A Trust-Based Reputation System for Security in the Internet of Vehicles (IoV)

Authors

  • Dhibi Nozha University of Sfax, NTS’com, Sfax, Tunisia
  • Amel Meddeb Makhlouf University of Sfax, NTS’com, Sfax, Tunisia
  • Faouzi Zerai University of Sfax, NTS’com, Sfax, Tunisia

DOI:

https://doi.org/10.15575/join.v10i2.1632

Keywords:

Internet of Vehicles (IoV) Attack Security Trust Reputation

Abstract

The Internet of Vehicles (IoV) integrates with different nodes, like for example connected vehicles, roadside units, etc. Due to communication exchange, they are exposed to various attacks on the network, which poses a security risk. Nevertheless, security is a major concern in IoV networks, especially during data transmission. To address this issue, our team suggest an innovative approach. reputation management schema in an IoV environment to detect attacks at an early stage based on vehicle and driver behavior along with network state. Our algorithm combines direct and indirect trust with various metrics like Packet Lost Rate (PLR), vehicle speed distance between neighbors, alert content, and link quality. These metrics are used to compute a reputation score to identify malicious nodes. Based on its reputation, vehicles communicate with only trusted nodes. After assessment, we see that our solution surpassed the others solution and has demonstrated superior effectiveness in detecting abnormal vehicles. Furthermore, the computed delay, equal to 4.7 ms, does not affect the network communications, which is interesting for the introduced safety features.

References

[1] Yang, C., Ma, Y., Xie, B. et al. Multi-user covert communication in power internet of things networks. Int. J. Inf. Secur. 24, 49 (2025). https://doi.org/10.1007/s10207-024-00960-7

[2] Zainab Saadoon Naser, Hend Marouane Belguith, Ahmed Fakhfakh, (2024), Traffic Management Based on Cloud and MEC Architecture with Evolutionary Approaches towards AI: A Review, "International Journal of Online and Biomedical Engineering", pp. 19-36, https://doi.org/10.3991/ijoe.v20i12.49787

[3] Iturbe-Araya, J.I., Rifà-Pous, H. Enhancing unsupervised anomaly-based cyberattacks detection in smart homes through hyperparameter optimization. Int. J. Inf. Secur. 24, 45 (2025). https://doi.org/10.1007/s10207-024-00961-6

[4] Dhibi, N., Makhlouf, A. M., & Zerai, F. (2025). Reputation-based Security for IoV Environment. IAENG International Journal of Computer Science, 52(4).

[5] Ouechtati, H., Nadia, B.A. and Lamjed, B.S. A fuzzy logic-based model for filtering dishonest recommendations in the Social Internet of Things. J Ambient Intell Human Comput 14, 6181–6200 (2023). https://doi.org/10.1007/s12652-021-03127-7

[6] N. Dhibi, A. M. Makhlouf and F. Zerai, , (2022), ” Reputation management for trusted VCC architecture,” 2022 International Wireless Communications and Mobile Computing (IWCMC), Dubrovnik, Croatiapp. 737-742, doi: 10.1109/IWCMC55113.2022.9824735.

[7] Chaogang Tang, Huaming Wu, (2022), Reputation-based service provisioning for vehicular fog computing, Journal of Systems Architecture, Volume 131, 102735, ISSN 1383-7621, https://doi.org/10.1016/j.sysarc.2022.102735.

[8] Anika Anwar, Talal Halabi, Mohammad Zulkernine, (2022), A coalitional security game against data integrity attacks in autonomous vehicle networks, Vehicular Communications, Volume 37, 100517, ISSN 2214-2096, https://doi.org/10.1016/j.vehcom.2022.100517

[9] Soumaya Bounaira, Ahmed Alioua, Ismahane Souici, Blockchain-enabled trust management for secure content caching in mobile edge computing using deep reinforcement learning, Internet of Things, Volume 25, 2024, 101081, ISSN 2542-6605, https://doi.org/10.1016/j.iot.2024.101081.

