Information-oriented trustworthiness evaluation in vehicular ad-hoc networks

Sashi Gurung, Dan Lin, Anna Squicciarini, Elisa Bertino

Research output: Chapter in Book/Report/Conference proceedingConference contribution

58 Scopus citations


In Vehicular Ad-Hoc Networks (VANETs), applications are typically realized by forwarding and exchanging messages among vehicles. The integrity and trustworthiness of messages directly impacts the quality of the applications. Though there have been extensive works on authentication protocols in VANETs, authentication can only certify message origin but cannot guarantee that the identity holders will send truthful and accurate messages. Therefore, in this paper, we propose a novel trust model to directly evaluate the trustworthiness of the content of a message received from other vehicles. The model is built based on various factors such as content similarity, content conflict and route similarity. Trustworthiness of message content will be evaluated at the individual vehicle level and will not introduce any additional architectural assumptions. We have conducted extensive experiments and the results indicate both efficiency and effectiveness of the proposed approach.

Original languageEnglish (US)
Title of host publicationNetwork and System Security - 7th International Conference, NSS 2013, Proceedings
Number of pages15
StatePublished - 2013
Event7th International Conference on Network and System Security, NSS 2013 - Madrid, Spain
Duration: Jun 3 2013Jun 4 2013

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7873 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


Other7th International Conference on Network and System Security, NSS 2013

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)


Dive into the research topics of 'Information-oriented trustworthiness evaluation in vehicular ad-hoc networks'. Together they form a unique fingerprint.

Cite this