TrustVote: Privacy-preserving node ranking in vehicular networks
Journal article
Authors | Muhammad AJmal, Azad, Samiran, Bag, Simon, Parkinson and Feng, Hao |
---|---|
Abstract | The Internet of Vehicles (IoV) is the network of connected vehicles and transport infrastructure units (Roadside Units (RSU)), which utilizes emerging wireless systems (4G, 5G, LTE) for the communication and sharing of information. The network of connected vehicles enables users to disseminate critical information about events happening on the road (for example accidents, traffic congestions, and hazards). The exchange of information between vehicles and roadside units could improve the driving experience and road safety, as well as help drivers to identify the hazardous and safe routes in a timely manner. The sharing of critical information between vehicles is advantageous to the driver; however, at the same time, malicious actors could mislead drivers by spreading fraudulent and fake messages. Fraudulent messages can have a negative impact on the infrastructure, and more significantly, have potential to cause threats to life. It is therefore essential that vehicles can evaluate the credibility of those who send messages (vehicles or roadside units) before taking any action. In this paper, we present TrustVote, a collaborative crowdsourcing-based vehicle reputation system that enables vehicles to evaluate the credibility of other vehicles in a connected vehicular network. The TrustVote system allows participating vehicles to hide their rating/feedback scores and the list of interacted vehicles under a homomorphic cryptographic layer, which can only be unfolded as an aggregate. The proposed approach also considers the trust weight of a vehicle providing the rating scores while computing the aggregate reputation of the vehicles. A prototype of TrustVote is developed and its performance is evaluated in terms of the computational and communication overheads. |
Keywords | Privacy-preservation; Vehicular networks; Private Crowdsourcing.; Secure Multi-party Computation; Reputation system |
Year | 2018 |
Journal | IEEE Internet of Things Journal |
Publisher | IEEE |
ISSN | 23274662 |
Digital Object Identifier (DOI) | https://doi.org/10.1109/JIOT.2018.2880839 |
Web address (URL) | http://hdl.handle.net/10545/623784 |
hdl:10545/623784 | |
Publication dates | 12 Nov 2018 |
Publication process dates | |
Deposited | 24 May 2019, 15:26 |
Accepted | 31 Oct 2018 |
Contributors | Derby University, Warwick University, Huddersfield University and Warwick University |
File | File Access Level Open |
https://repository.derby.ac.uk/item/95057/trustvote-privacy-preserving-node-ranking-in-vehicular-networks
Download files
65
total views0
total downloads7
views this month0
downloads this month
Export as
Related outputs

Large-scale Data Integration Using Graph Probabilistic Dependencies (GPDs)
Zada, Muhammad Sadiq Hassan, Yuan, Bo, Anjum, Ashiq, Azad, Muhammad Ajmal, Khan, Wajahat Ali and Reiff-Marganiec, Stephan 2020. Large-scale Data Integration Using Graph Probabilistic Dependencies (GPDs). IEEE. https://doi.org/10.1109/bdcat50828.2020.00028
Persation: an IoT based personal safety prediction model aided solution
Alofe, Olasunkanmi Matthew, Fatema, Kaniz, Azad, Muhammad Ajmal and Kurugollu, Fatih 2020. Persation: an IoT based personal safety prediction model aided solution. International Journal of Computing and Digital Systems.
Privacy-preserving crowd-sensed trust aggregation in the user-centeric internet of people networks
Azad, Muhammad, Perera, Charith, Bag, Samiran, Barhamgi, Mahmoud and Hao, Feng 2020. Privacy-preserving crowd-sensed trust aggregation in the user-centeric internet of people networks. ACM Transactions on Cyber-Physical Systems. https://doi.org/10.1145/3446431
Designing privacy-aware internet of things applications
Perera, Charith, Barhamgi, Mahmoud, Bandara, Arosha K., Ajmal, Muhammad, Price, Blaine and Nuseibeh, Bashar 2019. Designing privacy-aware internet of things applications. Elsevier Information Sciences. https://doi.org/10.1016/j.ins.2019.09.061
Authentic-caller: Self-enforcing authentication in a next generation network
Azad, Muhammad Ajmal, Bag, Samiran, Perera, Charith, Barhamgi, Mahmoud and Hao, Feng 2019. Authentic-caller: Self-enforcing authentication in a next generation network. IEEE Transactions on Industrial Informatics. https://doi.org/10.1109/tii.2019.2941724
CRT-BIoV: A cognitive radio technique for blockchain-enabled internet of vehicles
Rathee, Geetanjali, Ahmad, F., Kurugollu, Fatih, Azad, Muhammad, Iqbal, Razi and Imran, Muhammad 2020. CRT-BIoV: A cognitive radio technique for blockchain-enabled internet of vehicles. IEEE Transactions on Intelligent Transportation Systems. https://doi.org/10.1109/TITS.2020.3004718
A first look at privacy analysis of COVID-19 contact tracing mobile applications
Azad, Muhammad Ajmal, Arshad, Junaid, Akmal, Syed Muhammad Ali, Riaz, Farhan, Abdullah, Sidrah, Imran, Muhammad and Ahmad, F. 2020. A first look at privacy analysis of COVID-19 contact tracing mobile applications. IEEE Internet of Things Journal. https://doi.org/10.1109/JIOT.2020.3024180
PriVeto: a fully private two round veto protocol.
Samiran, Bag, Muhammad Ajmal, Azad and Feng, Hao 2018. PriVeto: a fully private two round veto protocol. IET Information Security. https://doi.org/10.1049/iet-ifs.2018.5115
M2M-REP: Reputation system for machines in the internet of things.
Azad, Muhammad Ajmal, Bag, Samiran, Hao, Feng and Salah, Khaled 2018. M2M-REP: Reputation system for machines in the internet of things. Computers & Security. 79, pp. 1-16. https://doi.org/10.1016/j.cose.2018.07.014
Consumer-facing technology fraud: Economics, attack methods and potential solutions
Mohammed Aamir, Ali, Muhammad AJmal, Azad, Mario Parreno, Centeno, Feng, Hao and Aad Van, Moorsel 2019. Consumer-facing technology fraud: Economics, attack methods and potential solutions. Future Generation Computer Systems. https://doi.org/10.1016/j.future.2019.03.041