Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3689936.3694691acmconferencesArticle/Chapter ViewAbstractPublication PagescscsConference Proceedingsconference-collections
research-article
Open access

Classification, Impact, and Mitigation Strategies of Attacks in Automotive Trust Management Systems

Published: 20 November 2024 Publication History

Abstract

With the advent of connected vehicles, which provide many new comfort functions, the attack surface increased as well. Widespread "hard security" mechanisms are used to secure the vehicle and its infrastructure, but they cannot mitigate all threats, especially if inside attackers are considered. "Soft security" mechanisms, like trust and reputation systems, can help to close the attack surface further. However, such systems add complexity and can also lead to further vulnerabilities. To use such mechanisms securely, this work analyzes attacks targeting trust management systems in the automotive domain. For this purpose, a literature review was conducted, and the extracted attacks were characterized and divided into several clusters, introducing a new nomenclature of attacks against trust management for vehicles. We argue that four main categories of attacks exist. They are distinguished by their target component: communication channel, trust management layer, or application. As a fourth category, we see attacks that are enabled by the use of trust management systems. The outcome of this analysis was used to create an adversary model based on detected attack vectors and to define abstract reference attackers. These can be used to evaluate the resilience of automotive trust management systems against the analyzed attacks. Mitigation strategies against the adversary's capabilities are further presented to avoid vulnerabilities in the design of automotive trust management systems.

References

[1]
UN Regulation No. 155 - Uniform provisions concerning the approval of vehicles with regards to cyber security and cyber security management system, Mar. 2021.
[2]
ISO/SAE International, ISO/SAE 21434: Road vehicles - Cybersecurity Engineering, Aug. 2021.
[3]
A. Jøsang, R. Ismail, and C. Boyd, A survey of trust and reputation systems for online service provision, Decision Support Systems, vol. 43, no. 2, pp. 618--644, Mar. 2007.
[4]
Coordination Center Product PKI, Certificate Policy (CP) for Root CA of Product PKI for Series Components, Apr. 2023.
[5]
ETSI TS 102 940 Intelligent Transport Systems (ITS); Security; ITS communications security architecture and security management;, European Telecommunications Standards Institute, Tech. Rep., Jan. 2021.
[6]
K. Govindan and P. Mohapatra, Trust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey, IEEE Communications Surveys & Tutorials, vol. 14, no. 2, pp. 279--298, 2012.
[7]
R. Hussain, J. Lee, and S. Zeadally, Trust in VANET: A Survey of Current Solutions and Future Research Opportunities, IEEE Transactions on Intelligent Transportation Systems, vol. 22, no. 5, pp. 2553--2571, May 2021.
[8]
Y. Liu, J. Wang, Z. Yan, Z. Wan, and R. Jantti, "A Survey on Blockchain-based Trust Management for Internet of Things," IEEE Internet of Things Journal, pp. 1--1, 2023.
[9]
H. Amari, Z. A. E. Houda, L. Khoukhi, and L. H. Belguith, "Trust Management in Vehicular Ad-Hoc Networks: Extensive Survey," IEEE Access, vol. 11, pp. 47 659--47 680, 2023.
[10]
M. Arif, G. Wang, M. Zakirul Alam Bhuiyan, T. Wang, and J. Chen, "A survey on security attacks in VANETs: Communication, applications and challenges," Vehicular Communications, vol. 19, p. 100179, Oct. 2019.
[11]
C. A. Kerrache, C. T. Calafate, J.-C. Cano, N. Lagraa, and P. Manzoni, "Trust Management for Vehicular Networks: An Adversary-Oriented Overview," IEEE Access, vol. 4, pp. 9293--9307, 2016.
[12]
I. Souissi, N. B. Azzouna, and T. Berradia, "Trust management in vehicular ad hoc networks: A survey," International Journal of Ad Hoc and Ubiquitous Computing, vol. 31, no. 4, pp. 230--243, Jan. 2019.
[13]
B. Mikavica and A. Kosti"-Ljubisavljevi", "Blockchain-based solutions for security, privacy, and trust management in vehicular networks: A survey," The Journal of Supercomputing, vol. 77, no. 9, pp. 9520--9575, Sep. 2021.
[14]
A. Hbaieb, S. Ayed, and L. Chaari, "A survey of trust management in the Internet of Vehicles," Computer Networks, vol. 203, p. 108558, Feb. 2022.
[15]
N. Luhmann, M. King, and C. Morgner, Trust and Power. Malden, MA: Polity, 2017.
[16]
A. Jøsang, Subjective Logic, ser. Artificial Intelligence: Foundations, Theory, and Algorithms. Cham: Springer International Publishing, 2016.
[17]
D. Püllen, F. Klement, A. Vinel, and S. Katzenbeisser, "Ensuring Trustworthy Automated Road Vehicles: A Software Integrity Validation Approach," in 2023 IEEE International Automated Vehicle Validation Conference (IAVVC). Austin, TX, USA: IEEE, Oct. 2023, pp. 1--8.
[18]
S. Goli-Bidgoli and N. Movahhedinia, "Determining vehicles" radio transmission range for increasing cognitive radio VANET (CR-VANET) reliability using a trust management system," Computer Networks, vol. 127, pp. 340--351, Nov. 2017.
[19]
H. Zhang, J. Liu, H. Zhao, P. Wang, and N. Kato, "Blockchain-Based Trust Management for Internet of Vehicles," IEEE Transactions on Emerging Topics in Computing, vol. 9, no. 3, pp. 1397--1409, Jul. 2021.
[20]
