Total views : 194

Trusted and Secured Routing Protocol for Vehicular Ad-Hoc Networks


  • Department of Computer Science, Assam University, Silchar – 788011, Assam, India


Objectives: To establish a trust based secured routing protocol to accurately distinguish malicious nodes that are dropping the important information and modifying the routes. Efforts are made to identify malicious nodes such as route modifiers and packet droppers. Methods/Statistical Analysis: Vehicular Ad-hoc NETworks (VANETs) is a modern technology which help a vehicle and a driver in several ways. The main characteristics of VANETs are nodes i.e. vehicles with relatively high mobility and constantly changing topology. In case of data communication in VANETs, a source node must depend on the intermediate nodes to send its data packets to the destination node on multi-hop routes. VANETs can give better performance if all its nodes work properly with full cooperation during the communication. In VANETs, a node can generate and broadcast important and essential messages to other nodes in the network for safety reason. However, the generated message by a vehicle may not be reliable every time. In this paper we have proposed a trusted and secured routing protocol that evaluates the trust of a vehicle and also checks the message reliability. The proposed protocol is named as Trusted Vehicular Ad-hoc On-demand Distance Vector (TVAODV) routing protocol which is the modification of Ad-hoc On-demand Distance Vector routing protocol. Since VANETs are mostly attacked by the malicious nodes; therefore better security solution is needed to stop such attacks. The proposed protocol introduces a trust model to establish a malicious node free route for source node to send its data packets to the destination node on multi-hop routes. Findings: The TVAODV protocol is simulated in Network Simulator (NS2) to check the performance and accuracy and also compared to AODV routing protocol. It is found that TVAODV is comparatively better in performance when VANET is in high mobility and versatile topology. The performance of the proposed protocol is evaluated using performance measurement metrics: average end-to-end delay, throughput, routing load and packet delivery ratio. The proposed protocol performance is evaluated in the presence of malicious (route modifiers and packet droppers) vehicles and the results shows that the proposed protocol is achieved better accuracy and it shows better performance compared to AODV routing protocol. Application/Improvements: The proposed protocol may be useful in the process of developing a better traffic management and transportation system. In this paper we have proposed a TVAODV routing protocol which includes trust model to evaluate the trust of vehicles as well as to establish a malicious free route.


AODV, NS2, Packet Delivery Ratio, Routing Load, Throughput, TVAODV, VANETs.

Full Text:

 |  (PDF views: 145)


