Professional Documents
Culture Documents
DOI: 10.1002/ett.3650
1
LIMOSE Laboratory, Computer Science
Department, Faculty of Sciences Abstract
University M'Hamed Bougara,
Vehicular social network is emerging as a new promising concept, combin-
Boumerdès, Algeria
2
ing two types of network paradigms, namely, vehicular networks and social
Gaspard Monge Computer Science
Laboratory, University Paris-Est networks. In order to manage efficiently the security and the control of the net-
Marne-la-Vallee, LIGM - UMR 8049, work, this paper proposes a new framework based on the emerging concepts of
Champs-sur-Marne, France
3
software-defined vehicular network (SDVN) and blockchain. Using the SDVN
Laboratoire de Communication dans les
Systemes Informatiques, The National makes the network more programmable, virtualized, and partitionable. How-
Computer Engineering School of Algiers, ever, on the other hand, it also creates a well-known vulnerability of a single
Algiers, Algeria
point of failure. Hence, we propose to introduce the blockchain paradigm that
4
LIPADE Laboratory, Paris Descartes
will enable the certification of transactions and ensure data anonymity in a
University, Paris, France
fully distributed manner. To this end, three levels of controllers are needed: a
Correspondence principal controller (PC), roadside units (RSUs), and a local controller. In order
Youcef Yahiatene, LIMOSE Laboratory,
Computer Science Department, Faculty of
to dynamically select miners, a distributed miners connected dominating set
Sciences, M'Hamed Bougara University, algorithm (DM-CDS) has been proposed. The DM-CDS is a single-phase dis-
Independency Avenue, 35000 Boumerdès, tributed algorithm that supports a dynamic topology based on a trust model and
Algeria.
Email: yahiatene.y@univ-boumerdes.dz some other network parameters, such as the connectivity degree, the average
link quality indicator, and the rank. The performance of the proposed DM-CDS
is evaluated throughout multiple scenarios using different parameters, such as
trust metric, node density, node mobility, and radio range. The obtained results
highlight the importance of such proposed architecture, especially in terms of
number of required miners. For instance, when the density of nodes increases,
the number of selected miners increases similarly to when the network length
increases. The node mobility impacts also on the stability of the selected miners,
in terms of withdrawing and joining, showing a variation between 0% and 10%.
The trust metric has also an important impact on the selection of miners, as only
nodes with a higher trust level are selected to endorse the roles of miners.
1 I N T RO DU CT ION
The VSN is arising as a new promising concept, combining the two types of networks, namely, vehicular networks and
social networks.1,2 In VSN, a vehicle is equipped with multiple sensors, capable of collecting multiple spatiotemporal data.
The social dimension is mainly regarded as the ability to the driver and passengers to analyze, use, and share this data
with other commuters that have similar interests and/or facing similar traffic conditions.2 The VSN integrates relevant
Trans Emerging Tel Tech. 2019;e3650. wileyonlinelibrary.com/journal/ett © 2019 John Wiley & Sons, Ltd. 1 of 26
https://doi.org/10.1002/ett.3650
2 of 26 YAHIATENE ET AL.
features from the vehicular network and the social network. The vehicular network provides the network communication
infrastructure which can be deployed in a centralized, distributed, or hybrid mode. The VSN is a heterogeneous commu-
nication system, in which multiple devices can exchange information along the road such as on-board unit (OBU), RSU,
and smart devices exploiting the social behavior to communicate.3 The VSN supports a diverse range of applications, it is
not only limited to traffic management and road safety but enables commuters to share data such as videos, audios, roads
photos, and other information from different embedded sensors.
The main existing solutions are mainly based on fully centralized architecture. The mobility of vehicles makes access
to the infrastructure not guarantee. The fully decentralized architecture suffers from different drawbacks such as at
the top-level managers, we have less information about local operations in VSN entities. Everything is in charge of the
VSN entities to take a decision, which leads to lack of control. The quality of service becomes more difficult for the
insured.
In this paper, we propose to introduce a blockchain paradigm. It was introduced the first time by Satoshi into
peer-to-peer electronic cash system.4 The data are sent transparently, safety, and without a central control point. In addi-
tion, the blockchain-based system is a promising solution in privacy-protection based on anonymity and honesty of
information exchanged over the network. The blockchain is composed of blocks. It consists of multiple transactions which
are connected with a previous block in a chain. To ensure the reliability of the added blocks, a special process of solv-
ing a computationally called a “proof of work.” Blocks' generation is assured by nodes in the networks called “miners.”
The transaction consists of shared content between VSN entities such as traffic congestion, weather conditions, infotain-
ment, vacant parking slots, alternate routes, and so on. Moreover, in order to introduce the blockchain in VSN in this
context, we introduce three levels of controllers: PC, RSU, and a local controller. The PC has a global view of the VSN
topology. The RSU is an intermediate between the PC and the miners. The local controllers are acting not only as miners
in terms of security but also as relayers. In order to select miners, we propose a distributed miners connected dominat-
ing set (DM-CDS) algorithm.5 The selection of miners depends on trust parameter based on a trust model, and a network
parameters such as the connectivity degree (Deg), the average link quality indicator (LQI), and the rank.
