vehicles,
vehicle accesses a local network and transmits data through as shown in Fig. 2. The TMEC can be divided into different
multi-hop cooperative communication. All the vehicles share modules responsible for (1) Computing data trust; (2) Esti-
the resources reserved in the middle layer to support the com- mating the global trust; (3) Detecting the malicious attacks.
pletion of trust assessment among vehicles, which improves The vehicle entity combines the collected traffic evidence to
the resource utilization rate and service quality of the vehi- calculate the data trust to assess the data reliability. Then the
cles, as shown in Fig. 2. global trust value is obtained by direct trust and indirect trust,
Recently, IEEE802.11p has been widely used for data which is used to assess the behavior of the target node. Then
transmission between vehicles to vehicles (V2V) and vehi- the calculated trust value is updated into its own trust list.
cles to roadside units (V2R). In the future, 5G will bring a
new communication area with faster data transmission, lower C. ATTACK MODEL
delay and higher reliability [20]. The entities involved in transportation are more susceptible
to various attacks, such that nodes and messages can be
B. TRUST MODEL compromised at any time. An adversary can eavesdrop, block,
Trust is a subjective behavior expectation to choose which modify, forge or discard information within the wireless com-
nodes to cooperate with, even take action to punish the munication range between any devices. Its main objectives

148916 VOLUME 7, 2019


J.-M. Chen et al.: TMEC on Attack-Resistant and Collaborative IoV

TABLE 2. Parameter definition.

FIGURE 3. Improved trust architecture.

include interception of normal data transmission, forging or


modification of data, submission of false advice to build
benign nodes etc. [22], [23]. Specifically, this paper takes the
following malicious attacks into account.
Bad-Mouth Attacks: Malicious nodes spread negative
comments about a benign node to compromise its reputation
in the network. This collusion may lead to blocking effective
paths in the network by confusing the trust and reputation
management mechanisms.
Selective Misbehavior Attacks: This attack means that the
malicious node provides some nodes with false messages,
works properly for other nodes in the network. The behavior
traffic data may not be accurate. In DST, the probability is
modes of attackers are inconsistent with different people,
replaced by the uncertainty interval of the belief function (bel)
which leads to inconsistent trust between different nodes and
and the plausibility function (pl), that is, (bel, pl), which
such nodes are difficult to be detected by the trust manage-
denotes the uncertain interval in the suspicious behaviors
ment schemes.
of the nodes. Bel is the lower bound of this interval and
Time-dependent Attacks: The nodes change their behavior
represents the supporting evidence. In other words, (0, bel)
based on time in this attack. Nodes work normally for some
indicates a preference for support and so the node is trusted.
time, but provide unfair ratings at other times.
Pl is the upper bound of this interval and represents non-
denied evidence. Therefore, (pl, 1) indicates a preference to
IV. SCHEME DESIGN reject, since it regards the corresponding node as malicious.
This section details the proposed TMEC scheme. Direct trust The bel with regards to event ei observed by node Ni is
and recommended trust have been considered in our approach calculated as follows.
in order to aid vehicles whilst evaluating the trust value with X
better accuracy. The TMEC scheme is based on the DENM of belNi (ei ) = mNi (eb ) (1)
ETSI standard. Assuming that node j is a direct neighbor of e:eb ∈ei

node i, then node i can verify whether the event j broadcasts eb represents all the basic events that make up event ei .
is true or false. In this scenario, the vehicle first perceives mNi (eb ) represents the view of node Ni to event eb . Partic-
the traffic data, uses the evidence combination method to ularly, if node Ni only has a single report of the node Nk , that
analyze the large amount of collected data, and extracts useful is ei ⊂ ei .
information, sums up the evidence of data analysis for trust belNi (ei ) = mNi (ei ) (2)
management, and assesses the data trust. This process calcu-
lates the global trust value, as shown in Fig. 3. The system From the D-S theory, it can be understood that there is a
parameter definition is given in Table 2. certain relationship between pl and bel, that is
pl(ei ) = 1 − bel(ei ) (3)
A. DATA TRUST
Among them, ei is the event that does not appear in ei . So,
Dempster-Shafer theory (D-S) [24], [25] is used to combine
multiple pieces of evidence together even though some of the belNi (Nk ) = mNi (Nk ) = p (4)

VOLUME 7, 2019 148917


J.-M. Chen et al.: TMEC on Attack-Resistant and Collaborative IoV

plNi (Nk ) = 1 − belNi (Nk ) = 1 − p (5) TABLE 3. Parameter definition.