  • Patel NJ, Jhaveri RH. Trust Based Approaches for Secure Routing in VANET: A Survey. Elsevier International Conference on Advanced Computing Technologies and Applications (ICACTA); 2015. p. 592-601. Crossref
  • Blum JJ, Eskandarian A, Hoffman LJ. Challenges of Intervehicle Ad-Hoc Networks, IEEE Transportation Systems. 2004; 5(4):347-51. Crossref
  • Raya M, Hubaux JP. Securing Vehicular Ad-Hoc Networks, Journal of Computer Security. 2007; 15(1):39-68. Crossref
  • Wei YC, Chen YM. Efficient Self-Organized Trust Management in Location Privacy Enhanced VANETs, Springer International Workshop on Information Security Applications WISA, Jeju Island, Korea; 2012, 13. p. 328-44. Crossref
  • Alheeti KMA, Gruebler A, McDonald-Maier KD. An Intrusion Detection System Against Malicious Attacks on the Communication Network of Driverless Cars. IEEE 12th Annual Consumer Communications and Networking Conference (CCNC), Las Vegas, NV; 2015. p. 916-21. Crossref
  • Li Q, Malip A, Martin KM, Ng SL, Zhang J. A ReputationBased Announcement Scheme for VANETs, IEEE Transactions on Vehicular Technology. 2012; 61(9):4095108. Crossref
  • Dhurandher SK, Obaidat MS, Jaiswal A, Tiwari A, Tyagi A. Securing Vehicular Networks: A Reputation and Plausibility Checks-based Approach. IEEE Globecom Workshop on Web and Pervasive Security; 2010. p. 1550-54. Crossref
  • Gazdar T, Rachedi A, Benslimane A, Belghith A. A Distributed Advanced Analytical Trust Model for VANETs. IEEE Global Communications Conference (GLOBECOM), Anaheim, CA; 2012. p. 201-06. Crossref
  • Wang J, Liu Y, Liu X, Zhang J. A Trust Propagation Scheme in VANETs. IEEE Intelligent Vehicles Symposium, Xi’an; 2009. p. 1067-71.
  • Wang Z, Chigan C. Countermeasure Uncooperative Behaviors with Dynamic Trust-Token in VANETs.I EEE International Conference on Communications, Glasgow; 2007. p. 3959-64.‑Crossref
  • Biswas S, Misic J, Misic V. ID-based Safety Message Authentication for Security and Trust in Vehicular Networks. IEEE 31st International Conference on Distributed Computing Systems Workshops, Minneapolis, MN; 2011. p. 323-31.
  • Gazdar T, Benslimane A, Belghith A. Secure Clustering Scheme Based Keys Management in VANETs. IEEE 73rd Vehicular Technology Conference (VTC Spring), Yokohama; 2011. p. 1-5.
  • Ding Q, Li X, Jiang M, Zhou XH. Reputation-based Trust Model in Vehicular Ad-Hoc Networks. IEEE International Conference on Wireless Communications and Signal Processing (WCSP), Suzhou; 2010. p. 1-6. Crossref
  • Liao C, Chang J, Lee I, Venkatasubramanian KK, A Trust Model for Vehicular Network-Based Incident Reports. IEEE 5th International Symposium on Wireless Vehicular Communications (WiVeC); 2013. p. 1-5. Crossref
  • Dotzer F, Fischer L, Magiera P. VARS: A Vehicle Ad-Hoc Network Reputation System. IEEE 6thInternational Symposium on a World of Wireless Mobile and Multimedia Networks; 2005. p. 454-56. Crossref
  • Gazdar T, Benslimane A, Rachedi A, Belghith A. A Trustbased Architecture for Managing Certificates in Vehicular Ad-Hoc Networks. IEEE 2nd International Conference on Communications and Information Technology (ICCIT), Hammamet; 2012. p. 180-85. Crossref
  • Serna J, Luna J, Medina M. Geolocation-based Trust for Vanet’s Privacy. IEEE 4th International Conference on Information Assurance and Security (ISIAS), Naples; 2008. p. 287-90. Crossref
  • Huang D, Hong X, Gerla M. Situation-Aware Trust Architecture for Vehicular Networks, IEEE Communications Magazine. 2010; 48(11):128-35. Crossref
  • Chen C, Zhang J, Cohen R, Ho PH. Secure and Efficient Trust Opinion Aggregation for Vehicular Ad-hoc Networks. IEEE 72nd Vehicular Technology Conference Fall (VTC 2010-Fall), Ottawa; 2010. p. 1-5.
  • Raya M, Papadimitratos P, Aad I, Jungels D, Hubaux JP. Eviction of Misbehaving and Faulty Nodes in Vehicular Networks, IEEE Journal on Selected Areas in Communications. 2007; 25(8):1557-68. Crossref
  • Chen YM, Wei YC. A Beacon-Based Trust Management System for Enhancing User Centric Location Privacy in VANETs, Journal of Communications and Networks. 2013; 15(2):153-63.
  • Li W, Song H. ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad-Hoc Networks, IEEE Transactions on Intelligent Transportation Systems. 2016; 17(4):960-69. Crossref
  • Chang BJ, Kuo SL, Liang YH, Wang DY. Markov Chainbased Trust Model for Analyzing Trust Value in Distributed Multicasting Mobile Ad-Hoc Networks. IEEE Asia-Pacific Services Computing Conference, APSCC ‘08, Yilan; 2008. p. 156-61. Crossref
  • Wei YC, Chen YM. An Efficient Trust Management System for Balancing the Safety and Location Privacy in VANETs. IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool; 2012. p. 393-400. Crossref
  • Daza V, Domingo-Ferrer J, Sebe F, Viejo A. Trustworthy Privacy-Preserving Car-Generated Announcements in Vehicular Ad-Hoc Networks, IEEE Transactions on Vehicular Technology. 2009; 58(4):1876-86. Crossref
  • Jeyaprakash T, Mukesh R. Mathematical Analysis of Trust Computing Algorithms. ELSEVIER Second International Symposium on Computer Vision and the Internet (VisionNet’15); 2015. p. 105-12. Crossref
  • Minhas UF, Zhang J, Tran T, Cohen R. A Multifaceted Approach to Modeling Agent Trust for Effective Communication in the Application of Mobile Ad-Hoc Vehicular Networks, IEEE Transactions on Systems, Man and Cybernetics-Part C: Applications and Reviews. 2011; 41(3):407-20. Crossref
  • Golbeck J. Computing with Trust: Definition, Properties and Algorithms. IEEE Securecomm and Workshops, Baltimore, MD; 2006. p. 1-7.
  • Gai X, Li Y, Chen Y, Shen C. Formal Definitions for Trust in Trusted Computing. IEEE Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, Xian, Shaanxi; 2010. p. 305-10. Crossref
  • Khan MF, Felemban EA, Qaisar S, Ali S. Performance Analysis on Packet Delivery Ratio and End-to-End Delay of Different Network Topologies in Wireless Sensor Networks (WSNs). IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN), Dalian; 2013. p. 324-29.
  • Fabbri F, Riihijarvi J, Buratti C, Verdone R, Mahonen P. Area Throughput and Energy Consumption for Clustered Wireless Sensor Networks. IEEE Wireless Communications and Networking Conference, Budapest; 2009. p. 1-6. Crossref
  • Mahmood D, Javaid N, Qasim U, Khan ZA. Routing Load of Route Discovery and Route Maintenance in Wireless Reactive Routing Protocols. IEEE 7th International Conference on Broadband, Wireless Computing, Communication and Applications (BWCCA), Victoria, BC; 2012. p. 511-16. Crossref
  • Guo C, Zhou J, Pawelczak P, Hekmat R. Improving Packet Delivery Ratio Estimation for Indoor Ad-Hoc and Wireless Sensor Networks. IEEE 6th Consumer Communications and Networking Conference, Las Vegas, NV; 2009. p. 1-5.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.