In this paper, a blockchain-based secure data sharing mechanism is proposed for Vehicular Networks (VNs). Edge service providers are introduced along with ordinary nodes to efficiently manage service provisioning. The edge service providers are placed in the neighborhood of the ordinary nodes to ensure smooth communication between them. The huge amount of data generated by smart vehicles is stored in a distributed file storage system, known as Interplanetary File System (IPFS). It is used to tackle the issues related to data storage in centralized architectures, such as data tampering, lack of privacy, vulnerability to hackers, etc. Monetary incentives are given to edge vehicle nodes to motivate them for accurate and timely service provisioning to ordinary nodes. In response, ordinary nodes give reviews to the edge nodes against the services provided by them, which are further stored in a blockchain to ensure integrity, security and transparency. Smart contracts are used to automate the system processes without the inclusion of an intermediate party and to check the reviews given to the edge nodes. To optimize gas consumption and to enhance the system performance, a Proof of Authority (PoA) consensus mechanism is used to validate the transactions. Moreover, a caching system is introduced at the edge nodes to store frequently used services. Furthermore, both security and privacy are enhanced in the proposed system by incorporating a symmetric key cryptographic mechanism. A trust management mechanism is also proposed in this work to calculate the nodes’ reputation values based upon their trust values. These values determine the authenticity of the nodes involved in the network. Eventually, it is concluded from the simulation results that the proposed system is efficient for VNs.
In smart grids, electricity theft is the most significant challenge. It cannot be identified easily since existing methods are dependent on specific devices. Also, the methods lack in extracting meaningful information from high-dimensional electricity consumption data and increase the false positive rate that limit their performance. Moreover, imbalanced data is a hurdle in accurate electricity theft detection (ETD) using data driven methods. To address this problem, sampling techniques are used in the literature. However, the traditional sampling techniques generate insufficient and unrealistic data that degrade the ETD rate. In this work, two novel ETD models are developed. A hybrid sampling approach, i.e., synthetic minority oversampling technique with edited nearest neighbor, is introduced in the first model. Furthermore, AlexNet is used for dimensionality reduction and extracting useful information from electricity consumption data. Finally, a light gradient boosting model is used for classification purpose. In the second model, conditional wasserstein generative adversarial network with gradient penalty is used to capture the real distribution of the electricity consumption data. It is constructed by adding auxiliary provisional information to generate more realistic data for the minority class. Moreover, GoogLeNet architecture is employed to reduce the dataset's dimensionality. Finally, adaptive boosting is used for classification of honest and suspicious consumers. Both models are trained and tested using real power consumption data provided by state grid corporation of China. The proposed models' performance is evaluated using different performance metrics like precision, recall, accuracy, F1-score, etc. The simulation results prove that the proposed models outperform the existing techniques, such as support vector machine, extreme gradient boosting, convolution neural network, etc., in terms of efficient ETD.
In this work, Electric Vehicles (EVs) are charged using a new and improved charging mechanism called the Mobile-Vehicle-to-Vehicle (M2V) charging strategy. It is further compared with conventional Vehicle-to-Vehicle (V2V) and Grid-to-Vehicle (G2V) charging strategies. In the proposed work, the charging of vehicles is done in a Peer-to-Peer (P2P) manner; the vehicles are charged using Charging Stations (CSs) or Mobile Vehicles (MVs) in the absence of a central entity. CSs are fixed entities situated at certain locations and act as charge suppliers, whereas MVs act as prosumers, which have the capability of charging themselves and also other vehicles. In the proposed system, blockchain technology is used to tackle the issues related with existing systems, such as privacy, security, lack of trust, etc., and also to promote transparency, data immutability, and a tamper-proof nature. Moreover, to store the data related to traffic, roads, and weather conditions, a centralized entity, i.e., Transport System Information Unit (TSIU), is used. It helps in reducing the road congestion and avoids roadside accidents. In the TSIU, an Inter-Planetary File System (IPFS) is used to store the data in a secured manner after removing the data’s redundancy through data filtration. Furthermore, four different types of costs are calculated mathematically, which ultimately contribute towards calculating the total charging cost. The shortest distance between a vehicle and the charging entities is calculated using the Great-Circle Distance formula. Moving on, both the time taken to traverse this shortest distance and the time to charge the vehicles are calculated using real-time data of four EVs. Location privacy is also proposed in this work to provide privacy to vehicle users. The power flow and the related energy losses for the above-mentioned charging strategies are also discussed in this work. An incentive provisioning mechanism is also proposed on the basis of timely delivery of credible messages, which further promotes users’ participation. In the end, simulations are performed and results are obtained that prove the efficiency of the proposed work, as compared to conventional techniques, in minimizing the EVs’ charging cost, time, and distance.
