Next Article in Journal
Securing the Smart City Airspace: Drone Cyber Attack Detection through Machine Learning
Previous Article in Journal
Correlation between Human Emotion and Temporal·Spatial Contexts by Analyzing Environmental Factors
Previous Article in Special Issue
Dynamic Allocation of SDN Controllers in NFV-Based MEC for the Internet of Vehicles
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Towards Strengthening the Resilience of IoV Networks—A Trust Management Perspective

1
Faculty of Engineering, Universiti Malaysia Sarawak, Kota Samarahan 94300, Sarawak, Malaysia
2
Faculty of Mechanical and Electrical Engineering, Qilu Institute of Technology, Jinan 250200, China
*
Author to whom correspondence should be addressed.
Future Internet 2022, 14(7), 202; https://doi.org/10.3390/fi14070202
Submission received: 25 May 2022 / Revised: 20 June 2022 / Accepted: 24 June 2022 / Published: 30 June 2022
(This article belongs to the Special Issue Software-Defined Vehicular Networking)

Abstract

:
Over the past decade or so, considerable and rapid advancements in the state of the art within the promising paradigms of the Internet of Things (IoT) and Artificial Intelligence (AI) have accelerated the development of conventional Vehicular Ad Hoc Networks (VANETS) into the Internet of Vehicles (IoV), thereby bringing both connected and autonomous driving much closer to realization. IoV is a new concept in the Intelligent Traffic System (ITS) and an extended application of IoV in intelligent transportation. It enhances the existing capabilities of mobile ad hoc networks by integrating them with IoT so as to build an integrated and unified vehicle-to-vehicle network. It is worth mentioning that academic and industrial researchers are paying increasing attention to the concept of trust. Reliable trust models and accurate trust assessments are anticipated to improve the security of the IoV. This paper, therefore, focuses on the existing trustworthiness management models along with their corresponding trust parameters, as well as the corresponding trust evaluation parameters and simulation, which provide the basis for intelligent and efficient model suggestions and optimal parameter integration. In addition, this paper also puts forward some open research directions that need to be seriously solved before trust can play its due role in enhancing IoV network elasticity.

1. Introduction

With the rapid advancement in the automotive industry, the number of vehicles in countries around the world is increasing at an unprecedented rate, resulting in severe challenges to the existing transportation system. On the one hand, traffic accidents occur frequently, hence, putting the lives of vehicular passengers and pedestrians at risk. The World Health Organization (WHO) released a report on road safety, stating that every year, around 1.35 million people die in road traffic accidents, and an average of one person dies in a traffic accident every 24 s. On the other hand, the issue of traffic congestion is becoming serious, not only restricting the orderly progress of urban traffic but also causing huge economic losses and environmental pollution. The Intelligent Transportation System (ITS) came into existence in order to reduce traffic accidents and alleviate traffic congestion. As an important component of smart cities, it paves the way for future transportation systems. The ITS combines data transmission technology, electronic sensing technology, information technology, computer technology, and various control technologies to build an efficient and real-time integrated traffic management system.
In recent years, wireless networking technology has matured. In particular, with the rapid development of long-term evolution (LTE) and fifth-generation (5G) mobile communication technology, the development of the concept of Internet of Vehicles (IoV) has attracted the attention of researchers. The use of 5G can facilitate vehicular networks in having a more stable and low latency communication, and accordingly, the notion of 5G-ITS has appeared in the literature. In [1], Carlos proposed a 5G V2X (vehicle to everything) ecosystem for the IoV. The proposed ecosystem was based on the notion of a Software-Defined Network (SDN), and it mainly used 5G to evaluate the video Internet and vehicle-to-vehicle communication in rural and urban vehicle environments. In [2], Benjamin described the security and privacy challenges of using 5G technology in IoV and analyzed solutions to different types of attacks from a technical level. In [3], a crowdsensing system based on blockchain was proposed by Wang to ensure the security and privacy of 5G IoV. A deep reinforcement learning algorithm was adopted, and the effectiveness and security of the system were verified by experiments in a computer with a 64-bit Windows 10 operating system.
As an important part of the ITS, the Vehicular Ad Hoc Network (VANET) integrates the Mobile Internet and the Internet of Things (IoT), as described in Figure 1. As a special Mobile Ad Hoc Network (MANET), it has the characteristics of openness, high mobility and dynamic change in the topology structure of the network.
VANETs sense the surrounding road environment through on-board sensors. With the development of information and communication technology, VANETs realize network connections between vehicles, vehicles and the roadside, vehicles and pedestrians, and vehicles and service platforms; support traffic information sharing and vehicle–vehicle cooperation; and greatly improve road traffic safety and efficiency. A simple VANET is composed of an on-board unit (OBU), a roadside unit (RSU), and a trusted authority (TA). OBU refers to the communication device integrated in the vehicle. When a vehicle passes through RSU at high speed, OBU and RSU communicate via one of the radio access technologies. According to the technical reports of the 3rd Generation Partnership Project (3GPP) [4], the main business categories of IoVs are:
  • Driving Safety—Driving safety is the most important task of the IoV and is of great significance for protecting people. It mainly includes collision warning, emergency vehicle warning, dangerous road conditions warning, and automatic driving;
  • Traffic Efficiency—Traffic efficiency is mainly aimed at alleviating urban traffic congestion and providing green, efficient, and comfortable travel services for people. It mainly includes traffic light control, adaptive cruise, and vehicle choreography;
  • Information Services—Information services mainly provide infotainment services, high-precision map download, navigation, and other value-added services. These include multimedia entertainment, high-precision map download, and remote vehicle diagnosis. Therefore, VANETs have huge social and commercial value.
In VANETs, the vehicles mainly act as nodes, propagating information; however, VANETs suffer from wireless instability, cover a relatively small mobile network, and are only suitable for local and discrete environments. On the contrary, IoV can process the messages it receives based on its perception ability. Every vehicle is regarded as an intelligent object in IoV and is equipped with a powerful multi-sensor platform, communication technology, computing units, and IP-based direct or indirect connections, thereby enabling it to connect to the Internet and other networking entities. In this regard, cellular vehicle to everything (C-V2X) is a promising vehicular communication technology that employs a cellular network, as shown in Figure 2.
However, several security issues hinder the realization of IoV. Traditional security technologies based on authentication and encryption mechanisms cannot effectively identify internal attacks initiated by authenticated nodes. The core idea of a trust management mechanism is to ascertain the trust value of nodes and then identify malicious nodes by making intelligent decisions. The concept of ’trust management’ was first proposed by Blaze [5] by providing a precise definition of trust and predicting the expected trust based on the probability distribution method. However, this model cannot effectively handle malicious attacks on the trust management mechanism itself, because it uses a simple weighted average method when calculating trust. In [6], the author put forward the concept of “scope” in trust management and can calculate the value of “scope”, and they define another method to calculate the trust value. Many scholars have since begun to establish various trust models with different trust evaluation algorithms for different network environments, such as the P2P network, social networks and ad hoc networks. Classical trust models include Eigen Trust [7], Power Trust [8], Peer Trust [9], and Trust Guard [10]. Recently, many experts and scholars have carried out active research on the trust evaluation technology of IoV, and they obtained some interesting results.
Tan [11] put forward a trust management mechanism to ensure data security, which can help to choose the best path for a route. Li [12] proposed an attack-resistant trust management scheme for the IoV, which can resist false feedback attacks and switch attacks. Hu [13] put forward a trust evaluation scheme, REPLACE, at the scene of highway vehicle arrangement, which was used to help the user vehicles in the motorcade choose the trusted head vehicle to follow. Soley [14] proposed a trust model for IoV based on fuzzy logic and fog nodes, which made use of the characteristics of fuzzy logic. This model was good at handling inaccurate messages and had strong fault tolerance to evaluate the trust of messages transmitted in IoV. Lin [15] introduced social relations into the Internet of Vehicles and put forward the concept of “Vehicles Social Networks” (VSNs), which reflected the influence of social characteristics and human behavior on VANET. Chaker [16] proposed introducing vehicle roles to help allocate initial trust values. Xiao [17] introduced the PagePank algorithm, which was originally used for web page sorting. According to the local trust, a relatively stable local trust link graph that was independent of the dynamic network topology structure was constructed, and then, the global trust of nodes was iteratively calculated based on the local trust link graph. In [18], an evaluation method of trust based on blockchain technology was proposed, which could resist false message attacks.

1.1. Contributions of the Paper

The main contributions are summarized as follows:
  • To clarify the development process from VANET to IoV firstly. Owing to certain limitations of VANET, IoV has developed rapidly due to its special advantages.
  • This paper conducts comprehensive research on the trust management in the Internet of Vehicles, including the trust model, trust parameters, simulation methods and model evaluation methods. In addition, various security attacks are classified and explained.
  • Finally, the future research direction of the IoV trust management mechanism is put forward, which lays the foundation for follow-up research.

1.2. Outline of the Paper

The remainder of this paper is organized as follows. In Section 2, the development history and advantages of VANET are described in detail, and more importantly, the limitations of VANET at present are put forward. The appearance of IoV solves the limitations of VANET, and the architecture and key technologies of IoV are introduced in detail. Section 3 mainly introduces the trust management in IoV. By consulting the literature, we summarize all the trust classifications, trust models, trust parameters, evaluation parameters, and the classification of security attacks. In Section 4, future research directions for IoV and the problems to be solved are introduced.

2. From Vehicular Ad Hoc Networks to Internet of Vehicles

2.1. Vehicle Ad Hoc Networks (VANETS)

The MANET is one of the important components of the Wireless Ad Hoc Network (WANET). From the perspective of computer technology, MANET is defined as the working group of mobile ad hoc networks. There are two types of ad hoc network: fixed nodes and mobile nodes. MANET refers to an ad hoc network with mobile nodes, and it comprises:
  • Vehicle Ad Hoc Networks (VANETs)—VANETs realize the coordination of vehicles, people, and roads through V2X, which is an artificial intelligence technology that can help vehicles take actions in an intelligent way when they encounter danger. Its appearance has greatly improved traffic safety and traffic efficiency;
  • Smart Phone Ad Hoc Networks (SPANs)—SPANs create peer-to-peer networks using existing hardware devices, independent of cellular operator networks, wireless access points or traditional network infrastructure;
  • Internet-based Mobile Ad Hoc Networks (IMANETs)—IMANETs support internet protocols such as TCP/UDP and IP;
  • Hub-Spoke MANET—A plurality of sub-mobile ad hoc networks can be connected to the traditional central radiating VPN to create geographically distributed mobile ad hoc networks;
  • Military or Tactical Wireless Ad Hoc (MWANET)—MWANET is a special self-organizing network for military departments, with special emphasis on data security, real-time requirements, data rate, radio range and integration, and fast routes in terms of mobility requirements;
  • Flying Ad Hoc Networks (FANETs)—FANETs consist of drones, which can achieve great mobility and provide connectivity with remote areas.
VANET is a special commercial application of the traditional mobile ad hoc network. The evolutionary history of VANET is shown in Figure 3. VANET may be deployed by communication operators, content service providers, and government agencies, or jointly deployed by them, representing what is essentially a heterogeneous wireless network. C2CCC, the European vehicle-mounted communication alliance, provides a guiding architecture consisting of three domains, as shown in Table 1.
VANET has some advantages because its network nodes are all vehicles and roadside devices:
  • The vehicle can achieve sufficient energy support, and the carrying space of the vehicle can also ensure the good performance of its wireless communication equipment. At the same time, its storage and computing capabilities are also very powerful. In the same way, the traffic facilities on both sides of the road also have sufficient energy supply, and the computing storage capacity and wireless communication capacity are guaranteed;
  • The popularity of GPS and GIS (Geographic Information System) makes VANET rich in external auxiliary information, including not only its own location information but also the geographical information of its area, such as road direction, traffic light distribution, etc.;
  • As compared with other MANETs, the nodes of VANET move more regularly. The network topology is relatively stable when vehicles travel in the same direction, but when vehicles run in the opposite direction, the network topology will change very quickly, and the life of the whole link will be shortened. It is possible to predict the link state by combining the driving direction, speed and road information of the vehicle.
Nevertheless, VANET has the characteristics of openness, high-speed movement and dynamic topology change, which cause some transmission problems:
  • The stability of wireless channels is poor, which is influenced by many factors, including the current road condition information, the relative speed and direction between vehicles, the types of vehicles, the buildings along the road, etc.;
  • Rapid network topology change and short link life;
  • Limited network capacity. The distribution of nodes in VANET is restricted by roads, and it presents a “tubular” shape. According to the calculation method of the network capacity of a random plane, it can be found that its network capacity is more limited than that of the general wireless mobile network;
  • As the traffic density changes, the network load will also change greatly, so the nodes must have strong adaptability to this rapid change;
  • VANET and driving safety are closely related, while OBU’s operating environment is relatively harsh, which requires more stringent requirements for the reliability and safety of these devices.

2.2. Internet of Vehicle (IoV)

2.2.1. The Structure of IoV

In view of the defects of VANET, IoV has solved the problems existing in VANET. IoV refers to connecting vehicles to form a network, and it realizes the functions of intelligent transportation, intelligent vehicles and intelligent driving. In terms of networks, IoV is a three-tier architecture of “end management cloud”, as shown in Figure 4 and Table 2.

2.2.2. Key Technologies of IoV

To realize the stable and efficient operation of IOV, many key technologies are needed:
  • Sensor technology and sensor information integration—Sensor technology is mainly used to sense vehicle and road information, and it is mainly integrated in the OBU of vehicles. The sensor network of vehicles can be divided into in-vehicle sensor networks and out-of-vehicle sensor networks. The sensor network in vehicles is mainly used to provide information about the vehicle’s status. This condition information is needed for remote diagnosis, for example, to analyze and judge the current state of the vehicle. Out-of-vehicle sensor networks are mainly used to sense the external environment of vehicles, such as cameras and anti-collision sensors. Such information can be used to assist driving, and it can also be used to improve driving safety. The road sensor network consists of sensors laid on roads and roadsides. Such sensors are used to sense road condition information and transmit it to vehicles, such as vehicle speed and direction, traffic density, intersection congestion, etc., so that the vehicle-mounted system can obtain road and traffic environment information.
  • An intelligent and open vehicle terminal system platform—Based on a terminal system platform that is not sufficiently intelligent and open, it is difficult to build a network ecosystem. In this respect, we can see the importance of this point in the field of smartphones. At present, Google Android will become the mainstream operating system for IoV terminal systems. Being born for network applications, it is designed for touch operation, with rich applications, personalized customization, good user experience, and a huge increase in the number of applications, forming a mature network ecosystem.
  • Speech recognition technology—This technology is very mature, which allows drivers to send commands to IoV through their mouths and receive services provided by IoV through their ears. This is most suitable for application in the fast-moving space of vehicles. The “cloud recognition” technology based on server-side technology must be used to solve the storage and computing capacity of vehicles, so as to adapt to the non-fixed command mode of speech recognition technology.
  • Server-side computing and service integration technology—IoV uses cloud computing to plan the driving path of a large number of vehicles, analyze real-time road conditions, diagnose vehicles, and dispatch traffic congestion. IoV implements service innovation and provides value-added services through service integration.
  • Communication and its application technology—IoV mainly depends on two communication technologies: short-distance wireless communication and long-distance mobile communication technologies. In the former, RFID sensors and WIFI-like communication technologies are predominant, while in the latter, GPRS, LTE, 5G and other mobile communication technologies are the main focus. These communication technologies are more concerned with applications, such as automatic toll collection, data packet transmission, video surveillance and so on.
  • Internet technology—IoV can integrate the existing technologies and applications of the Internet and mobile Internet, but it is necessary to develop the characteristic Internet applications of IoV. Only in this way can more commercial benefits be brought to IoV.
On the whole, differences between VANET and IoV are shown in Table 1. IoV takes vehicles as nodes and information sources, and it connects the acquired information to the platform network through wireless communication and other technical means for analysis and management. Its core is information acquisition and feedback control, so as to realize the interconnection in V2X. With the increasing urban traffic congestion and the continuous progress of ITS technology, IoV has good development prospects. Just as PCs enter the Internet and mobile phones enter the mobile Internet, vehicles will surely enter the IoV and will go far.

