scholarly journals vTrust: An IoT-Enabled Trust-Based Secure Wireless Energy Sharing Mechanism for Vehicular Ad Hoc Networks

Sensors ◽  
2021 ◽  
Vol 21 (21) ◽  
pp. 7363
Author(s):  
Kamran Ahmad Awan ◽  
Ikram Ud Din ◽  
Ahmad Almogren ◽  
Byung-Seo Kim ◽  
Ayman Altameem

Vehicular Ad hoc Network (VANET) is a modern concept that enables network nodes to communicate and disseminate information. VANET is a heterogeneous network, due to which the VANET environment exposes to have various security and privacy challenges. In the future, the automobile industry will progress towards assembling electric vehicles containing energy storage batteries employing these resources to travel as an alternative to gasoline/petroleum. These vehicles may have the capability to share their energy resources upon the request of vehicles having limited energy resources. In this article, we have proposed a trust management-based secure energy sharing mechanism, named vTrust, which computes the trust degree of nodes to authenticate nodes. The proposed mechanism is a multi-leveled centralized approach utilizing both the infrastructure and vehicles to sustain a secure environment. The proposed vTrust can aggregate and propagate the degree of trust to enhance scalability. The node that requests to obtain the energy resources may have to maintain a specified level of trust threshold for earning resources. We have also evaluated the performance of the proposed mechanism against several existing approaches and determine that the proposed mechanism can efficiently manage a secure environment during resource sharing by maintaining average malicious nodes detection of 91.3% and average successful energy sharing rate of 89.5%, which is significantly higher in comparison to the existing approaches.

2016 ◽  
Vol 2016 ◽  
pp. 1-15 ◽  
Author(s):  
Zhiquan Liu ◽  
Jianfeng Ma ◽  
Zhongyuan Jiang ◽  
Hui Zhu ◽  
Yinbin Miao

With the advances in automobile industry and wireless communication technology, Vehicular Ad hoc Networks (VANETs) have attracted the attention of a large number of researchers. Trust management plays an important role in VANETs. However, it is still at the preliminary stage and the existing trust models cannot entirely conform to the characteristics of VANETs. This work proposes a novel Lightweight Self-Organized Trust (LSOT) model which contains trust certificate-based and recommendation-based trust evaluations. Both the supernodes and trusted third parties are not needed in our model. In addition, we comprehensively consider three factor weights to ease the collusion attack in trust certificate-based trust evaluation, and we utilize the testing interaction method to build and maintain the trust network and propose a maximum local trust (MLT) algorithm to identify trustworthy recommenders in recommendation-based trust evaluation. Furthermore, a fully distributed VANET scenario is deployed based on the famous Advogato dataset and a series of simulations and analysis are conducted. The results illustrate that our LSOT model significantly outperforms the excellent experience-based trust (EBT) and Lightweight Cross-domain Trust (LCT) models in terms of evaluation performance and robustness against the collusion attack.


Author(s):  
Aida Ben Chehida Douss ◽  
Ryma Abassi ◽  
Sihem Guemara El Fatmi

Because mobile ad hoc networks (MANETs) have neither infrastructure support nor central administration, they imply their nodes in the routing process. Having that this latter is fundamental in a MANET deployment, it constitutes a privileged target of attackers. For instance, malicious nodes can refuse to route packets or modify their content in order to disrupt the network and to deteriorate the transmission quality. All these features raise several security challenges for the routing process making more difficult to design and implement security solutions for MANETs than for wired networks. The main contribution of this chapter is to propose a generic environment securing routing in MANETs on which a trust and reputation mechanism is defined. This environment is built upon a specific mobility-based clustering approach (MCA) organizing MANETs' nodes into clusters. Moreover, a trust management process and a delegation mechanism allowing the localization and the isolation of malicious nodes are used. The whole environment is baptized DTMCA (delegation trust MCA-based process).