H. El-Sayed, H. Alexander, P. Kulkarni, M. A. Khan, R. M. Noor, and Z. Trabelsi, "A Novel Multifaceted Trust Management Framework for Vehicular Networks," IEEE Transactions on Intelligent Transportation Systems, vol. 23, no. 11, pp. 20 084-- 20 097, Nov. 2022.
[21]
D. Zhang, F. R. Yu, R. Yang, and L. Zhu, "Software-Defined Vehicular Networks With Trust Management: A Deep Reinforcement Learning Approach," IEEE Transactions on Intelligent Transportation Systems, vol. 23, no. 2, pp. 1400--1414, Feb. 2022.
[22]
D. Zhang, F. R. Yu, Z. Wei, and A. Boukerche, "Software-defined Vehicular Ad Hoc Networks with Trust Management," in Proceedings of the 6th ACM Symposium on Development and Analysis of Intelligent Vehicular Networks and Applications, ser. DIVANet '16. New York, NY, USA: Association for Computing Machinery, Nov. 2016, pp. 41--49.
[23]
S. Ahmed, N. V. K. Ramesh, and B. N. K. Reddy, A Highly Secured QoS Aware Routing Algorithm for Software Defined Vehicle Ad-Hoc Networks Using Optimal Trust Management Scheme, Wireless Personal Communications, vol. 113, no. 4, pp. 1807--1821, Aug. 2020.
[24]
S. M. Habib, Trust establishment mechanisms for distributed service environments, Ph.D. dissertation, Technische Universität, Darmstadt, 2014.
[25]
J. Wang, Y. Zhang, Y. Wang, and X. Gu, RPRep: A Robust and Privacy-Preserving Reputation Management Scheme for Pseudonym-Enabled VANETs, International Journal of Distributed Sensor Networks, vol. 12, no. 3, p. 6138251, Mar. 2016.
[26]
Y. Zhong, B. Bhargava, Y. Lu, and P. Angin, A Computational Dynamic Trust Model for User Authorization, IEEE Transactions on Dependable and Secure Computing, vol. 12, no. 1, pp. 1--15, Jan. 2015.
[27]
J. Dobaj, G. Macher, D. Ekert, A. Riel, and R. Messnarz, Towards a securitydriven automotive development lifecycle, Journal of Software: Evolution and Process, Nov. 2021.
[28]
G. Gut, C. Allmann, M. Schurius, and K. Schmidt, Reduction of Electronic Control Units in Electric Vehicles Using Multicore Technology, in Multicore Software Engineering, Performance, and Tools, D. Hutchison, T. Kanade, J. Kittler, J. M. Kleinberg, F. Mattern, J. C. Mitchell, M. Naor, O. Nierstrasz, C. Pandu Rangan, B. Steffen, M. Sudan, D. Terzopoulos, D. Tygar, M. Y. Vardi, G. Weikum, V. Pankratius, and M. Philippsen, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012, vol. 7303, pp. 90--93.
[29]
D. Reinhardt and M. Kucera, Domain Controlled Architecture - A New Approach for Large Scale Software Integrated Automotive Systems:, in Proceedings of the 3rd International Conference on Pervasive Embedded Computing and Communication Systems. Barcelona, Spain: SciTePress - Science and and Technology Publications, 2013, pp. 221--226.
[30]
D. Wang and S. Ganesan, Automotive Domain Controller, in 2020 International Conference on Computing and Information Technology (ICCIT-1441). Tabuk, Saudi Arabia: IEEE, Sep. 2020, pp. 1--5.
[31]
S. Marsh, A. Diaconescu, D. Evans, T. A. Kosa, P. R. Lewis, and S. Mahbub Habib, Public Privacy and Brick Houses Made of Glass, in Trust Management XII, N. Gal-Oz and P. R. Lewis, Eds. Cham: Springer International Publishing, 2018, vol. 528, pp. 137--148.
[32]
A. Booth, A. Sutton, M. Clowes, M. Martyn-St James, and A. Booth, Systematic Approaches to a Successful Literature Review, third edition ed. Los Angeles: SAGE, 2022.
[33]
R. Van De Schoot, J. De Bruin, R. Schram, P. Zahedi, J. De Boer, F. Weijdema, B. Kramer, M. Huijts, M. Hoogerwerf, G. Ferdinands, A. Harkema, J. Willemsen, Y. Ma, Q. Fang, S. Hindriks, L. Tummers, and D. L. Oberski, An open source machine learning framework for efficient and transparent systematic reviews, Nature Machine Intelligence, vol. 3, no. 2, pp. 125--133, Feb. 2021.
