Next Article in Journal
Experimental Data in a Greenhouse with and without Cultivation of Stringless Blue Lake Beans
Previous Article in Journal
Interruption Audio & Transcript: Derived from Group Affect and Performance Dataset
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Data Descriptor

TM–IoV: A First-of-Its-Kind Multilabeled Trust Parameter Dataset for Evaluating Trust in the Internet of Vehicles

by
Yingxun Wang
1,2,*,
Adnan Mahmood
3,
Mohamad Faizrizwan Mohd Sabri
1 and
Hushairi Zen
4
1
Faculty of Engineering, Universiti Malaysia Sarawak, Kota Samarahan 94300, Sarawak, Malaysia
2
Faculty of Computer and Information Engineering, Qilu Institute of Technology, Jinan 250200, China
3
School of Computing, Macquarie University, Sydney, NSW 2109, Australia
4
Faculty of Engineering and Technology, i-CATS University College, Kuching 93350, Sarawak, Malaysia
*
Author to whom correspondence should be addressed.
Data 2024, 9(9), 103; https://doi.org/10.3390/data9090103
Submission received: 7 July 2024 / Revised: 22 August 2024 / Accepted: 30 August 2024 / Published: 31 August 2024

Abstract

:
The emerging and promising paradigm of the Internet of Vehicles (IoV) employ vehicle-to-everything communication for facilitating vehicles to not only communicate with one another but also with the supporting roadside infrastructure, vulnerable pedestrians, and the backbone network in a bid to primarily address a number of safety-critical vehicular applications. Nevertheless, owing to the inherent characteristics of IoV networks, in particular, of being (a) highly dynamic in nature and which results in a continual change in the network topology and (b) non-deterministic owing to the intricate nature of its entities and their interrelationships, they are susceptible to a number of malicious attacks. Such kinds of attacks, if and when materialized, jeopardizes the entire IoV network, thereby putting human lives at risk. Whilst the cryptographic-based mechanisms are capable of mitigating the external attacks, the internal attacks are extremely hard to tackle. Trust, therefore, is an indispensable tool since it facilitates in the timely identification and eradication of malicious entities responsible for launching internal attacks in an IoV network. To date, there is no dataset pertinent to trust management in the context of IoV networks and the same has proven to be a bottleneck for conducting an in-depth research in this domain. The manuscript-at-hand, accordingly, presents a first of its kind trust-based IoV dataset encompassing 96,707 interactions amongst 79 vehicles at different time instances. The dataset involves nine salient trust parameters, i.e., packet delivery ratio, similarity, external similarity, internal similarity, familiarity, external familiarity, internal familiarity, reward/punishment, and context, which play a considerable role in ascertaining the trust of a vehicle within an IoV network.
Dataset License: Creative Commons Attribution 4.0 International.

