Journal article 340 views 58 downloads
A comparative analysis of multi‐criteria decision methods for secure beacon selection in vehicular platoons
Transactions on Emerging Telecommunications Technologies, Volume: 34, Issue: 11
Swansea University Authors: Hoang Nguyen , Siraj Shaikh
-
PDF | Version of Record
© 2023 The Authors. This is an open access article under the terms of the Creative Commons Attribution-NonCommercial-NoDerivs License, which permits use and distribution in any medium, provided the original work is properly cited, the use is non-commercial and no modifications or adaptations are made.
Download (2.82MB)
DOI (Published version): 10.1002/ett.4841
Abstract
Vehicle platoons are a novel transportation technology which not only aims to ensure traffic safety but also create a positive impact on the environment by producing low COurn:x-wiley:ett:media:ett4841:ett4841-math-0001 emissions. Vehicle platoons rely heavily on wireless communication to ensure tha...
Published in: | Transactions on Emerging Telecommunications Technologies |
---|---|
ISSN: | 2161-3915 2161-3915 |
Published: |
Wiley
2023
|
Online Access: |
Check full text
|
URI: | https://cronfa.swan.ac.uk/Record/cronfa63997 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
first_indexed |
2023-08-18T10:48:23Z |
---|---|
last_indexed |
2023-08-18T10:48:23Z |
id |
cronfa63997 |
recordtype |
SURis |
fullrecord |
<?xml version="1.0" encoding="utf-8"?><rfc1807 xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema"><bib-version>v2</bib-version><id>63997</id><entry>2023-07-31</entry><title>A comparative analysis of multi‐criteria decision methods for secure beacon selection in vehicular platoons</title><swanseaauthors><author><sid>cb24d5c5080534dc5b5e3390f24dd422</sid><ORCID>0000-0003-0260-1697</ORCID><firstname>Hoang</firstname><surname>Nguyen</surname><name>Hoang Nguyen</name><active>true</active><ethesisStudent>false</ethesisStudent></author><author><sid>50117e8faac2d0937989e14847105704</sid><ORCID>0000-0002-0726-3319</ORCID><firstname>Siraj</firstname><surname>Shaikh</surname><name>Siraj Shaikh</name><active>true</active><ethesisStudent>false</ethesisStudent></author></swanseaauthors><date>2023-07-31</date><deptcode>SCS</deptcode><abstract>Vehicle platoons are a novel transportation technology which not only aims to ensure traffic safety but also create a positive impact on the environment by producing low COurn:x-wiley:ett:media:ett4841:ett4841-math-0001 emissions. Vehicle platoons rely heavily on wireless communication to ensure that vehicles (leader and members) moving at high speed can keep close formation by exchanging beacons containing significant, authentic and accurate information. However, the presence of malicious attackers launching different attacks such as false data injection (FDI) can compromise the security of vehicle platoons by tampering with the beacons. Therefore, to avoid FDI attacks, we relied on multi-criteria decision methods (MCDM)-based methods in order to select the optimum beacon to share authentic and accurate information with the member vehicles. In this study, three MCDM methods including weighted sum model, technique for order of preference by similarity to ideal solution and preference ranking organization method for enrichment of evaluations (PROMETHEE-II) are studied and compared with the aim to enable the platoons to select the optimum beacon for communication. We performed extensive simulations to evaluate the performance of these methods in the presence of three FDI attacker models from four different aspects, that is, safety, stability, environmental, and cyber security. Our results demonstrate that MCDM-based methods can increase network efficiency, but at the cost of a trade-off between safety and cyber security.</abstract><type>Journal Article</type><journal>Transactions on Emerging Telecommunications Technologies</journal><volume>34</volume><journalNumber>11</journalNumber><paginationStart/><paginationEnd/><publisher>Wiley</publisher><placeOfPublication/><isbnPrint/><isbnElectronic/><issnPrint>2161-3915</issnPrint><issnElectronic>2161-3915</issnElectronic><keywords/><publishedDay>1</publishedDay><publishedMonth>11</publishedMonth><publishedYear>2023</publishedYear><publishedDate>2023-11-01</publishedDate><doi>10.1002/ett.4841</doi><url>http://dx.doi.org/10.1002/ett.4841</url><notes/><college>COLLEGE NANME</college><department>Computer Science</department><CollegeCode>COLLEGE CODE</CollegeCode><DepartmentCode>SCS</DepartmentCode><institution>Swansea University</institution><apcterm>Another institution paid the OA fee</apcterm><funders/><projectreference/><lastEdited>2024-01-03T14:24:51.3422742</lastEdited><Created>2023-07-31T09:19:09.9186628</Created><path><level id="1">Faculty of Science and Engineering</level><level id="2">School of Mathematics and Computer Science - Computer Science</level></path><authors><author><firstname>Sean Joe</firstname><surname>Taylor</surname><orcid>0000-0001-7926-9800</orcid><order>1</order></author><author><firstname>Farhan</firstname><surname>Ahmad</surname><order>2</order></author><author><firstname>Hoang</firstname><surname>Nguyen</surname><orcid>0000-0003-0260-1697</orcid><order>3</order></author><author><firstname>Siraj</firstname><surname>Shaikh</surname><orcid>0000-0002-0726-3319</orcid><order>4</order></author><author><firstname>Jeremy</firstname><surname>Bryans</surname><order>5</order></author><author><firstname>Charles E.</firstname><surname>Wartnaby</surname><order>6</order></author></authors><documents><document><filename>63997__28315__a0e773bc39aa4e35a2056126b4f473d9.pdf</filename><originalFilename>63997.VOR.pdf</originalFilename><uploaded>2023-08-18T11:46:35.2459109</uploaded><type>Output</type><contentLength>2957697</contentLength><contentType>application/pdf</contentType><version>Version of Record</version><cronfaStatus>true</cronfaStatus><documentNotes>© 2023 The Authors. This is an open access article under the terms of the Creative Commons Attribution-NonCommercial-NoDerivs License, which permits use and distribution in any medium,
provided the original work is properly cited, the use is non-commercial and no modifications or adaptations are made.</documentNotes><copyrightCorrect>true</copyrightCorrect><language>eng</language><licence>http://creativecommons.org/licenses/by-nc-nd/4.0/</licence></document></documents><OutputDurs/></rfc1807> |
spelling |
v2 63997 2023-07-31 A comparative analysis of multi‐criteria decision methods for secure beacon selection in vehicular platoons cb24d5c5080534dc5b5e3390f24dd422 0000-0003-0260-1697 Hoang Nguyen Hoang Nguyen true false 50117e8faac2d0937989e14847105704 0000-0002-0726-3319 Siraj Shaikh Siraj Shaikh true false 2023-07-31 SCS Vehicle platoons are a novel transportation technology which not only aims to ensure traffic safety but also create a positive impact on the environment by producing low COurn:x-wiley:ett:media:ett4841:ett4841-math-0001 emissions. Vehicle platoons rely heavily on wireless communication to ensure that vehicles (leader and members) moving at high speed can keep close formation by exchanging beacons containing significant, authentic and accurate information. However, the presence of malicious attackers launching different attacks such as false data injection (FDI) can compromise the security of vehicle platoons by tampering with the beacons. Therefore, to avoid FDI attacks, we relied on multi-criteria decision methods (MCDM)-based methods in order to select the optimum beacon to share authentic and accurate information with the member vehicles. In this study, three MCDM methods including weighted sum model, technique for order of preference by similarity to ideal solution and preference ranking organization method for enrichment of evaluations (PROMETHEE-II) are studied and compared with the aim to enable the platoons to select the optimum beacon for communication. We performed extensive simulations to evaluate the performance of these methods in the presence of three FDI attacker models from four different aspects, that is, safety, stability, environmental, and cyber security. Our results demonstrate that MCDM-based methods can increase network efficiency, but at the cost of a trade-off between safety and cyber security. Journal Article Transactions on Emerging Telecommunications Technologies 34 11 Wiley 2161-3915 2161-3915 1 11 2023 2023-11-01 10.1002/ett.4841 http://dx.doi.org/10.1002/ett.4841 COLLEGE NANME Computer Science COLLEGE CODE SCS Swansea University Another institution paid the OA fee 2024-01-03T14:24:51.3422742 2023-07-31T09:19:09.9186628 Faculty of Science and Engineering School of Mathematics and Computer Science - Computer Science Sean Joe Taylor 0000-0001-7926-9800 1 Farhan Ahmad 2 Hoang Nguyen 0000-0003-0260-1697 3 Siraj Shaikh 0000-0002-0726-3319 4 Jeremy Bryans 5 Charles E. Wartnaby 6 63997__28315__a0e773bc39aa4e35a2056126b4f473d9.pdf 63997.VOR.pdf 2023-08-18T11:46:35.2459109 Output 2957697 application/pdf Version of Record true © 2023 The Authors. This is an open access article under the terms of the Creative Commons Attribution-NonCommercial-NoDerivs License, which permits use and distribution in any medium, provided the original work is properly cited, the use is non-commercial and no modifications or adaptations are made. true eng http://creativecommons.org/licenses/by-nc-nd/4.0/ |
title |
A comparative analysis of multi‐criteria decision methods for secure beacon selection in vehicular platoons |
spellingShingle |
A comparative analysis of multi‐criteria decision methods for secure beacon selection in vehicular platoons Hoang Nguyen Siraj Shaikh |
title_short |
A comparative analysis of multi‐criteria decision methods for secure beacon selection in vehicular platoons |
title_full |
A comparative analysis of multi‐criteria decision methods for secure beacon selection in vehicular platoons |
title_fullStr |
A comparative analysis of multi‐criteria decision methods for secure beacon selection in vehicular platoons |
title_full_unstemmed |
A comparative analysis of multi‐criteria decision methods for secure beacon selection in vehicular platoons |
title_sort |
A comparative analysis of multi‐criteria decision methods for secure beacon selection in vehicular platoons |
author_id_str_mv |
cb24d5c5080534dc5b5e3390f24dd422 50117e8faac2d0937989e14847105704 |
author_id_fullname_str_mv |
cb24d5c5080534dc5b5e3390f24dd422_***_Hoang Nguyen 50117e8faac2d0937989e14847105704_***_Siraj Shaikh |
author |
Hoang Nguyen Siraj Shaikh |
author2 |
Sean Joe Taylor Farhan Ahmad Hoang Nguyen Siraj Shaikh Jeremy Bryans Charles E. Wartnaby |
format |
Journal article |
container_title |
Transactions on Emerging Telecommunications Technologies |
container_volume |
34 |
container_issue |
11 |
publishDate |
2023 |
institution |
Swansea University |
issn |
2161-3915 2161-3915 |
doi_str_mv |
10.1002/ett.4841 |
publisher |
Wiley |
college_str |
Faculty of Science and Engineering |
hierarchytype |
|
hierarchy_top_id |
facultyofscienceandengineering |
hierarchy_top_title |
Faculty of Science and Engineering |
hierarchy_parent_id |
facultyofscienceandengineering |
hierarchy_parent_title |
Faculty of Science and Engineering |
department_str |
School of Mathematics and Computer Science - Computer Science{{{_:::_}}}Faculty of Science and Engineering{{{_:::_}}}School of Mathematics and Computer Science - Computer Science |
url |
http://dx.doi.org/10.1002/ett.4841 |
document_store_str |
1 |
active_str |
0 |
description |
Vehicle platoons are a novel transportation technology which not only aims to ensure traffic safety but also create a positive impact on the environment by producing low COurn:x-wiley:ett:media:ett4841:ett4841-math-0001 emissions. Vehicle platoons rely heavily on wireless communication to ensure that vehicles (leader and members) moving at high speed can keep close formation by exchanging beacons containing significant, authentic and accurate information. However, the presence of malicious attackers launching different attacks such as false data injection (FDI) can compromise the security of vehicle platoons by tampering with the beacons. Therefore, to avoid FDI attacks, we relied on multi-criteria decision methods (MCDM)-based methods in order to select the optimum beacon to share authentic and accurate information with the member vehicles. In this study, three MCDM methods including weighted sum model, technique for order of preference by similarity to ideal solution and preference ranking organization method for enrichment of evaluations (PROMETHEE-II) are studied and compared with the aim to enable the platoons to select the optimum beacon for communication. We performed extensive simulations to evaluate the performance of these methods in the presence of three FDI attacker models from four different aspects, that is, safety, stability, environmental, and cyber security. Our results demonstrate that MCDM-based methods can increase network efficiency, but at the cost of a trade-off between safety and cyber security. |
published_date |
2023-11-01T14:24:53Z |
_version_ |
1787079576350883840 |
score |
11.037603 |