ArticlePDF Available

An authentication and plausibility model for big data analytic under LOS and NLOS conditions in 5G-VANET

Authors:

Abstract and Figures

The exchange of correct and reliable data among legitimate nodes is one of the most important challenges in vehicular ad hoc networks (VANETs). Malicious nodes and obstacles, by generating inaccurate information, have a negative impact on the security of 5G-VANET. The big data generated in the vehicular network is also an issue in the security of VANET. To this end, a security model based on authentication and plausibility is proposed to improve the safety of network named ‘AFPM’. In the first layer, an authentication mechanism using edge nodes along with 5G is proposed to deal with the illegitimate nodes who enter the network and broadcast wrong information. In the authentication mechanism, because of the growth of the connected vehicles to the edge nodes that lead to generating big data and hence the inappropriateness of the traditional data structures, cuckoo filter, as a space-efficient probabilistic data structure, is used. In the second layer, a plausibility model by performing fuzzy logic is presented to cope with inaccurate information. The plausibility model is based on detection of inconsistent data involved in the event message. The plausibility model not only tackles with inaccurate, incomplete, and inaccuracy data but also deals with misbehaviour nodes under both line-of-sight (LOS) and non-line-of-sight (NLOS) conditions. All obtained results are validated through well-known evaluation measures such as F-measure and communication overhead. The results presented in this paper demonstrate that the proposed security model possesses a better performance in comparison with the existing studies.
Content may be subject to copyright.
SCIENCE CHINA
Information Sciences
December 2020, Vol. 63 220305:1–220305:17
https://doi.org/10.1007/s11432-019-2835-4
c
Science China Press and Springer-Verlag GmbH Germany, part of Springer Nature 2020 info.scichina.com link.springer.com
.RESEARCH PAPER .
Special Focus on Challenges and New Insights for Network Security in 5G-and-Beyond
An authentication and plausibility model for big data
analytic under LOS and NLOS conditions in
5G-VANET
S. A. SOLEYMANI1, M. H. ANISI2*, A. Hanan ABDULLAH1, M. Asri NGADI1,
Sh. GOUDARZI3*, M. Khurram KHAN4& M. Nazri KAMA5
1School of Computing, Faculty of Engineering, Universiti Teknologi Malaysia (UTM), Johor 81310, Malaysia;
2School of Computer Science and Electronic Engineering, University of Essex, Colchester CO4 3SQ, UK;
3Centre of Artificial Intelligence, National University of Malaysia (UKM), Selangor 43600, Malaysia;
4Center of Excellence in Information Assurance (CoEIA), King Saud University, Riyadh 11653, Saudi Arabia;
5Advanced Informatics School, Menara Razak, Universiti Teknologi Malaysia (UTM), Kuala Lumpur 54100, Malaysia
Received 1 November 2019/Accepted 16 March 2020/Published online 12 November 2020
Abstract The exchange of correct and reliable data among legitimate nodes is one of the most important
challenges in vehicular ad hoc networks (VANETs). Malicious nodes and obstacles, by generating inaccurate
information, have a negative impact on the security of 5G-VANET. The big data generated in the vehicular
network is also an issue in the security of VANET. To this end, a security model based on authentication and
plausibility is proposed to improve the safety of network named ‘AFPM’. In the first layer, an authentication
mechanism using edge nodes along with 5G is proposed to deal with the illegitimate nodes who enter the
network and broadcast wrong information. In the authentication mechanism, because of the growth of the
connected vehicles to the edge nodes that lead to generating big data and hence the inappropriateness of
the traditional data structures, cuckoo filter, as a space-efficient probabilistic data structure, is used. In the
second layer, a plausibility model by performing fuzzy logic is presented to cope with inaccurate informa-
tion. The plausibility model is based on detection of inconsistent data involved in the event message. The
plausibility model not only tackles with inaccurate, incomplete, and inaccuracy data but also deals with
misbehaviour nodes under both line-of-sight (LOS) and non-line-of-sight (NLOS) conditions. All obtained
results are validated through well-known evaluation measures such as F-measure and communication over-
head. The results presented in this paper demonstrate that the proposed security model possesses a better
performance in comparison with the existing studies.
Keywords authentication, plausibility, fuzzy logic, cuckoo filter, 5G-VANET, big data
Citation Soleymani S A, Anisi M H, Abdullah A H, et al. An authentication and plausibility model for big data
analytic under LOS and NLOS conditions in 5G-VANET. Sci China Inf Sci, 2020, 63(12): 220305, https://doi.org/
10.1007/s11432-019-2835-4
1 Introduction
As the key component of smart transportation systems, VANETs, as a sub class of mobile ad hoc
network (MANET) [1], are mobile networks including infrastructures and vehicles. VANETs are used
for communications either between an infrastructure and a vehicle (V2I) or between vehicle and vehicle
(V2V). VANETs are capable of facilitating various beneficial uses including road safety improvement,
vehicular mobile data services, self-driving assistance, and traffic management [2,3].
* Corresponding author (email: m.anisi@essex.ac.uk, shidrokh@ukm.edu.my)
Soleymani S A, et al. Sci China Inf Sci December 2020 Vol. 63 220305:2
In this network, issues like multi-hop connectivity, nonexistence of centrality, infrastructure-less nature,
and lack of clear defence line make this network unstable [4]. In addition to these issues, the data passed
on this network are very crucial and sensitive because any attack or damage on them can result in huge
disasters to human lives [5]. Hence, security is one of the most imperative concerns in VANET.
In the vehicular network, one of the major challenges of security is the exchange of reliable and correct
data among legitimate nodes. Because the exchanged data have a great impact on the safety and comfort
of passengers, dealing with malicious and faulty nodes that create inaccurate data is an important issue.
Obstacles, such as existing buildings in vehicular environments, also have a negative impact on the
accuracy of the data. These objects by restricting direct communication between nodes create wrong
information in the network. Plausibility checking, as an element of security model, is a way to deal
with inaccurate and unreliable information in highly distributed and dynamic scenarios such as VANET.
Authors in [6] stated that plausibility-check ensures the reliability of data. Authentication is also a
security requirement for accepting safety messages from the VANETs legitimate users [7]. Authentication
can be performed in two levels including message and node authentication. Message authentication
ensures the integrity of event message; whereas node authentication certifies the legitimacy of vehicle
node. An authentication outline can simple categorize non-legitimate nodes while providing security in
the VANET. Motivated by this observation, this paper seeks for developing a proper security modal
based on plausibility and authentication. The proposed model should be able to deal with inaccurate
data created by malicious, faulty and unauthorized nodes under line-of-sight (LOS) and non-line-of-sight
(NLOS) condition.
Additionally, owing to the big data created in the vehicular network, because of the ever-incrementing
demand of mobile services, the security model needs to support five dimensions of large data as volume,
velocity, variety, veracity and value [8]. For this purpose, usage of edge computing in the network can be
effective. This is mainly because the edge nodes have much better processing compared to roadside units
(RSUs) in the vehicular network. Moreover, given the shortcoming of IEEE 802.11p-based networks, fifth
generation (5G) technology is impressive to improve the abilities of computation and communication
in the vehicular network. Therefore, to efficiently support big data and in addition improve network
connectivity for providing secure information transmission, in this paper RSUs are substituted with edge
nodes to communicate intermediately along with 5G network.
The key concentrations of this study are summarized as follows:
(i) We provide a two-layer security model using edge nodes in 5G-VANET. In the first layer, we develop
an authentication mechanism to deal with any illegitimate node entered the network. In the second layer,
we propose a plausibility model to cope with inaccurate, incomplete and uncertainty data.
(ii) We analyse the proposed security model under LOS and NLOS circumstances in 5G-VANET. A
NLOS condition occurs where the two lines intersect. This condition results in a message drop by a total
signal block.
(iii) We evaluate the proposed security model over density, velocity and different percentage of malicious
nodes. F-measure and communication overhead are also utilized to assess the performance of the provided
model.
The structure of the other parts of the article is as follows. Section 2 discusses the related work
on authentication and plausibility model in VANET. Section 3 provides the proposed security model,
technically. Section 4 provides the simulation environment and performance evaluation metrics. The
observations and results validating the effectiveness of the proposed model are drawn in Section 5. Ulti-
mately, Section 6 concludes the paper.
2 Related work
Recently, many studies have paid more attention to improve passengers safety in VANET. A security
model tries to prepare the network to be protected against malicious and unauthorized nodes. Authen-
tication and plausibility, as requirements of security model [9], have vital role to improve safety of the
Soleymani S A, et al. Sci China Inf Sci December 2020 Vol. 63 220305:3
vehicular network.
To empower vehicular environment, it is significant to authenticate vehicle nodes that transmit through
the vehicular network. Authentication is a mechanism to avoid access to the system by illegal nodes who
are able to communicate whereas they do not belong to the network. According to [9], a powerful
authentication model provides legal proofs using external mechanisms to find out illegitimate nodes.
Plausibility check is also a way to recognize correct/incorrect messages by detecting inconsistencies in
data [10]. It is similar to intrusion detection systems in traditional networks in which vehicles correlate
the received information with the information already known from previous interaction or predefined
thresholds such as speed limits. Based on this perspective, in this section, we separately rough out and
discuss the existing authentication and plausibility models in the vehicular networks.
2.1 Authentication model
In [8], a security model is proposed to deal with unauthorized nodes using edge computing. The proposed
authentication model is based on the quotient filter at both the vehicle and edge node’s layer. The quotient
filter is a probabilistic data structure that is utilized for query of the dataset. The main objectives of
this model are to detect illegal nodes and any attacks initiated in the network.
Authors in [11] categorized the authentication schemes into four groups including huge number of
anonymous keys (HAB), group signature based schemes (GSB), road side unit based schemes (RSUB)
and tamper-proof device based schemes (TPDB). Comparison with other authentication schemes, they
mentioned that RSUB schemes [12,13] are more efficient. In the RSUB scheme, the computation and
verification done by RSU are much more than other schemes and hence it completely depends on the
infrastructure. However, the V2V communication is not supported by this scheme. Tangade et al. [14]
proposed a node authentication model through RSU. In this study, a V2I pre-authenticated step is
developed. Based on this, before starting communication between two vehicle nodes (V2V), the pre-
authenticated phase will be performed. However, because of the large number of vehicles connected to
the vehicular network, the method used in this model is not suitable.
2.2 Plausibility model
In the vehicular network, plausibility-check compares the received data with the data of the internal
sensor or evaluates the messages from various sources regarding an individual occurrence. For example,
the location of an adjacent vehicle is proved through received mobility data from cooperative awareness
messages (CAMs) sent by the target node and other neighbours, and information from vehicle-local
sensors.
In [15], a beacon-oriented trust model is provided to improve privacy in VANET. In this model, trust of
data is measured by cross-checking the likelihood of event message and beacon message. For verification
of the plausibility of the event-message and maintaining the trustworthiness, it computes the composite
direct event trust. It considers two plausibility measurements in addition to the trustworthiness value as
maximum transmission delay verifying and maximum transmission distance verifying. In case the bigger
distance between the message transmitter and the message receiver than the maximum transmission
distance or when the time interruption between the event message time-stamp and the current time-
stamp of the receiver is higher than maximum event message postponement, then the event message’s
trustworthiness will be adjusted to 0. Followed by passing the plausibility verification, direct event trust
will be allocated by the composite value of the cosine similarity and Tanimoto similarity with a weight
value.
Bismeyer et al. [6] proposed a model to assess the trustworthiness of node using data plausibility
check. They mentioned that not only a cryptographic solution is required to increase safety but also
the data plausibility check is an important mechanism. They stated that every node in the VANET
runs individually a plausibility checker to find the ghost vehicles. It can find abnormal happenings like
overlaps, unpredicted position jumps or quickly appearing nodes.
Soleymani S A, et al. Sci China Inf Sci December 2020 Vol. 63 220305:4
Lo and Tsai [16] presented a new attack in vehicular environment called illusion attack. Based on this
attack, using sensors mounted on the vehicle produces wrong information and broadcasts to neighbour
nodes. Then, they proposed a plausibility validation network (PVN) to deal with the illusion attack.
It contains rule database and plausibility network (PN) module. Each value in the PN module, in an
element field of the considered message is cross confirmed by the values of other correlated element fields
referring the rules defined previously in rule set.
Incorrect position information can cause problems such as increased fuel consumption, reduced passen-
ger comfort, and in some cases even accidents. Authors in [17] developed Vouch, a secure proof-of-location
scheme tailored for VANETs. The scheme leverages the node positioning capability of 5G wireless net-
work roadside units. The key idea of Vouch is to disseminate periodic proofs of location, combined with
plausibility checking of movement between proofs.
Based on available knowledge, few models of security have focused on the impact of obstacles and
unauthorized vehicles on correctness of data in 5G-VANET. Both static and moving obstacles are an
inseparable part of the urban vehicular network. In the NLOS condition, direct communication between
two nodes restricts by obstacles. Obviously, these restrictions are able to effect the reliability, integrity,
and availability of the event message. Despite the existing security models in the literature, there is lack
of a security model that works correctly in both LOS and NLOS cases. Moreover, owing to the big data
created in the 5G-VANET, there is lack of proper security model that not only evaluates the correctness
of data but also needs to support five dimensions of large data.
3 Authentication and fuzzy plausibility model (AFPM)
In this study, we proposed a two-layer security model using edge nodes along with 5G-VANET to deal with
unauthorized vehicle nodes as well as to cope with inaccurate information generated by malicious, faulty
nodes and in addition obstacles. In the first layer, we develop a mechanism based on probabilistic data
structure to detect illegitimate nodes entered the network. In the second layer we propose a plausibility
model based on fuzzy logic to tackle uncertainty and inaccurate information (see Figure 1). In the
following, we describe each layer of security model in details.
3.1 Authentication mechanism
According to [2,18], authentication, as an element of security systems, is a way to ensure integrity and
accuracy of event message exchanged among nodes. Unauthorized nodes by creating inaccurate data
threat security of network. To this end, we propose a lightweight mechanism to detect unauthorized
nodes entered the network. In the proposed mechanism, it is assumed that RSUs are substituted by
edge nodes. This is mainly because the edge nodes contain much better processing power than RSUs to
reduce latency, increase throughput and enhance security. It is supposed that each edge node has a list
of registered vehicle nodes who are within its defined communication range. To assess the authentication
of the vehicle node Viby Vj, a query from the relevant edge node by Vjis enough, which is explained in
detail next.
On the other hand, owing to the growth of connected vehicles to the edge nodes, which results in
generating a large amount of data in the edge nodes, using the traditional data structures cannot be
suitable. This is because of the much memory and high latency of processing queries in traditional data
structures. Hence, it is assumed that the probabilistic data structure, as a group of data structure, is
used in the proposed authentication model. This kind of data structure is extremely useful for big data
because it reduces latency and analytical process [19]. Bloom filter (BF), cuckoo filter (CF), and quotient
filter (QF) are three different of space-efficient probabilistic data structures that used to check whether
an element is member of massive dataset or not. According to [20], QF has fast and efficient querying
of the elements even in secondary memory than BF. Authors in [21] stated that CF has practically
better performance than BF and QF. CF is easier to implement than BF and QF. In terms of space
efficiency, CF also uses less space than BF in different applications by the false positive rate of less than
Soleymani S A, et al. Sci China Inf Sci December 2020 Vol. 63 220305:5
Event message
is authorized?
Discard NO
YES
Query (Va )
Authentication mechanism
Location verification using distance
(LvoD)
Location verification using time
(LvoT)
Accept as reliable message
Correct
Discard
Decision making module
Incorrect
Plausibility model
Type of vehicle
(ToV)
Va
Figure 1 (Color online) Modular framework of AFPM.
3%. It also outperforms QF and BF in lookup performance. Totally, compared to BF and QF, a cuckoo
filter has better throughput. Hence, we use CF to query from the edge node’s dataset in the proposed
authentication model.
3.1.1 Cuckoo filter
A cuckoo filter is a compact variant of a cuckoo hash table storing only fingerprints rather than key-value
sets. Fingerprint is a bit string resultant from the element utilizing a hash function, for each inserted
item. The cuckoo filter uses a hash table based on cuckoo hashing to store the fingerprints of items. Hash
table is a structure of data storing the information in an associative mode. Within a hash table, the data
are stored in an array format with individual index value for the data value. Cuckoo hashing [22] is an
alternative open-addressing solution which ensures constant lookup in the worst case. In cuckoo filter
two potential buckets in the table for a given item xare required by cuckoo hashing that are calculated
by the following hash functions:
f= fingerprint(x),(1)
h1(x) = hash(x),(2)
h2(x) = h1(x)hash(f).(3)
Based on partial-key cuckoo hashing, the hash table can achieve both highly-utilization and compact
because only fingerprints are stored. Lookup and delete operations of cuckoo filter are straightforward.
There is a maximum of two locations to check by h1(x) and h2(x). If found, the suitable lookup or delete
operation are conducted in O(1) time.
The cuckoo filter is compactly occupied with fingerprints (for example 95% entries filled) conferring
high space effectiveness. The hash table is easily searched by a set membership query for item xfor the
fingerprint of x, and returns true by finding an equal fingerprint. Using a multi-way associative cuckoo
Soleymani S A, et al. Sci China Inf Sci December 2020 Vol. 63 220305:6
Edge computing layer
Vehicle node layer
Figure 2 (Color online) Architecture of proposed model.
hash table, the cuckoo filters are greatly made space effective offering high table occupancy and high-
speed lookup; for reducing the hash table size further, at first each element is hashed into a fingerprint
with constant size prior to inserting into this hash table.
3.1.2 Vehicle to edge communication
Consider a set of authorized vehicle nodes that have been registered in the network ={V1, V2,...,VN}.