A temporal network creates various issues which are managed by nodes, communicating with the base station. The flow of packets with different routes usually attacked by malicious nodes, such an attack is also termed as black hole attack. A novel FSAODV mechanism is proposed in this paper to prevent the information from malicious nodes by following the Ad-hoc on demand distance vector (AODV) protocol. The detection of threats due to the black hole and route enhancement is implemented using the bio-inspired algorithms. Firefly algorithm and Support Vector Machine (SVM) algorithms are developed to determine the throughput, Packet Delivery Ratio (PDR), and TDR. A comparative analysis has been done to portray the success rate of proposed work. For the comparison, research works of Ashok Koujalagi and Rushdi A. Hamamreh are considered. 33.33% enhancement has been noted in throughput with Ashok Koujalagi and74.44% with Rushdi A. Hamamreh. 21.4% enhancement has been seen in PDR with Ashok Koujalagi and 91.71% with Rushdi A. Hamamreh.


Author(s):  
Paolo Bellavista ◽  
Rebecca Montanari ◽  
Daniela Tibaldi ◽  
Alessandra Toninelli

The increasing diffusion of wireless portable devices and the emergence of mobile ad hoc networks promote anytime and anywhere opportunistic resource sharing. However, the fear of exposure to risky interactions is currently limiting the widespread uptake of ad hoc collaborations. This chapter introduces the challenge of identifying and validating novel security models/systems for securing ad hoc collaborations, by taking into account the high unpredictability, heterogeneity, and dynamicity of envisioned wireless environments. We claim that the concept of trust management should become a primary engineering design principle, to associate with the subsequent trust refinement into effective authorization policies, thus calling for original and innovative access control models. The chapter overviews the state-of-theart solutions for trust management and access control in wireless environments by pointing out both the need for their tight integration and the related emerging design guidelines, that is, exploitation of context awareness and adoption of semantic technologies.


2020 ◽  
Vol 2020 ◽  
pp. 1-25 ◽  
Author(s):  
Muhammad Sameer Sheikh ◽  
Jun Liang ◽  
Wensong Wang

Vehicular networks are becoming a prominent research field in the intelligent transportation system (ITS) due to the nature and characteristics of providing high-level road safety and optimized traffic management. Vehicles are equipped with the heavy communication equipment which requires a high power supply, on-board computing device, and data storage devices. Many wireless communication technologies are deployed to maintain and enhance the traffic management system. The ITS is capable of providing services to the traffic authorities and precautionary measures to the drivers and passengers. Several methods have been proposed for discussing the security and privacy issues for the vehicular ad hoc networks (VANETs) and vehicular cloud computing (VCC). They receive a great deal of attention from researchers around the world since they are new technologies, and they can improve road safety and enhance traffic flow by utilizing the vehicles resources and communication system. Firstly, the VANETs are presented, including the basic overview, characteristics, threats, and attacks. The location privacy methodologies are elaborated, which can protect the confidential information of the vehicle, such as the location detail and driver information. Secondly, the trust management models in the VANETs are comprehensively discussed, followed by the comparison of the cryptography and trust models in terms of different kinds of attacks. Then, the simulation tools and applications of the VANETs are discussed, and the evolution is presented from the VANETs to VCC in the vehicular network. Thirdly, the VCC is discussed from its architecture and the security and privacy issues. Finally, several research challenges on the VANETs and VCC are presented. In sum, this survey comprehensively covers the location privacy and trust management models of the VANETs and discusses the security and privacy issues in the VCC, which fills the gap of existing surveys. Also, it indicates the research challenges in the VANETs and VCC.


Author(s):  
S.A. Akinboro ◽  
E.A. Olajubu ◽  
I.K. Ogundoyin ◽  
G.A. Aderounmu

This article developed a framework for trust management in mobile ambient home network with a view to secure the home devices and channel against attacks. The framework was design using mobile ad hoc network and social networking concept. The trust management, global reputation aggregation which considered the direct and indirect communication of home devices and remote devices was employed to shield home devices from attacks. While real time dynamic source routing protocol was employed to prevent the channel from attacks by selfish and malicious nodes. The prototype of the framework was implemented using C# programming language. The framework will enhance the activities in the home by securing the home network against unforeseen network disruption and node misbehavior due to the distributed nature of the environment.


