Next Article in Journal
High-Dynamic-Range Tone Mapping in Intelligent Automotive Systems
Previous Article in Journal
Metaheuristic for Optimal Dynamic K-Coloring Application on Band Sharing for Automotive Radars
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Blockchain-Assisted Privacy-Preserving and Context-Aware Trust Management Framework for Secure Communications in VANETs

School of Computer Science and Technology, Dalian University of Technology, Dalian 116024, China
*
Author to whom correspondence should be addressed.
Sensors 2023, 23(12), 5766; https://doi.org/10.3390/s23125766
Submission received: 22 May 2023 / Revised: 15 June 2023 / Accepted: 19 June 2023 / Published: 20 June 2023
(This article belongs to the Section Vehicular Sensing)

Abstract

:
Vehicular ad hoc networks (VANETs) are used for improving traffic efficiency and road safety. However, VANETs are vulnerable to various attacks from malicious vehicles. Malicious vehicles can disrupt the normal operation of VANET applications by broadcasting bogus event messages that may cause accidents, threatening people’s lives. Therefore, the receiver node needs to evaluate the authenticity and trustworthiness of the sender vehicles and their messages before acting. Although several solutions for trust management in VANETs have been proposed to address these issues of malicious vehicles, existing trust management schemes have two main issues. Firstly, these schemes have no authentication components and assume the nodes are authenticated before communicating. Consequently, these schemes do not meet VANET security and privacy requirements. Secondly, existing trust management schemes are not designed to operate in various contexts of VANETs that occur frequently due to sudden variations in the network dynamics, making existing solutions impractical for VANETs. In this paper, we present a novel blockchain-assisted privacy-preserving and context-aware trust management framework that combines a blockchain-assisted privacy-preserving authentication scheme and a context-aware trust management scheme for securing communications in VANETs. The authentication scheme is proposed to enable anonymous and mutual authentication of vehicular nodes and their messages and meet VANET efficiency, security, and privacy requirements. The context-aware trust management scheme is proposed to evaluate the trustworthiness of the sender vehicles and their messages, and successfully detect malicious vehicles and their false/bogus messages and eliminate them from the network, thereby ensuring safe, secure, and efficient communications in VANETs. In contrast to existing trust schemes, the proposed framework can operate and adapt to various contexts/scenarios in VANETs while meeting all VANET security and privacy requirements. According to efficiency analysis and simulation results, the proposed framework outperforms the baseline schemes and demonstrates to be secure, effective, and robust for enhancing vehicular communication security.

1. Introduction

Road accidents are one of the main causes of death on the roads and are becoming more frequent. Every year, millions of people worldwide die in traffic accidents [1]. Additionally, these accidents cause traffic congestion [2], loss of property, lost working hours, and high fuel consumption [3]. It has been shown that most accidents can be avoided by warning drivers one half second in advance [4]. Vehicular ad hoc networks (VANETs) have been developed recently to reduce accidents, improve traffic efficiency and road safety, and enhance user comfort [5]. VANETs enable vehicles to communicate with other vehicles via Vehicle-to-Vehicle (V2V) communication, and to communicate with roadside units (RSUs) via Vehicle-to-Infrastructure (V2I) communication, to exchange information and inform drivers about road hazards. In contrast to traditional networks, VANETs are more vulnerable to a variety of attacks from malicious vehicles due to their unique characteristics, which include high mobility, dynamic topology, volatility, and open wireless communication channels. Malicious vehicles/attackers may intercept and alter the content of received messages before forwarding them, obtain sensitive and private information from these messages to track the sender vehicles’ routes, or create traffic illusions by disseminating false/bogus messages and causing the drivers to make incorrect and life-threatening decisions. Consequently, road safety, traffic efficiency, and the performance of the network can be adversely affected by malicious vehicles and their false/bogus messages. Therefore, a key challenge to the actual deployment of VANETs is communication security [6,7,8]. To provide secure communication for message propagation, the network must meet VANET users’ most important requirements, which are privacy, security, and trust [9]. Existing authentication schemes are designed to satisfy most of the security and privacy requirements of VANETs. These schemes are used to authenticate the network nodes and ensure that exchanged messages are sent by registered vehicles and not modified during transmission. However, authenticated vehicles may send false/bogus messages which are authenticated without being detected. Consequently, existing authentication schemes are not able to ensure a trusted communication environment in VANETs by preventing authenticated vehicles (insider attackers) from sending false/bogus messages in the network. Therefore, trust is introduced as essential and an important component for enhancing the security of vehicular communications [9]. Trust management approaches are adopted to evaluate the trustworthiness of the sender vehicles and their messages, and to identify and revoke those insider attackers/malicious vehicles and their bogus messages [10,11]. Although existing trust management schemes are designed to ensure trusted communication in VANETs, they still have two main issues. Firstly, they do not address the other VANETs’ security and privacy requirements, including authentication (source authentication and message authentication), non-repudiation, privacy preservation, unlinkability, traceability and revocation, and resistance to common attacks [12]. To solve this issue, security, privacy, and trust can be met simultaneously by integrating an authentication scheme with a trust management approach. However, combining an authentication scheme with a trust management approach will generate a large amount of computational and communication overhead, which is another major concern in vehicular networks. Consequently, efficiency (in terms of lower computational and communication overhead) is imperative. Thus, any designed trust management scheme should meet the requirements of security, privacy, and trust while maintaining efficiency. Secondly, the current trust management approaches lack adaptability and flexibility because they are not able to detect malicious vehicles and their bogus event messages in various contexts and scenarios efficiently. There are many contexts in VANETs due to their high mobility, the random distribution of vehicles, and the presence of malicious vehicles. Existing trust management approaches are developed to work in a specific scenario (e.g., sparse scenarios [13,14] or dense scenarios [15,16,17]). The trust management approaches that are designed to operate in sparse scenarios/low density (when the network contains fewer vehicles) cannot perform efficiently when the network is dense (a network with a large number of vehicles). Other trust management approaches that are designed to operate in a dense scenario cannot operate efficiently in a sparse scenario. Therefore, a trust management scheme that can operate efficiently in various contexts/scenarios (sparse and dense scenarios) is required. Context-aware new trust management solutions are required to function in many situations (various vehicle densities, various vehicle speeds, and various densities of malicious vehicles). Making systems flexible and dynamic is the focus of the context-awareness approach. Increasing flexibility by making the most use of the available facts is the main aim of incorporating context awareness in trust management schemes [18].
To fill the gap in existing trust management approaches, this paper proposes a blockchain-assisted privacy-preserving and context-aware trust management framework to identify and revoke malicious vehicles and bogus messages in various contexts while simultaneously satisfying the efficiency, security, and privacy requirements of VANETs. The proposed framework adopts the maximum amount of available information to function in many circumstances. Additionally, blockchain technology is adopted, which can also enhance the security and privacy of the network. Blockchain is a decentralized ledger that provides a trusted environment for a secure recording of transactions in a distributed manner [19,20]. Blockchain is considered a suitable and secure data storage in VANETs because of its unique characteristics, such as decentralization, immutability, tamper resistance, privacy, availability, and transparency [19,20,21].
We provide the following contributions:
(1)
First, we propose a blockchain-assisted privacy-preserving and context-aware trust management framework to identify and revoke malicious vehicles and their bogus messages from the vehicular network. The proposed framework consists of two components. The first component is a blockchain-assisted privacy-preserving authentication scheme which serves as the authentication module. The proposed authentication scheme is proposed to enable mutual authentication of vehicles and their messages and meets the security, privacy, and efficiency requirements of VANETs. The other component is a context-aware trust management scheme that consists of several modules and is used to evaluate the trustworthiness of the sender vehicles and their messages and ensure a trusted communication environment under various contexts of VANETs.
(2)
Second, we adopt blockchain technology to achieve efficient and distributed authentication and revocation in VANETs. With this approach, vehicles and RSUs within VANETs can verify the authenticity of vehicles’ pseudo-identities efficiently with Proof-of-Presence (PoP) and Proof-of-Absence (PoA) mechanisms.
(3)
Finally, we conduct a security analysis to illustrate that our proposed framework satisfies the trust, security, and privacy requirements of VANETs. Furthermore, we conduct an efficiency analysis to show that our authentication scheme is efficient compared to the baseline schemes in terms of low computation cost and communication overhead. Furthermore, we conduct several experiments to show that our trust management framework can identify malicious vehicles and their false/bogus messages in various contexts efficiently, compared to the baseline schemes.
The rest of this paper is structured as follows. We discuss the related works in Section 2. In Section 3, we present the proposed framework for trust management in VANETs. We present the security analysis in Section 4. The performance evaluation is discussed in Section 5. We conclude the paper in Section 6.