In addition, there is a set of edge nodes, instead of RSUs, with a defined communication range in the
network that is ={E1, E2,...,EM}. As shown in Figure 2, each edge node (Ek∈ ℑ) has a subset of
authorized vehicle nodes that are under its communication range. When a vehicle entered the range of
the edge node, the last existing list will be upgraded by the edge node. In CF, in order to add a new
vehicle Vid to the buckets of the relevant edge node, two hash functions h1 and h2 and an array Bwith
nbuckets where the i-th bucket will be named B[i] are needed. Also, a vehicle Vid exists that entered
within the edge node’s communication range.
Each vehicle such as Vi∈ ℜ can receive data from another vehicle Vj, as long as it is within the senders
transmission range. In order to check authentication of Vj, a query is performed by Vion the relevant edge
node that is under it at that time. Returning the edge node in TRUE, it means the sender is authorized;
otherwise, it is highlighted as an intruder within the network while sending an alert representing that
an unauthorized vehicle node has entered the network. Figure 3 shows the sequence diagram of V2E
communication to check authentication of sender of event message.
3.2 Fuzzy plausibility model
As stated earlier, the main idea of this study is to develop a security model to deal with inaccurate data
generated in the vehicular network. Obviously, these data have negative impact on the performance of the
network. Plausibility checking is a way to cope with inaccurate and unreliable information. Plausibility-
check ensures the reliability of data [6]. It is assumed that each vehicle shares some useful information such
as its location and velocity with other vehicles using beacon message in the network, automatically [23].
Building on this, location verification can be a way to assess the senders plausibility to determine the
true location of the sender or not [10].
In this subsection, a model is proposed to assess the plausibility of event message by doing fuzzy
logic. In the proposed model, fuzzy logic, as an artificial intelligence, is utilized. This is because fuzzy
logic performs well in decision making systems and in addition it reduces delay in computation [24].
Nevertheless, by getting an event message from adjacent vehicles, this model evaluates the plausibility of
Soleymani S A, et al. Sci China Inf Sci December 2020 Vol. 63 220305:7
Sender (Vi)Receiver (Vj)Edge node
Send (Msg)
Query (Vi)
Return TRUE
Return FALSE
Establish link
Reject
CF (Vi)
[else]
alt
Figure 3 (Color online) A sequence diagram of vehicle to edge (V2E) communication.
Type of vehicle
(ToV)
Fuzzy
decision making
module
(FDM)
Type
Message status
Input
Location
verification
module using
distance
Location
verification
module using
time
LvoD
LvoT
Fuzzy
plausibility
module
(F-PLAUS)
Input
Input
Plausibility level
Figure 4 (Color online) Working model of plausibility model.
the event message through location verification. Then, based on type of vehicle, it decides on the received
data. The work-flow of the proposed model is shown in Figure 4.
In order to verify location, two modules are presented using distance and time which we are presenting
in the following.
3.2.1 Location verifying via distance (LvoD)
Verifying the measured distance between receiver and sender is a way to verify a claimed position. Hence,
the provided outline firstly computes the distance between two vehicles in a 2D plane using GPS location
information involved in the event message. It also computes the distance between two nodes using received
signal strength indicator (RSSI). Finally, it evaluates the level of location verification (LvoD) based on
the comparison between two measured. it is clear that obstacles have negative impact on security. This
is because, obstacles decrease the transmission efficiency between two vehicles. Obstacles can prevent
messages from reaching its destination. Vehicles would not receive proper beacons and are not able
to directly verify one of its neighbors. Therefore, owing to the existence of obstacles in the vehicular
Soleymani S A, et al. Sci China Inf Sci December 2020 Vol. 63 220305:8
Figure 5 (Color online) Estimating the distance between two nodes using a third common neighbour node.
environment, we propose two different algorithms in LOS and NLOS statuses. On the other hand, online
NLOS detection because of the obstacles, is an important issue in vehicular environment; but it is out of
scope of this study. Nevertheless, in order to determine a NLOS status, we label out all NLOS conditions.
LvoD under LOS condition. In this condition, it is assumed that there is no obstacle between
sender and receiver. In this condition, the proposed scheme measures the distance between Vand W
using GPS location information included in the event message by (4). It also calculates distance using
RSSI computation. Then, it compares the announced and measured distances. Node Vverifies node W
if both values are a match.
Distgps(V , W ) = q|XVXW|2+|YVYW|2.(4)
LvoD under NLOS condition. Consider node Vreceiving a message from node W. Under NLOS
condition, owing to the presence of obstacles, to verify location W, node Vsends a request to node N
along with its proclaimed position (XW, YW) and mobility vector. Node Nis a neighbour of both V
and Wand under their transmission range. Node Nis able to prove Wlocation by determination of its
distance via RSSI computing and comparing the proclaimed and measured values. In case both values
are a match, Nwill send a reply back to Vcomprising of the distance dN W and proving the location of
W. By receiving, Vverifies dV N (utilizing the radio measurement) and computes the angle θbetween
vectors Uand Zby
θ= ArcCos U·Z
kUk · kZk,(5)
where U=N·V= ((XVXN),(YVYN)) and Z=N·W= ((XWXN),(YWYN)). In addition,
U·Z=U1Z1+U2Z2,kUk=pU2
1+U2
2, and kZk=pZ2
1+Z2
2. Next, node Vcomputes the Distrssi to
node Wvia node Nby
Distrssi(V , W ) = qd2
V N +d2
NW 2dV N dN W cos θ, (6)
where dV N is the distance between Vand W,dNW is the distance between Nand Wmeasured utilizing
RSSI and θis the angle between vectors Uand Z(see Figure 5).
Based on the new coordinate of sender, node Valso measures distance (Disgps) to Wusing
Disgps(V , W ) = q|XVX
W|2+|YVY
W|2,(7)
where (X
W, Y
W) is the Wlocation caused by mobility. Owing to mobility, the actual position has changed
since the information was received. X
W=XW+xand Y
W=YW+y. Finally, it compares the
announced and measured distances. Node Vverifies node Wif both values are a match.
To verify sender, the provided outline calculates difference between two measured distance Distgps and
Distrssi. This value will be normalized by scaling between 0 and 1 using
D
gps-rssi =|Distgps Distrssi|
max(Distgps,Distrssi ),(8)
Soleymani S A, et al. Sci China Inf Sci December 2020 Vol. 63 220305:9
where max is a function to extract maximum value between Distgps and Distrssi. Next, it assesses the
severity level of ∆D
gps-rssi by altering this value to fuzzy data.
In order to simplify, three fuzzy sets are considered to represent LvoD including Low, Medium, and
High (see Figure 6(a)). It is more trustable if LvoD falls into Low function and it is not trustable if LvoD
falls into High function. The LvoD membership functions are selected in terms of experience, trial and
error of the application condition, hence, the range initiates at 0 and ends at 1.
3.2.2 Location verifying based on time (LvoT)
Time verifying is another method to find a falsely stated position [25]. Assuming correct location infor-
mation for both the receiver and sender, the anticipated received message time will be computed. Shaikh
and Alzahrani [26] mentioned that the value of this time is depending on the propagation speed and the
distance between two vehicles. Considering the physical medium of the link, propagation speed is within
2×108(m/s) and 3 ×108(m/s). In this study, the signal propagation speed will be c= 3 ×108.
LvoT under LOS condition. Under LOS, it supposes that a message is sent by node Wto Vat t1
and node Vreceives the message at timerec. It is predicted that node Vreceives the message at timeexp
measured via [2527]
timeexp =t1+Dist(Vt2, Wt1)
c,(9)
where Dist is the distance between sender and receiver obtained from (4) and c= 3 ×108.
LvoT under NLOS condition. Under NLOS circumstance, to verify node W, not only timeexp is
calculated by node Vbut also a request is sent by it to its straight neighbours having straight communi-
cation with W(for example node N). Then, a request is sent by node Nto Wwaiting for the response.
By receipt the response from W, timeexp is measured by node Ndirectly via (9) to check the validity
of Wvia comparison of the expected time and received time as previously stated. Then, a reply will be
sent by node Nback to node V, if the validity of Wis confirmed.
To assess the senders validity, the provided outline calculates ∆T
exp-rec using
T
exp-rec =|timeexp timerec |
max(timeexp,timerec ),(10)
where max is a function to find maximum value between timeexp and timerec. Then, it investigates
the severity level of this value by changing the value to fuzzy information. For this purpose, two fuzzy
memberships termed not-acceptable and acceptable are regarded to provide LvoT. Node Wis verified by
node V, if this value is positioned in the acceptable level and is not approved otherwise. According to
Figure 6(b), the LvoT range is between 0 and 1.
Fuzzy inference procedure is the 2nd stage for implementing the fuzzy logic. In this phase, the mem-
bership functions are combined with the control rules for deriving the fuzzy yield. The fuzzy inference
engine is a set of rules advanced through the professional knowledge.
