Journal of Machine and Computing


Decentralised Secure and Privacy Establishment in Vanet Using Key Encrypted Block Chain Scheme



Journal of Machine and Computing

Received On : 18 May 2024

Revised On : 22 July 2024

Accepted On : 22 September 2024

Volume 05, Issue 01


Article Views

Abstract


Using blockchain technology and smart transportation gadgets, this paper proposes the next-generation VANET system. While VANET has many advantages, it must first be improved in areas such as security and privacy if it is to be widely adopted. Nearby vehicles periodically exchange events providing their unique identifiers, locations, speeds, and statuses. Using key cryptography, it must verify the legitimacy of each car in the network before allowing it to participate, and it must take the blame for any malicious activity that occurs on the road. Due to the fast speeds of vehicles, limited communication capacity, and delay sensitive applications, traditional centralised security solutions are not applicable in VANET. The purpose of this study is to imagine a new blockchain protocol for secure event transactions in a virtual autonomous network (VANET). Blockchain is a distributed ledger system that facilitates resource tracking and administration without the need for a central authority. Therefore, a blockchain-based solution that offers transparency, tamper resistance, and immutability is preferable in a VANET scenario.


Keywords


Block Chain, VANET, Key Encryption, SHA Algorithm, Consensus, Merkle Tree.


  1. S. Xiao, S. Wang, J. Zhuang, T. Wang, and J. Liu, “Research on a Task Offloading Strategy for the Internet of Vehicles Based on Reinforcement Learning,” Sensors, vol. 21, no. 18, p. 6058, Sep. 2021, doi: 10.3390/s21186058.
  2. A. Bozorgchenani, S. Maghsudi, D. Tarchi, and E. Hossain, “Computation Offloading in Heterogeneous Vehicular Edge Networks: On-Line and Off-Policy Bandit Solutions,” IEEE Transactions on Mobile Computing, vol. 21, no. 12, pp. 4233–4248, Dec. 2022, doi: 10.1109/tmc.2021.3082927.
  3. Y. Cui, L. Du, P. He, D. Wu, and R. Wang, “Cooperative vehicles‐assisted task offloading in vehicular networks,” Transactions on Emerging Telecommunications Technologies, vol. 33, no. 7, Feb. 2022, doi: 10.1002/ett.4472.
  4. “A Context-aware Task Offloading Scheme in Collaborative Vehicular Edge Computing Systems,” KSII Transactions on Internet and Information Systems, vol. 15, no. 2, Feb. 2021, doi: 10.3837/tiis.2021.02.001.
  5. E. Karimi, Y. Chen, and B. Akbari, “Task offloading in vehicular edge computing networks via deep reinforcement learning,” Computer Communications, vol. 189, pp. 193–204, May 2022, doi: 10.1016/j.comcom.2022.04.006.
  6. El Faouzi, N.-E., Leung, H., & Kurian, A. (2011). Data fusion in vehicular smart devices: Progress and challenges – A survey. Information Fusion, 12(1), 4–10.
  7. Mecheva, T., & Kakanakov, N. (2020). Cybersecurity in vehicular smart devices. Computers, 9(4), 83.
  8. E. Lee, E.-K. Lee, M. Gerla, and S. Oh, “Vehicular cloud networking: architecture and design principles,” IEEE Communications Magazine, vol. 52, no. 2, pp. 148–155, Feb. 2014, doi: 10.1109/mcom.2014.6736756.
  9. K. Kaur, S. Garg, G. S. Aujla, N. Kumar, J. J. P. C. Rodrigues, and M. Guizani, “Edge Computing in the Industrial Internet of Things Environment: Software-Defined-Networks-Based Edge-Cloud Interplay,” IEEE Communications Magazine, vol. 56, no. 2, pp. 44–51, Feb. 2018, doi: 10.1109/mcom.2018.1700622.
  10. W. Z. Khan, E. Ahmed, S. Hakak, I. Yaqoob, and A. Ahmed, “Edge computing: A survey,” Future Generation Computer Systems, vol. 97, pp. 219–235, Aug. 2019, doi: 10.1016/j.future.2019.02.050.
  11. Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system. Retrieved April 14, 2022, from https://bitcoin.org/bitcoin.pdf
  12. V. Astarita, V. P. Giofrè, G. Mirabelli, and V. Solina, “A Review of Blockchain-Based Systems in Transportation,” Information, vol. 11, no. 1, p. 21, Dec. 2019, doi: 10.3390/info11010021.
  13. Singh, M., & Kim, S. (2017). Blockchain-based intelligent vehicle data sharing framework. arXiv preprint arXiv:1708.09721.
  14. Z. Yang, K. Yang, L. Lei, K. Zheng, and V. C. M. Leung, “Blockchain-Based Decentralized Trust Management in Vehicular Networks,” IEEE Internet of Things Journal, vol. 6, no. 2, pp. 1495–1505, Apr. 2019, doi: 10.1109/jiot.2018.2836144.
  15. A. Kchaou, R. Abassi, and S. Guemara, “Toward a Distributed Trust Management scheme for VANET,” Proceedings of the 13th International Conference on Availability, Reliability and Security, Aug. 2018, doi: 10.1145/3230833.3232824.
  16. Q. Ding, B. Sun, and X. Zhang, “A Traffic-Light-Aware Routing Protocol Based on Street Connectivity for Urban Vehicular Ad Hoc Networks,” IEEE Communications Letters, vol. 20, no. 8, pp. 1635–1638, Aug. 2016, doi: 10.1109/lcomm.2016.2574708.
  17. Y. Y. Obaid Al Belushi, P. Jasmin Dennis, S. Deepa, V. Arulkumar, D. Kanchana, and R. Y. P, “A Robust Development of an Efficient Industrial Monitoring and Fault Identification Model using Internet of Things,” 2024 IEEE International Conference on Big Data & Machine Learning (ICBDML), pp. 27–32, Feb. 2024, doi: 10.1109/icbdml60909.2024.10577363.
  18. O. A. Wahab, H. Otrok, and A. Mourad, “A Dempster–Shafer Based Tit-for-Tat Strategy to Regulate the Cooperation in VANET Using QoS-OLSR Protocol,” Wireless Personal Communications, vol. 75, no. 3, pp. 1635–1667, Oct. 2013, doi: 10.1007/s11277-013-1443-y.
  19. T. Halabi and M. Zulkernine, “Trust-Based Cooperative Game Model for Secure Collaboration in the Internet of Vehicles,” ICC 2019 - 2019 IEEE International Conference on Communications (ICC), May 2019, doi: 10.1109/icc.2019.8762069.
  20. H. Wang, Z. Zheng, S. Xie, H. N. Dai, and X. Chen, “Blockchain challenges and opportunities: a survey,” International Journal of Web and Grid Services, vol. 14, no. 4, p. 352, 2018, doi: 10.1504/ijwgs.2018.10016848.
  21. F. Tschorsch and B. Scheuermann, “Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies,” IEEE Communications Surveys & Tutorials, vol. 18, no. 3, pp. 2084–2123, 2016, doi: 10.1109/comst.2016.2535718.
  22. Z. Zheng, S. Xie, H. Dai, X. Chen, and H. Wang, “An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends,” 2017 IEEE International Congress on Big Data (BigData Congress), Jun. 2017, doi: 10.1109/bigdatacongress.2017.85.
  23. H. Moudoud, L. Khoukhi, and S. Cherkaoui, “Prediction and Detection of FDIA and DDoS Attacks in 5G Enabled IoT,” IEEE Network, vol. 35, no. 2, pp. 194–201, Mar. 2021, doi: 10.1109/mnet.011.2000449.
  24. Grover, J., Gaur, M., Laxmi, V. (2016). Sybil attack in VANETs. Security of Self-Organizing Networks: MANET, WSN, WMN, VANET, 269.
  25. Grover, J., Gaur, M., Prajapati, N., & Laxmi, V. (2010). RSS-based sybil attack detection in VANETs. In Proceedings of the International Conference TENCON2010 (pp. 2278-2283). IEEE.

