An Intelligent Automated System for Detecting Malicious Vehicles in Intelligent Transportation Systems

被引:5
作者
Ashfaq, Tehreem [1 ]
Khalid, Rabiya [1 ]
Yahaya, Adamu Sani [1 ,2 ]
Aslam, Sheraz [3 ,4 ]
Azar, Ahmad Taher [4 ,5 ,6 ]
Alkhalifah, Tamim [7 ]
Tounsi, Mohamed [4 ,5 ]
机构
[1] COMSATS Univ Islamabad, Dept Comp Sci, Islamabad 44000, Pakistan
[2] Bayero Univ Kano, Dept Informat Technol, Kano 700006, Nigeria
[3] Cyprus Univ Technol, Dept Elect Engn Comp Engn & Informat, CY-3036 Limassol, Cyprus
[4] Prince Sultan Univ, Coll Comp & Informat Sci, Riyadh 11586, Saudi Arabia
[5] Prince Sultan Univ, Automated Syst & Soft Comp Lab ASSCL, Riyadh 12435, Saudi Arabia
[6] Benha Univ, Fac Comp & Artificial Intelligence, Banha 13518, Egypt
[7] Qassim Univ, Coll Sci & Arts Ar Rass, Dept Comp, Ar Rass 52571, Saudi Arabia
关键词
certificate authority; intelligent vehicles; InterPlanetary File System; vehicular network; ELECTRIC VEHICLE; BLOCKCHAIN; INTERNET; SECURE; MECHANISM; MODEL;
D O I
10.3390/s22176318
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The exponential growth of intelligent vehicles(IVs) development has resulted in a complex network. As the number of IVs in a network increases, so does the number of connections. As a result, a great deal of data is generated. This complexity leads to insecure communication, traffic congestion, security, and privacy issues in vehicular networks (VNs). In addition, detecting malicious IVs, data integration, and data validation are major issues in VNs that affect network performance. A blockchain-based model for secure communication and malicious IV detection is proposed to address the above issues. In addition, this system also addresses data integration and transaction validation using an encryption scheme for secure communication. A multi-chain concept separates the legitimate and malicious data into two chains: the Integrity chain (I-chain) and Fraud chain (F-chain). This multi-chain mechanism solves the storage problem and reduces the computing power. The integration of blockchain in the proposed model provides privacy, network security, transparency, and immutability. To address the storage issue, the InterPlanetary File System (IPFS) is integrated with Certificate Authority (CA). A reputation mechanism is introduced to detect malicious IVs in the network based on ratings. This reputation mechanism is also used to prevent Sybil attack. The evaluation of the proposed work is based on the cost of smart contracts and computation time. Furthermore, two attacker models are presented to prevent the selfish mining attack and the Sybil attack. Finally, a security analysis of the proposed smart contracts with their security vulnerabilities is also presented.
引用
收藏
页数:28
相关论文
共 61 条
[1]   A Secured Privacy-Preserving Multi-Level Blockchain Framework for Cluster Based VANET [J].
Akhter, A. F. M. Suaib ;
Ahmed, Mohiuddin ;
Shah, A. F. M. Shahen ;
Anwar, Adnan ;
Zengin, Ahmet .
SUSTAINABILITY, 2021, 13 (01) :1-25
[2]   A Blockchain-Based Configuration for Balancing the Electricity Grid with Distributed Assets [J].
AlSkaif, Tarek ;
Holthuizen, Bart ;
Schram, Wouter ;
Lampropoulos, Ioannis ;
van Sark, Wilfried .
WORLD ELECTRIC VEHICLE JOURNAL, 2020, 11 (04) :1-17
[3]  
[Anonymous], 2024, Blockchain platform for industrial internet of things, DOI DOI 10.4236/JSEA.2016.910036
[4]  
[Anonymous], Proceedings of the twelfth international conference on World Wide Web-WWW'03, DOI [DOI 10.1145/775240.775242, DOI 10.1145/775152.775242]
[5]   Consensus Based Mechanism Using Blockchain for Intensive Data of Vehicles [J].
Ashfaq, Tehreem ;
Younis, Muhammad Ahmed ;
Rizwan, Shahzad ;
Iqbal, Zahid ;
Mehmood, Shahid ;
Javaid, Nadeem .
ADVANCES ON BROAD-BAND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS, 2020, 97 :44-55
[6]   Internet of Ships: A Survey on Architectures, Emerging Applications, and Challenges [J].
Aslam, Sheraz ;
Michaelides, Michalis P. ;
Herodotou, Herodotos .
IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (10) :9714-9727
[7]  
Bunsen T, 2018, INT ENERGY AGENCY
[8]  
Buterin V., Ethereum: A Next-Generation Smart Contract and Decentralized Application Platform
[9]   BEST: Blockchain-based secure energy trading in SDN-enabled intelligent transportation system [J].
Chaudhary, Rajat ;
Jindal, Anish ;
Aujla, Gagangeet Singh ;
Aggarwal, Shubhani ;
Kumar, Neeraj ;
Choo, Kim-Kwang Raymond .
COMPUTERS & SECURITY, 2019, 85 :288-299
[10]   On the detection of selfish mining and stalker attacks in blockchain networks [J].
Chicarino, Vanessa ;
Albuquerque, Celio ;
Jesus, Emanuel ;
Rocha, Antonio .
ANNALS OF TELECOMMUNICATIONS, 2020, 75 (3-4) :143-152