Next Article in Journal
Special Issue “Body Sensors Networks for E-Health Applications”
Next Article in Special Issue
Fault-Tolerant Network-On-Chip Router Architecture Design for Heterogeneous Computing Systems in the Context of Internet of Things
Previous Article in Journal
Comparison between the Airgo™ Device and a Metabolic Cart during Rest and Exercise
Open AccessArticle

TrustWalker: An Efficient Trust Assessment in Vehicular Internet of Things (VIoT) with Security Consideration

1
School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang 212013, China
2
Faculty of Engineering Science, Technology, and Management, Ziauddin University, Karachi 74600, Pakistan
3
School of Intelligent Mechatronics Engineering, Sejong University, Seoul 05006, Korea
4
School of Engineering, Macquarie University, Sydney NSW 2109, Australia
5
Department of Information and Communication Engineering, Yeungnam University, Gyeongsan-si 38541, Korea
6
Department of Electronics and Information Engineering, Korea University, Sejong 30019, Korea
*
Authors to whom correspondence should be addressed.
Equal Contributed First Authors.
Sensors 2020, 20(14), 3945; https://doi.org/10.3390/s20143945
Received: 22 June 2020 / Revised: 10 July 2020 / Accepted: 15 July 2020 / Published: 16 July 2020
The Internet of Things (IoT) is a world of connected networks and modern technology devices, among them vehicular networks considered more challenging due to high speed and network dynamics. Future trends in IoT allow these inter networks to share information. Also, the previous security solutions to vehicular IoT (VIoT) much emphasize on privacy protection and security related issues using public keys infrastructure. However, the primary concern about efficient trust assessment, authorized users malfunctioning, and secure information dissemination in vehicular wireless networks have not been explored. To cope with these challenges, we propose a trust enhanced on-demand routing (TER) scheme, which adopts TrustWalker (TW) algorithm for efficient trust assessment and route search technique in VIoT. TER comprised of novel three-valued subjective logic (3VSL), TW algorithm, and ad hoc on-demand distance vector (AODV) routing protocol. The simulated results validate the accuracy of the proposed scheme in term of throughput, packet drop ratio (PDR), and end to end (E2E) delay. In the simulation, the execution time of the TW algorithm is analyzed and compared with another route search algorithm, i.e., Assess-Trust (AT), by considering real-world online datasets such as Pretty Good Privacy and Advogato. The accuracy and efficiency of the TW algorithm, even with a large number of vehicle users, are also demonstrated through simulations. View Full-Text
Keywords: IoT; VIoT; TrustWalker; trust enhanced routing; trust modelling IoT; VIoT; TrustWalker; trust enhanced routing; trust modelling
Show Figures

Figure 1

MDPI and ACS Style

Sohail, M.; Ali, R.; Kashif, M.; Ali, S.; Mehta, S.; Zikria, Y.B.; Yu, H. TrustWalker: An Efficient Trust Assessment in Vehicular Internet of Things (VIoT) with Security Consideration. Sensors 2020, 20, 3945. https://doi.org/10.3390/s20143945

AMA Style

Sohail M, Ali R, Kashif M, Ali S, Mehta S, Zikria YB, Yu H. TrustWalker: An Efficient Trust Assessment in Vehicular Internet of Things (VIoT) with Security Consideration. Sensors. 2020; 20(14):3945. https://doi.org/10.3390/s20143945

Chicago/Turabian Style

Sohail, Muhammad; Ali, Rashid; Kashif, Muhammad; Ali, Sher; Mehta, Sumet; Zikria, Yousaf B.; Yu, Heejung. 2020. "TrustWalker: An Efficient Trust Assessment in Vehicular Internet of Things (VIoT) with Security Consideration" Sensors 20, no. 14: 3945. https://doi.org/10.3390/s20143945

Find Other Styles
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Search more from Scilit
 
Search
Back to TopTop