Professional Documents
Culture Documents
Liu 2021
Liu 2021
article info a b s t r a c t
Article history: The development of vehicular ad hoc networks (VANETs) is facing great challenges. Due to the open
Received 26 August 2020 environment in VANETs, the false information sent by malicious vehicles not only affects the fairness
Received in revised form 13 December 2020 of information interaction but also seriously threatens the driving safety of normal vehicles. Therefore,
Accepted 4 February 2021
the study of trust evaluation and management in VANETs has become hot topics in recent years. In
Available online 15 February 2021
this paper, we propose a trust management model of VANETs based on blockchain. In this model, a
Keywords: hidden markov model (HMM) based vehicle trust evaluation method that improve the accuracy on
Blockchain the detection of malicious behavior is proposed. Besides, a trust management method based on the
VANETs alliance chain is designed, which greatly improves the efficiency of trust updating and querying on
Trust management the premise of security. Simulation results show that the model is promising and feasible, effective in
Behavior analysis the aspects of trust evaluation and trust management.
© 2021 Elsevier Inc. All rights reserved.
1. Introduction VANETs. Besides, RSUs are semi-credible, since they are usually
distributed around the roadside, the lack of reliable security mea-
With the development of IoT and the progress of wireless sures makes it easy for attackers to hijack them. Therefore, the
communication technology, vehicles establish diverse types of way how to effectively evaluate and manage the trust between
VANETs by DSRC [2]. It provides three kinds of services for ve- vehicle and RSU is an essential problem that should be resolved.
hicles: driving safety, traffic efficiency, and information enter- Generally, by collecting and analyzing the historical behavior
tainment [18], in which significantly improves the driving ex- of messages sent by vehicles, the change of trust in vehicles is
perience of users and becomes an essential part of the smart evaluated, and its credibility is calculated. Vehicle behavior can
city. Unfortunately, vehicles cannot support mass data storage be divided into two types, positive and negative. The positive
and large-scale data sharing under the limitation of comput- behavior can increase the credibility value, while negative behav-
ing and energy, so therefore, VANETs transfer computing tasks ior can reduce the credibility value. The added value is generally
to Roadside Units (RSUs) to alleviate the workload and storage less than the reduced value to punish the negative behavior. In
through edge technologies. The RSUs are a number of servers most cases, trust is maintained by a trusted third-party inter-
with strong computing and processing capabilities in roadside, mediary, but there is a single point of failure in this way, as
which can take the computing tasks for vehicles and assist them well as low scalability and throughput with it. In order to solve
transfer information efficiently. RSUs play essential role in dealing
the problems of centralized service, some researches use RSU to
with massive vehicle data, as it provides application services for
manage trust. However, RSUs are usually located in unreliable
vehicles, shares the calculation work of vehicles, and supports the
environments, they are easy to be hijacked. It will cause troubles
efficient and reliable communication among vehicles [22].
such as inconsistent information and untrustworthy services in
Vehicles in VANETs compete with each other for lanes, pas-
trust management services. Moreover, RSUs cannot effectively
sengers, traffic light resources, and other facilities or resources.
evaluate each other’s trust, resulting in huge cost of data sharing.
Nevertheless, there may have some dishonest vehicles in the net-
Blockchain is a public distributed ledger proposed in 2008
work that seek personal benefits by tracking information about
[16]. It ensures data privacy through asymmetric encryption, and
other vehicles and broadcasting them fake information, and any
third party may initiate dishonest action due to the openness of uses consistency algorithms such as PoW to maintain data con-
sistency. The remarkable features of the blockchain make it ideal
to build a trust model in VANETs [1]. With the deployment of the
✩ This document is supported by NSFC under Grant 61672338 and Grant
blockchain to the RSU, the behavior of vehicle broadcasting and
61873160.
∗ Corresponding author. the activity record of RSU are recorded in the non-repudiation
E-mail addresses: liuhanshmtu@163.com (H. Liu), dzhan@shmtu.edu.cn ledger of the blockchain. That is, each entity in the network
(D. Han). can verify and audit the transaction in the ledger. Even if the
https://doi.org/10.1016/j.jpdc.2021.02.011
0743-7315/© 2021 Elsevier Inc. All rights reserved.