Detection of Black Hole attacks is one of the most challenging and critical routing security issues in vehicular ad hoc networks (VANETs) and autonomous and connected vehicles (ACVs). Malicious vehicles or nodes may exist in the cyber-physical path on which the data and control packets have to be routed converting a secure and reliable route into a compromised one. However, instead of passing packets to a neighbouring node, malicious nodes bypass them and drop any data packets that could contain emergency alarms. We introduce an intelligent black hole attack detection scheme (IDBA) tailored to ACV. We consider four key parameters in the design of the scheme, namely, Hop Count, Destination Sequence Number, Packet Delivery Ratio (PDR), and End-to-End delay (E2E). We tested the performance of our IDBA against AODV with Black Hole (BAODV), Intrusion Detection System (IdsAODV), and EAODV algorithms. Extensive simulation results show that our IDBA outperforms existing approaches in terms of PDR, E2E, Routing Overhead, Packet Loss Rate, and Throughput.
Traffic accidents have become an important problem for governments, researchers and vehicle manufacturers over the last few decades. However, accidents are unfortunate and frequently occur on the road and cause death, damage to infrastructure, and health injuries. Therefore, there is a need to develop a protocol to avoid or prevent traffic accidents at the extreme level in order to reduce human loss. The aim of this research is to develop a new protocol, named as the Traffic Accidents Reduction Strategy (TARS), for Vehicular Ad-hoc NETworks (VANETs) to minimize the number of road accidents, decrease the death rate caused by road accidents, and for the successful deployment of the Intelligent Transportation System (ITS). We have run multiple simulations and the results showed that our proposed scheme has outperformed DBSR and POVRP routing protocols in terms of the Message Delivery Ratio (MDR), Message Loss Ratio (MLR), Average Delay, and Basic Safety Message.
Computer networks are subject to an unprecedented number and variety of attack, the majority of which are distributed denial of service (DDoS). The nature and mechanisms employed in these DDoS attacks continually change, creating a significant challenge for detection and management. To address this evolving nature of attacks, approaches are required that can effectively detect and mitigate emerging attacks. In this paper, we provide a mechanism that not only detects the presence of a DDoS attacks but also identifies the route of attack and commences a process of mitigation at the initial stage of identification. The proposed research involves an optimized SVM classification algorithm integrated with SNORT IPS to provide prevention mechanisms for the entire network when subject to DDoS attack. The proposed IPS method allows traffic identified as legitimate to pass through the network, whereas suspect traffic is flagged and has to go through an identification system. We present the algorithm with experimental results that show better performance than simple Snort IPS, Probabilistic Neural Network (PNN), Back Propagation (BP), Chi-square, and PSO-SVM in terms of accuracy, exposure and specificity. These results show that the average accuracy rate of our method is 97 percent.
Grey wolf optimization (GWO) algorithm is a relatively recent and novel optimization approach. GWO showed performance improvement over all competing algorithms. However, the relevant literature identified that the primary GWO due to its position update equation shows superiority in exploitation, but is inefficient in exploration. It shows slow convergence and low precision, too. Motivated by the outlined issues in the primary GWO, this work presents two new and improved GWO algorithms. The first proposed variant modifies all the three models, encircling model of prey, position update equation and the hunting equation of canonical GWO. Further, a new parameter is introduced to scale the encircling and position update equations. As a result, the exploration issue of the algorithm is tackled. Unlike the first variant, the second proposed variant does not modify the position update models, but it incorporates Minkowski's information into GWO. To the best of our knowledge, no such modifications to GWO have been done before. The proposed modified versions of GWO are tested on a well-known test functions suit and then compared with different population-based algorithms, including fast evolutionary programming and particle swarm optimization. It was identified from the simulation results that proposed algorithms outperform different algorithms in comparison on majority of problems. The sensitivity study of the proposed algorithms to their various parameters is also provided. INDEX TERMS Population-based search approaches, evolutionary computation, unconstrained optimization, grey wolf optimization, global search, Minkowski's formula. The associate editor coordinating the review of this manuscript and approving it for publication was Huaqing Li.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.