1. Introduction and Background

Over the past decade or so, the rapid evolution and advancements in a number of cutting-edge technologies, including but not limited to, the Internet of Things (IoT), artificial intelligence, and fifth-generation communication, has led to the transformation of the conventional intelligent transportation systems into Internet of Vehicles (IoV) networks [1,2]. The IoV networks facilitate seamless connectivity for a real-time exchange of safety-critical and non-safety information amongst vehicles, and between vehicles and vulnerable pedestrians, supporting roadside infrastructure, and the backbone network via vehicle-to-everything communication [3,4]. Despite the low latency advantages associated with the IoV networks, they are prone to a number of malicious attacks that are not only capable of jeopardizing the entire network but also poses a considerable risk to human lives. Hence, it is of paramount importance to ensure the resilience of IoV networks [5,6]. Figure 1 portrays an IoV landscape.
A brief glimpse of the state-of-the-art reveals that a number of mechanisms have been proposed over the years in order to strengthen the security of an IoV network. Such mechanisms can be broadly classified into two categories, i.e., cryptography-based approaches and trust-based approaches [7,8]. Whilst the cryptography-based approaches safeguard IoV networks against a number of malicious attacks, including but not limited to data tampering, identity theft, and eavesdropping, they are prone to a number of internal attacks [9,10]. Trust-based approaches, on the contrary, can intelligently address the challenges pertinent to internal attacks [11] since they leverage the reputation of entities within an IoV network in order to guarantee secure communication amongst them, thereby facilitating intelligent traffic flows [12,13].
In the context of an IoV network, vehicles are classified as either trusted or untrusted [14,15]. Trusted vehicles exhibit legitimate behavior by primarily disseminating accurate information in an IoV network, whereas untrusted vehicles engage in malicious activities by intentionally transmitting and facilitating the relay of incorrect information and recommendations in an IoV network in an intelligent manner, thereby posing a grave threat to vehicular passengers and vulnerable pedestrians [16,17]. Hence, an accurate and real-time identification of malicious vehicles in such a highly dynamic network is highly indispensable [18]. The state-of-the-art methodologies employed for the identification of such vehicles in an IoV network typically involve threshold-based and decision boundary-based mechanisms [19,20]. In the case of threshold-based mechanisms, a vehicle’s trust value is compared with a predetermined trust threshold, i.e., if the trust value of a vehicle exceeds the predetermined trust threshold, it is regarded as a trusted vehicle, or else, it is classified as a malicious vehicle. On the contrary, in case of decision boundary-based mechanisms, the trust values derived from vehicular interactions are clustered and classified via learning algorithms, and an optimal decision boundary is subsequently employed to segregate the trusted vehicles from the malicious ones [21,22]. However, regardless of the methodology employed for the identification of the malicious vehicles in an IoV network, vehicles should have an associated precise trust value. Therefore, trust-related data hold considerable significance for securing highly dynamic IoV networks.
Trust, in essence, implies a degree of belief or disbelief that a trustor has on a trustee in carrying out a particular task or a set of tasks in an anticipated manner [23]. It mandates quantification, and to realize the same, it relies on several trust-based parameters which are not only context-dependent but are also highly dynamic in nature since they transpire as a result of the frequent interactions amongst the vehicles in an IoV network [24,25,26]. Whilst a number of IoV-based trust parameters have already been delineated in the research literature, as of date, there is no dedicated publicly available trust-based IoV dataset that researchers from both academia and industry can predominantly employ in order to carry out an in-depth research and subsequently expand upon within this particular domain. In order to address this particular challenge, the manuscript-at-hand presents a pioneering trust-based IoV dataset, which is discussed in detail in Section 2 (Data Description) and Section 3 (Methods).

2. Data Description

The manuscript-at-hand introduces a trust-based IoV dataset, which has been made available for the readers at https://github.com/wangyingxun/IoV, accessed on 1 August 2024. This particular dataset has been employed for not only ascertaining the trust values of vehicles in an IoV network but also for segregating the trustworthy vehicles from the untrustworthy ones by means of an optimal decision boundary. Accordingly, a detailed description of the key features of this particular dataset is indispensable so as to enable researchers in both academia and the industry to employ and extend the same in a bid to investigate open research directions of this emerging and promising domain.
It is pertinent to mention here that, to date, there is no public dataset pertinent to trust management in IoV networks. Therefore, the dataset proposed in the manuscript-at-hand represents a pioneering contribution within this particular domain. In order to realize the same, Java has been employed for designing an IoV-based simulator, whereas Python was employed for analyzing the simulation results. Figure 2 herein depicts a realistic urban mobility scenario for Jinan, i.e., a city in the Shandong province of the People’s Republic of China. The IoV simulator, accordingly, takes into account the said urban mobility scenario since it encompasses several interconnected road segments with vehicles traversing on the same along diverse paths at random speeds in disparate directions. Moreover, the speed of a vehicle remains constant throughout its travelling trajectory along a single path and only changes once the respective vehicle opts for a new path. Vehicles, therefore, interact with one another, i.e., the time of interaction amongst them depends on their respective speeds, and frequently exchange indispensable information to realize a number of both safety-critical and non-safety applications. Moreover, the proposed IoV-based simulator incorporates not only honest vehicles but also intelligent malicious ones that dynamically alternate between honest and dishonest behaviors in a bid to execute malicious acts so as to evade detection by the IoV-based trust models [27,28].
For the readers’ reference, the trust-based IoV dataset proposed in the manuscript-at-hand encompasses 79 vehicles, i.e., trustors and trustees, that engage in a total of 96 , 707 interactions over different time instances. In total, we ascertained nine key trust parameters, i.e., packet delivery ratio, similarity, external similarity, internal similarity, familiarity, external familiarity, internal familiarity, reward/punishment, and context. A trust authority [29] here plays an indispensable role as it facilitates in ascertaining the trust parameters, which (a) cannot transpire as a result of the interactions between a trustor and a trustee or (b) requires the opinion of a global entity with an overarching view of the entire IoV network in a bid to determine the credibility of the information exchanged between a trustor and a trustee and their respective recommendations. These parameters thus not only depict the dynamic interactions amongst the trustors and trustees in an IoV network but further offer valuable insights pertinent to the behavior of the same.

