z-logo
open-access-imgOpen Access
A Framework to Systematically Analyse the Trustworthiness of Nodes for Securing IoV Interactions
Author(s) -
Indu Bhardwaj,
Сибарам Хара,
B. Priestly Shan
Publication year - 2020
Publication title -
scalable computing practice and experience
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.192
H-Index - 18
ISSN - 1895-1767
DOI - 10.12694/scpe.v21i3.1743
Subject(s) - node (physics) , computer science , trustworthiness , computer network , computer security , value (mathematics) , range (aeronautics) , engineering , structural engineering , machine learning , aerospace engineering
Trust plays essential role in any securing communications between Vehicles in IOV. This motivated us to design a trust model for IoV communication. In this paper, we initially review literature on IoV and Trust and present a hybrid trust model that separates the malicious and trusted nodes to secure the interaction of vehicle in IOV. Node segregation is done using value of statistics (St). If St of each node lies in the range of mean (m) plus/minus 2 standard deviation (SD) of PDR then nodes behaviour is considered as normal otherwise malicious. The simulation is conducted for different threshold values. Result depicts that PDR of trusted node is 0.63 that is much higher than the PDR of malicious node that is 0.15. Similarly, the Average no. of hops and trust dynamics of trusted nodes are higher than that of malicious node. So, on the basis of values of PDR, number of available hops and Trust dynamics, the malicious nodes can be clearly identified and discarded.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom