Secure Trust-Based Blockchain Architecture to Prevent Attacks in VANET

被引:55
|
作者
Khan, Adnan Shahid [1 ]
Balan, Kuhanraj [1 ]
Javed, Yasir [1 ,2 ]
Tarmizi, Seleviawati [1 ]
Abdullah, Johari [1 ]
机构
[1] Univ Malaysia Sarawak, Fac Comp Sci & Informat Technol, Kota Samarahan 94300, Malaysia
[2] Prince Sultan Univ, Dept Comp Sci, Riyadh 11586, Saudi Arabia
关键词
VANET; trust model; blockchain; architecture; privacy; authentication; security; PRIVACY-PRESERVING AUTHENTICATION; AD HOC NETWORKS; LIGHTWEIGHT AUTHENTICATION; ROUTING PROTOCOL;
D O I
10.3390/s19224954
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Vehicular ad hoc networks (VANET) are also known as intelligent transportation systems. VANET ensures timely and accurate communications between vehicle to vehicle (V2V) and vehicle to infrastructure (V2I) to improve road safety and enhance the efficiency of traffic flow. Due to its open wireless boundary and high mobility, VANET is vulnerable to malicious nodes that could gain access into the network and carry out serious medium access control (MAC) layer threats, such as denial of service (DoS) attacks, data modification attacks, impersonation attacks, Sybil attacks, and replay attacks. This could affect the network security and privacy, causing harm to the information exchange within the network by genuine nodes and increase fatal impacts on the road. Therefore, a novel secure trust-based architecture that utilizes blockchain technology has been proposed to increase security and privacy to mitigate the aforementioned MAC layer attacks. A series of experiment has been conducted using the Veins simulation tool to assess the performance of the proposed solution in the terms of packet delivery ratio (PDR), end-to-end delay, packet loss, transmission overhead, and computational cost.
引用
下载
收藏
页数:27
相关论文
共 50 条
  • [31] A trust-based secure AODV routing scheme for MANET
    Wahi, Charu
    Chakraverty, Shampa
    Bhattacherjee, Vandana
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2021, 38 (04) : 231 - 247
  • [32] Trust-based secure aggregation in wireless sensor networks
    Hur, Junbeom
    Lee, Yoonho
    Hong, Seongmin
    Yoon, Hyunsoo
    3RD INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND CONTROL TECHNOLOGIES, VOL 3, PROCEEDINGS, 2005, : 1 - 6
  • [33] Blockchain-based distributed management system for trust in VANET
    Inedjaren, Youssef
    Maachaoui, Mohamed
    Zeddini, Besma
    Barbot, Jean-Pierre
    VEHICULAR COMMUNICATIONS, 2021, 30
  • [34] A scalable blockchain based trust management in VANET routing protocol
    Kudva, Sowmya
    Badsha, Shahriar
    Sengupta, Shamik
    La, Hung
    Khalil, Ibrahim
    Atiquzzaman, Mohammed
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2021, 152 : 144 - 156
  • [35] MediBlocks: secure exchanging of electronic health records (EHRs) using trust-based blockchain network with privacy concerns
    Babu, Erukala Suresh
    Yadav, B. V. Ram Naresh
    Nikhath, A. Kousar
    Nayak, Soumya Ranjan
    Alnumay, Waleed
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2023, 26 (04): : 2217 - 2244
  • [36] MediBlocks: secure exchanging of electronic health records (EHRs) using trust-based blockchain network with privacy concerns
    Erukala Suresh Babu
    B. V. Ram Naresh Yadav
    A. Kousar Nikhath
    Soumya Ranjan Nayak
    Waleed Alnumay
    Cluster Computing, 2023, 26 : 2217 - 2244
  • [37] Inference attacks against trust-based onion routing: Trust degree to the rescue
    Zhou, Peng
    Luo, Xiapu
    Chang, Rocky K. C.
    COMPUTERS & SECURITY, 2013, 39 : 431 - 446
  • [38] Dynamic Trust-Based Redactable Blockchain Supporting Update and Traceability
    Zhang, Yuqing
    Ma, Zhaofeng
    Luo, Shoushan
    Duan, Pengfei
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 821 - 834
  • [39] A trust-based hypervisor framework for preventing DDoS attacks in cloud
    Vetha, S.
    Vimala Devi, K.
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2021, 33 (03):
  • [40] A Trust-based Approach against IP-spoofing Attacks
    Gonzalez, Jesus M.
    Anwar, Mohd
    Joshi, James B. D.
    2011 NINTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, 2011, : 63 - 70