2. Related Works

Liu et al. [22] proposed a Lightweight Trust Evaluation and Privacy-Preserving (LPPTE) scheme that achieves a balance between privacy preservation and trust evaluation to facilitate the fusion of distributed data in vehicular safety applications. This scheme secures the V2V communication and satisfies authentication, privacy preservation, and efficiency in terms of computation and communication overhead. The scheme can resist false message attacks, replay attacks, and message-tampering attacks. However, this scheme does not realize the non-repudiation, unlinkability, traceability, and revocation of malicious vehicles and is not adaptive to various contexts of VANETs.
Liu et al. [23] proposed a privacy-preserving trust management (PPTM) scheme for the dissemination of emergency messages in space–air–ground integrated vehicular networks. This scheme combines strong conditional privacy preservation with trust management to secure V2V communication while having a low communication overhead. However, no details were provided on how this scheme will behave in the various contexts of VANETs. Additionally, it does not have a revocation mechanism for malicious vehicles.
Guo et al. [24] proposed a context-aware trust management model for evaluating the trustworthiness of received messages in V2V communication. The proposed evaluation strategy adapts to context-specific scenarios through reinforcement learning (RL). The trust calculation function is a data-centric trust method constructed based on the information entropy theory in addition to the proposed RL model for determining the best strategy for the given situation by learning from the historical evaluation result. This scheme resists false message attacks. However, it is not adaptive to various contexts of VANETs and it does not realize the security and privacy requirements of VANETs, including authentication, non-repudiation, privacy preservation, unlinkability, traceability, and revocability. Gao et al. [25] proposed a trust management scheme for VANETs, which integrates direct trust and recommendation trust to identify malicious nodes in V2V communication. Historical interaction records and Bayesian inference are used to calculate the former. In the latter case, neighboring nodes are considered to calculate trust. This scheme resists false-message attacks, message-tampering attacks, message-dropping attacks, and opinion-tampering attacks. The scheme, however, lacks authentication, non-repudiation, privacy preservation, unlinkability, traceability, and revocation.
Bhargava and Verma [26] proposed an uncertainty-based Trust Model (TM) to secure V2V communication. To address uncertainty arising from information scarcity in VANETs, the Dempster–Shafer Theory (DST) is used. DST calculates a vehicle’s new trust value by combining direct and indirect trust values while considering other factors for trust calculation. This scheme can resist false-message attacks, message-dropping attacks, and message-tampering attacks. However, this scheme cannot provide authentication, non-repudiation, privacy preservation, unlinkability, traceability, and revocation.
Liu et al. [27] propose a data-oriented trust evaluation model that incorporates entity-oriented trust values into trust cascading. The proposed model allows emergency messages to be distributed by trust cascading among nearby vehicles when an emergency occurs on the road. To achieve secure V2V communication, the authenticity and trustworthiness of received messages are validated and verified using entity-centric trust values. These trust values are provided in trust certificates included in the messages. This scheme withstands false-message attacks and opinion-tampering attacks and satisfies the requirements of authentication, non-repudiation, traceability, and revocation of malicious vehicles. However, this scheme is not adaptive to various contexts of VANETs and the privacy-preservation and unlinkability requirements are not realized.
Inedjaren et al. [28] proposed a trustworthy routing strategy based on blockchain and fuzzy logic to enhance the identification of malicious nodes in V2V communication. Their method is based on Fuzzy Logic Trusted—Optimized Link State Routing (FT-OLSR) protocol and isolates malicious vehicles using blockchain technology. This scheme resists message-dropping attacks. However, it is not adaptive to various contexts of VANETs and does not meet all the security and privacy requirements of VANETs, including authentication, non-repudiation, privacy preservation, unlinkability, traceability, and revocation.
Ghaleb et al. [29] developed an ensemble hybrid context-aware model to detect malicious vehicles. The model detects malicious vehicles sharing false mobility messages using two-hybrid and multifaceted statistical classifiers. The Hampel and Kalman filters were used to build and update a multidimensional, hybrid context-reference model. This scheme is designed to secure V2V communication by resisting false message attacks and is partially adaptive to the variations in the contexts of VANETs. However, this scheme does not meet the requirements of authentication, non-repudiation, privacy preservation, unlinkability, traceability, and revocability.
Ahmad et al. [30] proposed a novel trust evaluation and management (TEAM) framework that serves as a paradigm for designing, managing, and evaluating trust models in different contexts and with malicious vehicles in V2V communication. The proposed framework validates and evaluates a given trust model’s efficiency in the presence of malicious nodes. This framework can resist message-tampering attacks and message-delaying attacks. The framework is partially adaptive to various contexts of VANETs. This framework does not comply with the requirements for authentication, non-repudiation, privacy preservation, unlinkability, traceability, and revocation.
Ghaleb et al. [31] proposed a fuzzy-logic-based scheme for context-aware misbehavior detection in V2V communication. Fuzzy variables represent the vehicle’s context and behavior. The vehicles’ context and behavior are evaluated through a fuzzy inference system. This scheme is designed to secure V2V communication. It resists malicious vehicle attacks and is partially adaptive to the various contexts of VANETs. The authentication, non-repudiation, privacy preservation, unlinkability, traceability, and revocation requirements are not met by this scheme.
Rehman et al. [32] proposed a framework based on a context-aware cognitive approach to secure V2V communication. Based on the received message, the framework creates a context for an event by cognitively learning the environment. Furthermore, this framework provides a method for detecting malicious nodes based on anomalous outliers. This scheme resists malicious vehicles and is partially adaptive to various contexts of VANETs. However, this scheme does not meet the VANET requirements of authentication, non-repudiation, privacy preservation, unlinkability, traceability, and revocability.
To guarantee the trustworthiness of received messages, Ghajar et al. [33] provide a Bayesian formula for trust management and some blockchain-based data. Vehicles verify the accuracy of the messages they have received and calculate the trust values of the sender vehicles. RSUs receive the computed trust values from vehicles. Each RSU generates a block that includes the trust values via a sharding consensus mechanism. This scheme provides efficient storage for vehicles’ trust values. However, this scheme is not context-aware and does not meet the authentication, non-repudiation, privacy preservation, unlinkability, traceability, and revocability requirements of VANETs.
A Bayesian trust inference model is presented by Chukwuocha et al. [34] that takes into account both the message’s trustworthiness and the vehicles’ trustworthiness. The model computes the beta distribution using real-time event data messages. Additionally, the authors divide the road network into zones to decrease communication overhead and improve scalability. RSUs are included in every zone. The RSUs work together to create a blockchain network. The vehicles transmit to the RSU the computed trust values to store them in the blockchain. This scheme is designed to secure V2V communication by identifying false message attacks. The security and privacy requirements are not all met, and context awareness is not provided.
Hasrouny et al. [35] presented a trust management and revocation approach based on the behavior of groups of participating vehicles. Misbehavior detection mechanisms are used to exclude malicious entities. This scheme satisfies the authentication, non-repudiation, privacy preservation, traceability, and revocability requirements in VANETs. However, unlinkability and context awareness are not provided by this scheme.
Based on the above analysis, the above schemes focus on securing V2V communication alone (without considering V2I communication) and no scheme can achieve security, privacy, trust, and efficiency simultaneously. Additionally, the previous schemes are either designed to operate in a specific scenario or are partially context-aware. Our proposed framework is context-aware and satisfies simultaneously all the aspects of security, privacy, trust, and efficiency (in terms of low computational and communication overhead) for both the V2V and V2I communications.
A comparison of the proposed trust framework and other approaches is provided in Table 1.

3. Proposed Trust Management Framework

3.1. Preliminaries

Authentication is necessary for ensuring the security of a network. Authentication is created at the node level and message level. Authentication at the node level enables the receiver node to verify that the sender node is registered and legitimate and ensures that the received message originates from a legitimate source. Authentication at the message level ensures the received message’s integrity (that the message has not been modified during transmission). Without a security service, malicious attackers can alter the messages sent by network nodes. Additionally, without identity privacy preservation, the identity privacy of the network nodes can be disclosed and malicious entities/attackers may use this information to perform tracking attacks.
Trust is of paramount importance in VANETs. Although authentication ensures that messages are authenticated and originate from authenticated vehicles, authenticated vehicles may behave maliciously and send bogus yet authenticated messages. Trust management approaches are used to detect and eliminate these bogus messages and the malicious vehicles generating them. However, due to the diverse contexts of VANETs (variations in the network vehicles’ density and mobility), an effective trust management approach needs to be context-aware to operate and adapt effectively to these contexts.
Context awareness is the basis of our proposed framework for evaluating trust in VANETs. Context awareness is primarily used to increase the flexibility of the proposed framework by leveraging the maximum available data so that it can operate efficiently in various contexts.

3.2. Adversary Model

A malicious vehicle is considered the adversary. Many malicious vehicles could be present on a network. A malicious vehicle can launch combined attacks by alternating its malicious behavior and executing any of the following attacks:
  • False message attack: False or bogus messages are generated by malicious vehicles to mislead other vehicles or RSUs. These attacks may lead honest drivers to take incorrect actions, such as decelerating, braking, or considering alternate routes. A malicious vehicle may engage in bogus message attacks through collusion (collaborating with other malicious vehicles to carry out the attacks together), non-collusion (carrying out the attack individually), or by on–off patterns (alternating its behavior by sending false messages for some time before switching to sending messages with correct information and vice versa).
  • Opinion-alteration attack: An attacker can propagate false trust opinions about other vehicles to make them appear benign or legitimate so the malicious vehicles remain undetected. This attack attempts to disrupt trust evaluation, making it more difficult to identify malicious attackers [36].

3.3. Details of the Proposed Trust Framework

This section details our trust management framework for VANETs. Figure 1 shows the proposed trust management framework. It is composed of two components: a blockchain-assisted privacy-preserving authentication scheme and a context-aware trust management scheme. The authentication module is composed of the blockchain-assisted privacy-preserving authentication scheme. The other modules are the context-aware trust management scheme, which includes the context establishment module (parameters extraction), the trust computation module on the vehicle, the trust evaluation module on the RSU, and the decision module. The network participants include the trusted authority (TA), RSUs, and vehicles.
TA: The TA is primarily in charge of initializing the parameters for registered vehicles and RSUs. The TA also generates a partial private key and a pseudonym for each vehicle. The TA can trace and revoke malicious vehicles when it receives a warrant from the RSU. Through the pseudonym of the vehicle, the TA can identify the vehicle’s real identity. Furthermore, the TA stores the generated pseudo-identities of registered vehicles in the valid pseudo-identities blockchain and the revoked pseudo-identities of malicious vehicles in the revoked pseudo-identities blockchain. The TA distributes the latest versions of both blockchains to the RSUs.
RSUs: RSUs are situated on both sides of the road. V2I communication mode is used for communications between RSUs and vehicles. RSUs receive beacon messages and traffic event information from the vehicles in their vicinity. Additionally, RSUs verify the authenticity and trustworthiness of the messages received from vehicles. RSUs also store the trust values of vehicles in their databases. The RSU utilizes the two blockchains to verify the legitimacy of the sender vehicle’s pseudo-identity during authentication. The latest blockchains (received from the TA) are also broadcast by RSUs to vehicles in their communication range. Event notifications are also broadcast by RSUs to the vehicles. Secure wired channels are used by RSUs to communicate with the TA. RSUs send lists of malicious vehicles to the TA for their revocation from the vehicular network.
Vehicles: When a road event is detected, vehicles send information about it to neighboring vehicles and RSUs. Vehicles can also inquire about the trust values of other vehicles from the RSUs. Vehicles can communicate with other neighboring vehicles and adjacent RSUs using the V2V and V2I communication modes, respectively. Additionally, vehicles can verify the authenticity and trustworthiness of received messages before acting upon them. The two blockchains are utilized by the receiver/evaluator vehicle to verify the legitimacy of a sender vehicle’s pseudo-identity during authentication. The receiver/evaluator vehicle calculates the trust value of the sender vehicles and stores these trust values in its trust database.
Trust database: A database is also maintained by every vehicle and RSU to keep track of the trust ratings of all the other sender vehicles they interact with. With the help of a database, receiver nodes (vehicles/RSUs) can check for the previous trust values of sender vehicles (previously interacted vehicles) during trust computations. The receiver node includes any previous trust value (from its local database) along with the available trust information to calculate the new trust value of the vehicle. If there is no previous trust value (i.e., newly interacting vehicle), the receiver node considers the initial trust value and creates a new record for the sender vehicle in the database. Therefore, the database will help the receiver node to retrieve, compute, update, and store the trust values of the sender vehicles locally. VANETs have high mobility and a rapidly changing topology, and they exchange time-sensitive and life-critical information. The use of a database has been demonstrated to be efficient, as it allows the receiver node to make trust computations, identify, and eliminate malicious vehicles at the node level, making the network more secure and time-efficient. Furthermore, the receiver nodes store in their local databases only the pseudo-identities and the computed trust values of the sender vehicles they interact with.
Valid Pseudo-Identities Blockchain (VPID-BC): All unrevoked vehicle pseudo-identities produced by TA are stored in the VPID-BC public database. The VPID-BC enables the evaluator/receiver node (vehicle/RSU) to conduct the sender vehicle’s pseudo-identity proof-of-presence (PoP) efficiently with O(logN) time, where N stands for the Merkle tree’s total number of leaves.
Revoked Pseudo-Identities Blockchain (RPID-BC): The TA revokes all pseudo-identities of malicious vehicles based on the revocation lists sent by the RSUs. The revoked pseudo-identities are recorded in the RPID-BC blockchain. The sender vehicle’s pseudo-identity proof-of-absence (PoA) can be performed by the evaluator/receiver node (vehicle/RSU) efficiently with O(logN) time.
In VPID-BC, chronological Merkle trees (CMTs) are used to record the generated pseudo-identities. CMTs and lexicographical Merkle trees (LMTs) are both included in RPID-BC. The root of the LMT is updated to reflect the inclusion of new revoked pseudo-identities whenever they are added. CMTs store pseudo-identity revocation transactions and LMT roots chronologically. The LMT pseudo-identity root and the CMT transaction root are both included in block headers.
Every vehicle and RSU is equipped with the proposed framework, enabling the receiver node (vehicle/RSU) to identify malicious vehicles and the bogus messages they generate and eliminate them from the network in various contexts of VANETs.
When a receiver/evaluator node (vehicle/RSU) receives a critical event alert from a neighboring vehicle, the proposed framework enables the receiver/evaluator node (vehicle/RSU) to anonymously authenticate and evaluate the trustworthiness of the sender vehicle and its message. The proposed framework authenticates the sender vehicle and its message using the authentication module. Next, the proposed trust management framework establishes a context for the event by making use of several parameters and performs a trustworthiness evaluation of the sender vehicle and its message. The proposed framework performs the trust evaluation and calculates the trust value of the sender vehicle by integrating direct trust and indirect trust. Once the trust value of the sender vehicle is computed, the receiver node (vehicle/RSU) will compare it with a pre-defined threshold. If the trust value of the sender vehicle is greater than the pre-defined threshold, the receiver/evaluator node (vehicle/RSU) will accept and act upon the received message from the sender vehicle. Otherwise, the received message will be discarded. Next, the sender’s trust value will be updated and stored in the receiver/evaluator node (vehicle/RSU) local database. Vehicles with a trust value less than the predefined threshold are considered malicious. If these vehicles continue to send false/bogus messages, the receiver/evaluator node puts them (their pseudo-identities) on the revocation list and sends it to the TA to revoke them (their pseudo-identities) and add the revoked pseudo-identities of malicious vehicles to the revocation blockchain. The revoked malicious vehicles will not be able to participate in the vehicular network.