3. Trust Management in the Internet of Vehicles

Due to the traditional security technology based on authentication and encryption mechanisms, we cannot effectively identify the internal attacks launched by authenticated nodes. Therefore, the trust management mechanism is becoming increasingly favored by scholars. Trust is an abstract concept. At present, there is no precise and widely accepted definition of trust. Different scholars have different understandings and definitions of trust. Gambetta [19] gave the following definition from the sociological point of view: “When we think someone is credible, it implies that we think that the probability that he will take actions beneficial to us in the future is large enough, so we can consider cooperating with him in some way. On the contrary, if we think he can’t be trusted, it means that we think he has a low probability of taking beneficial actions, so we should avoid cooperating with him”. Mayer [20] defined trust as follows: “the trustor is willing to bear the risks brought by trusting the trustor, regardless of whether it monitors or controls the behavior of the trustor, based on the expectation of a certain behavior of the trustor”. Faragazzedin [21] has another definition of trust: “Trust is the belief in an entity, and within a certain period of time, this belief will change with the change of the entity’s behavior”. Alfzabdul-Rahman [22] defined trust as follows: “Trust is a reflection of the probability of an entity performing a certain action. Although the action can’t be monitored and predicted, this reflection will affect the behavioral strategies adopted by people”. Li [23] thought: “Trust is a subjective behavior between entities, and it is a summary judgment based on one’s own experience and observed facts”. Grandison [24] thought: “Trust is the belief of taking certain reliable behavior in a certain context”.

3.1. Classification of Trust

In IoV, trust encompasses direct trust and indirect trust, in which direct trust and indirect trust are relative. As can be seen from Figure 5, when A and B are visible, B and C have direct trust, whereas when A and B are non-visible, B and C have indirect trust. Therefore, there is no absolute link between these two kinds of trust.

3.1.1. Direct Trust (DT)

Direct trust is the cognition formed by the accumulation of direct historical interactions between entities. The degree of trust between the trustor and the trustee is related to the degree of satisfaction with their historical interactions. Through the direct interaction between entities, credibility can be flexibly adjusted to reflect the dynamic change in trust. At present, there are many methods to calculate direct trust. Sarah [25] used the similarity, family and packet delivery ratio; in [26], the quality of received messages and the ability of nodes to disambiguate messages were used, as represented by Equation (1); and in [27], familiarity and package delivery rate were used to calculate direct trust, taking timeliness and interaction frequency as the weight of the trust calculation. Alnasser [28] calculated the trust value by using the forwarding rate of messages in time interval t, as shown in Equation (2); Ga [29] calculated direct trust by Bayesian inference and revised the trust value by penalty factor, as shown in Equation (3); Ji [30] used H ( j , k ) t to represent the legal behavior of node j to node k in a specific time period t; and Mao [31] used inter-vehicle subordinate trust weight and the original trust of the vehicle.
D T R = 1 2 i = 1 n ( M Q u a l i t y × M D R M Q u a l i t y + M D R )
where DTR is the direct trust, M Q u a l i t y is the quality of the received message, and MDR is the message dissemination ratio.
T d ( i , j ) ( t ) = S u c c e s s f u l I n t e r a c t i o n s T o t a l I n t e r a c t i o n s
where Successful–Interactions is the number of successful interactions between nodes, and Total–Interactions is the number of total interactions between nodes.
T R D i j ( N + 1 ) = N s + 1 N s + N f + 1 ( 1 μ ) N f
where N s is successful forwarding times, N f is failed forwarding times, and μ indicates the sensitivity of forwarding failure.

3.1.2. Indirect Trust (IDT)

Indirect trust, also known as recommendation trust, is calculated from the recommendation information of other entities (such as neighbor nodes). Indirect trust indicates that trust has a certain transitivity. When the trustor evaluates the trust, they can not only make a comprehensive calculation based on the direct interaction records but also combine the recommendation information of other entities with the trusted party. Ahmad [26] used positive opinions and negative opinions, as shown in Equation (4). Alnasser [28] first calculated the confidence value between two adjacent nodes; then, they divided all recommendations into positive recommendations and negative recommendations, and finally, they gave different weights to the two recommendations, as shown in Equation (5); Ga [29] used reputation to calculate the indirect trust value, as shown in Equation (6); Ji [30] used a cosine-based similarity metric and trust ratings and then used Resnick’s standard prediction formula to calculate the recommended trust value; and Mao [31] used the role-based trust weight, the trust opinion of neighbors and the original trust of the vehicle;
I T R = [ ( α α + β ) × i = 1 n P o + ( β α + β ) × i = 1 n N o ] n
T i n ( i , j ) ( t ) = α P ( i , j ) ( t ) + β N ( i , j ) ( t )
where P ( i , j ) ( t ) is the average value of the positive recommendations, and N ( i , j ) ( t ) is the average value of the negative recommendations. α and β are the weight of the two of them, respectively.
T R R i j = Σ T R D k j r R
where α and β are the reward and penalty factors, respectively. P o is positive opinions and N o is negative opinions.

3.2. Trust Models

3.2.1. Classification of Trust Models

IoV trust management mainly includes the establishment and evaluation of trust models. According to different evaluation objects, trust models can be divided into three categories, as shown in Figure 6: the entity-based trust model (ETM), the data-based trust model (DTM), and the composite trust model (CTM).
  • Entity-based Trust Model (ETM)
    The purpose of ETM is to evaluate the credibility of vehicle nodes. Usually, a trust evaluation system can be built by using direct or indirect trust between vehicles, and the trust value of each node can be calculated so as to detect untrustworthy vehicles. Hu [30] et al. put forward a trust model based on the feedback data of users’ vehicles and evaluated the credibility of the first vehicle in the vehicle arrangement scenario, so as to help the user’s vehicle to choose a reliable vehicle to follow. In [12], the social attributes of nodes are used, and three social trust relationships, direct neighbor trust, indirect neighbor trust and friend trust, are considered. The trust degree of nodes is calculated by weighted average.
    In [32], the main difficulty of an entity-based trust model maintaining the trust relationship between vehicles lies in how to collect enough information to evaluate the trust degree of nodes, especially when vehicles have just joined VANET. Additionally, when there is not enough interactive information, or there are few connections between vehicles and short communication links, e.g., in suburbs with sparse vehicles, these factors can make it difficult to evaluate trust effectively.
  • Data-based Trust Model (DTM)
    DTM mainly evaluates whether the received data are reliable. The model needs to collect messages from various information sources, such as neighbor nodes and RSU, and filter out untrustworthy data to accurately verify the reliability of the received data. Tahani [11] established a distributed trust mechanism based on a direct experience survey between neighboring vehicles according to VANET’s characteristics. Every vehicle first detects whether the received data are reliable, and then, it distributes the trust value to all of their neighbors. Rawat [24] proposed using the received signal strength (RSS) and the geographic location (GPS) of the vehicle to evaluate the trust level of the received message, combining the Bayesian estimation evaluation algorithm with the determined distance calculation method to provide better evaluation results, thus helping to identify malicious message data.
    The main disadvantage of DTM is that the trust relationship between vehicles can never be formed, and only a short-term trust of the received data can be established. Because data trust is based on events, it is necessary to build the trust relationship for each event again and again, and the previous trust data have not been used. At the same time, when the number of received messages is insufficient, it is difficult to judge the accuracy of the messages.
  • Combined Trust Model (CTM)
    CTM is equivalent to the combination of the above two trust models. This model can not only evaluate the reliability of vehicles but also calculate the reliability of data. Generally, the two trust models are interrelated, that is, the trust value of a node affects the credibility of data to a certain extent, and the trust value of data in turn reflects the credibility of a node. An anti-attack trust management scheme (ART) was proposed by Li [11]: in this system, malicious attacks can be detected and responded, and the credibility of data and mobile nodes in VANET can be evaluated. Data trust evaluation is based on feelings and the data collected by multiple vehicles in two dimensions of node trust evaluation, namely function trust and recommendation trust. Mehmood [33] put forward a cluster-based hybrid VANETs trust management scheme, which can not only classify the information in the cluster but also identify malicious vehicles in real time.
In [34] CTM inherits the advantages and disadvantages of ETM and DTM. It not only needs to build a complete trust relationship between vehicles but also needs to be able to evaluate the credibility of each data point. Compared with the former two trust models, the trust evaluation process is more complicated, and the system overhead will be higher. At the same time, this model also has some limitations, such as sparse data.
The main function of the trust model is to transmit reliable, true, and effective information between V2X. There have been many articles about different trust models, as demonstrated in Table 3. A new context-based trust assessment and management framework was proposed in [19]. The authors tested five parameters of three trust models, EOTM, DOTM, and HTM, in four different contexts, and the four contexts were divided into mobility and attack types. This paper mainly considers the QoS and security of the system, tests some practical evaluation criteria, and uses the actual scenario of OpenStreetMap to set up different scenarios in urban and rural areas. In [35], the authors put forward a task-based experience reputation (TER) framework, in which the fog node is used as the memory to store the updated trust value, and the authors also proposed two reputation-updating methods, which were compared by simulation experiments. Finally, this model was evaluated by using the overhead and workload of information transmission. In [36], the authors developed a quantifiable trust evaluation model based on machine learning. This paper focused on how to use the combination of trust parameters to find the optimal trust boundary so as to distinguish between trusted nodes and untrusted nodes. In [37], the authors put forward a risk-based trust evaluation advanced model (RTEAM). The model integrates risk into the trust model by calculating the possibility of performing incorrect behavior and the impact of such a possibility. This model was evaluated by UND and TPR, and other trust models were compared. In [38], the authors proposed a distributed trust model based on recommendation, which detected non-stable malicious behaviors. The model evaluation used two parameters, PDR and network throughput, which were compared with some existing trust models in the testing process, especially with regard to improving PDR. In [39], the authors put forward a new trust model, REK, which was used to simulate the process of human perception in the SIoT environment.

