671 research outputs found

    Malicious vehicle detection based on beta reputation and trust management for secure communication in smart automotive cars network

    Get PDF
    High reliance on wireless network connectivity makes the vehicular ad hoc network (VANET) vulnerable to several kinds of cyber security threats. Malicious vehicles accessing the network can lead to hazardous situation by disseminating misleading information or data in the network or by performing cyber-attacks. It is a requirement that the information must be originated from the authentic and authorized vehicle and confidentiality must be maintained. In these circumstances, to protect the network from malicious vehicles, reputation system based on beta probability distribution with trust management model has been proposed to differentiate trustworthy vehicles from malicious vehicles. The trust model is based on adaptive neuro fuzzy inference system (ANFIS) which takes trust metrics as input to evaluate the trustworthiness of the vehicles. The simulation platform for the model is in MATLAB. Simulation results show that the vehicles need at least 80% trustworthiness to be considered as a trusted vehicle in the network

    Emergency Data Transmission Mechanism in VANETs using Improved Restricted Greedy Forwarding (IRGF) Scheme

    Get PDF
    One of the most critical tasks in Vehicular Ad-hoc Networks (VANETs) is broadcasting Emergency Messages (EMs) at considerable data delivery rates (DDRs). The enhanced spider-web-like Transmission Mechanism for Emergency Data (TMED) is based on request spiders and authenticated spiders to create the shortest route path between the source vehicle and target vehicles. However, the adjacent allocation is based on the DDR only and it is not clear whether each adjacent vehicle is honest or not. Hence, in this article, the Improved Restricted Greedy Forwarding (IRGF) scheme is proposed for adjacent allocation with the help of trust computation in TMED. The trust and reputation score value of each adjacent vehicle is estimated based on successfully broadcast emergency data. The vehicles’ position, velocity, direction, density, and the reputation score, are fed to a fuzzy logic (FL) scheme, which selects the most trusted adjacent node as the forwarding node for broadcasting the EM to the destination vehicles. Finally, the simulation results illustrate the TMED-IRGF model’s efficiency compared to state-of-the-art models in terms of different network metrics

    TrustE-VC: Trustworthy Evaluation Framework for Industrial Connected Vehicles in the Cloud

    Get PDF
    The integration between cloud computing and vehicular ad hoc networks, namely, vehicular clouds (VCs), has become a significant research area. This integration was proposed to accelerate the adoption of intelligent transportation systems. The trustworthiness in VCs is expected to carry more computing capabilities that manage large-scale collected data. This trend requires a security evaluation framework that ensures data privacy protection, integrity of information, and availability of resources. To the best of our knowledge, this is the first study that proposes a robust trustworthiness evaluation of vehicular cloud for security criteria evaluation and selection. This article proposes three-level security features in order to develop effectiveness and trustworthiness in VCs. To assess and evaluate these security features, our evaluation framework consists of three main interconnected components: 1) an aggregation of the security evaluation values of the security criteria for each level; 2) a fuzzy multicriteria decision-making algorithm; and 3) a simple additive weight associated with the importance-performance analysis and performance rate to visualize the framework findings. The evaluation results of the security criteria based on the average performance rate and global weight suggest that data residency, data privacy, and data ownership are the most pressing challenges in assessing data protection in a VC environment. Overall, this article paves the way for a secure VC using an evaluation of effective security features and underscores directions and challenges facing the VC community. This article sheds light on the importance of security by design, emphasizing multiple layers of security when implementing industrial VCsThis work was supported in part by the Ministry of Education, Culture, and Sport, Government of Spain under Grant TIN2016-76373-P, in part by the Xunta de Galicia Accreditation 2016–2019 under Grant ED431G/08 and Grant ED431C 2018/2019, and in part by the European Union under the European Regional Development FundS

    Design Models for Trusted Communications in Vehicle-to-Everything (V2X) Networks

    Get PDF
    Intelligent transportation system is one of the main systems which has been developed to achieve safe traffic and efficient transportation. It enables the road entities to establish connections with other road entities and infrastructure units using Vehicle-to-Everything (V2X) communications. To improve the driving experience, various applications are implemented to allow for road entities to share the information among each other. Then, based on the received information, the road entity can make its own decision regarding road safety and guide the driver. However, when these packets are dropped for any reason, it could lead to inaccurate decisions due to lack of enough information. Therefore, the packets should be sent through a trusted communication. The trusted communication includes a trusted link and trusted road entity. Before sending packets, the road entity should assess the link quality and choose the trusted link to ensure the packet delivery. Also, evaluating the neighboring node behavior is essential to obtain trusted communications because some misbehavior nodes may drop the received packets. As a consequence, two main models are designed to achieve trusted V2X communications. First, a multi-metric Quality of Service (QoS)-balancing relay selection algorithm is proposed to elect the trusted link. Analytic Hierarchy Process (AHP) is applied to evaluate the link based on three metrics, which are channel capacity, link stability and end-to-end delay. Second, a recommendation-based trust model is designed for V2X communication to exclude misbehavior nodes. Based on a comparison between trust-based methods, weighted-sum is chosen in the proposed model. The proposed methods ensure trusted communications by reducing the Packet Dropping Rate (PDR) and increasing the end-to-end delivery packet ratio. In addition, the proposed trust model achieves a very low False Negative Rate (FNR) in comparison with an existing model

