Yingxun Wang,Adnan Mahmood,Mohamad Faizrizwan Mohd Sabri,Hushairi Zen,Lee Chin Kho
Abstract:The emerging yet promising paradigm of the Internet of Vehicles (IoV) has recently gained considerable attention from researchers from academia and industry. As an indispensable constituent of the futuristic smart cities, the underlying essence of the IoV is to facilitate vehicles to exchange safety-critical information with the other vehicles in their neighborhood, vulnerable pedestrians, supporting infrastructure, and the backbone network via vehicle-to-everything communication in a bid to enhance the road safety by mitigating the unwarranted road accidents via ensuring safer navigation together with guaranteeing the intelligent traffic flows. This requires that the safety-critical messages exchanged within an IoV network and the vehicles that disseminate the same are highly reliable (i.e., trustworthy); otherwise, the entire IoV network could be jeopardized. A state-of-the-art trust-based mechanism is, therefore, highly imperative for identifying and removing malicious vehicles from an IoV network. Accordingly, in this paper, a machine learning-based trust management mechanism, MESMERIC, has been proposed that takes into account the notions of direct trust (encompassing the trust attributes of interaction success rate, similarity, familiarity, and reward and punishment), indirect trust (involving confidence of a particular trustor on the neighboring nodes of a trustee, and the direct trust between the said neighboring nodes and the trustee), and context (comprising vehicle types and operating scenarios) in order to not only ascertain the trust of vehicles in an IoV network but to segregate the trustworthy vehicles from the untrustworthy ones by means of an optimal decision boundary. A comprehensive evaluation of the envisaged trust management mechanism has been carried out which demonstrates that it outperforms other state-of-the-art trust management mechanisms.
engineering, electrical & electronic,chemistry, analytical,instruments & instrumentation
What problem does this paper attempt to address?
The problem that this paper attempts to solve is how to ensure the security and reliability of communication between vehicles in the Internet of Vehicles (IoV) environment. Specifically, due to the characteristics of openness, dynamic topology, and high mobility in the Internet of Vehicles, it is vulnerable to attacks. Malicious entities may tamper with legitimate security messages, spread forged information, or delay message forwarding, thereby endangering human lives. Therefore, an effective trust management mechanism is required to identify and remove malicious vehicles to ensure the security and reliability of the Internet of Vehicles.
To solve this problem, the paper proposes a machine - learning - based trust management mechanism named MESMERIC, which aims to evaluate the trustworthiness of vehicles by considering direct trust, indirect trust, and context factors, and distinguish between trustworthy and untrustworthy vehicles. The following are the main components of this mechanism:
1. **Direct Trust**: It includes trust attributes such as interaction success rate, similarity, familiarity, and reward - punishment mechanism.
2. **Indirect Trust**: It involves the recommender trust of the trustor about the trustee from its neighbor nodes, and the trust level of the trustor in these recommendations.
3. **Context Factors**: They include vehicle types and operation scenarios. For example, vehicle interactions are more frequent in urban environments, while establishing trust is more challenging in highway environments.
By combining these factors, MESMERIC can evaluate the trustworthiness of vehicles more accurately and distinguish between trustworthy and untrustworthy vehicles through the optimal decision boundary. In addition, this mechanism has also been comprehensively evaluated, and the results show that its performance is better than other existing trust management mechanisms.
### Related Formulas
- **Interaction Success Rate (ISR)**:
\[
ISR_{i,j,t}=\frac{\sum_{t' = 1}^{t}R_{i,j,t'}}{\sum_{t' = 1}^{t}S_{i,t'}}
\]
where \(\sum_{t' = 1}^{t}R_{i,j,t'}\) represents the total number of messages successfully received by the trustee \(j\) from the trustor \(i\), and \(\sum_{t' = 1}^{t}S_{i,t'}\) represents the total number of messages sent by the trustor \(i\) during this period.
- **Similarity (Sim)**:
\[
Sim_{i,j,t}=w_{ES}ES_{i,j,t}+w_{IS}IS_{i,j,t}
\]
where \(w_{ES}\) and \(w_{IS}\) are the weights of external similarity \(ES_{i,j,t}\) and internal similarity \(IS_{i,j,t}\) respectively, and \(w_{ES}+w_{IS} = 1\).
- **External Similarity (ES)**:
\[
ES_{i,j,t}=\sum_{t' = 1}^{t}w_{Es_{t'}}ES_{i,j,t'}
\]
where \(w_{Es_{t'}}\) is the weight of external similarity at time \(t'\), and \(w_{Es_{t'}}+w_{Is_{t'}}= 1\).
- **Internal Similarity (IS)**:
\[
IS_{i,j,t}=\sum_{t' = 1}^{t}w_{Is_{t'}}IS_{i,j,t'}
\]
where \(w_{Is_{t'}}\) is the weight of internal similarity at time \(t'\).
- **External Similarity Calculation**:
\[
ES_{i,j,t'}=\begin{cases}1, &\text{if }C_{vi,t'}=C_{vj,t'}\\0, &\text{if }C_{vi,t'}\neq C_{vj,t'}\end{cases}
\]
- **Internal Similarity Calculation**:
\[
IS_{i,j,t'}=\frac{Pos_{i,j,t'}+Dir_{i,j,t'}+Vel_{i,j,t'}}{3}
\]
where...