Aljawharah Alnasser
Recommendation-based Trust Model for Vehicle-to-Everything (V2X)
Alnasser, Aljawharah; Sun, Hongjian; Jiang, Jing
Abstract
Intelligent Transportation System (ITS) is one of the main systems which have been developed to achieve safe traffic and efficient transportation. It enables the vehicles to establish connections with other road entities and infrastructure units using Vehicle-to-Everything (V2X) communications. As a consequence, all road entities become exposed to either internal or external attacks. Internal attacks cannot be detected by traditional security schemes. In this paper, a recommendation based trust model for V2X communications is proposed to defend against internal attacks. Four types of malicious attacks are analysed. In addition, we conduct various experiments with different percentage of malicious nodes to measure the performance of the proposed model. In comparison with the existing model, the proposed model shows an improvement in the network throughput and the detection rate for all types of considered malicious behaviors. Our model improves the Packet Dropping Rate (PDR) with 36% when the percentage of malicious nodes is around 87.5%.
Citation
Alnasser, A., Sun, H., & Jiang, J. (2020). Recommendation-based Trust Model for Vehicle-to-Everything (V2X). IEEE Internet of Things Journal, 7(1), 440-450. https://doi.org/10.1109/jiot.2019.2950083
Journal Article Type | Article |
---|---|
Acceptance Date | Oct 24, 2019 |
Online Publication Date | Oct 30, 2019 |
Publication Date | Jan 31, 2020 |
Deposit Date | Oct 25, 2019 |
Publicly Available Date | Oct 25, 2019 |
Journal | IEEE Internet of Things Journal |
Electronic ISSN | 2327-4662 |
Publisher | Institute of Electrical and Electronics Engineers |
Peer Reviewed | Peer Reviewed |
Volume | 7 |
Issue | 1 |
Pages | 440-450 |
DOI | https://doi.org/10.1109/jiot.2019.2950083 |
Public URL | https://durham-repository.worktribe.com/output/1281580 |
Files
Accepted Journal Article
(1.7 Mb)
PDF
Copyright Statement
© 2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
You might also like
Energy-based Predictive Root Cause Analysis for Real-Time Anomaly Detection in Big Data Systems
(2025)
Presentation / Conference Contribution
Integrated Sensing and Communications With Mixed Fields Using Transmit Beamforming
(2024)
Journal Article
Decarbonising Heating with Power-Hydrogen Optimisation
(2024)
Presentation / Conference Contribution
Communication-Centric Integrated Sensing and Communications With Mixed Fields
(2024)
Journal Article
Downloadable Citations
About Durham Research Online (DRO)
Administrator e-mail: dro.admin@durham.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2025
Advanced Search