A study of mechanisms and approaches for IoV trust models requirements achievement | The Journal of Supercomputing
Skip to main content

Advertisement

A study of mechanisms and approaches for IoV trust models requirements achievement

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

Intelligent Transportation Systems (ITS) are a promising research area that offers a variety of applications. The objective of these applications is to enhance road safety, to optimize traffic efficiency, and to provide a better driving experience. Yet, the efficiency of ITS applications, such as safety and driver assistance applications, relies essentially on the exchanged data between different entities of the network. Accordingly, trust management models are used to guarantee the quality of the data and to eliminate malicious and selfish nodes to secure vehicular communications. In this paper, we pay a special attention to the requirements of trust management models used in the context of ITS applications. We also dissected the trust model to extract the mechanisms used in the literature to fulfil the identified requirements. Furthermore, we present the most known simulators and evaluation metrics that are used to validate the proposed models. The aim of this study is to provide a global overview of the mechanisms that may be used to fulfil the crucial requirements of trust management models. For this purpose, we employed a systematic mapping study, through which we carefully analysed 60 selected articles. Through our analysis, five main requirements were identified: scalability, accuracy, robustness, privacy preservation, appropriate response time. Different mechanisms and techniques were applied to meet with the identified requirements. Two main findings are reported: (1) The accuracy and robustness requirements are the most considered requirements. On the other hand, the privacy requirement is the least covered by the publications, (2) the majority of the reviewed papers focus on addressing two or three requirements at most. A little number of publications covered all the requirements. Based on the identified research gaps, we highlight some future directions that may be investigated. We provide general recommendations that may serve as a guideline for researchers who want to design trust models that fulfil certain requirements.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Japan)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

Data availibility statement

Data sharing not applicable to this article as no datasets were generated or analysed during the current study.

References

  1. ETSI (2010) Intelligent transport systems (ITS); communications architecture. Technical report, European standard. Telecommunications series

  2. Hbaieb A, Ayed S, Chaari L (2022) A survey of trust management in the internet of vehicles. Comput Netw 203:108558

    Google Scholar 

  3. Ma S, Wolfson O, Lin J (2011) A survey on trust management for intelligent transportation system. In: Proceedings of the 4th ACM SIGSPATIAL international workshop on computational transportation science, pp 18–23

  4. Tangade SS, Manvi SS (2013) A survey on attacks, security and trust management solutions in vanets. In: 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT), pp 1–6

  5. Soleymani SA, Abdullah AH, Hassan WH, Anisi MH, Goudarzi S, Baee MAR, Mandala S (2015) Trust management in vehicular ad hoc network: a systematic review. Journal on Wireless Communications and Networking 2015(1):1–22

    Google Scholar 

  6. Kerrache CA, Calafate CT, Cano J-C, Lagraa N, Manzoni P (2016) Trust management for vehicular networks: an adversary-oriented overview. IEEE Access 4:9293–9307

    Google Scholar 

  7. Lu Z, Qu G, Liu Z (2018) A survey on recent advances in vehicular network security, trust, and privacy. IEEE Trans Intell Transp Syst 20(2):760–776

    Google Scholar 

  8. El-Sayed H, Chaqfeh M, El-Kassabi H, Serhani MA, Alexander H (2019) Trust enforcement in vehicular networks: challenges and opportunities. IET Wirel Sens Syst 9(5):237–246

    Google Scholar 

  9. Souissi I, Azzouna NB, Berradia T (2019) Trust management in vehicular ad hoc networks: a survey. Int J Ad Hoc Ubiquitous Comput 31(4):230–243

    Google Scholar 

  10. Hussain R, Lee J, Zeadally S (2020) Trust in vanet: a survey of current solutions and future research opportunities. IEEE Trans Intell Transp Syst 22:2553–2571

    Google Scholar 

  11. Rehman A, Hassan MF, Yew KH, Paputungan I, Tran DC (2020) State-of-the-art IoV trust management a meta-synthesis systematic literature review (SLR). PeerJ Comput Sci 6:334