3.2.2. Trust Parameters

Trust parameters are mainly used to calculate trust values. Many parameters are introduced in the process of trust calculation, and the representative parameters are shown in Table 1. The trust parameters with high utilization rates are similarity, familiarity, confidence, co-location relationship, packet delivery ratio (PDR), Community of Interest (CoI), and so on. Moreover, the same trust parameters can be calculated in different ways. For example, the calculation of Community of Interest (CoI) in [37,48] is as follows:
T C o I t ( O i , O j ) = | C o i | | C o j | | C o i | | C o j |
where C o i and C o j depict the interest group of objects i and j, respectively.
K i j C o I ( t ) = | M i j C o I M i C o I
The authors defined | M i j C o I as the set of communities jointly owned by trustors and trustees, and M i C o I as the set of communities with each including the trustee as a member.
Moreover, confidence has different explanations in different papers, such as in [28,29]:
C ( i , k ) ( t ) = 1 if T d ( i , k ) ( t ) T h C ; 0.8 if T h T T d ( i , k ) ( t ) T h C ; 0 if T ( t ) d ( i , k ) T h T .
where T h C is the confidence threshold, and T h T is the trust threshold.
γ = T R D i j ϵ T R D i j + ϵ p s N 1 ( 1 p ) p f N 1 d p 0 1 p s N 1 ( 1 p ) p f N 1 d p
where ( T R D i j ϵ , T R D i j + ϵ ) is the confidence interval. The authors used Bayesian inference to calculate the confidence value.
  • Co-Location Relationship (CLR)—The concept of CLR is that when the trustee and the trustor are very close to each other, the trustor can easily obtain the information needed from the selected trustee, because from the perspective of position, the trustee is more reliable than other objects that are far away.
    The decision boundary is set according to the distance from the trustor in order to avoid the vehicle leaving the predetermined physical location, as demonstrated in [37], which gathered many parameters such as CWR, RS, CoI, MC, etc., and used the machine learning algorithm to find an optimal boundary to distinguish between trusted and untrusted nodes.
  • Co-work Relationship (CWR)—CWR describes the interaction between nodes that are service-dependent rather than physically adjacent. It is the association that one node possesses with another when providing a service, and it can be calculated by multicast interaction. This association represents the relative amount of shared multicast messages in relation to the total messages sent [37].
  • Rewards—This parameter is used to evaluate the historical rewards between the trustee and the trustor. The more reasonable the interactions, the higher the reward value. This parameter can track the misbehavior of the trustee and view their history, so that the trustor can determine whether to have further communication with the trustee [37]. In [41,49], using joint deep learning to evaluate the degree of trust between users and task assignors, the author designed a layered incentive mechanism to realize reasonable and fair rewards and punishments, which improved the accuracy of trust evaluation.
  • Community of Interest (CoI)—CoI represents the social status of the trustee and describes whether there is a close relationship between the trustor and the trustee in the social network. This parameter indicates the degree of mutual interest between the trustee and trustor. In general, the higher the CoI between the two nodes, the better the interaction between them and the more trustworthy they are deemed to be [37]. In [48], the authors calculated the community-based trust characteristics of the trustee relative to the trustor at time t.
  • Mutuality and Centrality (MC)—MC represents the position of the trustee relative to the trustor in the network. The larger the MC is, the more similar the social relationship between them, the more interactions between them, and the higher the degree of trust [37].
  • Confidence—Confidence indicates the accuracy of the probability estimate. It can save network resources when the credibility of direct trust is greater than the set threshold, and a node is considered as a trusted node without calculating the recommended credibility [29].
  • Packet Delivery Ratio (PDR)—PDR refers to the contact degree between the trustee and the principal, which is generally defined as the packet forwarding rate between nodes. PDR is generally considered a very important parameter in establishing a trust model, calculating the trust value and identifying malicious vehicles [26,50,51].
  • Similarity—This parameter is used to measure the similarity in content and service between any two vehicles. Generally expressed as the Euclidean distance, the authors of [31] used the concept of similarity to calculate the similarity between the vehicle information in the infrastructure trust table and the information sent to the vehicle.
  • Familiarity—Familiarity indicates the familiarity between the trustor and the trustee, which is a parameter with a high utilization rate. This parameter is used to measure the interaction frequency between the trustee and the trustor. The higher the interaction frequency, the more information can be obtained from the other party, and the more favorable it is to gain higher trust [25].
  • End-to-End Delay (E2ED)—This parameter is related to the QoS of trust management, which describes the total delay caused by sharing data packets generated by legitimate vehicles with neighboring vehicles. Of course, the smaller the value of E2ED, the more reasonably the trust mechanism is designed [41].

3.2.3. Evaluation of Trust Models

There are two important steps in trust management: establishing a trust model and evaluating the trust model. The above discussion introduced the existing trust model in detail, and trust evaluation is also a crucial step. Up to now, most papers have used evaluation parameters to evaluate trust models; specific evaluation parameters are shown in Table 4. In general, trust evaluation parameters include: precision (P), recall (R), F-score (F), accuracy (A), TPR, TNR, FPR, FNR, etc., which are mainly used to evaluate whether the established trust model is feasible. For example, using the combination of multiple parameters to evaluate the model [52], this paper proposed a novel trust model: NOTRINO. In order to evaluate the trust model, the authors verified three parameters under several different attacks: precision, recall, and F-score. By comparison, the three parameters of this model reached the highest values, which shows that this trust model was feasible and can be used to detect malicious attacks and ensure the safety of the IoV. In [47], the authors proposed a hierarchical hybrid trust management model (HHTM). In this model, three trust values need to be calculated and then mixed according to different weights. Three parameters are also used to evaluate the accuracy of the HHTM scheme: P, R, and F. The experimental results show that with the increase in the number of nodes, these three parameters all increased, and their values were higher than those of the basic model.
Every established trust model is evaluated in various ways. To date, there have been few evaluations of the network, with most of the existing papers failing to achieve this. Nevertheless, the network is very important to the trust management mechanism, so network evaluation is the next topic that we should focus on.

3.2.4. Trust Model Simulation Method

The evaluation of the trust model in VANET mostly adopts simulation methods. Specifically, most of these suggestions use the NS-2 simulator [42]. Additionally, some proposals adopt other existing simulation tools, such as GloMoSim 2.03 [11], Matlab [12,27,38,57,58], and Veins [36,46,54,55,59,60]. In addition, some papers have used C++ or Java programming languages for simulation. Table 2 summarizes the simulation tools in detail. Of course, in some papers, the trust model is not evaluated by simulation but only by theoretical analysis and discussion. For example, in [41], the author proposed a global trust-building scheme based on reputation (RGTEs). This scheme introduces a solution to realize the secure sharing of trust information in VANET by using statistical rules, which makes it more efficient and accurate for VANET to build trust in a rapidly changing environment. In addition, according to the real-time reputation of the network, the author used a dynamic threshold to detect malicious nodes. Many previous studies only used hypothetical methods in the simulation stage, and the trust model was not evaluated in the real car networking environment, which are limitations that we should improve upon in the future.