Acknowledgements


We would like to thank Reviewers for taking the time and effort necessary to review the manuscript. We sincerely appreciate all valuable comments and suggestions, which helped us to improve the quality of the manuscript.


Funding


No funding was received to assist with the preparation of this manuscript.


Ethics declarations


Conflict of interest

The authors have no conflicts of interest to declare that are relevant to the content of this article.


Availability of data and materials


Data sharing is not applicable to this article as no new data were created or analysed in this study.


Author information


Contributions

All authors have equal contribution in the paper and all authors have read and agreed to the published version of the manuscript.


Corresponding author


Rights and permissions


Open Access This article is licensed under a Creative Commons Attribution NoDerivs is a more restrictive license. It allows you to redistribute the material commercially or non-commercially but the user cannot make any changes whatsoever to the original, i.e. no derivatives of the original work. To view a copy of this license, visit https://creativecommons.org/licenses/by-nc-nd/4.0/


Cite this article


Shaik Mulla Almas, Kavitha K and Kalavathi Alla, “Decentralised Secure and Privacy Establishment in Vanet Using Key Encrypted Block Chain Scheme”, Journal of Machine and Computing. doi: 10.53759/7669/jmc202505004.


Copyright


© 2025 Shaik Mulla Almas, Kavitha K and Kalavathi Alla. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.