1. Introduction
Presently, smart cities are turning into innovation hubs by leveraging cutting-edge technology. New services can be supported in these cities because of the existence of connected infrastructure and layers of intelligence that enable adapting, learning, and responding to inhabitants’ needs [
1,
2,
3,
4,
5,
6]. However, enhancing road safety is a critical concern for developing intelligent cities where vehicles are distributed in large street networks [
5,
6]. Fortunately, these vehicles can share safety information continuously. In smart cities, smart driving assistance systems based on vehicular ad hoc networks (VANETs) are used to broadcast data regarding road safety information. Road information is sensitive data; therefore, exchanging traffic information via VANETs must be complete and trustworthy [
7]. Concerns about security and veracity remain the principal barriers for adopting VANETs to improve road safety [
6,
7]. Malicious nodes can inject false information into the VANET, including bogus traffic incidents [
6,
7].
In VANETs, node communication has greatly improved road safety in large-scale street networks. Smart vehicles communicate, collaborate, coordinate, and share road information and resources to develop smart roads [
5,
6]. Security and truthfulness are then required to make such interactions via VANETs effective [
4,
5,
6,
7]. Node trust measures a node’s ability to behave correctly and actually accomplish what it is supposed to do [
7]. Network throughput is dramatically reduced when compromised nodes attempt to corrupt data in VANETs [
5,
6]. A novel incentive scheme that detects and excludes malicious nodes is proposed in this work to address this issue.
In our scheme, parameters are collected by the road side unit (RSU) to compute the trust value for each node. Collecting reliable information enables the RSU to evaluate node trust accurately. The RSU, on the other hand, is responsible for collecting data from all nodes, including other RSUs. Unfortunately, measuring trust based on an interaction between an RSU and a node is insufficient. The RSU may receive inaccurate information from a node, even if the node provides the certified reputation. Nonreliable information would affect the ultimate trust value. Eventually, the nodes’ impression of their surrounding nodes would be inaccurate.
The remaining sections of this article are structured as follows:
Section 1 introduces relevant work and our contributions to the study. Following that, the VANET will be discussed in
Section 2. In
Section 3, we describe the proposed security system. Then, in
Section 4, we will provide some of the performed tests and prove the performance of the VANET under various scenarios using our method.
Section 5 represents the conclusion of the article.
2. Related Work
VANETs have recently been deployed to increase road safety and traffic control efficiency. Vehicles collaborate in VANETs to communicate warning messages and road conditions, considerably improving road safety.
In [
7], a new architecture was proposed to mitigate many VANET attacks while maintaining data privacy and security. The suggested architecture uses timestamps and hashing techniques to keep the messages transmitted fresh. The trustworthiness of any node that injects false data into the VANET will be reduced significantly. In [
8], the authors proposed a trust-based framework that allows users to ignore false messages from misbehaving nodes. A reputation system for platoon head vehicles is developed, in which data are collected from the VANET’s nodes, and an iterative filtering technique is used to reject false feedback from misbehaving nodes. A new VANET antiattack trust scheme was introduced in [
9], where nodes can use it to evaluate the trustworthiness of new nodes in VANETs. Bayesian inference is used to calculate the node’s local trust based on the node’s previous interactions. After that, a small group of seed nodes is selected to evaluate the global trust of all the nodes in the VANET. In [
10], the proposed security system uses a Software-Defined Vehicular Network to develop a trust management architecture for VANETs. Specifically, trust between vehicles and trust between nodes and infrastructure are used to model and evaluate the trustworthiness of the node.
The authors proposed an AI-enabled trust management system (AIT) in [
11] to address the security challenges for VANETs. Nearby vehicles validate each message in the VANET using deep learning algorithms. The RSU excludes untrustworthy vehicles after validating the node’s authenticity using the blockchain technique. A novel security paradigm was proposed in [
12] to enable vehicles to judge whether data are trustworthy. Furthermore, the Pretty Good Privacy (PGP) framework handles the certificates and associated trust level.
The authors proposed a new authentication scheme for cluster-based VANETs in [
13]. Nodes in VANETs are divided into clusters, and the trust degree is computed for selecting the cluster head. The sender digitally signs the messages, which are then encrypted using a public/private key provided by a trustworthy authority and decrypted by the receiver. The authors in [
14] proposed a new trust-based security scheme for securing message exchange in a VANET. The VANET Grouping Algorithm (VGA) was presented to group nodes into clusters and elect cluster heads. After dividing the VANET into clusters, a trust management scheme is used to evaluate the reputations of vehicles. In [
15], a new trust management-based scheme was proposed. The trust degree for each node is computed for authentication purpose. The authors in [
16] described a new framework for efficiently delivering messages between vehicles and RSUs. Blockchain technology is adopted in the proposed framework to support data integrity, traceability, and reliability features that traditional reputation systems fail to provide. In [
17], the authors suggested a novel dynamic entity-centric trust model. Trust is calculated based on weight dependence, the type of applications, and node authority levels. The results showed that the proposed trust model improves the security of the GPSR routing protocol with minimal delay and increases the success rate of data delivery.
The authors in [
18] proposed a new trust management system based on federated learning. The trust level for each node is computed firstly to improve the accuracy of the collected data. A state-of-the-art protocol was proposed in [
19] for securing communication in VANETs. Elliptic curve cryptography is adopted in the proposed system to assure communication security at no additional expense. Policy rules were used in [
20] to assess the trustworthiness of data and IoT devices in smart cities based on reporting history and data context. In [
20], the authors proposed a new approach based on game theory for detecting malicious nodes in VANETs.
Therefore, unlike other solutions, we propose a new, adaptive, trust-based security scheme where the trust for each node is computed based on feedback from other nodes, data accuracy, and direct trust between the node and RSU. Vehicles play a vital role in our data interaction scheme. Because our scheme not only uses the RSU to calculate and share the trust value, but also considers how vehicles calculate trust, this structure is flexible enough to solve the problem of low accuracy and real-time trust information that a vehicle may face when calculating trust. The scheme is scalable where the nodes are divided into scalable clusters. To mitigate the effect of malicious nodes and improve road safety, these nodes are evicted from the VANET using our scheme. Our scheme can be adopted for road safety, and no extra infrastructure is required. Our scheme can benefit a wide range of new road safety and driver assistance applications.
3. Network Overview
In our work, each section (i.e., cluster) of the road is broken down into K sections. The RSU manages the nodes and communication in a cluster for each segment. Each node is equipped with one IEEE 802.11b-based transceiver. The spectrum is divided into channels that do not overlap (16 channels per RSU separated by 5 MHZ), with transmission and power mask restrictions comparable to the ISM band.
Each vehicle has radio communication equipment, and the RSU that operates as a relay point for other nodes. Moving vehicles are connected using statically deployed access points or base stations (RSUs). Connecting vehicles to RSUs enables more precise and efficient traffic control, thereby significantly lowering traffic congestion, accidents, and pollution. Vehicles have onboard sensors. A GPS receiver, speedometer, accelerometer, and digital map are among the sensors that help a vehicle gather road data. The road condition is sensed by each node in the cluster and reported to the RSU. In order to protect the lives of drivers on the road, the RSU transmits emergency safety alerts to all vehicles after collecting and evaluating road data. Each vehicle is assumed to be inside the range of the
ith RSU if and only if the following condition is met:
where
is the signal power received at the
ith RSU from the
jth node, and
is the threshold for signal power. Signal power is computed as described in [
21]. A large number of RSUs are distributed over the street. The RSU is responsible for the management of all vehicles registered in its segment. Each vehicle is managed with exactly one RSU. Each node has a unique ID, which can be the MAC address of the node. We secure the safety messages transmitted between network nodes by encrypting them with symmetric key cryptography. The node has private and public cryptographic keys, a certificate issued by the RSU. The
jth node selects the
ith RSU for coordination that has the strongest signal as follows:
where
is the set of RSUs in the street. The
ith RSU (cluster head) maintains a list of its nodes
.
is broadcast to all cluster members.
Vehicles in our work move at random and vary their speed at will. At each road intersection, vehicles choose a way at random. When a vehicle selects a direction at an intersection, it proceeds straight until it reaches the next intersection where it can change direction.
Figure 1. illustrates the architecture of VANET.
Definition 1. VANET can be represented as a network graph, whereand is a collection of n nodes, comprising vehicles and RSUs, andand is the set of links.
Definition 2. In our model, the graph G is utilized to represent the city’s roads.and is a graph made up of edge setand vertex set. The road over intersectionsandis represented by the edge. The driver can drive directly from intersectionto intersection. We calla link, and a road is the undirected path that connects vertexwith vertex.
4. Trust Evaluation in VANET
This section defines the communication messages the nodes exchange in VANET during the trust computation model and the system constraints.
Definition 3. A message in VANET is a tuplewhereindicates the message type, whether it is a request or provides a service in VANET;are sender and receiver of message, respectively;is the message, andis the messagetime.
Assume is the set of trustworthy nodes that was managed by the ith RSU. is changing continuously based on environmental conditions. The RSU may request information or service from a trustworthy jth node by sending a message. After that, the jth node either refuses to collaborate, is obligated to serve, or accepts the request. The RSU excludes a node if it refuses collaboration and sends a message about node exclusion to all its cluster members. After receiving the exclusion message, each node looks up its cluster members’ table entry and deletes the malicious node.
Meanwhile, the RSU may consult other RSUs and trustworthy nodes to accept new nodes in VANET. The requested referee has three options for responding: offering the node’s trust level, excusing due to a lack of information, or refusing to reveal information about the node. Any referee would be penalized by the RSU for inaccurate information, which will not be considered for future consultation. As a result, providing the right trust level is preferable to hiding it if the referee is dissatisfied with the node’s behavior.
4.1. Trust Level Computatiion
The problem of trust computation for nodes in VANET can be formalized as follows:
Definition 4 Letbe a set of nodes in VANET anda set of accepted values of trust levels. The trust functionmaps the node fromto a value from the domainas follows: In our work, each event in VANET takes two values: 1 means positive evidence, and a 0 value means bad evidence. Assume
is a random variable representing the events performed by a node in VANET. The Bernoulli distribution is a discrete distribution [
22,
23] with two possible outcomes denoted by b = 0 and b = 1, with b = 1 (“positive”) occurring with probability p and b = 0 (“bad”) occurring with probability 1-
p, where
[
22,
23]. As a result, it has a probability density function, which can be written as [
22,
23]:
This function can be written as follows [
22,
23]:
where
p is the probability that the evidence is positive. The variable
follows a Bernoulli distribution
b(1,
p). E(
B) is the expectation of the variable
and it can be written as follows [
22,
23]:
The corresponding variance is:
Central Limit Theorem (CLT) and the law of large numbers predict that the mean of all variables selected from the same population will be nearly equal to the population’s mean, given a big enough sample size from the population with finite variance. As the sample size increases, the variances of these samples tend to match those of the population as a whole, according to the Law of Large Numbers. The random variable B is the weighted average of n independent events that are performed by the ith node. The events follow the same distribution and are independent because the probability that the event is positive is independent of the probability that the next event is positive. In our model, the following criteria will be considered for computing the trust level for a node in VANET:
4.1.1. Recommendations from Other Nodes
The RSU informs the referees to report on the credibility of the
jth node to allow it to communicate data with others. Referees send their recommendations based on their previous interactions with the
jth node. However, a referee may excuse if it does not interact directly with the
jth node. The RSU considers only a referee’s recommendation if the number of contacts with the
jth node exceeds threshold
. The set of referees whose recommendations are taken into account for evaluating the trustworthiness of the
jth node can be expressed as follows:
where
is the number of contacts between the
ith node and
jth node. This condition promotes recommendations from nodes with a longer history of contact with the
jth node. The recommendation of the
ih node is computed as follows:
where
is the number of positive interactions between the
jth and
ith nodes.
4.1.2. Direct Trust
The RSU computes the trust level of each new node based on their previous direct interactions. In our work, the RSU evaluates its interactions with the
jth node according to a scale of n levels numbered from 1 (the largest successful interaction) to
n (the lowest successful interaction). We assumed
is the number of interactions of type
between the
ith RSU and the
jth node. The RSU computes the trust for the
jth node as follows:
where
denotes the importance of the completed transaction, and
reflects the degree of cooperation of the
jth node with the RSU. The RSU must distinguish between transactions carried out by the
jth node. Transactions of the same type have varying values in our work, reflecting each transaction’s importance. This value is represented by
.
4.1.3. Accuracy of the Information Provided
The RSU constantly checks the correctness and accuracy of information produced by nodes in VANET. This is because the VANET environment is dynamic and subject to rapid change. The objective is to use VANET to spread accurate information and deal with misleading safety signals. When calculating the node’s trust, the degree of message accuracy could be represented as a coefficient. The Hamming distance [
24] will be employed in our research to assess the accuracy of information provided by a node. The information provided by the
jth node is compared to the information provided by the most trustworthy node. The most trusted node is chosen by the
ith RSU as follows:
The evaluation value of the Hamming distance
can be evaluated as follows:
where
denotes the length of the message (i.e., total number of bits) to be checked.
4.1.4. Fuzzy Integral for Trust Level Computation
Machine learning has been successfully applied to a wide range of applications in recent years, such as security problems [
25,
26,
27,
28]. Trust evaluation for each node aims to create a secure VANET that can significantly improve road safety. RSUs make independent decisions for selecting nodes that can exchange data over VANET. Fuzzy integral logic is adopted in our work to extract the final trust level for each node. Assume the set
indicates the possibilities or solutions from which the RSU must select (i.e., trust level for a node). Let ψ = {
} represent the limited set of criteria that must be considered while calculating a node’s trust value.
Each node is associated with a vector
∈
whose components
∈ ψ,
reflect the value of the
ith characteristic that will be considered in calculating trustworthiness. There would be an objective function for each of the criteria. A utility function is used to simulate the selection process preferences η based on these criteria:
Such that:
The utility functions that are labelled
(
), …,
(
) transfer each criterion of the
jth node to a single satisfaction scale ε ∈ I.R. Each node’s criteria must be combined into a single score or ranking for the
jth node, as follows:
λ-fuzzy measure [
29] is used in our work to compute the overall trust evaluation for the
jth node.
5. Performance Evaluation
The performance of our scheme was evaluated by examining its ability to recognize untrustworthy nodes and evict malicious nodes from the network. The main concern of our scheme is increasing the received ratio of accurate data and reducing the ratio of corrupted data. The simulation model was built using MatLab. The key performance measures of interest in the simulations are:
Throughput is the average rate at which a message is delivered successfully via a communication link.
Spectrum utilization is the average amount of time the spectrum is kept busy. The utilization is calculated as follows:
where
is the simulation duration, and
is the length of time the spectrum is kept busy. The findings were then averaged across a sufficient number of independent runs to ensure that the confidence level is at least 95% and that the relative errors do not exceed 5%. In this section, we analyzed the performance using a variety of parameter values.
Table 1 shows the parameters used to evaluate the proposed scheme. The input parameters’ values were selected to reflect a portion of the reality of wireless applications, such as phone call traffic.
Malicious nodes keep sending false messages and altering some of them while forwarding a received message. Furthermore, some nodes reject relaying some messages. Our scheme tries to exclude such nodes. As shown in
Figure 2, our security scheme (secured VANET, (SV)) produced better throughput outcomes in the simulations than a VANET without any security mechanisms (UV). The figure displays the effect of varying load on the reported throughput for the SV and the UV schemes. The figure shows that the proposed SV scheme consistently outperforms UV since it excludes malicious nodes from VANET and reduces their number to the lowest possible number. Therefore, the reported throughput for SV shifts to a higher level for different traffic values. Sometimes, malicious nodes reject forwarding packets. Fortunately, nodes that continue to send false warnings to keep the spectrum busy are excluded from the system using our scheme. Besides utilizing the recommendation from other nodes, the RSU uses its experience to evaluate untrustworthy nodes and evict them from VANET. The malicious node evection ratio is plotted in
Figure 3. It can be observed that the evection ratio increases as the number of malicious nodes increases.
The attackers might continue sending the RSU false reports to gain exclusive access to the spectrum and prevent other nodes from accessing it. The utilization of resources is realized under the premise of the preceding experimental scenario and trust model. Spectrum utilization results are displayed in
Figure 4. Clearly, the utilization decreases significantly as the percentage of malicious nodes increases. Fortunately, the figure shows that our scheme effectively utilizes the spectrum even when the percentage of attackers increases considerably. The SV scheme evicts misbehaving nodes that result in inefficient spectrum usage. However, the UV scheme’s utilization reduces considerably as the percentage of malicious nodes increases. Because it cannot cope with malicious nodes, the UV fails to make effective spectrum use.
In
Figure 5, the average delay is plotted against various percentages of attackers. It can be shown that as the number of malicious nodes increases, the average delay increases. Attackers send dummy messages to keep the spectrum busy and reserve VANET resources. As a result, users will be unable to access the spectrum, resulting in a considerable increase in delay. Untrustworthy nodes that refuse to relay or drop packets are ejected from VANET using our scheme. The results in
Figure 5 demonstrate our scheme’s ability to decrease the delay in various system settings. In addition, to reject false alarms from untrustworthy nodes, the RSU notifies trustworthy nodes to avoid connecting with these nodes. In any scenario, our scheme prevents untrustworthy nodes from accessing the spectrum.
6. Conclusions and Future Work
It is critical to secure VANET communication to save lives. VANET aims to ensure safe driving by assisting drivers in recognizing risks and improving road safety and traffic conditions. Adversary nodes may launch a variety of attacks in VANET. These attacks have a substantial impact on VANET’s performance and reliability. As a result, this research introduces a novel trust model for identifying and excluding attacker nodes in a VANET by monitoring node activity. It is based on a fuzzy logic model. Several criteria are fed into the model to calculate the final value of trust. Our scheme provides a practical solution for dealing with malicious and selfish nodes in VANETs without needing additional VANET components. When malicious nodes have a low trust value, the scheme evicts them from VANET.
Furthermore, evicting any selfish node encourages selfish nodes to collaborate. Through simulations, we demonstrated that our scheme could detect and evict all malicious nodes from the VANET while simultaneously increasing throughput and minimizing delay. Our solution encourages all nodes to participate in providing accurate information without being self-serving. We want to use a verification tool in the future to ensure that our scheme is robust to various attacks and that it only selects the most trustworthy nodes in the VANET. Furthermore, we would like to conduct a similar analysis on a real-world system.