Enhancing Intelligent Transport Systems Through Decentralized Security Frameworks in Vehicle-to-Everything Networks
Abstract
:1. Introduction
- (a)
- In consideration with cyber anomalies (such as malicious communication traffic analysis, GPS and node identity spoofing, data forgery, denial of authentication and services, and routing disruption attacks), we investigated D-IDSs using fog computing and consortium blockchain technology to enhance scalability and response times.
- (b)
- We explored real-time anomaly detection using fog computing for immediate data processing to reduce latency and effectively mitigate security threats.
- (c)
- We examined the application of SDN to separate control and data layers to allow for dynamic network reconfiguration and improved security management.
- (d)
- We addressed minority class imbalance in intrusion detection by employing advanced techniques to improve the detection accuracy of rare malicious events.
- (e)
- We implemented and analyzed the novel IBBE to secure group communications to ensure that only authorized vehicles can access transmitted messages.
- (f)
- We developed strategies for anonymous V2V communication to protect user privacy from tracking and profiling without compromising network efficiency.
- (g)
- We conducted a comparative analysis of centralized and decentralized security approaches to evaluate the strengths and weaknesses of each, including their implications for scalability, security, and privacy.
- (h)
- Ultimately, we proposed a novel approach utilizing hybrid machine learning (ML) models for intrusion detection. Our experimental evaluation demonstrates that the proposed method achieves superior accuracy compared to traditional techniques, offering a promising avenue for enhanced security in vehicular communication.
2. Literature Review
- (a)
- Data dissemination in VANETs can be proactive, reactive, or hybrid, which allows for flexibility in communication strategies.
- (b)
- The latency and bandwidth consumption for these networks are both considered average.
- (c)
- Network overload is not a critical issue, indicating robustness against congestion.
- (d)
- VANETs have limited support for real-time applications and do not support extensive computational tasks.
- (e)
- Geographic distribution is possible within VANETs that can enable coverage over dispersed areas.
- (f)
- Decision-making processes are localized, which suits the decentralized nature of these networks but is restricted by bandwidth limitations.
- (g)
- The computation capacity is medium, which is helpful in balancing between performance and the resources required for vehicular communication systems.
- (h)
- Deployment costs are low, making them economically feasible for widespread implementation.
Trust Management and Privacy Issues
- (a)
- V2V communications constantly experience rapid changes in network topology due to vehicle movement. This makes it challenging to establish and maintain trust relationships between vehicles, as their proximity and interaction patterns are constantly in flux.
- (b)
- On-board units (OBUs) in vehicles have limited processing power, memory, and battery life. Thus, running complex trust management algorithms can be resource-intensive, potentially impacting vehicle performance and battery life. This limitation necessitates the development of an optimized trust management algorithm that tries to be resource-efficient to minimize the impact on vehicle performance and battery life while ensuring robust security measures are maintained. Our investigation was motivated by the Lemma that fog computing can be effectively utilized by offloading heavy computations from OBUs to nearby fog nodes, which are capable of handling more resource-intensive tasks.
- (c)
- Malicious actors exploit the decentralized nature of VANETs to create fake identities (Sybil attacks) and manipulate trust relationships.
- (d)
- TM often involves collecting and storing data on vehicle behavior and interactions. This raises privacy concerns as sensitive information about driving habits and locations could be revealed.
- (e)
- Unlike traditional networks with centralized authorities that manage trust, VANETs lack a central entity responsible for trust verification.
- (f)
- Different VANET applications may have varying trust requirements. For safety-critical applications, a high level of trust is essential. However, for non-critical applications, a more lightweight trust model might be sufficient.
- (a)
- Achieving strong privacy guarantees does involve obscuring crucial traffic information (e.g., location, speed) that could be vital for safety applications like collision avoidance.
- (b)
- Even with pseudonymization techniques (e.g., Certificateless Cryptography and Hash-based Pseudonyms), adversaries can attempt to track and profile user movement patterns by correlating pseudonym changes with location data or network behavior. This can potentially reveal sensitive information about driving habits and routines.
- (c)
3. Open Challenges and Security Requirements of Projected VANETs
- (a)
- Identifying scalable security architectures capable of handling high mobility and frequent topology changes.
