No Cover Image

Journal article 340 views 58 downloads

A comparative analysis of multi‐criteria decision methods for secure beacon selection in vehicular platoons

Sean Joe Taylor Orcid Logo, Farhan Ahmad, Hoang Nguyen Orcid Logo, Siraj Shaikh Orcid Logo, Jeremy Bryans, Charles E. Wartnaby

Transactions on Emerging Telecommunications Technologies, Volume: 34, Issue: 11

Swansea University Authors: Hoang Nguyen Orcid Logo, Siraj Shaikh Orcid Logo

  • 63997.VOR.pdf

    PDF | Version of Record

    © 2023 The Authors. This is an open access article under the terms of the Creative Commons Attribution-NonCommercial-NoDerivs License, which permits use and distribution in any medium, provided the original work is properly cited, the use is non-commercial and no modifications or adaptations are made.

    Download (2.82MB)

Check full text

DOI (Published version): 10.1002/ett.4841

Abstract

Vehicle platoons are a novel transportation technology which not only aims to ensure traffic safety but also create a positive impact on the environment by producing low COurn:x-wiley:ett:media:ett4841:ett4841-math-0001 emissions. Vehicle platoons rely heavily on wireless communication to ensure tha...

Full description

Published in: Transactions on Emerging Telecommunications Technologies
ISSN: 2161-3915 2161-3915
Published: Wiley 2023
Online Access: Check full text

