Chains of trust in vehicular networks: a secure points of interest dissemination strategy
"Article principal" (1,289Mb) (Restricted access) Request copy
Què és aquest botó?
Aquest botó permet demanar una còpia d'un document restringit a l'autor. Es mostra quan:
- Disposem del correu electrònic de l'autor
- El document té una mida inferior a 20 Mb
- Es tracta d'un document d'accés restringit per decisió de l'autor o d'un document d'accés restringit per política de l'editorial
Rights accessRestricted access - publisher's policy
This article describes a scheme which to the best of our knowledge is the first one to use user signatures to share information about Points of Interest in Vehicular Ad hoc Networks. In this scheme, users rate restaurants, hotels, etc. and sign those rates with their private key. Then, they broadcast that information and other vehicles store it for future use. When another user needs a Point of Interest recommendation he queries the system for the other users stored reviews and after he visits that Points of Interest for himself, he evaluates it and his level of trust in the reviewers with rates similar to his own increases. In the end, a user will be able to request to his vehicle information on a certain Point of Interest category and itwill respond with the recommendations made by other users, prioritizing the ones in the user’s Web of Trust.poi-Sim is the tool designed to simulate this scheme. It processes a 24 h mobility trace produced by a Multi-Agent Traffic Simulator, which realistically simulates public and private traffic over regional maps of Switzerland. The result is a Chains of Trust simulation with over 260,000 nodes, which shows that the proposed scheme performs satisfactorily in a realistic scenario.
CitationRivas, D.; Guerrero, M. Chains of trust in vehicular networks: a secure points of interest dissemination strategy. "Ad hoc networks", Agost 2012, vol. 10, núm. 6, p. 1115-1133.
|1-s2.0-S1570870512000285-main.pdf||"Article principal"||1,289Mb||Restricted access|
All rights reserved. This work is protected by the corresponding intellectual and industrial property rights. Without prejudice to any existing legal exemptions, reproduction, distribution, public communication or transformation of this work are prohibited without permission of the copyright holder