• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Context and Machine Learning Based Trust Management Framework for Internet of Vehicles

    2021-12-14 06:07:06AbdulRehmanMohdFadzilHassanYewKwangHooiMuhammadAasimQureshiTranDucChungRehanAkbarandSohailSafdar
    Computers Materials&Continua 2021年9期

    Abdul Rehman,Mohd Fadzil Hassan,Yew Kwang Hooi,Muhammad Aasim Qureshi,Tran Duc Chung,Rehan Akbar and Sohail Safdar

    1Computer and Information Science Department,Centre for Research and Data Science(CeRDaS),Universiti Teknologi PETRONAS,32610,Seri Iskandar,Perak Darul Ridzuan,Malaysia

    2Department of Computer Science,Bahria University,Pakistan

    3Computing Fundamental Department,FPT University,Hoa Lac Hi-Tech Park,Hanoi,Vietnam

    4Department of Information Systems,Universiti Tunku Abdul Rahman,Malaysia

    5Information Technology Department College of IT,AHLIA University,Bahrain

    Abstract:Trust is one of the core components of any ad hoc network security system.Trust management (TM) has always been a challenging issue in a vehicular network.One such developing network is the Internet of vehicles(IoV),which is expected to be an essential part of smart cities.IoV originated from the merger of Vehicular ad hoc networks(VANET)and the Internet of things(IoT).Security is one of the main barriers in the on-road IoV implementation.Existing security standards are insufficient to meet the extremely dynamic and rapidly changing IoV requirements.Trust plays a vital role in ensuring security,especially during vehicle to vehicle communication.Vehicular networks,having a unique nature among other wireless ad hoc networks,require dedicated efforts to develop trust protocols.Current TM schemes are inflexible and static.Predefined scenarios and limited parameters are the basis for existing TM models that are not suitable for vehicle networks.The vehicular network requires agile and adaptive solutions to ensure security,especially when it comes to critical messages.The vehicle network’s wireless nature increases its attack surface and exposes the network to numerous security threats.Moreover,internet involvement makes it more vulnerable to cyberattacks.The proposed TM framework is based on context-based cognition and machine learning to be best suited to IoV dynamics.Machine learning is the best solution to utilize the big data produced by vehicle sensors.To handle the uncertainty Bayesian machine learning statistical model is used.The proposed framework can adapt scenarios dynamically and infer using the maximum possible parameter available.The results indicated better performance than existing TM methods.Furthermore,for future work,a high-level machine learning model is proposed.

    Keywords:Internet of vehicles (IoV);trust management (TM);vehicular ad hoc network (VANET);machine learning;context awareness;bayesian learning

    1 Introduction

    The coming era is of high-speed communications and the Internet of things (IoT).By 2025,IoT will be connecting up to 21 billion devices [1].The Vehicular ad hoc network (VANET) is one of the research areas shifting towards IoT,such as the Internet of vehicles IoV [2-6].Since the IoV is not yet standardized,a few studies have been carried out in this field.Security in wireless networks has always been a core challenge,especially ad hoc networks where each time distinct nodes are likely to involve in network formation [7,8].Similarly,the biggest threat for IoV is a security breach [9,10],which can cause a catastrophic sequence of chain accidents,traffic congestions,and diverting traffic to a specific path.The vehicular network has unique properties,unlike other wireless networks.The vehicle network’s dynamic topology increases the attacksurface [11,12],allowing malicious nodes to launch an attack through a security breach.Moreover,the vehicle networks have no geographical limits that make vehicle to vehicle communication very critical.Trust plays an essential role in ensuring security in wireless networks.

    Several models have been proposed for trust evaluation in VANET/Intelligent transport system(ITS) over the years,and each model has adopted different techniques and methods.Due to the heterogeneous nature,many factors need to be considered while evaluating the trust,which is missing in existing static models.Every model has one thing in common;they have selected set parameters or scenarios that are not ideal for changing vehicle networks.In a small experimental setting,most models have attempted to solve such issues that work only if significant changes are not made.In conclusion,the vehicle network is a complex system for which the available models are unable to provide an adaptive solution.The proposed TM framework uses the contextaware cognitive approach to solve the problem.Our work is motivated to fill that gap where TM is flexible and static.The framework constructs a scenario-based context for every other critical message received.The framework is subsequently structured to adopt the appropriate trust module for each scenario.

    The vehicular network TM schemes must be adaptive to the environment.Artificial intelligence (AI) is the core approach to developing context-awareness.AI techniques are the most effective for building context [13].Cognitive inferencing is used for context-awareness in the presented TM framework.Besides context-awareness,machine learning is another suitable technology to be implemented on IoV gathered data.Taking full use of IoV big data is one of this study’s goals,which requires machine learning solutions.Machine learning is the best approach to single out the malicious nodes from VANET [14,15].Machine learning algorithms proved dynamic properties to assure security in VANETS [15,16].The vehicular network has not taken full use of machine learning yet.Trust is one of the areas that can be managed using machine learning.Within the trust,uncertainty is the critical issue faced by the vehicular network during trust evaluation.The framework uses a statistical machine learning technique;Bayesian machine learning (BML) evaluates trust under uncertainty.BML provides multilevel adaptive features to match the dynamic nature of IoV [17,18].

    An overview of the IoV architecture is presented in Fig.1.The centralized data repository is managed through cloud services.Vehicle nodes are equipped with an On board unit (OBU)that simultaneously function as fog nodes with a local data repository called OBUfog.The local data repository is synchronized parodically with a centralized repository.The trust value of all nodes is stored and updated in a centralized database.The framework uses a local data repository for immediate data access,and it is useful in case of the unavailability of internet access or disconnection from the centralized system.The unavailability of a centralized system is a frequent issue with vehicular networks.The use of a decentralized approach is equally helpful to deal with critical issues in communication security.

    Figure 1:An overview of the IoV architecture,with all nodes equipped with OBUfog and local data repository,connected to a centralized cloud database using BTSRsu

    The rest of the paper is organized as Section 2 is the literature review,Section 3 explains the proposed framework.Section 4 discusses the trust evaluation process Section 5 is performance analysis.The last section concludes the research study.

