Abstract
In vehicular ad hoc networks (VANET), effective trust establishment with authentication is an important requirement. Trust management among communicating vehicles is significant for secure message transmission; however, very less contributions have been made towards evaluating the trustworthiness of the node. This research work intends to introduce a new trust management system in VANET with two major phases: secured message transmission and node trustability prediction. The security assured message passing is carried out by incorporating the privacy preservation model under the data sanitization process. The key used for the sanitization process is optimally tuned by a new hybrid algorithm termed Sea Lion Explored-Whale Optimization Algorithm, which is the combination of Whale Optimization Algorithm and Sea Lion Optimization Algorithm, respectively. The blockchain technology is assisted to handle the key generated by the nodes. Subsequently, the trustability of the node is evaluated under novel specifics “two-level evaluation process” with a rule-based and machine learning-based evaluation process. Finally, the performance of the proposed model is verified and proved over other conventional methods for certain measures.















Similar content being viewed by others
Abbreviations
- 5G:
-
Fifth generation
- CRL:
-
Certificate revocation list
- RSU:
-
Roadside unit
- QoS:
-
Quality-of-service
- P2P:
-
Peer-to-peer
- BARS:
-
Blockchain-based anonymous reputation system
- JSSDT:
-
Joint spectrum sensing and data transmission
- IGHSOM:
-
Improved growing hierarchical self-organizing map
- CL-PKS:
-
Certificateless public key signature
- V2I:
-
Vehicle-to-infrastructure
- HTM:
-
Hybrid trust model
- MDS:
-
Misbehavior detection system
- PoW:
-
Proof of work
- MN:
-
Mobile node
- OBU:
-
On board units
- KCA:
-
Known ciphertext attack
- CPA:
-
Chosen plaintext attack
- CCA:
-
Chosen ciphertext attack
- SOM:
-
Self organizing map
- KPA:
-
Known plaintext attack
- GHSOM:
-
Growing hierarchical self-organizing map
- PDR:
-
Packet delivery rate
- PFR:
-
Partnerships for renewables
- RSSI:
-
Recieved signal strength indicator
- VANET:
-
Vehicular ad hoc networks
- CR-VANET:
-
Cognitive radio VANET
- IDS:
-
Intrusion detection system
- V2V:
-
Vehicle to vehicle
- WOA:
-
Whale Optimization Algorithm
- MCC:
-
Mobile cloud computing
- NPV:
-
Net present value
References
Kumar, A., & Gupta, M. (2018). A review on activities of fifth generation mobile communication system. Alexandria Engineering Journal,57(2), 1125–1135.
Mukherjee, A., & De, D. (2016). Femtolet: A novel fifth generation network device for green mobile cloud computing. Simulation Modelling Practice and Theory,62, 68–87.
Feijóo, C., Gómez-Barroso, J. L., & Ramos, S. (2016). Techno-economic implications of the mass-market uptake of mobile data services: Requirements for next generation mobile networks. Telematics and Informatics,33(2), 600–612.
Habbal, A., Goudar, S. I., & Hassan, S. (2019). A context-aware radio access technology selection mechanism in 5G mobile network for smart city applications. Journal of Network and Computer Applications,135, 97–107.
Benrhaiem, W., & Hafid, A. S. (2019). Bayesian networks based reliable broadcast in vehicular networks. Vehicular Communications, 21, 100181.
Urra, O., & Ilarri, S. (2019). Spatial crowdsourcing with mobile agents in vehicular networks. Vehicular Communications,17, 10–34.
Osman, R. A., Peng, X. H., & Omar, M. A. (2019). Adaptive cooperative communications for enhancing QoS in vehicular networks. Physical Communication,34, 285–294.
Hussain, R., Hussain, F., & Zeadally, S. (2019). Integration of VANET and 5G security: A review of design and implementation issues. Future Generation Computer Systems,101, 843–864.
Hasrouny, H., Samhat, A. E., Bassil, C., & Laouiti, A. (2019). Detection and efficient revocation within VANET. Journal of Information Security and Applications,46, 193–209.
Arif, M., Wang, G., Bhuiyan, M. Z. A., Wang, T., & Chen, T. (2019). A survey on security attacks in VANETs: Communication, applications and challenges. Vehicular Communications, 19, 100179.
Kang, J., Lin, D., Jiang, W., & Bertino, E. (2018). Highly efficient randomized authentication in VANETs. Pervasive and Mobile Computing,44, 31–44.
Shrestha, R., Bajracharya, R., Shrestha, A. P., & Nam, S. Y. (2019). A new type of blockchain for secure message exchange in VANET. Digital Communications and Networks(in press).