The principal contributions are outlined as follows:
• A framework in view of SDVN is proposed. It depends on different controllers such as the PC, the RSU, and the miners.
• The blockchain system is applied to ensure protection and to verify information. We propose an algorithm called
DM-CDS using several parameters a trust metric and network parameters such as the connectivity degree, the average
link quality indicator, and the rank.
• Performance analysis is conducted using simulation with completely different situations and several other parameters
as well as nodes density, radio range, node density, and trust metric.
This paper is an extended of our previous work5 where the additional contributions are summarized as follows:
• In-depth discussion related to blockchain applications for the IoT is added.
• Comparison with the existing solutions from the related work based on miners selection is conducted.
• In-depth discussion of the proposed trust model which is introduced to detect misbehaving nodes including malicious,
selfish, and nodes launching conspiracy attacks.
The remainder of this paper is organized as follows: Section 2 depicts the related work, within which we introduce
the vehicular social networks and its design. We introduce the SDVN and an overview of the blockchain. Moreover, we
present the connected dominating sets (CDS) algorithm. We present the blockchain applications for the Internet of Things
(IoT). Section 3 describes the proposed framework based on blockchain design, its completely different modules, and
their interaction. In Section 4, we describe the miners' election exploiting CDS algorithms and their completely different
phases. Section 5 is dedicated to discuss and analyze the obtained simulation results and measure the performance of the
proposed DM-CDS. In Section 6, we present the safety analysis of our proposed framework. The last section (Section 7)
is devoted to conclude this paper and provides future views.
2 RELATED WORK
In this section, we present The VSN, the SDVNs, and the blockchain. Moreover, we introduce the CDS algorithm, and
some works related to the blockchain applications for the IoT.
YAHIATENE ET AL. 3 of 26
The proof of work is done by incrementing a nonce in the block, until the block is successfully mined. When new trans-
actions are broadcasted to miners, they collect them into a block, and they work on finding a proof of work. When the
miner achieves a proof of work, it diffuses the block to all nodes and it will be added to the blockchain.
model, modifications applied to patient data are noticeable to all member of the network. Any illegal changes can be
discovered. Moreover, Guo et al38 proposed a scheme based on multiple authorities (MA-ABS). The MA-ABS scheme can
be resistant to collusion attacks who can be launching by N-1 corrupted authorities.
Fog computing: Fog computing, also called edge computing, is a system that various devices cooperate and communi-
cate between them and with the network, in the purpose to realize actions like storage and treatment of data without a
third party.39 Huang et al40 introduced a scheme for payment based on bitcoin. They proposed a payment protocol using
security properties such as completeness, fairness, and accountability.
IoT devices: An attacker tries to obtain the data of IoT devices by using the malicious scripts. Lee and Lee41 introduced a
microcode based on blockchain to safely verify microcode version. To obtain microcode update, a device sends its request
using a blockchain on a peer-to-peer decentralized manner. Gu et al42 proposed “CB-MDEE,” which is a framework based
on blockchain; it is used to detect malware in mobile devices. The framework is based on fuzzy logic in the purpose to
mitigate the false-positive ratio and improve the detection of malware.
Software-defined networking: Scientists have been proposing a software to manage network called software-defined
networking (SDN). Using SDN controller provides a smart routing and make decision simple.43 Sharma et al44 proposed
“Distblocknet” which is controller over a network based on the blockchain. The proposed architecture without needing a
central point will provide scalability and flexibility of the solution. The “Distblocknet” is based on controller/verification
and request/response nodes. Regarding the verification node, it maintains the updated flow rules information. The second
node which is the IoT forwarding devices, it updates low rules table in a blockchain.
Internet of vehicles: In this subsection, we present the related works in Internet of vehicles. As we can see in Table 1, all
related works take miners' selection differently. They are based on RSU most of the time. Thus, they delegate the miners
processing to base stations, this is not the case in our approach. We introduce a new framework based on SDVN. We use
the blockchain paradigm, to this end, a new algorithm has been proposed a DM-CDS that is used to select “miners” nodes.
Indeed, in the related works, the miners' selection is based on a centralized architecture, and our proposed architecture
is based on a semidistributed architecture, so the comparison of output results could not take place and could have less
significance. Yang et al45 proposed a reputation system based on blockchain to measure information reliability. Vehicles
rate the received messages and wrap these rating into a block. A selected vehicle is in charge of spreading the information
to others. Using the information stocked on the blockchain, vehicles evaluate the reputation of the transmitter; thus, a
decision about the credibility of the messages is taken.