    2 Literature Review

    The security of any information system has always been a critical concern.In a study [4]on the upcoming challenges of IoV,authors identify security as a critical challenge to overcome.IoV is the future of intelligent vehicular communication and smart cities [19].Multidimensional security problems occur within IoV,making security one of the main challenges for ad hoc networks.Available models for trust evaluation and management in IoV do not provide the ultimate solution and thus require improvement [11,20].Many trust models for vehicle networks have been proposed;we discuss some of the renowned models in this section.Most of the trust models available are based on VANETs or ITS.A few recent works can be found on IoV considering trust [21,22].The existing models can be classified by trust measuring type and categorized into three:data-centric,entity-centric,and hybrid models.

    2.1 Trust Models

    Trust is determined by the received messages in data-centric models.In a data-centric model,neighboring nodes share their trust opinions on specific events and calculating the trust by majority estimate [23].The key downside of such models is,they neglect information relevant to the node [11].Entity-centric models are based on trust credit building.In these models,the interaction experience is an important characteristic.When measuring trust in real-time,inter-node interaction experience is taken into account [24,25].In one of the entity-centric trust models,the level of trust is determined by fuzzy logic [25].Another such model presented by [26]work on prior experience,Certificate authority (CA) and,neighbor opinion.The key issue with these models is that they presume that the malicious activity cannot be performed when the node is authenticated.The second drawback is the dependency on CA.Overall entity centric models are a very powerful tool for evaluating trust.However,these models miss the useful aspects of data centric.

    Hybrid models incorporate properties of data and entity to determine trust.Most of these models evaluate the data trustworthiness and keep track of the node trust.A combination of role-based and experience is one such popular model [27].Another hybrid model evaluates trust by neighbor opinion and similarity-trust [28].In a research study,researchers used social-trust while evaluating trust [29].Some researchers have used probability methods,such as the law of Bayes,the theory of evidence,and the theory of Markov [24,30].For handling the uncertainty during TM,a couple of hybrid models have been proposed [11,31].Even though the hybrid models are a combination of data and entity,their dynamic integration is still missing [11].However,to the depth of study,there is no such trust model that uses all the available information during the event.All the models evaluate trust based on specific predefined parameters and scenarios.

    2.2 Machine Learning in Vehicular Networks

    Machine learning has notable coherence with IoV due to its ability to generate big data.Significant research work has been conducted so far on VANET using machine learning.A research study investigated different aspects of detecting misbehaving vehicles by machine learning and found machine learning an effective method for vehicular network security [14].The VANET and machine learning have strong coherence,explored in a comparative study between machine learning and VANETS [15].Researchers in their work used machine learning to detect DDOS attacks in vehicular networks,the study concluded with positive results [32].Another research work on VANET security worked on false node position attacks and applied a machine-learning algorithm to solve the problem [33].Most of the studies have shown promising results.

    2.3 Context Awareness

    The main aim of using context-awareness is to add flexibility by making maximum use of the available data.Authors in a review study elaborate on the potential need for an AI approach for the trust evaluation in vehicular networks;coherence between VANET security and AI solutions exists [20].A context is a form of knowledge that relates to the problem-solving ability of humans [34].AI techniques are suitable for context development [35].

    The proposed TM framework relies on a hybrid approach using both data and entity properties.On the other hand,it is also worth mentioning that all the available models are for VANETS/ITS.In contrast,our model is a novel trust model for IoV that works on context adaption and machine learning.To the best of our knowledge,no such trust model is presented in the field yet.Our proposed trust evaluation framework is based on context-awareness.

    3 Proposed TM Framework

    The proposed IoV TM framework is intended to fill the gaps in trust evaluation.The framework works by establishing a context for an event using a cognitive approach.Fig.2 shows the proposed TM framework.The framework has three key components:input parameters,context building,and trust evaluation.The framework proposed designs on the best practices of VANET,implemented by notable trust models [24,25,27,28,36].The framework components are derived from the generic context-aware flow model [34,37,38].Once a critical incident alert is received from nearby vehicles,next,it requires the sender’s authentication.The is responsible for carrying out the authentication process using the public key infrastructure (PKI).Since it needs cryptography and exceeds the scope of our work,we have already considered existing solutions.

    Figure 2:Proposed TM framework with three main modules:input parameters,context building,and trust evaluation

    3.1 Parameter Input Layer

    After the authentication process,the second task is parameter management,as shown in Fig.2.Information about an event is filtered out to obtain parameters from the received message token.For ease,the framework classifies all the possible parameters.The information obtained from the node is formalized in “cues,” the cues are fed into the context layer for context building.Parameter prioritization is the main task since some parameters have a more valid source and weight than others.

    3.2 Context Building Layer

    This layer is responsible for building a context around the road event.Context building is the responsibility of the inference engine.The immediately available data is called a low-level context that is transformed into a high-level context.Context data is interconnected information set mostly containing uncertainty.The uncertainty must be handled before submitting it to the context inference process [34].First,to create a context,the raw data is used,and it is a prerequisite for the development of the context [35].The perimeter module is responsible for providing available information in the form of readable “cues” to the context module.Context offers complete information to evaluate trust in an event.The context management module is responsible for handling context information obtained from the previous layer.

    3.3 Trust Evaluation Layer

    The responsibility of this layer is to calculate the trust level.Since the proposed framework is based on the cognitive context approach,the inference engine and trust evaluation modules continuously exchanged information.The trust evaluation layer consists of different modules.In the proposed TM framework,the trust evaluation process is adaptive.The most used approaches are experience-based,role-based,opinion-based,cluster-based,thread-based,as illustrated in Fig.2.Different scenarios require different evaluation modules to evaluate the trust.The proposed trust framework matches the most suitable trust evaluation module with an event’s scenario using context-awareness.

    3.4 Trust Metric

    It is essential to define trust metrics before moving towards the trust framework.All existing models have taken into consideration different paraments as metrics.Experience is one of the most used parameters by many models [25,27,28].Different models also use parameters such as time,location,distance,and others.The goal of our work is to use the maximum available parameters to evaluate trust.The set of trust metrics is made adaptive for this purpose.

    4 Trust Evaluation Process

    The proposed TM framework evaluates trust based on a critical road event.Trust evaluation revolves around the road-event.The event is denoted by Event ID (Ev_ID).The reporting vehicle that has evident the event itself is Reporter-vehicle (Rp_veh).The vehicles that are not evident in the event still carry the message for hopping or beaconing they are denoted as Carrier-vehicle(Cr_veh).The road event is illustrated in Fig.3.Local database and centralized data repositories are denoted as Local-database (Loc_DB) and Centralized-database (Cnt_DB).Tr denotes the trust level value.

    Figure 3:Illustration of road event,with the participation of reporting and carrier vehicles,in hopping

    The trust level of a specific event is represented by Ev_ID_Tr ,and the trust level value of any node is represented by Veh_ID_Tr .The unique ID identifies every vehicle in the network.The trust level value is updated after the completion of the event in both local and centralized databases.

    4.1 Assumptions

    The following assumptions are made to ensure the proper functioning of the proposed TM framework:

    · All the vehicles in the network are equipped with OBUFog.

    · All vehicles have a uniform communication platform.

    · A third-party CA manages the PKI.

    4.2 Context Ontology

    Ontology is one of the promising methods for context building,which is based on formal logic.With the help of ontology,the context information is built around a road-event.An ontology is an explicit,systematic definition of concepts in a discourse domain.A brief ontology of TM framework is shown in Fig.4,which illustrates the hierarchical classes and instances of the concept.It is not obligatory to store all relationships with ontology;existing triplets can generate new facts.Together with a collection of individual class instances,an ontology forms a knowledge-base [12].

    Figure 4:Hierarchical taxonomy,classes,and instances of IoV TM ontology

    The taxonomic relationship of ontology includes the following classes:Vehicle,Evaluation-Module,andEvent.All the trust evaluation modules are subclasses of classEvaluationModule,namely:ExperienceModule,SpecialVehicle,Opinion,ClusterBased,ThreadBased,andUncertainty.Rep_veh,Carr_veh,and Special_veh are the instances of the class vehicle.The class is disjoint to avoid conceptual overlapping by the reasoner.The instances are associated with the vehicular ID,event ID,location,time,and other data properties.

    4.3 Trust Level Threshold

    The Trust level (Tr ) is measured between 0 and 1,an untrustworthy report is denoted as 0,and the highest level of trust is represented by 1 [27,39].All the values between 0 and 1 are considered as different levels of trust.Initially,all the vehicles are assigned with Tr 0 in Cnt_DB by CA.Unlike common nodes,Tr of special vehicles (ambulance,police,fire brigade) initialized with 0.5.Likewise,the trust of an event Ev_ID_Tr is evaluated and managed during the event.The centralized and local database also store and update event trust value for future verification and trust management.A reported event’s trust is also measured between 0 and 1,where 1 represents the highest trust level and 0 for untrusted.The weight allocation Tab.1 represents:initial trust,previous trust (experience),and trust reward.

    The accumulated trust value is the combination of multiple trust values obtained from different modules.The Tr 1 is the mean trust value of all reporting vehicles obtained by Eq.(1).Reporting vehicles for an event,include general and special vehicles.

    Carrier vehicles have two types based on hopping and beaconing.Eq.(2) is used to obtain the mean trust Tr 2 from carrier vehicles involved in beaconing,whereas carrier vehicles involved in hopping participate in the thread module,discussed in the related section.

    Table 1:Trust weight allocation table

    In certain situations where the special vehicle is involved,the mean trust value Tr 3 of all Spe_ can be obtained by Eq.(3).Since the TM framework is adaptive and context-based,the TM might use different trust modules each time.The accumulated trust value of an event Ev_-ID_Tr is obtained by Eq.(4).

    Eq.(3) serves as the fundamental method for evaluating the trust during the modules:experience,role-base,and opinion-based trust evaluation,each with related specifications.At this point,it is necessary to mention that Eq.(3) involves only those vehicles having a higher or equal experience level than 0.5.Those vehicles with less than 0.5 trust experiences are filtered out and used in other inferencing modules,depending on the context.

    4.4 Cluster Module

    The cluster-based module is used only for those vehicles that follow the same route daily,In these situations the cluster approach is the most appropriate.The urban traffic mostly follows a pattern by the same vehicle daily.Cluster lists are managed on Cnt_DB and Loc_Db.The reports are broadcasted to all the vehicles in the specific cluster.In combination with other modules,the cluster module is used to determine the trust level according to the context.

    4.5 Thread Based/Hopping

    This module is likely to be used where there are hopping in higher numbers than reports and opinions.It is one of the effective techniques used by some models.The basic concept of this module is to use multiple threads of hops.The trust level depends on the thread level (thr_lev).This module requires at least twoRp_vhs.The level of the thread increases with the intersection of two threads of a single report.The Cr_vh,when receives the report with the same thread,considers it as thr_lev1.The level of a thread increases only if a new thread is found.An increment at each level consequently increases the trust level of the report by 0.2.

    4.6 Uncertainty Using Statistical Bayesian Machine Learning

    Mostly,uncertainty occurs in scenarios where the number of nodes is small.Uncertainty is one of the challenges of evaluating trust.Some TM models vaguely discuss uncertainty in their methodology,such as [30,39].Using a simple probability is one of the approaches used to handle uncertainty,which is unrealistic.Some approaches include Dempster Shafer theory.The proposed TM framework uses the BML approach to deal with uncertainty.Though BML is one of the rarely used machine learning techniques,it is a constructive statistical method that matches the uncertainty in IoV.Using BML allows combining multiple prior evidence and matches the nature of the problem under discussion.The Bayes rule helps to measure the likelihood of a message being true or false.The experience property must be less than 0.5,as used in Eq.(5).The probability of a report being false can be obtained by Eq.(5).In some circumstances,Rp_vh with less experience is considered under uncertainty.Eq.(6) calculates the trustworthiness of a report.

    The TM framework performs one step further to be more accurate and use additional available information to infer the trust level of a report.The framework uses BML with multiple evidence;this lets the system infer cognitively when more contextual information is available.Eq.(7) uses multiple evidence BML by adding the direction of the node in Eq.(6).

