2,361 research outputs found
Data centric trust evaluation and prediction framework for IOT
© 2017 ITU. Application of trust principals in internet of things (IoT) has allowed to provide more trustworthy services among the corresponding stakeholders. The most common method of assessing trust in IoT applications is to estimate trust level of the end entities (entity-centric) relative to the trustor. In these systems, trust level of the data is assumed to be the same as the trust level of the data source. However, most of the IoT based systems are data centric and operate in dynamic environments, which need immediate actions without waiting for a trust report from end entities. We address this challenge by extending our previous proposals on trust establishment for entities based on their reputation, experience and knowledge, to trust estimation of data items [1-3]. First, we present a hybrid trust framework for evaluating both data trust and entity trust, which will be enhanced as a standardization for future data driven society. The modules including data trust metric extraction, data trust aggregation, evaluation and prediction are elaborated inside the proposed framework. Finally, a possible design model is described to implement the proposed ideas
Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Network
We propose a Trustworthy Service Evaluation (TSE) system to enable users to share service reviews inservice-oriented mobile social networks (S-MSNs). Each service provider independently maintains a TSE for itself, which collects andstores users’ reviews about its services without requiring any third trusted authority. The service reviews can then be made available tointerested users in making wise service selection decisions. It identify three unique service review attacks, i.e., linkability, rejection, and modification attacks, and develop sophisticated security mechanisms for the TSE to deal with these attacks. Specifically, the basicTSE (bTSE) enables users to distributedly and cooperatively submit their reviews in an integrated chain form by using hierarchical and aggregate signature techniques. It restricts the service providers to reject, modify, or delete the reviews. Thus, the integrity and authenticity of reviews are improved. Further, It extend the bTSE to a Sybil-resisted TSE (SrTSE) to enable the detection of two typical sybil attacks. In the SrTSE, if a user generates multiple reviews toward a vendor in a predefined time slot with differentpseudonyms, the real identity of that user will be revealed. Through security analysis and numerical results, It show that the bTSE and the SrTSE effectively resist the service review attacks and the SrTSE additionally detects the Sybil attacks in an efficient manner.Through performance evaluation, It show that the bTSE achieves better performance in terms of submission rate and delay than a service review system that does not adopt user cooperation
GSTR: Secure Multi-hop Message Dissemination in Connected Vehicles using Social Trust Model
The emergence of connected vehicles paradigm has made secure communication a
key concern amongst the connected vehicles. Communication between the vehicles
and Road Side Units (RSUs) is critical to disseminate message among the
vehicles. We focus on secure message transmission in connected vehicles using
multi_hop social networks environment to deliver the message with varying
trustworthiness. We proposed a Geographic Social Trust Routing (GSTR) approach;
messages are propagated using multiple hops and by considering the various
available users in the vehicular network. GSTR is proposed in an application
perspective with an assumption that the users are socially connected. The users
are selected based on trustworthiness as defined by social connectivity. The
route to send a message is calculated based on the highest trust level of each
node by using the nodes social network connections along the path in the
network. GSTR determines the shortest route using the trusted nodes along the
route for message dissemination. GSTR is made delay tolerant by introducing
message storage in the cloud if a trustworthy node is unavailable to deliver
the message. We compared the proposed approach with Geographic and Traffic Load
based Routing (GTLR), Greedy Perimeter Stateless Routing (GPSR), Trust-based
GPSR (T_GPSR). The performance results obtained show that GSTR ensures
efficient resource utilization, lower packet losses at high vehicle densities
Emergency warning messages dissemination in vehicular social networks: A trust based scheme
To ensure users' safety on the road, a plethora of dissemination schemes for Emergency Warning Messages (EWMs) have been proposed in vehicular networks. However, the issue of false alarms triggered by malicious users still poses serious challenges, such as disruption of vehicular traffic especially on highways leading to precarious effects. This paper proposes a novel Trust based Dissemination Scheme (TDS) for EWMs in Vehicular Social Networks (VSNs) to solve the aforementioned issue. To ensure the authenticity of EWMs, we exploit the user-post credibility network for identifying true and false alarms. Moreover, we develop a reputation mechanism by calculating a trust-score for each node based on its social-utility, behavior, and contribution in the network. We utilize the hybrid architecture of VSNs by employing social-groups based dissemination in Vehicle-to-Infrastructure (V2I) mode, whereas nodes' friendship-network in Vehicle-to-Vehicle (V2V) mode. We analyze the proposed scheme for accuracy by extensive simulations under varying malicious nodes ratio in the network. Furthermore, we compare the efficiency of TDS with state-of-the-art dissemination schemes in VSNs for delivery ratio, transmission delay, number of transmissions, and hop-count. The experimental results validate the significant efficacy of TDS in accuracy and aforementioned network parameters. © 2019 Elsevier Inc
A Review of Research on Privacy Protection of Internet of Vehicles Based on Blockchain
Numerous academic and industrial fields, such as healthcare, banking, and supply chain management, are rapidly adopting and relying on blockchain technology. It has also been suggested for application in the internet of vehicles (IoV) ecosystem as a way to improve service availability and reliability. Blockchain offers decentralized, distributed and tamper-proof solutions that bring innovation to data sharing and management, but do not themselves protect privacy and data confidentiality. Therefore, solutions using blockchain technology must take user privacy concerns into account. This article reviews the proposed solutions that use blockchain technology to provide different vehicle services while overcoming the privacy leakage problem which inherently exists in blockchain and vehicle services. We analyze the key features and attributes of prior schemes and identify their contributions to provide a comprehensive and critical overview. In addition, we highlight prospective future research topics and present research problems
Proof of Travel for Trust-Based Data Validation in V2I Communication Part I: Methodology
Previous work on misbehavior detection and trust management for
Vehicle-to-Everything (V2X) communication can identify falsified and malicious
messages, enabling witness vehicles to report observations about
high-criticality traffic events. However, there may not exist enough "benign"
vehicles with V2X connectivity or vehicle owners who are willing to opt-in in
the early stages of connected-vehicle deployment. In this paper, we propose a
security protocol for the communication between vehicles and infrastructure,
titled Proof-of-Travel (POT), to answer the research question: How can we
transform the power of cryptography techniques embedded within the protocol
into social and economic mechanisms to simultaneously incentivize
Vehicle-to-Infrastructure (V2I) data sharing activities and validate the data?
The key idea is to determine the reputation of and the contribution made by a
vehicle based on its distance traveled and the information it shared through
V2I channels. In particular, the total vehicle miles traveled for a vehicle
must be testified by digital signatures signed by each infrastructure component
along the path of its movement. While building a chain of proofs of spatial
movement creates burdens for malicious vehicles, acquiring proofs does not
result in extra cost for normal vehicles, which naturally want to move from the
origin to the destination. The proof of travel for a vehicle can then be used
to determine the contribution and reward by its altruistic behaviors. We
propose short-term and long-term incentive designs based on the POT protocol
and evaluate their security and performance through theoretical analysis and
simulations
Blockchain-Enabled Federated Learning Approach for Vehicular Networks
Data from interconnected vehicles may contain sensitive information such as
location, driving behavior, personal identifiers, etc. Without adequate
safeguards, sharing this data jeopardizes data privacy and system security. The
current centralized data-sharing paradigm in these systems raises particular
concerns about data privacy. Recognizing these challenges, the shift towards
decentralized interactions in technology, as echoed by the principles of
Industry 5.0, becomes paramount. This work is closely aligned with these
principles, emphasizing decentralized, human-centric, and secure technological
interactions in an interconnected vehicular ecosystem. To embody this, we
propose a practical approach that merges two emerging technologies: Federated
Learning (FL) and Blockchain. The integration of these technologies enables the
creation of a decentralized vehicular network. In this setting, vehicles can
learn from each other without compromising privacy while also ensuring data
integrity and accountability. Initial experiments show that compared to
conventional decentralized federated learning techniques, our proposed approach
significantly enhances the performance and security of vehicular networks. The
system's accuracy stands at 91.92\%. While this may appear to be low in
comparison to state-of-the-art federated learning models, our work is
noteworthy because, unlike others, it was achieved in a malicious vehicle
setting. Despite the challenging environment, our method maintains high
accuracy, making it a competent solution for preserving data privacy in
vehicular networks.Comment: 7 page
- …