Skip to main content
Erschienen in: Wireless Networks 6/2020

20.04.2020

Vehicular networks with security and trust management solutions: proposed secured message exchange via blockchain technology

verfasst von: Nisha Malik, Priyadarsi Nanda, Xiangjian He, Ren Ping Liu

Erschienen in: Wireless Networks | Ausgabe 6/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In vehicular ad hoc networks (VANET), effective trust establishment with authentication is an important requirement. Trust management among communicating vehicles is significant for secure message transmission; however, very less contributions have been made towards evaluating the trustworthiness of the node. This research work intends to introduce a new trust management system in VANET with two major phases: secured message transmission and node trustability prediction. The security assured message passing is carried out by incorporating the privacy preservation model under the data sanitization process. The key used for the sanitization process is optimally tuned by a new hybrid algorithm termed Sea Lion Explored-Whale Optimization Algorithm, which is the combination of Whale Optimization Algorithm and Sea Lion Optimization Algorithm, respectively. The blockchain technology is assisted to handle the key generated by the nodes. Subsequently, the trustability of the node is evaluated under novel specifics “two-level evaluation process” with a rule-based and machine learning-based evaluation process. Finally, the performance of the proposed model is verified and proved over other conventional methods for certain measures.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Kumar, A., & Gupta, M. (2018). A review on activities of fifth generation mobile communication system. Alexandria Engineering Journal,57(2), 1125–1135.CrossRef Kumar, A., & Gupta, M. (2018). A review on activities of fifth generation mobile communication system. Alexandria Engineering Journal,57(2), 1125–1135.CrossRef
2.
Zurück zum Zitat Mukherjee, A., & De, D. (2016). Femtolet: A novel fifth generation network device for green mobile cloud computing. Simulation Modelling Practice and Theory,62, 68–87.CrossRef Mukherjee, A., & De, D. (2016). Femtolet: A novel fifth generation network device for green mobile cloud computing. Simulation Modelling Practice and Theory,62, 68–87.CrossRef
3.
Zurück zum Zitat Feijóo, C., Gómez-Barroso, J. L., & Ramos, S. (2016). Techno-economic implications of the mass-market uptake of mobile data services: Requirements for next generation mobile networks. Telematics and Informatics,33(2), 600–612.CrossRef Feijóo, C., Gómez-Barroso, J. L., & Ramos, S. (2016). Techno-economic implications of the mass-market uptake of mobile data services: Requirements for next generation mobile networks. Telematics and Informatics,33(2), 600–612.CrossRef
4.
Zurück zum Zitat Habbal, A., Goudar, S. I., & Hassan, S. (2019). A context-aware radio access technology selection mechanism in 5G mobile network for smart city applications. Journal of Network and Computer Applications,135, 97–107.CrossRef Habbal, A., Goudar, S. I., & Hassan, S. (2019). A context-aware radio access technology selection mechanism in 5G mobile network for smart city applications. Journal of Network and Computer Applications,135, 97–107.CrossRef
5.
Zurück zum Zitat Benrhaiem, W., & Hafid, A. S. (2019). Bayesian networks based reliable broadcast in vehicular networks. Vehicular Communications, 21, 100181.CrossRef Benrhaiem, W., & Hafid, A. S. (2019). Bayesian networks based reliable broadcast in vehicular networks. Vehicular Communications, 21, 100181.CrossRef
6.
Zurück zum Zitat Urra, O., & Ilarri, S. (2019). Spatial crowdsourcing with mobile agents in vehicular networks. Vehicular Communications,17, 10–34.CrossRef Urra, O., & Ilarri, S. (2019). Spatial crowdsourcing with mobile agents in vehicular networks. Vehicular Communications,17, 10–34.CrossRef