    The co-occurrence of multiple evidence is calculated by Eq.(7).The P (exp_<0.5 ∧dir_from)is obtained by Eq.(8).

    Thus,Eq.(10) is obtained by employing Eqs.(8) and (9) to Eq.(7).The uniqueness of the presented framework is a context where we can add further evidence to infer trust.

    Alg.1 shows the algorithm for a reported event,where a new event report is received.The event is matched with the previous event list,synchronized if the event is previously available;otherwise,a new event is created.Furthermore,the algorithm explains the management of the overall report.

    ?Algorithm 1:Trust Evaluation Algorithm Pseudocode of event trust evaluation algorithm 1.Initialize 2.Event Message received 3.Ev_ID retrieved 4.Ev_ID_Trlv=0 5.Number of nRp_veh=0 6.Number of nCr_veh=0 7.If (Ev_ID !=exists) than 8.start Ev_ID as new event 9.else 10.merge Veh_ID_Trlv retrieved from Cnt_DB and Loc_DB 11.merge Cr_veh_Trlv retrieved from Cnt_DB and Loc_DB 12.end If 13.If (message receive form Rp_veh) than 14.nRp_veh ←nRp_veh+1 15.else 16.nCr_veh ←nCr_veh+1 17.end If 18.If (nRp_veh>2) &&(Rp_veh_exp>0.5) than 19.opt for experience module 20.elseIf (special Rp_veh in system) than 21.opt for role-based module 22.elseIf (nCr_veh>nRp_veh) &&23.(Cp_veh_exp>0.5) than

    (Continued)

    4.7 Message Token

    For the TM framework,a token is designed that contains all related information and the message itself.The token is divided into two parts in Tab.2:the header contains all information related to vehicle and message.The “message” portion only contains information related to roadevent.The token is associated and identified with “vehicle ID”.The critical messages can be categorized into four categories:accident,traffic congestion,work in progress,and diversion,defined in the event description.

    24.opt for Opinion module 25.el seIf (vehicles share same path frequently) than 26.opt for Cluster module 27.elseIf (nCr_veh>nRp_veh) &&28.(Cp_veh with high hopping) than 29.opt for thread-based module 30.elseIf (uncertain condition) than 31.opt for uncertainty module 32.endIf 33.Ev_ID_Trlv ←(Rp_veh(mean)+Cr_veh(mean)+Spe_veh(mean)+trust value)34.If (Ev_ID_Trlv>0.5) than 35.perform action,36.update in Cnt_DB and Loc_DB 37.broadcast Ev_ID is trustworthy with Ev_ID_Trlv 38.else 39.discard event 40.update in Cnt_DB and Loc_DB 41.broadcast Ev_ID is untrustworthy with Ev_ID_Trlv 42.End

    Table 2:Message token

    4.8 Simulation

    The simulation is conducted using MATLAB R2020a and Protege-5.5.0 with the “HermiT 1.4.3 456” reasoner.Depending on the simulation model’s scenario,the number of nodes in each random event varies from 2 to 50.The special nodes are set to a maximum of 10%,rest of the 90% nodes are general vehicles.The node trust is initialized by 0 experience,and the special nodes with trust experience by 0.5.A significant concern about simulations relates to outcome variation;outcomes at each attempt may vary due to the experiment’s random design.There can be a considerable variation between the same simulation instances in the wireless topology and the network’s design.General nodes include reporting and carrier vehicles.In the road network,road incidents occur at random in the experiment.Each scenario runs 100 iterations to exhaust the simulation.

    The framework is tested using scenario-based simulation.The scenarios are divided into three categories to get maximum performance and exhaust the simulation.1.Heavy traffic:These scenario patterns are often found during rush hours or congestion in urban traffic.These scenarios take up to 50 nodes into consideration.Numerous reports of an incident can be found in these scenarios,making it easy to determine any reported event’s level of trust.Most of the trust models perform well in these scenarios.2.Moderate traffic:11 to 25 nodes,taken into consideration in these scenarios.These scenarios are typically found during low rush hours in urban areas or on highways.The amount of information available in these situations is also moderate.The proposed framework takes full advantage of the available data,unlike other models that work under limited information.3.Low traffic:This depicts a traffic pattern found on highways,towns,and rural areas.2 to 10 nodes are involved in this type of scenario.The lack of information makes these the most critical scenarios.Most of the trust models fail in these scenarios due to the little information available.These scenarios contain maximum uncertainty,which is a significant issue during the trust evaluation.

    5 Performance Analysis and Discussion

    The module distribution by generating random road events up to 50 nodes can be observed in Fig.5a.The experience-based module is more likely to occur,and the reason might be the experience property of all the vehicles;this is a significant finding in understanding the type of vehicle involved in the trust evaluation process.The variation of the trust evaluation module can be observed in Fig.5a.With the smaller number of nodes involved,the opinion module is the highest.In comparison,the moderate node involvement experience module is highly observed.Another notable finding is that the thread-based module requires a higher number of nodes,shows in Fig.5a.Nonetheless,we believe that it is well justified that uncertainty is high with low node density,which reveals the relations between less information and uncertainty.Depicted in Fig.5b,involving 10 nodes in the different events,show the “opinion” is with the highest occurrence followed by the experience,the reports with uncertainty are also high.Fig.5c shows the increment in the number of nodes up to 25 involved in an event.Experience and opinion are almost equal,whereas uncertainty is decreasing.Finally,Fig.5d shows that the uncertainty is almost inversely proportional to the number of nodes involved in the event.

    Fig.6a shows the trust level evaluated under the experience module.One of the essential features of this framework is the confidence score.Even in the case of high trust,there might be a low confidence score.This feature makes the report more elaborative.Fig.6b shows the thread module outcomes;a gradual trend during the trust-building phase can be observed.The trust is directly proportional to the thread level.Here it is significant to explain that the level of a thread is not the hop level,which can be observed in Fig.6b.The results in Fig.6c show the opinionbased trust evaluation;the confidence line in Fig.6c supports the legitimacy of trust value.A significant aspect is noted here the confidence score has no coherence with the level of trust.The behavior of “confidence” as an independent variable helps the system make better decisions during trust evaluation.The involvement of special vehicles makes the event more legitimate.A relatively higher trust level can be observed in Fig.6d,where a special vehicle is involved in trust evaluation.The more special vehicles involved,the higher the level of trust that can be achieved.Fig.6e summarizes the findings by the uncertainty module.The number of discarded reports is low,and a gradual decrease is observed with an increase in the number of nodes.The use of big data will probably improve the module’s precision over time due to the increased information availability.

