Augmenting Vehicular Ad Hoc Network Security and Efficiency with Blockchain: A Probabilistic Identification and Malicious Node Mitigation Strategy

被引:0
作者
Juarez, Ruben [1 ]
Bordel, Borja [1 ]
机构
[1] Univ Politecn Madrid, Dept Informat Syst, Madrid 28031, Spain
关键词
vehicular ad hoc networks (VANETs); blockchain; probabilistic identification; network threat mitigation; reputation assessment; network efficiency; connected vehicle security; TRUST MANAGEMENT SCHEME; INTERNET; MODEL; AUTHENTICATION; THINGS;
D O I
10.3390/electronics12234794
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This manuscript delineates the development of an avant garde dual-layer blockchain architecture, which has been meticulously engineered to augment the security and operational efficacy of vehicular ad hoc networks (VANETs). VANETs, which are integral to the infrastructure of intelligent transport systems, facilitate the critical exchange of information between vehicular nodes. Despite their significance, these networks confront an array of formidable security vulnerabilities. Our innovative approach, employing a dual blockchain framework-the event chain and the reputation chain-meticulously tracks network activities, thereby significantly enhancing the trustworthiness and integrity of the system. This research presents a transformative dual-layer blockchain architecture, which was conceived to address the intricate security challenges pervasive in VANETs. The architecture pivots on a sophisticated reputation assessment framework, thus leveraging the principles of Bayesian inference and the analytical rigor of historical data to markedly diminish observational errors, as well as elevate the accuracy of reputation evaluations for vehicular nodes. A salient feature of our methodology is the implementation of an attenuation factor, which has been deftly calibrated to modulate the impact of historical behaviors on current reputation scores, thereby ensuring their relevance and alignment with recent vehicular interactions. Additionally, the numerical threshold serves as an indispensable mechanism, thus establishing a definitive criterion for the early identification of potentially malicious activities and enabling the activation of proactive security measures to safeguard the network's integrity. Empirical validation of our dual-layer blockchain model has yielded a remarkable 86% efficacy in counteracting malevolent behaviors, thus significantly outperforming extant paradigms. These empirical outcomes underscore the model's potential as a vanguard in the domain of secure and efficient reputation management within VANETs, thereby heralding a substantial advancement in the sphere of intelligent transportation systems.
引用
收藏
页数:35
相关论文
共 86 条
  • [1] Security of Vehicular Ad-Hoc Networks (VANET): A survey
    Afzal, Zehra
    Kumar, Manoj
    [J]. THIRD NATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE (NCCI 2019), 2020, 1427
  • [2] NOTRINO: A NOvel Hybrid TRust Management Scheme for INternet-of-Vehicles
    Ahmad, Farhan
    Kurugollu, Fatih
    Kerrache, Chaker Abdelaziz
    Sezer, Sakir
    Liu, Lu
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 70 (09) : 9244 - 9257
  • [3] Aji Pratama Ricky, 2020, 2020 International Seminar on Application for Technology of Information and Communication (iSemantic), P280, DOI 10.1109/iSemantic50169.2020.9234202
  • [4] [Anonymous], 2013, J. Inf. Secur, DOI [10.4236/jis.2013.42011, DOI 10.4236/JIS.2013.42011]
  • [5] [Anonymous], 2004, ACM VANET
  • [6] Ashton K., 2009, RFID J, V22, P97
  • [7] Asra S.A., 2022, TIERS Inf. Technol. J, V3, P17, DOI [10.38043/tiers.v3i1.3520, DOI 10.38043/TIERS.V3I1.3520]
  • [8] The Internet of Things: A survey
    Atzori, Luigi
    Iera, Antonio
    Morabito, Giacomo
    [J]. COMPUTER NETWORKS, 2010, 54 (15) : 2787 - 2805
  • [9] Bendechache M., 2020, P 18 INT S HIGH PERF
  • [10] SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies
    Bonneau, Joseph
    Miller, Andrew
    Clark, Jeremy
    Narayanan, Arvind
    Kroll, Joshua A.
    Felten, Edward W.
    [J]. 2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015, 2015, : 104 - 121