Towards Secure Communication in CR-VANETs Through a Trust-Based Routing Protocol

被引:0
|
作者
Akter, Sharmin [1 ]
Rahman, Mohammad Shahriar [2 ]
Bhuiyan, Md Zakirul Alam [3 ]
Mansoor, Nafees [1 ]
机构
[1] Univ Liberal Arts Bangladesh, Dept Comp Sci & Engn, Dhaka, Bangladesh
[2] United Int Univ, Dept Comp Sci & Engn, Dhaka, Bangladesh
[3] Fordham Univ, Dept Comp Sci & Informat Sci, Bronx, NY 10458 USA
关键词
Communication Protocols; Cognitive Radio Adhoc Networks; Vehicular Networks; V2V Communications; Mobile Ad Hoc Networks;
D O I
10.1109/INFOCOMWKSHPS51825.2021.9484515
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cognitive Radio Networks (CRNs) promise efficient spectrum utilization by operating over the unused frequencies where Vehicular Ad-hoc Networks (VANETs) facilitate information exchanging among vehicles to avoid accidents, collisions, congestion, etc. Thus, CR enabled vehicular networks (CR-VANETs), a thriving area in wireless communication research, can be the enabler of Intelligent Transportation Systems (ITS) and autonomous driver-less vehicles. Similar to others, efficient and reliable communication in CR-VANETs is vital. Besides, security in such networks may exhibit unique characteristics for overall data transmission performance. For efficient and reliable communication, the proposed routing protocol considers the mobility patterns, spectrum availability, and trustworthiness to be the routing metrics. Hence, the protocol considers the vehicle's speed, mobility direction, inter-vehicles distance, and node's reliability to estimate the mobility patterns of a node. Besides, a trust-based reliability factor is also introduced to ensure secure communications by detecting malicious nodes or other external threats. Therefore, the proposed protocol detects malicious nodes by establishing trustworthiness among nodes and preserves security. Simulation is conducted for performance evaluation that shows the proposed routing selects the efficient routing path by discarding malicious nodes from the network and outperforms the existing routing protocols.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] Secure Protocol for VANETs Communication
    Kumar, Manish
    Patil, Shriniwas
    Parmar, Keyur
    [J]. 2022 IEEE 19TH INDIA COUNCIL INTERNATIONAL CONFERENCE, INDICON, 2022,
  • [22] A Trust Based Secure Communication for Software Defined VANETs
    Vasudev, Harsha
    Das, Debasis
    [J]. 2018 32ND INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2018, : 316 - 321
  • [23] A Survey on Trust & Trust-Based Schemes In VANETs
    Kavitha, M.
    Tangade, Shrikant S.
    [J]. 2013 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND NETWORKING TECHNOLOGIES (ICCCNT), 2013,
  • [24] Trust-based secure routing and message delivery protocol for signal processing attacks in IoT applications
    G. K. Ragesh
    Ajay Kumar
    [J]. The Journal of Supercomputing, 2023, 79 : 2882 - 2909
  • [25] Trust-Based Protocol for Securing Routing in Opportunistic Networks
    Wu, Xiaojun
    Xiao, Jiakai
    Shao, Jianbo
    [J]. 2017 13TH IEEE CONFERENCE ON AUTOMATION SCIENCE AND ENGINEERING (CASE), 2017, : 434 - 439
  • [26] A trust-based routing protocol for ad hoc networks
    Xue, XY
    Leneutre, J
    Ben-Othman, J
    [J]. MOBILE AND WIRELESS COMMUNICATION NETWORKS, 2005, 162 : 251 - 262
  • [27] Verification and Validation of Trust-Based Opportunistic Routing Protocol
    Thorat, Sandeep A.
    Kulkarni, P. J.
    Yadav, S. V.
    [J]. PROGRESS IN COMPUTING, ANALYTICS AND NETWORKING, ICCAN 2017, 2018, 710 : 85 - 93
  • [28] Trust-based secure routing and message delivery protocol for signal processing attacks in IoT applications
    Ragesh, G. K.
    Kumar, Ajay
    [J]. JOURNAL OF SUPERCOMPUTING, 2023, 79 (03): : 2882 - 2909
  • [29] Performance Analysis of Trust-Based Routing Protocol for MANET
    Mandhare, Archana
    Kadam, Sujata
    [J]. COMPUTING, COMMUNICATION AND SIGNAL PROCESSING, ICCASP 2018, 2019, 810 : 389 - 397
  • [30] TSR: Trust-based Secure MANET Routing using HMMs
    Moe, Marie E. G.
    Helvik, Bjarne E.
    Knapskog, Svein J.
    [J]. Q2SWINET'08: PROCEEDINGS OF THE FOURTH ACM INTERNATIONAL SYMPOSIUM ON QOS AND SECURITY FOR WIRELESS AND MOBILE NETWORKS, 2008, : 83 - 90