5 research outputs found
Recommended from our members
MobileTrust: Secure Knowledge Integration in VANETs
Vehicular Ad hoc NETworks (VANET) are becoming popular due to the emergence of the Internet of Things and ambient intelligence applications. In such networks, secure resource sharing functionality is accomplished by incorporating trust schemes. Current solutions adopt peer-to-peer technologies that can cover the large operational area. However, these systems fail to capture some inherent properties of VANETs, such as fast and ephemeral interaction, making robust trust evaluation of crowdsourcing challenging. In this article, we propose MobileTrust—a hybrid trust-based system for secure resource sharing in VANETs. The proposal is a breakthrough in centralized trust computing that utilizes cloud and upcoming 5G technologies to provide robust trust establishment with global scalability. The ad hoc communication is energy-efficient and protects the system against threats that are not countered by the current settings. To evaluate its performance and effectiveness, MobileTrust is modelled in the SUMO simulator and tested on the traffic features of the small-size German city of Eichstatt. Similar schemes are implemented in the same platform to provide a fair comparison. Moreover, MobileTrust is deployed on a typical embedded system platform and applied on a real smart car installation for monitoring traffic and road-state parameters of an urban application. The proposed system is developed under the EU-founded THREAT-ARREST project, to provide security, privacy, and trust in an intelligent and energy-aware transportation scenario, bringing closer the vision of sustainable circular economy
Recommended from our members
MobileTrust: Secure Knowledge Integration in VANETs
Vehicular Ad hoc NETworks (VANET) are becoming popular due to the emergence of the Internet of
Things and ambient intelligence applications. In such networks, secure resource sharing functionality is
accomplished by incorporating trust schemes. Current solutions adopt peer-to-peer technologies that can
cover the large operational area. However, these systems fail to capture some inherent properties of
VANETs, such as fast and ephemeral interaction, making robust trust evaluation of crowdsourcing
challenging. In this article, we propose MobileTrust – a hybrid trust-based system for secure resource
sharing in VANETs. The proposal is a breakthrough in centralized trust computing that utilizes cloud and
upcoming 5G technologies in order to provide robust trust establishment with global scalability. The ad hoc
communication is energy-efficient and protects the system against threats that are not countered by the
current settings. To evaluate its performance and effectiveness, MobileTrust is modelled in the SUMO
simulator and tested on the traffic features of the small-size German city of Eichstatt. Similar schemes are
implemented in the same platform in order to provide a fair comparison. Moreover, MobileTrust is deployed
on a typical embedded system platform and applied on a real smart car installation for monitoring traffic and
road-state parameters of an urban application. The proposed system is developed under the EU-founded
THREAT-ARREST project, to provide security, privacy, and trust in an intelligent and energy-aware
transportation scenario, bringing closer the vision of sustainable circular economy
Efficient Exact Regenerating Codes for Byzantine Fault Tolerance in Distributed Networked Storage
Today's large-scale distributed storage systems are commonly built using commodity software and hardware. As a result, crash-stop and Byzantine failures in such systems become more and more prevalent. In the literature, regenerating codes have been shown to be a more efficient way to disperse information across multiple storage nodes and recover from crash-stop failures. In this paper, we propose a novel decoding design of product-matrix constructed regenerating codes in conjunction with integrity check that allows exact regeneration of failed nodes and data reconstruction in the presence of Byzantine failures. A progressive decoding mechanism is incorporated in both procedures to leverage computation performed thus far. Unlike previous works, our new regenerating code decoding has the advantage that its building blocks, such as Reed-Solomon codes and standard cryptographic hash functions, are relatively well-understood because of their widespread applications. The fault tolerance and security properties of the proposed schemes are also analyzed. In addition, the performance of the proposed schemes, in terms of the average number of access nodes and the reconstruction failure probability versus the node failure probability, are also evaluated by Monte Carlo simulations