[34]
ASReview LAB developers, ASReview LAB - A tool for AI-assisted systematic reviews, Zenodo, Nov. 2023.
[35]
C. Ponikwar, H.-J. Hof, S. Gopinath, and L. Wischhof, Beyond the Dolev-Yao Model: Realistic Application-Specific Attacker Models for Applications Using Vehicular Communication, Jul. 2016.
[36]
D. Dolev and A. C. Yao, On the security of public key protocols, in 22nd Annual Symposium on Foundations of Computer Science (Sfcs 1981). Nashville, TN, USA: IEEE, Oct. 1981, pp. 350--357.
[37]
C. Plappert, A. Fuchs, and R. Heddergott, Analysis and Evaluation of Hardware Trust Anchors in the Automotive Domain, in Proceedings of the 17th International Conference on Availability, Reliability and Security. Vienna Austria: ACM, Aug. 2022, pp. 1--11.
[38]
N. Malik, P. Nanda, X. He, and R. P. Liu, Vehicular networks with security and trust management solutions: Proposed secured message exchange via blockchain technology, Wireless Networks, vol. 26, no. 6, pp. 4207--4226, Aug. 2020.
[39]
A. Verma, R. Saha, G. Kumar, and T.-h. Kim, The Security Perspectives of Vehicular Networks: A Taxonomical Analysis of Attacks and Solutions, Applied Sciences, vol. 11, no. 10, p. 4682, May 2021.
[40]
M. Raya and J.-P. Hubaux, Securing vehicular ad hoc networks, Journal of Computer Security, vol. 15, no. 1, pp. 39--68, Jan. 2007.
[41]
U. Javaid, M. N. Aman, and B. Sikdar, A Scalable Protocol for Driving Trust Management in Internet of Vehicles With Blockchain, IEEE Internet of Things Journal, vol. 7, no. 12, pp. 11 815--11 829, Dec. 2020.
[42]
B. Pooja, M. M. M. Pai, R. M. Pai, N. Ajam, and J. Mouzna, Mitigation of insider and outsider DoS attack against signature based authentication in VANETs, in 2014 Asia-Pacific Conference on Computer Aided System Engineering (APCASE). South Kuta, Indonesia: IEEE, Feb. 2014, pp. 152--157.
[43]
T. Rosenstatter, T. Olovsson, and M. Almgren, V2C: A Trust-Based Vehicle to Cloud Anomaly Detection Framework for Automotive Systems, in Proceedings of the 16th International Conference on Availability, Reliability and Security. Vienna Austria: ACM, Aug. 2021, pp. 1--10.
[44]
N. Haddadou and A. Rachedi, DTM2 : Adapting job market signaling for distributed trust management in vehicular ad hoc networks, in 2013 IEEE International Conference on Communications (ICC). Budapest, Hungary: IEEE, Jun. 2013, pp. 1827--1832.
[45]
W. Yao, Y. Liu, F. P. Deek, and G. Wang, VDKMS: Vehicular Decentralized Key Management System for Cellular Vehicular-to-Everything Networks, A Blockchain-Based Approach, Oct. 2023.
[46]
X. Wang, H. Zhu, H. Xiao, Z. Zhou, S. Yang, and L. Sun, Blockchain-enhanced trust management for mobile edge computing-enabled intelligent vehicular collaboration in the 6G era, Transactions on Emerging Telecommunications Technologies, vol. 34, no. 7, p. e4791, 2023.
[47]
I. MATEI, A. G. CIS, MAS, I. BICA, and V. V. PATRICIU, Trust and reputation in the internet of things, Journal of Military Technology Vol, vol. 5, no. 2, 2022.
[48]
J. Feng, Y. Wang, J. Wang, and F. Ren, Blockchain-Based Data Management and Edge-Assisted Trusted Cloaking Area Construction for Location Privacy Protection in Vehicular Networks, IEEE Internet of Things Journal, vol. 8, no. 4, pp. 2087--2101, Feb. 2021.
[49]
C. Kumar Karn and C. Prakash Gupta, A Survey on VANETs Security Attacks and Sybil Attack Detection, International Journal of Sensors Wireless Communications and Control, vol. 6, no. 1, pp. 45--62, Feb. 2016.