3. Methods

As discussed above, the trust-based IoV dataset proposed in this particular manuscript encompasses trustors, trustees, and 9 salient trust parameters. The same are delineated as follows:

3.1. Trustor

Trust in an IoV network involves multiple attributes (parameters), which can be quantified by considering it as a relational construct involving two entities, i.e., a trustor i and a trustee j. The trustor i assumes the role of an evaluator within an IoV network to assess and ascertain the trustworthiness of a trustee j. In our proposed dataset, there are 79 trustors listed in column 1 of the dataset.

3.2. Trustee

The trustee, also referred to as a target node, is an entity that is evaluated by a trustor as either trustworthy or untrustworthy. In our proposed dataset, there are 79 trustees (listed in column 2 of the dataset) that have encountered 96 , 707 interactions with the trustors.

3.3. Packet Delivery Ratio (PDR)

The packet delivery ratio ( 0 P D R 1 ) measures the degree of interaction between a trustor i and a trustee j at a time instance t within an IoV network, thereby providing a key understanding of their relationship. In order to ascertain PDR, we collect the total number of messages sent by a trustor i and successfully received by a trustee j at a time instance t in an IoV network. The PDR is, therefore, determined by taking into account the ratio between the aforementioned sent and successfully received messages between a trustor i and a trustee j. The same is listed in column 3 of the dataset, wherein 0 implies an unsuccessful interaction, whereas 1 suggests a successful interaction.

3.4. Similarity (Sim)

The similarity ( 0 S i m 1 ) between a trustor i and a trustee j at a time instance t encompasses both external similarity ( E S ) and internal similarity ( I S ), and is a weighted amalgamation of the two. The same is listed in column 4 of the dataset.

3.4.1. External Similarity (ES)

The external similarity ( 0 E S 1 ) suggests the extent to which a trustor i and a trustee j access similar content at a time instance t, and is listed in column 5 of the dataset. ES is deemed to be 1 if the trustor i and a trustee j access similar content. Otherwise, it is regarded as 0.

3.4.2. Internal Similarity (IS)

The internal similarity ( 0 I S 1 ) manifests the degree of similarity in the positions (geographical locations), directions (travelling trajectories), speeds, and accelerations of a trustor i and trustee j. The same is depicted in column 6 of the dataset.

3.5. Familiarity (Fam)

The familiarity ( 0 F a m 1 ) between a trustor i and a trustee j at a time instance t is also segregated into external familiarity ( E F ) and internal familiarity ( I F ). The same is delineated in column 7 of the dataset.