Given that trust represents the lower bound of the uncer-


tainty interval and indicates supportive evidence, the node
trust value can be defined as follows.
K
bel(Ni ) = m(Ni ) = ⊕ mNk (Ni ) (6)
k=1
mNk (Ni ) donates the view of node Nk on another node Ni .
Reports from different nodes can be combined using the D-S tx tx
theory. Specifically, the D-S theory is used to combine the where, x ≥ 1, L(j,k) and M(j,k) stand for the number of
tx
L(j,k)
local evidence collected by the nodes themselves and the legal and malicious interactions, respectively. tx tx rep-
M(j,k) +L(j,k)
external evidence shared by other nodes, as shown below.
P resents the proportion that legal interactions account for, and
q,r:e ∩e =N m1 (eq )m2 (er ) 1 − tx 1 is a variable parameter. When the legal interaction
m1 (Ni ) ⊕ m2 (Ni ) = P q r i (7) L(j,k) +1
1 − q,r:eq ∩er =φ m1 (eq )m2 (er ) tx
of vehicles increases (their value of H(j,k) will approach closer
to 1), their honesty index will also increase. The noted range
B. RECOMMENDATION TRUST
of honesty values of the nodes under different time periods
Nodes with similar characteristics may also exhibit similar are used to calculate the direct trust, where the recent time
preferences on other nodes. Therefore, based on the collab- period enjoys better weightage. Specifically, the direct trust
orative filtering, this paper uses the Cosine-based similarity is calculated as follows.
metric to measure the similarity between two vectors [26].  Pn−1 tx 
Then, the similarity cos(j,k) between two nodes is measured x=1 H(j,k) tn
α∗ n−1 + H(j,k)
by computing the cosine angle between the two vectors, DT (j, k) = (11)
as shown in Equation 8, where ‘‘•’’ represents the dot product α+1
of two vectors. where, α is a factor between 0 and 1 which denotes the
r r rr weight given to the involved time periods. The precondition
j•k (8)
cos(j, k) = |j|∗|k| before computing the direct trust is that the node j and node k
must have interacted at least once, otherwise, DT (j, k) is still
Smaller value of cos (j, k) represents a greater conflict
unchanged from its current value.
degree between two given nodes, with a lower similarity.
In particular, the recommended trust value is computed using
D. GLOBAL TRUST
the following steps.
(1) Form Trust Matrix: Each node forms a trust rating on In IoV, the global trust usually relies on two types of trust
other nodes, which is defined as a matrix R. to evaluate the node behaviors, that is, the direct trust and
(2) Choose Trusted Neighbors: Calculate the similarity of the recommended trust. The recommended trust is given in
all the nodes in the model, and then select top i most similar Section 4.2, and the direct trust is given in Section 4.3. Direct
nodes. trust is defined as the direct interaction between vehicles
(3) Calculate Neighbors Recommendation Trust: Calculate based on local evidence. Indirect trust, on the other hand,
the recommended trust value IT (j, k) of node j on node k. is the interaction between vehicles based on the views of
Si is the set of most similar nodes to node j. Rj = 6i Rj,i others, so direct trust is more important than indirect trust.
and Rk = 6i Rk,i represent the overall trust ratings to other Suppose that the vehicle interaction frequency is n. As the
nodes of node j and node k, respectively. Based on Resnick’s number of vehicle interactions increases, we use 1/(n + 1) as
standard prediction formula, IT (j, k) is calculated as follows. an adjustment factor so that direct trust can be assigned with
more weight. Then, the global trust is calculated as follows.
6i∈Si cos(j, k) ∗ (Rk,i − Rk )
IT (j, k) = Rj + (9) 1 1
6k∈Si | cos(j, k)| Trust(j, k) = [(1 − ) ∗ DT (j, k)] + [ ∗ IT (j, k)]
n+1 n+1
C. DIRECT TRUST (12)
In order to quickly detect the changes in the node behavior
patterns, the TMEC scheme introduces a small time interval
V. SIMULATION AND PERFORMANCE
to assess the direct trust value of each time period [27].
tx This paper uses NS2 as simulation platform. To evaluate the
Before calculating the direct trust, let H(j,k) represents
proposed TMEC Scheme, we rely on the IEEE 802.11p stan-
the reports of node j to the legal behavior of node k over a
tx dard to compare the performance of the baseline method [28].
certain period of time tx . Then H(j,k) is calculated as follows.
The generated vehicular traffic is based on Citymob mobility
tx " #
model [29], which uses SUMO [30] to create mobility traces.
tx
L(j,k) 1
H(j,k) = tx tx ∗ 1 − tx (10) Table 3 lists the parameters used in the simulation scenario.
M(j,k) + L(j,k) L(j,k) + 1 Here, we use Precision (P) and Recall (R) as evaluation

148918 VOLUME 7, 2019


J.-M. Chen et al.: TMEC on Attack-Resistant and Collaborative IoV

FIGURE 4. The impact of node density (a) Precision (b) Recall.

FIGURE 5. The impact of malicious nodes (a) Precision (b) Recall.

parameters, which are widely used in Machine Learning and In other words, as the number of nodes increases, the recall
Information Retrieval for accuracy assessment. In this paper, rate becomes higher.
P and R are defined as follows [31]. Fig. 5(a) and Fig. 5(b) presents the comparison between
real malicious nodes detected TMEC and other schemes based on precision and recall at dif-
P= (13) ferent percentages of malicious nodes in the network. When
untrusted nodes detected
malicious nodes detected the proportion of malicious nodes is higher, corresponding
R= (14) decrease in both precision and recall is noted. However, recall
real malicious nodes
and precision of the TMEC scheme are still higher than those
A. PRECISION AND RECALL of the other three methods. Further an increase in recall and
Fig. 4 shows the precision and recall value with respect to precision of TMEC is not obvious when the percentage of
the node density. Fig. 4(a) compares the precision of the malicious nodes increases. This is true because collaborative
TMEC method with the baseline method when the node filtering provides advice or prediction to nodes, thus the
density varies. Experiments show that when the node density quality of recommendations is greatly improved. In addition,
is high, the precision of both the two methods is higher than D-S theory is used to combine multiple pieces of evidence
90%, but the precision of the proposed scheme is always together even though some of the traffic data may not be
higher than the baseline method. This is due to the fact that accurate.
with more number of nodes, the probability of receiving real Fig. 6 shows the precision and recall in regards to the vehi-
data from other vehicles is higher, which makes it easier cle speed. It is evident that the TMEC scheme is superior to
to detect dishonest behaviors. The TMEC uses D-S theory, the baseline method. This is because that other schemes lack
to fuse different evidence, in order to get new evidence, where real-time online central management server, which makes
(bel, 1) donates untrusted range and (pl, 1) donates absolutely them harder to realize vehicle information centralized trans-
malicious nodes. Similarly, Fig. 4(b) shows the comparison mission, storage and efficient evaluation, particularly when
of recall between the TMEC and the baseline method. It can the speed of the vehicle increases. In addition, both the preci-
be observed that the recall of the proposed TMEC method sion and recall decreases with an increase in the speed of the
is also better than the baseline method. Assuming that the vehicle. This is due to the fact that along with an increase in
value of R is x/y, if the number of real malicious nodes is the vehicle speed, the packet loss rate increases, which make
increases to y + a, then the maximum value of R could be it difficult for the nodes to spread information about untrusted
(x + a)/(y + a). In addition, (x + a)/(y + a) is more than x/y. vehicles.

VOLUME 7, 2019 148919


J.-M. Chen et al.: TMEC on Attack-Resistant and Collaborative IoV

FIGURE 6. The impact of vehicle speed (a) Precision (b) Recall.

FIGURE 7. The impact of malicious nodes under bad-mouth attack (a) Precision (b) Recall.

B. ANTI-ATTACK attackers and malicious behaviors. Fig. 8 indicates that the


In addition to the evaluation of the overall performance under TMEC scheme can still resist selective-misbehavior attacks
different network parameters, this study also examines the and achieve high precision and recall. On the other hand,
feasibility of the proposed TMEC scheme under anti-attack. when the percentage of attackers increases, the precision and
The attack model is presented in Section 2.3. Performance of recall of the baseline method are significantly degraded.
the proposed TMEC scheme is evaluated against the baseline
method under different types of malicious attacks. Let us C. DETECTION RATE
assume that the misbehaving attack patterns of the nodes Using the global trust assessment, any vehicle j can evaluate
in the network characterize a probability of 0.5. In order to its neighbor’s trust value to assess the trustworthiness of
quickly detect the changes in the node behavior patterns, this neighbor vehicles k, in order to make decisions upon dropping
paper introduces a small time interval, so as to comment untrustworthy messages or delaying legal messages for the
on the trust of the nodes under each time period, which is purpose of continuing the dissemination process. The Trust
effective against time-dependent attacks. Threshold varies in accordance with the security needs of the
Fig. 7 shows that the performance of precision and recall system. For example, the Trust Threshold may be higher for
under bad-mouth attacks under increasing number of mali- security-related events. Thus, whether the neighbor vehicle k
cious nodes. It can be observed that even if 40% of the is trusted or not is expressed as follows.
malicious nodes performs bad-mouth attacks, the preci- 
sion and recall is still higher than 80%. But the baseline k is a trusted neighbor,
 if Trust(j, k)
method is especially plagued by bad- mouth attacks. Note ≥ TrustThreshold (15)
that bad-mouth attacks aim to intentionally share fake trust

k is an untrusted neighbor, otherwise

views so that the malicious nodes will be falsely accused
of malicious behaviors. The use of collaborative filtering Fig. 9 shows the comparison of the detection rate between
based on recommendation strategy and D-S theory makes the the proposed TMEC scheme and a few baseline methods
proposed scheme to be more resistant to attacks than the base- under the different Trust Threshold. It is clear that the
line method. Selective-misbehavior attacks show different detection rate of the proposed scheme is obviously better
attack patterns to different nodes, so it is difficult to identify than other schemes. In addition, a higher Trust Threshold

148920 VOLUME 7, 2019


J.-M. Chen et al.: TMEC on Attack-Resistant and Collaborative IoV

FIGURE 8. The impact of malicious nodes under selective-misbehavior attack (a) Precision (b) Recall.

as follows.
2∗ P∗ R
F= (16)
P+R
As evident from Fig. 10, the value of F-Score decreases
significantly as the Trust Threshold increases, especially
when the Trust Threshold is more than 0.6, the F-Score value
drops sharply. However, the value of F-Score of the proposed
TMEC scheme is always better than the other three schemes.

VI. CONCLUSION
Trust establishment over vehicular networks can enhance
FIGURE 9. The impact of trust threshold on detection rate. the security of vehicles against probable insider attackers.
This paper presented an improved trust model to evaluate
the user’s trust value, analyze and detect malicious nodes,
and further developed a trust management scheme based on
evidence combination, called TMEC to resist attacks. When
calculating the trust value, the proposed scheme introduced
uncertainty to combine the information received from multi-
ple sources. With the proposed scheme, dishonest behaviors
of the nodes can be effectively detected under a small time
interval. The simulation experiments also proved its validity
of the proposed scheme under different experiment settings.
The key feature of IoV cooperative information exchange
and its social application under different virtual commu-
nities [32], which are changing the way of data exchange
and communication. Different from the traditional mobile
FIGURE 10. The impact of trust threshold on F-Score.
social networks [33], according to the upper vehicle cen-
tral cloud, IoV obtains the social relationships among the
value corresponds to a lower detection rate. But the TMEC vehicular environments based on the analysis of their social
scheme always characterizes a higher detection rate than the networks, and provides a more personalized service based on
other three schemes. Even when the Trust Threshold is high the combination of their preferences and their geographical
up to 0.9, the detection rate is still higher than 20%, but, position. IoV facilitated novel strategies of securing message
the advantages of other methods are not obvious. transmission with more ease and convenient. In the future,
IoV can potentially combine individual isolated vehicles into
D. F-SCORE a community through Internet of things.
Higher P value usually corresponds to a lower R value, and
vice versa. In order to solve the problem of contradiction ACKNOWLEDGMENT
between P and R, we use F-Score (F) as an assessment The authors would like to thank the anonymous reviewers for
metric to reflect the overall performance, which is defined their constructive comments and helpful suggestions.

VOLUME 7, 2019 148921


J.-M. Chen et al.: TMEC on Attack-Resistant and Collaborative IoV

REFERENCES [26] C. Piao, J. Zhao, and J. Feng, ‘‘Research on entropy-based collabora-


[1] K. M. Alam, M. Saini, D. T. Ahmed, and A. El Saddik, ‘‘VeDi: A vehicular tive filtering algorithm,’’ in Proc. IEEE Int. Conf. E-Bus. Eng. (ICEBE),
crowd-sourced video social network for VANETs,’’ in Proc. 39th Annu. Oct. 2007, pp. 213–220.
IEEE Conf. Local Comput. Networks Workshops, 2014, pp. 738–745. [27] C. A. Kerrache, C. T. Calafate, N. Lagraa, J.-C. Cano, and P. Manzoni,
[2] X. Chen and L. Wang ‘‘A cloud-based trust management framework for ‘‘RITA: RIsk-aware trust-based architecture for collaborative multi-hop
vehicular social networks,’’ IEEE Access, vol. 5, pp. 2967–2980, 2017. vehicular communications,’’ Secur. Commun. Netw., vol. 9, no. 17,
[3] X. Liu and L. Wang, ‘‘Advancement of anonymity technical for data pub- pp. 4428–4442, Nov. 2016.
lishing,’’ J. Jiangsu Univ. (Natural Sci. Ed.), vol. 37, no. 5, pp. 562–571, [28] I. R. Chen, F. Bao, and M. J. Chang, ‘‘Dynamic trust management for
2016. delay tolerant networks and its application to secure routing,’’ IEEE Trans.
[4] W. Li and H. Song, ‘‘ART: An attack-resistant trust management scheme Parallel Distrib. Syst., vol. 25, no. 5, pp. 1200–1210, May 2013.
for securing vehicular ad hoc networks,’’ IEEE Trans. Intell. Transp. Syst., [29] F. J. Martinez, J. C. Cano, and C. T. Calafate, ‘‘CityMob: A mobility
vol. 17, no. 4, pp. 960–969, Apr. 2016. model pattern generator for VANETs,’’ in Proc. IEEE Int. Conf. Commun.
[5] W. Zhao, T. Fang, and Y. Jiang, ‘‘Data fusion using improved Workshops, May 2008, pp. 370–374.
Dempster–Shafer evidence theory for vehicle detection,’’ in Proc. 4th Int. [30] D. Krajzewicz, ‘‘Traffic simulation with SUMO—Simulation of urban
Conf. Fuzzy Syst. Knowl. Discovery (FSKD), Aug. 2007, pp. 487–491. mobility,’’ in Fundamentals of Traffic Simulation. New York, NY, USA:
[6] P. Resnick, N. Iacovou, and M. Suchak, ‘‘GroupLens: An open architec- Springer, 2010, pp. 269–293.
ture for collaborative filtering of netnews,’’ in Proc. ACM Conf. Comput. [31] J. Davis and M. Goadrich, ‘‘The relationship between precision-recall
Supported Cooperat. Work, Oct. 1994, pp. 175–186. and ROC curves,’’ in Proc. 23rd Int. Conf. Mach. Learn., Jun. 2006,
[7] H. Wu and L. Wang, ‘‘Trust distance based malicious nodes detec- pp. 233–240.
tion method in vehicular ad hoc network,’’ Comput. Sci., vol. 42, [32] Y. Guo, L. Liu, Y. Wu, and J. Hardy, ‘‘Interest-aware content discovery
no. 8, pp. 157–160, 2015. in peer-to-peer social networks,’’ ACM Trans. Internet Technol., vol. 18,
[8] S. Buchegger and J.-Y. LeBoudec, ‘‘Performance analysis of the CON- no. 3, May 2017, Art. no. 39.
FIDANT protocol,’’ in Proc. 3rd ACM Int. Symp. Mobile Ad-Hoc [33] L. Liu, N. Antonopoulos, M. Zheng, Y. Zhan, and Z. Ding, ‘‘A socioe-
Netw. Comput., 2002, pp. 226–236. cological model for advanced service discovery in machine-to-machine
[9] N. Haddadou, A. Rachedi, and Y. Ghamri, ‘‘A job market signaling scheme communication networks,’’ ACM Trans. Embedded Comput. Syst., vol. 15,
for incentive and trust management in vehicular ad hoc networks,’’ IEEE no. 2, May 2016, Art. no. 38.
Trans. Veh. Technol., vol. 64, no. 8, pp. 3657–3674, Aug. 2015.
[10] J. Zhang, C. Chen, and R. Cohen, ‘‘Trust modeling for message relay
control and local action decision making in VANETs,’’ Secur. Commun.
Netw., vol. 6, no. 1, pp. 1–14, Jan. 2013.
[11] S. Gurung, D. Lin, and A. Squicciarini, ‘‘Information-oriented trustwor-
thiness evaluation in vehicular ad-hoc networks,’’ in Proc. Int. Conf. Netw. JI-MING CHEN received the Ph.D. degree from
Syst. Secur., 2013, pp. 94–108. Jiangsu University, where he is currently an Asso-
[12] M. Raya, P. Papadimitratos, V. D. Gligor, and J.-P. Hubaux, ‘‘On data- ciate Professor with the School of Computer Sci-
centric trust establishment in ephemeral ad hoc networks,’’ in Proc. 27th ence and Communication Engineering. He has
Conf. Comput. Commun., Apr. 2008, pp. 1238–1246. published his recent research works in notable
[13] F. G. Mármol and G. M. Pérez, ‘‘TRIP, a trust and reputation infrastructure- peer-reviewed international conferences and jour-
based proposal for vehicular ad hoc networks,’’ J. Netw. Comput. Appl., nals. His research interests are in areas of cloud
vol. 35, no. 3, pp. 934–941, May 2012. computing and information security. His current
[14] X. Li, J. Liu, X. Li, and W. Sun, ‘‘RGTE: A reputation-based global
research is focused on cloud computing.
trust establishment in VANETs,’’ in Proc. 5th Int. Conf. Intell. Netw.
Collaborative Syst., Sep. 2013, pp. 210–214.
[15] Y.-M. Chen and Y.-C. Wei, ‘‘A beacon-based trust management system for
enhancing user centric location privacy in VANETs,’’ J. Commun. Netw.,
vol. 15, no. 2, pp. 153–163, Apr. 2013.
[16] N. Kumar and N. Chilamkurti, ‘‘Collaborative trust aware intelligent
intrusion detection in VANETs,’’ Comput. Elect. Eng., vol. 40, no. 6,
TING-TING LI received the bachelor’s degree
pp. 1981–1996, Aug. 2014.
[17] J. Santa, F. Pereñguez, and A. Moragón, ‘‘Vehicle-to-infrastructure mes- from Jiangsu University, China, where she is
saging proposal based on CAM/DENM specifications,’’ in Proc. IFIP currently pursuing the master’s degree with the
Wireless Days (WD), Nov. 2013, pp. 1–7. School of Computer Science and Communication
[18] J. Santa, F. Pereñíguez, A. Moragón, and A. F. Skarmeta, ‘‘Experimental Engineering. Her research interests include safety
evaluation of CAM and DENM messaging services in vehicular communi- of the Internet of Vehicles, cryptography, and trust
cations,’’ Transp. Res. C, Emerg. Technol., vol. 46, pp. 98–120, Sep. 2014. management.
[19] C. A. Kerrache, N. Lagraa, C. T. Calafate, J. C. Cano, and P. Manzoni,
‘‘T-VNets: A novel trust architecture for vehicular networks using the stan-
dardized messaging services of ETSI ITS,’’ Comput. Commun., vol. 93,
pp. 68–83, Nov. 2016.
[20] D. Kombate, ‘‘The Internet of vehicles based on 5G communications,’’
in Proc. IEEE Int. Conf. Internet Things (iThings) IEEE Green Comput.
Commun. (GreenCom) IEEE Cyber, Phys. Social Comput. (CPSCom)
IEEE Smart Data (SmartData), Chengdu, China, 2016, pp. 445–448. JOHN PANNEERSELVAM (M’14) received the
[21] X. Chen and L. Wang, ‘‘Exploring trusted data dissemination in a vehicular Ph.D. degree in computer science from the Uni-
social network with a formal compositional approach,’’ in Proc. IEEE 40th versity of Derby, in 2018, and the M.Sc. degree
Annu. Comput. Softw. Appl. Conf. (COMPSAC), Jun. 2016, pp. 616–617.
in advanced computer networks, in 2013, where
[22] L. Wang, X. Li, and H. Zhong, ‘‘The method of revocable group approval
he is currently a Lecturer in computing. His cur-
in VANET,’’ Chin. Sci., Inf. Sci., vol. 43, no. 10, pp. 1307–1325, 2013.
[23] C. H. Li, Y. Liu, and L. Wang, ‘‘Intrusion detection scheme based on traffic rent research is focused on energy efficient cloud
scenarios in vehicular ad-hoc networks,’’ J. Shangdong Univ. (Eng. Sci.), systems and data analytics for high-performance
vol. 44, no. 1, pp. 29–34, 2014. computing. His research interests include cloud
[24] R. R. Yager, ‘‘On the Dempster–Shafer framework and new combination computing, big data analytics, opportunistic net-
rules,’’ Inf. Sci., vol. 41, no. 2, pp. 93–137, Mar. 1987. working, and P2P computing. He is an active mem-
[25] K. Sentz and S. Ferson, ‘‘Combination of evidence in Dempster–Shafer ber of the British Computer Society.
theory. SAND 2002-0835,’’ 2002, pp. 1–5.

148922 VOLUME 7, 2019

You might also like