Abstract
The growing number of smart vehicles makes it possible to envision a crowdsensing service where vehicles can share video data of their surroundings for seeking out traffic conditions and car accidents ahead. However, the service may need to deal with situations like malicious vehicles propagating false information to divert other vehicles to arrive at destinations earlier or lead them to dangerous locations. This article proposes a context-aware trust estimation scheme that can allow roadside units in a vehicular edge network to provide real-time crowdsensing services in a reliable manner by selectively using information from trustworthy sources. Our proposed scheme is novel in that its trust estimation does not require any prior knowledge of vehicles on roads but quickly obtains the accurate trust value of each vehicle by leveraging transfer learning. and its Q-learning-based dynamic adjustment scheme autonomously estimates trust levels of oncoming vehicles with the aim of detecting malicious vehicles and accordingly filtering out untrustworthy input from them. Based on an extensive simulation study, we prove that the proposed scheme outperforms existing ones in terms of malicious vehicle detection accuracy.
- [1] . 2017. Novel trust framework for vehicular networks. IEEE Transactions on Vehicular Technology 66, 10 (2017), 9498–9511.Google Scholar
Cross Ref
- [2] . 2013. Trust-based service selection in public cloud computing using fuzzy modified VIKOR method. Australian Journal of Basic and Applied Sciences 7, 9 (2013), 211–220.Google Scholar
- [3] . 2011. Effect of shoulder width, guardrail and roadway geometry on driver perception and behavior. Accident Analysis & Prevention 43, 6 (2011), 2142–2152.Google Scholar
Cross Ref
- [4] . 2005. A trust-based context-aware access control model for web-services. Distributed and Parallel Databases 18, 1 (2005), 83–105.Google Scholar
Digital Library
- [5] . 2007. Trust-based service provider selection in open environments. In Proceedings of the 2007 ACM Symposium on Applied Computing. ACM, New York, NY, 1375–1380.Google Scholar
Digital Library
- [6] . 2007. Improving the exploration strategy in bandit algorithms. In Proceedings of the International Conference on Learning and Intelligent Optimization. 56–68.Google Scholar
- [7] . 2018. TMEC: A trust management based on evidence combination on attack-resistant and collaborative internet of vehicles. IEEE Access 7 (2018), 148913–148922.Google Scholar
Cross Ref
- [8] . 2019. Data-driven task allocation for multi-task transfer learning on the edge. In Proceedings of the 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS’19). IEEE, Los Alamitos, CA, 1040–1050.Google Scholar
Cross Ref
- [9] . 2017. A cloud-based trust management framework for vehicular social networks. IEEE Access 5 (2017), 2967–2980.Google Scholar
Cross Ref
- [10] . 2015. A survey on trust modeling. ACM Computing Surveys 48, 2 (2015), 28.Google Scholar
Digital Library
- [11] . 2019. Mobile network intrusion detection for IoT system based on transfer learning algorithm. Cluster Computing 22, 4 (2019), 9889–9904.Google Scholar
Digital Library
- [12] . 2003. Learning rates for Q-learning.Journal of Machine Learning Research 5, 1 (2003), 1–25.Google Scholar
- [13] . 1995. Continuous univariate distributions, volume 1. Technometrics 37 (Nov. 1995), 466. Google Scholar
Cross Ref
- [14] . 2011. Mobile crowdsensing: Current state and future challenges. IEEE Communications Magazine 49, 11 (2011), 32–39.Google Scholar
Cross Ref
- [15] . 2020. TROVE: A context awareness trust model for VANETs using reinforcement learning. IEEE Internet of Things Journal 7, 7 (2020), 6647–6662.Google Scholar
Cross Ref
- [16] . 2010. Recklessness in context: Individual and situational correlates to aggressive driving. Environment and Behavior 42, 1 (2010), 44–60.Google Scholar
Cross Ref
- [17] . 2019. Path planning for intelligent robots based on deep Q-learning with experience replay and heuristic knowledge. IEEE/CAA Journal of Automatica Sinica 7, 4 (2019), 1179–1189.Google Scholar
Cross Ref
- [18] . 2019. Deep imitation learning for autonomous vehicles based on convolutional neural networks. IEEE/CAA Journal of Automatica Sinica 7, 1 (2019), 82–95.Google Scholar
Cross Ref
- [19] . 2018. Learning IoT in edge: Deep learning for the Internet of Things with edge computing. IEEE Network 32, 1 (2018), 96–101.Google Scholar
Cross Ref
- [20] . 2012. A reputation-based announcement scheme for VANETs. IEEE Transactions on Vehicular Technology 61, 9 (2012), 4095–4108.Google Scholar
Cross Ref
- [21] . 2016. ART: An attack-resistant trust management scheme for securing vehicular ad hoc networks. IEEE Transactions on Intelligent Transportation Systems 17, 4 (2016), 960–969.Google Scholar
Digital Library
- [22] . 2020. Artificial intelligence applications in the development of autonomous vehicles: A survey. IEEE/CAA Journal of Automatica Sinica 7, 2 (2020), 315–329.Google Scholar
Cross Ref
- [23] . 2015. A trust model of cloud computing based on quality of service. Annals of Operations Research 233, 1 (2015), 281–292.Google Scholar
- [24] . 2012. TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks. Journal of Network and Computer Applications 35, 3 (2012), 934–941.Google Scholar
Digital Library
- [25] . 1994. Formalising Trust as a Computational Concept.
Ph.D. Dissertation . University of Stirling.Google Scholar - [26] . 2010. A survey on transfer learning. IEEE Transactions on Knowledge and Data Engineering 22, 10 (2010), 1345–1359.Google Scholar
Digital Library
- [27] . 2006. Seeing I to I: A pathway to interpersonal connectedness.Journal of Personality and Social Psychology 90, 2 (2006), 243.Google Scholar
Cross Ref
- [28] . 2008. On data-centric trust establishment in ephemeral ad hoc networks. In Proceedings of the 2008 IEEE 27th Conference on Computer Communications (IEEE INFOCOM’08). IEEE, Los Alamitos, CA, 1238–1246.Google Scholar
Cross Ref
- [29] . 2013. Trust management system design for the Internet of Things: A context-aware and multi-service approach. Computers & Security 39 (2013), 351–365.Google Scholar
Digital Library
- [30] . 2004. Aggressive driving: An observational study of driver, vehicle, and situational variables. Accident Analysis & Prevention 36, 3 (2004), 429–437.Google Scholar
Cross Ref
- [31] . 2019. Distributed multi-agent preference learning for an IoT-enriched smart space. In Proceedings of the 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS’19). IEEE, Los Alamitos, CA, 2090–2100.Google Scholar
Cross Ref
- [32] . 2018. Reinforcement Learning: An Introduction. MIT Press, Cambridge, MA.Google Scholar
Digital Library
- [33] . 2010. Transfer learning. In Handbook of Research on Machine Learning Applications and Trends: Algorithms, Methods, and Techniques. IGI Global, 242–264.Google Scholar
Cross Ref
- [34] . 2018. With great training comes great vulnerability: Practical attacks against transfer learning. In Proceedings of the 27th USENIX Security Symposium (USENIX Security’18). 1281–1297. https://www.usenix.org/conference/usenixsecurity18/presentation/wang-bolun.Google Scholar
- [35] . 2016. CATrust: Context-aware trust management for service-oriented ad hoc networks. IEEE Transactions on Services Computing 11, 6 (2016), 908–921.Google Scholar
Cross Ref
- [36] . 1992. Q-learning. Machine Learning 8, 3–4 (1992), 279–292.Google Scholar
Digital Library
- [37] . 2019. Trust-evaluation-based intrusion detection and reinforcement learning in autonomous driving. IEEE Network 33, 5 (2019), 54–60.Google Scholar
Digital Library
- [38] . 2020. Context-Aware trust estimation for realtime crowdsensing services in vehicular edge networks. In Proceedings of the 2020 IEEE 17th Annual Consumer Communications and Networking Conference (CCNC’20). IEEE, Los Alamitos, CA, 1–6.Google Scholar
Digital Library
- [39] . 2018. A deep reinforcement learning-based trust management scheme for software-defined vehicular networks. In Proceedings of the 8th ACM Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications. 1–7.Google Scholar
Digital Library
- [40] . 2013. Risk factors associated with traffic violations and accident severity in China. Accident Analysis & Prevention 59 (2013), 18–25.Google Scholar
Cross Ref
- [41] . 2018. A domain partition-based trust model for unreliable clouds. IEEE Transactions on Information Forensics and Security 13, 9 (2018), 2167–2178.Google Scholar
Cross Ref
- [42] . 2020. Security and trust in blockchains: Architecture, key technologies, and open issues. IEEE Transactions on Computational Social Systems 7, 3 (2020), 790–801.Google Scholar
Cross Ref
- [43] . 2018. Security and trust issues in fog computing: A survey. Future Generation Computer Systems 88 (2018), 16–27.Google Scholar
Digital Library
- [44] . 2019. A double-blind anonymous evaluation-based trust model in cloud computing environments. IEEE Transactions on Systems, Man, and Cybernetics: Systems 51, 3 (2019), 1805–1816.Google Scholar
Cross Ref
- [45] . 2019. Collaborative cloud-edge computation for personalized driving behavior modeling. In Proceedings of the 4th ACM/IEEE Symposium on Edge Computing. 209–221.Google Scholar
Digital Library
- [46] . 2020. Abnormal activity detection in edge computing: A transfer learning approach. In Proceedings of the 2020 International Conference on Computing, Networking, and Communications (ICNC’20). IEEE, Los Alamitos, CA, 107–111.Google Scholar
Cross Ref
- [47] . 2018. RTSense: Providing reliable trust-based crowdsensing services in CVCC. IEEE Network 32, 3 (2018), 20–26.Google Scholar
Cross Ref
Index Terms
CARES: Context-Aware Trust Estimation for Realtime Crowdsensing Services in Vehicular Edge Networks
Recommendations
Context-Aware Trust Estimation for Realtime Crowdsensing Services in Vehicular Edge Networks
2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC)This work proposes a context-aware trust estimation scheme that can allow roadside units in a vehicular edge network to provide real-time crowdsensing services in a reliable manner by selectively using information from trustworthy sources. Our proposed ...
Trust Evaluation for Data Exchange in Vehicular Networks: Poster Abstract
IoTDI '17: Proceedings of the Second International Conference on Internet-of-Things Design and ImplementationIn Vehicular (Ad-hoc) Network (VANET), besides Vehicle-to-Vehicle communications (V2V), vehicles in VANET also exchange data with Road-Side-Units (RSUs) and Cellular Base Stations (Vehicle-to-Infrastructure communications (V2I)). With the introduction ...
Real-time traffic estimation at vehicular edge nodes
SEC '17: Proceedings of the Second ACM/IEEE Symposium on Edge ComputingTraffic estimation has been a long-studied problem, but prior work has mostly provided coarse estimates over large areas. This work proposes effective fine-grained traffic volume estimation using in-vehicle dashboard mounted cameras. Existing work on ...






Comments