Skip to main content

Research Repository

Advanced Search

Recommendation-based Trust Model for Vehicle-to-Everything (V2X)

Alnasser, Aljawharah; Sun, Hongjian; Jiang, Jing

Recommendation-based Trust Model for Vehicle-to-Everything (V2X) Thumbnail


Authors

Aljawharah Alnasser

Jing Jiang



Abstract

Intelligent Transportation System (ITS) is one of the main systems which have been developed to achieve safe traffic and efficient transportation. It enables the vehicles to establish connections with other road entities and infrastructure units using Vehicle-to-Everything (V2X) communications. As a consequence, all road entities become exposed to either internal or external attacks. Internal attacks cannot be detected by traditional security schemes. In this paper, a recommendation based trust model for V2X communications is proposed to defend against internal attacks. Four types of malicious attacks are analysed. In addition, we conduct various experiments with different percentage of malicious nodes to measure the performance of the proposed model. In comparison with the existing model, the proposed model shows an improvement in the network throughput and the detection rate for all types of considered malicious behaviors. Our model improves the Packet Dropping Rate (PDR) with 36% when the percentage of malicious nodes is around 87.5%.

Citation

Alnasser, A., Sun, H., & Jiang, J. (2020). Recommendation-based Trust Model for Vehicle-to-Everything (V2X). IEEE Internet of Things Journal, 7(1), 440-450. https://doi.org/10.1109/jiot.2019.2950083

Journal Article Type Article
Acceptance Date Oct 24, 2019
Online Publication Date Oct 30, 2019
Publication Date Jan 31, 2020
Deposit Date Oct 25, 2019
Publicly Available Date Oct 25, 2019
Journal IEEE Internet of Things Journal
Publisher Institute of Electrical and Electronics Engineers
Peer Reviewed Peer Reviewed
Volume 7
Issue 1
Pages 440-450
DOI https://doi.org/10.1109/jiot.2019.2950083

Files

Accepted Journal Article (1.7 Mb)
PDF

Copyright Statement
© 2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.





You might also like



Downloadable Citations