Skip to main content
Log in

Vehicular networks with security and trust management solutions: proposed secured message exchange via blockchain technology

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

In vehicular ad hoc networks (VANET), effective trust establishment with authentication is an important requirement. Trust management among communicating vehicles is significant for secure message transmission; however, very less contributions have been made towards evaluating the trustworthiness of the node. This research work intends to introduce a new trust management system in VANET with two major phases: secured message transmission and node trustability prediction. The security assured message passing is carried out by incorporating the privacy preservation model under the data sanitization process. The key used for the sanitization process is optimally tuned by a new hybrid algorithm termed Sea Lion Explored-Whale Optimization Algorithm, which is the combination of Whale Optimization Algorithm and Sea Lion Optimization Algorithm, respectively. The blockchain technology is assisted to handle the key generated by the nodes. Subsequently, the trustability of the node is evaluated under novel specifics “two-level evaluation process” with a rule-based and machine learning-based evaluation process. Finally, the performance of the proposed model is verified and proved over other conventional methods for certain measures.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

Abbreviations

5G:

Fifth generation

CRL:

Certificate revocation list

RSU:

Roadside unit

QoS:

Quality-of-service

P2P:

Peer-to-peer

BARS:

Blockchain-based anonymous reputation system

JSSDT:

Joint spectrum sensing and data transmission

IGHSOM:

Improved growing hierarchical self-organizing map

CL-PKS:

Certificateless public key signature

V2I:

Vehicle-to-infrastructure

HTM:

Hybrid trust model

MDS:

Misbehavior detection system

PoW:

Proof of work

MN:

Mobile node

OBU:

On board units

KCA:

Known ciphertext attack

CPA:

Chosen plaintext attack

CCA:

Chosen ciphertext attack

SOM:

Self organizing map

KPA:

Known plaintext attack

GHSOM:

Growing hierarchical self-organizing map

PDR:

Packet delivery rate

PFR:

Partnerships for renewables

RSSI:

Recieved signal strength indicator

VANET:

Vehicular ad hoc networks

CR-VANET:

Cognitive radio VANET

IDS:

Intrusion detection system

V2V:

Vehicle to vehicle

WOA:

Whale Optimization Algorithm

MCC:

Mobile cloud computing

NPV:

Net present value

References

  1. Kumar, A., & Gupta, M. (2018). A review on activities of fifth generation mobile communication system. Alexandria Engineering Journal,57(2), 1125–1135.

    Article  Google Scholar 

  2. Mukherjee, A., & De, D. (2016). Femtolet: A novel fifth generation network device for green mobile cloud computing. Simulation Modelling Practice and Theory,62, 68–87.

    Article  Google Scholar 

  3. Feijóo, C., Gómez-Barroso, J. L., & Ramos, S. (2016). Techno-economic implications of the mass-market uptake of mobile data services: Requirements for next generation mobile networks. Telematics and Informatics,33(2), 600–612.

    Article  Google Scholar 

  4. Habbal, A., Goudar, S. I., & Hassan, S. (2019). A context-aware radio access technology selection mechanism in 5G mobile network for smart city applications. Journal of Network and Computer Applications,135, 97–107.

    Article  Google Scholar 

  5. Benrhaiem, W., & Hafid, A. S. (2019). Bayesian networks based reliable broadcast in vehicular networks. Vehicular Communications, 21, 100181.

    Article  Google Scholar 

  6. Urra, O., & Ilarri, S. (2019). Spatial crowdsourcing with mobile agents in vehicular networks. Vehicular Communications,17, 10–34.

    Article  Google Scholar 

  7. Osman, R. A., Peng, X. H., & Omar, M. A. (2019). Adaptive cooperative communications for enhancing QoS in vehicular networks. Physical Communication,34, 285–294.

    Article  Google Scholar 

  8. Hussain, R., Hussain, F., & Zeadally, S. (2019). Integration of VANET and 5G security: A review of design and implementation issues. Future Generation Computer Systems,101, 843–864.

    Article  Google Scholar 

  9. Hasrouny, H., Samhat, A. E., Bassil, C., & Laouiti, A. (2019). Detection and efficient revocation within VANET. Journal of Information Security and Applications,46, 193–209.

    Article  Google Scholar 

  10. Arif, M., Wang, G., Bhuiyan, M. Z. A., Wang, T., & Chen, T. (2019). A survey on security attacks in VANETs: Communication, applications and challenges. Vehicular Communications, 19, 100179.

    Article  Google Scholar 

  11. Kang, J., Lin, D., Jiang, W., & Bertino, E. (2018). Highly efficient randomized authentication in VANETs. Pervasive and Mobile Computing,44, 31–44.

    Article  Google Scholar 

  12. Shrestha, R., Bajracharya, R., Shrestha, A. P., & Nam, S. Y. (2019). A new type of blockchain for secure message exchange in VANET. Digital Communications and Networks(in press).

  13. Yang, Z., Yang, K., Lei, L., Zheng, K., & Leung, V. C. M. (2019). Blockchain-based decentralized trust management in vehicular networks. IEEE Internet of Things Journal,6(2), 1495–1505.

    Article  Google Scholar 

  14. Singh, M., & Kim, S. (2018). Branch based blockchain technology in intelligent vehicle. Computer Networks,145, 219–231.

    Article  Google Scholar 

  15. Bylykbashi, K., Elmazi, D., Matsuo, K., Ikeda, M., & Barolli, L. (2019). Effect of security and trustworthiness for a fuzzy cluster management system in VANETs. Cognitive Systems Research,55, 153–163.

    Article  Google Scholar 

  16. Cirne, P., Zúquete, A., & Sargento, S. (2018). TROPHY: Trustworthy VANET routing with group authentication keys. Ad Hoc Networks,71, 45–67.

    Article  Google Scholar 

  17. Zhao, J., Wu, Z., Wang, Y., & Ma, X. (2019). Adaptive optimization of QoS constraint transmission capacity of VANET. Vehicular Communications,17, 1–9.

    Article  Google Scholar 

  18. Debnath, A., Basumatary, H., Tarafdar, A., DebBarma, M. K., & Bhattacharyya, B. K. (2019). Center of mass and junction based data routing method to increase the QoS in VANET. AEU - International Journal of Electronics and Communications,108, 36–44.

    Article  Google Scholar 

  19. Jadhav, P. P., & Joshi, S. D. (2019). WOADF: Whale optimization integrated adaptive dragonfly algorithm enabled with the TDD properties for model transformation. International Journal of Computational Intelligence and Applications, 18(4), 1950026.

    Article  Google Scholar 

  20. Revathi, K., & Krishnamoorthy, N. (2015). The performance analysis of swallow swarm optimization algorithm. In Proceedings of the 2nd international conference on electronics and communication systems (ICECS).

  21. Remmiya, R., & Abisha, C. (2018). Artifacts removal in EEG signal using a NARX model based CS learning algorithm. Multimedia Research,1(1), 1–8.

    Google Scholar 

  22. Shrestha, R., Bajracharya, R., Shrestha, A. P., & Nam, S. Y. (2019). A new type of blockchain for secure message exchange in VANET. Digital Communications and Networks.

  23. Lu, Z., Liu, W., Wang, Q., Qu, G., & Liu, Z. (2018). A privacy-preserving trust model based on blockchain for VANETs. IEEE Access,6, 45655–45664.

    Article  Google Scholar 

  24. He, Y., Yu, F. R., Wei, Z., & Leung, V. (2019). Trust management for secure cognitive radio vehicular ad hoc networks. Ad Hoc Networks,86, 154–165.

    Article  Google Scholar 

  25. Liang, J., Chen, J., Zhu, Y., & Yu, R. (2019). A novel intrusion detection system for vehicular ad hoc networks (VANETs) based on differences of traffic flow and position. Applied Soft Computing,75, 712.

    Article  Google Scholar 

  26. Ali, I., Gervais, M., Ahene, E., & Li, F. (2019). A blockchain-based certificateless public key signature scheme for vehicle-to-infrastructure communication in VANETs. Journal of Systems Architecture, 99, 101636.

    Article  Google Scholar 

  27. Hasrouny, H., Samhat, A. E., Bassil, C., & Laouiti, A. (2018). Trust model for secure group leader-based communications in VANET. Wireless Networks, 25(8), 4639–4661.

    Article  Google Scholar 

  28. Li, H., Pei, L., Liao, D., Sun, G., & Xu, D. (2019). Blockchain meets VANET: An architecture for identity and location privacy protection in VANET. Peer-to-Peer Networking and Applications,12(5), 1178–1193.

    Article  Google Scholar 

  29. Mohan, Y., Chee, S. S., Xin, D. K. P., & Foong, L. P. (2016). Artificial neural network for classification of depressive and normal in EEG. In 2016 IEEE EMBS conference on biomedical engineering and sciences (IECBES).

  30. Masadeh, R., Mahafzah, B. A., & Sharieh, A. (2019). Sea Lion Optimization Algorithm. (IJACSA) International Journal of Advanced Computer Science and Applications, 10(5).

  31. Mirjalili, S., & Lewis, A. (2016). The Whale Optimization Algorithm. Advances in Engineering Software,95, 51–67.

    Article  Google Scholar 

  32. Hsu, C.-C., Lin, S.-H., & Tai, W.-S. (2011). Apply extended self-organizing map to cluster and classify mixed-type data. Neurocomputing,74(18), 3832–3842.

    Article  Google Scholar 

  33. Tai, W.-S., & Hsu, C.-C. (2012). Growing self-organizing map with cross insert for mixed-type data clustering. Applied Soft Computing,12(9), 2856–2866.

    Article  Google Scholar 

  34. McCall, J. (2005). Genetic algorithms for modelling and optimisation. Journal of Computational and Applied Mathematics,184(1), 205–222.

    Article  MathSciNet  Google Scholar 

  35. Jafari, M., & Chaleshtari, M. H. B. (2017). Using dragonfly algorithm for optimization of orthotropic infinite plates with a quasi-triangular cut-out. European Journal of Mechanics A/Solids,66, 1–14.

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nisha Malik.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Malik, N., Nanda, P., He, X. et al. Vehicular networks with security and trust management solutions: proposed secured message exchange via blockchain technology. Wireless Netw 26, 4207–4226 (2020). https://doi.org/10.1007/s11276-020-02325-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-020-02325-z

Keywords

Navigation