scispace - formally typeset
Search or ask a question
Author

Hajime Suzuki

Bio: Hajime Suzuki is an academic researcher from Commonwealth Scientific and Industrial Research Organisation. The author has contributed to research in topics: Trust management (information system). The author has an hindex of 1, co-authored 1 publications receiving 1 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: A review of the state-of-the-art in vehicular trust management focusing on the aforementioned factors such as quantification of weights, quantified threshold, misbehavior detection, etc. is presented in this paper.
Abstract: Over the past decade, the groundbreaking technological advancements in the Internet of Vehicles (IoV) coupled with the notion of trust have attracted increasing attention from researchers and experts in intelligent transportation systems (ITS), wherein vehicles establish a belief towards their peers in the pursuit of ensuring safe and efficacious traffic flows. Diverse domains have been taking advantage of trust management models in the quest of alleviating diverse insider attacks, wherein messages generated by legitimate users are altered or counterfeited by malicious entities, subsequently, endangering the lives of drivers, passengers, and vulnerable pedestrians. In the course of vehicles forming perceptions towards other participating vehicles, a range of contributing parameters regarding the interactions among these vehicles are accumulated to establish a final opinion towards a target vehicle. The significance of these contributing parameters is typically represented by associating a weighting factor to each contributing attribute. The values assigned to these weighting factors are often set manually, i.e., these values are predefined and do not take into consideration any affecting parameters. Furthermore, a threshold is specified manually that classifies the vehicles into honest and dishonest vehicles relying on the computed trust. Moreover, adversary models as an extension to trust management models in order to tackle the variants of insider attacks are being extensively emphasized in the literature. This paper, therefore, reviews the state of the art in the vehicular trust management focusing on the aforementioned factors such as quantification of weights, quantification of threshold, misbehavior detection, etc. Moreover, an overarching IoV architecture, constituents within the notion of trust, and attacks relating to the IoV have also been presented in addition to open research challenges in the subject domain.

18 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: This work has developed a priority-based fog computing model for smart urban vehicle transportation that reduces the delay and latency of fog computing and upgrades the fog computing infrastructure to meet the latency and Quality of Service (QoS) requirements.
Abstract: Connected vehicles are a vital part of smart cities, which connect over a wireless connection and bring mobile computation and communication abilities. As a mediator, fog computing resides between vehicles and the cloud and provides vehicles with processing, storage, and networking power through Vehicular Ad-hoc networks (VANET). VANET is a time-sensitive technology that requires less time to process a request received from a vehicle. Delay and latency are the notorious issues of VANET and fog computing. To deal with such problems, in this work, we developed a priority-based fog computing model for smart urban vehicle transportation that reduces the delay and latency of fog computing. To upgrade the fog computing infrastructure to meet the latency and Quality of Service (QoS) requirements, 5G localized Multi-Access Edge Computing (MEC) servers have also been used, which resulted tremendously in reducing the delay and the latency. We decreased the data latency by 20% compared to the experiment carried using only cloud computing architecture. We also reduced the processing delay by 35% compared with the utilization of cloud computing architecture.

7 citations

Journal ArticleDOI
TL;DR: In this paper , the authors proposed a trust attack management model that is integrated into the trust model, with the aim of classifying the nodes behaviors more accurately in order to ensure secure connections in the network.

7 citations

Journal ArticleDOI
01 Sep 2022-Sensors
TL;DR: A blockchain-enabled incentive trust management model is presented to enable the roadside units (RSUs) to thwart various attacks and guarantee the trustworthiness of event messages transmitted in VANETs and also motivate the senders of the traffic information and their witnesses with incentives.
Abstract: As a part of the intelligent transportation system, vehicular ad hoc networks (VANETs) provide timely information about road events and traffic to improve road safety and traffic efficiency. However, VANETs face many challenges, such as attacks from malicious vehicles, identity privacy leakage, and the absence of trust between vehicular nodes. In addition, vehicles nearby an event usually lack the motivation to participate in the traffic event validation whenever it occurs, which requires the cooperation of vehicles on the network. To solve these problems, a blockchain-enabled incentive trust model with a privacy-preserving threshold ring signature scheme for VANETs is proposed. Firstly, a threshold ring signature scheme is designed in order to allow participants in the non-trusted environment to anonymously witness the message’s authenticity and reliability while guaranteeing the vehicle’s privacy. Second, a blockchain-enabled incentive trust management model is presented to enable the roadside units (RSUs) to thwart various attacks and guarantee the trustworthiness of event messages transmitted in VANETs and also motivate the senders of the traffic information and their witnesses with incentives. Finally, to improve efficiency, a practical Byzantine fault-tolerant consensus mechanism is used. Our proposed system is demonstrated to be effective and secure for VANETs, according to both security analysis and performance evaluation.

7 citations