3.3. Categories of Attacks

Due to the particularity of the IoV’s environment and the lack of infrastructure, it is vulnerable to a large number of attacks, especially smart malicious attacks, which are often difficult to detect, because such malicious attacks switch back and forth between trusted and untrusted. Hence, we need to design a trust model with better accuracy and use various flexible and effective detection methods. Different trust models can detect different attack types, but the attack types in the system may change at any time, and the fixed trust model may not be detected; details are shown in Table 5. Designing a trust model that can detect any attack type is therefore also a challenge that we need to solve in the future. Trust-based attacks are classified as follows:
  • Bad-mouthing attack and Good-mouthing attack
    Attackers attempt to send fake trust messages to frame legitimate nodes so that they are not detected. Hence, the purpose of this attack is to undermine the proper trust assessment and make malicious attacks hard to identify. In [41], the authors proposed a trust mechanism based on evidence combination, which can resist bad-mouthing attacks. The precision and recall were still higher than 80% under bad-mouthing attack. Compared with bad-mouthing attacks, good-mouthing attacks send positive recommendations about malicious nodes.
  • Selective Misbehavior Attack
    During a selective misbehavior attack, malicious nodes only provide false messages to some nodes, which is normal for other nodes, which will lead to inconsistent trust among different nodes that is difficult to detect. During a time-dependent attack, the behavior of nodes changes with time and is not fixed. In [41], three types of attacks were detected: bad-mouthing attacks, selective misbehavior attacks, and time-dependent attacks.
  • Time-varying Attack
    During a time-varying attack, the behavior of nodes changes with time and is not fixed. Initially, an attacker would establish itself as a legitimate node for a short period of time, gain the trust of other vehicles, and then launch an attack, sharing malicious messages and ratings with neighboring vehicles. In [47], the authors detected this kind of attack.
  • Zig-Zag Attack (On-and-off Attack)
    During a zig-zag attack, also known as the “on-and-off” attack, malicious nodes attack randomly. At first, these nodes are normal, and when they gain enough trust values, they launch malicious attacks, which are difficult to detect. In [52], the authors proposed an effective attack detection model, which mainly detected man-in-the-middle (MITM) attacks and zig-zag attacks as well as a combination of the two attacks.
  • Self-promoting Attack
    Unlike other types of malicious attacks, selfish attacks gain their own benefits from attacks, which indicates that there is little cooperation between vehicles. For example, in [55], the authors proposed an incentive technology to prevent such attacks.
  • Whitewashing Attack/Newcomer Attack
    During a whitewashing attack, a node has a bad history before entering the system, but after re-entering the system, the node adopts a new identity in order to gain more trust and erase its dark history. In order to resist such attacks, in [31], new nodes were given a relatively low trust value, and an adaptive attenuation factor was also introduced so that the trust value of newcomers could reach a relatively high value over a long period of time.

4. Open Research Directions

Whilst a considerable amount of research has been published over the past couple of years, illustrating the various facets of trust management vehicular networks, there are substantial challenges that demand immediate attention before the promising paradigm of trust can be embedded for strengthening the resilience of the IoV networks. Accordingly, some of these research challenges are delineated as follows:

4.1. Threshold Setting

The purpose of trust management is to divide the vehicles in the system into the categories of trustworthy and untrustworthy, so it is usually necessary to set a trust threshold. Those above the trust threshold are trusted nodes; otherwise, they are malicious nodes. Thus, to improve accuracy, it is extremely important to set a threshold. Either too high or too low a threshold will threaten the security of the system. However, the thresholds in the existing literature are all steady, but the vehicle network is a dynamic system, and it is necessary to set an adaptive threshold. The threshold value can be adjusted in real time with the number of vehicles, environment, and other factors.

4.2. Data Collection

IoV has a highly dynamic topology, and the calculation of trust is closely related to the historical interaction between vehicles. For example, in rural areas, there are fewer vehicles and less interaction between them, which is unfavorable for calculating the trust value. Therefore, it is necessary to establish a trust mechanism that can adapt to any vehicle environment, such as setting a dynamic data collection speed and collection range, reducing the collection speed and range for crowded cities, and increasing the collection speed and range for suburbs with few vehicles.

4.3. Standards Introduction

In [64,65], the authors raised concerns about standards of trust, but most articles do not mention such standards, especially in cloud computing and fog computing, e.g., in [66,67]. There is a need to establish trust standards to improve the security of trust models, especially evaluation standards. In particular, the detection of smart attacks according to evaluation standards, which can endanger the security of the whole system, is a basic key problem that needs to be solved.

4.4. Trust Computing Validation

Trust calculation is a very important part of trust assessment. First, the trust value is calculated, and then, it is compared with the threshold value to determine the malicious nodes. However, existing papers have not yet reviewed the calculated trust value nor how to cancel the calculated trust value when it is wrong, therefore making this another urgent problem to be solved.

4.5. Community Formation

In the future, the IoV could form a community of independent isolated vehicles through the IoT. Typically, an object in IoT collaborates with at least one community. The same can happen with the IoV. Similarly, if the trustee and the trustor are in the same community and have the same interest group, the extent and similarity of the trustee’s and the trustor’s common interest can be indicated, which is convenient for research and can save resources.

4.6. Integration of Blockchain and IoV

Blockchains can provide a large number of innovative solutions in most IoV application scenarios. In most IoV scenarios, many data are generated and exchanged. There are many classical technologies that cannot be effectively applied to IoV scenarios. In addition, in this scenario, increasing communication connections may cause security holes. Another aspect is that the introduction of blockchain in the IoV not only improves trust, security, and privacy but also improves system performance and automation. Therefore, in this scenario, the powerful technology of blockchain should be used to improve the flexibility of the system and the ability to process a large amount of data. However, as blockchain research is still in its infancy, not only is it complex to analyze, but there are still many issues to be solved, relating to regulatory and legal concerns, performance, limited storage, security and privacy, optimized consensus, and incentive mechanisms [68].

5. Conclusions

The Internet of Vehicles is an important component of the smart cities and intelligent transportation that countries around the world are presently striving to develop. The IoV is a system integrating people, vehicles, things, and ambients, which links all kinds of information from inside the vehicles, outside the vehicles, and the environment to form a broad and intelligent network system. This paper focused on the reasons for the transition from VANET to IoV, the existing trust management models and parameters, and the analysis of the key problems to be solved in the future of IoV, laying a foundation for future research. To sum up, this paper provided some guidance for the future study of trust management mechanisms in IoV.

Author Contributions

Conceptualization, Y.W., H.Z., M.F.M.S., X.W. and L.C.K.; investigation, Y.W. and X.W.; methodology, Y.W. and H.Z.; validation, Y.W. and H.Z.; writing—original draft preparation, Y.W. and H.Z.; writing—review and editing, Y.W., H.Z. and X.W.; supervision, H.Z., M.F.M.S., X.W. and L.C.K. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Informed Consent Statement

Informed consent was obtained from all subjects involved in the study.

Data Availability Statement

Not applicable.