3.3.1. A Blockchain-Assisted Privacy-Preserving Authentication Scheme

The first component of the proposed framework is a blockchain-assisted privacy-preserving authentication scheme which serves as the authentication module. This module is in charge of the early detection of malicious vehicles and bogus event messages in the network. This module performs a privacy-preserving mutual authentication between the sender vehicle and the receiver node (vehicle/RSU). Additionally, it enables the receiver node to check the authenticity and integrity of received messages. The message received at the evaluator node (Vehicle/RSU) is only valid once its authenticity and integrity have been confirmed.
The authentication module contains the following steps: Setup, Generation of Pseudonym, Generation of Vehicle Key, Generation of RSU Key, Generation of Signature, Verification of Signature, Generation of Aggregate Signature, and Verification of Aggregate Signature. The notations used in the proposed authentication scheme are listed in Table 2.
  • Setup
    • Firstly, the TA chooses p and q as two secure prime numbers, then selects a , b Z q * , and generates an elliptic curve E based on the equation E : y 2 = x 3 + a x + b   m o d   p , where 4 a 3 + 27 b 2 (mod p) ≠ 0 and point P consists of all the points on E , to generate the cyclic group G.
    • The AT randomly selects s Z q * as its secret master key and sets the public key as T A p u b = s · P . The secret master key is kept securely in its repository.
    • The TA randomly selects ρ Z q * and computes R = ρ · P .
    • The TA chooses cryptographic hash functions: h 1 : 0,1 * Z q * , h 2 : 0,1 * × G Z q * , h 3 : 0,1 * × G × G Z q * , a n d   h 4 : 0,1 * × G × G × G Z q * .
    • Finally, the TA publishes: { h 1 , h 2 , h 3 , h 4 , p , q , a , b , P , T A p u b , R } as the system parameters.
  • Generation of Pseudonym
    Through a secure channel, the vehicle provides the TA with its real identity R I D i as received from the manufacturer (MVM).
    The TA randomly chooses r i Z q * and generates a pseudonym as below:
    The TA computes S I D i = R I D i r i · T A p u b .
    • The TA computes V I D i = R I D i h 1 s · S I D i .
    • Then, the TA sends the generated pseudonym P I D i = ( V I D i , T i ) to the vehicle V i .
    • The TA stores { P I D i , S I D i , r i } in its database.
    • The TA can retrieve the vehicle V i ’s real identity by computing R I D i = S I D i r i T A p u b .
  • Generation of Partial Private Key
    • The TA randomly chooses u i Z q * .
    • The TA computes U i = u i · P , ϑ i = h 2 ( P I D i , R ) and generates the vehicles’ partial private key as: p p k i = u i + ϑ i × ρ ( m o d   p ) .
    • Finally, the TA sends { U i , p p k i } to the vehicle V i .
  • Generation of Vehicle Key
    • As soon as the partial private key p p k i is received, the vehicle V i calculates ϑ i = h 2 ( P I D i , R ) and checks whether p p k i · P = U i + ϑ i · R . If this condition is met, the partial private key p p k i is valid.
    • The vehicle randomly chooses two numbers, β i , γ i Z q * , and calculates f i = h 3 ( P I D i ) , v s k i = β i · f i , K i = γ i · P , Q i = v s k i · P .
    • The vehicle sets its full private key as S K i = ( p p k i , v s k i ) , and its public key as P K i = Q i + U i .
  • Generation of RSU Key
    The TA generates the R S U i ’s public key P U i and private key P R i by randomly selecting a i Z q * , and assigning the private key as P R i = a i , then calculates the public key as P U i = a i · P .
  • Generation of Signature
    To ensure message integrity, the vehicle needs to generate its signature on the message before sending it to another vehicle or RSU. To do so, it executes the following steps:
    • The vehicle V i randomly chooses a number l i Z q * and calculates L i = l i · K i .
    • V i computes n i = h 4 ( P I D i , P K i , L i , M i , t i ) , where t i is the timestamp, and calculates D i = l i · γ i + n i v s k i + p p k i ( m o d   q ) .
    • Then, the vehicle sets the signature σ i = ( L i , D i ) on message M i . Finally, the vehicle V i sends { P I D i , P K i , M i , σ i , t i } to the receiver/evaluator node for verification.
  • Verification of Signature
    When a message tuple { P I D i , P K i , M i , σ i , t i } is received, the receiver/evaluator node (vehicle/RSU) checks the signature on the message M i which has been signed by the sender’s vehicle V i . The receiver/evaluator node will execute the following steps:
    • The receiver/evaluator node (vehicle/RSU) checks whether the timestamps T i and t i in the pseudonym P I D i and in the received message { P I D i , P K i , M i , σ i , t i } , respectively, are within acceptable time ranges before validating the message M i . If one of them is invalid, the receiver/evaluator node aborts; otherwise, proceed to the next step.
    • The receiver/evaluator node checks the received P I D i against VPID-BC and RPID-BC to be sure of its presence in VPID-BC and absence in RPID-BC. In other words, P I D i has been allocated to the vehicle V i and has not been revoked by TA. The PoP and PoA of the P I D i in VPID-BC and RPID-BC are performed efficiently with O(logN) time.
    • If the P I D i is not revoked, the receiver/evaluator node can carry on with the verification.
    • The receiver/evaluator node checks the validity and accuracy of the message M i generated by vehicle V i by executing the following steps:
    • The receiver/evaluator node calculates n i = h 4 ( P I D i , P K i , L i , M i , t i ) and ϑ i = h 2 ( P I D i , R ) .
    • The receiver/evaluator node checks whether D i · P = L i + n i · ( P K i + ϑ i · R ) . If the equation holds, the message will be accepted. Otherwise, reject.
    Proof of Correctness:
    D i · P = l i · γ i + n i v s k i + p p k i · P = l i · γ i + n i v s k i + u i + ϑ i × ρ · P = l i · γ i · P + n i v s k i + u i + ϑ i × ρ · P = l i · K i + n i · v s k i · P + u i · P + ϑ i · ρ · P = L i + n i · Q i + U i + ϑ i · R = L i + n i · P K i + ϑ i · R
  • Generation of Aggregate Signature
    When a large number of messages { P I D i , P K i , M i , σ i , t i } are received from different vehicles V i ( i = 1,2 , , n ) , the RSU computes L = i = 1 n L i and D = i = 1 n D i and outputs the aggregate signature σ = ( L , D ) . Multiple signatures are consolidated into one short signature σ by the RSU. In this way, the computation cost and communication overhead can be reduced.
  • Verification of Aggregate Signature
The RSU performs the following calculation to verify the validity of the aggregate σ signature.
D · P = L + i = 1 n n i · ( P K i + ϑ i · R )
If the equation mentioned above holds, the RSU will accept σ ; otherwise, it is rejected.
Proof of Correctness:
D · P = i = 1 n D i P = i = 1 n l i · γ i + n i v s k i + p p k i · P = i = 1 n l i · γ i + n i v s k i + u i + ϑ i × ρ · P = i = 1 n l i · γ i · P + n i v s k i + u i + ϑ i × ρ · P = i = 1 n l i · K i + n i · v s k i · P + u i · P + ϑ i · ρ · P = i = 1 n L i + n i · Q i + U i + ϑ i · R = i = 1 n L i + n i · P K i + ϑ i · R = L + i = 1 n n i · P K i + ϑ i · R

Communication Scenario

Vehicles periodically send beacon messages to share information about their mobility status with their one-hop neighboring vehicles and the nearest RSU. A vehicle’s mobility status includes its speed, location, and direction, which helps keep vehicles aware of their surroundings to improve traffic safety and efficiency. The vehicles also generate and broadcast another type of message (an event message) when they encounter an event on the road (e.g., traffic accident, traffic jam, etc.) to inform the other vehicles about it. Figure 2 shows that vehicles VA, VB, VC, and VD periodically share beacon messages (containing their driving status: position, speed, and direction) with each other and with the nearest roadside unit RSUE. Every vehicle (VA, VB, VC, and VD) and RSUE authenticates and evaluates the trustworthiness of the sender vehicles based on the received beacon messages (beacon-based trust).
In this scenario, vehicles VA, VB, VC, and VD are moving on the road within the same communication range. A malicious vehicle VA suddenly broadcasts a false safety event message claiming that there is traffic congestion ahead on the road. The neighboring vehicles, VB, VC, VD, and the nearest RSUE, receive this alert (event message). Vehicles VB, VC, VD, and RSUE verify the authenticity and trustworthiness of the alert before acting upon it. However, the alert generated by vehicle VA is false/bogus. The receivers VB, VC, VD, and the nearest RSUE evaluate the trustworthiness of the sender vehicle VA and its event message and find that the event message is a false/bogus message, classify the sender vehicle VA as a malicious vehicle, and discard the received event message. Figure 2 and Figure 3 illustrate the communications between the RSU and vehicles. In Figure 3, vehicles VC and VD also perform the same steps as vehicle VB for trust calculation. A representation of data in beacon messages M 1 ( b e a c o n ) sent by vehicles is shown in Table 3. Table 4 illustrates the contents of the event message M 1 ( e v e n t ) sent by vehicle VA to VB, VC, VD, and RSUE.

3.3.2. A Context-Aware Trust Management Scheme

The second component of the proposed framework is a context-aware trust management scheme. This scheme is composed of several modules: Context Establishment/Parameters Extraction Module, Trust Computation Module on Vehicle, Trust Calculation Module on the RSU, and Decision Module.

Context Establishment/Parameter Extraction Module

This module performs parameter extraction, which follows the authentication process as shown in Figure 1. To obtain parameters, the proposed framework on the receiver node (vehicle/RSU) obtains information about the sender vehicle status from the authenticated beacon messages (parameters from authenticated beacon messages). Additionally, information about an event is filtered out from the authenticated event messages that were received (parameters from the authenticated event messages). Furthermore, information obtained from nearby RSUs and neighboring vehicles is also considered.