    Fuzzy Logic

    Get PDF
    The capability of Fuzzy Logic in the development of emerging technologies is introduced in this book. The book consists of sixteen chapters showing various applications in the field of Bioinformatics, Health, Security, Communications, Transportations, Financial Management, Energy and Environment Systems. This book is a major reference source for all those concerned with applied intelligent systems. The intended readers are researchers, engineers, medical practitioners, and graduate students interested in fuzzy logic systems

    Handover management in mobile WiMAX using adaptive cross-layer technique

    Get PDF
    The protocol type and the base station (BS) technology are the main communication media between the Vehicle to Infrastructure (V2I) communication in vehicular networks. During high speed vehicle movement, the best communication would be with a seamless handover (HO) delay in terms of lower packet loss and throughput. Many studies have focused on how to reduce the HO delay during lower speeds of the vehicle with data link (L2) and network (L3) layers protocol. However, this research studied the Transport Layer (L4) protocol mobile Stream Control Transmission Protocol (mSCTP) used as an optimal protocol in collaboration with the Location Manager (LM) and Domain Name Server (DNS). In addition, the BS technology that performs smooth HO employing an adaptive algorithm in L2 to perform the HO according to current vehicle speed was also included in the research. The methods derived from the combination of L4 and the BS technology methods produced an Adaptive Cross-Layer (ACL) design which is a mobility oriented handover management scheme that adapts the HO procedure among the protocol layers. The optimization has a better performance during HO as it is reduces scanning delay and diversity level as well as support transparent mobility among layers in terms of low packet loss and higher throughput. All of these metrics are capable of offering maximum flexibility and efficiency while allowing applications to refine the behaviour of the HO procedure. Besides that, evaluations were performed in various scenarios including different vehicle speeds and background traffic. The performance evaluation of the proposed ACL had approximately 30% improvement making it better than the other handover solutions

    Privacy-Aware Fuzzy Skyline Parking Recommendation Using Edge Traffic Facilities

    Get PDF

    Emergency Data Transmission Mechanism in VANETs using Improved Restricted Greedy Forwarding (IRGF) Scheme

    Get PDF
    One of the most critical tasks in Vehicular Ad-hoc Networks (VANETs) is broadcasting Emergency Messages (EMs) at considerable data delivery rates (DDRs). The enhanced spider-web-like Transmission Mechanism for Emergency Data (TMED) is based on request spiders and authenticated spiders to create the shortest route path between the source vehicle and target vehicles. However, the adjacent allocation is based on the DDR only and it is not clear whether each adjacent vehicle is honest or not. Hence, in this article, the Improved Restricted Greedy Forwarding (IRGF) scheme is proposed for adjacent allocation with the help of trust computation in TMED. The trust and reputation score value of each adjacent vehicle is estimated based on successfully broadcast emergency data. The vehicles’ position, velocity, direction, density, and the reputation score, are fed to a fuzzy logic (FL) scheme, which selects the most trusted adjacent node as the forwarding node for broadcasting the EM to the destination vehicles. Finally, the simulation results illustrate the TMED-IRGF model’s efficiency compared to state-of-the-art models in terms of different network metrics

    Cognitive radio networks : quality of service considerations and enhancements

    Get PDF
    The explosive growth of wireless and mobile networks, such as the Internet of Things and 5G, has led to a massive number of devices that primarily use wireless channels within a limited range of the radio frequency spectrum (RFS). The use of RFS is heavily regulated, both nationally and internationally, and is divided into licensed and unlicensed bands. While many of the licensed wireless bands are underutilised, useable unlicensed bands are usually overcrowded, making the efficient use of RFS one of the critical challenges faced by future wireless communication technologies. The cognitive radio (CR) concept is proposed as a promising solution for the underutilisation of useful RFS bands. Fundamentally, CR technology is based on determining the unoccupied licensed RFS bands, called spectrum white spaces or holes, and accessing them to achieve better RFS utilisation and transmission propagation. The holes are the frequencies unused by the licensed user, or primary user (PU). Based on spectrum sensing, a CR node, or secondary user (SU), senses the surrounding spectrum periodically to detect any potential PU transmission in the current channel and to identify the available spectrum holes. Under current RFS regulations, SUs may use spectrum holes as long as their transmissions do not interfere with those of the PU. However, effective spectrum sensing can introduce overheads to a CR node operation. Such overheads affect the quality of service (QoS) of the running applications. Reducing the sensing impact on the QoS is one of the key challenges to adopting CR technology, and more studies of QoS issues related to implementing CR features are needed. This thesis aims to address these QoS issues in CR while considered the enhancement of RFS utilisation. This study concentrates on the spectrum sensing function, among other CR functions, because of its major impact on QoS and spectrum utilisation. Several spectrum sensing methods are reviewed to identify potential research gaps in analysing and addressing related QoS implications. It has been found that none of the well-known sensing techniques is suitable for all the diverse QoS requirements and RFS conditions: in fact, higher accuracy sensing methods cause a significant QoS degradation, as illustrated by several simulations in this work. For instance, QoS degradation caused by high-accuracy sensing has not yet been addressed in the IEEE 802.11e QoS mechanism used in the proposed CR standard, IEEE 802.11af (or White-Fi). This study finds that most of the strategies proposed to conduct sensing are based on a fixed sensing method that is not adaptable to the changeable nature of QoS requirements. In contrast, this work confirms the necessity of using various sensing techniques and parameters during a CR node operation for better performance
    • …
    corecore