Lei et al46 proposed a key management system based on a blockchain for heterogeneous intelligent transportation sys-
tems. In which the external authorities are removed, and the key management verification and authentication are based
on security manager. Kang et al47 proposed a "PETCON" using a peer-to-peer commerce system. Based on local aggrega-
tors LAGS which are used to control transactions and given access to various services. Yang et al48 proposed a trust model
based on a decentralized blockchain to measure the credibility of the received information. Based on the outcomes, vehi-
cles make ratings and send them to RSU, which compute the trust value of concerned vehicles and add them to a block.
The blockchain here is maintained by all RSUs, which collaborate to maintain a reliable and consistent trust blockchain.
Huang et al49 proposed a model based on a blockchain for an electric vehicle for charging pile administration. Based on
cryptographic tools, a model is proposed named “LNSC” ensure power supply.
Li et al50 proposed a privacy model based on reward announcement for intelligent transportation system. The pro-
posed scheme named “CreditCoin” based on a blockchain, in which a protocol is built to ensure trusted communication.
Liu et al51 proposed an electric vehicle based on a cloud computing and a edge computing using the blockchain. The
electric vehicles (EVs) provide flow information that changes. A malicious user may catch information via the network.
To address this issue, the blockchain is introduced with two features. Decentralized means that all data operations such
as accounting, storage, and transmission are based on a distributed approach. The second feature is the coparticipa-
tion, means that all EVs will participate in block transactions. The authors focused on issues related to data and energy
exchanges. Use the blockchain paradigm to achieve an enhanced security protection. The vehicles data will be encrypted
and organized into blocks. The RSUs audit vehicular records before added them into the blockchain. Liu et al52 proposed
a dynamic mining selection based on a blockchain and evolutionary game using the Nakamoto consensus protocol.4 The
authors take two factors such as computation power and propagation delay which define the result of the selection. They
propose a model based on the evolutionary game to mathematically describe the dynamic mining-pool selection pro-
cess. The authors focused on mining pool selection, in any case, they did not discuss the selection process of the block
miner itself.
All these related works take the blockchain differently. In the works of Yang et al,45,48 authors talk about data credibility,
to this end, they proposed a decentralized framework for trust management. The RSUs play an important role in the trust
YAHIATENE ET AL.
values updating. The authors in these papers did not talk about how to select nodes from the network to act as miners. It
is the same thing with Liu et al.51 The authors use the blockchain without worrying about how to select miners.
This section depicts in detail the proposed architecture. It is a hybrid approach, which is capable to support a centralized
and a semidistributed control. The basic concept is to select particular nodes to play a role as local controllers.53,54 To this
end, we have various types of controller such as the PC, the RSU, and the miners as presented in Figure 3. In Figure 4, we
illustrated the interaction between different modules. They are divided into main modules such as control module, data
module, the cloud computing module, privacy module, and end-user module.
FIGURE 4 Interaction between different modules of the architecture. RSU, roadside unit
edge of the network. Using the MEC in the purpose of reducing network congestion, and in hope of improving application
performance, and dissemination of content is concerning the end user. The MEC server can be installed in various places
at the network edge: at the 4G/LTE macro base station, at the technology (3G/LTE), and at the radio network controller
(RNC) site. The nodes related to distributed edges can send or receive data from another nodes early in real time.56 The
fog computing extends the edge of the network. It is not as close but it covers more area than the edge. It is utilized
to pretreatment gathered data at the edge layer and sending them to the cloud computing. The fog computing works
with the edge computing to run an application in a multilayer while performing intelligent transmission services with
computing, storage, and communication capabilities. Our proposed framework take into account various aspects such
as scalability, flexibility, interoperability, and the semidistributed nature of the architecture; hence, the MEC or the fog
computing is a well candidate to make services more certain and efficient. The MEC is seen as an efficient technology to
support VANET/Internet of vehicles.57,58
The trust model proposed by Wang et al61 is based on three parameters such as connectivity, fitness, and satisfaction.
To calculate the degree of confidence, we take a “two-hop” intermediates VSN entities to generate acknowledgement
messages for the sender entities.
d,s
Ti,𝑗 represents direct satisfaction between node i and j.
nack represents the number of collected acknowledgement messages.
nrec represents the quantity of times node j gets messages.
nFack j represents the quantity of appearance of node j in final acknowledgement messages.
path( j): represents the appearance of node j in the forwarding pathway. When the source entity gets the acknowledge-
ment messages from the target node, this is a confirmation about the good behavior of nodes in the forwarding path.
of recommendation: (1) nodes with trust degree greater than a particular threshold and (2) other nodes have a similarity
of trust with the current node. The choice of the biggest value of trust is more suitable. The second categories, if nodes
have similarity in their blacklist on misbehavior nodes, their trust recommendation can be accepted. Example: if node A
wants to take a decision about the recommendation, two requirements must be verified.
1. Trust degree must be greater or equal than the minimum;
2. Similarity on their blacklists. To evaluate the resemblance between blacklist of node i and j, we have formula (4), ie,
|Bi ∩ B𝑗 |
Sim(i, 𝑗) = . (4)
|Bi ∪ B𝑗 |
Regarding the indirect trust, there are two situations. The case when there is no recommendation to be sent for node
j during the period |t, t + Δt|. The last case, there is no indirect recommendation to receive. The calculation is given
by (7), ie,
{ ind,X
ind,X
exp−𝜆𝛿t ∗ Ti,𝑗 (t).