7.
Zurück zum Zitat Osman, R. A., Peng, X. H., & Omar, M. A. (2019). Adaptive cooperative communications for enhancing QoS in vehicular networks. Physical Communication,34, 285–294.CrossRef Osman, R. A., Peng, X. H., & Omar, M. A. (2019). Adaptive cooperative communications for enhancing QoS in vehicular networks. Physical Communication,34, 285–294.CrossRef
8.
Zurück zum Zitat Hussain, R., Hussain, F., & Zeadally, S. (2019). Integration of VANET and 5G security: A review of design and implementation issues. Future Generation Computer Systems,101, 843–864.CrossRef Hussain, R., Hussain, F., & Zeadally, S. (2019). Integration of VANET and 5G security: A review of design and implementation issues. Future Generation Computer Systems,101, 843–864.CrossRef
9.
Zurück zum Zitat Hasrouny, H., Samhat, A. E., Bassil, C., & Laouiti, A. (2019). Detection and efficient revocation within VANET. Journal of Information Security and Applications,46, 193–209.CrossRef Hasrouny, H., Samhat, A. E., Bassil, C., & Laouiti, A. (2019). Detection and efficient revocation within VANET. Journal of Information Security and Applications,46, 193–209.CrossRef
10.
Zurück zum Zitat Arif, M., Wang, G., Bhuiyan, M. Z. A., Wang, T., & Chen, T. (2019). A survey on security attacks in VANETs: Communication, applications and challenges. Vehicular Communications, 19, 100179.CrossRef Arif, M., Wang, G., Bhuiyan, M. Z. A., Wang, T., & Chen, T. (2019). A survey on security attacks in VANETs: Communication, applications and challenges. Vehicular Communications, 19, 100179.CrossRef
11.
Zurück zum Zitat Kang, J., Lin, D., Jiang, W., & Bertino, E. (2018). Highly efficient randomized authentication in VANETs. Pervasive and Mobile Computing,44, 31–44.CrossRef Kang, J., Lin, D., Jiang, W., & Bertino, E. (2018). Highly efficient randomized authentication in VANETs. Pervasive and Mobile Computing,44, 31–44.CrossRef
12.
Zurück zum Zitat Shrestha, R., Bajracharya, R., Shrestha, A. P., & Nam, S. Y. (2019). A new type of blockchain for secure message exchange in VANET. Digital Communications and Networks(in press). Shrestha, R., Bajracharya, R., Shrestha, A. P., & Nam, S. Y. (2019). A new type of blockchain for secure message exchange in VANET. Digital Communications and Networks(in press).
13.
Zurück zum Zitat Yang, Z., Yang, K., Lei, L., Zheng, K., & Leung, V. C. M. (2019). Blockchain-based decentralized trust management in vehicular networks. IEEE Internet of Things Journal,6(2), 1495–1505.CrossRef Yang, Z., Yang, K., Lei, L., Zheng, K., & Leung, V. C. M. (2019). Blockchain-based decentralized trust management in vehicular networks. IEEE Internet of Things Journal,6(2), 1495–1505.CrossRef
14.
Zurück zum Zitat Singh, M., & Kim, S. (2018). Branch based blockchain technology in intelligent vehicle. Computer Networks,145, 219–231.CrossRef Singh, M., & Kim, S. (2018). Branch based blockchain technology in intelligent vehicle. Computer Networks,145, 219–231.CrossRef
15.
Zurück zum Zitat Bylykbashi, K., Elmazi, D., Matsuo, K., Ikeda, M., & Barolli, L. (2019). Effect of security and trustworthiness for a fuzzy cluster management system in VANETs. Cognitive Systems Research,55, 153–163.CrossRef Bylykbashi, K., Elmazi, D., Matsuo, K., Ikeda, M., & Barolli, L. (2019). Effect of security and trustworthiness for a fuzzy cluster management system in VANETs. Cognitive Systems Research,55, 153–163.CrossRef
16.
Zurück zum Zitat Cirne, P., Zúquete, A., & Sargento, S. (2018). TROPHY: Trustworthy VANET routing with group authentication keys. Ad Hoc Networks,71, 45–67.CrossRef Cirne, P., Zúquete, A., & Sargento, S. (2018). TROPHY: Trustworthy VANET routing with group authentication keys. Ad Hoc Networks,71, 45–67.CrossRef
17.
Zurück zum Zitat Zhao, J., Wu, Z., Wang, Y., & Ma, X. (2019). Adaptive optimization of QoS constraint transmission capacity of VANET. Vehicular Communications,17, 1–9.CrossRef Zhao, J., Wu, Z., Wang, Y., & Ma, X. (2019). Adaptive optimization of QoS constraint transmission capacity of VANET. Vehicular Communications,17, 1–9.CrossRef
18.
Zurück zum Zitat Debnath, A., Basumatary, H., Tarafdar, A., DebBarma, M. K., & Bhattacharyya, B. K. (2019). Center of mass and junction based data routing method to increase the QoS in VANET. AEU - International Journal of Electronics and Communications,108, 36–44.CrossRef Debnath, A., Basumatary, H., Tarafdar, A., DebBarma, M. K., & Bhattacharyya, B. K. (2019). Center of mass and junction based data routing method to increase the QoS in VANET. AEU - International Journal of Electronics and Communications,108, 36–44.CrossRef
19.
Zurück zum Zitat Jadhav, P. P., & Joshi, S. D. (2019). WOADF: Whale optimization integrated adaptive dragonfly algorithm enabled with the TDD properties for model transformation. International Journal of Computational Intelligence and Applications, 18(4), 1950026.CrossRef Jadhav, P. P., & Joshi, S. D. (2019). WOADF: Whale optimization integrated adaptive dragonfly algorithm enabled with the TDD properties for model transformation. International Journal of Computational Intelligence and Applications, 18(4), 1950026.CrossRef
20.
Zurück zum Zitat Revathi, K., & Krishnamoorthy, N. (2015). The performance analysis of swallow swarm optimization algorithm. In Proceedings of the 2nd international conference on electronics and communication systems (ICECS). Revathi, K., & Krishnamoorthy, N. (2015). The performance analysis of swallow swarm optimization algorithm. In Proceedings of the 2nd international conference on electronics and communication systems (ICECS).
21.
Zurück zum Zitat Remmiya, R., & Abisha, C. (2018). Artifacts removal in EEG signal using a NARX model based CS learning algorithm. Multimedia Research,1(1), 1–8. Remmiya, R., & Abisha, C. (2018). Artifacts removal in EEG signal using a NARX model based CS learning algorithm. Multimedia Research,1(1), 1–8.
22.
Zurück zum Zitat Shrestha, R., Bajracharya, R., Shrestha, A. P., & Nam, S. Y. (2019). A new type of blockchain for secure message exchange in VANET. Digital Communications and Networks. Shrestha, R., Bajracharya, R., Shrestha, A. P., & Nam, S. Y. (2019). A new type of blockchain for secure message exchange in VANET. Digital Communications and Networks.
23.
Zurück zum Zitat Lu, Z., Liu, W., Wang, Q., Qu, G., & Liu, Z. (2018). A privacy-preserving trust model based on blockchain for VANETs. IEEE Access,6, 45655–45664.CrossRef Lu, Z., Liu, W., Wang, Q., Qu, G., & Liu, Z. (2018). A privacy-preserving trust model based on blockchain for VANETs. IEEE Access,6, 45655–45664.CrossRef
24.
Zurück zum Zitat He, Y., Yu, F. R., Wei, Z., & Leung, V. (2019). Trust management for secure cognitive radio vehicular ad hoc networks. Ad Hoc Networks,86, 154–165.CrossRef He, Y., Yu, F. R., Wei, Z., & Leung, V. (2019). Trust management for secure cognitive radio vehicular ad hoc networks. Ad Hoc Networks,86, 154–165.CrossRef
25.
Zurück zum Zitat Liang, J., Chen, J., Zhu, Y., & Yu, R. (2019). A novel intrusion detection system for vehicular ad hoc networks (VANETs) based on differences of traffic flow and position. Applied Soft Computing,75, 712.CrossRef Liang, J., Chen, J., Zhu, Y., & Yu, R. (2019). A novel intrusion detection system for vehicular ad hoc networks (VANETs) based on differences of traffic flow and position. Applied Soft Computing,75, 712.CrossRef
26.
Zurück zum Zitat Ali, I., Gervais, M., Ahene, E., & Li, F. (2019). A blockchain-based certificateless public key signature scheme for vehicle-to-infrastructure communication in VANETs. Journal of Systems Architecture, 99, 101636.CrossRef Ali, I., Gervais, M., Ahene, E., & Li, F. (2019). A blockchain-based certificateless public key signature scheme for vehicle-to-infrastructure communication in VANETs. Journal of Systems Architecture, 99, 101636.CrossRef
