A Trust-based Approach for Secure Data Dissemination in a Mobile Peer-to-Peer Network of AVs

##plugins.themes.academic_pro.article.main##

Bharat Bhargava
Pelin Angin
Rohit Ranchal
Ranjitkumar Sivakumar
Mark Linderman
Asher Sinclair

Abstract

Mobile peer-to-peer networks of aerial vehicles (AVs) have become significant in collaborative tasks including military missions and search and rescue operations. However, the nature of the communication between the nodes in these networks makes the disseminated data prone to interception by malicious parties, which could cause serious harm for the designated mission of the network. In this paper, we propose an approach for secure data dissemination in a mobile peer-to-peer network, where the data disclosed to a particular node in the network depends on the trustworthiness of that node as well as the matching of policies of the data source and destination. We demonstrate the use of active bundles for protecting sensitive data as they are sent from one node to another, on the simulation we developed for data dissemination in a mobile peer-to-peer network of AVs. We also discuss filtering techniques for dissemination of sensitive data in such networks.

##plugins.themes.academic_pro.article.details##

How to Cite
Bharat Bhargava, Pelin Angin, Rohit Ranchal, Ranjitkumar Sivakumar, Mark Linderman, & Asher Sinclair. (2012). A Trust-based Approach for Secure Data Dissemination in a Mobile Peer-to-Peer Network of AVs. International Journal of Next-Generation Computing, 3(1), 01–12. https://doi.org/10.47164/ijngc.v3i1.24

References

  1. Aberer, K., and Despotovic, Z.. Managing trust in a peer-2-peer information system. In The 10th International Conference on Information and Knowledge Management, Atlanta, GA, 2001.
  2. Aijaz, A., Bochow, B., Dotzer, F., Festag, A., Gerlach, M., Kroh, R., and Leinmuller, T.. Attacks on Inter-Vehicle Communication Systems - An Analysis. In The 3rd International Workshop on Intelligent Transportation, 2006.
  3. Annamalai, M., and Bhargava, B.. De ning Data Equivalence for Ecient Access of Images in a Distributed Environment. In The 2nd World Conference on Integrated Design and Process Technology, 1996.
  4. Ben-Othmane, L.. Active Bundles for Protecting Con dentiality of Sensitive Data throughout Their Lifecycle.
  5. Ph.D. dissertation, Dept. of Computer Science, Western Michigan University, Kalamazoo, MI, 2010.
  6. Ben-Othmane, L., and Lilien, L.. Protecting Privacy in Sensitive Data Dissemination with Active Bundles. In The 7th Annual Conference on Privacy, Security and Trust, Saint John, NB, Canada, 2009.
  7. Blum, J., and Eskandarian, A.. The Threat of Intelligent Collisions. IT Professional. 6, 1 (2004), 24-29.
  8. Can, A.B.. Trust and Anonymity in Peer-to-peer Systems. Ph.D. dissertation, Dept. of Computer Science, Purdue University, West Lafayette, IN, 2007.
  9. Fonseca, E., Festag, A., Baldessari, R., and Aguiar, R.. Support of Anonymity in VANETs - Putting Pseudonymity into Practice. In IEEE Wireless Communications and Networking Conference, 2007.
  10. Furgel, I., and Lemke, K.. A review of the digital tachograph system. In The Workshop on Embedded Security in Cars (ESCAR'04), Bochum, Germany, 2004.
  11. Golle, P., Greene, D., and Staddon, J.. Detecting and correcting malicious data in VANETs. In The 1st ACM Workshop on Vehicular Ad Hoc Networks, Philadelphia, PA, 2004.
  12. Hubaux, J., Capkun, S., and Luo, J.. The Security and Privacy of Smart Vehicles. IEEE Security and Privacy. 2, 3 (2004), 49-55.
  13. Lilien, L., and Bhargava, B.. A Scheme for Privacy-preserving Data Dissemination. IEEE Trans. on Systems, Man and Cybernetics, Part A: Systems and Humans. 36, 3 (May 2006), 503-506.
  14. Meka, H., Madria, S., Kumar, M., Linderman, M., and Chakravarthy, S.. Ecient Simulation Architecture for Routing and Replication in Mobile Peer to Peer Network of UAVs. In The 11th International Conference on Mobile Data Management, Kansas City, MO, 2010.
  15. Ooi, B., Liau, C., and Tan, K.. Managing trust in peer-to-peer systems using reputation-based techniques. In The 4th International Conference on Web Age Information Management, Chengdu, China, 2003.
  16. Papageorgiou, C.P., Oren, M., and Poggio, T.. A general framework for object detection. In The International Conference on Computer Vision, 1998.
  17. Parno, B., and Perrig, A.. Challenges in Securing Vehicular Networks. In The 4th Workshop on Hot Topics in Networks, College Park, MD, 2005.
  18. Pham, C., and Tran, D.A.. Publish/Subscribe Techniques For P2P Networks. In Al-Sakib Khan Pathan, Mukaddim Pathan and Hae Young Lee, ed., Advancements in Distributed Computing and Internet Technologies: Trends and Issues. IGI Global, Hershey, PA, 2012.
  19. Raya, M., and Hubaux, J.. Securing vehicular ad hoc networks. Journal of Computer Security. 15, (2007), 39-68.
  20. Raya, M., Papadimitratos, P., and Hubaux, J.. Securing Vehicular Communications. IEEE Wireless Communications Magazine, Special Issue on Inter-Vehicular Communications. 13, 5 (2007), 8-15.
  21. Reinhard, E., Ward, G., Pattanaik, S., and Debevec, P.. High Dynamic Range Imaging: Acquisition, Display, and Image-Based Lighting. Morgan Kaufmann, Westport, Connecticut, 2005.
  22. Selcuk, A.A., Uzun, E., and Pariente, M.R.. "A reputation-based trust management system for p2p networks. In The 4th IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGRID), Chicago, IL, 2004.
  23. Yang, X., Liu, J., Zhao, F., and Vaidya, N.. A vehicle-to-vehicle communication protocol for cooperative collision warning. In The First Annual International Conference on Mobile and Ubiquitous Systems, Boston, MA, 2004.
  24. Zarki, M.E., Mehrotra, S., Tsudik, G., and Venkatasubramanian, N.. Security issues in a future vehicular network. In The European Wireless Conference, 2002.