Affiliation:
1. Faculty of Engineering, Universiti Malaysia Sarawak, Kota Samarahan 94300, Sarawak, Malaysia
2. Faculty of Computer and Information Engineering, Qilu Institute of Technology, Jinan 250200, China
3. School of Computing, Macquarie University, Sydney, NSW 2109, Australia
4. Faculty of Engineering and Technology, i-CATS University College, Kuching 93350, Sarawak, Malaysia
Abstract
The emerging and promising paradigm of the Internet of Vehicles (IoV) employ vehicle-to-everything communication for facilitating vehicles to not only communicate with one another but also with the supporting roadside infrastructure, vulnerable pedestrians, and the backbone network in a bid to primarily address a number of safety-critical vehicular applications. Nevertheless, owing to the inherent characteristics of IoV networks, in particular, of being (a) highly dynamic in nature and which results in a continual change in the network topology and (b) non-deterministic owing to the intricate nature of its entities and their interrelationships, they are susceptible to a number of malicious attacks. Such kinds of attacks, if and when materialized, jeopardizes the entire IoV network, thereby putting human lives at risk. Whilst the cryptographic-based mechanisms are capable of mitigating the external attacks, the internal attacks are extremely hard to tackle. Trust, therefore, is an indispensable tool since it facilitates in the timely identification and eradication of malicious entities responsible for launching internal attacks in an IoV network. To date, there is no dataset pertinent to trust management in the context of IoV networks and the same has proven to be a bottleneck for conducting an in-depth research in this domain. The manuscript-at-hand, accordingly, presents a first of its kind trust-based IoV dataset encompassing 96,707 interactions amongst 79 vehicles at different time instances. The dataset involves nine salient trust parameters, i.e., packet delivery ratio, similarity, external similarity, internal similarity, familiarity, external familiarity, internal familiarity, reward/punishment, and context, which play a considerable role in ascertaining the trust of a vehicle within an IoV network.
Funder
Qilu Institute of Technology
Reference32 articles.
1. Interaction Trust-Driven Data Distribution for Vehicle Social Networks: A Matching Theory Approach;Cao;IEEE Trans. Comput. Soc. Syst.,2024
2. Blockchain-Enabled Trust Management Model for the Internet of Vehicles;Yang;IEEE Internet Things J.,2023
3. Security in Edge-Centric Intelligent Internet of Vehicles: Issues and Remedies;Adhikari;IEEE Consum. Electron. Mag.,2022
4. Yang, X., Zhu, F., Yang, X., Luo, J., Yi, X., Ning, J., and Huang, X. (2024). Secure Reputation-Based Authentication With Malicious Detection in VANETs. IEEE Trans. Dependable Secur. Comput., 1–15.
5. User-Centered Cooperative-Communication Strategy for 5G Internet of Vehicles;Zhang;IEEE Internet Things J.,2022