Abstract
In this paper, we consider a Trust Model with Group Leader (GL)-based communication in VANET. This model is used to classify vehicles based on their trustworthiness and elect potential GLs. We propose a security risk assessment methodology and we apply it to our Trust Model. This methodology is used for identifying threats, assessing the risk involved, and defining approaches to mitigate them. The risk assessment includes assessment of the impact and likelihood of occurrence of attacks relevant to the identified threats, evaluation of the Trust Model design principles, validation of the built-in security, and the mitigation actions of attacks. Based on this assessment, we demonstrated the resiliency of the Trust Model to resist to many security attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Hasrouny, H., Bassil, C., Samhat, A.E., Laouiti, A.: Group-based authentication in V2V communications. In: 2015 Fifth International Conference on DICTAP, pp. 173–177. IEEE (2015)
Shringar Raw, R., Kumar, M., Singh, N.: Security challenges, issues and their solutions for VANET. Int. J. Network Secur. Appl. (IJNSA) 5(5), 95 (2013)
Hoa La, V., Cavalli, A.: Security attacks and solutions in vehicular ad hoc networks: a survey. Int. J. AdHoc Netw. Syst. (IJANS) 4(2), 1–20 (2014)
Gazdar, T., Benslimane, A., Rachedi, A., Belghith, A.: A trust-based architecture for managing certificates in vehicular adhoc networks. In: International Conference on Communications and Information Technology (ICCIT), pp. 180–185. IEEE, June 2012
Yang, N.: A similarity based trust and reputation management framework for VANET. Int. J. Future Gener. Commun. Network. 6(2), 25 (2013)
Patel, N., Jhaveri, R.: Trust based approaches for secure routing in VANET: a survey. Elsevier (2015)
Harding, J., Powell, G., Yoon, R., Fikentscher, J., Doyle, Ch., Sade, D., Lukuc, M., Simons, J., Wang, J.: Readiness-of-V2V-Technology-for-Application-812014. US department of transportation, NHTSA National Highway Traffic Safety Application, August 2014
SESAR Joint Undertaking, SESAR ATM SecRAM Implementation Guidance material-Project 16.02.03 D03, 2013, SESAR official website: http://www.sesarju.eu/
ETSI TR 102 893 V1.1.1-ITS-Security-Threat, Vulnerability and Risk Analysis
Zhou, T., Roy Choudhury, R., Ning, P., Chakrabarty, K.: P2DAP – sybil attacks detection in vehicular ad hoc networks. IEEE J. Sel. Areas Commun. 29(3), 582–594 (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Hasrouny, H., Bassil, C., Samhat, A.E., Laouiti, A. (2017). Security Risk Analysis of a Trust Model for Secure Group Leader-Based Communication in VANET. In: Laouiti, A., Qayyum, A., Mohamad Saad, M. (eds) Vehicular Ad-Hoc Networks for Smart Cities. Advances in Intelligent Systems and Computing, vol 548. Springer, Singapore. https://doi.org/10.1007/978-981-10-3503-6_6
Download citation
DOI: https://doi.org/10.1007/978-981-10-3503-6_6
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-3502-9
Online ISBN: 978-981-10-3503-6
eBook Packages: EngineeringEngineering (R0)