parties. We have also shown that whenever a vehicle
get sufficient information about the alert trustworthi-
ness, it may not run the remaining processes. This
fact may accelerate the decision-making process es-
pecially for time-critical applications.
5 CONCLUSIONS
This paper proposes a self-adaptive trust model for
VANETs. This model intends to handle with the spec-
ifications of each class of applications in a different
manner. The aim of our proposal is to enhance the
decision-making process, minimize both time and en-
ergy for decision-making and improve the network’s
security. We have applied this model on a real life
case to evaluate its performance and to show its ben-
efits. In the future, we plan to detail this proposal
and further to identify the appropriate techniques to
estimate the accurate trust value. Besides, we plan to
pay more attention to the quality of raw sensed data
in order to preserve the quality of the provided appli-
cations. Finally, we have to investigate and validate
the efficiency, scalability, robustness and overhead of
this model.
ACKNOWLEDGEMENTS
This work was supported by the PHC Utique pro-
gram of the French Ministry of Foreign Affairs and
Ministry of higher education and research and the
Tunisian Ministry of higher education and scientific
research in the CMCU project number 16G1404.
REFERENCES
Al Falasi, H. and Mohamed, N. (2015). Similarity-based
trust management system for detecting fake safety
messages in vanets. In International Conference on
Internet of Vehicles, pages 273–284. Springer.
Campolo, C., Molinaro, A., and Scopigno, R. (2015). Ve-
hicular ad hoc networks. Standards, Solutions, and
Research.
Dwivedi, S. and Dubey, R. (2016). Review in trust and
vehicle scenario in vanet. International Journal of
Future Generation Communication and Networking,
9(5):305–314.
Hu, H., Lu, R., and Zhang, Z. (2015). Vtrust: a robust
trust framework for relay selection in hybrid vehicular
communications. In Global Communications Confer-
ence (GLOBECOM), 2015 IEEE, pages 1–6. IEEE.
La Vinh, H. and Cavalli, A. R. (2014). Security attacks
and solutions in vehicular ad hoc networks: a survey.
International journal on AdHoc networking systems
(IJANS), 4(2):1–20.
Li, W. and Song, H. (2016). Art: An attack-resistant trust
management scheme for securing vehicular ad hoc
networks. IEEE Transactions on Intelligent Trans-
portation Systems, 17(4):960–969.
Mazilu, S., Teler, M., and Dobre, C. (2011). Securing ve-
hicular networks based on data-trust computation. In
P2P, Parallel, Grid, Cloud and Internet Computing
(3PGCIC), 2011 International Conference on, pages
51–58. IEEE.
Oluoch, J. O. (2015). A unified framework for trust manage-
ment in Vehicular Ad Hoc Networks (VANET). PhD
thesis, Oakland University.
Płaczek, B. and Bernas, M. (2016). Detection of malicious
data in vehicular ad hoc networks for traffic signal
control applications. In International Conference on
Computer Networks, pages 72–82. Springer.
Raya, M., Papadimitratos, P., Gligor, V. D., and Hubaux,
J.-P. (2008). On data-centric trust establishment in
ephemeral ad hoc networks. In INFOCOM 2008.
The 27th Conference on Computer Communications.
IEEE, pages 1238–1246. IEEE.
Soleymani, S. A., Abdullah, A. H., Hassan, W. H., Anisi,
M. H., Goudarzi, S., Baee, M. A. R., and Man-
dala, S. (2015). Trust management in vehicular ad
hoc network: a systematic review. EURASIP Jour-
nal on Wireless Communications and Networking,
2015(1):146.
Soni, S., Sharma, K., and Chaurasia, B. K. (2015). Trust
based scheme for location finding in vanets. In Ad-
vances in Optical Science and Engineering, pages
425–432. Springer.
Wei, Z., Yu, F. R., and Boukerche, A. (2014). Trust based
security enhancements for vehicular ad hocnetworks.
In Proceedings of the fourth ACM international sym-
posium on Development and analysis of intelligent ve-
hicular networks and applications, pages 103–109.
ACM.
Yang, N. (2013). A similarity based trust and reputa-
tion management framework for vanets. International
Journal of Future Generation Communication and
Networking, 6(2):25–34.
Yao, X., Zhang, X., Ning, H., and Li, P. (2017). Using trust
model to ensure reliable data acquisition in vanets. Ad
Hoc Networks, 55:107–118.
Zaidi, K., Milojevic, M., Rakocevic, V., and Rajarajan, M.
(2014). Data-centric rogue node detection in vanets.
In Trust, Security and Privacy in Computing and
Communications (TrustCom), 2014 IEEE 13th Inter-
national Conference on, pages 398–405. IEEE.
Zhang, J. (2011). A survey on trust management for
vanets. In Advanced information networking and ap-
plications (AINA), 2011 IEEE international confer-
ence on, pages 105–112. IEEE.