Trust Computation Module on Vehicle

After obtaining the necessary information from the previous module, the trust computation module enables the receiver/evaluator vehicle to evaluate the trustworthiness of the sender vehicle and its messages. The trust computation module consists of entity-centric, data-centric, and hybrid trust sub-modules. The output of the entity-centric and data-centric sub-modules makes the input of the hybrid trust the sub-module. The hybrid trust sub-module is based on direct trust and indirect trust computations. The direct trust computation is performed using data-centric parameters (event-based trust) and some entity-centric parameters (role-based trust, beacon-based trust, previous trust value). The indirect trust computation is performed using the remaining entity-centric parameters (recommendations by RSU and opinions of neighboring vehicles). The output of the hybrid trust sub-module is considered the output of the trust computation module on the vehicle. The output of this module is the final trust value of the sender vehicle.
The entity-centric, data-centric, and hybrid trust sub-modules are described below.
A. 
Entity-Centric Trust
This sub-module computes the trust value of the sender vehicle by integrating various trust computation techniques: (1) role-based trust (RBT), (2) beacon-based trust, (3) opinions of neighboring vehicles, (4) recommendations from RSUs, and (5) the sender vehicle’s previous trust value (PTV).
Role-based Trust (RBT): In RBT, trust is incorporated from vehicles that are highly trusted in the network and are approved by higher authorities. These vehicles transmit messages that are most trusted. The RBT is considered an additional factor when computing the trust of the sender vehicle. There are three different kinds of vehicles ( V R o l e ) in our framework:
(1)
Authority vehicles (AV) (such as traffic patrols)—These vehicles are approved by a centralized authority or specific department, and the messages they transmit are highly trusted.
(2)
Public services (PS) vehicles (such as buses, road upkeep vehicles, engineering vehicles, sanitation trucks, etc.)—As they have been authorized by specific departments, they are highly trusted.
(3)
Ordinary vehicles (OV) (such as private cars, taxis, freight vehicles, etc.)—Individuals primarily control these vehicles.
To ensure realistic behavior, we consider that AV vehicles are mostly trusted vehicles in the network. Additionally, PS disseminates trusted information because it has been approved by a specific department. For OV vehicles, vehicle authorization occurs at the vehicle level. Consequently, RBT can be modeled using the equation below.
R B T ( V i ) = 1 0.8 0.3 i f   V R o l e = A V i f   V R o l e = P S i f   V R o l e = O V
The V R o l e attribute of the vehicle is included in the event message.
The VANET is a large-scale network, so we expect that a majority of vehicles will be ordinary and only a minority will be AV or PS. The equation demonstrates that messages sent by the first two types of vehicles can be highly trusted.
Beacon-based Trust: The trust calculated based on the cosine similarity between beacon messages received from the sender vehicle.
Sending beacon messages: Single-hop beacon messages about the vehicle’s driving status (position, velocity, and direction) are broadcast periodically by vehicles’ OBUs to their neighboring vehicles on the road to keep them aware of their surroundings and to improve traffic safety and efficiency.
The structure of the beacon message, M i ( b e a c o n ) , is as follows:
M i = < x i , y i , v i , d i >
A vehicle broadcasts this message to all its neighboring vehicles, notifying them of its location x i , y i , velocity ( v i ), and direction ( d i ). The location x i , y i also refers to the latitude and longitude of the source (sender) of the beacon message and is represented by Lat and Long or L a t , L o n g . The beacon message M i is signed by each vehicle’s private key S K i to generate the signature σ i .
Afterward, the vehicle broadcasts the message tuple { P I D i , P K i , M i , σ i , t i } .
Receiving beacon messages: When the receiver/evaluator node E V (vehicle/RSU) receives the beacon messages from the sender vehicle, it checks if the timestamp t i of the beacon message is fresh or not. The time of generating the beacon message is referred to as the timestamp t s which corresponds to the reporting time.
The evaluator node E V evaluates the sender vehicles’ trustworthiness based on the received beacon messages by comparing the claimed values (position, velocity, and direction) received in the most recent beacon (claimed values) to the estimated values (from the previously received beacon messages). The estimated vector and the claimed vector, which comprise a set of data representing vehicle position, velocity, and direction, are compared using cosine similarity to determine the angle between them. Cosine similarity is defined as follows:
C o s _ s i m ( A , B ) = A · B A B
C o s _ s i m ( A , B ) = i = 1 n A i B i i = 1 n A i 2 i = 1 n B i 2
where the estimated vector A i represents the estimate computed from previously received beacons, and B i represents the claimed vector values extracted from the most recent beacon. Both of these vectors are composed of four elements: (x, y, v, and d), where (x, y) denotes the position, v is the vehicle’s velocity, and d is the vehicle’s direction. We utilize Equation (4) to evaluate the trustworthiness of the beacon messages of encountered vehicles. For all beacon messages received in time t:
T b e a c o n b a s e d ( E V , V j ) = i = 1 n C o s _ S i m ( A i , B i ) b
A receiver/evaluator node E V calculates the adjacent vehicle’s V j beacon trustworthiness T b e a c o n b a s e d ( E V , V j ) by using Equation (4), where b indicates the number of beacons to be considered.
Opinion of neighboring vehicles: The evaluator/receiver node E V requests the trust value of the sender vehicle V j from the neighboring vehicles V x . The average trust value that the neighboring vehicles V x have about the vehicle V j is indicated by T o n v and is calculated as follows:
T o n v = x = 1 N V x ( V j ) N
where N represents the number of neighboring vehicles.
Recommendation by RSU: The receiver/evaluator vehicle queries the sender vehicle’s trust value from the adjacent RSU. The RSU retrieves the trust value of this vehicle from its database and sends it to the requester vehicle. This entity-centric parameter is used as input to the hybrid-trust sub-module.
The sender vehicle’s previous trust value (PTV): If the receiver/evaluator vehicle has past interactions with the sender vehicle, then there will be a previous trust value for the sender vehicle in its database. The receiver/evaluator vehicle retrieves the previous trust value of the sender vehicle from its local database and includes it in the trust computation. This entity-centric parameter is also used as input to the hybrid-trust sub-module.
B. 
Data-Centric Trust/Event-Based Trust
Event-Based Trust is calculated to check the trustworthiness of event messages received from the sender vehicles. The Euclidean distance between received event messages is used to calculate the data-centric trust/Event-Based Trust. The sender vehicle V 1 broadcasts an event message { P I D i , P K i , M i , σ i , t i } in the time t i to report an event E 1 in location P 1 . The event message will be received by other vehicles (such as V 2 , V 3 , and V 4 ) in the communication range of V 1 . Several vehicles may also have sensed the event and broadcast it to the other vehicles. To simplify the description, some objects are formally defined as follows. M = { M 1 , M 2 , …, M i } is the collection of received event messages. V = { V 1 , V 2 , …, V i } is the set of vehicles sending the event messages about the same event.
The event message M i (event) received by the evaluator node E V from another vehicle is represented as follows:
M i e v e n t = < V R o l e , E T y p e , ( E x , E y ) , ( L x , L y ) >
A vehicle with the P I D i sends an event message M i e v e n t . V R o l e indicates the vehicle’s role, E T y p e represents the event type where E T y p e {Traffic accident, Traffic jam, Ice on the road, Road construction}, ( E x , E y ) is the location of the event, ( L x , L y ) is the sender vehicle’s location when generating the event message, and t i is the reporting time. When vehicles detect an event, the type of event, the event location, and the vehicles’ locations are typically similar. The evaluator/receiver node E V calculates the received messages’ trust value by computing the Euclidean distance between them. The Euclidean distance is used to compute the similarity between data included in the event messages E T y p e , E x , E y , ( L x , L y ) . The similarity between two messages decreases as their distance increases. The similarity between two messages received from two vehicles based on Euclidean distance is calculated using Equation (6):
E C D = i = 1 n ( X i Y i ) 2 n
In Equation (6), X and Y are vectors. X i (or Y i ) represents the value of the i-dimension in the vector, and n is the number of dimensions in the vector.
If there are m event messages received from m neighboring vehicles, the average Euclidean distance ( A D ) between them is computed by Equation (7):
A D = E C D ( b e t w e e n   a l l   t h e   m e s s a g e s ) m
The trust value based on the Euclidean distance between the received event messages is calculated by the evaluator/receiver node E V using Equation (8):
T E v e n t b a s e d E V , V j = 1 1 + A D
where V j is the sender vehicle.
C. 
Hybrid Trust/Combined Trust
The input of the hybrid trust sub-module is the output of the entity-centric and data-centric trust sub-modules. Therefore, based on entity-centric and data-centric trust parameters, direct and indirect trust are computed. Next, the direct and indirect trust computations are combined to calculate the hybrid trust.
The direct trust D T is calculated as follows:
D T = T b e a c o n b a s e d ( E V , V j ) + T E v e n t b a s e d E V , V j + R B T ( V j ) + P T V ( V j ) 4
The indirect trust I D T is calculated as follows:
I D T = R e c ( R S U , V j ) + T o n v 2
where R e c ( R S U , V j ) indicates the trust value that the nearby R S U has about the vehicle V j in its database.
The hybrid trust H T ( E V , V j ) which indicates the final trust value of the sender vehicle V j as computed by the receiver/evaluator vehicle E V is calculated as follows:
H T ( E V , V j ) = α · D T ( E V , V j ) + ( 1 α ) · I D T ( E V , V j )
where 0 < α < 1 .

Trust Calculation Module on the RSU

The receiver/evaluator ( E V ) RSU computes the sender vehicle’s final trust value using the following equation:
H T E V , V j = T b e a c o n b a s e d E V , V j + T E v e n t b a s e d E V , V j + R B T ( V j ) + P T V ( V j ) 4
where V j is the sender vehicle. H T E V , V j is the final trust value of the sender vehicle V j , T b e a c o n b a s e d E V , V j is calculated by the receiver/evaluator RSU ( E V ) based on the beacon messages received from V j using Equations (3) and (4), and T E v e n t b a s e d E V , V j is determined based on the Euclidean distance between the received event messages from the sender vehicles using Equations (6)–(8). R B T V j is calculated based on Equation (1). P T V ( V j ) is the previous trust value of the sender vehicle V j retrieved from the RSU database.

Decision Module

The input of the decision module is the output of the trust computation module on the vehicle/RSU, which is the final trust value of the sender vehicle. The decision module enables the receiver/evaluator node E V (vehicle/RSU) to classify the sender vehicle as a trusted vehicle or malicious vehicle. A vehicle’s trust value is estimated between 0 and 1, with maximum trust being represented by 1, trusted represented as more than or equal to the trust threshold T t h r , and untrusted represented as 0 or less than the trust threshold T t h r .
D e c i s i o n = T r u s t e d   V e h i c l e M a l i c i o u s   V e h i c l e i f   H T ( E V , V j ) T t h r i f   H T ( E V , V j ) < T t h r
  • When the trust value H T ( E V , V j ) exceeds or equals a predefined threshold ( T t h r ) , the sender vehicle is regarded as a “Trusted Vehicle”. The receiver/evaluator node will act upon the received message and broadcast the received trusted messages to other vehicles.
  • The sender vehicle will be regarded as a “Malicious Vehicle“ and the received message will be discarded if the trust value H T ( E V , V j ) is below the threshold ( T t h r ).
  • The new trust value of the sender vehicle is stored in the trust database by the evaluator node.
  • Malicious vehicles that continue to send false messages will be placed on the revocation list and sent to the TA.
  • The TA revokes the pseudonyms of these vehicles and adds the revoked pseudonyms to the RPID-BC.

4. Security Analysis

(1)
Source authentication: The VPID-BC and RPID-BC blockchains are adopted by the receiver/evaluator node (vehicle/RSU) to authenticate the sender vehicle by performing the PoP and PoA of the sender’s pseudo-identity P I D i .
(2)
Message authentication: Our authentication scheme requires that each message a vehicle generates be signed before being sent to another vehicle or RSU. The receiver/evaluator node checks the signature in the received message to make sure that the received message has not been altered by attackers or malicious vehicles during transmission.
(3)
Anonymity: The pseudonym P I D i created by the TA is used by the vehicle to communicate with other vehicles/RSUs. When communicating, the pseudonym P I D i keeps the real identity of the vehicle completely anonymous.
(4)
Unlinkability: In our scheme, the sender vehicle V i transmits { P I D i , P K i , M i , σ i , t i } to the neighboring vehicle/RSU. Messages from the same vehicle cannot be linked by attackers since the signature contains a random value. Unlinkability is therefore satisfied by the proposed scheme.
(5)
Traceability and Revocability: When certain malicious vehicles are reported to the TA by RSUs, the TA can identify their real identity. Only the TA can determine the vehicle’s real identity from its pseudonym. The TA retrieves the vehicle’s real identity R I D i = S I D i r i T A p u b by obtaining { P I D i , S I D i , r i } from its database. The TA revokes the pseudonym P I D i of the malicious vehicle and adds the revoked pseudonym P I D i to the RPID-BC blockchain.
(6)
Nonrepudiation: Due to the TA’s ability to link the pseudonym of a message to its real identity, no vehicle can deny signing a message.
(7)
Anti-false message and combined attacks: The proposed framework takes advantage of V2V and V2I communication to detect false/bogus messages or thwart combined attacks. The proposed framework combines information from multiple sources, including beacon and event messages received from neighboring vehicles. This is utilized in order to compute the trustworthiness of the sender vehicle and to accurately detect false/bogus messages received from the sender vehicles due to malicious behavior. Thus, the proposed trust framework enables the receiver nodes to identify malicious vehicles and their false/bogus messages and eliminate them from the network.
(8)
Resistance against attacks: Due to the signature, time-stamps, and random values of l i , our scheme is resistant to message-tampering attacks, replay attacks, and man-in-the-middle attacks.