Yang, Z., Yang, K., Lei, L., Zheng, K., & Leung, V. C. M. (2019). Blockchain-based decentralized trust management in vehicular networks. IEEE Internet of Things Journal,6(2), 1495–1505.
Singh, M., & Kim, S. (2018). Branch based blockchain technology in intelligent vehicle. Computer Networks,145, 219–231.
Bylykbashi, K., Elmazi, D., Matsuo, K., Ikeda, M., & Barolli, L. (2019). Effect of security and trustworthiness for a fuzzy cluster management system in VANETs. Cognitive Systems Research,55, 153–163.
Cirne, P., Zúquete, A., & Sargento, S. (2018). TROPHY: Trustworthy VANET routing with group authentication keys. Ad Hoc Networks,71, 45–67.
Zhao, J., Wu, Z., Wang, Y., & Ma, X. (2019). Adaptive optimization of QoS constraint transmission capacity of VANET. Vehicular Communications,17, 1–9.
Debnath, A., Basumatary, H., Tarafdar, A., DebBarma, M. K., & Bhattacharyya, B. K. (2019). Center of mass and junction based data routing method to increase the QoS in VANET. AEU - International Journal of Electronics and Communications,108, 36–44.
Jadhav, P. P., & Joshi, S. D. (2019). WOADF: Whale optimization integrated adaptive dragonfly algorithm enabled with the TDD properties for model transformation. International Journal of Computational Intelligence and Applications, 18(4), 1950026.
Revathi, K., & Krishnamoorthy, N. (2015). The performance analysis of swallow swarm optimization algorithm. In Proceedings of the 2nd international conference on electronics and communication systems (ICECS).
Remmiya, R., & Abisha, C. (2018). Artifacts removal in EEG signal using a NARX model based CS learning algorithm. Multimedia Research,1(1), 1–8.
Shrestha, R., Bajracharya, R., Shrestha, A. P., & Nam, S. Y. (2019). A new type of blockchain for secure message exchange in VANET. Digital Communications and Networks.
Lu, Z., Liu, W., Wang, Q., Qu, G., & Liu, Z. (2018). A privacy-preserving trust model based on blockchain for VANETs. IEEE Access,6, 45655–45664.
He, Y., Yu, F. R., Wei, Z., & Leung, V. (2019). Trust management for secure cognitive radio vehicular ad hoc networks. Ad Hoc Networks,86, 154–165.
Liang, J., Chen, J., Zhu, Y., & Yu, R. (2019). A novel intrusion detection system for vehicular ad hoc networks (VANETs) based on differences of traffic flow and position. Applied Soft Computing,75, 712.
Ali, I., Gervais, M., Ahene, E., & Li, F. (2019). A blockchain-based certificateless public key signature scheme for vehicle-to-infrastructure communication in VANETs. Journal of Systems Architecture, 99, 101636.
Hasrouny, H., Samhat, A. E., Bassil, C., & Laouiti, A. (2018). Trust model for secure group leader-based communications in VANET. Wireless Networks, 25(8), 4639–4661.
Li, H., Pei, L., Liao, D., Sun, G., & Xu, D. (2019). Blockchain meets VANET: An architecture for identity and location privacy protection in VANET. Peer-to-Peer Networking and Applications,12(5), 1178–1193.
Mohan, Y., Chee, S. S., Xin, D. K. P., & Foong, L. P. (2016). Artificial neural network for classification of depressive and normal in EEG. In 2016 IEEE EMBS conference on biomedical engineering and sciences (IECBES).
Masadeh, R., Mahafzah, B. A., & Sharieh, A. (2019). Sea Lion Optimization Algorithm. (IJACSA) International Journal of Advanced Computer Science and Applications, 10(5).
Mirjalili, S., & Lewis, A. (2016). The Whale Optimization Algorithm. Advances in Engineering Software,95, 51–67.
Hsu, C.-C., Lin, S.-H., & Tai, W.-S. (2011). Apply extended self-organizing map to cluster and classify mixed-type data. Neurocomputing,74(18), 3832–3842.
Tai, W.-S., & Hsu, C.-C. (2012). Growing self-organizing map with cross insert for mixed-type data clustering. Applied Soft Computing,12(9), 2856–2866.
McCall, J. (2005). Genetic algorithms for modelling and optimisation. Journal of Computational and Applied Mathematics,184(1), 205–222.
Jafari, M., & Chaleshtari, M. H. B. (2017). Using dragonfly algorithm for optimization of orthotropic infinite plates with a quasi-triangular cut-out. European Journal of Mechanics A/Solids,66, 1–14.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Malik, N., Nanda, P., He, X. et al. Vehicular networks with security and trust management solutions: proposed secured message exchange via blockchain technology. Wireless Netw 26, 4207–4226 (2020). https://doi.org/10.1007/s11276-020-02325-z
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11276-020-02325-z