Acknowledgments

Wang Yingxun’s research work is funded by the Universiti Malaysia Sarawak, Malaysia (UNIMAS) and the Qilu Institute of Technology, Shandong, China. The authors, therefore, acknowledge the UNIMAS and the Qilu Institute of Technology for generously sponsoring the research at hand.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Storck, C.R.; Duarte-Figueiredo, F. A 5G V2X Ecosystem Providing Internet of Vehicles. Sensors 2019, 19, 550. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  2. Osibo, B.K.; Zhang, C.; Xia, C.; Zhao, G.; Jin, Z. Security and Privacy in 5G Internet of Vehicles (IoV) Environment. J. Internet Things 2021, 3, 77. [Google Scholar] [CrossRef]
  3. Wang, S.; Sun, S.; Wang, X.; Ning, Z.; Rodrigues, J.J.P.C. Secure Crowdsensing in 5G Internet of Vehicles: When Deep Reinforcement Learning Meets Blockchain. IEEE Consum. Electron. Mag. 2021, 10, 72–81. [Google Scholar] [CrossRef]
  4. Kamvar, S.D.; Schlosser, M.T.; Garcia-Molina, H. The eigentrust algorithm for reputation management in p2p networks. In Proceedings of the 12th Internatonal Conference on World Wide Web, Budapest, Hungary, 20–24 May 2003; Assciation for Computing Machinery: New York, NY, USA, 2003. [Google Scholar]
  5. Blaze, M.; Feigenbaum, J.; Lacy, J. Decentralized trust management. In Proceedings of the 1996 IEEE Symposium on Security and Privacy, Oakland, CA, USA, 6–8 May 1996; pp. 164–173. [Google Scholar]
  6. Cauteruccio, F.; Cinelli, L.; Fortino, G.; Savaglio, C.; Terracina, G.; Ursino, D.; Virgili, L. An approach to compute the scope of a social object in a Multi-IoT scenario. Pervasive Mob. Comput. 2020, 67, 101223. [Google Scholar] [CrossRef]
  7. Zhou, R.H.; Wang, K. Powertrust: A robust and scalable reputation system for trusted peer-to-peer computing. IEEE Trans. Parallel Distrubuted Syst. 2007, 18, 460–473. [Google Scholar] [CrossRef]
  8. Xiong, L.; Liu, L. Peertrust:Supporting reputation-based trust for peer-peer electronic communitities. IEEE Trans. Knowl. Data Eng. 2004, 16, 843–857. [Google Scholar] [CrossRef]
  9. Srinvtsa, M.; Xiong, L.; Liu, L. TrustGuard:countering vulnerabilities in reputation mangement for decentralized overlay networks. In Proceedings of the 14th International Conference on World Wide Web, Chiba, Japan, 10–14 May 2005; Association for Computing Machinery: New York, NY, USA, 2005. [Google Scholar]
  10. Tan, S.; Li, X.; Dong, Q. A trust management system for securing data plane of ad-hoc networks. IEEE Trans. Veh. Technol. 2015, 65, 7579–7592. [Google Scholar] [CrossRef]
  11. Li, W.; Song, H. ART: An attack-resistant trust management scheme for securing vehicular ad hoc networks. IEEE Trans. Parallel Distrubuted Syst. 2015, 17, 960–969. [Google Scholar] [CrossRef]
  12. Hu, H.; Lu, R.; Zhang, Z.; Shao, J. REPLACE: A reliable trust-based platoon service recommendation scheme in VANET. IEEE Trans. Veh. Technol. 2016, 66, 1786–1797. [Google Scholar] [CrossRef]
  13. Soleymani, S.A.; Abdullah, A.H.; Zareei, M.; Anisi, M.H.; Mohammad, H.; Vargas-Rosales, C.; Khan, M.K.; Goudarzi, S. A secure trust model based on fuzzy logic in vehicular ad hoc networks with fog computing. IEEE Accesss 2017, 5, 15619–15629. [Google Scholar] [CrossRef]
  14. Lin, B.; Chen, X.; Wang, L. A cloud-based trust evaluation scheme using a vehicular social Network enviroment. In Proceedings of the 2017 24th Asia-Pacific Software Engineering Conference (APSEC), Nanjing, China, 4–8 December 2017. [Google Scholar]
  15. Kerrache, C.A.; Lagraa, N.; Calafate, C.T.; Lakas, A. TFDD: A trust-based framework for reliable data delivery and DoS defense in VANETs. Veh. Commun. 2017, 9, 254–267. [Google Scholar] [CrossRef] [Green Version]
  16. Xiao, Y.; Liu, Y. Bayestrust and vehiclerank: Constructing an implicit web of trust in vanet. IEEE Trans. Veh. Technol. 2019, 68, 2850–2864. [Google Scholar] [CrossRef]
  17. Barka, E.; Kerrache, C.A.; Benkraouda, H.; Shuaib, K.; Ahmad, F.; Kurugollu, F. Towards a trusted unmanned aerial system using blockchain for the protection of critical infrastructure. Trans. Emerg. Telecommun. Technol. 2019, e3706. [Google Scholar] [CrossRef]
  18. Gambetta, D. Can we trust. In Trust: Making and Breaking Cooperative Relations; Blackwell Pub: Hoboken, NJ, USA, 2000; Volume 13, pp. 213–237. [Google Scholar]
  19. Mayer, R.C.; Davis, J.H.; Schoorman, F.D. An integrative model of organizational trust. Acad. Manag. Rev. 1995, 20, 709–734. [Google Scholar] [CrossRef]
  20. Azzedin, F.; Maheswaran, M. Evolving and managing trust in grid computing systems. In Proceedings of the IEEE CCECE2002, Canadian Conference on Electrical and Computer Engineering, Conference Proceeding, Winnipeg, MB, Canada, 12–15 May 2002. [Google Scholar]
  21. Abdul, R.A.; Hailes, S. Supporting trust in virtual communities. In Proceedings of the 33rd annual Hawaii International Conference on System Sciences, Maui, HI, USA, 7 January 2000. [Google Scholar]
  22. Li, X.; Gui, X. Research on dynamic trust model in large-scale distributed environment. J. Softw. 2007, 2007, 1510–1521. [Google Scholar] [CrossRef]
  23. Grandison, T.W.A. Trust Management for Internet Applications; University of London: London, UK, 2003. [Google Scholar]
  24. Rawat, D.B.; Yan, G.; Bista, B.B.; Weigle, M.C. Trust On the Security of Wireless Vehicular Ad-hoc Networking. Ad Hoc Sens. Wirel. Networks 2015, 24, 283–305. [Google Scholar]
  25. Siddiqui, S.; Mahmood, A.; Zhang, W.; Sheng, Q. Machine learning based trust model for misbehaviour detection in internet-of-vehicles. Commun. Comput. Inf. Sci. 2019, 1142, 512–520. [Google Scholar] [CrossRef]
  26. Ahmad, F.; Kurugollu, F.; Adnane, A.; Hussain, R.; Hussain, F. MARINE: Man-in-the-middle Attack Resistant trust model IN connEcted vehicles. IEEE Internet Things 2021, 7, 3310–3322. [Google Scholar] [CrossRef] [Green Version]
  27. Siddiqui, S.A.; Mahmood, A.; Sheng, Q.Z.; Suzuki, H.; Ni, W. A Time-aware Trust Management Heuristic for the Internet of Vehicles. In Proceedings of the 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Shenyang, China, 20–22 October 2021; pp. 1–8. [Google Scholar]
  28. Alnasser, A.; Sun, H.; Jiang, J. Recommendation-based Trust Model for Vehicle-to-Everything (V2X). IEEE Internet Things J. 2020, 7, 440–450. [Google Scholar] [CrossRef] [Green Version]
  29. Gao, H.H.; Liu, C.; Yin, Y.; Xu, Y.; Li, Y. A Hybrid Approach to Trust Node Assessment and Management for VANETs Cooperative Data Communication: Historical Interaction Perspective. IEEE Trans. Intell. Transp. Syst. 2021. [Google Scholar] [CrossRef]
  30. Chen, J.M.; Li, T.T.; Panneerselvam, J. TMEC: A Trust Management Based on Evidence Combination on Attack-Resistant and Collaborative Internet of Vehicles. IEEE Access 2019, 7, 148913–148922. [Google Scholar] [CrossRef]
  31. Mao, M.; Yi, P.; Hu, T.; Zhang, Z.; Lu, X.; Lei, J. Hierarchical Hybrid Trust Management Scheme in SDN-Enabled VANETs. Mob. Inf. Syst. 2021, 2021, 7611619. [Google Scholar] [CrossRef]
  32. Mahmood, A.; Sheng, Q.Z.; Siddiqui, S.A.; Sagar, S. When Trust Meets the Internet of Vehicles: Opportunities, Challenges, and Future Prospects. In Proceedings of the 2021 IEEE 7th International Conference on Collaboration and Internet Computing CIC, Atlanta, GA, USA, 13–15 December 2021. [Google Scholar]
  33. Mahmood, A.; Butler, B.; Zhang, W.E.; Sheng, Q.Z.; Siddiqui, S.A. A Hybrid Trust Management Heuristic for VANETs. In Proceedings of the PerVehicle’19—1st International Workshop on Pervasive Computing for Vehicular Systems, Kyoto, Japan, 11–15 March 2019. [Google Scholar]
  34. Liu, Z.; Ma, J.; Jiang, Z.; Zhu, H.; Miao, Y. LSOT: A Lightweight Self-Organized Trust Model in VANETs. Mob. Inf. Syst. 2016, 2016, 7628231. [Google Scholar] [CrossRef] [Green Version]
