VANET Secure Reputation Evaluation & Management Model Based on Double Layer Blockchain
Abstract
:1. Introduction
- (i)
- Trust is the current judgment of an observation result generated by node interaction, while reputation is the long-term accumulated trust results of a node. In the existing VANET reputation and trust evaluation scheme, there is no good distinction between them. VANET network has its own structure of high mobility, frequent connection, and dynamic topology. Meanwhile, a bunch of vehicles cannot establish frequent and stable interactions with some fixed "social partners". Trust evaluation schemes of VSN based on the historical interactions of nodes are mostly oriented towards mutual trust and do not carry out quantitative calculation on the reputation of the nodes themselves. Furthermore, some researchers have tried to integrate VANET trust management schemes with blockchain technology. To our knowledge, there is no reputation evaluation scheme based on blockchain technology that fully covers the entire reputation updating process, including trust generation, record, and the conversion of trust values into reputation;
- (ii)
- Bayesian inference uses existing evidence to predict unknown evidence from the perspective of probability, and has been widely used in the trust evaluation of VANET. In the use of Bayesian inference, the similarity of direct comparison information between nodes is mostly adopted to obtain prior distribution, that is, the binomial distribution is directly used as prior distribution. If the information received is the same as self-observation, trust will be obtained, while if it is different, distrust will be obtained. However, due to the differences in vehicles’ speed, distance, and other factors in the actual scenarios, there will always be errors in the observation of an event in different states. Therefore, it is necessary to consider how to integrate various factors, and then compare the reliability of observation content on this basis to prevent misjudgment;
- (iii)
- Existing schemes consider the indirect trust of neighbor nodes based on security. Assuming that the vehicle node needs to judge the reliability of node , is a series of neighboring nodes that provide indirect trust. Most schemes directly fuse the trust of the neighbor node to as an indirect trust, and include it in the measurement of ’s trust to . The problem in these schemes is that the influence of the reputation value is not considered at all. That is, if the historical reputation of is greater than the historical reputation of , for , the reference value of ’s trust to should be reduced or directly set to zero;
- (iv)
- Most of the existing schemes give different measures of direct trust and indirect trust to generate the overall trust. In addition, some researchers add the social metrics of nodes. However, the process of connecting the two concepts of interactive trust and cumulative reputation and updating the reputation value of the target node through the trust value generated by a single interaction while resisting malicious attacks, is still an urgent problem that remains to be solved.
- (i)
- We propose a new two consortium blockchain-based reputation update model for VANET. It consists of the cooperation between two blockchains and helps to achieve the security for VANET. In detail, an event chain is used for safety verification, real-time emergency response, and the after-action accountability of road events. A reputation chain is used to establish a recessive vehicle reputation network, and to realize the storage and query of historical reputation value and social measures of vehicle nodes;
- (ii)
- We design an improved Bayesian inference (BI) algorithm based on multi-factor measurements to calculate the local direct trust value of vehicle nodes. This algorithm can optimize the calculation method of trust values and objectively evaluate the observation content from multiple dimensions, so as to better realize the increase of trust values of a normal vehicle node and the rapid decline of a malicious vehicle node;
- (iii)
- We design an adaptive improved algorithm based on historical reputation difference. When calculating the indirect trust value of vehicle nodes, the measurement weight of each node is modified by the adaptive difference attenuation factor according to the comparison between the neighbor node and its own historical reputation value stored in the chain. The importance of historical reputation is amplified;
- (iv)
- In the process of reputation weighted fusion update, the attenuation factor is used to control the historical reputation weight and an adjustment factor is introduced into the social measurement. A security trust update scheme is proposed based on the number threshold and the fluctuation factor, which can resist an on-off attack and collusive attack.
2. Related Work
2.1. Trust Computation
2.2. Reputation Evaluation and Management
3. Basic Concept and Initial Settings
3.1. System Components
3.2. Threat Model
- (i)
- direct attack: Adversaries show the same behavior as other normal vehicles in the first part of the activity cycle to accumulate reputation value. Following a certain point in time, they start to perform malicious behaviors;
- (ii)
- on-off attack: Adversaries alternately behave normally or maliciously throughout the activity cycle to confuse other vehicles and RSUs;
- (iii)
- collusive attack: Different from the first two attack modes that are marked by time, adversaries against a certain event or a certain vehicle act out by communicating each other’s status. The attack content not only includes giving lower trust scores to normal nodes, but also includes high trust values given from each other.
3.3. System Operation
- (i)
- When a vehicle node observes events, such as traffic jams, traffic accidents, bad weather, etc., it records and broadcasts the event information to the RSU. Then RSU will broadcast the event content to the vehicle nodes near the target event for observing and verifying the authenticity of the event (if it is in a remote area without RSU coverage, it will be directly broadcast to the surrounding vehicles for cooperative verification);
- (ii)
- When the vehicle node receives the verification request to observe the target event, it may form several different observation reports with different speeds, distance, and other factors. The multi-factor is quantified as unified through cosine similarity, and then the direct trust is calculated through Bayesian inference. The detailed algorithm for the calculation of direct trust is given in Section 4.2;
- (iii)
- The vehicle node communicates cooperatively with other surrounding nodes, and the direct trust generated by other nodes for the event is regarded as indirect trust, weighted to obtain the overall indirect trust for the event. The details of the indirect trust computation are given in Section 4.3;
- (iv)
- Following the calculation of direct and indirect trust, the overall trust of the target vehicle is obtained by fusion, and then all of the information is summarized and reported to the RSU.
- (i)
- When the RSU receives the event observation report uploaded by the vehicle node, it queries the vehicle nodes near the target area and makes requests for verification;
- (ii)
- Upon receiving the node trust of each cooperative certification vehicle and the calculated overall trust for the target vehicle, the historical reputation and social trust of the target vehicle are queried in the reputation chain and the new reputation value of the vehicle is obtained by integration. The event content and the reputation update content are recorded in the event chain and reputation chain, respectively. The specific algorithm will be given in Section 4.4.
4. Design of the DBREMM
4.1. Global Description and System Specific Settings
- (i)
- In our proposed system, the TA and RSU are trusted and will not be attacked. All digital certificates provided by the TA and information provided by the RSU are true and accurate;
- (ii)
- Each vehicle node has a unique pseudonym authenticated by the TA, as well as a key pair and digital certificate. In each communication between vehicle nodes and the RSU, the pseudonym of nodes has been authenticated. That is, in this paper, the entity security of nodes is not considered, but the data security of information given by the nodes is focused upon;
- (iii)
- Since the scheme designed in this paper is for VANET and does not emphasize specific usage scenarios, the difference of vehicles and the different type of each event are not set. The setting of various threshold values and weight factors mentioned in the subsequent formulas in this section are preset within a reasonable range without special settings.
4.2. Direct Trust
4.3. Indirect Trust
4.4. Trust Fusion and Reputation Update
4.5. Content of Blocks
- (i)
- Event Chain: Event chain stores the content of the event information as the form of status list , including the first report node and report content, as well as all collaborative verification nodes, verification content, and trust conditions. is the report information, including the status of first report node and event content . is the certification report, which was introduced in Section 4.4. is recorded as a transaction in the block. The purpose of the event chain is to record all of the events that have happened and the information of all of the vehicles that have participated in the observation of those events. The superstructure of the event chain is the emergency response unit, which is responsible for the emergency response, broadcast, and post-event accountability;
- (ii)
- Reputation Chain: Reputation chain stores updates of the reputation value, in the form of , including the trust value and social measures (if they occurred during the period of time when the events occurred). is recorded in the block as a transaction in the form of . The superstructure of the reputation chain is the TA, which is responsible for controlling the vehicle nodes according to their reputation values, for example, after a period of time, it gives realistic rewards to the nodes that maintain a high reputation value. Moreover, it discovers whether nodes are committing evil and adds them to the observation area. If the node is determined to be malicious, its key pair and digital certificate are immediately revoked to prevent it from continuing to participate in the network.
4.6. Consensus and Up-Chain
5. Experimental Analysis
5.1. Basic Settings of the Simulation
5.2. Performance Comparison of the Decision Logics
5.3. Reliability, Anti-Attack Capability, and Latency
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Nomenclature
Notation | Definition |
Reporter node | |
Collaborator nodes | |
Public key and private key of | |
Event set detected by | |
Report content of | |
Reputation value for node n at time t | |
Social reputation value of node n | |
(x,y) | Cosine similarity measure of (x, y) |
Direct / Indirect trust | |
Node trust from to | |
Overall trust of | |
,, | Weight factor |
References
- Mansour, M.B.; Salama, C.; Mohamed, H.K.; Hammad, S.A. Vanet security and privacy-an overview. Int. J. Netw. Secur. Its Appl. 2018, 10, 2. [Google Scholar] [CrossRef]
- Autonomous Cars Generate More Than 300 tb of Data per Year. Available online: https://crypto.stanford.edu/pbc/ (accessed on 17 October 2022).
- Sheikh, M.S.; Liang, J.; Wang, W. A survey of security services, attacks, and applications for vehicular ad hoc networks (vanets). Sensors 2019, 19, 3589. [Google Scholar] [CrossRef] [PubMed]
- Sedar, R.; Kalalas, C.; Vázquez-Gallego, F.; Alonso, L.; Alonso-Zarate, J. A comprehensive survey of v2x cybersecurity mechanisms and future research paths. IEEE Open J. Commun. Soc. 2023, 4, 325–391. [Google Scholar] [CrossRef]
- Yu, R.; Kang, J.; Huang, X.; Xie, S.; Zhang, Y.; Gjessing, S. Mixgroup:Accumulative pseudonym exchanging for location privacy enhancement in vehicular social networks. IEEE Trans. Dependable Secur. Comput. 2016, 13, 93–105. [Google Scholar] [CrossRef]
- Lo, N.W.; Tsai, J.L. An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks without pairings. IEEE Trans. Intell. Transp. Syst. 2015, 17, 1–10. [Google Scholar] [CrossRef]
- Tanas, C.; Herrera-Joancomarti, J. When users become sensors: Can we trust their readings? Int. J. Commun. Syst. 2015, 28, 601–614. [Google Scholar] [CrossRef]
- Delgado-Segura, S.; Tanas, C.; Herrera-Joancomartí, J. Reputation and reward: Two sides of the same bitcoin. Sensors 2016, 16, 776. [Google Scholar] [CrossRef]
- Smaldone, S.; Lu, H.; Shankar, P.; Iftode, L. Roadspeak: Enabling voice chat on roadways using vehicular social networks. In Proceedings of the 1st Workshop on Social Network Systems. SocialNets’08, April 1, 2008, Glasgow, Scotland, UK. Assoc. Comput. Mach. 2008, 8, 43–48. [Google Scholar]
- Yang, Q.; Wang, H. Toward trustworthy vehicular social networks. IEEE Commun. Mag. 2015, 53, 42–47. [Google Scholar] [CrossRef]
- Zou, S.; Xi, J.; Wang, S.; Lu, Y.; Xu, G. Reportcoin: A novel blockchain-based incentive anonymous reporting system. IEEE Access 2019, 7, 65544–65559. [Google Scholar] [CrossRef]
- Nakamoto, S. Bitcoin: A peer-to-peer electronic cash system. Decentralized Bus. Rev. 2008, 21260. [Google Scholar]
- Siddiqui, S.A.; Mahmood, A.; Zhang, W.E.; Sheng, Q.Z. Machine learning based trust model for misbehaviour detection in internet-of-vehicles. In Neural Information Processing: 26th International Conference, ICONIP 2019, Sydney, NSW, Australia, 12–15 December 2019; Gedeon, T., Wong, K., Lee, M., Eds.; Springer International Publishing: New York, NY, USA, 2019; pp. 512–520. [Google Scholar]
- Raya, M.; Papadimitratos, P.; Gligor, V.D.; Hubaux, J.-P. On data-centric trust establishment in ephemeral ad hoc networks. In Proceedings of the IEEE INFOCOM 2008-The 27th Conference on Computer Communications, Phoenix, AZ, USA, 13–18 April 2008; pp. 1238–1246. [Google Scholar]
- Zhang, J.; Zheng, K.; Zhang, D.; Yan, B. Aatms: An anti-attack trust management scheme in vanet. IEEE Access 2020, 8, 21077–21090. [Google Scholar] [CrossRef]
- Fang, W.; Zhang, W.; Liu, Y.; Yang, W.; Gao, Z. Btds: Bayesian-based trust decision scheme for intelligent connected vehicles in vanets. Trans. Emerg. Telecommun. Technol. 2020, 31, e3879. [Google Scholar] [CrossRef]
- Halabi, T.; Zulkernine, M. Trust-based cooperative game model for secure collaboration in the internet of vehicles. In Proceedings of the ICC 2019–2019 IEEE International Conference on Communications (ICC), Shanghai, China, 20–24 May 2019; pp. 1–6. [Google Scholar]
- Yan, K.; Zeng, P.; Wang, K.; Ma, W.; Zhao, G.; Ma, Y. Reputation consensus-based scheme for information sharing in internet of vehicles. IEEE Trans. Veh. Technol. 2023, 1–6. [Google Scholar] [CrossRef]
- Li, W.; Song, H. Art: An attack-resistant trust management scheme for securing vehicular ad hoc networks. IEEE Trans. Intell. Transp. Syst. 2015, 17, 960–969. [Google Scholar] [CrossRef]
- Mármol, F.G.; Pérez, G.M. Trip, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks. J. Netw. Comput. Appl. 2012, 35, 934–941. [Google Scholar] [CrossRef]
- Guleng, S.; Wu, C.; Chen, X.; Wang, X.; Yoshinaga, T.; Ji, Y. Decentralized trust evaluation in vehicular internet of things. IEEE Access 2019, 7, 15980–15988. [Google Scholar] [CrossRef]
- Xu, S.; Guo, C.; Hu, R.Q.; Qian, Y. Blockchain inspired secure computation offloading in a vehicular cloud network. IEEE Internet Things J. 2021, 9, 14723–14740. [Google Scholar] [CrossRef]
- Zhang, H.; Bian, X.; Xu, Y.; Xiang, S.; He, X. Blockchain-assisted vehicle reputation management method for vanet. J. Xidian Univ. 2022, 49, 49–59. [Google Scholar]
- Liu, G.; Yang, Q.; Wang, H.; Wu, S.; Wittie, M.P. Uncovering the mystery of trust in an online social network. In Proceedings of the 2015 IEEE Conference on Communications and Network Security (CNS), Florence, Italy, 28–30 September 2015; pp. 488–496. [Google Scholar]
- Huang, X.; Yu, R.; Kang, J.; Zhang, Y. Distributed reputation management for secure and efficient vehicular edge computing and networks. IEEE Access 2017, 5, 25408–25420. [Google Scholar] [CrossRef]
- Fei, Z.; Liu, K.; Huang, B.; Zheng, Y.; Xiang, X. Dirichlet process mixture model based nonparametric bayesian modeling and variational inference. In Proceedings of the 2019 Chinese Automation Congress (CAC), Hangzhou, China, 22–24 November 2019; pp. 3048–3051. [Google Scholar]
- Gazdar, T.; Belghith, A.; Abutair, H. An enhanced distributed trust computing protocol for vanets. IEEE Access 2017, 6, 380–392. [Google Scholar] [CrossRef]
- Gu, X.; Lun, T.; Jie, H. A social-aware routing protocol based on fuzzy logic in vehicular ad hoc networks. Int. Workshop High Mobil. Wirel. Commun. Beijing 2015, 12–16. [Google Scholar] [CrossRef]
- Fan, N.; Shen, S.; Wu, C.Q.; Yao, J. A hybrid trust model based on communication and social trust for vehicular social networks. Int. J. Distrib. Sens. Netw. 2022, 18, 161–166. [Google Scholar] [CrossRef]
- Kerrache, C.A.; Lagraa, N.; Hussain, R.; Ahmed, S.H.; Benslimane, A.; Calafate, C.T.; Cano, J.-C.; Vegni, A.M. Tacashi: Trust-aware communication architecture for social internet of vehicles. IEEE Internet Things J. 2018, 6, 5870–5877. [Google Scholar] [CrossRef]
- Jayasinghe, U.; Lee, G.M.; Um, T.-W.; Shi, Q. Machine learning based trust computational model for iot services. IEEE Trans. Sustain. Comput. 2018, 4, 39–52. [Google Scholar] [CrossRef]
- Mahmood, A.; Zhang, W.E.; Sheng, Q.Z.; Siddiqui, S.A.; Aljubairy, A. Trust management for software-defined heterogeneous vehicular ad hoc networks. In Security, Privacy and Trust in the IoT Environment; Springer: Berlin/Heidelberg, Germany, 2019; pp. 203–226. [Google Scholar]
- Wang, Y.; Su, Z.; Zhang, K.; Benslimane, A. Challenges and solutions in autonomous driving: A blockchain approach. IEEE Netw. 2020, 34, 218–226. [Google Scholar] [CrossRef]
- Yang, Z.; Zheng, K.; Yang, K.; Leung, V.C. A blockchain-based reputation system for data credibility assessment in vehicular networks. In Proceedings of the 2017 IEEE 28th Annual International Symposium On personal, Indoor, and Mobile Radio Communications (PIMRC), Montreal, QC, Canada, 8–13 October 2017; pp. 1–5. [Google Scholar]
- Yuan, Y.; Wang, F.-Y. Towards blockchain-based intelligent transportation systems. In Proceedings of the 2016 IEEE 19th international conference on intelligent transportation systems (ITSC), Rio de Janeiro, Brazil, 1–4 November 2016; pp. 2663–2668. [Google Scholar]
- Eziama, E.; Tepe, K.; Balador, A.; Nwizege, K.S.; Jaimes, L.M. Malicious node detection in vehicular ad-hoc network using machine learning and deep learning. In Proceedings of the 2018 IEEE Globecom Workshops (GC Wkshps), Abu Dhabi, United Arab Emirates, 9–13 December 2018; pp. 1–6. [Google Scholar]
- Gurung, S.; Lin, D.; Squicciarini, A.; Bertino, E. Information-oriented trustworthiness evaluation in vehicular ad-hoc networks. In International conference on Network and System Security; Springer: Berlin/Heidelberg, Germany, 2013; pp. 94–108. [Google Scholar]
- Sugumar, R.; Rengarajan, A.; Jayakumar, C. Trust based authentication technique for cluster based vehicular ad hoc networks (vanet). Wirel. Netw. 2018, 24, 373–382. [Google Scholar] [CrossRef]
- Dahmane, S.; Kerrache, C.A.; Lagraa, N.; Lorenz, P. Weistars: A weighted trust-aware relay selection scheme for vanet. In Proceedings of the 2017 IEEE International Conference on Communications (ICC), Paris, France, 21–25 May 2017; pp. 1–6. [Google Scholar]
- Ahmad, F.; Kurugollu, F.; Kerrache, C.A.; Sezer, S.; Liu, L. Notrino: A novel hybrid trust management scheme for internet-of-vehicles. IEEE Trans. Veh. Technol. 2021, 70, 9244–9257. [Google Scholar] [CrossRef]
- Oubabas, S.; Aoudjit, R.; Rodrigues, J.J.; Talbi, S. Secure and stable vehicular ad hoc network clustering algorithm based on hybrid mobility similarities and trust management scheme. Veh. Commun. 2018, 13, 128–138. [Google Scholar] [CrossRef]
- Fernandes, C.P.; Montez, C.; Adriano, D.D.; Boukerche, A.; Wangham, M.S. A blockchain-based reputation system for trusted vanet nodes. Ad. Hoc. Netw. 2023, 140, 103071. [Google Scholar] [CrossRef]
- Xu, Y.; Yu, E.; Song, Y.; Tong, F.v.; Xiang, Q.; He, L. R-tracing: Consortium blockchain-based vehicle reputation management for resistance to malicious attacks and selfish behaviors. IEEE Trans. Veh. Technol. 2023, 1–16. [Google Scholar] [CrossRef]
- Siddiqui, S.A.; Mahmood, A.; Sheng, Q.Z.; Suzuki, H.; Ni, W. A survey of trust management in the internet of vehicles. Electronics 2021, 10, 2223. [Google Scholar] [CrossRef]
- Mejri, M.N.; Ben-Othman, J.; Hamdi, M. Survey on vanet security challenges and possible cryptographic solutions. Veh. Commun. 2014, 1, 53–66. [Google Scholar] [CrossRef]
- Cuingnet, R. Bayesian Inference of Normal Distribution Parameters with Aggregate Data; Technical Report; Veolia Environment: Aubervilliers, France, 2021. [Google Scholar] [CrossRef]
- Hou, B.; Zhu, H.; Xin, Y.; Wang, J.; Yang, Y. Mpor: A modified consensus for blockchain-based internet of vehicles. Wirel. Commun. Mob. Comput. 2022, 2022, 1644851. [Google Scholar] [CrossRef]
- Hamdi, S.; Gancarski, A.L.; Bouzeghoub, A.; Yahia, S.B. Tison: Trust inference in trust-oriented social networks. ACM Trans. Inf. Syst. 2016, 34, 1–32. [Google Scholar] [CrossRef]
Reference | Decision Logic | Reputation Characteristics | Anti-Attack Capability |
---|---|---|---|
[14] | BI | I | Single Class |
[15] | BI | I, H | Several |
[16] | BI | I | Single Class |
[37] | Simple weighting | I | Single Class |
[38] | Simple weighting | I | Several |
[39] | 3VSL | I, H | Single Class |
[42] | Multi-weight fusion | I | Single Class |
[43] | Simple weighting | I | Several |
DBREMM | Multi-factor BI | I, H, S | Several |
Parameter | Value |
---|---|
Number of vehicles N | 200 |
Number of malicious vehicles | [10%, 40%] |
Initial reputation value | 0.6 |
Rounds of simulation iterations | 300 |
Minimum step size | 0.01 |
Ceiling of cooperative certification reward | 0.2 |
Attenuation factor | 0.3 |
Initial value | N∼(0, 0.03) |
Period of reassessment | Every 5 iterations |
Vehicles | Trust Computation and Fusion * | Reputation Update | Consensus ** |
---|---|---|---|
50 | 54.67 | 6.03 | 55.70 |
100 | 102.88 | 7.54 | 104.39 |
150 | 147.10 | 8.12 | 176.35 |
200 | 237.45 | 8.09 | 245.18 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Hou, B.; Xin, Y.; Zhu, H.; Yang, Y.; Yang, J. VANET Secure Reputation Evaluation & Management Model Based on Double Layer Blockchain. Appl. Sci. 2023, 13, 5733. https://doi.org/10.3390/app13095733
Hou B, Xin Y, Zhu H, Yang Y, Yang J. VANET Secure Reputation Evaluation & Management Model Based on Double Layer Blockchain. Applied Sciences. 2023; 13(9):5733. https://doi.org/10.3390/app13095733
Chicago/Turabian StyleHou, Bochuan, Yang Xin, Hongliang Zhu, Yixian Yang, and Jianhua Yang. 2023. "VANET Secure Reputation Evaluation & Management Model Based on Double Layer Blockchain" Applied Sciences 13, no. 9: 5733. https://doi.org/10.3390/app13095733