Ti,𝑗 (t + Δt) = ind,X ind,X
(7)
𝛽 ∗ exp−𝜆𝛿t ∗ Ti,𝑗 (t) + (1 − 𝛽) ∗ Ti,𝑗 (t + 𝛿t).
Global trust is obtained with direct and indirect trust. For every attribute X, the trust from node i to node j is given
by (8), ie,
d,X d,X ind,X
Ti,𝑗 (t + Δt) = 𝛾Ti,𝑗 (t + Δt) + (1 − 𝛾)Ti,𝑗 (t + Δt). (8)
𝛾 is attributed with several values according to the condition of the network. When the network runs for sometimes, it
will tend to be in indirect trust. For node i trust to node j, transmission capacity is given as (9), ie,
∑
all
Ti,𝑗 (t + Δt) = 𝜔X Ti,𝑗
X
(t + Δt), (9)
X
where 𝜔X represents the ratio of attribute X in all attributes. X is combined with fitness, connectivity, and satisfaction.
YAHIATENE ET AL. 13 of 26
This section depicts the selection process of miners nodes, which have a major purpose on the network in terms of over-
head related to validating transactions exchanged between VSN entities based on the DSP approach, which produces
better performance in terms of a number of connected miners. To this end, we present our CDS algorithm, which is used
to select a subset of nodes acting as miners nodes. The algorithm begins by attributing a white flag to every node. After-
ward, executing the separate phase of DSP-CDS algorithm, particular VSN entities turn their flags to black, only entities
with a black flag created by DSP-CDS will be acting as miners.
We present a solution called “DM-CDS.” It is based on various parameters including the connectivity degree, the link
quality indicator, the trust metric, and the rank (distance in terms of hops from RSU). In the proposed algorithm, each
VSN entity has proprieties such as unique ID (NodID), a subset on connected VSN entities, over the first execution, VSN
has a distinct ID (SetID). There are three flags employed to specify VSN entity status: white (nondominating node),
gray (middle phase), and black (predominating node).
We discern two main phases: (1) the startup phase, which implies to identify and initialize the status of each node.
It starts the “miner_score” competition, in a plan to provide distinct importance to each VSN according to a various
criterion. (2) The processing phase, it takes a decision where VSN entities are changed to white or black. As we see in
14 of 26 YAHIATENE ET AL.
FIGURE 7 The flowchart of selection miners process. DM-CDS, distributed miners connected dominating set; vehicular social network
the flowchart presented in Figure 7, we present the different process of our intended DM-CDS algorithm. This process
represents an election approach of the miners based on the control module.
Startup phase: In this phase called the startup process, all VSN entities have the same flag color as white, and their
“miner_score” is unavailable (invalid) in the first time. Moreover, the value of the subset number is the same value as the
VSN entity number. The identity of SetId is the same as NodID. All VSN entities have an initial score for the Tm.62 Every
VSN node has the following status:
• NodId;
• flag_color = white;
• SetId=NodId;
• miner_score is unavailable.
Network parameters evaluation phase: In this step, every entity in VSN calculates important parameters grouped by the
following.
Network parameters:
• the connectivity degree, which depicts the number of directly connected neighbors;
• the average link quality indicator, which depicts the average link with nodes entities;
• the rank depicts the number of hops from the RSUs.
Trust parameter:
• trust metric depicts the degree of trust and integrity of node entity.
YAHIATENE ET AL. 15 of 26
5 PERFORMANCE A NA LYSIS
This section is consecrated to evaluating and communicating the performance of our algorithm DM-CDS. We consider dif-
ferent performance measures with different scenarios. We implement the DM-CDS algorithm, and we debate the obtained
results. Simulation is needed to provide an important method of analysis and valuable solution. It enables experimen-
tation on a valid representation of our proposed algorithms. It is a simulation with a network aspect, which enables the
control of miners' selection, taking into account the temporal constraints such as the distance from the RSU (rank), the
link quality indicator, and model of trust.
16 of 26 YAHIATENE ET AL.
Each node executes the network parameters assessment phase, after that, the node executes the competition and
decision phase (seen in the previous section), in the aim to take a decision to become a miner node or not.
TABLE 2 Simulation parameters of the distributed miners connected dominating set DM-CDS algorithm
Network Scenario Number of Node (N) Node Density 𝜌 Network Length Radio Range (R) Dynamic
S1 64 to 567 0.03 40 to 120 10 N/A
S2 64 to 567 0.04 40 to 120 10 to 20 withdrawing
S3 64 to 567 0.05 40 to 120 10 to 20 joining
S4 64 to 567 0.06 40 to 120 10 to 20 moving
Radio range: The radio range is the third major parameter. The number of the neighbor nodes increases in relativity
with the radio range. This can raise their degree of connectivity. In the simulation, we vary the radio range between 10
and 20 to assess the execution of our DM-CDS algorithm. The relative node density is given by 𝜋xR2 x𝜌. For example, when
the radio range is given to R = 20, the node density 𝜌 = 0.02. The relative density is equal to 25.12. The two parameters
such as node density and radio range have a significant impact to determine the number of miners nodes.
