
6 CONCLUSIONS
The paper introduces a decentralized trust manage-
ment model for electing trustworthy Manager SRS
and forming stable clusters. It ensures continuous
cluster monitoring by tracking Manager SRS behav-
ior via collaborative assessment among subordinate
SRSs. The proposed model integrates the stabil-
ity of infrastructure-based evaluation with the scal-
ability and resilience of decentralized trust architec-
ture. Self-organizing clustering dynamically selects
trusted Managers, reducing communication overhead
and eliminating single point failures. Trust compu-
tation, using fuzzy logic and DST, increases the ac-
curacy of trust evaluation by handling the uncertainty
of the input and the conflicted outputs of the SRSs.
Simulation-based evaluation reveals resilience against
OOA, PDA, JA, BMA, and CA but struggles with col-
lusion and BMA when malicious SRSs exceed 2/3 of
the total. Despite potential computational complex-
ity, combining fuzzy inference with DST strength-
ens the network, offering robustness and flexibility
for uncertain and conflicting evidence. Future work
includes evaluating response time and incorporating
social metrics like honesty and cooperativeness to en-
hance trust evaluation accuracy.
ACKNOWLEDGEMENTS
The research leading to these results has received
funding from the Ministry of Higher Education, Re-
search and Innovation of the Sultanate of Oman under
the Block Funding Program. Block Funding Agree-
ment No [BFP/RGP/ICT/22/327].
The English quality of the paper is enhanced using
the AI assistant Claude (Anthropic, 2023).
REFERENCES
Abidi, R., Sahli, N., Trojet, W., Azzouna, N. B., and Hob-
los, G. (2023). An infrastructure-based trust manage-
ment framework for cooperative its. In VEHITS, pages
329–336.
Akwirry, B., Bessis, N., Malik, H., and McHale, S. (2022).
A multi-tier trust-based security mechanism for ve-
hicular ad-hoc network communications. Sensors,
22(21):8285.
Alsuhli, G. H., Khattab, A., Fahmy, Y. A., et al. (2019).
Double-head clustering for resilient vanets. Wireless
communications and mobile computing, 2019.
Anthropic (2023). Claude - AI assistant. https://www.an
thropic.com/claude. [Online; accessed 23-February-
2023].
Eunice, K. S. and Juvanna, I. (2019). Secured multi-
hop clustering protocol for location-based routing in
vanets. International Journal of Advanced Computer
Science and Applications, 10(4).
Fatemidokht, H. and Kuchaki Rafsanjani, M. (2020). Qmm-
vanet: An efficient clustering algorithm based on qos
and monitoring of malicious vehicles in vehicular
ad hoc networks. Journal of Systems and Software,
165:110561.
Gupta, C., Singh, L., and Tiwari, R. (2023). Malicious
node detection in vehicular ad-hoc network (vanet)
using enhanced beacon trust management with clus-
tering protocol (ebtm-cp). Wireless Personal Commu-
nications, 130(1):321–346.
Hasrouny, H., Samhat, A. E., Bassil, C., and Laouiti,
A. (2019). Trust model for secure group leader-
based communications in vanet. Wireless Networks,
25:4639–4661.
Kchaou, A., Abassi, R., and El Fatmi, S. G. (2018). To-
wards a secured clustering mechanism for messages
exchange in vanet. In 2018 32nd International Con-
ference on Advanced Information Networking and Ap-
plications Workshops (WAINA), pages 88–93.
Kerrache, C. A. (2022). A trust-aware cluster-based com-
munication architecture for vehicular named data net-
working. ITU J. on Future and Evolving Technologies.
Pedrycz, W. (1994). Why triangular membership functions?
Fuzzy Sets and Systems, 64(1):21–30.
Rahim, R. et al. (2017). Comparative analysis of member-
ship function on mamdani fuzzy inference system for
decision making. In Journal of Physics: Conference
Series, volume 930, page 012029. IOP Publishing.
Saade, J. and Diab, H. (2000). Defuzzification techniques
for fuzzy controllers. IEEE Transactions on Sys-
tems, Man, and Cybernetics, Part B (Cybernetics),
30(1):223–229.
Sahli, N., Trojet, W., Zhang, Z., and Abdallah, N. O.
(2022). Towards a network of dynamic message signs
for congestion alerting. Computing and Informatics,
41(2):609–626.
Shetty, S. R. and Manjaiah, D. H. (2022). A comprehen-
sive study of security attack on vanet. In Sharma, N.,
Chakrabarti, A., Balas, V. E., and Bruckstein, A. M.,
editors, Data Management, Analytics and Innovation,
pages 407–428, Singapore. Springer Singapore.
Siddiqua, F. and Jahan, M. (2022). A trust-based malicious
rsu detection mechanism in edge-enabled vehicular ad
hoc networks. arXiv preprint arXiv:2208.05680.
Souissi, I., Abidi, R., Azzouna, N. B., Berradia, T., and
Said, L. B. (2023). Ecotrust: A novel model for en-
ergy consumption trust assurance in electric vehicular
networks. Ad Hoc Networks, 149:103246.
Umoren, I. J., Asuquo, D. E., Gilean, O., and Esang, M.
(2019). Performability of retransmission of loss pack-
ets in wireless sensor networks. Comput. Inf. Sci.,
12(2):71–86.
Zadeh, L. A. (2004). A note on web intelligence, world
knowledge and fuzzy logic. Data & Knowledge Engi-
neering, 50(3):291–304. Special jubilee issue: DKE
50.
Infrastructure-Based Communication Trust Model for Intelligent Transportation Systems
521