    5.1 Limitations

    The following limitations must be considered for this TM framework:

    · The experiment is conducted using a limited number of nodes,and a large-scale experiment will further improve the accuracy of the results.

    · The simulation has shown promising results.An on-road experiment still needs to be conducted.

    · The framework does not take the human factor into account.

    · The analysis of big data and its involvement in trust evaluation will improve accuracy.A machine learning model is presented in future work that needs to be implemented for further investigation.

    Figure 6:Level of trust and confidence score under different trust evaluation modules.(a) Trust and confidence under experience.(b) Trust under thread-based evaluation module.(c) Opinion module trust and confidence.(d) Special vehicle involvement and trust

    5.2 A High-level Machine Learning Inference Model as Future Research Direction

    In a short time,the IoV can produce big data;every node generates multiple sensor data.Given this study’s limited scope,a high-level machine-learning model as future work is illustrated by Fig.7.The process begins with data inputs from centralized DB.The second phase is the preprocessing involving:data quality assessment,data cleaning,finding relations,normalization,and feature scaling to specify a range of variables.A mix of supervised and unsupervised learning is suitable to achieve maximum knowledge extraction [40].The use of regression is ideal for continuous variable prediction.Linear support vector machine (LVSM) is the most suitable because of the trust threshold value [41].

    An artificial neural network (ANN) is recommended to automate huge sensor data.Similarities in road events are the main reason to use ANN.Malicious node detection is a crucial issue in IoV;the clustering technique is more appropriate and efficient to solve this issue.For clustering,the Gaussian mixture model (GMM) is highly recommended [42].The reason behind this is the two parameters description method [43].The training and testing are the subsequent phases to be carried out for regression by the adapting 70:30 general rule.To achieve maximum accuracy of the model,precision,recall,and F-1 score are recommended in the validation phase.

    Figure 7:A high-level machine learning model for the inference of trust as a future research direction

    6 Conclusion

    Soon,IoV will play a significant role in smart cities and ITS.Many areas of IoV need to be standardized before implementing it as real-time road networks.Trust management is a primary component of vehicle network security,helping prevent a breach of security.In this article,a TM framework is presented for IoV to ensure secure on-road vehicle communication.The proposed trust framework is based on context-awareness,thus use maximum available information resources.The framework works well in critical scenarios where other models fail.The framework intelligently chooses between different trust evaluation modules,thereby allowing full use of available information to determine the received message’s trustworthiness.The results indicate that the framework will contribute to trust management security in the vehicle network.The use of the Bayesian method of machine learning was effective when dealing with uncertainty.Our presented trust framework shows promising results.To the best of our knowledge,the work is novel,and no cognitive trust management scheme for IoV has been proposed.The proposed framework is equally beneficial for IoT security.

    Acknowledgement:We would like to acknowledge the multinational collaboration made in this research.

    Funding Statement:The work is partially funded by CGS Universiti Teknologi PETRONAS,Malaysia.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    成人高潮视频无遮挡免费网站| 超碰av人人做人人爽久久| 欧美乱妇无乱码| 欧美另类亚洲清纯唯美| 国产乱人伦免费视频| 亚洲av成人不卡在线观看播放网| 国产精品三级大全| 成人性生交大片免费视频hd| 国产在线精品亚洲第一网站| 精品一区二区三区视频在线观看免费| 亚州av有码| 亚洲aⅴ乱码一区二区在线播放| 一级黄片播放器| 美女被艹到高潮喷水动态| 小说图片视频综合网站| 国产免费av片在线观看野外av| 51午夜福利影视在线观看| 久久久久性生活片| 亚洲欧美激情综合另类| 亚洲欧美日韩高清在线视频| 亚洲国产高清在线一区二区三| 久久99热这里只有精品18| 99国产精品一区二区蜜桃av| 免费黄网站久久成人精品 | 偷拍熟女少妇极品色| 国产精品美女特级片免费视频播放器| 日本一本二区三区精品| 一区二区三区激情视频| 九九久久精品国产亚洲av麻豆| 最近中文字幕高清免费大全6 | 老司机午夜福利在线观看视频| 国产在线男女| 动漫黄色视频在线观看| 免费高清视频大片| av女优亚洲男人天堂| av在线老鸭窝| 国产爱豆传媒在线观看| 90打野战视频偷拍视频| 久久久国产成人精品二区| 91在线观看av| 2021天堂中文幕一二区在线观| a级毛片免费高清观看在线播放| 成人性生交大片免费视频hd| 亚洲国产日韩欧美精品在线观看| 亚洲精品日韩av片在线观看| 亚洲av第一区精品v没综合| 99热这里只有是精品在线观看 | 俄罗斯特黄特色一大片| 亚洲人成电影免费在线| 久久久久久久久中文| 好男人电影高清在线观看| 亚洲熟妇熟女久久| 18禁黄网站禁片午夜丰满| 精品久久久久久久久久久久久| 婷婷精品国产亚洲av| 99久久精品热视频| 嫁个100分男人电影在线观看| 国内久久婷婷六月综合欲色啪| 99久久九九国产精品国产免费| 3wmmmm亚洲av在线观看| 精品久久久久久久末码| 国产色婷婷99| 99国产极品粉嫩在线观看| 丰满乱子伦码专区| 又爽又黄无遮挡网站| 欧美+日韩+精品| 午夜福利18| 在线观看美女被高潮喷水网站 | 日韩欧美 国产精品| 久久精品影院6| 午夜精品久久久久久毛片777| 天堂网av新在线| 亚洲成人免费电影在线观看| 色吧在线观看| 一级作爱视频免费观看| 99精品在免费线老司机午夜| 日本五十路高清| 久久久精品欧美日韩精品| 国产日本99.免费观看| 亚洲国产日韩欧美精品在线观看| 亚洲片人在线观看| 精品久久国产蜜桃| 国产成人aa在线观看| 色综合婷婷激情| 99国产极品粉嫩在线观看| 免费大片18禁| 直男gayav资源| 日本成人三级电影网站| 高清日韩中文字幕在线| 亚洲成av人片免费观看| av在线老鸭窝| 亚洲 国产 在线| 国产精品三级大全| 夜夜夜夜夜久久久久| 内射极品少妇av片p| 18禁黄网站禁片免费观看直播| 69av精品久久久久久| 国产久久久一区二区三区| 一级黄色大片毛片| 亚洲精品粉嫩美女一区| 女人被狂操c到高潮| 久久精品国产亚洲av涩爱 | 99热这里只有是精品50| 亚洲 国产 在线| 俄罗斯特黄特色一大片| 精品人妻一区二区三区麻豆 | 一进一出抽搐动态| 国产精品一区二区三区四区免费观看 | 午夜日韩欧美国产| 国产不卡一卡二| 嫩草影院入口| 日日夜夜操网爽| 国产精品久久久久久亚洲av鲁大| 亚洲av熟女| 亚洲第一电影网av| 精品人妻偷拍中文字幕| 久久6这里有精品| 国产久久久一区二区三区| 日韩中文字幕欧美一区二区| a级毛片a级免费在线| 欧美日韩福利视频一区二区| 欧美绝顶高潮抽搐喷水| 国产免费av片在线观看野外av| 亚洲成av人片免费观看| 18+在线观看网站| 精华霜和精华液先用哪个| 最近最新免费中文字幕在线| 国产欧美日韩精品一区二区| www日本黄色视频网| 中国美女看黄片| 国产在线精品亚洲第一网站| 精品久久久久久,| 免费人成视频x8x8入口观看| 精品人妻一区二区三区麻豆 | a级一级毛片免费在线观看| 午夜免费成人在线视频| 99riav亚洲国产免费| 淫妇啪啪啪对白视频| 亚洲 欧美 日韩 在线 免费| 国产精品日韩av在线免费观看| xxxwww97欧美| 在线a可以看的网站| 男女床上黄色一级片免费看| 精品无人区乱码1区二区| 老司机深夜福利视频在线观看| 日本 av在线| 男人的好看免费观看在线视频| 美女高潮的动态| 少妇高潮的动态图| 国产一区二区在线av高清观看| xxxwww97欧美| 午夜福利在线观看免费完整高清在 | 色av中文字幕| 日韩免费av在线播放| 免费看美女性在线毛片视频| 色尼玛亚洲综合影院| 亚洲精品在线美女| 我要看日韩黄色一级片| 内地一区二区视频在线| 亚洲av成人不卡在线观看播放网| 高清毛片免费观看视频网站| 国产成+人综合+亚洲专区| 日韩欧美一区二区三区在线观看| 免费在线观看成人毛片| 在线观看舔阴道视频| 久久精品国产自在天天线| 国产精华一区二区三区| 欧美绝顶高潮抽搐喷水| 国产三级黄色录像| 极品教师在线视频| 1000部很黄的大片| 色播亚洲综合网| 国产成人a区在线观看| 日韩欧美国产一区二区入口| 性色avwww在线观看| 成人美女网站在线观看视频| 国产不卡一卡二| 精品欧美国产一区二区三| 18+在线观看网站| 精品国产三级普通话版| 美女 人体艺术 gogo| 亚洲最大成人中文| 国产一区二区在线av高清观看| 免费看日本二区| 午夜两性在线视频| 最近中文字幕高清免费大全6 | 脱女人内裤的视频| 免费看a级黄色片| 18美女黄网站色大片免费观看| 精品国内亚洲2022精品成人| 亚洲美女视频黄频| 精品人妻熟女av久视频| 在线十欧美十亚洲十日本专区| 宅男免费午夜| 最新在线观看一区二区三区| 