[50]
A. Mahmood, Trust on Wheels -- Towards Trust Management in the Internet of Vehicles, Ph.D. dissertation, Macquarie University, Sydney, New South Wales, Australia, May 2021.
[51]
D. Wang, L. Zhang, C. Huang, and X. Shen, A Privacy-Preserving Trust Management System based on Blockchain for Vehicular Networks, in 2021 IEEE Wireless Communications and Networking Conference (WCNC). Nanjing, China: IEEE, Mar. 2021, pp. 1--6.
[52]
Z. Yang, K. Yang, L. Lei, K. Zheng, and V. C. M. Leung, Blockchain-Based Decentralized Trust Management in Vehicular Networks, IEEE Internet of Things Journal, vol. 6, no. 2, pp. 1495--1505, Apr. 2019.
[53]
T. Perarasi, S. Vidhya, L. Moses M., and P. Ramya, Malicious Vehicles Identifying and Trust Management Algorithm for Enhance the Security in 5G-VANET, in 2020 Second International Conference on Inventive Research in Computing Applications (ICIRCA). Coimbatore, India: IEEE, Jul. 2020, pp. 269--275.
[54]
F. Ahmad, F. Kurugollu, C. A. Kerrache, S. Sezer, and L. Liu, NOTRINO: A NOvel Hybrid TRust Management Scheme for INternet-of-Vehicles, IEEE Transactions on Vehicular Technology, vol. 70, no. 9, pp. 9244--9257, Sep. 2021.
[55]
G. Twardokus, J. Ponicki, S. Baker, P. Carenzo, H. Rahbari, and S. Mishra, Targeted Discreditation Attack against Trust Management in Connected Vehicles, in ICC 2021 - IEEE International Conference on Communications. Montreal, QC, Canada: IEEE, Jun. 2021, pp. 1--6.
[56]
N. Keshari, D. Singh, and A. K. Maurya, DoSRT: A Denial-of-Service Resistant Trust Model for VANET, Cybernetics and Information Technologies, vol. 23, no. 4, pp. 165--180, Nov. 2023.
[57]
C. Gupta, L. Singh, and R. Tiwari, Malicious Node Detection in Vehicular Ad-hoc Network (VANET) using Enhanced Beacon Trust Management with Clustering Protocol (EBTM-CP), Wireless Personal Communications, vol. 130, no. 1, pp. 321--346, May 2023.
[58]
S. Kudva, S. Badsha, S. Sengupta, H. La, I. Khalil, and M. Atiquzzaman, A scalable blockchain based trust management in VANET routing protocol, Journal of Parallel and Distributed Computing, vol. 152, pp. 144--156, Jun. 2021.
[59]
P. Bhattacharya, A. Shukla, S. Tanwar, N. Kumar, and R. Sharma, 6Blocks: 6G-enabled trust management scheme for decentralized autonomous vehicles, Computer Communications, vol. 191, pp. 53--68, Jul. 2022.
[60]
D. Wang, X. Chen, H. Wu, R. Yu, and Y. Zhao, A Blockchain-Based VehicleTrust Management Framework Under a Crowdsourcing Environment, in 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). Guangzhou, China: IEEE, Dec. 2020, pp. 1950--1955.
[61]
F. Kandah, B. Huber, A. Altarawneh, S. Medury, and A. Skjellum, BLAST: Blockchain-based Trust Management in Smart Cities and Connected Vehicles Setup, in 2019 IEEE High Performance Extreme Computing Conference (HPEC). Waltham, MA, USA: IEEE, Sep. 2019, pp. 1--7.
[62]
Ben-Jye Chang and Szu-Liang Kuo, Markov Chain Trust Model for TrustValue Analysis and Key Management in Distributed Multicast MANETs, IEEE Transactions on Vehicular Technology, vol. 58, no. 4, pp. 1846--1863, May 2009.
[63]
Y. Sun, Z. Han, W. Yu, and K. Ray Liu, Attacks on Trust Evaluation in Distributed Networks, in 2006 40th Annual Conference on Information Sciences and Systems. Princeton, NJ, USA: IEEE, Mar. 2006, pp. 1461--1466.
[64]
Y. Sun, Z. Han, and K. R. Liu, Defense of trust management vulnerabilities in distributed networks, IEEE Communications Magazine, vol. 46, no. 2, pp. 112--119, Feb. 2008.
[65]
