TY - JOUR
T1 - TFDD
T2 - A trust-based framework for reliable data delivery and DoS defense in VANETs
AU - Kerrache, Chaker Abdelaziz
AU - Lagraa, Nasreddine
AU - Calafate, Carlos T.
AU - Lakas, Abderrahmane
N1 - Publisher Copyright:
© 2016 Elsevier Inc.
PY - 2017/7
Y1 - 2017/7
N2 - A trust establishment scheme for enhancing inter-vehicular communication and preventing DoS attacks ‘TFDD’ is proposed in this paper. Based on a developed intrusion detection module (IDM) and data centric verification, our framework allows preventing DDoS attacks and eliminating misbehaving nodes in a distributed, collaborative and instantaneous manner. In addition, a trusted routing protocol is proposed that, using context-based information such as link stability and trust information, delivers data through the most reliable way. In this study, the simulation results obtained demonstrate the effectiveness of our trust framework at detecting dishonest nodes, as well as malicious messages that are sent by honest or dishonest nodes, after a very low number of message exchanges. Furthermore, colluding attacks are detected in a small period of time, which results in network resources being released immediately after an overload period. We also show that, in a worst-case scenario, our trust-based framework is able to sustain performance levels, and outperforming existing solutions such as T-CLAIDS and AECFV.
AB - A trust establishment scheme for enhancing inter-vehicular communication and preventing DoS attacks ‘TFDD’ is proposed in this paper. Based on a developed intrusion detection module (IDM) and data centric verification, our framework allows preventing DDoS attacks and eliminating misbehaving nodes in a distributed, collaborative and instantaneous manner. In addition, a trusted routing protocol is proposed that, using context-based information such as link stability and trust information, delivers data through the most reliable way. In this study, the simulation results obtained demonstrate the effectiveness of our trust framework at detecting dishonest nodes, as well as malicious messages that are sent by honest or dishonest nodes, after a very low number of message exchanges. Furthermore, colluding attacks are detected in a small period of time, which results in network resources being released immediately after an overload period. We also show that, in a worst-case scenario, our trust-based framework is able to sustain performance levels, and outperforming existing solutions such as T-CLAIDS and AECFV.
KW - DoS defense
KW - Intrusions detection
KW - Trust management
KW - Vehicular Ad-hoc networks
UR - http://www.scopus.com/inward/record.url?scp=85009291157&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85009291157&partnerID=8YFLogxK
U2 - 10.1016/j.vehcom.2016.11.010
DO - 10.1016/j.vehcom.2016.11.010
M3 - Article
AN - SCOPUS:85009291157
SN - 2214-2096
VL - 9
SP - 254
EP - 267
JO - Vehicular Communications
JF - Vehicular Communications
ER -