[10] Jegatheesan, D., Arumugam, C. SIoV-FTFSA-CAOA: a fuzzy trust-based approach for enhancing security and energy efficiency in social internet of vehicles. Wireless Netw (2024). https://doi.org/10.1007/s11276-023-03626-9

[11] Gaba, P.; Raw, R.S.; Kaiwartya, O.; Aljaidi, (2024), M. B-SAFE: Blockchain-Enabled Security Architecture for Connected Vehicle Fog Environment. Sensors 2024, 24, 1515. https://doi.org/10.3390/s24051515

[12] Z. Abou El Houda, H. Moudoud, B. Brik and L. Khoukhi, "Blockchain-Enabled Federated Learning for Enhanced Collaborative Intrusion Detection in Vehicular Edge Computing," in IEEE Transactions on Intelligent Transportation Systems, vol. 25, no. 7, pp. 7661-7672, July 2024, doi: 10.1109/TITS.2024.3351699.

[13] K. Gu, X. Ouyang and Y. Wang, (2024), "Malicious Vehicle Detection Scheme Based on Spatio-Temporal Features of Traffic Flow Under Cloud-Fog Computing-Based IoVs," in IEEE Transactions on Intelligent Transportation Systems, doi: 10.1109/TITS.2024.3369974.

[14] Liu, Q.; Gong, J.; Liu, Q. Blockchain-Assisted Reputation Management Scheme for Internet of Vehicles. Sensors 2023, 23, 4624. https://doi.org/10.3390/s23104624

[15] Srivastava, S., Agarwal, D., Chaurasia, B.K. et al. Blockchain-based trust management for data exchange in internet of vehicle network. Multimed Tools Appl (2024). https://doi.org/10.1007/s11042-024-18874-w

[16] Li, H., Han, D. Blockchain-assisted secure message authentication with reputation management for VANETs. J Supercomput 79, 19903–19933 (2023). https://doi.org/10.1007/s11227-023-05394-x

[17] [17] R. Chen and Y. Guan, "Hierarchical Reputation Consensus Model for VANET," in IEEE Access, vol. 13, pp. 3521-3531, 2025, doi: 10.1109/ACCESS.2024.3525188.

[18] Shan, Y. (2025). AN EFFICIENT CROSS-DOMAIN AUTHENTICATION SCHEME FOR INTERNET OF VEHICLES (IOV) BASED ON REPUTATION. Journal of Computer Science and Electrical Engineering ISSN: 2663-1946 DOI: https://doi.org/10.61784/jcsee3040

[19] Su, Z.; Cheng, R.; Li, C.; Chen, M.; Zhu, J.; Long, Y. Federated Learning and Reputation-Based Node Selection Scheme for Internet of Vehicles. Electronics 2025, 14, 303. https://doi.org/10.3390/electronics14020303

[20] D. Mukathe, W. Di, W. Ahmed and T. Worku, "Blockchain-Powered Authenticated Key Agreement Scheme with Reputation-Incentive Mechanism for Vehicle-to-Vehicle Communication in IoV," in IEEE Internet of Things Journal, doi: 10.1109/JIOT.2025.3558278

[21] Jain, A., Kumar, A., Mahadev, Chaudhary, J. K., & Singh, S. (2025). Trust‐Based Reliability Scheme for Secure Data Sharing with Internet of Vehicles Networks. Internet Technology Letters, 8(2), e70000. https://doi.org/10.1002/itl2.70000

[22] Hussain, M.; Mehmood, A.; Khan, M.A.; Khan, R.; Lloret, J. Reputation-Based Leader Selection Consensus Algorithm with Rewards for Blockchain Technology. Computers 2025, 14, 20. https://doi.org/10.3390/computers14010020.

[23] Siddiqui, S.A.; Mahmood, A.; Sheng, Q.Z.; Suzuki, H.; Ni, W. A Survey of Trust Management in the Internet of Vehicles. Electronics 2021, 10, 2223. https://doi.org/10.3390/electronics10182223

[24] Muhammad Sameer Sheikh, Jun Liang, Wensong Wang, “Security and Privacy in Vehicular Ad Hoc Network and Vehicle Cloud Computing: A Survey,”, Wireless Communications and Mobile Edge 2020. https://doi.org/10.1155/2020/5129620

[25] Jin, H., Khodaei, M., & Papadimitratos, P. (2017). Security and privacy in vehicular social networks. In Vehicular Social Networks (pp. 155-169). CRC Press.

Downloads

Published

2025-11-08

Issue

Section

Article

Citation Check

Similar Articles

<< < 1 2 3 4 > >> 

You may also start an advanced similarity search for this article.