SecureTrust-PI: A Privacy-Integrity Trust Management Model for Vehicular Edge-Cloud
Corresponding author: Shilpa
Abstract
Vehicular Ad-Hoc Networks (VANETs) integrated with Vehicular Edge-Cloud (VEC) frameworks enable seamless Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) communication, enhancing both traffic safety and efficiency. However, VANET-enabled VEC environments are highly vulnerable to cyber threats, including unauthorized access, data tampering, and identity spoofing. Meanwhile, existing security solutions primarily focus on authentication and privacy, often neglecting data integrity, which leaves the system susceptible to manipulation attacks. To address this limitation, we propose the SecureTrust-PI model, which incorporates attack detection and misclassification minimization while optimizing network performance through efficient trust evaluation and integrity-preserving mechanisms. The model's performance was validated on an Internet of Vehicles (IoV) attack dataset under six adversarial scenarios ranging from 5% to 30% attack intensity and was compared against Practical Byzantine Fault Tolerance (PBFT). Results demonstrate that SecureTrust-PI consistently outperforms PBFT, achieving improvements of 26.16% in attack detection, 25.96% in misclassification reduction, 14.58% in throughput, 23.63% in delay, and 35.08% in energy efficiency.
Keywords:
attack detection, integrity, privacy, security, trust model, Vehicular Ad-Hoc Networks (VANETs), vehicular edge cloudDownloads
References
W. Arellano and I. Mahgoub, "A VANET, Multi-Hop-Enabled, Dynamic Traffic Assignment for Road Networks," Electronics, vol. 14, no. 3, Jan. 2025, Art. no. 559. DOI: https://doi.org/10.3390/electronics14030559
Y. Gan, X. Xie, and Y. Liu, "A Privacy-Preserving V2I Fast Authentication Scheme in VANETs," Electronics, vol. 13, no. 12, Jun. 2024, Art. no. 2369. DOI: https://doi.org/10.3390/electronics13122369
H. Alabdouli, M. S. Hassan, and A. Abdelfatah, "Enhancing Route Guidance with Integrated V2X Communication and Transportation Systems: A Review," Smart Cities, vol. 8, no. 1, Feb. 2025, Art. no. 24. DOI: https://doi.org/10.3390/smartcities8010024
C. Gheorghe and A. Soica, "Revolutionizing Urban Mobility: A Systematic Review of AI, IoT, and Predictive Analytics in Adaptive Traffic Control Systems for Road Networks," Electronics, vol. 14, no. 4, Feb. 2025, Art. no. 719. DOI: https://doi.org/10.3390/electronics14040719
Z.-R. Tzoannos, D. Kosmanos, A. Xenakis, and C. Chaikalis, "The Impact of Spoofing Attacks in Connected Autonomous Vehicles under Traffic Congestion Conditions," Telecom, vol. 5, no. 3, pp. 747–759, Aug. 2024. DOI: https://doi.org/10.3390/telecom5030037
N. Khatri, S. Lee, and S. Y. Nam, "Sybil Attack-Resistant Blockchain-Based Proof-of-Location Mechanism with Privacy Protection in VANET," Sensors, vol. 24, no. 24, Dec. 2024, Art. no. 8140. DOI: https://doi.org/10.3390/s24248140
O. Polat, S. Oyucu, M. Türkoğlu, H. Polat, A. Aksoz, and F. Yardımcı, "Hybrid AI-Powered Real-Time Distributed Denial of Service Detection and Traffic Monitoring for Software-Defined-Based Vehicular Ad Hoc Networks: A New Paradigm for Securing Intelligent Transportation Networks," Applied Sciences, vol. 14, no. 22, Nov. 2024, Art. no. 10501. DOI: https://doi.org/10.3390/app142210501
A. Borah and A. Paranjothi, "Enhancing VANET Security: An Unsupervised Learning Approach for Mitigating False Information Attacks in VANETs," Electronics, vol. 14, no. 1, Dec. 2024, Art. no. 58. DOI: https://doi.org/10.3390/electronics14010058
Y. Zhan, W. Xie, R. Shi, Y. Huang, and X. Zheng, "Dynamic Privacy-Preserving Anonymous Authentication Scheme for Condition-Matching in Fog-Cloud-Based VANETs," Sensors, vol. 24, no. 6, Mar. 2024, Art. no. 1773. DOI: https://doi.org/10.3390/s24061773
Z. S. Alzaidi, A. A. Yassin, Z. A. Abduljabbar, and V. O. Nyangaresi, "A Fog Computing and Blockchain-based Anonymous Authentication Scheme to Enhance Security in VANET Environments," Engineering, Technology & Applied Science Research, vol. 15, no. 1, pp. 19143–19153, Feb. 2025. DOI: https://doi.org/10.48084/etasr.8663
Y. Li, R. Bi, N. Jiang, F. Li, M. Wang, and X. Jing, "Methods and Challenges of Cryptography-Based Privacy-Protection Algorithms for Vehicular Networks," Electronics, vol. 13, no. 12, Jun. 2024, Art. no. 2372. DOI: https://doi.org/10.3390/electronics13122372
S. Wang, Z. Fan, Y. Su, B. Zheng, Z. Liu, and Y. Dai, "A Lightweight, Efficient, and Physically Secure Key Agreement Authentication Protocol for Vehicular Networks," Electronics, vol. 13, no. 8, Apr. 2024, Art. no. 1418. DOI: https://doi.org/10.3390/electronics13081418
X. Xu et al., "Hybrid Trust Model for Node-Centric Misbehavior Detection in Dynamic Behavior-Homogeneous Clusters," Applied Sciences, vol. 15, no. 4, Feb. 2025, Art. no. 2020. DOI: https://doi.org/10.3390/app15042020
I. S. Alkhalifa and A. S. Almogren, "Enhancing Security and Scalability in Vehicular Networks: A Bayesian DAG Blockchain Approach With Edge-Assisted RSU," IEEE Access, vol. 12, pp. 116558–116571, 2024. DOI: https://doi.org/10.1109/ACCESS.2024.3429184
S. J. Ibrahim and H. Beitollahi, "PPA6-IoV: A Six-Step Privacy-Preserving Authentication Protocol for the Internet of Vehicles," IEEE Access, vol. 12, pp. 168120–168134, 2024. DOI: https://doi.org/10.1109/ACCESS.2024.3459948
S. Jamal Ibrahim and H. Beitollahi, "PPAD-W: A Novel Privacy-Preserving Authentication With Dynamic IPs Window for IoV Networks," IEEE Access, vol. 12, pp. 164737–164749, 2024. DOI: https://doi.org/10.1109/ACCESS.2024.3493624
M. M. Alshahrani, "A Verifiable Discrete Trust Model (VDTM) Using Congruent Federated Learning (CFL) for Social Internet of Vehicles," IEEE Open Journal of Vehicular Technology, vol. 5, pp. 1441–1456, 2024. DOI: https://doi.org/10.1109/OJVT.2024.3468164
S. Hussain, S. Tahir, A. Masood, and H. Tahir, "Blockchain-Enabled Secure Communication Framework for Enhancing Trust and Access Control in the Internet of Vehicles (IoV)," IEEE Access, vol. 12, pp. 110992–111006, 2024. DOI: https://doi.org/10.1109/ACCESS.2024.3431279
A. Bibi et al., "TR-Block: A Trustable Content Delivery Approach in VANET Through Blockchain," IEEE Access, vol. 12, pp. 60863–60875, 2024. DOI: https://doi.org/10.1109/ACCESS.2024.3386461
H. Han, M. Zhang, Z. Xu, X. Dong, and Z. Wang, "Decentralized Trust Management and Incentive Mechanisms for Secure Information Sharing in VANET," IEEE Access, vol. 12, pp. 124414–124427, 2024. DOI: https://doi.org/10.1109/ACCESS.2024.3453368
Z. Ma et al., "A Blockchain-Based Secure Distributed Authentication Scheme for Internet of Vehicles," IEEE Access, vol. 12, pp. 81471–81482, 2024. DOI: https://doi.org/10.1109/ACCESS.2024.3409361
S. Naskar, G. Hancke, T. Zhang, and M. Gidlund, "Pseudo-Random Identification and Efficient Privacy-Preserving V2X Communication for IoV Networks," IEEE Access, vol. 13, pp. 1147–1163, 2025. DOI: https://doi.org/10.1109/ACCESS.2024.3523358
CIC IoV dataset. (2024), E. C. P. Neto, H. Taslimasa, S. Dadkhah, S. Iqbal, P. Xiong, T. Rahmanb, and A. A. Ghorbani. [Online]. Available: https://www.unb.ca/cic/datasets/iov-dataset-2024.html.
E. C. P. Neto et al., "CICIoV2024: Advancing realistic IDS approaches against DoS and spoofing attack in IoV CAN bus," Internet of Things, vol. 26, Jul. 2024, Art. no. 101209. DOI: https://doi.org/10.1016/j.iot.2024.101209
N. Ababneh and J. N. Al-Karaki, "On the Lifetime Analytics of IoT Networks," in 2020 International Conference on Communication and Signal Processing (ICCSP), Chennai, India, Jul. 2020, pp. 1086–1090. DOI: https://doi.org/10.1109/ICCSP48568.2020.9182272
N. Gadde, B. Jakkali, R. B. H. Siddamallaih, and G. Gowrishankar, "Quality of experience aware network selection model for service provisioning in heterogeneous network," International Journal of Electrical and Computer Engineering (IJECE), vol. 12, no. 2, pp. 1839-1848, Apr. 2022. DOI: https://doi.org/10.11591/ijece.v12i2.pp1839-1848
Downloads
How to Cite
License
Copyright (c) 2025 Shilpa, T. Prashanth

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.
