SecureTrust-PI: A Privacy-Integrity Trust Management Model for Vehicular Edge-Cloud

Authors

  • Shilpa Department of Computer Science & Engineering, REVA University, Bangalore, India
  • T. Prasanth Research Guide Department of Computer Science and Engineering, REVA University, Bangalore, India
Volume: 15 | Issue: 6 | Pages: 30669-30675 | December 2025 | https://doi.org/10.48084/etasr.11697

Abstract

Vehicular Ad-Hoc Networks (VANETs) integrated with Vehicular Edge-Cloud (VEC) frameworks enable seamless Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) communication, enhancing both traffic safety and efficiency. However, VANET-enabled VEC environments are highly vulnerable to cyber threats, including unauthorized access, data tampering, and identity spoofing. Meanwhile, existing security solutions primarily focus on authentication and privacy, often neglecting data integrity, which leaves the system susceptible to manipulation attacks. To address this limitation, we propose the SecureTrust-PI model, which incorporates attack detection and misclassification minimization while optimizing network performance through efficient trust evaluation and integrity-preserving mechanisms. The model's performance was validated on an Internet of Vehicles (IoV) attack dataset under six adversarial scenarios ranging from 5% to 30% attack intensity and was compared against Practical Byzantine Fault Tolerance (PBFT). Results demonstrate that SecureTrust-PI consistently outperforms PBFT, achieving improvements of 26.16% in attack detection, 25.96% in misclassification reduction, 14.58% in throughput, 23.63% in delay, and 35.08% in energy efficiency.

Keywords:

attack detection, integrity, privacy, security, trust model, Vehicular Ad-Hoc Networks (VANETs), vehicular edge cloud

Downloads

Download data is not yet available.

References

W. Arellano and I. Mahgoub, "A VANET, Multi-Hop-Enabled, Dynamic Traffic Assignment for Road Networks," Electronics, vol. 14, no. 3, Jan. 2025, Art. no. 559. DOI: https://doi.org/10.3390/electronics14030559

Y. Gan, X. Xie, and Y. Liu, "A Privacy-Preserving V2I Fast Authentication Scheme in VANETs," Electronics, vol. 13, no. 12, Jun. 2024, Art. no. 2369. DOI: https://doi.org/10.3390/electronics13122369

H. Alabdouli, M. S. Hassan, and A. Abdelfatah, "Enhancing Route Guidance with Integrated V2X Communication and Transportation Systems: A Review," Smart Cities, vol. 8, no. 1, Feb. 2025, Art. no. 24. DOI: https://doi.org/10.3390/smartcities8010024

C. Gheorghe and A. Soica, "Revolutionizing Urban Mobility: A Systematic Review of AI, IoT, and Predictive Analytics in Adaptive Traffic Control Systems for Road Networks," Electronics, vol. 14, no. 4, Feb. 2025, Art. no. 719. DOI: https://doi.org/10.3390/electronics14040719

Z.-R. Tzoannos, D. Kosmanos, A. Xenakis, and C. Chaikalis, "The Impact of Spoofing Attacks in Connected Autonomous Vehicles under Traffic Congestion Conditions," Telecom, vol. 5, no. 3, pp. 747–759, Aug. 2024. DOI: https://doi.org/10.3390/telecom5030037

N. Khatri, S. Lee, and S. Y. Nam, "Sybil Attack-Resistant Blockchain-Based Proof-of-Location Mechanism with Privacy Protection in VANET," Sensors, vol. 24, no. 24, Dec. 2024, Art. no. 8140. DOI: https://doi.org/10.3390/s24248140

O. Polat, S. Oyucu, M. Türkoğlu, H. Polat, A. Aksoz, and F. Yardımcı, "Hybrid AI-Powered Real-Time Distributed Denial of Service Detection and Traffic Monitoring for Software-Defined-Based Vehicular Ad Hoc Networks: A New Paradigm for Securing Intelligent Transportation Networks," Applied Sciences, vol. 14, no. 22, Nov. 2024, Art. no. 10501. DOI: https://doi.org/10.3390/app142210501

A. Borah and A. Paranjothi, "Enhancing VANET Security: An Unsupervised Learning Approach for Mitigating False Information Attacks in VANETs," Electronics, vol. 14, no. 1, Dec. 2024, Art. no. 58. DOI: https://doi.org/10.3390/electronics14010058

Y. Zhan, W. Xie, R. Shi, Y. Huang, and X. Zheng, "Dynamic Privacy-Preserving Anonymous Authentication Scheme for Condition-Matching in Fog-Cloud-Based VANETs," Sensors, vol. 24, no. 6, Mar. 2024, Art. no. 1773. DOI: https://doi.org/10.3390/s24061773

Z. S. Alzaidi, A. A. Yassin, Z. A. Abduljabbar, and V. O. Nyangaresi, "A Fog Computing and Blockchain-based Anonymous Authentication Scheme to Enhance Security in VANET Environments," Engineering, Technology & Applied Science Research, vol. 15, no. 1, pp. 19143–19153, Feb. 2025. DOI: https://doi.org/10.48084/etasr.8663