J. Zhang, A Survey on Trust Management for VANETs, in 2011 IEEE International Conference on Advanced Information Networking and Applications. Biopolis, Singapore: IEEE, Mar. 2011, pp. 105--112.
[66]
V. Alagar and K. Wan, Context-Aware Trust-Based Management of Vehicular Ad-Hoc Networks (VANETs), in 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom). Beijing, China: IEEE, Aug. 2015, pp. 255--261.
[67]
G. Du, Y. Cao, J. Li, Y. Zhuang, X. Chen, Y. Li, and J. Chen, A Blockchain-based Trust-Value Management Approach for Secure Information Sharing in Internet of Vehicles, IEEE Internet of Things Journal, pp. 1--1, 2023.
[68]
R. Purkait, S. Tripathi, and S. Patnaik, Location Verification and Stability with Trust Management for Avoiding Malicious Vehicles in Geographic Routing for VANET, in 2021 Smart City Challenges & Outcomes for Urban Transformation (SCOUT). Bhubaneswar, India: IEEE, Dec. 2021, pp. 243--248.
[69]
Z. Liu, F. Huang, J. Weng, K. Cao, Y. Miao, J. Guo, and Y. Wu, BTMPP: Balancing Trust Management and Privacy Preservation for Emergency Message Dissemination in Vehicular Networks, IEEE Internet of Things Journal, vol. 8, no. 7, pp. 5386--5407, Apr. 2021
[70]
F. Gai, J. Zhang, P. Zhu, and X. Jiang, Trust on the Ratee: A Trust Management System for Social Internet of Vehicles, Wireless Communications and Mobile Computing, vol. 2017, pp. 1--11, 2017.
[71]
F. Ahmad, J. Hall, A. Adnane, and V. N. L. Franqueira, Faith in Vehicles: A Set of Evaluation Criteria for Trust Management in Vehicular Ad-Hoc Network, in 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). Exeter: IEEE, Jun. 2017, pp. 44--52.
[72]
ETSI TS 102 941 Intelligent Transport Systems (ITS); Security; Trust and Privacy Management, Tech. Rep., Nov. 2022.
[73]
J. R. Douceur, The sybil attack, in Revised Papers from the First International Workshop on Peer-to-Peer Systems, ser. IPTPS '01. Berlin, Heidelberg: SpringerVerlag, 2002, pp. 251--260.
[74]
L. Sotiriadis, B. Mamalis, and G. Pantziou, Stable and Secure Clustering for Internet of Vehicles with RSU-assisted Maintenance and Trust Management, in 25th Pan-Hellenic Conference on Informatics. Volos Greece: ACM, Nov. 2021, pp. 124--129.
[75]
B. Li, X. Song, T. Dai, W. Wu, D. Zhu, X. Zhai, H. Wen, Q. Lin, H. Chen, and K. Cai, Trust Management Strategy for Digital Twins in Vehicular Ad Hoc Networks, IEEE Journal on Selected Areas in Communications, vol. 41, no. 10, pp. 3279--3292, Oct. 2023.
[76]
F. Ahmad, V. N. L. Franqueira, and A. Adnane, TEAM: A Trust Evaluation and Management Framework in Context-Enabled Vehicular Ad-Hoc Networks, IEEE Access, vol. 6, pp. 28 643--28 660, 2018.
[77]
F. Kandah, B. Huber, A. Skjellum, and A. Altarawneh, A Blockchain-based Trust Management Approach for Connected Autonomous Vehicles in Smart Cities, in 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC). Las Vegas, NV, USA: IEEE, Jan. 2019, pp. 0544--0549.
[78]
M. Ebrahimi, M. S. Haghighi, A. Jolfaei, N. Shamaeian, and M. H. Tadayon, A Secure and Decentralized Trust Management Scheme for Smart Health Systems, IEEE Journal of Biomedical and Health Informatics, vol. 26, no. 5, pp. 1961--1968, May 2022.
[79]
Y. Chae, L. C. DiPippo, and Y. L. Sun, Trust Management for Defending On-Off Attacks, IEEE Transactions on Parallel and Distributed Systems, vol. 26, no. 4, pp. 1178--1191, Apr. 2015.
[80]
W. Li and H. Song, ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks, IEEE Transactions on Intelligent Transportation Systems, vol. 17, no. 4, pp. 960--969, Apr. 2016.
[81]
C. Zhang, W. Li, Y. Luo, and Y. Hu, AIT: An AI-Enabled Trust Management System for Vehicular Networks Using Blockchain Technology, IEEE Internet of Things Journal, vol. 8, no. 5, pp. 3157--3169, Mar. 2021.
[82]
A. Mahmood, Q. Z. Sheng, W. E. Zhang, Y. Wang, and S. Sagar, Toward a Distributed Trust Management System for Misbehavior Detection in the Internet of Vehicles, ACM Transactions on Cyber-Physical Systems, vol. 7, no. 3, pp. 1--25, Jul. 2023.
[83]
M. Aslan and S. Sen, A dynamic trust management model for vehicular ad hoc networks, Vehicular Communications, vol. 41, p. 100608, Jun. 2023.
[84]
N. Haddadou, A. Rachedi, and Y. Ghamri-Doudane, A Job Market Signaling Scheme for Incentive and Trust Management in Vehicular Ad Hoc Networks, IEEE Transactions on Vehicular Technology, vol. 64, no. 8, pp. 3657--3674, Aug. 2015.
[85]
Z. Yang, R. Wang, D. Wu, B. Yang, and P. Zhang, Blockchain-Enabled Trust Management Model for the Internet of Vehicles, IEEE Internet of Things Journal, vol. 10, no. 14, pp. 12 044--12 054, Jul. 2023.
[86]
Y. Kuang, H. Xu, R. Jiang, and Z. Liu, GTMS: A Gated Linear Unit Based Trust Management System for Internet of Vehicles Using Blockchain Technology, in 2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). Wuhan, China: IEEE, Dec. 2022, pp. 28--35.
[87]
J.-M. Chen, T.-T. Li, and J. Panneerselvam, TMEC: A Trust Management Based on Evidence Combination on Attack-Resistant and Collaborative Internet of Vehicles, IEEE Access, vol. 7, pp. 148 913--148 922, 2019.
[88]
R. Lewicki and B. Bunker, Trust in relationships: A model of development and decline. in Conflict, Cooperation, and Justice: Essays Inspired by the Work of Morton Deutsch, May 1995.
[89]
J. Golbeck, Computing with Trust: Definition, Properties, and Algorithms, in 2006 Securecomm and Workshops. Baltimore, MD, USA: IEEE, Aug. 2006, pp. 1--7.
[90]
J. Zhao, F. Huang, L. Liao, and Q. Zhang, Blockchain-Based Trust Management Model for Vehicular Ad Hoc Networks, IEEE Internet of Things Journal, pp. 1--1, 2023.
[91]
M. A. Hoque and R. Hasan, A Trust Management Framework for Connected Autonomous Vehicles Using Interaction Provenance, in ICC 2022 - IEEE International Conference on Communications. Seoul, Korea, Republic of: IEEE, May 2022, pp. 2236--2241.
[92]
D. Zhang, F. R. Yu, R. Yang, and H. Tang, A Deep Reinforcement Learningbased Trust Management Scheme for Software-defined Vehicular Networks, in Proceedings of the 8th ACM Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications, ser. DIVANet'18. New York, NY, USA: Association for Computing Machinery, Oct. 2018, pp. 1--7.
[93]
P. Michiardi and R. Molva, Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks, in Advanced Communications and Multimedia Security: IFIP TC6 / TC11 Sixth Joint Working Conference on Communications and Multimedia Security September 26--27, 2002, Portoro, Slovenia, B. Jerman-Blai and T. Klobuar, Eds. Boston, MA: Springer US, 2002, pp. 107--121.
[94]
F. Sakiz and S. Sen, A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV, Ad Hoc Networks, vol. 61, pp. 33--50, Jun. 2017.
[95]
Y. Yao, W. Chen, X. Chen, J. Ding, and S. Pan, A Blockchain-based Privacy Preserving Scheme for Vehicular Trust Management Systems, in 2020 International Conference on Internet of Things and Intelligent Applications (ITIA). Zhenjiang, China: IEEE, Nov. 2020, pp. 1--5.
[96]
A. Mahmood, S. A. Siddiqui, W. E. Zhang, and Q. Z. Sheng, A Hybrid Trust Management Model for Secure and Resource Efficient Vehicular Ad hoc Networks, in 2019 20th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT). Gold Coast, Australia: IEEE, Dec. 2019, pp. 154--159.