  35. Ahmad, F.; FVirginia, N.L.; Adnane, A. TEAM: A Trust Evaluation and Managemen Framework in Context-Enabled Vehicular Ad-Hoc Network. Digit. Object Identifier 2018, 28643–28660. [Google Scholar] [CrossRef]
  36. Jamal, R.; Flocchini, A.; Nayak, A. A Fog-based Reputation Evaluation Model for VANETs. In Proceedings of the 2021 International Symposium on Networks, Computers and Communications (ISNCC), Dubai, United Arab Emirates, 31 October 2021–2 November 2021. [Google Scholar]
  37. Jayasinghe, U.; Lee, G.M.; Um, T.W. Machine Learning Based Trust Computational Model for IoT Services. IEEE Trans. Sustain. Comput. 2019, 4, 39–52. [Google Scholar] [CrossRef]
  38. Jamal, R.; Flocchini, A.; Nayak, A. RTEAM: Risk-Based Trust Evaluation Advanced Model for VANETs. Digit. Object Identifier 2021, 4, 39–52. [Google Scholar]
  39. Sugumar, R.; Rengarajan, A.; Jayakumar, C. Trust based authentication technique for cluster based vehicular ad hoc networks (VANET). Wirel. Netw. 2018, 24, 373–382. [Google Scholar] [CrossRef]
  40. Siddiqui, S.A.; Mahmood, A.; Sheng, Q.Z.; Suzuki, H.; Ni, W. A Survey of Trust Management in the Internet of Vehicles. Electronics 2021, 10, 2223. [Google Scholar] [CrossRef]
  41. Wang, X.D.; Garg, S.; Lin, H.; Kaddoum, G.; Hu, J.; Hassan, M.M. Heterogeneous Blockchain and AI-Driven Hierarchical Trust Evaluation for 5G-Enabled Intelligent Transportation Systems. IEEE Trans. Intell. Transp. Syst. 2021. [Google Scholar] [CrossRef]
  42. Fabi, A.K.; Thampi, S.M. A psychology-inspired trust model for emergency message transmission on the Internet of Vehicles (IoV). Int. J. Comput. Appl. 2020, 44, 480–490. [Google Scholar] [CrossRef]
  43. Truong, N.B.; Um, T.; Zhou, B.; Lee, G.M. From Personal Experience to Global Reputation for Trust Evaluation in the Social Internet of Things. In Proceedings of the GLOBECOM 2017—2017 IEEE Global Communications Conference, Singapore, 4–8 December 2017. [Google Scholar]
  44. Mahmood, A.; Zhang, W.E.; Sheng, Q.Z. Software-Defined Heterogeneous Vehicular Networking: The Architectural Design and Open Challenges. Future Internet 2019, 11, 70. [Google Scholar] [CrossRef] [Green Version]
  45. Oubabas, S.; Aoudjit, R.; Rodrigues, J.J.; Talbi, S. Secure and stable vehicular ad hoc network clustering algorithm based on hybrid mobility similarities and trust management scheme. Veh. Commun. 2018, 13, 128–138. [Google Scholar] [CrossRef]
  46. Abdo, I.; Shaikh, R.A.; Hassan, S.R. A hybrid dual-mode trust management scheme for vehicular networks. Int. J. Distrib. Sens. Networks 2020, 16, 1550147720939372. [Google Scholar]
  47. Ahmad, F.; Kurugollu, F.; Kerrache, C.A.; Sezer, S.; Liu, L. NOTRINO: A NOvel hybrid TRust management scheme for Internet-of-vehicles. IEEE Trans. Veh. Technol. 2021, 70, 9244–9257. [Google Scholar] [CrossRef]
  48. Sagar, S.; Sheng, A.M.M.; Zaib, M.; Zhang, W. Towards a Machine Learning-driven Trust Evaluation Model for Social Internet of Things: A Time-aware Approach. Health Pervasive Comput. Technol. Healthc. 2020, 283–290. [Google Scholar] [CrossRef]
  49. Mahmood, A.; Siddiqui, S.A.; Sheng, Q.Z.; Zhang, W.E.; Suzuki, H.; Ni, W. Trust on wheels: Towards secure and resource efficient IoV networks. Computing 2022, 104, 1337–1358. [Google Scholar] [CrossRef]
  50. Wang, D.; Chen, X.; Wu, H.; Yu, R.; Zhao, Y. A Blockchain-Based Vehicle-Trust Management Framework Under a Crowd-sourcing Environment. In Proceedings of the 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Guangzhou, China, 29 December 2020–1 January 2021; pp. 1950–1955. [Google Scholar]
  51. Yu, Y.; Jia, Z.; Tao, W.; Xue, B.; Lee, C. An Efficient Trust Evaluation Scheme for Node Behavior Detection in the Internet of Things. Wirel. Pers. Commun. 2017, 93, 571–587. [Google Scholar] [CrossRef]
  52. Satyananda, E.H. A Trust Management Scheme for Securing Transport Networks. Int. J. Comput. Appl. 2017, 180, 38–42. [Google Scholar]
  53. Fabi, A.K.; Thampi, S.M. A trust management framework using forest fire model to propagate emergency messages in the Internet of Vehicles (IoV). Veh. Commun. 2022, 33, 100404. [Google Scholar] [CrossRef]
  54. Bangui, H.; Ge, M.; Buhnova, B. A hybrid machine learning model for intrusion detection in VANET. Computing 2021, 104, 503–531. [Google Scholar] [CrossRef]
  55. Zhang, J.; Zheng, K.; Zhang, D.; Yan, B. AATMS: An Anti-Attack Trust Management Scheme in VANET. Digit. Object Identifier 2020, 8, 21077–21090. [Google Scholar] [CrossRef]
  56. Lai, C.Z.; Du, Y.Y.; Guo, Q.L.; Zheng, D. A trust-based privacy-preserving friend matching scheme in social Internet of Vehicles. Peer-to-Peer Netw. Appl. 2021, 14, 2011–2025. [Google Scholar] [CrossRef]
  57. Li, X.; Liu, J.; Li, X.; Sun, W. RGTE: A reputation-based global trust establishment in VANETs. In Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, Xi’an, China, 9–11 September 2013; pp. 210–214. [Google Scholar]
  58. Patel, P.; Jhaveri, R. A Honeypot Scheme to Detect Selfish Vehicles in Vehicular Ad-hoc Network. In Computing and Network Sustainability, Proceedings of the International Research Symposium on Computing and Network Sustainability (IRSCNS); Springer: Panaji, India, 2016; Volume 7, pp. 1–2. [Google Scholar]
  59. Hamdan, S.; Hudaib, A.; Awajan, A. Detecting Sybil attacks in vehicular ad hoc networks. Int. J. Parallel Emergent Distrib. Syst. 2019, 36, 69–79. [Google Scholar] [CrossRef] [Green Version]
  60. Butler, J.K. Toward understanding and measuring conditions of trust: Evolution of a conditions of trust inventory. J. Manag. 1991, 17, 643–663. [Google Scholar] [CrossRef]
  61. Xia, H.; Xiao, F.; Zhang, S.S.; Hu, C.Q.; Cheng, X.Z. Trustworthiness Inference Framework in the Social Internet of Things: A Context-Aware Approach. In Proceedings of the IEEE INFOCOM 2019—IEEE Conference on Computer Communications, Paris, France, 29 April–2 May 2019. [Google Scholar]
  62. Chen, I.R.; Bao, F.; Guo, J. Trust-based Service Management for Social Internet of Things Systems. IEEE Trans. Dependable Secur. Comput. 2016, 13, 684–696. [Google Scholar] [CrossRef] [Green Version]
  63. Kerrache, C.A.; Calafate, C.T.; Cano, J.-C.; Lagraa, N.; Manzoni, P. Trust Management for Vehicular Networks: An Adversary-Oriented Overview. IEEE Access 2016, 4, 9293–9307. [Google Scholar] [CrossRef]
  64. Hasrouny, H.; Samhat, A.E.; Bassil, C.; Laouiti, A. VANet security challenges and solutions: A survey. Veh. Commun. 2017, 7, 7–20. [Google Scholar] [CrossRef]
  65. Overview of trust provisioning for information and communication technology infrastructures and services. ITU-T Recommendation. 2017. Available online: https://www.itu.int/rec/T-REC-Y.3052-201703-I/en (accessed on 24 May 2022).
  66. Tufail, A.; Namoun, A.; Sen, A.A.A.; Kim, K.-H.; Alrehaili, A.; Ali, A. Moisture Computing-Based Internet of Vehicles (IoV) Architecture for Smart Cities. Sensors 2021, 21, 3785. [Google Scholar] [CrossRef]
  67. Xu, X.; Gu, R.; Dai, F.; Qi, L.; Wan, S. Multi-objective computation offloading for Internet of Vehicles in cloud-edge computing. Wirel. Netw. 2020, 26, 1611–1629. [Google Scholar] [CrossRef]
  68. Kapassa, E.; Themistocleous, M.; Christodoulou, K.; Iosif, E. Blockchain Application in Internet of Vehicles: Challenges, Contributions and Current Limitations. Future Internet 2021, 13, 313. [Google Scholar] [CrossRef]
Figure 1. The relationship between the VANET and the Internet.
Figure 1. The relationship between the VANET and the Internet.
Futureinternet 14 00202 g001
Figure 2. C-V2X schematic.
Figure 2. C-V2X schematic.
Futureinternet 14 00202 g002
Figure 3. Evolution history of the VANET.
Figure 3. Evolution history of the VANET.
Futureinternet 14 00202 g003
Figure 4. IoV system’s “End Management Cloud” three-layer system.
Figure 4. IoV system’s “End Management Cloud” three-layer system.
Futureinternet 14 00202 g004
Figure 5. Classification of trust.
Figure 5. Classification of trust.
Futureinternet 14 00202 g005
Figure 6. Classification of trust models.
Figure 6. Classification of trust models.
Futureinternet 14 00202 g006
Table 1. Three domains of VANET.
Table 1. Three domains of VANET.
DomainFunction
In-Vehicle DomainCommunication between the OBU and application units (AUs) within the vehicle. AU can be a specific device, such as a mobile phone, or a virtual module integrated into an OBU. The connection can be wired or wireless, such as WiFi or Bluetooth.
Ad Hoc DomainThe wireless communication between OBUs and RSUs can be single-hop or multi-hop, namely V2V and V2R.
Infrastructure DomainOBU and RSU communicate with infrastructure components, such as satellite, hot spot, and 5G, to access the Internet. For RSUs, the connection can be wired.
Table 2. Architecture of IoV.
Table 2. Architecture of IoV.
LayerFunction
EndThe end system is mainly used to collect and obtain relevant information about the vehicle, and it can sense the current driving state of the vehicle and the surrounding environment, which represents the intelligent sensing system of the vehicle. Moreover, it is also a ubiquitous communication terminal, just like V2X communication. Meanwhile, it is also a device that can identify the network credibly and enable the vehicle to have an addressing sum.
ManagementThis layer is used to solve the interconnection between V2X, realize the communication between vehicles and various heterogeneous networks, and ensure the serviceability, real-time performance and network universality from the aspects of function and performance. In the meantime, it unifies the private network and the public network.
CloudIoV is a cloud-based information platform, including ITS, logistics, mobile Internet, auto repair and auto parts, vehicle management, vehicle rental, insurance, vehicle management of enterprises and institutions, automobile manufacturers, emergency rescue, etc. The aggregation of multi-source mass information requires cloud computing functions such as mass storage, security authentication, virtualization and real-time interaction.
Table 3. A comparison of the existing state-of-the-art models.
Table 3. A comparison of the existing state-of-the-art models.
No.Trust ParametersContributions
[25]Similarity (SMR), familiarity (FMR), packet delivery ratio (PDR)Five algorithms in machine learning were used to analyze similarity, familiarity, and packet delivery ratio.
[28]Confidence, interactionsThis paper proposed a V2X communication trust model based on a recommendation to resist internal attacks.
[29]Confidence, time sliding window, and time decay functionThe author proposed a trust evaluation and management model based on the perspective of historical interaction.
[30]Detection rateEvidence combination-based collaborative trust management scheme against attacks.
[31]Inter-vehicular subjective trust weight, role-based trust weight, original trust of vehicle, neighbor trust calculationMulti-level Hybrid Trust Management Model (HHTM).
[40]Resource availability, trust scoreThe author proposed a cluster-based hybrid VANETs trust management scheme.
[35]Location, time closeness, information quality, confidenceContext-based trust assessment and management framework.
[36]RewardTask-based experience reputation (TER) framework.
[37]Co-location relationship, co-work relationship, frequency and duration, cooperativeness, reward system, mutuality and centrality, community of interestA quantifiable trust evaluation mechanism based on machine learning.
[38]Likelihood, impactRisk-based trust evaluation advanced model (RTEAM).
[41]Reward, lossA heterogeneous blockchain-based Hierarchical Trust Evaluation strategy.
[42]Attitude (AT), subjective norms (SN), perceived behavioral control (PBC)The author put forward a trust evaluation model based on human psychology.
[43]Development, loss, decayAn integrated trust model, called REK, takes the third party’s opinion, experience and direct observation as three trust indicators.
[44]Friendship similarity, cooperativeness, co-work similarity, Community of InterestThe author proposed a time-aware trust model that utilizes social relationships.
[45]Cooperation, freshness of dataHybrid trust management mechanism based on communication and data.
[46]Source’s location, event location, rvent timeThe author proposed a trust management scheme based on a crediting technique in MATLAB.
[47]Information quality, role-oriented trust, effective distanceHybrid trust management (NCT and DCT).
Table 4. Existing evaluation parameters and simulation methods.
Table 4. Existing evaluation parameters and simulation methods.
No.Evaluation ParametersSimulation Tools
[11]Precision(P), recall (R), communication overheadGloMoSim 2.03.
[27]FMR (familiarity), PDRCRAWDAD dataset. MATLAB.
[28]Recommendation usage rate, FNR, prediction rateUndefined.
[29]Influence of node behavior on direct trust value, influence of the integration of direct trust and recommended trust on PDR, influence of the time sliding window and time decay, function on the direct trust valueMobile model.
[30]Precision and recallNS2.
[31]Performance quality level (PQL), feedback accuracy level (FAL)MATLAB.
[35]End-to-end delay (E2ED), event detection probability (EDP), anomaly ratio (AR), FPR, trusted and untrusted packetsVeins.
[36]FPR, TPR, precision, recallNetwork Simulator 2.35 (NS 2.35), the Open Street Map (OSM) database.
[37]FPR, TNRSIGCOMM-2009 conference, which is available in CRAWDAD.
[38]Undefined cases (UND), true positive rate (TPR)MATLAB.
[53]TPR, FPR, trust computation errorNS 2.35.
[54]Accuracy, recall, precision, F1-measureCICIDS2017 dataset MATLAB R2019a on Windows 10 (random forest and coresets models).
[45]The rate of untrust packets, the rate of trust packets, packet delivery ratioNetwork Simulator Omnet ++ and Veins (Vehicle in Network).
[46]Travel time, accuracy, CO2 emissions, communication overheadVeins.
[55]Pairwise orderedness, threshold of trust value, TPR, TNRVeins.
[56]Precision, recall, F1-scoreCRAWDAD dataset.
Table 5. Main existing attacks.
Table 5. Main existing attacks.
No.Attack Types
[11]Simple attack (SA), bad-mouthing attack (BMA), zig-zag (on-and-off) attack (ZA).
[28]Blackhole attackers, grayhole attackers.
[30]Bad-mouthing attacks, time-dependent attacks, selective misbehavior attacks.
[41]Task attack, privacy leakage attack.
[47]Man-in-the-Middle (MiTM) attacks, zig-zag attacks.
[55]On-and-off attack, newcomer attack, collusion attack.
[56]Bad-mouthing attack, semi-honest attack.
[61]Cheating attack, grayhole, bad-mouthing attack.
[62]Self-promoting attacks, ballot-stuffing attacks, whitewashing attacks, bad-mouthing attacks, discriminatory attacks.
[63]Certificate replication attack, eavesdropping attack, attacks on privacy.
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Wang, Y.; Zen, H.; Sabri, M.F.M.; Wang, X.; Kho, L.C. Towards Strengthening the Resilience of IoV Networks—A Trust Management Perspective. Future Internet 2022, 14, 202. https://doi.org/10.3390/fi14070202

AMA Style

Wang Y, Zen H, Sabri MFM, Wang X, Kho LC. Towards Strengthening the Resilience of IoV Networks—A Trust Management Perspective. Future Internet. 2022; 14(7):202. https://doi.org/10.3390/fi14070202

Chicago/Turabian Style

Wang, Yingxun, Hushairi Zen, Mohamad Faizrizwan Mohd Sabri, Xiang Wang, and Lee Chin Kho. 2022. "Towards Strengthening the Resilience of IoV Networks—A Trust Management Perspective" Future Internet 14, no. 7: 202. https://doi.org/10.3390/fi14070202

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop