4.5 Article

Trust on wheels: Towards secure and resource efficient IoV networks

期刊

COMPUTING
卷 104, 期 6, 页码 1337-1358

出版社

SPRINGER WIEN
DOI: 10.1007/s00607-021-01040-7

关键词

Internet-of-Vehicles; Network security; Trust management; Misbehaviour identification; Network resource management

资金

  1. Government of the Commonwealth of Australia
  2. Macquarie University, Sydney, Australia [2017560]

向作者/读者索取更多资源

The emerging paradigm of Internet-of-Vehicles (IoV) has gained attention in recent years for its importance in intelligent transportation systems. This paper proposes a trust-based mechanism to ensure the authenticity and reliability of safety messages exchanged among connected vehicles. It also introduces a hybrid trust model and an adaptive threshold to identify and eliminate malicious vehicles. Simulation results demonstrate the efficacy of the proposed scheme.
The emerging yet promising paradigm of Internet-of-Vehicles (IoV) has received considerable attention in the recent years as an integral and indispensable constituent of the modern intelligent transportation systems, wherein safety-critical information is exchanged amongst the connected vehicles via a high-bandwidth, low-latent vehicle-to-everything communication system so as to ensure road safety and highly efficient traffic flows. Therefore, it is of utmost importance to ensure the authenticity and reliability of such safety messages together with the legitimacy of the vehicles disseminating the same. This necessitates instituting a state-of-the-art trust-based mechanism in order to not only identify but to further evict the malicious vehicles from an IoV network. The risk augments if a malicious vehicle (via its malign attempts) assume the role of a cluster head in a cluster, thereby jeopardizing the safety of both the occupants of the vehicles and vulnerable pedestrians. Hence, intelligent algorithms with a potential to opt for both a trusted and a resource efficient cluster head needs to be put into place to guarantee the overall security and resource efficacy of the corresponding cluster. Accordingly, in this paper, we have envisaged a scalable hybrid trust-based model which introduces a composite metric encompassing the weighted amalgamation of a vehicle's computed trust score and its corresponding available resources in order to ensure that the stringent performance requirements of the safety-critical vehicular applications are fully met. A Hungarian algorithm-based role assignment mechanism has been subsequently envisaged for the selection of an optimal cluster head, proxy cluster head, and followers amongst the members of a vehicular cluster for maximizing its overall efficacy. Furthermore, the notion of an adaptive threshold has been proposed in order to identify and subsequently eliminate the smart malicious vehicles from an IoV network in a timely manner, i.e., as soon as they start exhibiting an adverse behavior, to guarantee that the network is not manipulated for any malicious gains. Extensive simulations have been carried out and performance analysis demonstrates the efficaciousness of our proposed scheme.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据