Y. Li, R. Bi, N. Jiang, F. Li, M. Wang, and X. Jing, "Methods and Challenges of Cryptography-Based Privacy-Protection Algorithms for Vehicular Networks," Electronics, vol. 13, no. 12, Jun. 2024, Art. no. 2372. DOI: https://doi.org/10.3390/electronics13122372

S. Wang, Z. Fan, Y. Su, B. Zheng, Z. Liu, and Y. Dai, "A Lightweight, Efficient, and Physically Secure Key Agreement Authentication Protocol for Vehicular Networks," Electronics, vol. 13, no. 8, Apr. 2024, Art. no. 1418. DOI: https://doi.org/10.3390/electronics13081418

X. Xu et al., "Hybrid Trust Model for Node-Centric Misbehavior Detection in Dynamic Behavior-Homogeneous Clusters," Applied Sciences, vol. 15, no. 4, Feb. 2025, Art. no. 2020. DOI: https://doi.org/10.3390/app15042020

I. S. Alkhalifa and A. S. Almogren, "Enhancing Security and Scalability in Vehicular Networks: A Bayesian DAG Blockchain Approach With Edge-Assisted RSU," IEEE Access, vol. 12, pp. 116558–116571, 2024. DOI: https://doi.org/10.1109/ACCESS.2024.3429184

S. J. Ibrahim and H. Beitollahi, "PPA6-IoV: A Six-Step Privacy-Preserving Authentication Protocol for the Internet of Vehicles," IEEE Access, vol. 12, pp. 168120–168134, 2024. DOI: https://doi.org/10.1109/ACCESS.2024.3459948

S. Jamal Ibrahim and H. Beitollahi, "PPAD-W: A Novel Privacy-Preserving Authentication With Dynamic IPs Window for IoV Networks," IEEE Access, vol. 12, pp. 164737–164749, 2024. DOI: https://doi.org/10.1109/ACCESS.2024.3493624

M. M. Alshahrani, "A Verifiable Discrete Trust Model (VDTM) Using Congruent Federated Learning (CFL) for Social Internet of Vehicles," IEEE Open Journal of Vehicular Technology, vol. 5, pp. 1441–1456, 2024. DOI: https://doi.org/10.1109/OJVT.2024.3468164

S. Hussain, S. Tahir, A. Masood, and H. Tahir, "Blockchain-Enabled Secure Communication Framework for Enhancing Trust and Access Control in the Internet of Vehicles (IoV)," IEEE Access, vol. 12, pp. 110992–111006, 2024. DOI: https://doi.org/10.1109/ACCESS.2024.3431279

A. Bibi et al., "TR-Block: A Trustable Content Delivery Approach in VANET Through Blockchain," IEEE Access, vol. 12, pp. 60863–60875, 2024. DOI: https://doi.org/10.1109/ACCESS.2024.3386461

H. Han, M. Zhang, Z. Xu, X. Dong, and Z. Wang, "Decentralized Trust Management and Incentive Mechanisms for Secure Information Sharing in VANET," IEEE Access, vol. 12, pp. 124414–124427, 2024. DOI: https://doi.org/10.1109/ACCESS.2024.3453368

Z. Ma et al., "A Blockchain-Based Secure Distributed Authentication Scheme for Internet of Vehicles," IEEE Access, vol. 12, pp. 81471–81482, 2024. DOI: https://doi.org/10.1109/ACCESS.2024.3409361

S. Naskar, G. Hancke, T. Zhang, and M. Gidlund, "Pseudo-Random Identification and Efficient Privacy-Preserving V2X Communication for IoV Networks," IEEE Access, vol. 13, pp. 1147–1163, 2025. DOI: https://doi.org/10.1109/ACCESS.2024.3523358

CIC IoV dataset. (2024), E. C. P. Neto, H. Taslimasa, S. Dadkhah, S. Iqbal, P. Xiong, T. Rahmanb, and A. A. Ghorbani. [Online]. Available: https://www.unb.ca/cic/datasets/iov-dataset-2024.html.

E. C. P. Neto et al., "CICIoV2024: Advancing realistic IDS approaches against DoS and spoofing attack in IoV CAN bus," Internet of Things, vol. 26, Jul. 2024, Art. no. 101209. DOI: https://doi.org/10.1016/j.iot.2024.101209

N. Ababneh and J. N. Al-Karaki, "On the Lifetime Analytics of IoT Networks," in 2020 International Conference on Communication and Signal Processing (ICCSP), Chennai, India, Jul. 2020, pp. 1086–1090. DOI: https://doi.org/10.1109/ICCSP48568.2020.9182272

N. Gadde, B. Jakkali, R. B. H. Siddamallaih, and G. Gowrishankar, "Quality of experience aware network selection model for service provisioning in heterogeneous network," International Journal of Electrical and Computer Engineering (IJECE), vol. 12, no. 2, pp. 1839-1848, Apr. 2022. DOI: https://doi.org/10.11591/ijece.v12i2.pp1839-1848

Downloads

How to Cite

[1]
. Shilpa and T. Prasanth, “SecureTrust-PI: A Privacy-Integrity Trust Management Model for Vehicular Edge-Cloud”, Eng. Technol. Appl. Sci. Res., vol. 15, no. 6, pp. 30669–30675, Dec. 2025.

Metrics

Abstract Views: 211
PDF Downloads: 190

Metrics Information