scholarly journals A Privacy-Preserving Attack-Resistant Trust Model for Internet of Vehicles Ad Hoc Networks

2020 ◽  
Vol 2020 ◽  
pp. 1-21
Author(s):  
Muhammad Haleem Junejo ◽  
Ab Al-Hadi Ab Rahman ◽  
Riaz Ahmed Shaikh ◽  
Kamaludin Mohamad Yusof ◽  
Imran Memon ◽  
...  

The Internet of things (IoT) and advancements of wireless technology have evolved intelligent transport systems to integrate billion of smart objects ready to connect to the Internet. The modern era of the Internet of things (IoT) has brought significant development in vehicular ad hoc networks (VANETs) which transformed the conventional VANET into the Internet of Vehicle (IoV) to improve road safety and diminished road congestion. However, security threats are increasing due to dependency on infrastructure, computing, dynamic nature, and control technologies of VANET. The security threats of VANETs could be addressed comprehensively by increasing trustworthiness on the message received and transmitting node. Conversely, the presence of dishonest vehicles, for instance, Man in the Middle (MiTM) attackers, in the network sharing malicious content could be posed as a severe threat to VANET. Thus, increasing trustworthiness among nodes can lead to increased authenticity, privacy, accuracy, security, and trusted information sharing in the VANET. In this paper, a lightweight trust model is proposed, presented model identifying dishonest nodes and revoking its credential in the MiTM attack scenario. Furthermore, addressing the privacy and security requirement, the pseudonym scheme is used. All nodes in the VANET established trust provided by initially RSU, which is a trusted source in the network. Extensive experiments are conducted based on a variety of network scenarios to evaluate the accuracy and performance of the presented lightweight trust model. In terms of recall, precision, and F-score, our presented model significantly outperformed compared to MARINE. The simulation results have validated that the proposed lightweight model realized a high trust level with 40% of MiTM attackers and in terms of F-score 95%, whereas the MARINE model has 90%, which leads to the model to attain high detection accuracy.

2021 ◽  
Vol 11 (03) ◽  
pp. 13-23
Author(s):  
K. Divya ◽  
B. Srinivasan

The Internet of things (IoT) is a heterogeneous network of different types of wireless networks such as wireless sensor networks (WSNs), ZigBee, Wi-Fi, mobile ad hoc networks (MANETs), and RFID. To make IoT a reality for smart environment, more attractive to end users, and economically successful, it must be compatible with WSNs and MANETs. In light of this, the present paper discusses a novel quantitative trust model for an IoT-MANET. The proposed trust model combines both direct and indirect trust opinion in order to calculate the final trust value for a node. Further, a routing protocol has been designed to ensure the secure and reliable end-to-end delivery of packets by only considering trustworthy nodes in the path. Simulation results show that our proposed trust model outperforms similar existing trust models.


Sensors ◽  
2019 ◽  
Vol 19 (6) ◽  
pp. 1467 ◽  
Author(s):  
Waleed Alnumay ◽  
Uttam Ghosh ◽  
Pushpita Chatterjee

The Internet of things (IoT) is a heterogeneous network of different types of wireless networks such as wireless sensor networks (WSNs), ZigBee, Wi-Fi, mobile ad hoc networks (MANETs), and RFID. To make IoT a reality for smart environment, more attractive to end users, and economically successful, it must be compatible with WSNs and MANETs. In light of this, the present paper discusses a novel quantitative trust model for an IoT-MANET. The proposed trust model combines both direct and indirect trust opinion in order to calculate the final trust value for a node. A Beta probabilistic distribution is used to combine different trust evidences and direct trust has been calculated. The theory of ARMA/GARCH has been used to combine the recommendation trust evidences and predict the resultant trust value of each node in multi-step ahead. Further, a routing protocol has been designed to ensure the secure and reliable end-to-end delivery of packets by only considering trustworthy nodes in the path. Simulation results show that our proposed trust model outperforms similar existing trust models.


Sensors ◽  
2021 ◽  
Vol 21 (9) ◽  
pp. 3257
Author(s):  
Arne Bochem ◽  
Benjamin Leiding

Today, increasing Internet of Things devices are deployed, and the field of applications for decentralized, self-organizing networks keeps growing. The growth also makes these systems more attractive to attackers. Sybil attacks are a common issue, especially in decentralized networks and networks that are deployed in scenarios with irregular or unreliable Internet connectivity. The lack of a central authority that can be contacted at any time allows attackers to introduce arbitrary amounts of nodes into the network and manipulate its behavior according to the attacker’s goals, by posing as a majority participant. Depending on the structure of the network, employing Sybil node detection schemes may be difficult, and low powered Internet of Things devices are usually unable to perform impactful amounts of work for proof-of-work based schemes. In this paper, we present Rechained, a scheme that monetarily disincentivizes the creation of Sybil identities for networks that can operate with intermittent or no Internet connectivity. We introduce a new revocation mechanism for identities, tie them into the concepts of self-sovereign identities, and decentralized identifiers. Case-studies are used to discuss upper- and lower-bounds for the costs of Sybil identities and, therefore, the provided security level. Furthermore, we formalize the protocol using Colored Petri Nets to analyze its correctness and suitability. Proof-of-concept implementations are used to evaluate the performance of our scheme on low powered hardware as it might be found in Internet of Things applications.


2021 ◽  
Vol 10 (2) ◽  
pp. 88-106
Author(s):  
Gillian Harrison ◽  
Simon P. Shepherd ◽  
Haibo Chen

Connected and automated vehicle (CAV) technologies and services are rapidly developing and have the potential to revolutionise the transport systems. However, like many innovations, the uptake pathways are uncertain. The focus of this article is on improving understanding of factors that may affect the uptake of highly and fully automated vehicles, with a particular interest in the role of the internet of things (IoT). Using system dynamic modelling, sensitivity testing towards vehicle attributes (e.g., comfort, safety, familiarity) is carried out and scenarios were developed to explore how CAV uptake can vary under different conditions based around the quality of IoT provision. Utility and poor IoT are found to have the biggest influence. Attention is then given to CAV ‘services' that are characterized by the attributes explored earlier in the paper, and it is found that they could contribute to a 20% increase in market share.


Sign in / Sign up

Export Citation Format

Share Document