日本黄色视频三级网站网址| 欧美成人性av电影在线观看| 欧美极品一区二区三区四区| 两个人的视频大全免费| 久久久久久久精品吃奶| 日韩欧美在线乱码| 精品一区二区免费观看| 两人在一起打扑克的视频| 看十八女毛片水多多多| 欧美一区二区国产精品久久精品| 国产成人欧美在线观看| 精品国产亚洲在线| 91久久精品国产一区二区成人| 精品国内亚洲2022精品成人| 男女下面进入的视频免费午夜| 亚洲人成电影免费在线| 日韩中文字幕欧美一区二区| 亚洲国产精品成人综合色| 怎么达到女性高潮| 久久亚洲精品不卡| 欧美丝袜亚洲另类 | 国产一区二区在线观看日韩| 无人区码免费观看不卡| 久久精品91蜜桃| 美女xxoo啪啪120秒动态图 | av在线天堂中文字幕| 乱码一卡2卡4卡精品| av天堂在线播放| 日韩欧美精品免费久久 | 亚洲国产精品成人综合色| 日日摸夜夜添夜夜添小说| 少妇被粗大猛烈的视频| 非洲黑人性xxxx精品又粗又长| 变态另类成人亚洲欧美熟女| 国产伦人伦偷精品视频| 免费av观看视频| 香蕉av资源在线| 桃色一区二区三区在线观看| ponron亚洲| 一个人观看的视频www高清免费观看| 天堂av国产一区二区熟女人妻| 午夜a级毛片| 午夜激情欧美在线| 身体一侧抽搐| 亚洲国产精品成人综合色| 看黄色毛片网站| 精品一区二区免费观看| 亚洲avbb在线观看| 午夜福利18| 麻豆国产av国片精品| 激情在线观看视频在线高清| 欧美一区二区亚洲| 亚洲av中文字字幕乱码综合| 免费电影在线观看免费观看| 老司机福利观看| 亚洲专区中文字幕在线| 真人一进一出gif抽搐免费| 欧美日韩瑟瑟在线播放| 亚洲av日韩精品久久久久久密| 精品人妻一区二区三区麻豆 | 婷婷亚洲欧美| 搡老妇女老女人老熟妇| 亚洲无线观看免费| 久久久久久久午夜电影| 天堂网av新在线| 男女做爰动态图高潮gif福利片| 亚洲人成伊人成综合网2020| 麻豆久久精品国产亚洲av| 欧美激情在线99| 赤兔流量卡办理| 亚洲av美国av| 天堂影院成人在线观看| av欧美777| 国内精品久久久久久久电影| 亚洲第一区二区三区不卡| 51午夜福利影视在线观看| 真人做人爱边吃奶动态| 十八禁网站免费在线| 99热这里只有精品一区| av天堂在线播放| 欧美色视频一区免费| 看十八女毛片水多多多| 亚洲av熟女| netflix在线观看网站| 深夜精品福利| 真实男女啪啪啪动态图| 我的女老师完整版在线观看| 亚洲国产精品久久男人天堂| 久久人人精品亚洲av| 国产人妻一区二区三区在| 在线a可以看的网站| 日本a在线网址| 亚洲av中文字字幕乱码综合| 色哟哟·www| 国产色爽女视频免费观看| av欧美777| 女人被狂操c到高潮| 亚洲 国产 在线| 久久午夜亚洲精品久久| 成人特级黄色片久久久久久久| 亚洲国产精品成人综合色| 91狼人影院| 成年女人永久免费观看视频| 美女被艹到高潮喷水动态| 亚洲,欧美精品.| 中文字幕免费在线视频6| 亚洲真实伦在线观看| 国产人妻一区二区三区在| 亚洲国产高清在线一区二区三| 啪啪无遮挡十八禁网站| 日韩精品中文字幕看吧| 内射极品少妇av片p| 久久久久久大精品| 真人做人爱边吃奶动态| 久久精品影院6| 九色国产91popny在线| 男女做爰动态图高潮gif福利片| 老司机午夜福利在线观看视频| 99国产极品粉嫩在线观看| 可以在线观看的亚洲视频| 动漫黄色视频在线观看| 午夜精品在线福利| 999久久久精品免费观看国产| 欧美黑人巨大hd| 两性午夜刺激爽爽歪歪视频在线观看| 18禁在线播放成人免费| 中文资源天堂在线| 亚洲性夜色夜夜综合| 看片在线看免费视频| 久久精品影院6| 又黄又爽又刺激的免费视频.| 亚洲片人在线观看| 国产久久久一区二区三区| 国产一区二区在线观看日韩| 一卡2卡三卡四卡精品乱码亚洲| 深夜a级毛片| 免费在线观看亚洲国产| 最好的美女福利视频网| 桃色一区二区三区在线观看| 无遮挡黄片免费观看| 老司机午夜十八禁免费视频| 神马国产精品三级电影在线观看| 国产视频内射| 久久久久亚洲av毛片大全| 一级作爱视频免费观看| 在线观看av片永久免费下载| 国产成人aa在线观看| 国产高潮美女av| 毛片女人毛片| .国产精品久久| 搡老妇女老女人老熟妇| 亚洲国产精品合色在线| 欧美zozozo另类| 人妻制服诱惑在线中文字幕| 91在线精品国自产拍蜜月| 亚洲一区二区三区不卡视频| 午夜亚洲福利在线播放| 两性午夜刺激爽爽歪歪视频在线观看| 日日干狠狠操夜夜爽| 熟妇人妻久久中文字幕3abv| 国产黄色小视频在线观看| 搡老熟女国产l中国老女人| a级毛片免费高清观看在线播放| 国产伦精品一区二区三区四那| 十八禁网站免费在线| 午夜精品一区二区三区免费看| 99热只有精品国产| 免费观看精品视频网站| 琪琪午夜伦伦电影理论片6080| 国产又黄又爽又无遮挡在线| 日韩欧美三级三区| 国产探花在线观看一区二区| 久久久久久大精品| 国产伦在线观看视频一区| 极品教师在线免费播放| 国产探花极品一区二区| 岛国在线免费视频观看| 波野结衣二区三区在线| 久久久久国内视频| 精品一区二区三区人妻视频| 日韩有码中文字幕| 2021天堂中文幕一二区在线观| 两人在一起打扑克的视频| 国产野战对白在线观看| 一级av片app| eeuss影院久久| 91麻豆av在线| 久久亚洲精品不卡| 观看免费一级毛片| 免费高清视频大片| 在线国产一区二区在线| 一个人免费在线观看的高清视频| 久久久久免费精品人妻一区二区| 一个人免费在线观看电影| 少妇熟女aⅴ在线视频| 国产高清有码在线观看视频| .