Trust metric: The trust metric is the most major parameters. Influencing the number of miners nodes. It measures the
trust of VSN entities. In the case of Tm ≤ threshold, the node is excluded from the selection process of miners node. The
simulations administered show the effect of the various parameters on miners' selection such as the node density 𝜌, the
trust metric, the node mobility, and the radio range R. The simulation's scenarios discussed above take place in multiple
iterations. Therefore, at every round, the node takes a decision to change its flag_color correspond to the “miner_score” of
its neighbors. Simulations use the evaluation metric of miners' number for the performance evaluation of the algorithms
proposed in the section “The Miners selection based on CDS algorithm.” The DM-CDS size illustrates the miners nodes,
which are selected using different parameters.
140
120
100
DM−CDS size
80
60 p=0.03
p=0.04
p=0.05
40
p=0.06
20
20 40 60 80 100 120
Network length L(Km)
FIGURE 10 Number of miners node according to node density. DM-CDS, distributed miners connected dominating set
18 of 26 YAHIATENE ET AL.
160
140
120
DM−CDS size
100
80
60
40 p=0.03
p=0.04
20 p=0.05
p=0.06
0
10 11 12 13 14 15 16 17 18 19
Rdio Range (R)
FIGURE 11 Number of miners node according to radio range. DM-CDS, distributed miners connected dominating set
140
withdrawing=0%
120 withdrawing=4%
withdrawing=7%
100 withdrawing=10%
DM−CDS size
80
60
40
20
20 40 60 80 100 120
Network lengh L (Km)
FIGURE 12 Number of miners according to network withdrawing. DM-CDS, distributed miners connected dominating set
YAHIATENE ET AL. 19 of 26
140
joining=0%
120 joining=4%
joining=7%
100 joining=10%
DM−CDS size
80
60
40
20
20 40 60 80 100 120
Network lengh L (Km)
FIGURE 13 Number of miners according to network joining. DM-CDS, distributed miners connected dominating set
120
Tm=0%
100 Tm=20%
TM=60%
80 Tm=80%
DM−CDS size
60
40
20
0
20 40 60 80 100 120
Network lengh L (Km)
FIGURE 14 Number of miners according to trust metric. DM-CDS, distributed miners connected dominating set
120
80
DM−CDS size
60
40
20
0
20 30 40 50 60 70 80 90 100 110 120
Network length L(Km)
FIGURE 15 Comparison between distributed miners connected dominating set (DM-CDS) and distributed single-phase algorithm for
constructing a connected dominating set (DSP-CDS) algorithms
and the DSP-CDS algorithms. It shows that our proposed algorithm DM-CDS surpasses the DSP-CDS with a variance of
40% in terms of miners nodes. This variance between both algorithms is caused by the election process adopted by each
algorithm. The outcomes show that our proposed algorithm DM-CDS compared to DSP-CDS is converging rapidly with
a minimum miners nodes.
6 S EC U RI T Y ANALY SIS
This section is dedicated to the safety analysis of our framework, and we discuss and present some safety analysis of the
proposed architecture.
FIGURE 16 Attacks classification in vehicular social network. VSN, vehicular social network
YAHIATENE ET AL. 21 of 26
delete packets selectively; this kind of attack is named the gray hole attack. By using the ACK messages, our presented
approach may detect and avoid these attacks by calculating satisfaction and excluding nodes if they behave badly.
7 CO N C LU S I O N
In this article, we design a novel framework mainly based on two ideas, namely, the blockchain and SDVNs. Working
with the SDVN allows us to make the network configurable, partitionable, and virtualized. We design and describe the
different modules and software components of this framework. Our proposed architecture is designed to select connected
dominators nodes that act as miners. We integrate various controllers, namely, the PC, the RSUs, and the local controller.
The purpose is to distribute some functions of the controllers and make the services closer to the nodes. Concerning, the
blockchain, an algorithm based on the “CDS” approach selects particular nodes to act as miners, called “DM-CDS,” is
proposed. The proposed algorithm is based on a function named “miner_score,” which combines two relevant parame-
ters network and security. The “miner_score” function is based on the network parameters, namely, the rank, the link
quality indicator, and the connectivity degree, and security parameter which is the trust metric. The trust metric is very
selective; we calculate the trust metric based on connectivity, fitness, and satisfaction, which represents the way a node
is satisfied with the transfer behavior performed by an intermediate node. In order to assess our proposed framework, we
conduct an intensive simulation scenario. The outcomes show the prominence of the proposed model and its sensitivity
and responsiveness to trust model and various network parameters. In future work, we prepare to consider other mobility
models and experiment our architecture with a real test-bed for multiplatform technologies.