3.5.1. External Familiarity (EF)

The external familiarity ( 0 E F 1 ) quantifies the level of the familiarity a trustor possesses towards a trustee, and is listed in column 8 of the dataset. The value of E F is obtained by calculating the ratio between the number of common vehicles that interact with both a trustor i and a trustee j, and the total number of vehicles that interact with a trustor over a given timestamp in an IoV network [30]. In other words, a higher number of shared interacting vehicles (i.e., E F = 1 ) indicates a stronger level of familiarity between a trustor and a trustee.

3.5.2. Internal Familiarity (IF)

The internal familiarity ( 0 I F 1 ) manifests the extent of interaction frequency between a trustor i and a trustee j, and is recorded in column 9 of the dataset. The value of I F is determined by quantifying the frequency of interactions between a trustor and a trustee over a given timestamp in an IoV network. In other words, a higher interaction frequency (i.e., I F = 1 ) indicates a stronger familiarity between the two parties (trustor and trustee).

3.6. Reward/Punishment (RP)

The reward/punishment ( 0 R P 1 ) is employed in order to ascertain the degree of a reward or a penalty allocated to a trustee j based on its conduct in an IoV network. Specifically, a trustee j is rewarded by a trustor i for exhibiting cooperation, honesty, and reporting critical events, whereas it is penalized for any sort of a misconduct [31]. The RP is determined by taking into consideration the PDR, and a metric that accounts for both positive and negative interactions between a trustor and a trustee. It is thus represented in column 10 of the dataset.

3.7. Context

Context plays an indispensable role for ascertaining the trust of a trustee in an IoV network since most of the other trust parameters are directly impacted owing to the same [32]. It provides specific information regarding the settings, wherein interactions take place between a trustor i and a trustee j in an IoV network, i.e., network stability, and temporal and spatial aspects. In the context of this particular dataset, the context ( 0 C o n t e x t 1 ) implies the network communication quality segregated into four classes implying poor, medium, good, and excellent. The corresponding values pertinent to these four classes are depicted in column 11 of the dataset.
Figure 3, Figure 4, Figure 5, Figure 6 and Figure 7 depict the packet delivery ratio, similarity, familiarity, reward/punishment, and context-related scores of each of the 79 vehicles in an IoV network at their most recent respective time instance. Additionally, Table 1 delineates the values of all of the 9 trust parameters introduced in this particular dataset so as to enable the readers to have a comprehensive understanding of the same.

4. Conclusions and Future Directions

The manuscript-at-hand employs Java to design a trust-based IoV simulator which ascertains the trust values of vehicles in an IoV network and further facilitates in segregating the trustworthy vehicles from the untrustworthy ones via an optimal decision boundary. The trust-based IoV dataset obtained via this simulator is the first of its kind and encompasses nine salient trust parameters, i.e., packet delivery ratio, similarity, external similarity, internal similarity, familiarity, external familiarity, internal familiarity, reward/punishment, and context. The underlying rationale of the said trust parameters lies in their effectiveness to investigate dynamic interactions between trustors and trustees in an IoV network, thereby offering valuable insights into the behavior of the same and a foundation for researchers from both academia and industry to utilize and expand upon. In the near future, the authors intend to employ a trust-based IoV testbed to (a) ascertain the parameters introduced in this dataset via realistic interactions and (b) simulate various intricate IoV-based trust attacks, i.e., self-promoting attacks, on–off attacks, opportunistic service attacks, selective behavior attacks, bad mouthing attacks, and good mouthing attacks.

Author Contributions

The following are the contributions made by the authors: conceptualization, Y.W. and A.M.; methodology, Y.W. and A.M.; software, Y.W.; validation, Y.W. and A.M.; formal analysis, Y.W. and A.M.; investigation, Y.W. and A.M.; resources, Y.W.; data curation, Y.W. and A.M.; writing—original draft preparation, Y.W. and A.M.; writing—review and editing, A.M.; visualization, Y.W. and A.M.; supervision, A.M., M.F.M.S., and H.Z.; funding acquisition, Y.W. All authors have read and agreed to the published version of the manuscript.

Funding

The corresponding author’s PhD research at Universiti Malaysia Sarawak, Malaysia, has been funded by the Qilu Institute of Technology, Jinan, Shandong, China.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data presented within this manuscript-at-hand are available at https://github.com/wangyingxun/IoV, accessed on 1 August 2024. A comprehensive dataset is also available to the readers on request.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Cao, T.; Yi, J.; Wang, X.; Xiao, H.; Xu, C. Interaction Trust-Driven Data Distribution for Vehicle Social Networks: A Matching Theory Approach. IEEE Trans. Comput. Soc. Syst. 2024, 11, 4071–4086. [Google Scholar] [CrossRef]
  2. Yang, Z.; Wang, R.; Wu, D.; Yang, B.; Zhang, P. Blockchain-Enabled Trust Management Model for the Internet of Vehicles. IEEE Internet Things J. 2023, 10, 12044–12054. [Google Scholar] [CrossRef]
  3. Adhikari, M.; Munusamy, A.; Hazra, A.; Menon, V.G.; Anavangot, V.; Puthal, D. Security in Edge-Centric Intelligent Internet of Vehicles: Issues and Remedies. IEEE Consum. Electron. Mag. 2022, 11, 24–31. [Google Scholar] [CrossRef]
  4. Yang, X.; Zhu, F.; Yang, X.; Luo, J.; Yi, X.; Ning, J.; Huang, X. Secure Reputation-Based Authentication With Malicious Detection in VANETs. IEEE Trans. Dependable Secur. Comput. 2024, 1–15. [Google Scholar] [CrossRef]
  5. Zhang, Y.; Zhao, Y.; Zhou, Y. User-Centered Cooperative-Communication Strategy for 5G Internet of Vehicles. IEEE Internet Things J. 2022, 9, 13486–13497. [Google Scholar] [CrossRef]
  6. Shokrollahi, S.; Dehghan, M. TGRV: A Trust-Based Geographic Routing Protocol for VANETs. Ad Hoc Netw. 2023, 140, 103062. [Google Scholar] [CrossRef]
  7. Rathee, G.; Kumar, A.; Kerrache, C.A.; Calafate, C. A Trust Management Solution for 5G-based Future Generation Internet of Vehicles. Comput. Netw. 2024, 248, 110501. [Google Scholar] [CrossRef]
  8. Abbas, G.; Ullah, S.; Waqas, M.; Abbas, Z.H.; Bilal, M. A Position-based Reliable Emergency Message Routing Scheme for Road Safety in VANETs. Comput. Netw. 2022, 213, 109097. [Google Scholar] [CrossRef]
  9. Ullah, S.; Abbas, G.; Waqas, M.; Abbas, Z.H.; Khan, A.U. RSU Assisted Reliable Relay Selection for Emergency Eessage Routing in Intermittently Connected VANETs. Wirel. Netw. 2023, 29, 1311–1332. [Google Scholar] [CrossRef]
  10. Monfared, S.K.; Shokrollahi, S. DARVAN: A Fully Decentralized Anonymous and Reliable Routing for VANets. Comput. Netw. 2023, 223, 109561. [Google Scholar] [CrossRef]
  11. Guo, J.; Li, X.; Liu, Z.; Ma, J.; Yang, C.; Zhang, J.; Wu, D. TROVE: A Context-Awareness Trust Model for VANETs Using Reinforcement Learning. IEEE Internet Things J. 2020, 7, 6647–6662. [Google Scholar] [CrossRef]
  12. Tripathi, K.N.; Sharma, S.C. A Trust Based Model (TBM) to Detect Rogue Nodes in Vehicular Ad-hoc Networks (VANETS). Int. J. Syst. Assur. Eng. Manag. 2020, 11, 426–440. [Google Scholar] [CrossRef]
  13. Kuang, Y.; Xu, H.; Jiang, R.; Liu, Z. GTMS: A Gated Linear Unit Based Trust Management System for Internet of Vehicles Using Blockchain Technology. In Proceedings of the IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Wuhan, China, 9–11 December 2022; pp. 28–35. [Google Scholar]
  14. Li, W.; Meng, W.; Kwok, L.F. Surveying Trust-Based Collaborative Intrusion Detection: State-of-the-Art, Challenges and Future Directions. IEEE Commun. Surv. Tutorials 2022, 24, 280–305. [Google Scholar] [CrossRef]
  15. Kaur, G.; Kakkar, D. Hybrid Optimization Enabled Trust-based Secure Routing with Deep Learning-based Attack Detection in VANET. Ad Hoc Netw. 2022, 136, 102961. [Google Scholar] [CrossRef]
  16. Li, W.; Meng, W.; Yang, L.T. Enhancing Trust-based Medical Smartphone Networks via Blockchain-based Traffic Sampling. In Proceedings of the IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Shenyang, China, 20–22 October 2021; pp. 122–129. [Google Scholar]
  17. Wazid, M.; Das, A.K.; Shetty, S. TACAS-IoT: Trust Aggregation Certificate-Based Authentication Scheme for Edge-Enabled IoT Systems. IEEE Internet Things J. 2022, 9, 22643–22656. [Google Scholar] [CrossRef]
  18. Fernandes, C.P.; Montez, C.; Adriano, D.D.; Boukerche, A.; Wangham, M.S. A Blockchain-based Reputation System for Trusted VANET Nodes. Ad Hoc Netw. 2023, 140, 103071. [Google Scholar] [CrossRef]
  19. Aslan, M.; Sen, S. A Dynamic Trust Management Model for Vehicular Ad Hoc Networks. Veh. Commun. 2023, 2, 11304. [Google Scholar] [CrossRef]
  20. Alalwany, E.; Mahgoub, I. Security and Trust Management in the Internet of Vehicles (IoV): Challenges and Machine Learning Solutions. Sensors 2024, 24, 368. [Google Scholar] [CrossRef]
  21. Zhang, S.; He, R.; Xiao, Y.; Liu, Y. A Three-Factor Based Trust Model for Anonymous Bacon Message in VANETs. IEEE Trans. Veh. Technol. 2023, 72, 11304–11317. [Google Scholar] [CrossRef]
  22. Nazih, O.; Benamar, N.; Lamaazi, H.; Choaui, H. Towards Secure and Trustworthy Vehicular Fog Computing: A Survey. IEEE Access 2024, 12, 35154–35171. [Google Scholar] [CrossRef]
  23. Mahmood, A.; Sheng, Q.Z.; Zhang, W.E.; Wang, Y.; Sagar, S. Towards a Distributed Trust Management System for Misbehavior Detection in the Internet of Vehicles. ACM Trans. Cyber-Phys. Syst. 2023, 7, 1–25. [Google Scholar] [CrossRef]
  24. Sagar, S.; Mahmood, A.; Sheng, Q.Z.; Munazza, Z.; Farhan, S. Can We Quantify Trust? Towards a Trust-based Resilient SIoT Network. Computing 2024, 106, 557–577. [Google Scholar] [CrossRef]
  25. Zhang, S.; Zhang, D.; Wu, Y.; Zhong, H. Service Recommendation Model Based on Trust and QoS for Social Internet of Things. IEEE Trans. Serv. Comput. 2023, 16, 3736–3750. [Google Scholar] [CrossRef]
  26. Wang, Y.X.; Mahmood, A.; Sabri, M.F.M.; Zen, H.; Kho, L.C. MESMERIC: Machine Learning-based Trust Management Mechanism for the Internet of Vehicles. Sensors 2024, 24, 863. [Google Scholar] [CrossRef]
  27. Mahmood, A.; Siddiqui, S.A.; Sheng, Q.Z.; Zhang, W.E.; Suzuki, H.; Ni, W. Trust on Wheels: Towards Secure and Resource Efficient IoV Networks. Computing 2022, 104, 1337–1358. [Google Scholar] [CrossRef]
  28. Qi, J.X.; Zheng, N.; Xu, M.; Chen, P.; Li, W.Q. A Hybrid-Trust-based Emergency Message Dissemination Model for Vehicular Ad Hoc Networks. J. Inf. Secur. Appl. 2024, 81, 103699. [Google Scholar] [CrossRef]
  29. Azizi, M.; Shokrollahi, S. RTRV: An RSU-assisted Trust-based Routing Protocol for VANETs. Ad Hoc Netw. 2024, 154, 103387. [Google Scholar] [CrossRef]
  30. Lam, C.C.; Song, Y.; Cao, Y.; Zhang, Y.; Cai, B.; Ni, Q. Multidimensional Trust Evidence Fusion and Path-Backtracking Mechanism for Trust Management in VANETs. IEEE Internet Things J. 2024, 11, 18619–18634. [Google Scholar]
  31. Sagar, S.; Mahmood, A.; Sheng, Q.Z.; Zhang, W.E. Trust Computational Heuristic for Social Internet of Things: A Machine Learning-based Approach. In Proceedings of the IEEE International Conference on Communications (ICC), Virtual, 7–11 June 2020; pp. 1–6. [Google Scholar]
  32. Mao, W.; Hu, T.; Zhao, W. Reliable Task Offloading Mechanism based on Trusted Roadside Unit Service for Internet of Vehicles. Ad Hoc Netw. 2023, 139, 103045. [Google Scholar] [CrossRef]
Figure 1. An IoV landscape.
Figure 1. An IoV landscape.
Data 09 00103 g001
Figure 2. Depicting a realistic urban mobility scenario for Jinan (a city in the Shandong province of the People’s Republic of China).
Figure 2. Depicting a realistic urban mobility scenario for Jinan (a city in the Shandong province of the People’s Republic of China).
Data 09 00103 g002
Figure 3. Packet delivery ratios of 79 vehicles in an IoV network.
Figure 3. Packet delivery ratios of 79 vehicles in an IoV network.
Data 09 00103 g003
Figure 4. Similarity-related values of 79 vehicles in an IoV network.
Figure 4. Similarity-related values of 79 vehicles in an IoV network.
Data 09 00103 g004
Figure 5. Familiarity-related values of 79 vehicles in an IoV network.
Figure 5. Familiarity-related values of 79 vehicles in an IoV network.
Data 09 00103 g005
Figure 6. Reward/punishment-related values of 79 vehicles in an IoV network.
Figure 6. Reward/punishment-related values of 79 vehicles in an IoV network.
Data 09 00103 g006
Figure 7. Context-related values of 79 vehicles in an IoV network.
Figure 7. Context-related values of 79 vehicles in an IoV network.
Data 09 00103 g007
Table 1. A snapshot of values pertinent to the trust parameters, i.e., packet delivery ratio (PDR), similarity (Sim), external similarity (ES), internal similarity (IS), familiarity (Fam), external familiarity (EF), nternal familiarity (IF), reward/punishment (RP), and context, in the trust-based IoV dataset.
Table 1. A snapshot of values pertinent to the trust parameters, i.e., packet delivery ratio (PDR), similarity (Sim), external similarity (ES), internal similarity (IS), familiarity (Fam), external familiarity (EF), nternal familiarity (IF), reward/punishment (RP), and context, in the trust-based IoV dataset.
TrustorTrusteePDRSimESISFamEFIFRPContext
010.71130.683310.36660.68011.00000.36020.53290.6
0100.96250.904710.80940.60831.00000.21660.92710.8
0780.78490.211700.42350.61381.00000.22760.63300.4
...........
590.76170.764610.52920.77651.00000.55290.60020.6
5250.12750.794610.58920.62571.00000.25130.05330.4
5650.91990.765810.53150.55691.00000.11380.84910.6
...........
9100.78320.405600.81121.00001.00001.00000.63050.6
9370.16100.959910.91990.55001.00000.10000.06960.4
9700.44280.809010.65810.61161.00000.22320.25360.4
...........
17210.20890.428900.85780.98071.00000.96140.09470.4
17530.82330.746810.49350.64211.00000.28410.69000.6
17590.67670.691510.38300.64211.00000.28410.48980.6
...........
23240.93120.876010.75191.00001.00001.00000.86930.8
23670.37460.288000.57600.73281.00000.46560.20040.0
23700.87330.722810.44560.67581.00000.35160.76940.6
...........
27400.98350.846610.69330.80981.00000.61960.96740.8
27530.39950.117400.23480.79631.00000.59260.21910.0
27740.76840.725910.45190.76941.00000.53880.60950.6
...........
35360.76920.114900.22980.64871.00000.29730.61070.4
35370.53020.899610.79930.89041.00000.78070.33140.6
35540.19790.746510.49290.66071.00000.32130.08870.4
...........
40410.57380.703310.40670.56611.00000.13210.37470.6
40450.37650.631610.26320.68671.00000.37330.20180.4
40590.76930.263800.52761.00001.00001.00000.61080.6
...........
43450.41670.800510.60090.58991.00000.17970.23250.4
43520.23370.717010.43390.61131.00000.22250.10860.4
43580.94590.680610.36110.82951.00000.65900.89610.8
...........
50520.48220.734610.46921.00001.00001.00000.28730.6
50550.53390.876410.75271.00001.00001.00000.33500.6
50620.78570.839310.67850.66591.00000.33170.63410.6
...........
54570.67900.861710.72341.00001.00001.00000.49260.6
54610.54910.870910.74170.70001.00000.40000.34980.6
54750.37320.668010.33600.60251.00000.20490.19440.4
...........
60610.68670.909410.81871.00001.00001.00000.50200.6
60630.44650.851010.70200.62921.00000.25830.25670.4
60750.36030.906610.81310.67221.00000.34440.19000.4
...........
63650.87920.757210.51451.00001.00001.00000.77920.8
63670.65620.723110.44621.00001.00001.00000.46530.6
63740.49720.915410.83070.62491.00000.24970.30070.4
...........
70710.56650.766610.53320.57531.00000.15050.36720.4
70730.58790.753010.50590.69691.00000.39370.38930.6
70760.96440.153000.30600.93431.00000.86850.93070.6
...........
74750.12200.748010.49600.55001.00000.10000.05070.0
74770.52290.741310.48260.98881.00000.97750.32450.6
74780.20910.726310.45261.00001.00001.00000.09480.4
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Wang, Y.; Mahmood, A.; Sabri, M.F.M.; Zen, H. TM–IoV: A First-of-Its-Kind Multilabeled Trust Parameter Dataset for Evaluating Trust in the Internet of Vehicles. Data 2024, 9, 103. https://doi.org/10.3390/data9090103

AMA Style

Wang Y, Mahmood A, Sabri MFM, Zen H. TM–IoV: A First-of-Its-Kind Multilabeled Trust Parameter Dataset for Evaluating Trust in the Internet of Vehicles. Data. 2024; 9(9):103. https://doi.org/10.3390/data9090103

Chicago/Turabian Style

Wang, Yingxun, Adnan Mahmood, Mohamad Faizrizwan Mohd Sabri, and Hushairi Zen. 2024. "TM–IoV: A First-of-Its-Kind Multilabeled Trust Parameter Dataset for Evaluating Trust in the Internet of Vehicles" Data 9, no. 9: 103. https://doi.org/10.3390/data9090103

APA Style

Wang, Y., Mahmood, A., Sabri, M. F. M., & Zen, H. (2024). TM–IoV: A First-of-Its-Kind Multilabeled Trust Parameter Dataset for Evaluating Trust in the Internet of Vehicles. Data, 9(9), 103. https://doi.org/10.3390/data9090103

Article Metrics

Back to TopTop