    Google Scholar 

  12. Siddiqui SA, Mahmood A, Sheng QZ, Suzuki H, Ni W (2021) A survey of trust management in the internet of vehicles. Electronics 10(18):2223

    Google Scholar 

  13. Keele S et al (2007) Guidelines for performing systematic literature reviews in software engineering. Technical report, Citeseer

  14. Sharma A, Pilli ES, Mazumdar AP, Gera P (2020) Towards trustworthy internet of things: a survey on trust management applications and schemes. Comput Commun 160:475–493

    Google Scholar 

  15. Al-kahtani MS (2012) Survey on security attacks in vehicular ad hoc networks (VANETs). In: 2012 6th International Conference on Signal Processing and Communication Systems, pp 1–9

  16. La VH, Cavalli AR (2014) Security attacks and solutions in vehicular ad hoc networks: a survey. Int J AdHoc Networking Syst (IJANS) 4(2):1–20

    Google Scholar 

  17. Tyagi P, Dembla D (2014) A taxonomy of security attacks and issues in vehicular ad-hoc networks (VANETs). International Journal of Computer Applications 91(7):22–29

    Google Scholar 

  18. Sumra IA, Hasbullah HB, J-lB AbManan (2015) Attacks on security goals (confidentiality, integrity, availability) in VANET: a survey. In: Laouiti A, Qayyum A, Mohamad Saad MN (eds) Vehicular ad-hoc networks for smart cities. Springer, Singapore, pp 51–61

    Google Scholar 

  19. Praba MB, Josephin JF (2020) Review on various authentication schemes and attacks on connected vehicles. In: IOP Conference Series: Materials Science and Engineering, vol 993. IOP Publishing, p 012102

  20. Sakiz F, Sen S (2017) A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV. Ad Hoc Netw 61:33–50

    Google Scholar 

  21. Alnasser A, Sun H, Jiang J (2019) Recommendation-based trust model for vehicle-to-everything (v2x). IEEE Internet Things J 7(1):440–450

    Google Scholar 

  22. Zhang J, Zheng K, Zhang D, Yan B (2020) Aatms: an anti-attack trust management scheme in VANET. IEEE Access 8:21077–21090

    Google Scholar 

  23. Olufowobi H, Bloom G (2019) Chapter 16—connected cars: automotive cybersecurity and privacy for smart cities, pp 227–240

  24. Zhang C, Li W, Luo Y, Hu Y (2020) AIT: an AI-enabled trust management system for vehicular networks using blockchain technology. IEEE Internet Things J 8:3157–3169

    Google Scholar 

  25. El-Rewini Z, Sadatsharan K, Selvaraj DF, Plathottam SJ, Ranganathan P (2020) Cybersecurity challenges in vehicular communications. Veh Commun 23:100214

    Google Scholar 

  26. Yan G, Olariu S, Weigle MC (2008) Providing VANET security through active position detection. Comput Commun 31(12):2883–2897

    Google Scholar 

  27. Engoulou RG, Bellaïche M, Pierre S, Quintero A (2014) VANET security surveys. Comput Commun 44:1–13

    Google Scholar 

  28. Ahmad F, Hall J, Adnane A, Franqueira VNL (2017) Faith in vehicles: a set of evaluation criteria for trust management in vehicular ad-hoc network. In: 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pp 44–52

  29. Zhang D, Yu FR, Yang R, Tang H (2018) A deep reinforcement learning-based trust management scheme for software-defined vehicular networks. In: Proceedings of the 8th ACM Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications, pp 1–7

  30. Nayak RP, Sethi S, Bhoi SK, Mohapatra D, Sahoo RR, Sharma PK, Puthal D (2022) TFMD-SDVN: a trust framework for misbehavior detection in the edge of software-defined vehicular network. J Supercomputing 78:1–34

    Google Scholar 

  31. Krishna TRV, Barnwal RP, Ghosh SK (2015) CAT: consensus-assisted trust estimation of MDS-equipped collaborators in vehicular ad-hoc network. Veh Commun 2(3):150–157

    Google Scholar 

  32. Rostamzadeh K, Nicanfar H, Torabi N, Gopalakrishnan S, Leung VC (2015) A context-aware trust-based information dissemination framework for vehicular networks. IEEE Internet Things J 2(2):121–132

    Google Scholar 

  33. Oubabas S, Aoudjit R, Rodrigues JJ, Talbi S (2018) Secure and stable vehicular ad hoc network clustering algorithm based on hybrid mobility similarities and trust management scheme. Veh Commun 13:128–138

    Google Scholar 

  34. Slama A, Lengliz I, Belghith A (2018) TCSR: an AIMD trust-based protocol for secure routing in VANET. In: 2018 International Conference on Smart Communications and Networking (SmartNets), pp 1–8

  35. Fabi A, Thampi SM (2020) A psychology-inspired trust model for emergency message transmission on the internet of vehicles (IoV). Int J Comput Appl 44:1–11

    Google Scholar 

  36. Mikavica B, Kostić-Ljubisavljević A (2021) Blockchain-based solutions for security, privacy, and trust management in vehicular networks: a survey. The Journal of Supercomputing 77(9):9520–9575

    Google Scholar 

  37. Vishwakarma L, Das D (2022) Smartcoin: a novel incentive mechanism for vehicles in intelligent transportation system based on consortium blockchain. Veh Commun 33:100429

    Google Scholar 

  38. Wang S, Hu Y, Qi G (2022) Blockchain and deep learning based trust management for internet of vehicles. Simul Model Pract Theory 120:102627

    Google Scholar 

  39. Ogundoyin SO, Kamil IA (2021) An efficient authentication scheme with strong privacy preservation for fog-assisted vehicular ad hoc networks based on blockchain and neuro-fuzzy. Veh Commun 31:100384

    Google Scholar 

  40. Wu Y, Wu L, Cai H (2022) A trusted paradigm of data management for blockchain-enabled internet of vehicles in smart cities. ACM Transactions on Sensor Networks

  41. Ayed S, Hbaieb A, Chaari L (2023) Blockchain and trust-based clustering scheme for the IoV. Ad Hoc Netw 142:103093

    Google Scholar 

  42. Kang J, Yu R, Huang X, Wu M, Maharjan S, Xie S, Zhang Y (2018) Blockchain for secure and efficient data sharing in vehicular edge computing and networks. IEEE Internet Things J 6(3):4660–4670

    Google Scholar 

  43. Liu X, Huang H, Xiao F, Ma Z (2019) A blockchain-based trust management with conditional privacy-preserving announcement scheme for VANETs. IEEE Internet Things J 7(5):4101–4112

    Google Scholar 

  44. Gazdar T, Alboqomi O, Munshi A (2022) A decentralized blockchain-based trust management framework for vehicular ad hoc networks. Smart Cities 5(1):348–363

    Google Scholar 

  45. Chukwuocha C, Thulasiraman P, Thulasiram RK (2021) Trust and scalable blockchain-based message exchanging scheme on VANET. Peer-to-Peer Networking Appl 14:3092–3109

    Google Scholar 

  46. Kudva S, Badsha S, Sengupta S, La H, Khalil I, Atiquzzaman M (2021) A scalable blockchain based trust management in VANET routing protocol. J Parallel Distrib Comput 152:144–156

    Google Scholar 

  47. Diallo E, Dib O, Al-Agha K (2022) A scalable blockchain-based scheme for traffic-related data sharing in VANETs. Blockchain: Research and Applications 3(3):100087

    Google Scholar 

  48. Fernandes CP, Montez C, Adriano DD, Boukerche A, Wangham MS (2023) A blockchain-based reputation system for trusted VANET nodes. Ad Hoc Netw 140:103071

    Google Scholar 

  49. Yahaya AS, Javaid N, Zeadally S, Farooq H (2022) Blockchain based optimized data storage with secure communication for internet of vehicles considering active, passive, and double spending attacks. Veh Commun 37:100502

    Google Scholar 

  50. Khalid A, Iftikhar MS, Almogren A, Khalid R, Afzal MK, Javaid N (2021) A blockchain based incentive provisioning scheme for traffic event validation and information storage in VANETs. Inf Process Manage 58(2):102464

    Google Scholar 

  51. Gnanajeyaraman R, Arul U, Michael G, Selvakumar A, Ramesh S, Manikandan T (2023) VANET security enhancement in cloud navigation with internet of things-based trust model in deep learning architecture. Soft Comput

  52. Xu Z, Yang W, Xiong Z, Wang J, Liu G (2021) Tpsense: a framework for event-reports trustworthiness evaluation in privacy-preserving vehicular crowdsensing systems. J Signal Proc Syst 93(2–3):209–219

    Google Scholar 

  53. Junejo MH, Ab Rahman AA-H, Shaikh RA, Yusof KM (2021) Location closeness model for VANETs with integration of 5G. Procedia Comput Sci 182:71–79

    Google Scholar 

  54. Li M, Zhu L, Lin X (2019) Privacy-preserving traffic monitoring with false report filtering via fog-assisted vehicular crowdsensing. IEEE Trans Serv Comput 14(6):1902–1913

    Google Scholar 

  55. El Sayed H, Zeadally S, Puthal D (2020) Design and evaluation of a novel hierarchical trust assessment approach for vehicular networks. Veh Commun 24:100227

    Google Scholar 

  56. Azhdari MS, Barati A, Barati H (2022) A cluster-based routing method with authentication capability in vehicular ad hoc networks (VANETs). J Parallel Distrib Comput 169:1–23

    Google Scholar 

  57. Tripathi KN, Yadav AM, Sharma S (2022) Fuzzy and deep belief network based malicious vehicle identification and trust recommendation framework in VANETs. Wireless Personal Communications 124(3):2475–2504

    Google Scholar 

  58. Kolandaisamy R, Noor RM, Kolandaisamy I, Ahmedy I, Kiah MLM, Tamil MEM, Nandy T (2021) A stream position performance analysis model based on DDoS attack detection for cluster-based routing in VANET. J Ambient Intell Humanized Comput 12:6599–6612

    Google Scholar 

  59. Li W, Song H (2015) Art: an attack-resistant trust management scheme for securing vehicular ad hoc networks. IEEE Trans Intell Transp Syst 17(4):960–969

    Google Scholar 

  60. Bhargava A, Verma S (2022) Duel: Dempster uncertainty-based enhanced-trust level scheme for VANET. IEEE Trans Intell Transp Syst 23:15079–15090

    Google Scholar 

  61. Guo J, Chen R, Tsai JJ (2017) A survey of trust computation models for service management in internet of things systems. Comput Commun 97:1–14

    Google Scholar 

  62. Inedjaren Y, Zeddini B, Maachaoui M, Barbot J-P (2019) Securing intelligent communications on the vehicular adhoc networks using fuzzy logic based trust OLSR. In: 2019 IEEE/ACS 16th International Conference on Computer Systems and Applications (AICCSA), pp 1–6

  63. Yao X, Zhang X, Ning H, Li P (2017) Using trust model to ensure reliable data acquisition in VANETs. Ad Hoc Netw 55:107–118

    Google Scholar 

  64. Tigga A, Arun Raj Kumar P (2019) Towards a vehicle’s behavior monitoring and trust computation for VANETs. In: 2019 IEEE Conference on Information and Communication Technology, pp 1–6

  65. Lone FR, Verma HK, Sharma KP (2022) Recommender credibility-based trust model for secure v2x communication. In: 2022 5th International Conference on Computational Intelligence and Networks (CINE), pp 1–6

  66. Guo J, Li X, Liu Z, Ma J, Yang C, Zhang J, Wu D (2020) Trove: a context-awareness trust model for VANETs using reinforcement learning. IEEE Internet Things J 7(7):6647–6662

    Google Scholar 

  67. Lai C, Du Y, Guo Q, Zheng D (2021) A trust-based privacy-preserving friend matching scheme in social internet of vehicles. Peer-to-Peer Networking Appl 14(4):2011–2025

    Google Scholar 

  68. Mao M, Yi P, Zhang J, Pei J (2023) Detecting malicious roadside units in vehicular social networks for information service. Wirel Pers Commun 130(4):2565–2588

    Google Scholar 

  69. Chen X, Ding J, Lu Z (2020) A decentralized trust management system for intelligent transportation environments. IEEE Trans Intell Transp Syst 23:558–571

    Google Scholar 

  70. HS J (2022) Reputation management in vehicular network using blockchain. Peer-to-Peer Networking Appl 15(2):901–920

    Google Scholar 

  71. Alsarhan A, Al-Ghuwairi A-R, Almalkawi IT, Alauthman M, Al-Dubai A (2021) Machine learning-driven optimization for intrusion detection in smart vehicular networks. Wirel Pers Commun 117:3129–3152

    Google Scholar 

  72. Kordon A, Kordon AK (2010) Swarm intelligence: the benefits of swarms. In: Kordon A (ed) Applying computational intelligence: how to create value. Springer, Berlin, pp 145–174

    Google Scholar 

  73. Osamy W, Khedr AM, Vijayan D, Salim A (2023) Tactirso: trust aware clustering technique based on improved rat swarm optimizer for WSN-enabled intelligent transportation system. J Supercomputing 79(6):5962–6016

    Google Scholar 

  74. Balamurugan A, Priya MD, Malar ACJ, Janakiraman S (2021) Raccoon optimization algorithm-based accurate positioning scheme for reliable emergency data dissemination under NLOS situations in VANETs. J Ambient Intell Humanized Comput 12(11):10405–10424

    Google Scholar 

  75. Kumar KV, Balaganesh D (2022) An optimal lightweight cryptography with metaheuristic algorithm for privacy preserving data transmission mechanism and mechanical design in vehicular ad hoc network. Materials Today: Proceedings 66:789–796

    Google Scholar 

  76. Kerrache CA, Calafate CT, Lagraa N, Cano J-C, Manzoni P (2016) Hierarchical adaptive trust establishment solution for vehicular networks. In: 2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), pp 1–6

  77. Yeung CY, Hui LCK, Chim TW, Yiu S-M, Zeng G, Chen J (2019) Anonymous counting problem in trust level warning system for VANET. IEEE Trans Veh Technol 68(1):34–48

    Google Scholar 

  78. Li B, Liang R, Zhu D, Chen W, Lin Q (2021) Blockchain-based trust management model for location privacy preserving in VANET. IEEE Trans Intell Transp Syst 22(6):3765–3775

    Google Scholar 

  79. Dhanaraj RK, Islam SH, Rajasekar V (2022) A cryptographic paradigm to detect and mitigate blackhole attack in VANET environments. Wirel Netw 28(7):3127–3142

    Google Scholar 

  80. Peter MN, Rani MP (2021) V2V communication and authentication: the internet of things vehicles (IoTV). Wirel Pers Commun 120(1):231–247

    Google Scholar 

  81. Ahmed W, Di W, Mukathe D (2022) Privacy-preserving blockchain-based authentication and trust management in VANETs. IET Netw 11(3–4):89–111

    Google Scholar 

  82. Lyu C, Pande A, Zhang Y, Gu D, Mohapatra P (2018) Fasttrust: fast and anonymous spatial-temporal trust for connected cars on expressways. In: 2018 15th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), pp 1–9

  83. Nandy T, Idris MYI, Noor RM, Das AK, Li X, Ghani NA, Bhattacharyya S (2021) An enhanced lightweight and secured authentication protocol for vehicular ad-hoc network. Comput Commun 177:57–76

    Google Scholar 

  84. Javed MA, Hamida EB, Al-Fuqaha A, Bhargava B (2018) Adaptive security for intelligent transport system applications. IEEE Intell Transp Syst Mag 10(2):110–120

    Google Scholar 

  85. Alboqomi O, Gazdar T, Munshi A (2020) A new blockchain-based trust management protocol for vehicular ad hoc networks. In: The 4th International Conference on Future Networks and Distributed Systems (ICFNDS), pp 1–5

  86. Tripathi KN, Yadav AM, Sharma S (2022) Tree: trust-based authenticated and secure dissemination of emergency event information for the network of connected vehicles. Arab J Sci Eng 47(8):10689–10717

    Google Scholar 

  87. Da Cunha FD, Boukerche A, Villas L, Viana AC, Loureiro AA (2014) Data communication in VANETs: a survey, challenges and applications. PhD thesis, INRIA Saclay; INRIA

  88. Hu J, Lin C, Li X, Huang J (2014) Scalability of control planes for software defined networks: modeling and evaluation. In: 2014 IEEE 22nd International Symposium of Quality of Service (IWQoS), pp 147–152

  89. Yang G, He S, Shi Z, Chen J (2017) Promoting cooperation by the social incentive mechanism in mobile crowdsensing. IEEE Commun Mag 55(3):86–92

    Google Scholar 

  90. Zeng R, Zeng C, Wang X, Li B, Chu X (2021) A comprehensive survey of incentive mechanism for federated learning. arXiv preprint arXiv:2106.15406

  91. Che H, Duan Y, Li C, Yu L (2022) On trust management in vehicular ad hoc networks: a comprehensive review. Front Internet Things 1:233–995

    Google Scholar 

  92. Son LH (2016) Dealing with the new user cold-start problem in recommender systems: a comparative review. Inf Syst 58:87–104

    Google Scholar 

  93. Alishev D, Hussain R, Nawaz W, Lee J (2017) Social-aware bootstrapping and trust establishing mechanism for vehicular social networks. In: 2017 IEEE 85th Vehicular Technology Conference (VTC Spring), pp 1–5

  94. Wu Q, Zhu Q, Li P (2015) A neural network based reputation bootstrapping approach for service selection. Enterp Inf Syst 9(7):768–784

    Google Scholar 

  95. Souissi I, Azzouna NB, Said LB (2019) A multi-level study of information trust models in WSN-assisted IoT. Comput Netw 151:12–30

    Google Scholar 

  96. Moalla S, Rahmouni M (2015) Trust path: a distributed model of search paths of trust in a peer-to-peer system. Secur Commun Netw 8(3):360–367

    Google Scholar 

  97. Li N, Zhang N, Das SK, Thuraisingham B (2009) Privacy preservation in wireless sensor networks: a state-of-the-art survey. Ad Hoc Netw 7(8):1501–1514

    Google Scholar 

Download references

Funding

No funding was received for conducting this study.

Author information

Authors and Affiliations

Authors

Contributions

All the presented authors contributed to conceive the presented idea. Rihab Abidi, collected the data and reviewed the investigated papers. Nadia Ben Azzouna, Nabil Sahli, Ghaleb Hoblos, and Wassim Trojet supervised and investigated the findings and the results of the research study. Rihab Abidi wrote the final manuscript. All the authors contributed to the revision and the discussion of the final output.

Corresponding author

Correspondence to Rihab Abidi.

Ethics declarations

Conflict of interest

The authors have no competing interests to declare that are relevant to the content of this article.

Ethics approval

This declaration is not applicable in this work.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Abidi, R., Azzouna, N.B., Trojet, W. et al. A study of mechanisms and approaches for IoV trust models requirements achievement. J Supercomput 80, 4157–4201 (2024). https://doi.org/10.1007/s11227-023-05620-6

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-023-05620-6

Keywords