logo

SCIENCE CHINA Information Sciences, Volume 63 , Issue 12 : 220305(2020) https://doi.org/10.1007/s11432-019-2835-4

An authentication and plausibility model for big data analytic under LOS and NLOS conditions in 5G-VANET

More info
  • ReceivedNov 1, 2019
  • AcceptedMar 16, 2020
  • PublishedNov 12, 2020

Abstract


Acknowledgment

This work was supported by Ministry of Education, Malaysia, in collaboration with the Research Management Center, Universiti Teknologi Malaysia (Grant No. Q.J130000.2451.04G80), Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia (Grant No. GGPM-2020-029), and partially supported by King Saud University (Grant No. RSP-2019/12), Riyadh, Saudi Arabia.


References

[1] Anjum S S, Noor R M, Anisi M H. Review on MANET Based Communication for Search and Rescue Operations. Wireless Pers Commun, 2017, 94: 31-52 CrossRef Google Scholar

[2] Soleymani, Seyed Ahmad, Abdul Hanan Abdullah, Wan Haslina Hassan, Mohammad Hossein Anisi, Shidrokh Goudarzi, Mir Ali Rezazadeh Baee, and Satria Mandala. Trust management in vehicular ad hoc network: a systematic review. EURASIP Journal on Wireless Communications and Networking, 2015, 2015: 146. Google Scholar

[3] Al-Sultan S, Al-Doori M M, Al-Bayatti A H. A comprehensive survey on vehicular Ad Hoc network. J Network Comput Appl, 2014, 37: 380-392 CrossRef Google Scholar

[4] Hua L C, Anisi M H, Yee P L. Social networking-based cooperation mechanisms in vehicular ad-hoc network-a survey. Vehicular Commun, 2017, 10: 57-73 CrossRef Google Scholar

[5] Sedjelmaci H, Sidi Mohammed Senouci, and Mosa Ali Abu-Rgheff. An efficient and lightweight intrusion detection mechanism for service-oriented vehicular networks. IEEE Internet of things journal 1, 2014, 6: 570-577 DOI: 10.1109/JIOT.2014.2366120. Google Scholar

[6] Bismeyer N, Mauthofer S, Bayarou K M, et al. Assessment of node trustworthiness in vanets using data plausibility checks with particle filters. In: Proceedings of 2012 IEEE Vehicular Networking Conference (VNC), 2012. 78--85. Google Scholar

[7] Manvi S S, Tangade S. A survey on authentication schemes in VANETs for secured communication. Vehicular Commun, 2017, 9: 19-30 CrossRef Google Scholar

[8] Garg S, Singh A, Kaur K. Edge Computing-Based Security Framework for Big Data Analytics in VANETs. IEEE Network, 2019, 33: 72-81 CrossRef Google Scholar

[9] Ge F, Tan L. Network utility maximization in two-way flow scenario. SIGCOMM Comput Commun Rev, 2014, 44: 13-19 CrossRef Google Scholar

[10] Soleymani S A, Abdullah A H, Zareei M. A Secure Trust Model Based on Fuzzy Logic in Vehicular Ad Hoc Networks With Fog Computing. IEEE Access, 2017, 5: 15619-15629 CrossRef Google Scholar

[11] Pournaghi S M, Zahednejad B, Bayat M. NECPPA: A novel and efficient conditional privacy-preserving authentication scheme for VANET. Comput Networks, 2018, 134: 78-92 CrossRef Google Scholar

[12] Lu R X, Lin X D. ECPP: efficient conditional privacy preservation protocol. In: Proceedings of the 27th Conference on Computer Communications, 2015. 51--70. Google Scholar

[13] Huang D, Misra S, Verma M. PACP: An Efficient Pseudonymous Authentication-Based Conditional Privacy Protocol for VANETs. IEEE Trans Intell Transp Syst, 2011, 12: 736-746 CrossRef Google Scholar

[14] Tangade, Shrikant, Sunilkumar S. Manvi, and Pascal Lorenz. Decentralized and scalable privacy-preserving authentication scheme in VANETs. IEEE Transactions on Vehicular Technology2018, 67.9: 8647-8655 DOI: 10.1109/TVT.2018.2839979. Google Scholar

[15] Chen Y M, Wei Y C. A beacon-based trust management system for enhancing user centric location privacy in VANETs. J Commun Netw, 2013, 15: 153-163 CrossRef Google Scholar

[16] Lo N-W, Tsai H-C. Illusion attack on vanet applications-a message plausibility problem. In: Proceedings of 2007 IEEE Globecom Workshops, 2007. 1--8. Google Scholar

[17] Boeira F, Asplund M, Barcellos M P. Vouch: a secure proof-of-location scheme for vanets. In: Proceedings of the 21st ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, 2018. 241--248. Google Scholar

[18] Goudarzi S, Abdullah A H, Mandala S, et al. A systematic review of security in vehicular ad hoc network. In: Proceedings of the 2nd Symposium on Work Sheet Control Number, 2013. 1--10. Google Scholar

[19] Singh A, Garg S, Kaur R, et al. Probabilistic data structures for big data analytics: a comprehensive review. Knowledge-Based Syst, 2019, 188: 104987. Google Scholar

[20] Bender M A, Farach-Colton M, Johnson R. Don't thrash. Proc VLDB Endow, 2012, 5: 1627-1637 CrossRef Google Scholar

[21] Fan B, Andersen D G, Kaminsky M, et al. Cuckoo filter: practically better than bloom. In: Proceedings of the 10th ACM International on Conference on Emerging Networking Experiments and Technologies, 2014. 75--88. Google Scholar

[22] Pagh R, Rodler F F. Cuckoo hashing. J Algorithms, 2004, 51: 122-144 CrossRef Google Scholar

[23] Soleymani S A, Abdullah A H, Anisi M H. BRAIN-F: Beacon Rate Adaption Based on Fuzzy Logic in Vehicular Ad Hoc Network. Int J Fuzzy Syst, 2017, 19: 301-315 CrossRef Google Scholar

[24] Limouchi E, Mahgoub I. BEFLAB: bandwidth efficient fuzzy logic-assisted broadcast for VANET. In: Proceedings of IEEE Symposium on Computational Intelligence, 2016. 1--8. Google Scholar

[25] Khan, Shafiullah, and Jaime Lloret Mauri, eds. Security for multihop wireless networks. Crc Press, 2014. Google Scholar

[26] Shaikh R A, Alzahrani A S. Intrusion-aware trust model for vehicular ad hoc networks. Security Comm Networks, 2014, 7: 1652-1669 CrossRef Google Scholar

[27] Huang, Zhen. On reputation and data-centric misbehavior detection mechanisms for vanet. Dissertation for Ph.D. Degree. Ottawa: University of Ottawa, 2011. Google Scholar

[28] Abumansoor, Osama, and Azzedine Boukerche. A secure cooperative approach for nonline-of-sight location verification in VANET. IEEE Transactions on Vehicular Technology, 2011, 61: 275-285 DOI: 10.1109/TVT.2011.2174465. Google Scholar

[29] Shah, Saleh, Babar Shah, Adnan Amin, Feras Al-Obeidat, Francis Chow, Fernando Joaquim Lopes Moreira, and Sajid Anwar. Compromised user credentials detection in a digital enterprise using behavioral analytics. Future Generation Computer Systems, 2019, 93: 407-417 DOI: 10.1016/j.future.2018.09.064. Google Scholar

[30] Davis J, Goadrich M. The relationship between precision-recall and ROC curves. In: Proceedings of the 23rd International Conference on Machine Learning, 2006. 233--240. Google Scholar

[31] Garca Villalba, Luis Javier, Ana Lucila Sandoval Orozco, Alicia Trivino Cabrera, and Claudia Jacy Barenco Abbas. Routing protocols in wireless sensor networks. sensors 2009, 9: 8399-8421 DOI: 10.3390/s91108399. Google Scholar

[32] Kumar, Nagesh, and Yashwant Singh. Routing protocols in wireless sensor networks. In: Handbook of Research on Advanced Wireless Sensor Network Applications, Protocols, and Architectures, IGI Global, 2017. 86--128. Google Scholar