Security and Privacy in Emerging Networks: Part I [Guest Editorial]
Sign up for access to the world's latest research
Abstract
AI
AI
This guest editorial serves as an introduction to Part II of the "Security and Privacy in Emerging Networks" Feature Topic, focusing on new security schemes for various types of emerging networks, including vehicular, biomedical, and mobile networks. The editorial highlights the critical need for security and privacy measures within these networks due to the increased vulnerabilities from technological advancements. It summarizes contributions from selected articles that address significant challenges and propose innovative solutions to protect these networks from various attacks.

Related papers
2011
Vehicular ad-hoc networks (VANETs) have a great potential to improve road safety, traffic jams, fuel consumption, and to increase passenger convenience in vehicles. However, VANETs use an open medium for communication and, therefore, are exposed to security threats that influence their reliability. We propose a data-trust security model designed for VANETs based on social network theories. Drivers receiving data about traffic congestion or safety warnings can use the model to evaluate the trust in the received information. The model computes a trust index for each message based on the relevance of the event. It also uses a gossiping approach to disseminate data-trust indexes between vehicles, increasing the accuracy in the trustworthiness of an event and assuring the privacy by hiding the original event sources. The approach is evaluated through modeling and simulation, and we present results that proof its validity.
IET Wireless Sensor Systems, 2019
A major objective of vehicular networking is to improve road safety and travel convenience. The experience of individual vehicles on traffic conditions and travel situations can be shared with other vehicles for improving their route planning and driving decisions. Nevertheless, the frequent occurrence of adversary vehicles in the network is unavoidable. These vehicles may engage in various malicious activities affecting the overall network performance. To control and monitor effectively security threats in vehicular networks, an efficient trust management system should be employed to identify the trustworthiness of individual vehicles and detect malicious drivers. This study provides a review of the research efforts aimed at enabling trust in vehicular environments. The major challenges are highlighted, and an edge-based architecture is proposed as a supportive platform. Furthermore, existing models proposed for trust evaluation, aggregation, propagation and decision making are reviewed. Finally, the current directions to enforce trust in vehicular environments are highlighted.
Last few years, vehicular networks are gaining more and more attraction from the researchers and the automobile industries. The life saving factor is the key issue in this regard. Trust is key part of security and it is undoubtedly a necessity to develop trust in vehicular network. The main aim of this paper is to propose a trust model for vehicular environment. The proposed model contains two different modules. First module is based on attackers and the attacks. An attacker is one of the most significant entity who can intentionally change the behavior of the other entities (Vehicle or Infrastructure) in the network. It is important to study and analyze the attackers and attacks before designing the life saving networks. Second module is based on trust and trusting computing technology. Trusted platform module (TPM) is a hardware security module and plays a major role to develop trust in vehicles. Purpose of this study is to develop trust in vehicular network. This trusted vehicular network model enforces all the entities of the network to behave in a specified manner. We believe that this trusted model would be more helpful in serving the users of the vehicular environment.
—Vehicular ad hoc networks (VANETs) have the potential to transform the way people travel through the creation of a safe interoperable wireless communications network that includes cars, buses, traffic signals, cell phones, and other devices. However, VANETs are vulnerable to security threats due to increasing reliance on communication, computing, and control technologies. The unique security and privacy challenges posed by VANETs include integrity (data trust), confidentiality, nonrepudiation, access control, real-time operational constraints/demands, availability, and privacy protection. The trustworthiness of VANETs could be improved by addressing holistically both data trust, which is defined as the assessment of whether or not and to what extent the reported traffic data are trustworthy, and node trust, which is defined as how trustworthy the nodes in VANETs are. In this paper, an attack-resistant trust management scheme (ART) is proposed for VANETs that is able to detect and cope with malicious attacks and also evaluate the trustworthiness of both data and mobile nodes in VANETs. Specially, data trust is evaluated based on the data sensed and collected from multiple vehicles; node trust is assessed in two dimensions, i.e., functional trust and recommendation trust, which indicate how likely a node can fulfill its functionality and how trustworthy the recommendations from a node for other nodes will be, respectively. The effectiveness and efficiency of the proposed ART scheme is validated through extensive experiments. The proposed trust management theme is applicable to a wide range of VANET applications to improve traffic safety, mobility, and environmental protection with enhanced trustworthiness.
