A Truth-Oriented Trust Evaluation Model of Shared Traffic Messages in the Internet of Vehicles
Abstract
1. Introduction
- (1)
- To effectively deal with the diversity of vehicle behaviors and objectively evaluate the vehicle’s trustworthiness, we jointly quantify the vehicle’s integrated trust value (I-VT) using both self-experience-based vehicle trust (SEB-VT) and Peer-recommendation-based vehicle trust (PRB-VT).
- (2)
- In SEB-VT, a sample-size–dependent smoothing factor dynamically trades off prior information and empirical evidence, reducing small-sample instability and improving the accuracy and stability of trust evaluation.
- (3)
- In PRB-VT, we leverage link analysis techniques to compute the reference degree of recommendation information, enabling impartial assessment of its quality under heterogeneous recommender reliability and sensor performance.
- (4)
- To reliably determine the trustworthiness of shared traffic message and improve the applicability of the model, we calculate event trust (ET) by differentiating message attitudes and quantifying their relative influence, which effectively reduces the impact of individual bias on the final judgment.
- (5)
- By incorporating entropy as a supplementary metric, we validate the soundness of the proposed smoothing mechanism. Moreover, to validate effectiveness and robustness of our proposed model, we conduct simulation studies demonstrating that the model maintains high precision and recall under diverse attack models.
2. System Model
- (1)
- Vehicles (senders or receivers): Vehicles perceive road conditions through onboard sensors and share the sensed road condition messages with other vehicles via the vehicle-to-vehicle communication standards (e.g., the cellular vehicle-to-vehicle (C-V2V) [18] or dedicated short-range communications (DSRC) [19]). This decentralized message dissemination ensures low latency and local adaptability, both of which are critical for vehicular safety applications. The vehicle receiving the message requests the recommenders’ reference degrees from the RSUs and integrates multi-source evidence to evaluate the message’s trustworthiness, thereby facilitating appropriate actions. After acting on the message, the receiver generate recommendation feedbacks for recommenders based on the trustworthiness and then upload these feedbacks into the RSU. In addition, each vehicle maintains a certificate that records its historical behavior, which contains the identities of the vehicles that have interacted with it and the trust values of these vehicles.
- (2)
- RSUs: RSUs serve as trusted infrastructure that complements vehicle-side computation by collecting, computing, and managing long-term trust evidence (e.g., uploaded recommendation feedback and the resulting reference degrees). Specifically, the RSU maintains a repository of recommendation feedback from vehicles and, based on this data, computes each recommender’s reference degree to quantify the credibility of their recommendations. RSUs then provide this information to vehicles via on-demand queries.
3. A Truth-Oriented Trust Evaluation Model
3.1. The Trustworthiness of Vehicles
3.1.1. Self-Experience-Based Vehicle Trust (SEB-VT)
3.1.2. Peer-Recommendation-Based Vehicle Trust (PRB-VT)
- (1)
- Acquisition of recommendation information
- (2)
- Computing the reference degree of recommendation information
- (3)
- Measurement of recommendation trust
3.1.3. Integrated Vehicle Trust (I-VT)
3.2. The Trustworthiness of Events
4. Experimental Results and Analysis
4.1. Simulation Settings
4.2. Performance Evaluation Metrics
- Precision—It depicts the ability of the trust model to correctly identify false message traffic message. The formula for precision is defined as follows:
- Recall—It describes the trust model’s detection rate on false traffic message. Then recall can be expressed as:
4.3. Simulation Results and Analysis
4.3.1. The Performance of Proposed Model Under Different Attacks
- Typical scenario 1

- 2.
- Typical scenario 2

- 3.
- Under the non-friendly recommendation attack mode


4.3.2. Effects of the Proposed Model on the Driving Distance of AVs After Path Planning
5. Conclusions and Future Works
Author Contributions
Funding
Institutional Review Board Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Cheng, Z.; Zhang, W.; Lu, J.; Yu, B.; Wang, S. A superposition assessment method of road crash risk and congestion risk: An empirical analysis. IEEE Trans. Intell. Transp. Syst. 2023, 24, 4262–4276. [Google Scholar] [CrossRef]
- Leng, K.; Wu, C. Traffic management optimization via iot-enhanced cooperative vehicle-infrastructure systems. IEEE Internet Things J. 2025, 12, 3493–3501. [Google Scholar] [CrossRef]
- Kaci, A.; Rachedi, A. A novel blockchain for social internet of vehicles in the era of 5G and beyond. In Proceedings of the IEEE ICC, Seoul, Republic of Korea, 16–20 May 2022. [Google Scholar]
- Al-Yarimi, F.A.M. Enhancing road safety through advanced predictive analytics in V2X communication networks. Comput. Electr. Eng. 2024, 115, 109134. [Google Scholar] [CrossRef]
- Li, T.; Zhang, Y. Adaptive Trust Evaluation Model Based on Entropy Weight Method for Sensing Terminal Process. Entropy 2025, 27, 200. [Google Scholar] [CrossRef]
- Zhou, X.; Tang, J.; Dang, S.; Chen, G. A Lightweight Trust Mechanism with Attack Detection for IoT. Entropy 2023, 25, 1198. [Google Scholar] [CrossRef] [PubMed]
- Ogundoyin, S.; Kamil, I. A trust management system for fog computing services. Internet Things 2021, 14, 100382. [Google Scholar] [CrossRef]
- Firoozi, F.; Zadorozhny, V.; Li, F. Subjective Logic-Based In-Network Data Processing for Trust Management in Collocated and Distributed Wireless Sensor Networks. IEEE Sens. J. 2018, 18, 6446–6460. [Google Scholar] [CrossRef]
- Yu, X.; Wang, C.; Xu, L.; Wu, Z.; Wang, Z.; He, Y.; Wang, W. When Connected and Automated Vehicles Meet Mobile Crowdsensing: A Perception and Transmission Framework in the Metaverse. IEEE Veh. Technol. Mag. 2023, 18, 22–34. [Google Scholar] [CrossRef]
- Gurung, S.; Lin, D.; Squicciarini, A. Information-oriented trustworthiness evaluation in vehicular ad-hoc networks. In Proceedings of the Network and System Security, Madrid, Spain, 3–4 June 2023. [Google Scholar]
- Shaikh, R.; Alzahrani, A.S. Intrusion-aware trust model for vehicular ad hoc networks. Secur. Commu. Netw. 2014, 7, 1652–1669. [Google Scholar] [CrossRef]
- Rehman, A.; Hassan, M.F.; Hooi, Y.; Qureshi, M.; Shukla, S.; Susanto, E. CTMF: Context-Aware Trust Management Framework for Internet of Vehicles. IEEE Access 2022, 10, 73685–73701. [Google Scholar] [CrossRef]
- Mirzadeh, I.; Sayad, M. Filtering malicious messages by trust-aware cognitive routing in vehicular ad hoc networks. IEEE Trans. Intell. Transp. Syst. 2023, 24, 1134–1143. [Google Scholar] [CrossRef]
- Yang, Z.; Yang, K.; Lei, L.; Zheng, K.; Leung, V.C.M. Blockchain-based decentralized trust management in vehicular networks. IEEE Internet Things J. 2019, 6, 1495–1505. [Google Scholar] [CrossRef]
- Ge, C.; Zhou, L.; Hancke, G.P.; Su, C. A provenance-aware distributed trust model for resilient unmanned aerial vehicle networks. IEEE Internet Things J. 2021, 8, 12481–12489. [Google Scholar] [CrossRef]
- Ahmad, F.; Kurugollu, F.; Adnane, A.; Hussain, R. MARINE: Man-in-the-middle attack resistant trust model in connected vehicles. IEEE Internet Things J. 2020, 7, 3310–3322. [Google Scholar] [CrossRef]
- Alnasser, A.; Sun, H.; Jiang, J. Recommendation-based trust model for vehicle-to-everything (V2X). IEEE Internet Things J. 2020, 7, 440–450. [Google Scholar] [CrossRef]
- Chen, S.; Hu, J.; Shi, Y. A vision of C-V2X: Technologies, field testing, and challenges with Chinese development. IEEE Internet Things J. 2020, 7, 3872–3881. [Google Scholar] [CrossRef]
- Li, P.; Huang, X.; Hu, F. When DSRC Meets With C-V2X: How to Jointly Predict and Select Idle Channels? IEEE Trans. Veh. Technol. 2024, 73, 15693–15698. [Google Scholar] [CrossRef]
- Jiang, J.; Han, G.; Wang, F.; Shu, L.; Guizani, M. An efficient distributed trust model for wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 2015, 26, 1228–1237. [Google Scholar] [CrossRef]
- Cheng, J.; Zhou, M.; Liu, F.; Gao, S.; Liu, C. Routing in internet of vehicles: A review. IEEE Trans. Intell. Transp. Syst. 2015, 16, 2339–2352. [Google Scholar] [CrossRef]
- Yao, L.; Wang, J.; Wang, X.; Chen, A.; Wang, Y. V2X routing in a VANET based on the hidden markov model. IEEE Trans. Intell. Transp. Syst. 2018, 19, 889–899. [Google Scholar] [CrossRef]
- Chen, R.; Bao, F.; Chang, M. Dynamic trust management for delay tolerant networks and its application to secure routing. IEEE Trans. Parallel Distrib. Syst. 2024, 25, 1200–1210. [Google Scholar] [CrossRef]
- Azad, M.; Bag, S.; Parkinson, S.; Feng, H. TrustVote: Privacy-preserving node ranking in vehicular networks. IEEE Internet Things J. 2019, 6, 5878–5891. [Google Scholar] [CrossRef]
- Chen, L.; Zhao, D.; Tao, L.; Wang, K.; Qiao, S.; Zeng, X.; Tan, C. A Credible and Fair Federated Learning Framework based on Blockchain. IEEE Trans. Artif. Intell. 2025, 2, 301–316. [Google Scholar] [CrossRef]
- Zheng, B.; Rao, B.; Zhu, T.; Tan, C.; Duan, J.; Zhou, Z. Online Location Planning for AI-Defined Vehicles: Optimizing Joint Tasks of Order Serving and Spatio-Temporal Heterogeneous Model Fine-Tuning. IEEE Trans. Mob. Comput. 2025. [Google Scholar] [CrossRef]








| Parameter | Value |
|---|---|
| Traffic scene range | 4000 m × 4000 m |
| Number of roads | 14 |
| Vehicle distribution | Random |
| Total number of vehicles | 100 |
| σ | 24 |
| A0 | 0.5 |
| c | 0.85 |
| 0.5 | |
| 0.5 | |
| Simulation time | 300 iterations |
| Modes | Behavior of Vehicles |
|---|---|
| Typical scenario 1= | Vehicles deliberately share false traffic message that deviates from actual road conditions independently. |
| Typical scenario 2 | Colluding with other vehicles to collectively share false traffic message that contradicts actual road conditions. |
| Attack model (non-friendly attack) | Recommenders excessively praise or discredit the collaborative vehicles. |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Zhang, J.; Shuai, L.; Dong, J.; Dong, G.; Yang, X.; Long, K. A Truth-Oriented Trust Evaluation Model of Shared Traffic Messages in the Internet of Vehicles. Entropy 2025, 27, 1113. https://doi.org/10.3390/e27111113
Zhang J, Shuai L, Dong J, Dong G, Yang X, Long K. A Truth-Oriented Trust Evaluation Model of Shared Traffic Messages in the Internet of Vehicles. Entropy. 2025; 27(11):1113. https://doi.org/10.3390/e27111113
Chicago/Turabian StyleZhang, Jiamin, Lisha Shuai, Jiuling Dong, Gaoya Dong, Xiaolong Yang, and Keping Long. 2025. "A Truth-Oriented Trust Evaluation Model of Shared Traffic Messages in the Internet of Vehicles" Entropy 27, no. 11: 1113. https://doi.org/10.3390/e27111113
APA StyleZhang, J., Shuai, L., Dong, J., Dong, G., Yang, X., & Long, K. (2025). A Truth-Oriented Trust Evaluation Model of Shared Traffic Messages in the Internet of Vehicles. Entropy, 27(11), 1113. https://doi.org/10.3390/e27111113

