From: TSME: a trust-based security scheme for message exchange in vehicular Ad hoc networks
Resources | Notation | Negotiation policies |
---|---|---|
Position | \(p_{v_{i}}\) | \(P1(v_{i}):-\) |
Manufacturer | \(c_{v_{i}}\) | \(P2(v_{i}):-\) |
Identifier | \(Id_{v_{i}}\) | \(P3(v_{i}):p_{v_{j}}\wedge c_{v_{j}}\) |
Photo | \(ph_{v_{i}}\) | \(P4(v_{i}):p_{v_{j}}\wedge c_{v_{j}}\wedge Id_{v_{j}}\) |
Velocity | \(vel_{v_{i}}\) | \(P5(v_{i}):p_{v_{j}}\wedge c_{v_{j}}\wedge vel_{v_{j}}\) |
Driver identity | \(dId_{v_{i}}\) | \(P6(v_{i}):Id_{v_{j}}\wedge d_{v_{j}}\wedge dId_{v_{j}}\) |
Direction | \(d_{v_{i}}\) | \(P7(v_{i}):vel_{v_{j}}\wedge dId_{v_{j}}\wedge d_{v_{j}}\) |