H. Liu, D. Han and D. Li Journal of Parallel and Distributed Computing 151 (2021) 61–69
RSU is invaded and its data is tampered with, the integrity and an efficient and scalable blockchain assisted privacy protection
correctness of entire dataset will not be affected. authentication system (BPAS) based on the Hyperledger Fabric
Based on the above considerations, it is proposed in this paper platform that provides automatic authentication in VANETs, pro-
a design of a trust management model for VANETs based on tect the vehicle privacy, and allow the conditional tracking and
alliance blockchain. The main contributions are as follows: effective revocation for misbehaving vehicles. Z. Lu et al. [13,
14] proposed a blockchain-based anonymous reputation system
(1) We analyze the issues associated to the problem stated,
(BARS) to establish the privacy protection model of VANETs.
and put forward the system model, attack model, and
It used the public key as a pseudonym in communication and
assumptions of the VANETs, as also theoretical supports,
used a reputation evaluation algorithm based on direct historical
(2) We propose a vehicle trust evaluation algorithm based on
interaction and indirect evaluation of vehicles to prevent the
the HMM model applied to the vehicle trust evaluation on
spread of forged information. Besides, it used Merkle Patricia Tree
the RSU network. Such an algorithm has higher accuracy
(MPT) to extend the blockchain structure, encrypted and stored
than previous design and has better application value in the
the corresponding relationship between the certificate and the
current environment of extreme computing performance,
real identity in the tree, which can only be decrypted in cases of
(3) We propose a trust management method based on Hyper-
dispute, thus conditional privacy is achieved. In [6,21], the impact
ledger Fabric and then applies smart contract to trust value
of the node mobility on the consensus algorithm is evaluated, and
query and updates, which improves the overall efficiency of
a consensus algorithm suitable for VANETs is proposed to solve
the trust management and ensures better security.
the speed and efficiency problem for the PoW or PoS consensus
The remaining of this paper is organized as follows. In Sec- algorithm on the public chain.
tion 2, related works are presented, while the problem definition The application of blockchain in the mutual authentication
and model design are depicted in Section 3. The HMM-based mechanism between vehicle and RSU are presented in [5,17,23],
vehicle trust evaluation method and alliance chain based trust maintaining the anonymity of vehicles and preventing RSU from
management method are presented in Section 4, the comparison being tampered with. Some of recent researches were inspired
and analysis of the experimental results are shown in Section 5, by the incentive mechanism in Bitcoin and attempted to issue
and finally, concluding remarks and future directions of this paper ’energy currency’ and ’information currency’ in VANETs to boost
in Section 6. information exchange and energy sharing between vehicles as
well as between vehicles and RSUs [12,19].
