skip to main content
10.1145/3230833.3232824acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaresConference Proceedingsconference-collections
research-article

Toward a Distributed Trust Management scheme for VANET

Authors Info & Claims
Published:27 August 2018Publication History

ABSTRACT

A Vehicular Ad hoc NETwork (VANET) is a self-organized network, formed by vehicles and some fixed equipment on roads called Roads Side Units (RSUs). Vehicular communications are expected to share different kinds of information between vehicles and infrastructure. Because of these specifications, securing VANET constitutes a difficult and challenging task that has attracted the interest of many researchers. In a previous work, we proposed a Clustering Mechanism for VANET (CMV) and its inherit Trust management scheme (TCMV) to ensure security of communication among vehicles. CMV organizes vehicles into clusters and elected Cluster Heads (CHs), and allows the clusters maintenance while dealing with velocity. On the other side, TCMV computes the credibility of the message by CH using the reputation of vehicles. However, we found that the value of credibility of the message by CH is not enough to verify if an exchanged message is correct or no. In order to provide a secured vehicle communication and to build reliance communication among vehicles, we propose a distributive trust management scheme for VANET to verify the correctness of the message based on the controlling of the vehicle'behavior by a miner and the credibility of message by a CH.

References

  1. Madhusudan Singh and Shiho Kim. Blockchain based intelligent vehicle data sharing framework. arXiv preprint arXiv:1708.09721, 2017.Google ScholarGoogle Scholar
  2. Kchaou Amira, Abassi Ryma, and Guemara Sihem. Towards a secured clustering mechanism for messages exchange in vanet. Advanced Information Networking and Applications Workshops (WAINA), 2018 IEEE 32th International Conference on. IEEE, 2018.Google ScholarGoogle Scholar
  3. Jun Lin, Zhiqi Shen, and Chunyan Miao. Using blockchain technology to build trust in sharing lorawan iot. In Proceedings of the 2nd International Conference on Crowd Science and Engineering, pages 38--43. ACM, 2017. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Arshdeep Bahga and Vijay K Madisetti. Blockchain platform for industrial internet of things. Journal of Software Engineering and Applications, 9(10):533, 2016.Google ScholarGoogle ScholarCross RefCross Ref
  5. Kayhan Zrar Ghafoor, Kamalrulnizam Abu Bakar, Martijn van Eenennaam, Rashid Hafeez Khokhar, and Alberto J Gonzalez. A fuzzy logic approach to beaconing for vehicular ad hoc networks. Telecommunication Systems, 52(1):139--149, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Lina Altoaimy and Imad Mahgoub. Fuzzy logic based localization for vehicular ad hoc networks. In Computational Intelligence in Vehicles and Transportation Systems (CIVTS), 2014 IEEE Symposium on, pages 121--128. IEEE, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  7. Sean Rowan, Michael Clear, Mario Gerla, Meriel Huggard, and Ciarán Mc Goldrick. Securing vehicle to vehicle communications using blockchain through visible light and acoustic side-channels. arXiv preprint arXiv:1704.02553, 2017.Google ScholarGoogle Scholar
  8. Ali Dorri, Marco Steger, Salil S Kanhere, and Raja Jurdak. Blockchain: A distributed solution to automotive security and privacy. IEEE Communications Magazine, 55(12):119--125, 2017. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Yong Yuan and Fei-Yue Wang. Towards blockchain-based intelligent transportation systems. In Intelligent Transportation Systems (ITSC), 2016 IEEE 19th International Conference on, pages 2663--2668. IEEE, 2016.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Benjamin Leiding, Parisa Memarmoshrefi, and Dieter Hogrefe. Self-managed and blockchain-based vehicular ad-hoc networks. In Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct, pages 137--140. ACM, 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Satoshi Nakamoto. Bitcoin: A peer-to-peer electronic cash system. 2008.Google ScholarGoogle Scholar
  12. Gareth W Peters and Efstathios Panayi. Understanding modern banking ledgers through blockchain technologies: Future of transaction processing and smart contracts on the internet of money. In Banking Beyond Banks and Money, pages 239--278. Springer, 2016.Google ScholarGoogle ScholarCross RefCross Ref
  13. Gareth Peters, Efstathios Panayi, and Ariane Chapelle. Trends in cryptocurrencies and blockchain technologies: a monetary theory and regulation perspective. 2015.Google ScholarGoogle Scholar
  14. Benjamin W Akins, Jennifer L Chapman, and Jason M Gordon. A whole new world: Income tax considerations of the bitcoin economy. Pitt. Tax Rev., 12:25, 2014.Google ScholarGoogle Scholar
  15. Charles Noyes. Bitav: Fast anti-malware by distributed blockchain consensus and feedforward scanning. arXiv preprint arXiv: 1601.01405, 2016.Google ScholarGoogle Scholar
  16. Yu Zhang and Jiangtao Wen. An iot electric business model based on the protocol of bitcoin. In Intelligence in Next Generation Networks (ICIN), 2015 18th International Conference on, pages 184--191. IEEE, 2015.Google ScholarGoogle ScholarCross RefCross Ref
  17. Don Johnson, Alfred Menezes, and Scott Vanstone. The elliptic curve digital signature algorithm (ecdsa). International journal of information security, 1(1):36--63, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Ao Lei, Chibueze Ogah, Philip Asuquo, Haitham Cruickshank, and Zhili Sun. A secure key management scheme for heterogeneous secure vehicular communication systems. ZTE Communications, 21:1, 2016.Google ScholarGoogle Scholar
  19. Zibin Zheng, Shaoan Xie, Hong-Ning Dai, and Huaimin Wang. Blockchain challenges and opportunities: A survey. Work Pap.--2016, 2016.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    ARES '18: Proceedings of the 13th International Conference on Availability, Reliability and Security
    August 2018
    603 pages
    ISBN:9781450364485
    DOI:10.1145/3230833

    Copyright © 2018 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 27 August 2018

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited

    Acceptance Rates

    ARES '18 Paper Acceptance Rate128of260submissions,49%Overall Acceptance Rate228of451submissions,51%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader