Title | Trust and Reputation in Vehicular Networks: A Smart Contract-Based Approach |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Malik, Nisha, Nanda, Priyadarsi, He, Xiangjian, Liu, RenPing |
Conference Name | 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE) |
Date Published | aug |
Keywords | blockchain, composability, computed reputation rating, data integrity, data privacy, digital signatures, File systems, greedy authenticated nodes, Human Behavior, IPFS, Mathematical model, MatLab simulation, Metrics, Peer-to-peer computing, Protocols, pubcrawl, Repudiation, reputable trusted node, reputation, Resiliency, security, smart contract-based approach, smart contracts, traffic engineering computing, Trust, trusted centralized party, Trusted Computing, trustworthy nodes, VANETs, Vehicular Networks, verifying party |
Abstract | Appending digital signatures and certificates to messages guarantee data integrity and ensure non-repudiation, but do not identify greedy authenticated nodes. Trust evolves if some reputable and trusted node verifies the node, data and evaluates the trustworthiness of the node using an accurate metric. But, even if the verifying party is a trusted centralized party, there is opacity and obscurity in computed reputation rating. The trusted party maps it with the node's identity, but how is it evaluated and what inputs derive the reputation rating remains hidden, thus concealment of transparency leads to privacy. Besides, the malevolent nodes might collude together for defamatory actions against reliable nodes, and eventually bad mouth these nodes or praise malicious nodes collaboratively. Thus, we cannot always assume the fairness of the nodes as the rating they give to any node might not be a fair one. In this paper, we propose a smart contract-based approach to update and query the reputation of nodes, stored and maintained by IPFS distributed storage. The use case particularly deals with an emergency scenario, dealing against colluding attacks. Our scheme is implemented using MATLAB simulation. The results show how smart contracts are capable of accurately identifying trustworthy nodes and record the reputation of a node transparently and immutably. |
DOI | 10.1109/TrustCom/BigDataSE.2019.00015 |
Citation Key | malik_trust_2019 |