27.
Zurück zum Zitat Hasrouny, H., Samhat, A. E., Bassil, C., & Laouiti, A. (2018). Trust model for secure group leader-based communications in VANET. Wireless Networks, 25(8), 4639–4661.CrossRef Hasrouny, H., Samhat, A. E., Bassil, C., & Laouiti, A. (2018). Trust model for secure group leader-based communications in VANET. Wireless Networks, 25(8), 4639–4661.CrossRef
28.
Zurück zum Zitat Li, H., Pei, L., Liao, D., Sun, G., & Xu, D. (2019). Blockchain meets VANET: An architecture for identity and location privacy protection in VANET. Peer-to-Peer Networking and Applications,12(5), 1178–1193.CrossRef Li, H., Pei, L., Liao, D., Sun, G., & Xu, D. (2019). Blockchain meets VANET: An architecture for identity and location privacy protection in VANET. Peer-to-Peer Networking and Applications,12(5), 1178–1193.CrossRef
29.
Zurück zum Zitat Mohan, Y., Chee, S. S., Xin, D. K. P., & Foong, L. P. (2016). Artificial neural network for classification of depressive and normal in EEG. In 2016 IEEE EMBS conference on biomedical engineering and sciences (IECBES). Mohan, Y., Chee, S. S., Xin, D. K. P., & Foong, L. P. (2016). Artificial neural network for classification of depressive and normal in EEG. In 2016 IEEE EMBS conference on biomedical engineering and sciences (IECBES).
30.
Zurück zum Zitat Masadeh, R., Mahafzah, B. A., & Sharieh, A. (2019). Sea Lion Optimization Algorithm. (IJACSA) International Journal of Advanced Computer Science and Applications, 10(5). Masadeh, R., Mahafzah, B. A., & Sharieh, A. (2019). Sea Lion Optimization Algorithm. (IJACSA) International Journal of Advanced Computer Science and Applications, 10(5).
31.
Zurück zum Zitat Mirjalili, S., & Lewis, A. (2016). The Whale Optimization Algorithm. Advances in Engineering Software,95, 51–67.CrossRef Mirjalili, S., & Lewis, A. (2016). The Whale Optimization Algorithm. Advances in Engineering Software,95, 51–67.CrossRef
32.
Zurück zum Zitat Hsu, C.-C., Lin, S.-H., & Tai, W.-S. (2011). Apply extended self-organizing map to cluster and classify mixed-type data. Neurocomputing,74(18), 3832–3842.CrossRef Hsu, C.-C., Lin, S.-H., & Tai, W.-S. (2011). Apply extended self-organizing map to cluster and classify mixed-type data. Neurocomputing,74(18), 3832–3842.CrossRef
33.
Zurück zum Zitat Tai, W.-S., & Hsu, C.-C. (2012). Growing self-organizing map with cross insert for mixed-type data clustering. Applied Soft Computing,12(9), 2856–2866.CrossRef Tai, W.-S., & Hsu, C.-C. (2012). Growing self-organizing map with cross insert for mixed-type data clustering. Applied Soft Computing,12(9), 2856–2866.CrossRef
34.
Zurück zum Zitat McCall, J. (2005). Genetic algorithms for modelling and optimisation. Journal of Computational and Applied Mathematics,184(1), 205–222.MathSciNetCrossRef McCall, J. (2005). Genetic algorithms for modelling and optimisation. Journal of Computational and Applied Mathematics,184(1), 205–222.MathSciNetCrossRef
35.
Zurück zum Zitat Jafari, M., & Chaleshtari, M. H. B. (2017). Using dragonfly algorithm for optimization of orthotropic infinite plates with a quasi-triangular cut-out. European Journal of Mechanics A/Solids,66, 1–14.MathSciNetCrossRef Jafari, M., & Chaleshtari, M. H. B. (2017). Using dragonfly algorithm for optimization of orthotropic infinite plates with a quasi-triangular cut-out. European Journal of Mechanics A/Solids,66, 1–14.MathSciNetCrossRef
Metadaten
Titel
Vehicular networks with security and trust management solutions: proposed secured message exchange via blockchain technology
verfasst von
Nisha Malik
Priyadarsi Nanda
Xiangjian He
Ren Ping Liu
Publikationsdatum
20.04.2020
Verlag
Springer US
Erschienen in
Wireless Networks / Ausgabe 6/2020
Print ISSN: 1022-0038
Elektronische ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-020-02325-z

Weitere Artikel der Ausgabe 6/2020

Wireless Networks 6/2020 Zur Ausgabe

Neuer Inhalt