5. Performance Evaluation

5.1. Efficiency Analysis

This section analyses our scheme’s efficiency (i.e., computation cost and communication overhead) and compares it to state-of-the-art schemes.
For schemes based on bilinear pairings, such as [37,38,39,40,41,42,43], we adopt the bilinear pairing e : G 1 × G 1 G 2 , where G 1 and G 2 are the additive cyclic group and multiplicative group, respectively, using the elliptic curve E : y 2 = x 3 + x m o d p , where p is a 512-bit prime number. A point P on curve E generates the additive group G 1 with order q (a prime number of 160 bits). For the analysis of ECC-based schemes, we adopt an elliptic curve E : y 2 = x 3 + a x + b m o d p where a , b Z q * and p , q are 160-bit primes. A point P on the elliptic curve E generates a cyclic additive group G with order q .
In Table 5, we describe different cryptographic operations along with their execution times [44].

5.1.1. Computation Cost

When evaluating the computation cost, we consider the costs of signing a message, verifying individual signatures, and verifying n signatures. In our scheme, signing a message takes T e c c s m + T h = 0.4421 ms, while verifying individual signatures takes 3 T e c c s m + 2 T e c c p a + 2 T h = 1.3298 ms. Thus, the total computation cost incurred to sign and verify an individual signature in our scheme is 1.7719 ms. In verifying n signatures, a receiver in our scheme needs n + 2 T e c c s m + 2 n + 2 T e c c p a + 2 n T h = 0.4458 n + 0.8876 ms.
Comparing the proposed scheme to Kumar et al. [37], the proposed scheme’s percentage improvement in terms of signing a message, verification of an individual signature, and verification of n signatures (where n = 100) is calculated as 11.2564 0.4421 11.2564 × 100 = 96.07 % , 30.7832 1.3298 30.7832 × 100 = 95.68 % , and 9.5545 n + 21.2287 ( 0.4458 n + 0.8876 ) 9.5545 n + 21.2287 × 100 = 95.34 % , r e s p e c t i v e l y . The computation cost of other schemes and percentage improvement is calculated similarly, and presented in Table 6 and Table 7, respectively.
As shown in Table 6, the proposed scheme shows higher efficiency than bilinear-pairing-based schemes [37,38,39,40,41,42,43]. As compared to its related ECC-based scheme [45], the proposed scheme does not show much improvement in the signing of individual signatures. However, the proposed scheme depicts a 25% reduction in verifying costs over the scheme [45]. Additionally, our scheme shows higher efficiency than the related ECC-based schemes [46,47]. Figure 4, Figure 5 and Figure 6 show the signing cost of an individual message, the verification cost of an individual signature, and the verification cost of n signatures, respectively.
Based on the comparative analysis (see Table 6 and Table 7, and Figure 4, Figure 5 and Figure 6), we show that our proposed scheme has the lowest computation cost than other ECC- and bilinear-pairing-based schemes. Consequently, the proposed scheme has been proven to be more efficient than other schemes. Thus, the proposed scheme is more feasible for practical VANET applications.

5.1.2. Communication Overhead

The communication overhead of our scheme is analyzed and compared with that of other schemes [37,38,39,40,41,42,43,44,45,46,47]. According to Ref. [48], the sizes of the elements used for the analysis of communication overhead are listed in Table 8.
We evaluate communication overhead by summing the transmission overhead caused by pseudo-identity P I D i , public key P K i , timestamp t i , and signature σ i . We do not include the message M i based on the assumption that it is a constant factor. In our scheme, a sender broadcasts a message { P I D i , P K i , M i , σ i , t i } where pseudo-identity is P I D i = ( V I D i , T i ) , public key is P K i , signature is σ i = ( L i , D i ) , and t i is the timestamp. P K i , L i G , V I D i ,   D i Z q * , and T i , t i are timestamps. Thus, our scheme incurs 2 G + 2 Z + 2 × 4 = 128 bytes as the total communication overhead. Similarly, the communication overhead of other schemes has been calculated and is presented in Table 9. Table 9 shows that our scheme has the lowest communication overhead compared to other schemes. Therefore, the proposed scheme is more efficient than the baseline schemes, and can thus support the transmission of messages between vehicles and RSUs more securely and effectively.

5.2. Simulation-Based Analysis

5.2.1. Simulation Setup

Our proposed trust framework was evaluated using Veins, a popular open-source framework for simulating vehicular networks [49,50]. Veins integrates SUMO (the road traffic simulator) [51,52] and OMNeT++ (the network simulator) [53]. In an OMNeT++ simulation, node movement corresponds to vehicle movement in the SUMO road traffic simulator.
Figure 7 illustrates a real map extracted from OpenStreetMap [54,55]. Our proposed trust framework operates on legitimate vehicles and RSUs in our simulations, allowing them to verify the authenticity and trustworthiness of the network events. Vehicles may encounter each other over and over. The duration of an event is 20 s.
The initial node placement varies for each run in each simulation scenario since each run uses a different random seed. Each experimental result for each simulation scenario is the average over the 20 runs. The parameters used in the simulation scenarios are listed in Table 10.

5.2.2. Performance Evaluation Metrics

Our proposed trust framework is evaluated using three metrics: Precision, Recall, and F-Measure. The Precision, Recall, and F-Measure are defined as follows:
  • Precision: Precision is the proportion of the relevant nodes that were successfully identified as malicious vehicles over the total number of nodes that were both correctly and incorrectly identified as malicious vehicles.
P r e c i s i o n = T P T P + F P
T P is the number of malicious vehicles correctly identified, and F P is the number of vehicles incorrectly classified as malicious.
  • Recall: Recall is the proportion of the number of vehicles correctly classified as malicious over the total number of malicious vehicles.
R e c a l l = T P T P + F N
F N is the number of malicious vehicles that were incorrectly classified as legitimate vehicles.
  • F-Measure: F-Measure indicates how accurate the trust scheme is at identifying malicious vehicles and their false messages based on the weighted average of precision and recall. As a result, F-Measure provides a measure for the trust model’s accuracy. The higher the F-Measure, the higher the accuracy of the trust model.
F M e a s u r e = 2 × P r e c i s i o n × R e c a l l P r e c i s i o n + R e c a l l
  • End-To-End Delay: We measure the latency in terms of end-to-end delay, i.e., the time it takes a message to arrive at the receiver from its sender. End-to-end delay is calculated as below:
    E n d t o E n d   D e l a y = ( T A r r i v a l T S e n t )
    where T a r r i v a l is the time a message arrived at its receiver and T s e n t refers to the time the message was sent from the sender.

5.2.3. Performance Evaluation under Different Contexts

In this section, we describe the contexts in which trust model efficiency is to be evaluated. We evaluate and compare the performance of the proposed trust framework to those of Gao et al. [25] and DUEL [26] in three contexts/scenarios: vehicle density (different number of legitimate vehicles), different vehicle speeds, and different percentages of malicious vehicles, respectively.
Context 1: Vehicle Density
In general, traffic conditions affect trust scheme accuracy. We evaluate and compare the adaptability of these schemes to various vehicle densities. Low traffic density makes it difficult for the evaluator node to accurately evaluate the target vehicle’s trust due to the lack of sufficient information. Low-density, sparsely connected networks cause communication links to frequently disconnect. Therefore, there are no frequent interactions between vehicles. Vehicles may not receive enough data in low-density environments to make reliable trust evaluations, which leads to unreliable trust decisions. Under scenarios with low traffic density, the trust scheme only has a limited number of data sources to evaluate and update the sender’s vehicle trust. Under high-density scenarios, communication becomes more effective and data can be disseminated more reliably. The dense vehicle distribution will maintain a high number of interactions between vehicles. More interactions will allow frequent message exchange for data dissemination. Through these interactions, trust models can gain direct interactions, indirect recommendations, and reliable multi-hop data transmission. However, due to data redundancy, communication overhead may occur from extremely high densities.
Context 2: Vehicle Speed
Vehicle Speed (velocity) represents a vehicle’s mobility, and the faster a vehicle moves, the harder it is to gather enough data from other vehicles because highly mobile vehicles have a limited amount of communication time. Due to high vehicle mobility, networks are sparsely connected, disconnections are frequent, and communication links are error-prone. High mobility typically results in frequent disconnections, which lowers data delivery ratios. As mobility decreases, the efficiency of communication increases, data can be disseminated more reliably, and vehicles can have more interactions to collect sufficient information for trust evaluation.
Context 3: Percentage of Malicious Vehicles
To evaluate how efficiently the trust model counteracts attacker behavior, we added malicious vehicles into the network. At first, we introduced 10% of the network’s malicious vehicles and these malicious vehicles polluted the network with false messages or launched combined attacks. We gradually increased the proportion of malicious vehicles until it reached 50% to evaluate the effectiveness of the trust model in detecting false/bogus messages and malicious vehicles in the network.

5.2.4. Simulation Results and Discussion

The efficiency of our trust management framework was compared with two baseline trust management schemes, i.e., Gao et al. [25], and DUEL [26].

Influence of Vehicle Density on Trust Schemes

The proposed trust management framework was evaluated by varying the network’s number of legitimate vehicles. The density of the vehicles was increased from 100 to 500 vehicles. Additionally, 10% of vehicles were chosen as malicious vehicles that consistently send bogus/false messages. Figure 8 depicts the precision, recall, and F-Measure of the proposed trust management framework, Gao, and DUEL schemes, when the network has different densities of legitimate vehicles. The proposed trust framework performed better than the two baseline schemes and guaranteed the dissemination of trusted messages throughout the network, and considerably enhanced precision, recall, and F-Measure even when there were fewer legitimate vehicles. The higher precision, recall, and F-Measure indicate the higher efficiency of the proposed framework in detecting malicious vehicles and their bogus messages. The reason for the better performance of our framework is that it adopts multiple sources of information (information from other vehicles, RSUs, and beacon messages) to efficiently evaluate the trustworthiness of the sender vehicles and the messages they generate in low-density traffic scenarios. As the number of legitimate vehicles in the network increases, more trustworthy/legitimate vehicles will become available, which will enable more trusted messages to be distributed throughout the network, thereby increasing the probability for a receiver vehicle to receive trustworthy data from others. Therefore, when more legitimate vehicles are available in the network, the precision, recall, and F-measure increase.
The proposed trust framework outperforms existing baseline trust schemes and efficiently detects malicious vehicles and their false messages when the number of legitimate vehicles is low or high. The proposed framework achieved more than 90% accuracy in terms of F-Measure, while the baseline schemes achieved 81% and 72%, respectively, demonstrating the high efficiency of our framework. As indicated, the higher precision, recall, and F-Measure indicates a higher ability of the trust scheme to identify malicious vehicles and their bogus messages and revoke them from the vehicular network under various densities of legitimate vehicles. The better performance of our trust framework is attributed to the authentication module, which ensures that messages originate from registered vehicles and are not modified during transmission. Moreover, our framework adopts multiple sources of information (information from other vehicles, RSUs, and beacon messages) to efficiently identify those malicious vehicles and their bogus messages. Therefore, as shown in Figure 8, the proposed trust framework outperformed the Gao and DUEL schemes based on precision, recall, and F-Measure values even when the legitimate vehicle density varied.

Influence of Vehicle Speed on Trust Schemes

Figure 9 demonstrates the comparison of the precision, recall, and F-Measure of the proposed trust framework, Gao, and DUEL schemes when the vehicles are moving at different speeds. Figure 9a–c illustrate that the precision, recall, and F-Measure of the proposed trust framework, and other baseline schemes are affected by vehicle speed. This effect increased when the vehicles were moving faster. This is because the average communication time between vehicles reduces as vehicle speed increases. Short communication time between vehicles results in fewer interactions (and therefore fewer data exchanges), which reduces the trust scheme’s accuracy and efficiency for detecting malicious vehicles and their bogus messages. However, the proposed trust framework still significantly improves the precision, recall, and F-Measure when vehicles are moving at high speeds due to the numerous parameters/sources of information used for trust evaluation. By utilizing the maximum amount of available information to increase the accuracy of trust evaluation, the proposed trust framework mitigates the effects of insufficient information from neighboring vehicles during trust evaluation.
Figure 9a–c show that the proposed trust framework achieves a higher precision, recall, and F-Measure compared to the other baseline schemes. The accuracy of the proposed trust framework, Gao, and DUEL schemes, in terms of F-Measure, is 90%, 78%, and 69% at the highest speed of vehicles (30 m/s), respectively. The higher accuracy of the proposed trust framework indicates its better ability to detect and revoke malicious vehicles and their bogus messages when vehicles are moving at high speeds.
When vehicles move at low speeds, the evaluator node will experience sufficient direct interactions with the sender vehicle and nearby vehicles due to the longer communication time between them. As a result, the recall, precision, and F-Measure are all increased. The higher precision, recall, and F-Measure indicate a higher ability and accuracy of the proposed trust framework to identify malicious vehicles and their false/bogus messages when vehicles move at low speeds. The results further show that when the vehicles are moving at various speeds, the proposed trust framework outperforms both the Gao and DUEL schemes under various vehicle speeds.

Influence of Different Percentages of Malicious Vehicles

Figure 10 illustrates the precision, recall, and F-Measure for the proposed trust framework, Gao, and DUEL schemes when the network has different percentages of malicious vehicles. The malicious vehicles carry out combined attacks in which the attacker creates bogus messages individually, performs opinion alteration, on–off patterns, or colludes with other malicious vehicles to share bogus messages within the network. The percentage of attackers was increased from 10% to 50%. Figure 10 illustrates that high precision, recall, and F-Measure values can be achieved when fewer attackers perform combined attacks on the network. However, precision, recall, and F-Measure decreased when the number of attackers increased in the network, because attackers performing combined attacks pollute the network with bogus messages, and malicious vehicles prevent legitimate vehicles from exchanging correct information. Since the information provided by malicious vehicles is false, malicious vehicles can compromise trust evaluation by colluding. Thus, legitimate vehicles cannot distinguish between legitimate and bogus messages. In comparison with baseline schemes, our proposed trust framework ensures high precision, recall, and F-Measure, showing that our proposed framework can cope and deal effectively with combined attacks even when the number of attackers is high. The reason for achieving this accuracy is that the proposed trust framework incorporates the authentication module for early detection of malicious vehicles and their bogus messages, and adopts the trust evaluation modules that utilize information from multiple sources (information from other vehicles, RSUs, and beacon messages) for accurate trust evaluation and better identification and revocation of malicious vehicles and the bogus messages they generate. Thus, our trust framework can quickly detect malicious vehicles and their false/bogus messages. The bogus messages are revoked and cannot be disseminated further. As a result, legitimate vehicles can receive trusted messages even when malicious vehicles are present in the network. For a network with 50% malicious vehicles, our trust framework guarantees an F-Measure (accuracy) of 85%, whereas the baseline trust schemes, Gao and DUEL, achieve an accuracy of less than 79%, and 66%, respectively. The high accuracy of our framework indicates its superiority in identifying and revoking malicious vehicles and thwarting their attacks. Additionally, Figure 10a–c show that the proposed trust framework outperforms baseline trust schemes in terms of achieving higher precision, recall, and F-Measure (accuracy) under various proportions of malicious vehicles in the network.

End-to-End Delay

We evaluated the latency in terms of end-to-end (E2E) delay. A low end-to-end delay is essential because VANET applications are delay-sensitive. As shown in Figure 11, the addition of malicious vehicles increased the end-to-end delay in all schemes. However, even when the network contained a high number of malicious vehicles, the proposed framework had the lowest latency compared to the other baseline schemes.
The proposed framework outperforms other schemes because of its lightweight trust computation, lightweight messages, and low communication overhead. This means that the messages were processed and transmitted in a short time. Thus, our framework can immediately identify malicious vehicles and their false/bogus messages, enabling other vehicles to receive trusted information on time.

6. Conclusions

In this paper, we propose a blockchain-assisted privacy-preserving and context-aware trust management framework to secure V2V and V2I communications in VANETs by integrating a blockchain-assisted privacy-preserving authentication scheme and a context-aware trust management scheme. The proposed framework enables the receiver node (vehicle/RSU) to authenticate and evaluate the trustworthiness of the sender vehicles and their messages and identify and revoke the bogus messages and the malicious vehicles generating them. Additionally, we incorporated the blockchain into the proposed framework to facilitate efficient and distributed vehicle authentication and to enhance the security and privacy of the network. The proposed framework consists of several modules and exploits information from several sources (beacon messages, event messages, other vehicles, and RSUs) to enable the receiver node to evaluate the trustworthiness of the sender vehicles and their messages, and efficiently identify and revoke the malicious vehicles and their bogus messages in various contexts of VANETs. The proposed framework satisfies the trust, efficiency, security, privacy, and dynamic requirements of VANETs.
Based on the security analysis, efficiency analysis, and experimental results, the proposed framework is more efficient in terms of having a lower computational cost and communication overhead, lower end-to-end delay, and higher precision, recall, and F-measure (accuracy) than baseline schemes. Therefore, the proposed framework is secure, efficient, and feasible for VANETs.
In future work, we will integrate machine learning techniques into the proposed framework to adjust the trust threshold to be dynamic and to derive more representative context features for accurate representation, and for precisely detecting malicious vehicles and their false messages. This will further enhance the overall performance of our framework.