[97]
C. Pu, A Novel Blockchain-Based Trust Management Scheme for Vehicular Networks, in 2021 Wireless Telecommunications Symposium (WTS). CA, USA: IEEE, Apr. 2021, pp. 1--6.
[98]
A. Ltifi, A. Zouinkhi, and M. Bouhlel, ?Active vehicle: A new approach integrating AmI technology for trust management in VANET, International Journal of High Performance Computing and Networking, vol. 11, p. 291, Jan. 2018.
[99]
Z. Liu, J. Weng, J. Guo, J. Ma, F. Huang, H. Sun, and Y. Cheng, PPTM: A PrivacyPreserving Trust Management Scheme for Emergency Message Dissemination in Space--Air--Ground-Integrated Vehicular Networks, IEEE Internet of Things Journal, vol. 9, no. 8, pp. 5943--5956, Apr. 2022
[100]
A. Fabi and S. M. Thampi, A trust management framework using forest fire model to propagate emergency messages in the Internet of Vehicles (IoV), Vehicular Communications, vol. 33, p. 100404, Jan. 2022.
[101]
X. Zhang, R. Li, W. Hou, and J. Shi, Research on Manhattan Distance Based Trust Management in Vehicular Ad Hoc Network, Security and Communication Networks, vol. 2021, pp. 1--13, Jul. 2021.
[102]
S. Yang, J. Li, Z. Liu, and S. Wang, Managing Trust for Intelligence Vehicles: A Cluster Consensus Approach, in Internet of Vehicles - Safe and Intelligent Mobility, C.-H. Hsu, F. Xia, X. Liu, and S. Wang, Eds. Cham: Springer International Publishing, 2015, vol. 9502, pp. 210--220.
[103]
T. Samal and R. Dutta, Blockchain-inspired Distributed Trust in a Smart Vehicular Network System, in 2021 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS). Hyderabad, India: IEEE, Dec. 2021, pp. 1--6.
[104]
A. Rehman, M. F. Hassan, Y. K. Hooi, M. A. Qureshi, S. Shukla, E. Susanto, S. Rubab, and A.-H. Abdel-Aty, CTMF: Context-Aware Trust Management Framework for Internet of Vehicles, IEEE Access, vol. 10, pp. 73 685--73 701, 2022.
[105]
H. Mankodiya, M. S. Obaidat, R. Gupta, and S. Tanwar, XAI-AV: Explainable Artificial Intelligence for Trust Management in Autonomous Vehicles, in 2021 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI). Beijing, China: IEEE, Oct. 2021, pp. 1--5.
[106]
I. Garcia-Magarino, S. Sendra, R. Lacuesta, and J. Lloret, Security in Vehicles With IoT by Prioritization Rules, Vehicle Certificates, and Trust Management, IEEE Internet of Things Journal, vol. 6, no. 4, pp. 5927--5934, Aug. 2019.
[107]
R. Barnwal and S. Ghosh, KITE: An efficient scheme for trust estimation and detection of errant nodes in vehicular cyber-physical systems: KITE: An efficient scheme for trust estimation and detection of errant nodes in vehicular cyberphysical systems, Security and Communication Networks, vol. 9, Jul. 2016.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
CSCS '24: Proceedings of the 2024 Cyber Security in CarS Workshop
November 2024
84 pages
ISBN:9798400712326
DOI:10.1145/3689936
This work is licensed under a Creative Commons Attribution International 4.0 License.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 20 November 2024

Check for updates

Author Tags

  1. adversary model
  2. automotive
  3. decentralized identity
  4. pki
  5. security
  6. trust management

Qualifiers

  • Research-article

Funding Sources

  • German Federal Ministry of Education and Research

Conference

CCS '24
Sponsor:

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 88
    Total Downloads
  • Downloads (Last 12 months)88
  • Downloads (Last 6 weeks)29
Reflects downloads up to 06 Feb 2025

Other Metrics

Citations

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media