URI: https://cronfa.swan.ac.uk/Record/cronfa63997
Tags: Add Tag
No Tags, Be the first to tag this record!
first_indexed 2023-08-18T10:48:23Z
last_indexed 2023-08-18T10:48:23Z
id cronfa63997
recordtype SURis
fullrecord <?xml version="1.0" encoding="utf-8"?><rfc1807 xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema"><bib-version>v2</bib-version><id>63997</id><entry>2023-07-31</entry><title>A comparative analysis of multi‐criteria decision methods for secure beacon selection in vehicular platoons</title><swanseaauthors><author><sid>cb24d5c5080534dc5b5e3390f24dd422</sid><ORCID>0000-0003-0260-1697</ORCID><firstname>Hoang</firstname><surname>Nguyen</surname><name>Hoang Nguyen</name><active>true</active><ethesisStudent>false</ethesisStudent></author><author><sid>50117e8faac2d0937989e14847105704</sid><ORCID>0000-0002-0726-3319</ORCID><firstname>Siraj</firstname><surname>Shaikh</surname><name>Siraj Shaikh</name><active>true</active><ethesisStudent>false</ethesisStudent></author></swanseaauthors><date>2023-07-31</date><deptcode>SCS</deptcode><abstract>Vehicle platoons are a novel transportation technology which not only aims to ensure traffic safety but also create a positive impact on the environment by producing low COurn:x-wiley:ett:media:ett4841:ett4841-math-0001 emissions. Vehicle platoons rely heavily on wireless communication to ensure that vehicles (leader and members) moving at high speed can keep close formation by exchanging beacons containing significant, authentic and accurate information. However, the presence of malicious attackers launching different attacks such as false data injection (FDI) can compromise the security of vehicle platoons by tampering with the beacons. Therefore, to avoid FDI attacks, we relied on multi-criteria decision methods (MCDM)-based methods in order to select the optimum beacon to share authentic and accurate information with the member vehicles. In this study, three MCDM methods including weighted sum model, technique for order of preference by similarity to ideal solution and preference ranking organization method for enrichment of evaluations (PROMETHEE-II) are studied and compared with the aim to enable the platoons to select the optimum beacon for communication. We performed extensive simulations to evaluate the performance of these methods in the presence of three FDI attacker models from four different aspects, that is, safety, stability, environmental, and cyber security. Our results demonstrate that MCDM-based methods can increase network efficiency, but at the cost of a trade-off between safety and cyber security.</abstract><type>Journal Article</type><journal>Transactions on Emerging Telecommunications Technologies</journal><volume>34</volume><journalNumber>11</journalNumber><paginationStart/><paginationEnd/><publisher>Wiley</publisher><placeOfPublication/><isbnPrint/><isbnElectronic/><issnPrint>2161-3915</issnPrint><issnElectronic>2161-3915</issnElectronic><keywords/><publishedDay>1</publishedDay><publishedMonth>11</publishedMonth><publishedYear>2023</publishedYear><publishedDate>2023-11-01</publishedDate><doi>10.1002/ett.4841</doi><url>http://dx.doi.org/10.1002/ett.4841</url><notes/><college>COLLEGE NANME</college><department>Computer Science</department><CollegeCode>COLLEGE CODE</CollegeCode><DepartmentCode>SCS</DepartmentCode><institution>Swansea University</institution><apcterm>Another institution paid the OA fee</apcterm><funders/><projectreference/><lastEdited>2024-01-03T14:24:51.3422742</lastEdited><Created>2023-07-31T09:19:09.9186628</Created><path><level id="1">Faculty of Science and Engineering</level><level id="2">School of Mathematics and Computer Science - Computer Science</level></path><authors><author><firstname>Sean Joe</firstname><surname>Taylor</surname><orcid>0000-0001-7926-9800</orcid><order>1</order></author><author><firstname>Farhan</firstname><surname>Ahmad</surname><order>2</order></author><author><firstname>Hoang</firstname><surname>Nguyen</surname><orcid>0000-0003-0260-1697</orcid><order>3</order></author><author><firstname>Siraj</firstname><surname>Shaikh</surname><orcid>0000-0002-0726-3319</orcid><order>4</order></author><author><firstname>Jeremy</firstname><surname>Bryans</surname><order>5</order></author><author><firstname>Charles E.</firstname><surname>Wartnaby</surname><order>6</order></author></authors><documents><document><filename>63997__28315__a0e773bc39aa4e35a2056126b4f473d9.pdf</filename><originalFilename>63997.VOR.pdf</originalFilename><uploaded>2023-08-18T11:46:35.2459109</uploaded><type>Output</type><contentLength>2957697</contentLength><contentType>application/pdf</contentType><version>Version of Record</version><cronfaStatus>true</cronfaStatus><documentNotes>© 2023 The Authors. This is an open access article under the terms of the Creative Commons Attribution-NonCommercial-NoDerivs License, which permits use and distribution in any medium, provided the original work is properly cited, the use is non-commercial and no modifications or adaptations are made.</documentNotes><copyrightCorrect>true</copyrightCorrect><language>eng</language><licence>http://creativecommons.org/licenses/by-nc-nd/4.0/</licence></document></documents><OutputDurs/></rfc1807>
spelling v2 63997 2023-07-31 A comparative analysis of multi‐criteria decision methods for secure beacon selection in vehicular platoons cb24d5c5080534dc5b5e3390f24dd422 0000-0003-0260-1697 Hoang Nguyen Hoang Nguyen true false 50117e8faac2d0937989e14847105704 0000-0002-0726-3319 Siraj Shaikh Siraj Shaikh true false 2023-07-31 SCS Vehicle platoons are a novel transportation technology which not only aims to ensure traffic safety but also create a positive impact on the environment by producing low COurn:x-wiley:ett:media:ett4841:ett4841-math-0001 emissions. Vehicle platoons rely heavily on wireless communication to ensure that vehicles (leader and members) moving at high speed can keep close formation by exchanging beacons containing significant, authentic and accurate information. However, the presence of malicious attackers launching different attacks such as false data injection (FDI) can compromise the security of vehicle platoons by tampering with the beacons. Therefore, to avoid FDI attacks, we relied on multi-criteria decision methods (MCDM)-based methods in order to select the optimum beacon to share authentic and accurate information with the member vehicles. In this study, three MCDM methods including weighted sum model, technique for order of preference by similarity to ideal solution and preference ranking organization method for enrichment of evaluations (PROMETHEE-II) are studied and compared with the aim to enable the platoons to select the optimum beacon for communication. We performed extensive simulations to evaluate the performance of these methods in the presence of three FDI attacker models from four different aspects, that is, safety, stability, environmental, and cyber security. Our results demonstrate that MCDM-based methods can increase network efficiency, but at the cost of a trade-off between safety and cyber security. Journal Article Transactions on Emerging Telecommunications Technologies 34 11 Wiley 2161-3915 2161-3915 1 11 2023 2023-11-01 10.1002/ett.4841 http://dx.doi.org/10.1002/ett.4841 COLLEGE NANME Computer Science COLLEGE CODE SCS Swansea University Another institution paid the OA fee 2024-01-03T14:24:51.3422742 2023-07-31T09:19:09.9186628 Faculty of Science and Engineering School of Mathematics and Computer Science - Computer Science Sean Joe Taylor 0000-0001-7926-9800 1 Farhan Ahmad 2 Hoang Nguyen 0000-0003-0260-1697 3 Siraj Shaikh 0000-0002-0726-3319 4 Jeremy Bryans 5 Charles E. Wartnaby 6 63997__28315__a0e773bc39aa4e35a2056126b4f473d9.pdf 63997.VOR.pdf 2023-08-18T11:46:35.2459109 Output 2957697 application/pdf Version of Record true © 2023 The Authors. This is an open access article under the terms of the Creative Commons Attribution-NonCommercial-NoDerivs License, which permits use and distribution in any medium, provided the original work is properly cited, the use is non-commercial and no modifications or adaptations are made. true eng http://creativecommons.org/licenses/by-nc-nd/4.0/
title A comparative analysis of multi‐criteria decision methods for secure beacon selection in vehicular platoons
spellingShingle A comparative analysis of multi‐criteria decision methods for secure beacon selection in vehicular platoons
Hoang Nguyen
Siraj Shaikh
title_short A comparative analysis of multi‐criteria decision methods for secure beacon selection in vehicular platoons
title_full A comparative analysis of multi‐criteria decision methods for secure beacon selection in vehicular platoons
title_fullStr A comparative analysis of multi‐criteria decision methods for secure beacon selection in vehicular platoons
title_full_unstemmed A comparative analysis of multi‐criteria decision methods for secure beacon selection in vehicular platoons
title_sort A comparative analysis of multi‐criteria decision methods for secure beacon selection in vehicular platoons
author_id_str_mv cb24d5c5080534dc5b5e3390f24dd422
50117e8faac2d0937989e14847105704
author_id_fullname_str_mv cb24d5c5080534dc5b5e3390f24dd422_***_Hoang Nguyen
50117e8faac2d0937989e14847105704_***_Siraj Shaikh
author Hoang Nguyen
Siraj Shaikh
author2 Sean Joe Taylor
Farhan Ahmad
Hoang Nguyen
Siraj Shaikh
Jeremy Bryans
Charles E. Wartnaby
format Journal article
container_title Transactions on Emerging Telecommunications Technologies
container_volume 34
container_issue 11
publishDate 2023
institution Swansea University
issn 2161-3915
2161-3915
doi_str_mv 10.1002/ett.4841
publisher Wiley
college_str Faculty of Science and Engineering
hierarchytype
hierarchy_top_id facultyofscienceandengineering
hierarchy_top_title Faculty of Science and Engineering
hierarchy_parent_id facultyofscienceandengineering
hierarchy_parent_title Faculty of Science and Engineering
department_str School of Mathematics and Computer Science - Computer Science{{{_:::_}}}Faculty of Science and Engineering{{{_:::_}}}School of Mathematics and Computer Science - Computer Science
url http://dx.doi.org/10.1002/ett.4841
document_store_str 1
active_str 0
description Vehicle platoons are a novel transportation technology which not only aims to ensure traffic safety but also create a positive impact on the environment by producing low COurn:x-wiley:ett:media:ett4841:ett4841-math-0001 emissions. Vehicle platoons rely heavily on wireless communication to ensure that vehicles (leader and members) moving at high speed can keep close formation by exchanging beacons containing significant, authentic and accurate information. However, the presence of malicious attackers launching different attacks such as false data injection (FDI) can compromise the security of vehicle platoons by tampering with the beacons. Therefore, to avoid FDI attacks, we relied on multi-criteria decision methods (MCDM)-based methods in order to select the optimum beacon to share authentic and accurate information with the member vehicles. In this study, three MCDM methods including weighted sum model, technique for order of preference by similarity to ideal solution and preference ranking organization method for enrichment of evaluations (PROMETHEE-II) are studied and compared with the aim to enable the platoons to select the optimum beacon for communication. We performed extensive simulations to evaluate the performance of these methods in the presence of three FDI attacker models from four different aspects, that is, safety, stability, environmental, and cyber security. Our results demonstrate that MCDM-based methods can increase network efficiency, but at the cost of a trade-off between safety and cyber security.
published_date 2023-11-01T14:24:53Z
_version_ 1787079576350883840
score 11.037603