国产精品久久| 国产成人影院久久av| 亚洲第一区二区三区不卡| 精品欧美国产一区二区三| 国产高潮美女av| 一进一出抽搐动态| 国产午夜精品久久久久久一区二区三区 | 欧美bdsm另类| 日本在线视频免费播放| 国产精品一及| 脱女人内裤的视频| 亚洲性夜色夜夜综合| 久久久久久久久久成人| 69av精品久久久久久| 免费av不卡在线播放| 一边摸一边抽搐一进一小说| 三级国产精品欧美在线观看| 简卡轻食公司| 亚洲美女黄片视频| 成人亚洲精品av一区二区| 搡女人真爽免费视频火全软件 | 男插女下体视频免费在线播放| 麻豆成人av在线观看| 俺也久久电影网| 我的老师免费观看完整版| 午夜精品久久久久久毛片777| 好男人电影高清在线观看| 99久久精品国产亚洲精品| 国产三级在线视频| 亚洲av电影不卡..在线观看| 免费av毛片视频| 国产 一区 欧美 日韩| 亚洲av免费在线观看| 可以在线观看毛片的网站| 国产精品爽爽va在线观看网站| 国产精品99久久久久久久久| 亚洲国产精品成人综合色| 精品不卡国产一区二区三区| 久久久国产成人免费| 亚洲av成人不卡在线观看播放网| 极品教师在线视频| 国产精品一及| 看片在线看免费视频| 美女xxoo啪啪120秒动态图 | 欧美日韩福利视频一区二区| 亚洲自拍偷在线| 99热这里只有精品一区| 日本精品一区二区三区蜜桃| 午夜视频国产福利| 岛国在线免费视频观看| 日本黄色视频三级网站网址| 中文字幕精品亚洲无线码一区| 日韩欧美精品v在线| 免费黄网站久久成人精品 | 中文资源天堂在线| 一区二区三区四区激情视频 | 亚洲国产色片| 国产精品影院久久| 婷婷丁香在线五月| 国内揄拍国产精品人妻在线| 午夜久久久久精精品| 99久久精品热视频| 又黄又爽又刺激的免费视频.| 男女床上黄色一级片免费看| 99久久精品一区二区三区| 丰满乱子伦码专区| 国产精品人妻久久久久久| a级毛片免费高清观看在线播放| 亚洲无线观看免费| 免费大片18禁| 伊人久久精品亚洲午夜| 免费人成视频x8x8入口观看| 在线观看免费视频日本深夜| 好男人在线观看高清免费视频| 999久久久精品免费观看国产| 18禁黄网站禁片午夜丰满| 亚洲av成人不卡在线观看播放网| 欧美色欧美亚洲另类二区| 精品人妻视频免费看| 亚洲av电影不卡..在线观看| 热99在线观看视频| 欧美高清性xxxxhd video| 国产免费av片在线观看野外av| 国产综合懂色| 欧美一区二区国产精品久久精品| 日韩国内少妇激情av| 亚洲aⅴ乱码一区二区在线播放| 婷婷亚洲欧美| 男人的好看免费观看在线视频| 日本黄大片高清| 亚洲人成伊人成综合网2020| 成人三级黄色视频| 国内久久婷婷六月综合欲色啪| 丰满人妻一区二区三区视频av| 99久久精品一区二区三区| 亚洲狠狠婷婷综合久久图片| 内射极品少妇av片p| 国产精品久久视频播放| 动漫黄色视频在线观看| 熟女人妻精品中文字幕| 午夜免费成人在线视频| 欧洲精品卡2卡3卡4卡5卡区| 精品乱码久久久久久99久播| 国产探花在线观看一区二区| 最近视频中文字幕2019在线8| 亚洲欧美日韩东京热| 色播亚洲综合网| 国产探花极品一区二区| 亚洲最大成人手机在线| 亚洲真实伦在线观看| 色综合欧美亚洲国产小说| 久久亚洲精品不卡| 国产在线精品亚洲第一网站| 国产成人福利小说| 亚洲,欧美,日韩| 日韩av在线大香蕉| 全区人妻精品视频| 一进一出抽搐动态| 搡老岳熟女国产| 国产精品永久免费网站| 国产精品一及| av专区在线播放| 国产一区二区三区在线臀色熟女| 网址你懂的国产日韩在线| 欧美日韩福利视频一区二区| 少妇被粗大猛烈的视频| 99热精品在线国产| 亚洲aⅴ乱码一区二区在线播放| 国产精品一区二区性色av| 性欧美人与动物交配| 欧美午夜高清在线| 中文资源天堂在线| 午夜免费激情av| 2021天堂中文幕一二区在线观| 级片在线观看| av在线天堂中文字幕| 国产视频一区二区在线看| 美女 人体艺术 gogo| 久久99热这里只有精品18| 中文字幕高清在线视频| 精品久久久久久久末码| 神马国产精品三级电影在线观看| 久久久久精品国产欧美久久久| a级毛片a级免费在线| av天堂中文字幕网| 三级毛片av免费| www.色视频.com| 99久久99久久久精品蜜桃| 久久久久国内视频| 村上凉子中文字幕在线| 久久久精品大字幕| 亚洲欧美日韩卡通动漫| 国产乱人视频| 日韩欧美在线二视频| 国产精品三级大全| 婷婷精品国产亚洲av| 在线免费观看不下载黄p国产 | 成人无遮挡网站| 亚洲精品亚洲一区二区| 直男gayav资源| 中文字幕熟女人妻在线| 午夜两性在线视频| 男人狂女人下面高潮的视频| АⅤ资源中文在线天堂| 亚洲色图av天堂| 国产美女午夜福利| 国产欧美日韩一区二区三| 国产精品人妻久久久久久| 俺也久久电影网| 国产真实伦视频高清在线观看 | 成人毛片a级毛片在线播放| 色综合欧美亚洲国产小说| 国产一区二区激情短视频| 免费av不卡在线播放| 亚洲成a人片在线一区二区| 美女高潮喷水抽搐中文字幕| 亚洲va日本ⅴa欧美va伊人久久| 久久久国产成人免费| 搡女人真爽免费视频火全软件 | 精品无人区乱码1区二区| 久久久久久久久大av| 亚洲,欧美,日韩| 亚洲国产色片| 国产免费av片在线观看野外av| 中文资源天堂在线| 男人和女人高潮做爰伦理| avwww免费| 人人妻人人看人人澡| 最后的刺客免费高清国语| 深夜a级毛片| 日日摸夜夜添夜夜添小说| 中国美女看黄片| 国产午夜精品久久久久久一区二区三区 | 欧美性猛交黑人性爽| 麻豆成人av在线观看| 国产精品亚洲av一区麻豆| 九色成人免费人妻av| 国语自产精品视频在线第100页| 欧美色欧美亚洲另类二区| 波多野结衣高清作品| 亚洲色图av天堂| 97超级碰碰碰精品色视频在线观看| 丰满人妻一区二区三区视频av| 亚洲最大成人中文| 中文字幕精品亚洲无线码一区| 97超视频在线观看视频| 婷婷亚洲欧美| 在线看三级毛片| 日本精品一区二区三区蜜桃| 白带黄色成豆腐渣| 麻豆av噜噜一区二区三区| 99在线人妻在线中文字幕| 在线观看66精品国产| 亚洲一区高清亚洲精品| 长腿黑丝高跟| 欧美最新免费一区二区三区 | 亚洲专区中文字幕在线| 国产 一区 欧美 日韩| av视频在线观看入口| 精品人妻1区二区| 免费在线观看日本一区| 成人无遮挡网站| 精品久久久久久久久亚洲 | 自拍偷自拍亚洲精品老妇|