2. Related work The above research provides an effective solution and refer-
ence for trust management in VANETs. However, there are still
Existing authentication schemes based on the public key in- some deficiencies or defects in these studies. Firstly, most of
frastructure (PKI) system can provide a relatively safe guarantee these studies use probability and statistics as trust evaluation
for the VANETs, although it can still be further improved in methods, which need to be improved in efficiency and accu-
terms of efficiency, balance of safety, and performance. Partic- racy. Secondly, most of these systems use public chain as the
ularly, the traditional centralized service mode has two short- technology selection of blockchain. However, as we all know,
comings, which are single-point failure and flow bottleneck. On the public chain has great defects in consensus efficiency and
the other hand, there is one contradiction between the anony- throughput performance. In the Internet of vehicles, the com-
mous communication of vehicles and the supervision of malicious munication between vehicles is more and more frequent, and
nodes. the amount of data is huge, which requires high timeliness of
In the field of VANETs, trust management, limited vehicle transmission. The traditional public chain is generally based on
privacy, and malicious node detection are hot research topics. The the consensus algorithm such as PoW and PoS, which sacrifice
continuous development of blockchain technology brings new performance in order to ensure making consensus. In addition,
ideas to distributed data storage and management, as it is an most of the trust evaluation models proposed in the above works
effective method to solve the aforementioned problems. are based on simple statistical models, in which the predicted
A. Patel et al. [15] proposed a data transmission scheme called results are often quite different from the actual results. In the real
Vehicle Chain that combines blockchain with elliptic curve cryp- environment, due to the malicious behavior of vehicles, the basic
tography (ECC) to improve the security level of VANETs without assumptions of these models cannot be established. Therefore,
increasing the computing cost. With the distributed characteris- there are still great challenges in the application of public chain in
tics of blockchain, it replaced the trust agent (TA) of VANETs with the trust management of VANETs. In this paper, we build a HMM-
the cluster of authorization servers (AS), to overcome the limita- based model according to the historical behavior of vehicles,
tions of single point fault for TA. According to J. Kang et al. [4], which can detect abnormal behavior and realize the evaluation of
the RSU cannot be fully trusted as a vehicle edge computing trust. Besides, a trust management system based on the alliance
server, and the attack or hijacking of a RSU will cause serious chain is proposed, which has great advantages in throughput and
security and privacy challenges to the platform. Thus, this paper efficiency than the traditional public chain.
applies alliance blockchain and smart contract technologies to
data storage and sharing in vehicle Edge networks to improve 3. Definition and model design
security. It also proposed a threeweight subjective logic model to
precisely manage the trust degree of vehicles, and demonstrate In this section, it is defined and analyzed the trust-related
its high efficiency in vector data sharing through experiments. problems of VANETs, and then design and build models overcom-
W. Liang et al. [7–10] proposed a DRL-based virtual IP detection ing the issues encountered.
algorithm and a deep reinforcement learning based algorithms
to ensure the security and circuit copyright of IoT hardware. Z. 3.1. System model
Yang et al. [22] proposed a distributed vehicle network trust man-
agement system based on the blockchain technology in which The system model proposed and designed is composed of
vehicles used the Bayesian reasoning model to verify the infor- three layers: Vehicular Network Layer, Edge-Blockchain Layer,
mation received from adjacent vehicles and generating ratings and CA Layer, as shown in Fig. 1. Each of these layers will be
next, then uploading it to the RSU. Q. Feng et al. [3] proposed discussed separately below.
62
H. Liu, D. Han and D. Li Journal of Parallel and Distributed Computing 151 (2021) 61–69
EB = {RSU1 , RSU2 , . . . , RSU3 } (3) (b) Data consistency attack: Attackers tamper with and delete
the local data of RSUs, which leads to data inconsistency between
different RSUs.
endorse endorse endorse
RSU1 ↔ RSU2 ↔ ... ↔ RSUn (4)
DataRSU1 {...} ̸ = DataRSU2 {...} (9)
CA Layer: As a trusted organization, Certificate Authority (CA)
is mainly used to issue certificates and private keys for RSU, 3.3. Assumptions
store public keys and provide authentication services for other
entities. CA is strictly protected, ensuring reliable serviceability. In order to realize the system model proposed above, this
CA only provides authorization service for RSUs when they join paper puts forward the following 4 assumptions according to the
the network, so even if it has a single point of failure, it will not actual situation and general experience.
cause serious impact on the system. In addition, CA receives strict
protection and monitoring, once it fails, which can be recovered Assumption 1. Because the attacker’s ability is not enough to
in a short time. In the actual distributed system, CA can be backed control the whole RSU cluster (less than 50%), the possibility of
up by multiple computers. a large-scale intrusion of RSU is very low. In addition, due to the
Sign PK &Certs regular security inspection of network operators, hijacked RSUs
Vehicle ⇀
↽ CA → RSU (5) can be found and recovered in time. Based on these facts, it is
63
H. Liu, D. Han and D. Li Journal of Parallel and Distributed Computing 151 (2021) 61–69
4. Proposed algorithms
Table 1
Description of Trust-HMM.
Symbol Description
I Behavior history of vehicles sending message.
Q Authenticity of message.
The hidden value, ∈ [−k, +k].
V Event category:
Accident, Communication, Multimedia.
The value of observations, ∈ {1, 2, 3}.
O Message history, the observation set.
Stands for the behavior of vehicles.
A State of behavior transition probabilities, need
training.
B Observation probability matrix, need training.
≈ Initial state distribution, need training.
q ← HMM(MSGnew ) (12)
Step 4: RSU uses the hidden value to update the trust value,
then write it to blockchain system. This step needs to interact
with the blockchain. Once trust value of the vehicle is written
into the database, all the update operations will be written into
the ledger and cannot be tampered with. Fig. 4. Steps of HMM-based vehicle trust evaluation method.
The trust threshold coefficient is k, 0 < k < 1: cannot be affected. Other RSUs can also verify the authentic-
ity of the message through the hash traceability feature of the
1, VT ≥ k · 100
{
isTrust = (14) blockchain. The system can generate multiple pseudonyms for the
0, VT < k · 100 vehicle and store their corresponding relationship with the real ID
into the blockchain to protect the privacy of the vehicle.
When the RSU finds that isTrust = 0 (standards for untrustwor-
In this paper, all RSUs are regarded as peer nodes to build a
thy), the vehicle will be warned or punished.
blockchain network to jointly maintain blockchain data. RSUs of
different operators can be divided into different channels (chan-
4.2. Hyperledger based trust storage nel is a special concept in hyperledger, in the alliance chain,
each channel maintains an independent ledger, and channels are
Hyperledger Fabric is an open source project supported by isolated from each other).
Linux foundation, which aims to provide a modular platform for
blockchain solutions. It has the following advantages. Channeln ← {RSU1 , RSU2 , . . . , RSUm} (15)
(1) Alliance chain, with complete authority control, members There are three types of data to be stored in the blockchain
can only join the network by authentication, with good data system. The first is the relationship between vehicle’s real ID and
sharing and privacy protection. pseudonym.
(2) Modular design, consensus mechanism and encryption
algorithm are pluggable. Data1 = ({pse1 , pse2 , . . . , psek }, ID) (16)
(3) Container technology, each node and chain code runs in The second is the history messages of vehicle.
the docker, as a result, the environment between containers is
isolated, that ensures the security of the smart contract to the Data2 = (ID, {VH1 , VH2 , . . . , VHn }) (17)
greatest extent. The third is the vehicle’s trust value.
In short, it overcomes the shortcomings of public chain, such
as low throughput, low consensus efficiency and easy branching. Data3 = (ID, VT ) (18)
RSU can store privacy information, and keep a complete copy Data in Hyperledger Fabric can be modified by using chaincode
of other RSUs by blockchain. When some RSUs halt, other RSUs transactions, it provides the ability to query or update data. As
can provide services as backup immediately. In addition, the RSUs shown in Fig. 5.
in the system endorse each other. Even if there are hijacked RSUs Unlike bitcoin transactions in blocks, data in Hyperledger Fab-
tampering with local data, the data security of the whole network ric is not linked to each other directly by chains, but stored in
65
H. Liu, D. Han and D. Li Journal of Parallel and Distributed Computing 151 (2021) 61–69
Table 2
Hardware and software environment of the experiments.
Type Content
CPU i7 7500u 2.9 GHz
Memory 8G
Hard Disk 256G
OS Mac OS 10.14
docker v19.03
docker-compose v1.24
node v12
golang v1.12
Hyperledger Fabric v1.4.3
68
H. Liu, D. Han and D. Li Journal of Parallel and Distributed Computing 151 (2021) 61–69
Dezhi Han received the Ph.D. degree from the Dun Li received the M.S. degree from the Macau
Huazhong University of Science and Technology. He is University of science and technology, and he is
currently a Professor of computer science and engineer- currently doing the Ph.D. degree in the Shanghai Mar-
ing with Shanghai Maritime University. His research itime University. His main research interests include
interests include Cloud computing, Mobile networking, Smart Finance, big data, machine learning, IoT, and
Wireless communication, and Cloud security. blockchain.
69