To assess the definite level of plausibility (PLAUSlevel), a knowledge-centered rule is designed to connect
the outputs and the inputs. These rules are based on the philosophy behind the vehicular environment
and traffic engineering. Based on Table 1, the fuzzy inference engine is composed of six rules. The input
parameters for this module are LvoD and LvoT and the output is plausibility level. Figure 6(c) shows
the membership functions Low, Medium, and High to present the PLAUSlevel.
3.2.3 Decision-making module
In this subsection, the fuzzy decision-making module is proposed to assess the event messages status.
As shown in Figure 7, this module is based on the outputs of plausibility measurement module and in
addition type of vehicle.
The type of vehicle depends on the level of legitimacy of the vehicle node and it will be determined
in the registration step. Based on this, the registered vehicles will be classified into three groups: high
(H), medium (M), and low (L) level. The high-level vehicle nodes (H) chiefly denote for the police
Soleymani S A, et al. Sci China Inf Sci December 2020 Vol. 63 220305:10
Table 1 Fuzzy inference engine to determine plausibility level
Rule No. LvoD LvoT PLAUSlevel
1 Low Acceptable High
2 Low Not acceptable Medium
3 Medium Acceptable Medium
4 Medium Not acceptable Low
5 High Acceptable Medium
6 High Not acceptable Low
Acceptable Not acceptable
Low High
1
0.5
0
Medium
Low High
1
0.5
0
Medium
x
x
x
µ(x)
µ(x)µ(x)
0.1
0.1
0.2
0.2
0.3
0.3
0.4
0.4
0.5
0.5
0.6
0.6
0.7
0.7
0.8
0.8
0.9
0.9
1.0
1.0 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1.0
(a) (b)
(c)
Figure 6 Membership functions. (a) LvoD membership function; (b) LvoT membership function; (c) plausibility level
membership function.
Low High
1.0
0.5
1.00 0.1 0 . 2 0 .3 0.4 0 . 5 0 .6 0.7 0 . 8 0 .9
Medium
µ(x)
x
Figure 7 Membership function of vehicles type.
wagon. The police wagons authority level is obviously high (police’s car ∈ ℜH). The medium level nodes
(M) denote for public services vehicles, like bus and ambulance. The low-level nodes denote for the
private car which are managed principally by people (L). Figure 7shows the membership functions
based on the authentication level. Each edge node has the CF of authorized vehicle nodes along with
type of vehicle. In order to find the type of vehicle Vj, a query by Vineeds to performs on the CF. Then,
the edge node sends a reply to Viwithin a certain time.
Finally, based on the outputs of previous phases, the decision-making module determines the message
is acceptable or not. In the suggested model, the predefined input membership functions are used to
fuzzify the input parameters gathered by the source vehicle (Figure 6(c), Figure 7). In this module, there
are two input parameters as follows:
Messagestatus = DM(PLAUSlevel,ToV),(11)
where PLAUSlevel is the level of plausibility and ToV is the type of vehicle.
Then, fuzzified generated values are utilized for evaluating the rules for obtaining the status of mes-
sage (Messagestatus). The fuzzy inference system of FDM is designed based on nine (9) of IF-THEN
rules. Table 2represents the fuzzy inference engine of decision-making module. As shown in Figure 8,
the membership functions called Correct and Incorrect are utilized to characterize the level of trust
(Messagestatus). Choosing Messagestatus membership functions can be achieved in terms of plausibility
level, type of vehicle and error and trial of the application necessity.
Soleymani S A, et al. Sci China Inf Sci December 2020 Vol. 63 220305:11
Table 2 Fuzzy inference system of decision-making module
Rule No. ToV PLAUSlevel Messagestatus
1 High High Correct
2 High Medium Correct
3 High Low Incorrect
4 Medium High Correct
5 Medium Medium Correct
6 Medium Low Incorrect
7 Low High Correct
8 Low Medium Incorrect
9 Low Low Incorrect
Incorrect Correct
1
10 0.1 0.2 0.3 0.4 0.5 0 .6 0 .7 0 .8 0 .9
µ(x)
x
Figure 8 (Color online) Membership function of message’s status.
4 Performance evaluation
In this section, simulation environment and performance evaluation metrics are described in detail.
4.1 Simulation environment
The proposed research is simulated using network simulator (NS-2). To create the simulation setting
closed to the real traffic situation, a traffic network was made by simulation of urban mobility (SUMO)
and mobility model generator for vehicular networks (MOVE). For making the subject more clear, the
simulation setting and the associated parameters are explained in the following.
Physical layer. The wireless channel is modelled using two-ray ground reflection model as radio
propagation model. Furthermore, the vehicles transmission range is adjusted at 300 m.
Mobility model and vehicular setting. The urban vehicular setup is modelled using MOVE. The
vehicles maximum speed is defined at 10 km/h. The simulation area is adjusted at 2 km ×2 km with the
maximum node density of 500 nodes on the simulation area and 10% of nodes are selected as malicious
nodes that always provide false or bogus messages.
Media access control (MAC) and network layer. The simulation was performed using the
IEEE Standard 802.11p distributed coordination function (DCF). The protocol stacks MAC layer. In
our simulation, the used channel bandwidth is 6 Mbps. Using interface queue between MAC and logical
link control layer (LLC) with maximum 25 packets, the packets waiting for channel access are stored.
Traffic model. The simulation traffic source is constant bit rate (CBR) with a value of 36 kbps, in
terms of UDP packet generation traffic.
Simulation time. The total simulation time is 360 s in each simulation run. The setting time is set
to 30 s at the start of simulation to eliminate the impact of transient behaviour on the outcomes. The
overall simulation time also contains 30 s of stop to send packets from the simulation termination.
Owing to the impact of movable and immovable problems on the act of the suggested models in
vehicular network, AFPM is evaluated on both LOS and NLOS conditions. In terms of NLOS condition,
we label out all NLOS situations.
Soleymani S A, et al. Sci China Inf Sci December 2020 Vol. 63 220305:12
4.2 Evaluation metrics
In this study, state-of-the-art evaluation measures are utilized for assessing the proposed models per-
formance, such as F-measure and communication overhead. These metrics are well-known evaluation
measures to validate the obtained results [28].
4.2.1 F-measure
F-measure (F) is the weighted harmonic mean of both the recall and precision. It reaches to its best value
at one and worst at zero [29]. F-measure is measured using the confusion matrix which is composed of
four parameters including false positive (FP), true positive (TP), false negative (FN), and true negative
(TN) [30]. Nevertheless, it should be stated that the true negative rate is not considered in F-measure.
F-measure is computed using
F-measure : F=2P R
P+R=2TP
2TP + FP + FN,(12)
where P=TP
TP+FP and R=TP
TP+FN are the precision and recall rate, respectively. In this study, TP is
the number of nodes correctly found as malicious nodes, FN is the number of nodes incorrectly detected
as non-malicious nodes and FP is the number of nodes incorrectly detected as malicious nodes.
4.2.2 Communication overhead
Owing to the huge size of vehicular ad hoc networks that lead to large message dissemination as well as
frequent message exchange of nodes, communication overhead (CO) is a suitable metric for comparative
evaluation of the proposed trust model. Villalba et al. [31] stated that communication overhead is the
total number of packets to be transferred from one node to another. In this study, additional messages
exchange in the network, except the event messages, is defined as communication overhead by
CO = TotalMsg EventMsg BeaconMsg,(13)
where TotalMsg is the all messages transferred between nodes in the vehicular environment, EventMsg
is the total event messages and BeaconMsg is the total beacon messages created by nodes. Because the
proposed model is a beacon-less trust model, the value of BeaconMsg is 0.
5 Simulation results and discussion
In this section, the results of the simulation show the comparison of F-measure and communication over-
head of AFPM with a secure plausibility scheme (Vouch) over density, velocity and different percentage
of malicious nodes under both LOS and NLOS states. Vouch is a secure proof-of-location scheme using
plausibility checking for VANETs [17].
To obtain some confidence in the simulation results, it is favoured to practice to launch various runs
for each simulated setup. In this study, each simulation scenario has 30 runs. At the beginning of each
simulation, the initial node placement is reassigned on a random basis, with various random seed, hence,
all primary circumstances are essentially dissimilar to each another. It ensures a unique node placement
for each run. In addition, each experimental result is the average of the 30 runs for each simulation
scenario. In the following, the performance evaluation of proposed model is presented.
5.1 F-measure
As mentioned above, F-measure is the weighted harmonic mean of both the precision (P) and recall (R).
It is a measure of a test’s accuracy by substituting the values of Pand R. In this subsection, the impact
of density, velocity and presence of malicious nodes on the F-measure for both AFPM and Vouch under
LOS and NLOS condition is presented.
Soleymani S A, et al. Sci China Inf Sci December 2020 Vol. 63 220305:13
Figure 9(a) shows the impact of node density on AFPM and Vouch. As shown in this figure, the
AFPM has a higher F-measure score than the Vouch when the density of nodes varies. Moreover, when
the node density is higher, both methods yield a better F-measure. This is true because it is more likely
to receive true data from others when there are a higher number of well-behaved nodes.
Because movable/immovable obstacles prevent nodes to exchange true data, this is no surprise that
F-measure of AFPM in NLOS condition is lower than LOS. As demonstrated by simulation results, the
impact of obstacles on Vouch model is more than the proposed model. It means that the F-measure of
AFPM reduces about 4% in NLOS condition while it is about 12% for baseline model (Vouch).
Figure 9(b) illustrates the comparison of the F-measure of the AFPM and Vouch when the nodes move
at different velocities. In both LOS and NLOS conditions, this figure shows the values of F-measure have a
decreasing trend when the vehicles are moving faster. This is true because when the vehicles are moving
faster, it is generally more difficult for the information regarding the unauthorized vehicles to propa-
gate. Figure 9(b) shows the value of F-measure of AFPM is about 88% when the velocity of vehicles is
20 km/h. The score of F-measure gradually decreases to 85%, 83%, 80% and 78% when the motion speed
of vehicles is 40, 60, 80 and 100 km/h, respectively. As mentioned above, the F-measure score for Vouch
scheme is lower than AFPM. For example, it is 74% when the node’s velocity is 100 km/h.
Figure 9(b) also shows the F-measure score of both schemes under NLOS condition. The comparison
with LOS condition shows that the F-measure of AFPM decreases about 4% in different speeds. The
score for Vouch model decreases by approximately 6%. This is mainly because of the negative impact of
obstacles on receive signal power. Hence, the F-measure in case of NLOS is lower than LOS condition.
It is obvious that malicious nodes avoid exchange of proper messages in the network and hence have the
negative impact on F-measure. Figure 9(c) depicts the value of F-measure for the AFPM and the Vouch
with different percentages of malicious nodes. Obviously, the value of F-measure will be decreased when a
high percentage of malicious nodes participate in the network. As shown in this figure, the F-measure of
AFPM is more than 73% when malicious nodes participate in the network. This value for Vouch reaches
to 71% when 50% of nodes in the networks are malicious node.
Figure 9(c) also demonstrates that obstacles cause the F-measure of AFPM to reach 80%, 78%, 73%,
72% and 69% when malicious nodes participated in the network are 10%, 20%, 30%, 40% and 50%,
respectively. While the Vouchs F-measure decreases from 79% till 63% when the number of malicious
nodes is increasing. This is mainly because the obstacles and malicious nodes prevent nodes to exchange
proper data.
5.2 Communication overhead
According to [32], communication overhead is the total number of packets to be transferred or transmitted
from one node to another. In this paper, the messages exchange between sender and third-party node as
well as receiver and third-party node is known as communication overhead. Obviously, the communication
overhead will be increased under NLOS state. In the following, the communication overhead of AFPM
module is evaluated over density, velocity and the different number of malicious nodes. As shown in the
following figures, overhead communication is increased when the node density, velocity and number of
malicious nodes are ascending.
Figure 10(a) demonstrates the impact of density on communication overhead of AFPM and Vouch
under LOS and NLOS obstruction. Obviously, this metric in LOS condition is lower than NLOS. This is
true because the obstacles cause the vehicles use third-party nodes to evaluation. On the other hand, the
high density of nodes in the network increases the communication overhead. Figure 10(a) shows that the
AFPM scheme is more cost-effective than Vouch in terms of the communication overhead. For instance,
when there are 100 nodes in the network, AFPM introduces around 1% of communication overhead
whereas it is about 6% for Vouch approach under LOS state. On the other hand, AFPM introduces
about 11% of communication overhead when there are 500 nodes, whereas Vouch approach introduces
almost 12%. As shown in this figure, AFPM is also more cost-effective than Vouch in case of NLOS. This
figure shows that AFPM introduces about 13% of communication overhead when the number of nodes
Soleymani S A, et al. Sci China Inf Sci December 2020 Vol. 63 220305:14
100 200 300 400 500
Number of nodes
50
55
60
65
70
75
80
85
90
95
100
F-measure
F-measure
F-measure
AFPM-LOS
Vouch-LOS
AFPM-NLOS
Vouch-NLOS
20 40 60 80 100
Node speed (km/h)
50
55
60
65
70
75
80
85
90
95
100
AFPM-LOS
Vouch-LOS
AFPM-NLOS
Vouch-NLOS
10% 20% 30% 40% 50%
Percent of Malicious nodes
50
55
60
65
70
75
80
85
90
95
100
AFPM-LOS
Vouch-LOS
AFPM-NLOS
Vouch-NLOS
(a)
(b) (c)
Figure 9 (Color online) F-measure of under different (a) density, (b) velocity, and (c) percent of malicious nodes on LOS
and NLOS.
in the network is 500, whereas Vouch approach introduces almost 14%.
Figure 10(b) shows the impact of velocity on communication overhead. As shown in this figure, velocity
also increases the communication overhead. This is because the vehicles exit each other transmission
range owing to the high speed, hence, nodes need to send request to third-party nodes. This is more
in case of LOS obstruction. Figure 10(b) shows that the AFPM introduces communication overhead
lower than Vouch method. This metric for AFPM is almost 1% when the velocity is 20 km/h, whereas,
overhead communication of Vouch is about 4.5%. When the velocity of nodes increases, the difference of
communication overhead between AFPM and Vouch is more. As shown in this figure, the communication
overhead of AFPM in case of NLOS is also lower than Vouch under LOS condition. Therefore, AFPM is
more cost-effective than Vouch scheme in different velocity.
Figure 10(c) shows the performance of AFPM when there are different percentages of malicious nodes
in the network. As shown in this figure, malicious nodes are more effective than velocity and density on
increasing communication overhead. Under LOS condition, Figure 10(c) displays the overhead communi-
cation of AFPM is around 1% when 10% of existing nodes in the network are malicious nodes but it is 7%
for Vouch model. In case of NLOS, it is about 10% and 14.5% for AFPM and Vouch scheme respectively,
when the existing malicious nodes in the network is 50%. As shown in this figure, the communication
overhead of Vouch scheme is more than AFPM module in both LOS and NLOS state. This is mainly
because Vouch is beacon-based and infrastructure-based scheme.
As mentioned earlier, the aim of AFPM is to deal with inaccurate data that generated by malicious and
or faulty nodes. The results obtained from the evaluation of both AFPM and Vouch over density, velocity,
and different percentages of malicious nodes under LOS and NLOS conditions represented AFPM are
more precise and accurate than Vouch to detect inconsistencies in different conditions. The accuracy
Soleymani S A, et al. Sci China Inf Sci December 2020 Vol. 63 220305:15
100 200 300 400 500
Number of nodes
0
2
4
6
8
10
12
14
16
Communication overhead
AFPM-LOS
Vouch-LOS
AFPM-NLOS
Vouch-NLOS
20 40 60 80 100
Node speed (km/h)
0
1
2
3
4
5
6
7
8
9
10
Communication overhead
AFPM-LOS
Vouch-LOS
AFPM-NLOS
Vouch-NLOS
10% 20% 30% 40% 50%
Percent of malicious nodes
0
5
10
15
Communication overhead
AFPM-LOS
Vouch-LOS
AFPM-NLOS
Vouch-NLOS
(a)
(b) (c)
Figure 10 (Color online) Communication overhead under different (a) density, (b) velocity, and (c) percent of malicious
nodes on LOS and NLOS.
of AFPM does not decrease or worsen as the size of the VANET increases. In other words, the AFPM
achieves a higher accuracy score than the Vouch when the node density varies. Both methods yield a
better F-measure, when the node density is higher. This is true because it is more likely to receive true
data from others when there are a higher number of well-behaved nodes.
In addition, the results represents that the AFPM always outperforms the Vouch when the vehicles are
moving faster. In the worst case of velocity (i.e., velocity of nodes is 100 km/h), AFPM and Vouch can
be succeed about 78%, and 74% of the times, respectively. In the worst realistic scenario, when 50% of
nodes behave improperly, AFPM is also able to be succeed about 73% of the times. It is 2% more than
Vouch. In terms of communication overhead, it is also more cost-effective than Vouch. This is because
Vouch scheme is based on beacon and infrastructure and hence creates more messages to proof of location
of event reporter.
6 Conclusion
In this paper, a security model, namely AFPM, is proposed to assess the accuracy and integrity of event
message under LOS and NLOS situation in 5G-VANET. The proposed security model is based on node’s
authentication and data plausibility level. Authentication model is developed to deal with illegitimate
nodes entered the network. This model is utilized in the edge node layer. To this end, the cuckoo filter
is used because the big data is generated in the VANET. In addition, a plausibility model is proposed
to detect accurate data using location verification. The proposed plausibility model is used in vehicle
node layer. It is composed of three modules including LvoD, LvoT and decision-making module. Upon
receiving an event message from surrounding vehicles, the authentication model firstly checks verification
of sender. If the sender is authorized, the integrity and accuracy of data are evaluated by cross-checking
Soleymani S A, et al. Sci China Inf Sci December 2020 Vol. 63 220305:16
the plausibility of event message. The obtained results show that AFPM is highly resilient to malicious
nodes. Comparison of AFPM scheme and Vouch shows that AFPM has better performance than Vouch
in case of LOS and NLOS. Additionally, AFPM is more precise and accurate than Vouch on different
node density, different velocity and different percentage of malicious nodes.
Acknowledgements This work was supported by Ministry of Education, Malaysia, in collaboration with the Research
Management Center, Universiti Teknologi Malaysia (Grant No. Q.J130000.2451.04G80), Faculty of Information Science
and Technology, Universiti Kebangsaan Malaysia (Grant No. GGPM-2020-029), and partially supported by King Saud
University (Grant No. RSP-2019/12), Riyadh, Saudi Arabia.
References
1 Anjum S S, Noor R M, Anisi M H. Review on MANET based communication for search and rescue operations. Wirel
Pers Commun, 2017, 94: 31–52
2 Soleymani S A, Abdullah A H, Hassan W H, et al. Trust management in vehicular ad hoc network: a systematic
review. EURASIP J Wirel Commun Netw, 2015, 2015: 146
3 Al-Sultan S, Al-Doori M M, Al-Bayatti A H, et al. A comprehensive survey on vehicular ad hoc network. J Netw
Comput Appl, 2014, 37: 380–392
4 Hua L C, Anisi M H, Yee P L, et al. Social networking-based cooperation mechanisms in vehicular ad-hoc network-a
survey. Vehicular Commun, 2017, 10: 57–73
5 Sedjelmaci H, Senouci S M, Abu-Rgheff M A. An efficient and lightweight intrusion detection mechanism for service-
oriented vehicular networks. IEEE Int Things J, 2014, 6: 570–577
6 Bismeyer N, Mauthofer S, Bayarou K M, et al. Assessment of node trustworthiness in vanets using data plausibility
checks with particle filters. In: Proceedings of 2012 IEEE Vehicular Networking Conference (VNC), 2012. 78–85
7 Manvi S S, Tangade S. A survey on authentication schemes in VANETs for secured communication. Vehicular Commun,
2017, 9: 19–30
8 Garg S, Singh A, Kaur K, et al. Edge computing-based security framework for big data analytics in VANETs. IEEE
Netw, 2019, 33: 72–81
9 Engoulou R G, Bellache M, Pierre S, et al. VANET security surveys. Comput Commun, 2014, 44: 1–13
10 Soleymani S A, Abdullah A H, Zareei M, et al. A secure trust model based on fuzzy logic in vehicular ad hoc networks
with fog computing. IEEE Access, 2017, 5: 15619–15629
11 Pournaghi S M, Zahednejad B, Bayat M, et al. NECPPA: a novel and efficient conditional privacy-preserving authen-
tication scheme for VANET. Comput Netw, 2018, 134: 78–92
12 Lu R X, Lin X D. ECPP: efficient conditional privacy preservation protocol. In: Proceedings of the 27th Conference
on Computer Communications, 2015. 51–70
13 Huang D, Misra S, Verma M, et al. PACP: an efficient pseudonymous authentication-based conditional privacy protocol
for VANETs. IEEE Trans Intell Transp Syst, 2011, 12: 736–746
14 Tangade S, Manvi S S, Lorenz P. Decentralized and scalable privacy-preserving authentication scheme in VANETs.
IEEE Trans Vehicular Tech, 2018, 67: 8647–8655
15 Chen Y M, Wei Y C. A beacon-based trust management system for enhancing user centric location privacy in VANETs.
J Commun Netw, 2013, 15: 153–163
16 Lo N-W, Tsai H-C. Illusion attack on vanet applications-a message plausibility problem. In: Proceedings of 2007 IEEE
Globecom Workshops, 2007. 1–8
17 Boeira F, Asplund M, Barcellos M P. Vouch: a secure proof-of-location scheme for vanets. In: Proceedings of the 21st
ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, 2018. 241–248
18 Goudarzi S, Abdullah A H, Mandala S, et al. A systematic review of security in vehicular ad hoc network. In: Pro-
ceedings of the 2nd Symposium on Work Sheet Control Number, 2013. 1–10
19 Singh A, Garg S, Kaur R, et al. Probabilistic data structures for big data analytics: a comprehensive review.
Knowledge-Based Syst, 2019, 188: 104987
20 Bender M A, Farach-Colton M, Johnson R, et al. Don’t thrash: how to cache your hash on ash. Proc VLDB Endow,
2012, 5: 1627–1637
21 Fan B, Andersen D G, Kaminsky M, et al. Cuckoo filter: practically better than bloom. In: Proceedings of the 10th
ACM International on Conference on Emerging Networking Experiments and Technologies, 2014. 75–88
22 Pagh R, Rodler F F. Cuckoo hashing. J Algorithms, 2004, 51: 122–144
23 Soleymani S A, Abdullah A H, Anisi M H, et al. BRAIN-F: beacon rate adaption based on fuzzy logic in vehicular ad
hoc network. Int J Fuzzy Syst, 2017, 19: 301–315
24 Limouchi E, Mahgoub I. BEFLAB: bandwidth efficient fuzzy logic-assisted broadcast for VANET. In: Proceedings of
IEEE Symposium on Computational Intelligence, 2016. 1–8
Soleymani S A, et al. Sci China Inf Sci December 2020 Vol. 63 220305:17
25 Khan S, Mauri J L. Security for Multihop Wireless Networks. Boca Raton: CRC Press, 2014
26 Shaikh R A, Alzahrani A S. Intrusion-aware trust model for vehicular ad hoc networks. Secur Commun Netw, 2014,
7: 1652–1669
27 Huang Z. On reputation and data-centric misbehavior detection mechanisms for VANET. Dissertation for Ph.D. Degree.
Ottawa: University of Ottawa, 2011
28 Abumansoor O, Boukerche A. A secure cooperative approach for nonline-of-sight location verification in VANET. IEEE
Trans Vehicular Tech, 2011, 61: 275–285
29 Shah S, Shah B, Amin A, et al. Compromised user credentials detection in a digital enterprise using behavioral
analytics. Future Gener Comput Syst, 2019, 93: 407–417
30 Davis J, Goadrich M. The relationship between precision-recall and ROC curves. In: Proceedings of the 23rd Interna-
tional Conference on Machine Learning, 2006. 233–240
31 Villalba L J G, Orozco A L S, Cabrera A T, et al. Routing protocols in wireless sensor networks. Sensors, 2009, 9:
8399–8421
32 Kumar N, Singh Y. Routing protocols in wireless sensor networks. In: Handbook of Research on Advanced Wireless
Sensor Network Applications, Protocols, and Architectures. Hershey: IGI Global, 2017. 86–128
... The privacy-preservation is now mandatory in the data mining process to protect the confidential data of the users and the privacy preservation techniques adopted in the data mining domain is known as Privacy-preserving data mining (PPDM) (4,5) . In the current scenario, various researchers make their efforts to restrain the issues related to privacy through advanced technologies such as digital signature (6) , Authenticated Data Structure (ADS) (7) , message authentication codes (8) and data integrity verification. The ADS is the advanced computing technique, which is utilized to resolve the data authentication issues in the dispersed environment. ...
... Authentication and plausibiity-based security model (APSM) was proposed for improving the rapidity in positioning NLOS nodes under emergency situations [20]. This NLOS localizing security model was proposed for handling illegitimate nodes that intentionaly enters into the network for broadcasting fake information about the vehicular nodes position. ...
Article
Full-text available
An accurate localization technique is considered as the significant entity in vehicular ad hoc networks (VANETs) for facilitating emergency message data transmission in diversified critical safety applications. In VANETs, the system of global positioing is generally used for estimating the position of the vehicles in the network for attaining neighborhood awareness in the event of warning message dissemination. However, the existence of green foliages, buildings, indoor parking lots and urban streen canyons introduces NLOS situation that introduces unwanted errors that crumbles the degree of data dissemination in emergency situations. In this paper, spotted hyena and simulated annealing optimization algorithm (SHSAOA)-based positioning scheme was proposed for precise estimation of NLOS nodes. İt included the advantages of improved simulated annealing (SA) integrated into SHOA for establishing better balance between the process of exploitation and exploration in the search space. This positioning approach generated candidate solutions by deriving the merits of the trajectory-based charateristics of SA throughout the algorithmic development process in order to improve the local optimization process. This proposed SHSAOA utilized the distance infotmation that are associated with the vehicle trajectory, number of vehicles and error in distance information for assessing the precise location of the NLOS nodes in the network. The simulation results of the proposed SHSAOA scheme confirmed minimized localization error with maximized accuracy in transmission, warning message transmission rate, channel utilization degree and neighborhood awareness degree with different vehicular density and NLOS nodes.
... Probabilistic Data Structure (PDS) and fog computing are two technologies that could be used to deal with the aforementioned issues. PDS is a data structure that is particularly suitable for big data as it is able to reduce analytical procedures and latency [9]. Fog computing also reduces latency by moving the part of the computational power to the edge of the network [10]. ...
Article
Security and privacy are considered as two main challenges in Vehicular Ad Hoc Network (VANET). To cope with these challenges and in order to improve the safety of VANET, we propose a secure and privacy-preserving authentication scheme. In the proposed scheme, Quotient Filter (QF) is used to address node authentication while message authentication is done based on Elliptic Curve Cryptography (ECC). Besides, each vehicle is mapped to a different pseudo-identity to preserve privacy in VANET. Moreover, due to the higher computational capabilities of Fog Nodes (FN) compared to Road-Side Units (RSUs), they are distributed over the side of the road to minimize the latency of the security model and enhance the system throughput. Our security analysis demonstrates that the proposed scheme is able to identify illegitimacy vehicle nodes and invalid messages when the fog-enabled VANET is exposed to attacks. Furthermore, the performance evaluations prove the effectiveness of our work compared to the existing studies.
... Among them, the language information from human experts and the digital information from sensors are very important. By imitating the way of thinking of human brain, fuzzy logic can combine vague language information with precise digital information and handle the inputs with various combinations, even imprecise or contradictory inputs [13]. Fuzzy logic performs well in dealing with non-linear, time-varying and unclearly defined processes. ...
Article
Full-text available
In this paper, we are committed to obtaining load-balanced user association and optimal beamforming in an energy-saving downlink distributed Millimeter-Wave (mmWave) network, with per-user quality of service (QoS) requirements, user association constraints and remote radio unit (RRU) transmission power limits. A mixed discrete nonlinear programming (MINLP) problem is formulated, which is NP-hard. The traditional sparse beamforming method (SBM) can jointly optimize the user association and the beamforming vector by inducing the beamformer sparsity via the reweighted ℓ1 norm technique. However, such existing scheme may cause unbalanced load of RRU, thus degrading the mmWave network performance. For better load-balanced user association, we introduce the Fuzzy inference System (FIS) to pursue further advancement of SBM. In addition, the good scalability of FIS framework can help itself to be extended to more indicators in the next generation of communication systems. Simulation results show that the improved algorithm can obtain a load-balanced user association, meanwhile the transmit power consumption of mmWave networks can be significantly reduced.
Article
With the number of smart vehicle drivers increasing rapidly, privacy-preserving identity management methods in Vehicular Ad-hoc Networks (VANETs) become more imperative and receive much attention from researchers. Since identity leakage or a single point of failure may result in serious consequences in the VANET, the decentralized anonymous credential (DAC) could be a potential approach to construct a robust network. However, the supervision under decentrilized environment could be a necessary and troublesome in the VANETs. In this paper, we present an anonymous traceable and revocable credential system using blockchain, called ATRC, built over a generalized group signature. The underlying group signature not only meets the anonymity requirement but also makes the users master their identities. What's more, to tackle the privacy leakage in the revocation process, we employ the Merkle tree to construct a whitelist, which trades off the efficiency and the privacy. Finally, we gives the comparison and experiment performance to show our scheme holds lightweight on the user side and has fewer computation costs in the show and revocation phase.
Article
With the proliferation of vehicular networking and data in the era of Vehicular Ad-hoc Networks (VANETs), ensuring privacy-preserving authentication and data privacy during analysis has emerged as a pivotal research focus. In this paper, we propose a blockchain-assisted privacy-preserving authentication protocol Bap with user-controlled data unlinkability for VANETs. We leverage Pointcheval-Sanders (PS) signatures to design a privacy-preserving authentication protocol that supports user traceability and revocation of malicious users. Additionally, we introduce an auxiliary data processor (DP) in our model to analyze VANET data with explicit and implicit linkability. The DP is capable of linking messages on the same or different topics, enabling minimal privacy disclosure during Big Data analysis. We provide a detailed proof and demonstrate that our scheme satisfies the required properties. Finally, performance evaluations demonstrate the efficiency of our proposed scheme. While supporting the mentioned functionalities, the gas cost is limited to a small range, and the signature size is only 354 bytes.
Article
With the rapid development of Internet of Things (IOT) applications, the performance of existing wireless localization methods under non-line-of-sight (NLOS) transmission environments is seriously challenged. Therefore, this paper proposes a new definition of residual, i.e., the angle residual. The key target of angle residual is to detect line-of-sight (LOS) links from measured and calculated angle parameters. The target position is then estimated by two-step weighted least squares (TS-WLS) algorithm, where only positioning parameters of LOS link are included. Simulation shows that the proposed algorithm performs better than traditional algorithms, especially when the mobile node (MN) position and the NLOS link distribution are randomly generated. Therefore, the proposed method effectively improves the positioning performance and enhances the localization stability in real NLOS transmission environments.
Article
Full-text available
The advent of new vehicular advances and accessibility of new network access mediums have evolved service providers with heterogeneous-vehicular collaboration. The performance of heterogeneous-vehicular collaboration depends on the possibility of accurate, up-to-date vehicular information shared by Cooperative- Awareness Messages (CAMs) among neighboring vehicles. Although exchanging wrong mobility coordinates leading to disruption on the Internet of Vehicles (IoVs) applicability. To address these issues, a misbehavior detection approach is proposed which acts as a second wall of defense. Our scheme is divided into three phases context procurement, context sharing, and misbehavior detection. Mathematical modeling has been done to evaluate Sybil attack and false message generation attack detection under misbehavior detection. The proposed scheme attains 99% in detecting false message generation attacks and 98.5% in detecting Sybil attacks. Additionally, false-positive rate, overhead detection, and False-Measures are evaluated which demonstrates the effectiveness of our approach.
Preprint
Full-text available
The recent development of artificial intelligence (AI) has increased the interest of researchers and practitioners towards applying its techniques into multiple domains like automotive, health care and air space to achieve automation. Combined to these applications, the attempt to use AI techniques into carrying out safety issues is momentarily at a progressive state. As AI problems are getting even more complex, large processing power is demanded for safety-critical systems to fulfill real-time requirements. These challenges can be solved through edge or cloud computing, which makes the communication an integral part of the solution. This study aims at providing a comprehensive picture of the state of the art AI based safety solutions that uses different communication technologies in diverse application domains. To achieve this, a systematic mapping study is conducted and 565 relevant papers are shortlisted through a multistage selection process, which are then analyzed according to a systematically defined classification framework. The results of the study are based on these main objectives: to clarify current research gaps in the field, to identify the possibility of increased usage of cellular communication in multiple domains, to identify the mostly used AI algorithms and to summarize the emerging future research trends on the topic. The results demonstrate that automotive domain is the one applying AI and communication the most to implement safety and the most used AI in this domain is neural networks, clustering and computer vision; applying cellular communication to automotive domain is highest; the use of non-cellular communication technologies is dominant however a clear trend of a rapid increase in the use of cellular communication is observed specially from 2020 with the roll-out of 5G technology.
Article
Full-text available
In this paper, we propose E-STAR for establishing stable and reliable routes in heterogeneous multi-hop wireless networks. E-STAR combines payment and trust systems with a trust-based and energy-aware routing protocol. The payment system rewards the nodes that relay others' packets and charges those that send packets. The trust system evaluates the nodes' competence and reliability in relaying packets in terms of multidimensional trust values. The trust values are attached to the nodes' public-key certificates to be used in making routing decisions. We develop two routing protocols to direct traffic through those highly-trusted nodes having sufficient energy to minimize the probability of breaking the route. By this way, E-STAR can stimulate the nodes not only to relay packets, but also to maintain route stability and report correct battery energy capability. This is because any loss of trust will result in loss of future earnings. Moreover, for the efficient implementation of the trust system, the trust values are computed by processing the payment receipts. Analytical results demonstrate that E-STAR can secure the payment and trust calculation without false accusations. Simulation results demonstrate that our routing protocols can improve the packet delivery ratio and route stability.
Conference Paper
Full-text available
Recently, with the improvement of Wireless Sensor Networks (WSNs), numerous new routing protocols have been developed for WSNs. Routing protocols in WSNs, in any case, may vary depend on the application and network systems. Besides, WSNs are presented to various types of security threats. In this manner, it is headachy for us to pick secure routing protocol for application in WSNs. In regard that the decision of secure routing protocol for WSNs is personally related with the application prerequisites and routing protocol qualities and the assaults on routing protocol, there is no "panacea" secure routing protocol. In this paper we give a review of secure routing protocols that can be utilized as a part of remote sensor systems since it is imperative to give a characterization of the accessible conventions. Along these lines, a few conventions were audited in this paper. The directing conventions can be grouped into two principle classifications to be specific topology based and convention task based. The principle objective of the work proposed in this paper is to give analysts an unmistakable thought regarding the accessible security based directing conventions and their properties.
Conference Paper
Full-text available
In Vehicular Ad Hoc Networks (VANETs), nodes periodically share beacons in order to convey information about identity, velocity, acceleration, and position. Truthful positioning of nodes is essential for the proper behavior of applications, including the formation of vehicular platoons. Incorrect position information can cause problems such as increased fuel consumption, reduced passenger comfort, and in some cases even accidents. In this paper, we design and evaluate Vouch: a secure proof-of-location scheme tailored for VANETs. The scheme leverages the node positioning capability of fifth generation (5G) wireless network roadside units. The key idea of Vouch is to disseminate periodic proofs of location, combined with plausibility checking of movement between proofs. We show that Vouch can detect position falsification attacks in high-speed scenarios without incurring a large overhead.
Article
Full-text available
In Vehicular Ad Hoc Networks (VANET), trust establishment among vehicles is important to secure integrity and reliability of applications. In general, trust and reliability help vehicles to collect correct and credible information from surrounding vehicles. On top of that, a secure trust model can deal with uncertainties and risk taking from unreliable information in vehicular environments. However, inaccurate, incomplete, and imprecise information collected by vehicles as well as movable/immovable obstacles have interrupting effects on VANET. In this paper, a fuzzy trust model based on experience and plausibility is proposed to secure the vehicular network. The proposed trust model executes a series of security checks to ensure the correctness of the information received from authorized vehicles. Moreover, fog nodes are adopted as a facility to evaluate the level of accuracy of event’s location. The analyses show that the proposed solution not only detects malicious attackers and faulty nodes, but also overcomes the uncertainty and imprecision of data in vehicular networks in both line of sight and non-line of sight environments.
Article
An exponential increase in the data generation resources is widely observed in last decade, because of evolution in technologies such as-cloud computing, IoT, social networking, etc. This enormous and unlimited growth of data has led to a paradigm shift in storage and retrieval patterns from traditional data structures to Probabilistic Data Structures (PDS). PDS are a group of data structures that are extremely useful for Big data and streaming applications in order to avoid high-latency analytical processes. These data structures use hash functions to compactly represent a set of items in stream-based computing while providing approximations with error bounds so that well-formed approximations get built into data collections directly. Compared to traditional data structures, PDS use much less memory and constant time in processing complex queries. This paper provides a detailed discussion of various issues which are normally encountered in massive data sets such as-storage, retrieval, query,etc. Further, role of PDS in solving these issues is also discussed where these data structures are used as temporary accumulators in query processing. Several variants of existing PDS along with their application areas have also been explored which give a holistic view of domains where these data structures can be applied for efficient storage and retrieval of massive data sets. Mathematical proofs of various parameters considered in the PDS have also been discussed in the paper. Moreover, the relative comparison of various PDS with respect to various parameters is also explored.
Article
With the exponential growth of technologies such as IoT, edge computing, and 5G, a tremendous amount of structured and unstructured data is being generated from different applications in the smart citiy environment in recent years. Thus, there is a need to develop sophisticated techniques that can efficiently process such huge volumes of data. One of the important components of smart cities, ITS, has led to many applications, including surveillance, infotainment, real-time traffic monitoring, and so on. However, its security, performance, and availability are major concerns facing the research community. The existing solutions, such as cellular networks, RSUs, and mobile cloud computing, are far from perfect because these are highly dependent on centralized architecture and bear the cost of additional infrastructure deployment. Also, the conventional methods of data processing are not capable of handling dynamic and scalable data efficiently. To mitigate these issues, this article proposes an advanced vehicular communication technique where RSUs are proposed to be replaced by edge computing platforms. Then secure V2V and V2E communication is designed using the Quotient filter, a probabilistic data structure. In summary, a smart security framework for VANETs equipped with edge computing nodes and 5G technology has been designed to enhance the capabilities of communication and computation in the modern smart city environment. It has been experimentally demonstrated that use of edge nodes as an intermediate interface between vehicle and cloud reduces access latency and avoids congestion in the backbone network, which allows quick decisions to be made based on the traffic scenario in the geographical location of the vehicles. The proposed scheme outperforms the conventional vehicular models by providing an energy-efficient secure system with minimum delay.
Article
In today’s digital age, the digital transformation is necessary for almost every competitive enterprise in terms of having access to the best resources and ensuring customer satisfaction. However, due to such rewards, these enterprises are facing key concerns around the risk of next-generation data security or cybercrime which is continually increasing issue due to the digital transformation four essential pillars- cloud computing, big data analytics, social and mobile computing. Data transformation-driven enterprises should ready to handle this next-generation data security problem, in particular, the compromised user credential (CUC). When an intruder or cybercriminal develops trust relationships as a legitimate account holder and then gain privileged access to the system for misuse. Many state-of-the-art risk mitigation tools are being developed, such as encrypted and secure password policy, authentication, and authorization mechanism. However, the CUC has become more complex and increasingly critical to the digital transformation process of enterprise’s database by a cybercriminal, we propose a novel technique that effectively detects CUC at the enterprise-level. The proposed technique is learning from the user’s behavior and builds a knowledge base system (KBS) which observe changes in the user’s operational behavior. For that reason, a series of experiments were carried out on the dataset that collected from a sensitive database. All empirical results are validated through well-known evaluation measures, such as (i) accuracy, (ii) sensitivity, (iii) specificity, (iv) prudence accuracy, (v) precision, (vi) f-measure, and (vii) error rate. The experiments show that the proposed approach obtained weighted accuracy up to 99% and overall error of about 1%. The results clearly demonstrate that the proposed model efficiently can detect CUC which may keep an organization safe from major damage in data through cyber-attacks.
Article
Existing authentication schemes are based on either symmetric or asymmetric cryptography such as public-key infrastructure (PKI). These PKI-based authentication schemes are highly recommended to address the security challenges in VANETs. However, they have certain shortcomings such as: (1) lack of privacy-preservation due to revealing of vehicle identity and broadcasting of safety-message, and (2) lengthy certificates leading to communication and computation overheads. The symmetric cryptography based schemes on the other hand are faster because they use a single secret key and are very simple; however, it does not ensure non-repudiation. In this paper, we present a decentralized and scalable privacy-preserving authentication (DSPA) scheme for secure vehicular ad hoc networks (VANETs). The proposed scheme employs a hybrid cryptography. In DSPA, the asymmetric identity-based (ID-based) cryptography and the symmetric hash message authentication code (HMAC) based authentication are adopted during vehicle to infrastructure (V2I) and vehicle to vehicle (V2V) communications, respectively. Extensive simulations are conducted to validate the proposed DSPA scheme by comparing the existing works based on PKI, ID-based, group signature, batch verification, and HMAC. The performance analysis showed that DSPA is more efficient, decentralized, scalable and also a privacy-preserving secured scheme than the existing authentication schemes.
Article
Vehicular Ad-hoc Networks (VANETs) are growing in recent decades providing real-time communication between vehicles for a safer and more comfortable driving. The main idea of VANET is the fact that vehicles can broadcast ad-hoc messages such as traffic incidents and emergency events. The security of such networks is quite critical. This paper firstly reviews and analyzes the main authentication schemes in VANET to compare their pros and cons. We then propose a new authentication scheme which provides secure communications in VANET. Our proposed scheme is a combination of Road Side Unit Based (RSUB) and Tamper Proof Device Based (TPDB) schemes. A novel idea in NECPPA is to let the keys and the main parameters of the system be stored in the Tamper Proof Device (TPD) of Road Side Units (RSUs). Since, there is always a secure and fast communicational link between TA and RSU, inserting TPD in RSUs is much more efficient than inserting them in OBUs. It also should be noted that due to the fact that in NECPPA scheme, the main key of TA (master secret key) is not stored in all OBUs, the compromise or hacking a single OBU does not threaten the whole network despite what happens in TPDB scheme which makes the whole vehicles re-register and change their secret keys. In addition, our proposed scheme is much more cost efficient compare to other on-line RSUB schemes, as it does not need the establishment of on-line RSUs in the whole roads. We also prove the security of our scheme with formal proof and ProVerif automatic analysis tool. The simulation results show that the efficiency and performance of our proposed scheme in VANETs have improved compare to other schemes.
Article
Vehicular Ad-hoc Network (VANET) is a sub-class of Mobile Ad-hoc Networks (MANETs) where it is built up by moving vehicles. VANET is getting increasingly popular in traffic management especially in some of the developed countries. It can be categorized into safety related application where it can save thousands of lives daily and non-safety application for commercial purpose. Due to its unpredictable mobility and intermittent network connectivity, a reliable end-to-end path between source and destination is almost impossible and hence ad hoc routing protocols are applied in VANET. However, the biggest challenge in VANET is not the routing issue, but the cooperation between the nodes. Even the best routing protocol will not be useful when the nodes do not participate in forwarding the data. In this paper, we have presented a comprehensive review on existing cooperation mechanisms in VANETs; particularly, those that have built upon mobile social networking. First, we explore the existing challenges in VANET. Next, we discuss a taxonomy for existing cooperation mechanisms in VANETs and review the proposed solutions of each cooperation type. Moreover, we explain the cooperation solutions that can be applied from the concept of Mobile Social Networking. Finally, we come up with a conclusion that the concept of Mobile Social Networking could complement the traditional VANET cooperation mechanisms to stimulate node cooperation. The future research direction in VANET cooperation has been discussed as well.