Skip to main content
Erschienen in: Journal of Reliable Intelligent Environments 4/2023

05.12.2022 | Original Article

Privacy, reputation, and incentive provision for vehicular social networks

verfasst von: Sanaz Zamani, Behrouz Tork Ladani, Maede Ashouri Talouki

Erschienen in: Journal of Reliable Intelligent Environments | Ausgabe 4/2023

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Nowadays, the increasing use of internet in vehicular environments leads to the Vehicular Social Network (VSN) concept as an instance of Internet of Things applications in transportation industry. Information sharing between users in vehicular networks should be done in a privacy-preserving manner, especially users’ location privacy should be preserved. It is also essential to motivate users to participate in the information-sharing system. Moreover, users should be encouraged to behave honestly in the system. This paper presents an information-sharing scheme in VSN, in which not only preserving the privacy of users is supported, but also provides sufficient incentives for users to participate in the system. In addition, the reputation factor is used to encourage users to behave honestly. In the proposed scheme, the Internet platform (Internet of Vehicles) is used for information sharing instead of using the commonly used short-range communication. Furthermore, a ticketing system is used for motivating users to participate in the system. To evaluate the proposed scheme, the Veins simulation tool is used along with the actual data in the Créteil data set. The results of evaluation and analysis of the proposed method show that the quality of the delivered messages affects the number of rewards received by users and also the system works in a fair manner. On the other hand, the system operation is monitored in the presence of whitewashing and slandering attackers. As the result, the proposed system could be reliable in the presence of certain percentages of attackers, depending on the used operation modes. Finally, to ensure the privacy of users, the appropriate size for the areas of movement of vehicles has been analyzed and discussed.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Butt TA et al (2018) Social Internet of Vehicles: architecture and enabling technologies. Comput Electr Eng 69:68–84CrossRef Butt TA et al (2018) Social Internet of Vehicles: architecture and enabling technologies. Comput Electr Eng 69:68–84CrossRef
2.
Zurück zum Zitat Kang J et al (2017) Privacy-preserved pseudonym scheme for fog computing supported internet of vehicles. IEEE Trans Intell Transp Syst 19(8):2627–2637CrossRef Kang J et al (2017) Privacy-preserved pseudonym scheme for fog computing supported internet of vehicles. IEEE Trans Intell Transp Syst 19(8):2627–2637CrossRef
3.
Zurück zum Zitat Kang J et al (2016) Location privacy attacks and defenses in cloud-enabled internet of vehicles. IEEE Wirel Commun 23(5):52–59MathSciNetCrossRef Kang J et al (2016) Location privacy attacks and defenses in cloud-enabled internet of vehicles. IEEE Wirel Commun 23(5):52–59MathSciNetCrossRef
4.
Zurück zum Zitat Bouchelaghem S, Omar M (2020) Secure and efficient pseudonymization for privacy-preserving vehicular communications in smart cities. Comput Electr Eng 82:106557CrossRef Bouchelaghem S, Omar M (2020) Secure and efficient pseudonymization for privacy-preserving vehicular communications in smart cities. Comput Electr Eng 82:106557CrossRef
5.
Zurück zum Zitat Khodaei M, Papadimitratos P (2020) Cooperative location privacy in vehicular networks: why simple mix-zones are not enough. IEEE Internet Things J 8(10):7985–8004CrossRef Khodaei M, Papadimitratos P (2020) Cooperative location privacy in vehicular networks: why simple mix-zones are not enough. IEEE Internet Things J 8(10):7985–8004CrossRef
6.
Zurück zum Zitat Firdaus M, Rhee K-H (2021) On blockchain-enhanced secure data storage and sharing in vehicular edge computing networks. Appl Sci 11(1):414CrossRef Firdaus M, Rhee K-H (2021) On blockchain-enhanced secure data storage and sharing in vehicular edge computing networks. Appl Sci 11(1):414CrossRef
7.
Zurück zum Zitat Roy A, Madria S (2020) Distributed incentive-based secured traffic monitoring in vanets. In: 2020 21st IEEE International Conference on Mobile Data Management (MDM). IEEE, Versailles, France Roy A, Madria S (2020) Distributed incentive-based secured traffic monitoring in vanets. In: 2020 21st IEEE International Conference on Mobile Data Management (MDM). IEEE, Versailles, France