- (b)
- Developing a robust privacy-preserving mechanism that balances safety and privacy without compromising operational efficiency.
- (c)
- Implementing an efficient real-time communication protocol, ensuring data freshness and timely delivery.
- (d)
- Addressing a spectrum of cybersecurity threats including non-repudiation issues and network layer assaults.
- (e)
- Integrating heterogeneous networks and ensuring interoperability among diverse communication technologies.
- (f)
- Managing and maintaining the integrity of the vast amount of data generated by vehicles and roadside units.
- (g)
- Fostering widespread adoption and compliance with global security standards.
- (a)
- Ensuring message authenticity and integrity to prevent malicious attacks and misinformation.
- (b)
- Providing end-to-end confidentiality to protect sensitive user data and prevent eavesdropping.
- (c)
- Maintaining availability even under adversarial conditions to ensure continuous and reliable network service.
- (d)
- Enforcing strong entity authentication procedures to verify the identity of communicating entities.
- (e)
- Achieving non-repudiation to ensure that actions or communications by a particular entity can be indisputably proven to other parties.
- (f)
- Implementing efficient key management systems to facilitate secure communication channels.
- (g)
- Guaranteeing privacy to protect users from tracking and profiling while enabling accountability.
4. Proposed Methodology
5. Simulation Setup and Evaluation Outcome
- (a)
- illustrates the number of established communication sessions over a 24 h period which highlights the significant peaks that correspond to periods of high vehicular activity or network load. These fluctuations in session establishment were critical for analyzing the performance of the proposed framework under varying network conditions which demonstrated its ability to handle sudden surges in traffic while maintaining consistent security and reliability.
- (b)
- demonstrates the variability in network activity under different temporal conditions. This analysis highlights the framework’s capacity to handle frequent connection requests while ensuring secure communication protocols, which was critical for maintaining system resilience in a real-time evaluation environment.
- (c)
- depicts the number of packet exchanges over the assessment period and showcases the variations in data traffic influenced by network density and communication requirements. This evaluation emphasizes the robustness in managing packet flow efficiently while maintaining secure and reliable data transmission across the infrastructure.
- (d)
- highlights the number of security alerts generated with noticeable peaks during periods of high anomaly detection activity. This demonstrates the efficacy in promptly identifying and flagging potential threats, which ensured continuous monitoring and response to maintain network integrity and security.
- (e)
- interprets the frequency of network-wide report generation with a significant peak indicating a collective response to heightened anomaly detection during specific intervals, which is indicative of the capability to facilitate collaborative anomaly scoring and coordinated reporting mechanisms to conduct comprehensive threat assessments across the network.
- (f)
- describes a consistent vulnerability scan intensity reflecting the framework’s steady operational efficiency in continuous monitoring that confirms persistent and reliable security assessments without fluctuations.
- (g)
- exhibits the pattern of new node joining events within the network with distinct spikes indicating intervals of heightened vehicular participation which reflected that the system was capable of dynamically accommodating the integration of new nodes, and it warranted the seamless expansion of the network without compromising the overall system stability or security protocols.
- (h)
- illustrates the frequency of Sybil attack attempts by showing fluctuations in their occurrence under varying network conditions. This analysis highlights the robustness in detecting and mitigating identity-based attacks.
- (i)
- shows the pattern of session connection disconnections by reflecting variations in network stability due to mobility and environmental factors. This evaluation reflects the ability to manage and recover from frequent disconnections which certified resilience and reliability in maintaining active communication sessions within the setup.
Message Loss Rate
6. Conclusions
- (a)
- Optimizing the computational efficiency of the system, possibly through more advanced forms of compression and data simplification techniques that reduce the demands on real-time processing.
- (b)
- Implementing enhancements in blockchain technology with a focus on reducing latency and resource consumption.
- (c)
- Expanding the ML model to include unsupervised and semisupervised learning algorithms to offer a more robust detection mechanism for new and evolving anomaly types.
Author Contributions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
Appendix A
Taxonomy of Vulnerabilities in VANETs
References
- Yerrathi, S.; Pakala, V. Enhancing network stability in VANETs using nature inspired algorithm for intelligent transportation system. PLoS ONE 2024, 19, e0296331. [Google Scholar] [CrossRef]
- AlMarshoud, M.S.; Kiraz, M.S.; Al-Bayatti, A.H. Security, Privacy, and Decentralized Trust Management in VANETs: A Review of Current Research and Future Directions. ACM Comput. Surv. 2024, 56, 1–39. [Google Scholar] [CrossRef]
- Chen, X.; Qiu, W.; Chen, L.; Ma, Y.; Ma, J. Fast and practical intrusion detection system based on federated learning for VANET. Comput. Secur. 2024, 142, 103881. [Google Scholar] [CrossRef]
- Hassan, M.U.; Al-Awady, A.A.; Ali, A.; Sifatullah; Akram, M.; Iqbal, M.M.; Khan, J.; Ali, Y.A.A. ANN-Based Intelligent Secure Routing Protocol in Vehicular Ad Hoc Networks (VANETs) Using Enhanced AODV. Sensors 2024, 24, 818. [Google Scholar] [CrossRef]
- Awais, S.M.; Yucheng, W.; Mahmood, K.; Badar, H.M.S.; Kharel, R.; Das, A.K. Provably secure fog-based authentication protocol for VANETs. Comput. Netw. 2024, 246, 110391. [Google Scholar] [CrossRef]
- Hussein, N.H.; Koh, S.P.; Yaw, C.T.; Tiong, S.K.; Benedict, F.; Yusaf, T.; Kadirgama, K.; Hong, T.C. SDN-Based VANET Routing: A Comprehensive Survey on Architectures, Protocols, Analysis, and Future Challenges. IEEE Access 2024, 1–59. [Google Scholar] [CrossRef]
- Zhang, J.; Su, S.; Zhong, H.; Cui, J.; He, D. Identity-Based Broadcast Proxy Re-Encryption for Flexible Data Sharing in VANETs. IEEE Trans. Inf. Forensics Secur. 2023, 18, 4830–4842. [Google Scholar] [CrossRef]
- Tariq, U. Intelligent algorithmic framework for detection and mitigation of BeiDou spoofing attacks in vehicular ad hoc networks (VANETs). PeerJ Comput. Sci. 2024, 10, e2419. [Google Scholar] [CrossRef] [PubMed]
- Tariq, U. Optimized Feature Selection for DDoS Attack Recognition and Mitigation in SD-VANETs. World Electr. Veh. J. 2024, 15, 395. [Google Scholar] [CrossRef]
- Setitra, M.A.; Fan, M. Detection of DDoS attacks in SDN-based VANET using optimized TabNet. Comput. Stand. Interfaces 2024, 90, 103845. [Google Scholar] [CrossRef]
- Wang, M.; Mao, J.; Zhao, W.; Han, X.; Li, M.; Liao, C.; Sun, H.; Wang, K. Smart City Transportation: A VANET Edge Computing Model to Minimize Latency and Delay Utilizing 5G Network. J. Grid Comput. 2024, 22, 25. [Google Scholar] [CrossRef]
- Nazih, O.; Benamar, N.; Lamaazi, H.; Chaoui, H. Toward Secure and Trustworthy Vehicular Fog Computing: A Survey. IEEE Access 2024, 12, 35154–35171. [Google Scholar] [CrossRef]
- Peixoto, M.; Maia, A.; Mota, E.; Rangel, E.; Costa, D.; Turgut, D.; Villas, L. A traffic data clustering framework based on fog computing for VANETs. Veh. Commun. 2021, 31, 100370. [Google Scholar] [CrossRef]
- Gaouar, N.; Lehsaini, M.; Nebbou, T. CCITL: A cloud-based smart traffic management protocol using intelligent traffic light system in VANETs. Concurr. Comput. Pract. Exp. 2023, 35, e7686. [Google Scholar] [CrossRef]
- Zhan, Y.; Xie, W.; Shi, R.; Huang, Y.; Zheng, X. Dynamic Privacy-Preserving Anonymous Authentication Scheme for Condition-Matching in Fog-Cloud-Based VANETs. Sensors 2024, 24, 1773. [Google Scholar] [CrossRef] [PubMed]
- Su, H.; Dong, S.; Wang, N.; Zhang, T. An efficient privacy-preserving authentication scheme that mitigates TA dependency in VANETs. Veh. Commun. 2024, 45, 100727. [Google Scholar] [CrossRef]
- Kilic, A. TLS-handshake for Plug and Charge in vehicular communications. Comput. Netw. 2024, 243, 110281. [Google Scholar] [CrossRef]
- Amari, H.; El Houda, Z.A.; Khoukhi, L.; Belguith, L.H. Trust Management in Vehicular Ad-Hoc Networks: Extensive Survey. IEEE Access 2023, 11, 47659–47680. [Google Scholar] [CrossRef]
- Mdee, A.P.; Khan, M.T.R.; Seo, J.; Kim, D. Security Compliant and Cooperative Pseudonyms Swapping for Location Privacy Preservation in VANETs. IEEE Trans. Veh. Technol. 2023, 72, 10710–10723. [Google Scholar] [CrossRef]
- Labadie, C.; Legner, C. Building data management capabilities to address data protection regulations: Learnings from EU-GDPR. J. Inf. Technol. 2023, 38, 16–44. [Google Scholar] [CrossRef]
- OAG. “California Consumer Privacy Act (CCPA)”, State of California-Department of Justice-Office of the Attorney General. 13 March 2024. Available online: https://www.oag.ca.gov/privacy/ccpa (accessed on 3 May 2024).
- Mehrabani, M.R.; Abolhassani, B.; Haddadi, F.; Tellambura, C. Second-Order Statistics-Aided Channel Estimation for Multipath Massive MIMO-OFDM Systems. IEEE Access 2023, 11, 21921–21933. [Google Scholar] [CrossRef]
- Ma, W.; Peng, Y.; Liu, X.; Cui, J. VeriRange: A Verifiable Range Query Model on Encrypted Geographic Data for IoT Environment. IEEE Internet Things J. 2024, 11, 3068–3081. [Google Scholar] [CrossRef]
- Almehdhar, M.; Albaseer, A.; Khan, M.A.; Abdallah, M.; Menouar, H.; Al-Kuwari, S.; Al-Fuqaha, A. Deep Learning in the Fast Lane: A Survey on Advanced Intrusion Detection Systems for Intelligent Vehicle Networks. IEEE Open Journal of Vehicular Technology 2024, 5, 869–906. [Google Scholar] [CrossRef]
- Zhuang, L.; Guo, N.; Chen, Y. TriNymAuth: Triple Pseudonym Authentication Scheme for VANETs Based on Cuckoo Filter and Paillier Homomorphic Encryption. Sensors 2023, 23, 1164. [Google Scholar] [CrossRef]
- Konkin, A.; Zapechnikov, S. Zero knowledge proof and ZK-SNARK for private blockchains. J. Comput. Virol. Hacking Tech. 2023, 19, 443–449. [Google Scholar] [CrossRef]
- Carletti, M.; Terzi, M.; Susto, G.A. Interpretable Anomaly Detection with DIFFI: Depth-based feature importance of Isolation Forest. Eng. Appl. Artif. Intell. 2023, 119, 105730. [Google Scholar] [CrossRef]
- Zhong, W.; Yang, C.; Liang, W.; Cai, J.; Chen, L.; Liao, J.; Xiong, N. Byzantine Fault-Tolerant Consensus Algorithms: A Survey. Electronics 2023, 12, 3801. [Google Scholar] [CrossRef]
- Wang, C.; Xu, J.; Yin, L. A Secure Cloud-Edge Collaborative Logistic Regression Model. In Proceedings of the IEEE/ACM Int’l Conference on & Int’l Conference on Cyber, Physical and Social Computing (CPSCom) Green Computing and Communications (GreenCom), Melbourne, Australia, 6–8 December 2021; pp. 244–253. [Google Scholar] [CrossRef]
- Kumar, R.; Kumar, D.; Kumar, D. SMBF: Secure data Transmission using modified Bloom Filter for vehicular ad hoc networks. Recent Adv. Comput. Sci. Commun. 2022, 16, e310322202909. [Google Scholar] [CrossRef]
- Ren, Y.; Chen, C.; Hu, M.; Feng, G.; Zhang, X. BFDAC: A Blockchain-Based and Fog-Computing-Assisted Data Access Control Scheme in Vehicular Social Networks. IEEE Internet Things J. 2024, 11, 3510–3523. [Google Scholar] [CrossRef]
- Hu, H.; Fan, X.; Wang, C. Efficient cluster-based routing protocol for wireless sensor networks by using collaborative-inspired Harris Hawk optimization and fuzzy logic. PLoS ONE 2024, 19, e0301470. [Google Scholar] [CrossRef]
- Tariq, U.; Tariq, B. Proactive ransomware prevention in pervasive IoMT via hybrid machine learning. Indones. J. Electr. Eng. Comput. Sci. 2024, 34, 970–982. [Google Scholar] [CrossRef]
- Nsnam. “Network Simulator”, NS-3. 25 February 2024. Available online: https://www.nsnam.org/ (accessed on 10 May 2024).
- Zou, L.; Yan, H.; Dong, J.; Li, Y.; Chen, P.; Lau, F.C.M. On Construction of Low-Density Parity-Check Codes for Ultra-Reliable and Low Latency Communications. IEEE Trans. Commun. 2024, 72, 5290–5301. [Google Scholar] [CrossRef]
- Wang, Y.; Jia, Y.-H.; Chen, W.-N.; Mei, Y. Distance-aware Attention Reshaping: Enhance Generalization of Neural Solver for Large-scale Vehicle Routing Problems. arXiv 2024, arXiv:2401.06979. [Google Scholar] [CrossRef]
- Marydasan, B.P.; Nadarajan, R. An Energy-Conserved Stability and Density-Aware QoS-Enabled Topological Change Adaptable Multipath Routing in MANET. Int. J. Comput. Netw. Appl. 2023, 10, 964. [Google Scholar] [CrossRef]
- Gharibeh, H.F.; Yazdankhah, A.S.; Azizian, M.R. Energy management of fuel cell electric vehicles based on working condition identification of energy storage systems, vehicle driving performance, and dynamic power factor. J. Energy Storage 2020, 31, 101760. [Google Scholar] [CrossRef]
Topics | Contributions | Limitations | Year | Ref. | ||||
---|---|---|---|---|---|---|---|---|
Architecture Design | Mobility | Security | Privacy | Exposure and Hindrance | ||||
✔ | ✔ | ✔ | ✘ | ✘ |
|
| 2021 | [13] |
✔ | ✔ | ✔ | ✘ | ✔ |
|
| 2024 | [11] |
✔ | ✔ | ✘ | ✘ | ✘ |
|
| 2023 | [14] |
✔ | ✔ | ✔ | ✔ | ✔ |
|
| 2024 | [15] |
# | Step | Description | Technique | |
---|---|---|---|---|
1 | Data Collection and Preprocessing with Compressed Sensing | Each vehicle continuously monitored network traffic at a configurable sampling rate (e.g., adjustable based on network density). Packets were collected that contained the following:
| ||
2 | Local Anomaly Detection with Federated Differential Learning | Vehicles trained a local anomaly detection model collaboratively using Federated Differential Learning. The model analyzed preprocessed traffic data while preserving location privacy. This was achieved by enforcing differential privacy and adding noise to GPS coordinates before transmission. | Utilized deep learning architecture with Generative Adversarial Networks (GANs) [24] to capture complex traffic patterns and identify deviations from learned normal distribution. ’Federated Differential Learning’ updated model weights on each vehicle using ‘Secure Aggregation of Distributed Learning (SecAgg)’ protocol to protect individual training data points. Features of SecAgg included privacy-preserving training to protect individual contributions and enable collaborative model updates. | |
3 | Secure Data Aggregation with Consortium Blockchain and Homomorphic Encryption (HE) | Vehicles periodically generated anomaly reports containing the following:
|
| |
4 | Reputation System with Byzantine Fault Tolerance (BFT) and Unsupervised Anomaly Detection | Vehicles verified the received anomaly reports through a gossip protocol with enhanced security measures:
|
| |
5 | Global Anomaly Score Calculation with Secure Multi-Party Computation (SMPC) and Federated Learning | Vehicles collaboratively calculated a global anomaly score for each reported anomaly using a combination of SMPC and federated learning to further enhance privacy and security. | Utilized advanced SMPC protocol ‘SecureNN’ [29] to securely perform neural network computations on encrypted anomaly representations obtained through homomorphic encryption in step 3. This allowed for collaborative analysis of anomaly features without decryption. Global score considered the following:
| |
6 | Alert Generation and Secure Dissemination with Group Signatures | If the global anomaly score exceeded a predefined threshold and the zk-SNARK proof was valid, an alert was generated. | Alert message included anonymized location of anomaly using secure localization technique ‘verifiable multilateration’. Herein, Bloom filter [30] encrypted anomaly features using ‘HE’ which enabled efficient matching with local traffic data for verification of receiving vehicles. | |
7 | Countermeasure Activation with Blockchain-based Access Control | Based on the alert type and verified anomaly features, vehicles took appropriate actions:
| Smart contracts on consortium blockchain were used to implement access control rules guided by reputation scores and types of anomalies. Our system utilized secure communication channels with trusted RSUs to report critical information. | |
V2V Security Protocols | Signing Throughput: Messages per Second | Verified Messages Per Second | ||
Wang et al., [11] | 858 | 614 | ||
Nazih et al., [12] | 357 | 255 | ||
Peixoto et al., [13] | 89 | 47 | ||
Gaouar et al., [14] | 562 | 411 | ||
Zhan et al., [15] | 2579 | 655 | ||
Proposed | 40,613 | 40,613 |
V2V Security Protocols | Wang et al., [11] | Nazih et al., [12] | Peixoto et al., [13] | Gaouar et al., [14] | Zhan et al., [15] |
---|---|---|---|---|---|
Transmission Overhead (Bytes) | 154 | 74 | 258 | 96 | 39 |
Simulation Iteration | Link Length (km) | Average Vehicular Speed (m/s) | Network Density (Vehicles/km2) | Message Loss Rate (%) | LDPC Error Rate (%) | Protocol Used |
---|---|---|---|---|---|---|
1 | 0.5 | 30 | 100 | 2.5 | 0.5 | DARAS |
2 | 1.0 | 35 | 150 | 3.0 | 0.7 | DARAS |
3 | 1.5 | 40 | 200 | 3.5 | 0.9 | DATPCP |
4 | 2.0 | 25 | 250 | 4.0 | 1.1 | DATPCP |
5 | 2.5 | 20 | 300 | 4.5 | 1.3 | DPA-VN |
6 | 0.5 | 30 | 100 | 5.0 | 1.5 | DPA-VN |
7 | 1.0 | 35 | 150 | 2.3 | 0.3 | DARAS |
8 | 1.5 | 40 | 200 | 2.8 | 0.6 | DARAS |
9 | 2.0 | 20 | 250 | 3.2 | 0.8 | DATPCP |
10 | 2.5 | 25 | 300 | 3.7 | 1.0 | DATPCP |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Published by MDPI on behalf of the World Electric Vehicle Association. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Tariq, U.; Ahanger, T.A. Enhancing Intelligent Transport Systems Through Decentralized Security Frameworks in Vehicle-to-Everything Networks. World Electr. Veh. J. 2025, 16, 24. https://doi.org/10.3390/wevj16010024
Tariq U, Ahanger TA. Enhancing Intelligent Transport Systems Through Decentralized Security Frameworks in Vehicle-to-Everything Networks. World Electric Vehicle Journal. 2025; 16(1):24. https://doi.org/10.3390/wevj16010024
Chicago/Turabian StyleTariq, Usman, and Tariq Ahamed Ahanger. 2025. "Enhancing Intelligent Transport Systems Through Decentralized Security Frameworks in Vehicle-to-Everything Networks" World Electric Vehicle Journal 16, no. 1: 24. https://doi.org/10.3390/wevj16010024
APA StyleTariq, U., & Ahanger, T. A. (2025). Enhancing Intelligent Transport Systems Through Decentralized Security Frameworks in Vehicle-to-Everything Networks. World Electric Vehicle Journal, 16(1), 24. https://doi.org/10.3390/wevj16010024