BPT Scheme: Establishing Trusted Vehicular Fog Computing Service for Rural Area Based on Blockchain Approach

Passing through a rural area with a limited network infrastructure may disrupt fog computing support for vehicles. As a result, some applications on vehicles may turn off and bother the performance of the vehicular systems. In order to escape from this kind of situation, vehicular fog computing is discussed in recent times as an alternative of fog computing support while passing through a blank spot of network infrastructure. However, it is not feasible to establish a trusted vehicular fog computing service among vehicles without mutual trust. To deal with this situation, this paper proposes a method called Bidding-Price-based Transaction (BPT) for vehicular fog computing service in rural areas. This method is composed of bidding-price-based mutual trust establishment between client vehicle and server vehicle and also payoff assignment based on transaction evaluation. By applying this method, trusted fog computing service transactions between two vehicles can be achieved without the direct assistance of any trusted third party as a validating entity. The simulation results and feasibility analysis then validate the performance of the BPT scheme in rural areas. Based on feasibility analysis, we claim that the BPT scheme can be realized by adjusting vehicle speed and transmission range with respect to the size of offloaded data.

[1]  Azzedine Boukerche,et al.  Vehicular cloud computing: Architectures, applications, and mobility , 2018, Comput. Networks.

[2]  LiuYang,et al.  Incentive mechanism for computation offloading using edge computing , 2017 .

[3]  Dujuan Yang,et al.  Relationship between rural built environment and household vehicle ownership: an empirical analysis in rural Sichuan, China , 2018 .

[4]  Sriram Chellappan,et al.  Detecting Sybil attacks in vehicular networks , 2014, Journal of Trust Management.

[5]  Thomas Engel,et al.  Enabling vehicular mobility in city-wide IEEE 802.11 networks through predictive handovers , 2015, Veh. Commun..

[6]  Depeng Jin,et al.  Vehicular Fog Computing: A Viewpoint of Vehicles as the Infrastructures , 2016, IEEE Transactions on Vehicular Technology.

[7]  Nai-Wei Lo,et al.  A Reputation System for Traffic Safety Event on Vehicular Ad Hoc Networks , 2009, EURASIP J. Wirel. Commun. Netw..

[8]  Zibin Zheng,et al.  NutBaaS: A Blockchain-as-a-Service Platform , 2019, IEEE Access.

[9]  Mahadev Satyanarayanan,et al.  The Emergence of Edge Computing , 2017, Computer.

[10]  Fabrice Benhamouda,et al.  Security of the J-PAKE Password-Authenticated Key Exchange Protocol , 2015, 2015 IEEE Symposium on Security and Privacy.

[11]  Xin Wang,et al.  A Robust Detection of the Sybil Attack in Urban VANETs , 2009, 2009 29th IEEE International Conference on Distributed Computing Systems Workshops.

[12]  Jia Guo,et al.  A survey of trust computation models for service management in internet of things systems , 2017, Comput. Commun..

[13]  Nicholas R. Jennings,et al.  Certified reputation: how an agent can trust a stranger , 2006, AAMAS '06.

[14]  M. Hallenbeck,et al.  VEHICLE VOLUME DISTRIBUTIONS BY CLASSIFICATION , 1997 .

[15]  Xia Feng,et al.  A method for defensing against multi-source Sybil attacks in VANET , 2017, Peer-to-Peer Netw. Appl..

[16]  Willy Susilo,et al.  Secure Message Communication Protocol Among Vehicles in Smart City , 2018, IEEE Transactions on Vehicular Technology.

[17]  Shangguang Wang,et al.  Architecture and key technologies for Internet of Vehicles: a survey , 2017, Journal of Communications and Information Networks.

[18]  Song Guo,et al.  Blockchain Meets Edge Computing: A Distributed and Trusted Authentication System , 2020, IEEE Transactions on Industrial Informatics.

[19]  Javier López,et al.  Modelling trust dynamics in the Internet of Things , 2017, Inf. Sci..

[20]  Usman Qamar,et al.  Using Blockchain for Electronic Health Records , 2019, IEEE Access.

[21]  Nan Zhang,et al.  A resource-sharing model based on a repeated game in fog computing , 2017, Saudi journal of biological sciences.

[22]  J. Ott,et al.  The ONE simulator for DTN protocol evaluation , 2009, SimuTools.

[23]  Sayem Chaklader,et al.  Bridging Digital Divide: ‘Village wireless LAN’, a low cost network infrastructure solution for digital communication, information dissemination & education in rural Bangladesh , 2013, 2013 2nd International Conference on Advances in Electrical Engineering (ICAEE).

[24]  Masahiro Mambo,et al.  Bidding Price-Based Transaction: Trust Establishment for Vehicular Fog Computing Service in Rural Area , 2019, 2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).

[25]  Rodrigo Roman,et al.  Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges , 2016, Future Gener. Comput. Syst..

[26]  Xiaolin Chang,et al.  Reliable and Secure Vehicular Fog Service Provision , 2019, IEEE Internet of Things Journal.

[27]  Heena Rathore,et al.  Sociopsychological trust model for Wireless Sensor Networks , 2016, J. Netw. Comput. Appl..

[28]  Jianfeng Ma,et al.  LCT: A Lightweight Cross-domain Trust Model for the Mobile Distributed Environment , 2016, KSII Trans. Internet Inf. Syst..

[29]  Damla Turgut,et al.  Defense against Sybil attack in vehicular ad hoc network based on roadside unit support , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.

[30]  Chinnappan Jayakumar,et al.  Trust based authentication technique for cluster based vehicular ad hoc networks (VANET) , 2018, Wirel. Networks.

[31]  Olivier Heen,et al.  AN INDUSTRIAL AND ACADEMIC JOINT EXPERIMENT ON AUTOMATED VERIFICATION OF A SECURITY PROTOCOL , 2008 .

[32]  Jean Louis Fendji Kedieng Ebongue,et al.  Rural Wireless Mesh Network: A Design Methodology , 2015, ArXiv.

[33]  ByungKwan Lee,et al.  A DTSA (Detection Technique against a Sybil Attack) Protocol using SKC (Session Key based Certificate) on VANET , 2013 .

[34]  Mahadev Satyanarayanan,et al.  Live Synthesis of Vehicle-Sourced Data Over 4G LTE , 2017, MSWiM.

[35]  Thomas Genet A Short SPAN+AVISPA Tutorial , 2015 .

[36]  Li-Der Chou,et al.  Blockchain-Based Traffic Event Validation and Trust Verification for VANETs , 2019, IEEE Access.

[37]  Emmanuel Ndashimye,et al.  Vehicle-to-infrastructure communication over multi-tier heterogeneous networks: A survey , 2017, Comput. Networks.

[38]  Seung Yeob Nam,et al.  Regional Blockchain for Vehicular Networks to Prevent 51% Attacks , 2019, IEEE Access.

[39]  Daniel F. Macedo,et al.  Vehicular networks using the IEEE 802.11p standard: An experimental analysis , 2014, Veh. Commun..

[40]  Ciprian Dobre,et al.  Trust and reputation management for opportunistic dissemination , 2017, Pervasive Mob. Comput..

[41]  Masahiro Mambo,et al.  A Mutual Authentication Scheme for Secure Fog Computing Service Handover in Vehicular Network Environment , 2019, IEEE Access.

[42]  Daniel F. Macedo,et al.  SNVC: Social networks for vehicular certification , 2016, Comput. Networks.