2020 ◽  
Vol 16 (7) ◽  
pp. 155014772093937 ◽  
Author(s):  
Ibrahim Abdo Rai ◽  
Riaz Ahmed Shaikh ◽  
Syed Raheel Hassan

Vehicular ad-hoc networks allow vehicles to exchange messages pertaining to safety and road efficiency. Building trust between nodes can, therefore, protect vehicular ad-hoc networks from malicious nodes and eliminate fake messages. Although there are several trust models already exist, many schemes suffer from varied limitations. For example, many schemes rely on information provided by other peers or central authorities, for example, roadside units and reputation management centers to ensure message reliability and build nodes’ reputation. Also, none of the proposed schemes operate in different environments, for example, urban and rural. To overcome these limitations, we propose a novel trust management scheme for self-organized vehicular ad-hoc networks. The scheme is based on a crediting technique and does not rely on other peers or central authorities which distinguishes it as an economical solution. Moreover, it is hybrid, in the sense it is data-based and entity-based which makes it capable of revoking malicious nodes and discarding fake messages. Furthermore, it operates in a dual-mode (urban and rural). The simulation has been performed utilizing Veins, an open-source framework along with OMNeT++, a network simulator, and SUMO, a traffic simulator. The scheme has been tested with two trust models (urban and rural). The simulation results prove the performance and security efficacy of the proposed scheme.


2018 ◽  
Vol 12 (1) ◽  
pp. 29-41 ◽  
Author(s):  
Arun Malik ◽  
Babita Pandey

Vehicular Ad hoc Network (VANET) is considered as an essential component of Intelligent Transport system. VANET has gained an ample amount of attention from the researchers and automobile industry. Security and privacy are the primary requirements in the successful deployment of vehicular communication in VANET. Lack of security and confidentiality in VANETs is the primary barricade in the successful deployment of VANET. To establish trust within the entities participating in VANET operations is the primary aim of VANET security and play a vital role in prevention of attack in VANET. This paper describes a comprehensive identity authentication scheme (CIAS) based on asymmetric encryption that facilitates the authentication for Vehicle-to-Infrastructure (V2I) and inter RSUs. The proposed scheme is validated by extensive simulations and compared with the related works on the basis of communication overhead (CO), Latency and packet delivery ratio (PDR). The result of simulations shows that proposed authentication scheme outperforms.


Electronics ◽  
2021 ◽  
Vol 10 (15) ◽  
pp. 1787
Author(s):  
Ezedin Barka ◽  
Sofiane Dahmane ◽  
Chaker Abdelaziz Kerrache ◽  
Mohamad Khayat ◽  
Farag Sallabi

Healthcare professionals and scholars have emphasized the need for IoT-based remote health monitoring services to track the health of the elderly. Such systems produce a large amount of data, necessitating the security and privacy of that data. On the other hand, Software Defined Networking (SDN) integration could be seen as a good solution to guarantee both flexibility and efficiency of the network which is even more important in the case of healthcare monitoring. Furthermore, Blockchain has recently been proposed as a game-changing tool that can be integrated into the Internet of Things (IoT) to have the optimal level of security and privacy. However, incorporating Blockchain into IoT networks, which rely heavily on patients’ health sensors, is extremely difficult. In this paper, a secure Healthcare Monitoring System (HMS) is proposed with a focus on trust management issues. The architecture seeks to protect multiple healthcare monitoring system components and preserves patient privacy by developing a security interface where separate security modules can be integrated to run side by side to ensure reliable HMS. The security framework architecture we propose takes advantage of the blockchain technology as a secure and timely information back-end. STHM is a proposal that uses Software-Defined Networking (SDN) as the communication medium that allows users to access SDN’s different functional and security technologies and services. Simulation results show that the use of Blockchain for the SDN-based healthcare monitoring can ensure the desired flexibility and security for a very lightweight additional overhead.


Sign in / Sign up

Export Citation Format

Share Document