— Traffic Safety is a major challenge recognized by governments and automotive companies around the world. On an average day in India, vehicular collisions kill more than 100 and injure thousands. To further improve traffic safety and efficiency, significant research efforts have been undertaken to integrate computing and communication technologies into vehicles. This enables vehicles to alert each other with information like speed, position, acceleration and road conditions over short and medium range wireless networks called Vehicular Ad Hoc Network (VANET). In this paper we did a brief survey of security-related issues and proposed solutions in the setting of vehicular ad-hoc networks. We present the techniques that have been proposed so far to ensure security and privacy in such networks.
International Journal of Computer & Software Engineering, 2020
The Vehicular ad-hoc networks (VANET) are a subclass of MANET with vehicles as mobile nodes. The vehicles exchange data via vehicle-to-vehicle (V2V) or vehicle-to-infrastructure (V2I) communication. The securities of data communications focus on deciding data trust. The concept of trust estimates the reliability of communications data. In particular, we have mainly focused on problems of mistrust or data trust in the VANET network. In this paper, we will study some models of trust and compare them, which will help to reduce the impact of trust problem and try to improve it.
Lots of traditional distributed ride-sharing services match vehicles with drivers and passengers' geographic information only. When urban road congestion situation is particularly serious, such as Beijing's rush hour, the waiting time for the passengers is too long which affects the quality of the service. Today's Smartphone-based ride-sharing technology gains momentum but still needs to deal with several issues including safety (traveling with strangers), liability (for example, accidents), as well as the bootstrapping problem (the more users a ride-sharing service has, the more the ride-sharing opportunities). Safety and Non-safety applications of Vehicular Ad hoc Networks (VANETs) provide solutions for road accidents in current traffic system. Security is one of the key research areas for successful implementation of safety and non-safety applications of VANET scenario. Trust and Privacy are two major components of security and dynamic topology and high mobility of vehicles make it more challenging task for end users in network. This work proposes a novel practical card-based (for security), and recommender based scheme to ensure the basic requirements of users in vehicular network. This proposed scheme is based on 'security hardware module' i.e. Trusted Platform Module (TPM) and 'recommendation module' to protect privacy and gain trust among passengers during their journey. Two types of cloaking algorithms, for a single user and a batch of users, are designed to preserve privacy of passengers and drivers. With our implementation results, we ensure sufficient Trust, Privacy and Security (TPS) in to ridesharing users in vehicular/road network.
Security is one of the most important issues in new life saving vehicular network, whereas trust is key component of security in vehicular applications. These applications serve users when components (user, vehicle and RSU) of the network behave in an expected manner in peer to peer vehicular communication. Whenever any component of the network unexpectedly changes their behavior then it would be harmful for other users of the network. In this paper, we are proposed three different trust levels in peer to peer vehicular network. Purpose of proposed trust levels to discuss in detail is the functionality of different component of network which circumvents the attacker and emphasizes the role of trusted users in peer to peer vehicular communication.
IEEE Internet of Things Journal, 2020
Vehicular Ad-hoc NETwork (VANET), a novel technology holds a paramount importance within the transportation domain due to its abilities to increase traffic efficiency and safety. Connected vehicles propagate sensitive information which must be shared with the neighbors in a secure environment. However, VANET may also include dishonest nodes such as Man-in-the-Middle (MiTM) attackers aiming to distribute and share malicious content with the vehicles, thus polluting the network with compromised information. In this regard, establishing trust among connected vehicles can increase security as every participating vehicle will generate and propagate authentic, accurate and trusted content within the network. In this paper, we propose a novel trust model, namely, Man-in-the-middle Attack Resistance trust model IN connEcted vehicles (MARINE), which identifies dishonest nodes performing MiTM attacks in an efficient way as well as revokes their credentials. Every node running MARINE system first establishes trust for the sender by performing multi-dimensional plausibility checks. Once the receiver verifies the trustworthiness of the sender, the received data is then evaluated both directly and indirectly. Extensive simulations are carried out to evaluate the performance and accuracy of MARINE rigorously across three MiTM attacker models and the bench-marked trust model. Simulation results show that for a network containing 35% MiTM attackers, MARINE outperforms the state of the art trust model by 15%, 18%, and 17% improvements in precision, recall and F-score, respectively.
2016
Spontaneous networks such as VANET are in general deployed in an open and thus easily accessible environment. Therefore, they are vulnerable to attacks. Trust management is one of a set of security solutions dedicated to this type of networks. Moreover, the strong mobility of the nodes (in the case of VANET) makes the establishment of a trust management system complex. In this paper, we present a concept of ‘Active Vehicle’ which means an autonomous vehicle that is able to make decision about trustworthiness of alert messages transmitted about road accidents. The behavior of an “Active Vehicle” is modeled using Petri Nets. Keywords—Component, active vehicle, cooperation, petri nets, trust management, VANET.

Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.