Author Contributions

W.A., conceptualization, methodology, software, writing—original draft; W.D., resources, supervision; D.M., writing—review, and editing. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Global Status Report on Road Safety. Available online: https://www.who.int/publications/i/item/9789241565684 (accessed on 11 October 2021).
  2. Matthias, S. Does Traffic Congestion Slow the Economy? J. Plan. Lit. 2011, 26, 391–404. [Google Scholar] [CrossRef]
  3. Williams, B.M.; Guin, A. Traffic Management Center Use of Incident Detection Algorithms: Findings of a Nationwide Survey. IEEE Trans. Intell. Transp. Syst. 2007, 8, 351–358. [Google Scholar] [CrossRef]
  4. Yang, X.; Liu, J.; Zhao, F.; Vaidya, N.H. A vehicle-to-vehicle communication protocol for cooperative collision warning. In Proceedings of the First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, MOBIQUITOUS 2004, Boston, MA, USA, 26–26 August 2004; pp. 114–123. [Google Scholar]
  5. Phull, N.; Singh, P.; Shabaz, M.; Sammy, F. Enhancing Vehicular Ad Hoc Networks’ Dynamic Behavior by Integrating Game Theory and Machine Learning Techniques for Reliable and Stable Routing. Secur. Commun. Netw. 2022, 2022, 4108231. [Google Scholar] [CrossRef]
  6. Van Der Heijden, R.W.; Dietzel, S.; Leinmüller, T.; Kargl, F. Survey on misbehavior detection in cooperative intelligent transportation systems. IEEE Commun. Surv. Tutor. 2019, 21, 779–811. [Google Scholar] [CrossRef] [Green Version]
  7. Akwirry, B.; Bessis, N.; Malik, H.; McHale, S. A Multi-Tier Trust-Based Security Mechanism for Vehicular Ad-Hoc Network Communications. Sensors 2022, 22, 8285. [Google Scholar] [CrossRef]
  8. Hasrouny, H.; Samhat, A.E.; Bassil, C.; Laouiti, A. VANet security challenges and solutions: A survey. Veh. Commun. 2017, 7, 7–20. [Google Scholar] [CrossRef]
  9. Soomro, I.A.; Hasbullah, H.; Manan, J.B.A. User requirements model for vehicular Ad hoc network applications. In Proceedings of the 2010 International Symposium on Information Technology, Kuala Lumpur, Malaysia, 15–17 June 2010; Volume 2, pp. 800–804. [Google Scholar] [CrossRef]
  10. Fan, N.; Wu, C.Q. On trust models for communication security in vehicular ad-hoc networks. Ad Hoc Netw. 2018, 90, 101740. [Google Scholar] [CrossRef]
  11. Sumithra, S.; Vadivel, R. An Overview of Various Trust Models for VANET Security Establishment. In Proceedings of the 2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT), Bengaluru India, 10–12 July 2018; pp. 1–7. [Google Scholar] [CrossRef]
  12. Azam, F.; Yadav, S.K.; Priyadarshi, N.; Padmanaban, S.; Bansal, R.C. A Comprehensive Review of Authentication Schemes in Vehicular Ad-Hoc Network. IEEE Access 2021, 9, 31309–31321. [Google Scholar] [CrossRef]
  13. Huang, Z.; Ruj, S.; Cavenaghi, M.A.; Stojmenovic, M.; Nayak, A. A social network approach to trust management in VANETs. Peer Peer Netw. Appl. 2014, 7, 229–242. [Google Scholar] [CrossRef]
  14. Rawat, D.B.; Yan, G.; Bista, B.B.; Weigle, M.C. Trust On the Security of Wireless Vehicular Ad-hoc Networking. Ad Hoc Sens. Wirel. Netw. 2015, 24, 1–23. [Google Scholar]
  15. Gazdar, T.; Belghith, A.; Abutair, H. An Enhanced Distributed Trust Computing Protocol for VANETs. IEEE Access 2018, 6, 380–392. [Google Scholar] [CrossRef]
  16. Xia, H.; Zhang, S.S.; Li, Y.; Pan, Z.K.; Peng, X.; Cheng, X.Z. An Attack-Resistant Trust Inference Model for Securing Routing in Vehicular Ad Hoc Networks. IEEE Trans. Veh. Technol. 2019, 68, 7108–7120. [Google Scholar] [CrossRef]
  17. Siddiqui, S.A.; Mahmood, A.; Sheng, Q.Z.; Suzuki, H.; Ni, W. A Time-aware Trust Management Heuristic for the Internet of Vehicles. In Proceedings of the 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Shenyang, China, 20–22 October 2021; pp. 1–8. [Google Scholar] [CrossRef]
  18. Iqbal, R.; Butt, T.A.; Afzaal, M.; Salah, K. Trust management in social Internet of vehicles: Factors, challenges, blockchain, and fog solutions. Int. J. Distrib. Sens. Networks 2019, 15, 155014771982582. [Google Scholar] [CrossRef] [Green Version]
  19. Wang, C.; Cheng, X.; Li, J.; He, Y.; Xiao, K. A survey: Applications of blockchain in the Internet of Vehicles. EURASIP J. Wirel. Commun. Netw. 2021, 2021, 77. [Google Scholar] [CrossRef]
  20. Grover, J. Security of Vehicular Ad Hoc Networks using blockchain: A comprehensive review. Veh. Commun. 2022, 34, 100458. [Google Scholar] [CrossRef]
  21. Dwivedi, S.K.; Amin, R.; Das, A.K.; Leung, M.T.; Choo, K.-K.R.; Vollala, S. Blockchain-based vehicular ad-hoc networks: A comprehensive survey. Ad Hoc Netw. 2022, 137, 102980. [Google Scholar] [CrossRef]
  22. Liu, Z.; Ma, J.; Weng, J.; Huang, F.; Wu, Y.; Wei, L.; Li, Y. LPPTE: A lightweight privacy-preserving trust evaluation scheme for facilitating distributed data fusion in cooperative vehicular safety applications. Inf. Fusion 2020, 73, 144–156. [Google Scholar] [CrossRef]
  23. Liu, Z.; Weng, J.; Guo, J.; Ma, J.; Huang, F.; Sun, H.; Cheng, Y. PPTM: A Privacy-Preserving Trust Management Scheme for Emergency Message Dissemination in Space–Air–Ground-Integrated Vehicular Networks. IEEE Internet Things J. 2022, 9, 5943–5956. [Google Scholar] [CrossRef]
  24. Guo, J.; Li, X.; Liu, Z.; Ma, J.; Yang, C.; Zhang, J.; Wu, D. TROVE: A Context-Awareness Trust Model for VANETs Using Reinforcement Learning. IEEE Internet Things J. 2020, 7, 6647–6662. [Google Scholar] [CrossRef]
  25. Gao, H.; Liu, C.; Yin, Y.; Xu, Y.; Li, Y. A Hybrid Approach to Trust Node Assessment and Management for VANETs Cooperative Data Communication: Historical Interaction Perspective. IEEE Trans. Intell. Transp. Syst. 2022, 23, 16504–16513. [Google Scholar] [CrossRef]
  26. Bhargava, A.; Verma, S. DUEL: Dempster Uncertainty-Based Enhanced- Trust Level Scheme for VANET. IEEE Trans. Intell. Transp. Syst. 2022, 23, 15079–15090. [Google Scholar] [CrossRef]
  27. Liu, Z.; Weng, J.; Ma, J.; Guo, J.; Feng, B.; Jiang, Z.; Wei, K. TCEMD: A Trust Cascading-Based Emergency Message Dissemination Model in VANETs. IEEE Internet Things J. 2020, 7, 4028–4048. [Google Scholar] [CrossRef]
  28. Inedjaren, Y.; Maachaoui, M.; Zeddini, B.; Barbot, J.-P. Blockchain-based distributed management system for trust in VANET. Veh. Commun. 2021, 30, 100350. [Google Scholar] [CrossRef]
  29. Ghaleb, F.A.; Maarof, M.A.; Zainal, A.; Al-Rimy, B.A.S.; Alsaeedi, A.; Boulila, W. Ensemble-Based Hybrid Context-Aware Misbehavior Detection Model for Vehicular Ad Hoc Network. Remote Sens. 2019, 11, 2852. [Google Scholar] [CrossRef] [Green Version]
  30. Ahmad, F.; Franqueira, V.N.L.; Adnane, A. TEAM: A Trust Evaluation and Management Framework in Context-Enabled Vehicular Ad-Hoc Networks. IEEE Access 2018, 6, 28643–28660. [Google Scholar] [CrossRef]
  31. Ghaleb, F.A.; Saeed, F.; Alkhammash, E.H.; Alghamdi, N.S.; Al-Rimy, B.A.S. A Fuzzy-Based Context-Aware Misbehavior Detecting Scheme for Detecting Rogue Nodes in Vehicular Ad Hoc Network. Sensors 2022, 22, 2810. [Google Scholar] [CrossRef]
  32. Rehman, A.; Hassan, M.F.; Hooi, Y.K.; Qureshi, M.A.; Shukla, S.; Susanto, E.; Rubab, S.; Abdel-Aty, A.-H. CTMF: Context-Aware Trust Management Framework for Internet of Vehicles. IEEE Access 2022, 10, 73685–73701. [Google Scholar] [CrossRef]
  33. Ghajar, F.G.; Sratakhti, J.S.; Sikora, A. SBTMS: Scalable Blockchain Trust Management System for VANET. Appl. Sci. 2021, 11, 11947. [Google Scholar] [CrossRef]
  34. Chukwuocha, C.; Thulasiraman, P.; Thulasiram, R.K. Trust and scalable blockchain-based message exchanging scheme on VANET. Peer-to-Peer Netw. Appl. 2021, 14, 3092–3109. [Google Scholar] [CrossRef]
  35. Hasrouny, H.; Samhat, A.E.; Bassil, C.; Laouiti, A. A security solution for V2V communication within VANETs. In Proceedings of the 2018 Wireless Days (WD), Dubai, United Arab Emirates, 3–5 April 2018; pp. 181–183. [Google Scholar] [CrossRef]
  36. Wei, Y.-C.; Chen, Y.-M. Efficient Self-organized Trust Management in Location Privacy Enhanced VANETs. In Information Security Applications; WISA 2012; Lecture Notes in Computer Science; Lee, D.H., Yong, M., Eds.; Springer: Berlin/Heidelberg, Germany, 2012; Volume 7690, pp. 328–344. [Google Scholar] [CrossRef]
  37. Kumar, P.; Kumari, S.; Sharma, V.; Li, X.; Sangaiah, A.K.; Islam, S.H. Secure CLS and CL-AS schemes designed for VANETs. J. Supercomput. 2019, 75, 3076–3098. [Google Scholar] [CrossRef]
  38. Mei, Q.; Xiong, H.; Chen, J.; Yang, M.; Kumari, S.; Khan, M.K. Efficient Certificateless Aggregate Signature with Conditional Privacy Preservation in IoV. IEEE Syst. J. 2021, 15, 245–256. [Google Scholar] [CrossRef]
  39. Zhao, N.; Zhang, G. Privacy-Protected Certificateless Aggregate Signature Scheme in VANET. In Proceedings of the 2019 11th International Conference on Wireless Communications and Signal Processing (WCSP), Xi’an, China, 23–25 October 2019; pp. 1–6. [Google Scholar] [CrossRef]
  40. Kamil, I.A.; Ogundoyin, S.O. On the security of privacy-preserving authentication scheme with full aggregation in vehicular ad hoc network. Secur. Priv. 2020, 3, 1–20. [Google Scholar] [CrossRef]
  41. Xu, Z.; He, D.; Kumar, N.; Choo, K.-K.R. Efficient Certificateless Aggregate Signature Scheme for Performing Secure Routing in VANETs. Secur. Commun. Netw. 2020, 2020, 5276813. [Google Scholar] [CrossRef]
  42. Liu, J.; Li, Q.; Cao, H.; Sun, R.; Du, X.; Guizani, M. MDBV: Monitoring Data Batch Verification for Survivability of Internet of Vehicles. IEEE Access 2018, 6, 50974–50983. [Google Scholar] [CrossRef]
  43. Wang, H.; Wang, L.; Zhang, K.; Li, J.; Luo, Y. A Conditional Privacy-Preserving Certificateless Aggregate Signature Scheme in the Standard Model for VANETs. IEEE Access 2022, 10, 15605–15618. [Google Scholar] [CrossRef]
  44. Zhang, J.; Cui, J.; Zhong, H.; Chen, Z.; Liu, L. PA-CRT: Chinese Remainder Theorem Based Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks. IEEE Trans. Dependable Secur. Comput. 2021, 18, 722–735. [Google Scholar] [CrossRef] [Green Version]
  45. Zhou, X.; Luo, M.; Vijayakumar, P.; Peng, C.; He, D. Efficient Certificateless Conditional Privacy-Preserving Authentication for VANETs. IEEE Trans. Veh. Technol. 2022, 71, 7863–7875. [Google Scholar] [CrossRef]
  46. Verma, G.K.; Singh, B.B.; Kumar, N.; Chamola, V. CB-CAS: Certificate-Based Efficient Signature Scheme with Compact Aggregation for Industrial Internet of Things Environment. IEEE Internet Things J. 2020, 7, 2563–2572. [Google Scholar] [CrossRef]
  47. Yang, W.; Wang, S.; Mu, Y. An Enhanced Certificateless Aggregate Signature Without Pairings for E-Healthcare System. IEEE Internet Things J. 2021, 8, 5000–5008. [Google Scholar] [CrossRef]
  48. He, D.; Zeadally, S.; Xu, B.; Huang, X. An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks. IEEE Trans. Inf. Forensics Secur. 2015, 10, 2681–2691. [Google Scholar] [CrossRef]
  49. Veins. Available online: http://veins.car2x.org (accessed on 5 April 2021).
  50. Sommer, C.; German, R.; Dressler, F. Bidirectionally coupled network and road simulation for improved IVC analysis. IEEE Trans. Mob. Comput. 2011, 10, 3–15. [Google Scholar] [CrossRef] [Green Version]
  51. Behrisch, M.; Bieker, L.; Erdmann, J.; Krajzewicz, D. SUMO—Simulation of Urban MObility. Iaria 2011. Available online: https://www.eclipse.org/sumo/ (accessed on 5 April 2021).