ACRONYM S
ORCID
REFERENCES
1. Xia F, Liu L, Li J, Ma J, Vasilakos AV. Socially aware networking: a survey. IEEE Syst J. 2015;9(3):904-921.
2. Ning Z, Xia F, Ullah N, Kong X, Hu X. Vehicular social networks: enabling smart mobility. IEEE Commun Mag. 2017;55(5):16-55.
3. Rahim A, Kong X, Xia F, et al. Vehicular social networks: a survey. Pervasive Mob Comput. 2017;43:96-113.
4. Nakamoto S. Bitcoin: a peer-to-peer electronic cash system. 2008.
5. Yahiatene Y, Rachedi A. Towards a blockchain and software-defined vehicular networks approaches to secure vehicular social network.
In: Proceedings of the 2018 IEEE Conference on Standards for Communications and Networking (CSCN); 2018; Paris, France.
6. Ferrag MA, Maglaras L, Ahmim A. Privacy-preserving schemes for ad hoc social networks: a survey. IEEE Commun Surv Tutor.
2017;19(4):3015-3045.
7. Al-Sultan S, Al-Doori MM, Al-Bayatti AH, Zedan H. A comprehensive survey on vehicular ad hoc network. J Netw Comput Appl.
2014;37:380-392.
24 of 26 YAHIATENE ET AL.
8. Vegni AM, Loscri V. A survey on vehicular social networks. IEEE Commun Surv Tutor. 2015;17(4):2397-2419.
9. Li Z, Wang C, Yang S, Jiang C, Li X. Lass: local-activity and social-similarity based data forwarding in mobile social networks. IEEE Trans
Parallel Distrib Syst. 2015;26(1):174-184.
10. Smailovic V, Podobnik V. Bfriend: context-aware ad-hoc social networking for mobile users. In: Proceedings of the 35th International
Convention (MIPRO); 2012; Opatija, Croatia.
11. Abbani N, Jomaa M, Tarhini T, Artail H, El-Hajj W. Managing social networks in vehicular networks using trust rules. In: Proceedings of
the 2011 IEEE Symposium Wireless Technology and Applications (ISWTA); 2011; Langkawi, Malaysia.
12. Zeadally S, Hunt R, Chen Y-S, Irwin A, Hassan A. Vehicular ad hoc networks (VANETs): status, results, and challenges. Telecommunication
Systems. 2012;50(4):217-241.
13. Silva R, Iqbal R. Ethical implications of social internet of vehicles systems. IEEE Internet Things J. 20186(1):517-531.
14. Mason RO. Four ethical issues of the information age. MIS Quarterly. 1986;10(1):5-12.
15. Lu R, Lin X, Shen X. SPRING: a social-based privacy-preserving packet forwarding protocol for vehicular delay tolerant networks. In:
Proceedings of the 29th IEEE International Conference on Computer Communications (INFOCOM); 2010; San Diego, CA.
16. Zhong P, Lu R. PAD: privacy-preserving data dissemination in mobile social networks. In: Proceedings of the 2014 IEEE International
Conference on Communication Systems; 2014; Macau, China.
17. de Oliveira TR, de Oliveira S, Macedo DF, Nogueira JM. Social networks for certification in vehicular disruption tolerant networks. In:
Proceedings of the 2014 IEEE 10th International Conference on Wireless and Mobile Computing, Networking and Communications
(WiMob); 2014; Larnaca, Cyprus.
18. Huang D, Zhou Z, Hong X, Gerla M. Establishing email-based social network trust for vehicular networks. In: Proceedings of the 2010
7th IEEE Consumer Communications and Networking Conference; 2010; Las Vegas, NV.
19. Alganas A, Lin X, Grami A. EVSE: an efficient vehicle social evaluation scheme with location privacy preservation for vehicular
communications. In: Proceedings of the IEEE International Conference on Communications (ICC); 2011; Kyoto, Japan.
20. Yaqoob I, Ahmad I, Ahmed E, Gani A, Imran M, Guizani N. Overcoming the key challenges to establishing vehicular communication: is
sdn the answer? IEEE Commun Mag. 2017;55(7):128-134.
21. Ku I, Lu Y, Gerla M. Software-defined mobile cloud: architecture, services and use cases. In: Proceedings of the 2014 IEEE International
Wireless Communications and Mobile Computing Conference (IWCMC); 2014; Nicosia, Cyprus.
22. Ku I, Lu Y, Gerla M, Gomes RL, Ongaro F, Cerqueira E. Towards software-defined vanet: architecture and services. In: Proceedings of the
2014 13th Annual Mediterranean Ad Hoc Networking Workshop (MED-HOC-NET); 2014; Piran, Slovenia.
23. Kim H, Feamster N. Improving network management with software defined networking. IEEE Commun Mag. 2013;51(2):114-119.
24. Wang S, Ouyang L, Yuan Y, Ni X, Han X, Wang F-Y. Blockchain-enabled smart contracts: architecture, applications, and future trends.
IEEE Trans Syst Man Cybern Syst. 2019:1-12.
25. Nojoumian M, Golchubian A, Njilla L, Kwiat K, Kamhoua C. Incentivizing blockchain miners to avoid dishonest mining strategies by
a reputation-based paradigm. In: Intelligent Computing: Proceedings of the 2018 Computing Conference, Volume 2. Basel, Switzerland:
Springer; 2018:1118-1134.
26. Orman H. Blockchain: the emperors new PKI? IEEE Internet Comput. 2018;22(2):23-28.
27. Watanabe H, Fujimura S, Nakadaira A, Miyazaki Y, Akutsu A, Kishigami J. Blockchain contract: securing a blockchain applied to smart
contracts. In: Proceedings of the 2016 IEEE International Conference on Consumer Electronics (ICCE); 2016; Las Vegas, NV.
28. Pilkington M. 11 blockchain technology: principles and applications. In: Research handbook on digital transformations. Cheltenham, UK:
Edward Elgar Publishing; 2016:225.
29. Vazquez-Araujo F, Dapena A, Souto-Salorio MJ, Castro PM. Calculation of the connected dominating set considering vertex importance
metrics. Entropy. 2018;20(2):87.
30. Mnif K, Rong B, Kadoch M. Virtual backbone based on MCDS for topology control in wireless ad hoc networks. In: Proceedings of the
2nd ACM International Workshop on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks (PE-WASUN '05);
2005; Quebec, Canada.
31. Das B, Bharghavan V. Routing in ad-hoc networks using minimum connected dominating sets. In: Proceedings of the 1997 IEEE
International Conference on Communications: Towards the Knowledge Millennium (ICC 1997); 1997; Quebec, Canada.
32. Wu J, Dai F, Gao M, Stojmenovic I. On calculating power-aware connected dominating sets for efficient routing in ad hoc wireless
networks. J Commun Netw. 2002;4(1):59-70.
33. Stojmenovic I, Seddigh M, Zunic J. Dominating sets and neighbor elimination-based broadcasting algorithms in wireless networks. IEEE
Trans Parallel Distributed Syst. 2002;13(1):14-25.
34. Yin B, Shi H, Shang Y. An efficient algorithm for constructing a connected dominating set in mobile ad hoc networks. J Parallel Distributed
Comput. 2011;71(1):27-39.
35. Ferrag MA, Derdour M, Mukherjee M, Derhab A, Maglaras L, Janicke H. Blockchain technologies for the internet of things: research
issues and challenges. IEEE Internet Things J. 2018;6(2):2188-2204.
36. Liang X, Zhao J, Shetty S, Liu J, Li D. Integrating blockchain for data sharing and collaboration in mobile healthcare applications. In:
Proceedings of the 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC);
2017; Quebec, Canada.
37. Esposito C, De Santis A, Tortora G, Chang H, Choo K-KR. Blockchain: a panacea for healthcare cloud-based data security and privacy?
IEEE Cloud Comput. 2018;5(1):31-37.
YAHIATENE ET AL. 25 of 26
38. Guo R, Shi H, Zhao Q, Zheng D. Secure attribute-based signature scheme with multiple authorities for blockchain in electronic health
records systems. IEEE Access. 2018;6:11676-11686.
39. Vaquero LM, Rodero-Merino L. Finding your way in the fog: towards a comprehensive definition of fog computing. ACM SIGCOMM
Comput Commun Rev. 2014;44(5):27-32.
40. Huang H, Chen X, Wu Q, Huang X, Shen J. Bitcoin-based fair payments for outsourcing computations of fog devices. Future Gener Comput
Syst. 2018;78:850-858.
41. Lee B, Lee J-H. Blockchain-based secure firmware update for embedded devices in an internet of things environment. J Supercomput.
2017;73(3):1152-1167.
42. Gu J, Sun B, Du X, Wang J, Zhuang Y, Wang Z. Consortium blockchain-based malware detection in mobile devices. IEEE Access.
2018;6:12118-12128.
43. Kalkan K, Zeadally S. Securing internet of things (IoT) with software defined networking (SDN). IEEE Commun Mag. 2017;56(9):
186-192.
44. Sharma PK, Singh S, Jeong Y-S, Park JH. Distblocknet: a distributed blockchains-based secure SDN architecture for IoT networks. IEEE
Commun Mag. 2017;55(9):78-85.
45. Yang Z, Zheng K, Yang K, Leung VictorCM. A blockchain-based reputation system for data credibility assessment in vehicular networks.
In: Proceedings of 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC);
2017; Quebec, Canada.
46. Lei A, Cruickshank H, Cao Y, Asuquo P, Ogah CPA, Sun Z. Blockchain-based dynamic key management for heterogeneous intelligent
transportation systems. IEEE Internet of Things J. 2017;4(6):1832-1843.
47. Kang J, Yu R, Huang X, Maharjan S, Zhang Y, Hossain E. Enabling localized peer-to-peer electricity trading among plug-in hybrid electric
vehicles using consortium blockchains. IEEE Trans Ind Inform. 2017;13(6):3154-3164.
48. Yang Z, Yang K, Lei L, Zheng K, Leung VCM. Blockchain-based decentralized trust management in vehicular networks. IEEE Internet of
Things J. 2018;6(2):1495-1505.
49. Huang X, Xu C, Wang P, Liu H. LNSC: a security model for electric vehicle and charging pile management based on blockchain ecosystem.
IEEE Access. 2018;6:13565-13574.
50. Li L, Liu J, Cheng L, other. CreditCoin: a privacy-preserving blockchain-based incentive announcement network for communications of
smart vehicles. 2018;19(7):2204-2220.
51. Liu H, Zhang Y, Yang T. Blockchain-enabled security in electric vehicles cloud and edge computing. IEEE Network. 2018;32(3):78-83.
52. Liu X, Wang W, Niyato D, Zhao N, Wang P. Evolutionary game for mining pool selection in blockchain networks. IEEE Wireless Commun
Lett. 2018;7(5):760-763.
53. Bendouda D, Rachedi A, Haffaf H. Programmable architecture based on software defined network for internet of things: connected
dominated sets approach. Future Gener Comput Syst. 2018;80:188-197.
54. Bendouda D, Rachedi A, Haffaf H. An hybrid and proactive architecture based on SDN for internet of things. In: Proceedings of the 13th
International Wireless Communications and Mobile Computing Conference (IWCMC 2017); 2017; Valencia, Spain.
55. Schwartz A. A reinforcement learning method for maximizing undiscounted rewards. In: Proceedings of the Tenth International
Conference on International Conference on Machine Learning; 1993; Amherst, MA.
56. Borcoci E, Vochin M, Obreja SG. Mobile edge computing versus fog computing in internet of vehicles. In: Proceedings of the Tenth
International Conference on Advances in Future Internet; 2018; Venice, Italy.
57. Kaiwartya O, Abdullah AH, Cao Y, Altameem A, Prasad M, Lin C-T, Liu X. Internet of vehicles: motivation, layered architecture, network
model, challenges, and future aspects. IEEE Access. 2016;4:5356-5373.
58. Yang F, Li J, Lei T, Wang S. Architecture and key technologies for internet of vehicles: a survey. J Commun Inf Netw. 2017;2(2):1-17.
59. Gazdar T, Benslimane A, Rachedi A, Belghith A. A trust-based architecture for managing certificates in vehicular ad hoc networks.
In: Proceedings of the 2012 International Conference on Communications and Information Technology (ICCIT); 2012; Hammamet,
Tunisia.
60. Rachedi A, Benslimane A. A secure and resistant architecture against attacks for mobile ad hoc networks. Sec Commun Netw.
2010;3(2-3):150-166.
61. Wang EK, Li Y, Ye Y, Yiu SM, Hui LCK. A dynamic trust framework for opportunistic mobile social networks. IEEE Trans Netw Serv
Manag. 2018;15(1):319-329.
62. Haddadou N, Rachedi A, Ghamri-Doudane Y. A job market signaling scheme for incentive and trust management in vehicular ad hoc
networks. IEEE Trans Veh Technol. 2015;64(8):3657-3674.
63. Trusted Platform Module(TPM). Trusted platform module. 2018.
64. TPM Main. Part 2 TPM structures. Specification version 1.2. 2007.
65. Guette G, Heen O. A tpm-based architecture for improved security and anonymity in vehicular ad hoc networks. In: Proceedings of the
IEEE Vehicular Networking Conference (VNC); 2009; Tokyo, Japan.
66. Guette G, Bryce C. Using TPMs to Secure Vehicular Ad-Hoc Networks (VANETs). In: Information Security Theory and Practices. Smart
Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16,
2008. Berlin, Germany: Springer Science & Business Media; 2008:106-116.
67. Wang J, Liu Y, Jiao Y. Building a trusted route in a mobile ad hoc network considering communication reliability and path length. J Netw
Comput Appl. 2011;34(4):1138-1149.
26 of 26 YAHIATENE ET AL.
68. Swan M. Blockchain: Blueprint for a New Economy. Sebastopol, CA: O'Reilly Media; 2015.
69. He B-Z, Chen C-M, Su Y-P, Sun H-M. A defence scheme against identity theft attack based on multiple social networks. Expert Syst Appl.
2014;41(5):2345-2352.
70. Lu H, Li J, Guizani M. A novel ID-based authentication framework with adaptive privacy preservation for VANETs. In: Proceedings of the
2012 Computing, Communications and Applications Conference; 2012; Hong Kong.
How to cite this article: Yahiatene Y, Rachedi A, Riahala MA, Menacer DE, Nait-Abdesselam F. A
blockchain-based framework to secure vehicular social networks. Trans Emerging Tel Tech. 2019;e3650.
https://doi.org/10.1002/ett.3650