8.
Zurück zum Zitat Liu J et al (2021) Cooperation promotion from the perspective of behavioral economics: an incentive mechanism based on loss aversion in vehicular Ad-Hoc networks. Electronics 10(3):225CrossRef Liu J et al (2021) Cooperation promotion from the perspective of behavioral economics: an incentive mechanism based on loss aversion in vehicular Ad-Hoc networks. Electronics 10(3):225CrossRef
9.
Zurück zum Zitat Iftikhar MS et al (2020) An incentive scheme for VANETs based on Traffic Event Validation using blockchain. In: 2020 International Wireless Communications and Mobile Computing (IWCMC). IEEE, Limassol, Cyprus, p 2133–2137 Iftikhar MS et al (2020) An incentive scheme for VANETs based on Traffic Event Validation using blockchain. In: 2020 International Wireless Communications and Mobile Computing (IWCMC). IEEE, Limassol, Cyprus, p 2133–2137
10.
Zurück zum Zitat Rehman G-U et al (2019) Ips: Incentive and punishment scheme for omitting selfishness in the internet of vehicles (iov). IEEE Access 7:109026–109037CrossRef Rehman G-U et al (2019) Ips: Incentive and punishment scheme for omitting selfishness in the internet of vehicles (iov). IEEE Access 7:109026–109037CrossRef
11.
Zurück zum Zitat Inedjaren Y et al (2021) Blockchain-based distributed management system for trust in VANET. Veh Commun 30:100350 Inedjaren Y et al (2021) Blockchain-based distributed management system for trust in VANET. Veh Commun 30:100350
12.
Zurück zum Zitat Lo N-W, Tsai H-C (2009) A reputation system for traffic safety event on vehicular ad hoc networks. EURASIP J Wirel Commun Netw 2009(1):125348CrossRef Lo N-W, Tsai H-C (2009) A reputation system for traffic safety event on vehicular ad hoc networks. EURASIP J Wirel Commun Netw 2009(1):125348CrossRef
13.
Zurück zum Zitat Cheng H et al (2021) PPVF: privacy-preserving protocol for vehicle feedback in cloud-assisted VANET. IEEE Trans Intell Transport Syst 23(7): 9391–9403CrossRef Cheng H et al (2021) PPVF: privacy-preserving protocol for vehicle feedback in cloud-assisted VANET. IEEE Trans Intell Transport Syst 23(7): 9391–9403CrossRef
14.
Zurück zum Zitat Raya M et al (2008) On data-centric trust establishment in ephemeral ad hoc networks. In: IEEE INFOCOM 2008-The 27th Conference on Computer Communications. IEEE, Phoenix, AZ, USA, p 1238–1246 Raya M et al (2008) On data-centric trust establishment in ephemeral ad hoc networks. In: IEEE INFOCOM 2008-The 27th Conference on Computer Communications. IEEE, Phoenix, AZ, USA, p 1238–1246
15.
Zurück zum Zitat Soleymani SA et al (2021) A security and privacy scheme based on node and message authentication and trust in fog-enabled VANET. Veh Commun 29:100335 Soleymani SA et al (2021) A security and privacy scheme based on node and message authentication and trust in fog-enabled VANET. Veh Commun 29:100335
16.
Zurück zum Zitat Xiao X et al (2018) CenLocShare: a centralized privacy-preserving location-sharing system for mobile online social networks. Futur Gener Comput Syst 86:863–872CrossRef Xiao X et al (2018) CenLocShare: a centralized privacy-preserving location-sharing system for mobile online social networks. Futur Gener Comput Syst 86:863–872CrossRef
17.
Zurück zum Zitat Sun J et al (2010) An identity-based security system for user privacy in vehicular ad hoc networks. IEEE Trans Parallel Distrib Syst 21(9):1227–1239CrossRef Sun J et al (2010) An identity-based security system for user privacy in vehicular ad hoc networks. IEEE Trans Parallel Distrib Syst 21(9):1227–1239CrossRef
18.
Zurück zum Zitat Sutrala AK et al (2020) On the design of conditional privacy preserving batch verification-based authentication scheme for Internet of vehicles deployment. IEEE Trans Veh Technol 69(5):5535–5548CrossRef Sutrala AK et al (2020) On the design of conditional privacy preserving batch verification-based authentication scheme for Internet of vehicles deployment. IEEE Trans Veh Technol 69(5):5535–5548CrossRef
19.
