Cargando…
TrustWalker: An Efficient Trust Assessment in Vehicular Internet of Things (VIoT) with Security Consideration
The Internet of Things (IoT) is a world of connected networks and modern technology devices, among them vehicular networks considered more challenging due to high speed and network dynamics. Future trends in IoT allow these inter networks to share information. Also, the previous security solutions t...
Autores principales: | , , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2020
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7411922/ https://www.ncbi.nlm.nih.gov/pubmed/32708534 http://dx.doi.org/10.3390/s20143945 |
_version_ | 1783568490936926208 |
---|---|
author | Sohail, Muhammad Ali, Rashid Kashif, Muhammad Ali, Sher Mehta, Sumet Zikria, Yousaf Bin Yu, Heejung |
author_facet | Sohail, Muhammad Ali, Rashid Kashif, Muhammad Ali, Sher Mehta, Sumet Zikria, Yousaf Bin Yu, Heejung |
author_sort | Sohail, Muhammad |
collection | PubMed |
description | The Internet of Things (IoT) is a world of connected networks and modern technology devices, among them vehicular networks considered more challenging due to high speed and network dynamics. Future trends in IoT allow these inter networks to share information. Also, the previous security solutions to vehicular IoT (VIoT) much emphasize on privacy protection and security related issues using public keys infrastructure. However, the primary concern about efficient trust assessment, authorized users malfunctioning, and secure information dissemination in vehicular wireless networks have not been explored. To cope with these challenges, we propose a trust enhanced on-demand routing (TER) scheme, which adopts TrustWalker (TW) algorithm for efficient trust assessment and route search technique in VIoT. TER comprised of novel three-valued subjective logic (3VSL), TW algorithm, and ad hoc on-demand distance vector (AODV) routing protocol. The simulated results validate the accuracy of the proposed scheme in term of throughput, packet drop ratio (PDR), and end to end (E2E) delay. In the simulation, the execution time of the TW algorithm is analyzed and compared with another route search algorithm, i.e., Assess-Trust (AT), by considering real-world online datasets such as Pretty Good Privacy and Advogato. The accuracy and efficiency of the TW algorithm, even with a large number of vehicle users, are also demonstrated through simulations. |
format | Online Article Text |
id | pubmed-7411922 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2020 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-74119222020-08-25 TrustWalker: An Efficient Trust Assessment in Vehicular Internet of Things (VIoT) with Security Consideration Sohail, Muhammad Ali, Rashid Kashif, Muhammad Ali, Sher Mehta, Sumet Zikria, Yousaf Bin Yu, Heejung Sensors (Basel) Article The Internet of Things (IoT) is a world of connected networks and modern technology devices, among them vehicular networks considered more challenging due to high speed and network dynamics. Future trends in IoT allow these inter networks to share information. Also, the previous security solutions to vehicular IoT (VIoT) much emphasize on privacy protection and security related issues using public keys infrastructure. However, the primary concern about efficient trust assessment, authorized users malfunctioning, and secure information dissemination in vehicular wireless networks have not been explored. To cope with these challenges, we propose a trust enhanced on-demand routing (TER) scheme, which adopts TrustWalker (TW) algorithm for efficient trust assessment and route search technique in VIoT. TER comprised of novel three-valued subjective logic (3VSL), TW algorithm, and ad hoc on-demand distance vector (AODV) routing protocol. The simulated results validate the accuracy of the proposed scheme in term of throughput, packet drop ratio (PDR), and end to end (E2E) delay. In the simulation, the execution time of the TW algorithm is analyzed and compared with another route search algorithm, i.e., Assess-Trust (AT), by considering real-world online datasets such as Pretty Good Privacy and Advogato. The accuracy and efficiency of the TW algorithm, even with a large number of vehicle users, are also demonstrated through simulations. MDPI 2020-07-16 /pmc/articles/PMC7411922/ /pubmed/32708534 http://dx.doi.org/10.3390/s20143945 Text en © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Sohail, Muhammad Ali, Rashid Kashif, Muhammad Ali, Sher Mehta, Sumet Zikria, Yousaf Bin Yu, Heejung TrustWalker: An Efficient Trust Assessment in Vehicular Internet of Things (VIoT) with Security Consideration |
title | TrustWalker: An Efficient Trust Assessment in Vehicular Internet of Things (VIoT) with Security Consideration |
title_full | TrustWalker: An Efficient Trust Assessment in Vehicular Internet of Things (VIoT) with Security Consideration |
title_fullStr | TrustWalker: An Efficient Trust Assessment in Vehicular Internet of Things (VIoT) with Security Consideration |
title_full_unstemmed | TrustWalker: An Efficient Trust Assessment in Vehicular Internet of Things (VIoT) with Security Consideration |
title_short | TrustWalker: An Efficient Trust Assessment in Vehicular Internet of Things (VIoT) with Security Consideration |
title_sort | trustwalker: an efficient trust assessment in vehicular internet of things (viot) with security consideration |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7411922/ https://www.ncbi.nlm.nih.gov/pubmed/32708534 http://dx.doi.org/10.3390/s20143945 |
work_keys_str_mv | AT sohailmuhammad trustwalkeranefficienttrustassessmentinvehicularinternetofthingsviotwithsecurityconsideration AT alirashid trustwalkeranefficienttrustassessmentinvehicularinternetofthingsviotwithsecurityconsideration AT kashifmuhammad trustwalkeranefficienttrustassessmentinvehicularinternetofthingsviotwithsecurityconsideration AT alisher trustwalkeranefficienttrustassessmentinvehicularinternetofthingsviotwithsecurityconsideration AT mehtasumet trustwalkeranefficienttrustassessmentinvehicularinternetofthingsviotwithsecurityconsideration AT zikriayousafbin trustwalkeranefficienttrustassessmentinvehicularinternetofthingsviotwithsecurityconsideration AT yuheejung trustwalkeranefficienttrustassessmentinvehicularinternetofthingsviotwithsecurityconsideration |