Cargando…

An Intelligent Automated System for Detecting Malicious Vehicles in Intelligent Transportation Systems

The exponential growth of intelligent vehicles(IVs) development has resulted in a complex network. As the number of IVs in a network increases, so does the number of connections. As a result, a great deal of data is generated. This complexity leads to insecure communication, traffic congestion, secu...

Descripción completa

Detalles Bibliográficos
Autores principales: Ashfaq, Tehreem, Khalid, Rabiya, Yahaya, Adamu Sani, Aslam, Sheraz, Azar, Ahmad Taher, Alkhalifah, Tamim, Tounsi, Mohamed
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9460212/
https://www.ncbi.nlm.nih.gov/pubmed/36080777
http://dx.doi.org/10.3390/s22176318
_version_ 1784786691715760128
author Ashfaq, Tehreem
Khalid, Rabiya
Yahaya, Adamu Sani
Aslam, Sheraz
Azar, Ahmad Taher
Alkhalifah, Tamim
Tounsi, Mohamed
author_facet Ashfaq, Tehreem
Khalid, Rabiya
Yahaya, Adamu Sani
Aslam, Sheraz
Azar, Ahmad Taher
Alkhalifah, Tamim
Tounsi, Mohamed
author_sort Ashfaq, Tehreem
collection PubMed
description The exponential growth of intelligent vehicles(IVs) development has resulted in a complex network. As the number of IVs in a network increases, so does the number of connections. As a result, a great deal of data is generated. This complexity leads to insecure communication, traffic congestion, security, and privacy issues in vehicular networks (VNs). In addition, detecting malicious IVs, data integration, and data validation are major issues in VNs that affect network performance. A blockchain-based model for secure communication and malicious IV detection is proposed to address the above issues. In addition, this system also addresses data integration and transaction validation using an encryption scheme for secure communication. A multi-chain concept separates the legitimate and malicious data into two chains: the Integrity chain (I-chain) and Fraud chain (F-chain). This multi-chain mechanism solves the storage problem and reduces the computing power. The integration of blockchain in the proposed model provides privacy, network security, transparency, and immutability. To address the storage issue, the InterPlanetary File System (IPFS) is integrated with Certificate Authority (CA). A reputation mechanism is introduced to detect malicious IVs in the network based on ratings. This reputation mechanism is also used to prevent Sybil attack. The evaluation of the proposed work is based on the cost of smart contracts and computation time. Furthermore, two attacker models are presented to prevent the selfish mining attack and the Sybil attack. Finally, a security analysis of the proposed smart contracts with their security vulnerabilities is also presented.
format Online
Article
Text
id pubmed-9460212
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-94602122022-09-10 An Intelligent Automated System for Detecting Malicious Vehicles in Intelligent Transportation Systems Ashfaq, Tehreem Khalid, Rabiya Yahaya, Adamu Sani Aslam, Sheraz Azar, Ahmad Taher Alkhalifah, Tamim Tounsi, Mohamed Sensors (Basel) Article The exponential growth of intelligent vehicles(IVs) development has resulted in a complex network. As the number of IVs in a network increases, so does the number of connections. As a result, a great deal of data is generated. This complexity leads to insecure communication, traffic congestion, security, and privacy issues in vehicular networks (VNs). In addition, detecting malicious IVs, data integration, and data validation are major issues in VNs that affect network performance. A blockchain-based model for secure communication and malicious IV detection is proposed to address the above issues. In addition, this system also addresses data integration and transaction validation using an encryption scheme for secure communication. A multi-chain concept separates the legitimate and malicious data into two chains: the Integrity chain (I-chain) and Fraud chain (F-chain). This multi-chain mechanism solves the storage problem and reduces the computing power. The integration of blockchain in the proposed model provides privacy, network security, transparency, and immutability. To address the storage issue, the InterPlanetary File System (IPFS) is integrated with Certificate Authority (CA). A reputation mechanism is introduced to detect malicious IVs in the network based on ratings. This reputation mechanism is also used to prevent Sybil attack. The evaluation of the proposed work is based on the cost of smart contracts and computation time. Furthermore, two attacker models are presented to prevent the selfish mining attack and the Sybil attack. Finally, a security analysis of the proposed smart contracts with their security vulnerabilities is also presented. MDPI 2022-08-23 /pmc/articles/PMC9460212/ /pubmed/36080777 http://dx.doi.org/10.3390/s22176318 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Ashfaq, Tehreem
Khalid, Rabiya
Yahaya, Adamu Sani
Aslam, Sheraz
Azar, Ahmad Taher
Alkhalifah, Tamim
Tounsi, Mohamed
An Intelligent Automated System for Detecting Malicious Vehicles in Intelligent Transportation Systems
title An Intelligent Automated System for Detecting Malicious Vehicles in Intelligent Transportation Systems
title_full An Intelligent Automated System for Detecting Malicious Vehicles in Intelligent Transportation Systems
title_fullStr An Intelligent Automated System for Detecting Malicious Vehicles in Intelligent Transportation Systems
title_full_unstemmed An Intelligent Automated System for Detecting Malicious Vehicles in Intelligent Transportation Systems
title_short An Intelligent Automated System for Detecting Malicious Vehicles in Intelligent Transportation Systems
title_sort intelligent automated system for detecting malicious vehicles in intelligent transportation systems
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9460212/
https://www.ncbi.nlm.nih.gov/pubmed/36080777
http://dx.doi.org/10.3390/s22176318
work_keys_str_mv AT ashfaqtehreem anintelligentautomatedsystemfordetectingmaliciousvehiclesinintelligenttransportationsystems
AT khalidrabiya anintelligentautomatedsystemfordetectingmaliciousvehiclesinintelligenttransportationsystems
AT yahayaadamusani anintelligentautomatedsystemfordetectingmaliciousvehiclesinintelligenttransportationsystems
AT aslamsheraz anintelligentautomatedsystemfordetectingmaliciousvehiclesinintelligenttransportationsystems
AT azarahmadtaher anintelligentautomatedsystemfordetectingmaliciousvehiclesinintelligenttransportationsystems
AT alkhalifahtamim anintelligentautomatedsystemfordetectingmaliciousvehiclesinintelligenttransportationsystems
AT tounsimohamed anintelligentautomatedsystemfordetectingmaliciousvehiclesinintelligenttransportationsystems
AT ashfaqtehreem intelligentautomatedsystemfordetectingmaliciousvehiclesinintelligenttransportationsystems
AT khalidrabiya intelligentautomatedsystemfordetectingmaliciousvehiclesinintelligenttransportationsystems
AT yahayaadamusani intelligentautomatedsystemfordetectingmaliciousvehiclesinintelligenttransportationsystems
AT aslamsheraz intelligentautomatedsystemfordetectingmaliciousvehiclesinintelligenttransportationsystems
AT azarahmadtaher intelligentautomatedsystemfordetectingmaliciousvehiclesinintelligenttransportationsystems
AT alkhalifahtamim intelligentautomatedsystemfordetectingmaliciousvehiclesinintelligenttransportationsystems
AT tounsimohamed intelligentautomatedsystemfordetectingmaliciousvehiclesinintelligenttransportationsystems