Zurück zum Zitat Lu H, Li J, Guizani M (2012) A novel ID-based authentication framework with adaptive privacy preservation for VANETs. In: 2012 Computing, Communications and Applications Conference. IEEE, Hong Kong, China, p 345–350 Lu H, Li J, Guizani M (2012) A novel ID-based authentication framework with adaptive privacy preservation for VANETs. In: 2012 Computing, Communications and Applications Conference. IEEE, Hong Kong, China, p 345–350
20.
Zurück zum Zitat Zhang J et al (2020) SMAKA: secure many-to-many authentication and key agreement scheme for vehicular networks. IEEE Trans Inf Forensics Secur 16:1810–1824CrossRef Zhang J et al (2020) SMAKA: secure many-to-many authentication and key agreement scheme for vehicular networks. IEEE Trans Inf Forensics Secur 16:1810–1824CrossRef
21.
Zurück zum Zitat Zhang X et al (2021) Efficient privacy-preserving anonymous authentication protocol for vehicular ad-hoc networks. Wireless Pers Commun 120(4):3171–3187MathSciNetCrossRef Zhang X et al (2021) Efficient privacy-preserving anonymous authentication protocol for vehicular ad-hoc networks. Wireless Pers Commun 120(4):3171–3187MathSciNetCrossRef
22.
Zurück zum Zitat Jiang H, Hua L, Wahab L (2021) SAES: a self-checking authentication scheme with higher efficiency and security for VANET. Peer-to-Peer Netw Appl 14(2):528–540CrossRef Jiang H, Hua L, Wahab L (2021) SAES: a self-checking authentication scheme with higher efficiency and security for VANET. Peer-to-Peer Netw Appl 14(2):528–540CrossRef
23.
Zurück zum Zitat Wang N-W, Huang Y-M, Chen W-M (2008) A novel secure communication scheme in vehicular ad hoc networks. Comput Commun 31(12):2827–2837CrossRef Wang N-W, Huang Y-M, Chen W-M (2008) A novel secure communication scheme in vehicular ad hoc networks. Comput Commun 31(12):2827–2837CrossRef
24.
Zurück zum Zitat Chen C-M et al (2019) A secure authentication protocol for internet of vehicles. IEEE Access 7:12047–12057CrossRef Chen C-M et al (2019) A secure authentication protocol for internet of vehicles. IEEE Access 7:12047–12057CrossRef
25.
Zurück zum Zitat Wu Q, Domingo-Ferrer J, González-Nicolás U (2009) Balanced trustworthiness, safety, and privacy in vehicle-to-vehicle communications. IEEE Trans Veh Technol 59(2):559–573 Wu Q, Domingo-Ferrer J, González-Nicolás U (2009) Balanced trustworthiness, safety, and privacy in vehicle-to-vehicle communications. IEEE Trans Veh Technol 59(2):559–573
26.
Zurück zum Zitat Lu Y et al (2020) Blockchain empowered asynchronous federated learning for secure data sharing in internet of vehicles. IEEE Trans Veh Technol 69(4):4298–4311MathSciNetCrossRef Lu Y et al (2020) Blockchain empowered asynchronous federated learning for secure data sharing in internet of vehicles. IEEE Trans Veh Technol 69(4):4298–4311MathSciNetCrossRef
27.
Zurück zum Zitat Sarr AP, Elbaz-Vincent P, Bajard JC (2009) A secure and efficient authenticated diffie–hellman protocol. In: European Public Key Infrastructure Workshop. Springer, Berlin, Heidelberg, p 83–98 Sarr AP, Elbaz-Vincent P, Bajard JC (2009) A secure and efficient authenticated diffie–hellman protocol. In: European Public Key Infrastructure Workshop. Springer, Berlin, Heidelberg, p 83–98
29.
Zurück zum Zitat Sommer C et al (2019) Veins: the open source vehicular network simulation framework. Recent advances in network simulation. Springer, pp 215–252CrossRef Sommer C et al (2019) Veins: the open source vehicular network simulation framework. Recent advances in network simulation. Springer, pp 215–252CrossRef
30.
Zurück zum Zitat Krajzewicz D et al (2002) SUMO (Simulation of Urban MObility)-an open-source traffic simulation. In: Proceedings of the 4th middle East Symposium on Simulation and Modelling (MESM20002), Sharjah, United Arab Emirates, p 183–187 Krajzewicz D et al (2002) SUMO (Simulation of Urban MObility)-an open-source traffic simulation. In: Proceedings of the 4th middle East Symposium on Simulation and Modelling (MESM20002), Sharjah, United Arab Emirates, p 183–187
Metadaten
Titel
Privacy, reputation, and incentive provision for vehicular social networks
verfasst von
Sanaz Zamani
Behrouz Tork Ladani
Maede Ashouri Talouki
Publikationsdatum
05.12.2022
Verlag
Springer International Publishing
Erschienen in
Journal of Reliable Intelligent Environments / Ausgabe 4/2023
Print ISSN: 2199-4668
Elektronische ISSN: 2199-4676
DOI
https://doi.org/10.1007/s40860-022-00195-0

Weitere Artikel der Ausgabe 4/2023

Journal of Reliable Intelligent Environments 4/2023 Zur Ausgabe

Editorial

Editorial

Premium Partner