  52. Behrisch, M.; Bieker, L.; Erdmann, J.; Krajzewicz, D. SUMO—Simulation of Urban MObility: An overview. In Proceedings of the SIMUL 2011, the Third International Conference on Advances in System Simulation, ThinkMind, Barcelona, Spain, 23–29 October 2011. [Google Scholar]
  53. OMNET. Available online: https://omnetpp.org/ (accessed on 5 April 2021).
  54. OpenStreetMap. Available online: https://www.openstreetmap.org (accessed on 20 January 2022).
  55. Haklay, M.; Weber, P. OpenStreetMap: User-Generated Street Maps. IEEE Pervasive Comput. 2008, 7, 12–18. [Google Scholar] [CrossRef] [Green Version]
Figure 1. Proposed trust management framework.
Figure 1. Proposed trust management framework.
Sensors 23 05766 g001
Figure 2. Communications between the RSU and vehicles during beacon messages exchange.
Figure 2. Communications between the RSU and vehicles during beacon messages exchange.
Sensors 23 05766 g002
Figure 3. Communications between the RSU and vehicles during event message exchange and trust calculation.
Figure 3. Communications between the RSU and vehicles during event message exchange and trust calculation.
Sensors 23 05766 g003
Figure 4. Signing cost of an individual message.
Figure 4. Signing cost of an individual message.
Sensors 23 05766 g004
Figure 5. Verification cost of individual signature.
Figure 5. Verification cost of individual signature.
Sensors 23 05766 g005
Figure 6. Verification cost of n signatures.
Figure 6. Verification cost of n signatures.
Sensors 23 05766 g006
Figure 7. Network map.
Figure 7. Network map.
Sensors 23 05766 g007
Figure 8. Influence of vehicle density on trust schemes.
Figure 8. Influence of vehicle density on trust schemes.
Sensors 23 05766 g008
Figure 9. Influence of vehicle speed on trust schemes.
Figure 9. Influence of vehicle speed on trust schemes.
Sensors 23 05766 g009
Figure 10. Influence of malicious vehicles percentage on trust schemes.
Figure 10. Influence of malicious vehicles percentage on trust schemes.
Sensors 23 05766 g010
Figure 11. End-to-end delay.
Figure 11. End-to-end delay.
Sensors 23 05766 g011
Table 1. Comparison of our trust framework with other trust schemes.
Table 1. Comparison of our trust framework with other trust schemes.
SchemeAuthenticationPrivacy PreservingOther Security Requirements
(Non-Repudiation and Unlinkability)
Context Awareness
(Adapting to Various Contexts)
Role-Based Nodes
Adapting to Variations in Malicious Vehicles DensityAdapting to Variations in Legitimate Vehicle DensityAdapting to Variations in Vehicles Speed
Liu et al. [22]YesYesNoNoNo
Liu et al. [23]YesYesYesHighNoNormalYes
Guo et al. [24]NoNoNoHighNoNo
Gao et al. [25]NoNoNoNormalNormalHighNo
Bhargava and Verma [26]NoNoNoNormalNormalNormalNo
Liu et al. [27]YesNoNon-repudiation is achieved but unlinkability is not providedNormalNoYes
Inedjaren et al. [28]NoNoNoHighNoNo
Ghaleb et al. [29]NoNoNoNormalNormalHighNo
Ahmad et al. [30]NoNoNoHighNoNormalYes
Ghaleb et al. [31]NoNoNoNoHighNormalNo
Rehman et al. [32]NoNoNoHighNormalNoYes
Ghajar et al. [33]NoNoNoNoNo
Chukwuocha et al. [34]NoNoNoNoNo
Hasrouny et al. [35]YesYesNon-repudiation is achieved but unlinkability is not providedNoNo
SchemeAdopts Blockchain
(Secure and Efficient Data Storage)
Communication ScenarioTraceability and Revocation of Malicious VehiclesEfficiency
(Computational Cost and Communication Overhead)
Resistance to Attacks
V2VV2I
Liu et al. [22]NoYesNoNoEfficientFalse-message attacks, replay attacks, message-tampering attack
Liu et al. [23]NoYesNoMalicious vehicles can be traced but no revocationEfficient in terms of communication overhead but the computation cost is not providedMalicious vehicles
Guo et al. [24]NoYesNoNoNoFalse-message attacks
Gao et al. [25]NoYesNoNoNoFalse-message attacks, message-tampering attacks, message-dropping attacks, and opinion-tampering attacks
Bhargava and Verma [26]NoYesNoNoNoFalse-message attacks, message-
tampering attacks, and message-dropping attacks
Liu et al. [27]NoYesNoYesNoFalse-message attacks, opinion-tampering attacks
Inedjaren et al. [28]YesYesNoNoNoMessage-dropping attacks
Ghaleb et al. [29]NoYesNoNoNoFalse-message attacks
Ahmad et al. [30]NoYesNoNoNoMessage-tampering attacks, message-delaying attacks
Ghaleb et al. [31]NoYesNoNoNoMalicious vehicles
Rehman et al. [32]NoYesNoNoNoMalicious vehicles
Ghajar et al. [33]YesYesNoNoNoFalse-message attacks
Chukwuocha et al. [34]YesYesNoNoNoFalse-message attacks
Hasrouny et al. [35]NoYesNoYesNoMalicious vehicles
Table 2. Notations.
Table 2. Notations.
NotationDescription
R S U i Roadside unit i
V i Vehicle i t h
G ECC-based cyclic additive group
G 1 Bilinear pairing-based cyclic additive group
P Generator of G
E An elliptic curve
p , q Two large prime numbers
R I D i Vehicle V i ’s real identity
P I D i Vehicle V i ’s pseudonym
T A p u b , sPublic and secret master key pair of the TA
R , y Public and private parameters generated by TA
P K i , S K i Public and private keys of V i
P U i , P R i R S U i ’s public and private keys
p p k i Vehicle V i partial private key
h 1 , h 2 , h 3 , h 4 Cryptographic one-way hash functions
T i , t i Validity period of P I D i and the message timestamp
M i A message from V i
σ i Signature from V i on message M i
Exclusive OR operator
Table 3. Beacon messages sent by the neighboring vehicles of vehicle VB.
Table 3. Beacon messages sent by the neighboring vehicles of vehicle VB.
VB
Pseudo-Identity (PID) M 1 ( b e a c o n )
Location   x 1 , y 1 Speed   ( v 1 ) Direction   ( d 1 )
Lat   ( x 1 ) Long   ( y 1 )
VAPIDA22.421400121.49080020W
VCPIDC22.421600121.49060021W
VDPIDD22.421200121.49010024E
Table 4. Event message sent by vehicle VA to the neighboring vehicles and RSU.
Table 4. Event message sent by vehicle VA to the neighboring vehicles and RSU.
VA
Pseudo-Identity (PID) M 1 ( e v e n t )
Vehicle Role
( V R o l e )
Type   of   Event   ( E T y p e ) Location   of   Event   ( E x , E y ) Location of VA
( L x , L y )
PIDAOVTraffic jam22.421200121.49070022.21100121.490600
Table 5. Notation of cryptographic operations and their execution time.
Table 5. Notation of cryptographic operations and their execution time.
NotationOperationExecution Time (ms)
T b p Bilinear pairing4.2110
T b p s m Bilinear-pairing-based scalar multiplication1.7090
T b p p a Bilinear-pairing-based point addition0.0071
T m t p A map-to-point hash function4.406
T e c c s m ECC-based scalar multiplication0.4420
T e c c p a ECC-based point addition0.0018
T h A secure hash function0.0001
Table 6. Comparative analysis of computation costs.
Table 6. Comparative analysis of computation costs.
SchemeSigning Cost (ms)Verification Cost of Individual Signature
(ms)
Verification   Cost   of   n Signatures
(ms)
Kumar et al. [37] 4 T b p s m + 2 T b p p a + T m t p + 2 T h = 11.2564 4 T b p + 3 T b p s m + 2 T m t p + 2 T h = 30.7832 4 T b p + 3 n T b p s m + 3 n 1 T b p p a + n + 1 T m t p + 2 n T h = 9.5545 n + 21.2287
Mei et al. [38] 4 T b p s m + 2 T b p p a + 2 T m t p + T h = 15.6623 4 T b p + 2 T b p s m + 2 T m t p + T h = 29.0741 4 T b p + 2 n T b p s m + 2 n 2 T b p p a + 2 T m t p + n T h = 3.4323 n + 25.6418
Zhao et al. [39] 4 T b p s m + 2 T b p p a + 2 T m t p + 2 T h = 15.6624 4 T b p + 2 T b p s m + T b p p a + 2 T m t p + 2 T h = 29.0813 4 T b p + 2 n T b p s m + 4 n 3 T b p p q + 2 T m t p + 2 n T h = 3.4466 n + 20.2906
Kamil et al. [40] 4 T b p s m + 2 T b p p a + T m t p + 2 T h = 11.2564 3 T b p + 2 T b p s m + T b p p a + 2 T m t p + 2 T h = 24.8703 3 T b p + 2 n T b p s m + 2 n 1 T b p p a + n + 1 T m t p + n T h = 7.8383 n + 17.0319
Xu et al. [41] 3 T b p s m + T b p p a + T m t p + 2 T h = 9.5403 3 T b p + 2 T b p s m + 2 T m t p + T b p p a + 2 T h = 24.8703 3 T b p + 3 n 2 T b p p a + 2 n T b p s m + n + 1 T m t p + 2 n T h = 7.8455 n + 17.0248
Liu et al. [42] 3 T b p s m + T b p p a + T m t p + 2 T h = 9.5403 3 T b p + 2 T b p s m + 2 T m t p + T b p p a + 2 h = 24.8703 3 T b p + 2 n T b p s m + 2 n 1 T b p p a + n + 1 T m t p + 2 n T h = 7.8384 n + 17.0319
Wang et al. [43] 3 T b p s m + T b p p a + T h = 1.3279 2 T b p + 2 T b p s m + 3 T b p p a + 2 T h = 11.8615 2 T b p + + 2 n T b p s m + 3 n T b p p a + 2 n T h = 3.4395 n + 8.422
Zhou et al. [45] T e c c s m + 2 T h = 0.4422 4 T e c c s m + 3 T e c c p a + 3 T h = 1.7737 2 n + 2 T e c c m + 3 n + 3 T e c c p a + 3 n T h = 0.9056 n + 0.8911
Verma et al. [46] 2 T e c c s m + 3 T e c c p a + T h = 0.8895 3 T e c c s m + 2 T e c c p a + 2 T h = 1.3298 2 n + 2 T e c c s m + ( n + 2 ) T e c c p a + 2 n T h = 0.886 n + 0.8876
Yang et al. [47] T e c c s m + 2 T h = 0.4422 4 T e c c s m + 3 T e c c p a + 3 T h = 1.7737 4 n + 1 T e c c s m + 5 n + 3 T e c c p a + ( 6 n + 1 ) T h = 1.7776 n + 0.4475
The proposed scheme T e c c s m + T h = 0.4421 3 T e c c s m + 2 T e c c p a + 2 T h = 1.3298 n + 2 T e c c s m + 2 n + 2 T e c c p a + 2 n T h = 0.4458 n + 0.8876
Table 7. The proposed scheme’s percentage improvement over other schemes.
Table 7. The proposed scheme’s percentage improvement over other schemes.
SchemesSigning a Message (%)Verifying Individual Signature (%) Verifying   n Signatures
( n = 100 )
Kumar et al. [37]96.0795.6895.34
Mei et al. [38]97.1895.4387.67
Zhao et al. [39]97.1895.4387.54
Kamil et al. [40]96.0794.6594.32
Xu et al. [41]95.3794.6594.33
Liu et al. [42]95.3794.6594.32
Wang et al. [43]66.7188.7987.1
Zhou et al. [45]0.0225.0350.28
Verma et al. [46]50.300.0049.19
Yang et al. [47]0.022574.49
Table 8. Sizes of various elements.
Table 8. Sizes of various elements.
Type of ElementDescriptionSize (Bytes)
G 1 An element of a group G 1 128
G An element of a group G 40
Z q * An element of a finite field Z q * 20
t i Time-stamp4
Table 9. Comparison of communication overhead.
Table 9. Comparison of communication overhead.
SchemeSingle Message (Bytes) n Messages (Bytes)
Kumar et al. [37]536536 n
Mei et al. [38]540540 n
Zhao et al. [39]388388 n
Kamil et al. [40]540540 n
Xu et al. [41]404404 n
Liu et al. [42]404404 n
Wang et al. [43]792792 n
Zhou et al. [45]208208 n
Verma et al. [46]220220 n
Yang et al. [47]164164 n
The proposed scheme128128 n
Table 10. Simulation parameters.
Table 10. Simulation parameters.
ParameterValue
Simulation Area3 km × 3 km
Simulation Time1000 s
Number of RSUs10
Number of Vehicles100, 200, 300, 400, 500
Role-Based Vehicles (%)AV10
PS20
OV70
Vehicle Speed5 m/s, 10 m/s, 15 m/s, 20 m/s, 30 m/s
Malicious Vehicles (%)10, 20, 30, 40, 50
Network ProtocolWAVE
MAC ProtocolIEEE 802.11p
Transmission Range300 m
Trust Threshold0.5
Initial Trust0.3
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Ahmed, W.; Di, W.; Mukathe, D. Blockchain-Assisted Privacy-Preserving and Context-Aware Trust Management Framework for Secure Communications in VANETs. Sensors 2023, 23, 5766. https://doi.org/10.3390/s23125766

AMA Style

Ahmed W, Di W, Mukathe D. Blockchain-Assisted Privacy-Preserving and Context-Aware Trust Management Framework for Secure Communications in VANETs. Sensors. 2023; 23(12):5766. https://doi.org/10.3390/s23125766

Chicago/Turabian Style

Ahmed, Waheeb, Wu Di, and Daniel Mukathe. 2023. "Blockchain-Assisted Privacy-Preserving and Context-Aware Trust Management Framework for Secure Communications in VANETs" Sensors 23, no. 12: 5766. https://doi.org/10.3390/s23125766

APA Style

Ahmed, W., Di, W., & Mukathe, D. (2023). Blockchain-Assisted Privacy-Preserving and Context-Aware Trust Management Framework for Secure Communications in VANETs. Sensors, 23(12), 5766. https://doi.org/10.3390/s23125766

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop