{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T04:28:57Z","timestamp":1772252937002,"version":"3.50.1"},"reference-count":40,"publisher":"MDPI AG","issue":"14","license":[{"start":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T00:00:00Z","timestamp":1658102400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"This research was funded by the Key Research and Development Plan Project of Shaanxi Province","award":["2022GY-039"],"award-info":[{"award-number":["2022GY-039"]}]},{"name":"This research was funded by the Key Research and Development Plan Project of Shaanxi Province","award":["2022GY-030"],"award-info":[{"award-number":["2022GY-030"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Vehicular ad-hoc networks (VANETs) aim to provide a comfortable driving experience. Sharing messages in VANETs can help with traffic management, congestion mitigation, and driving safety. However, forged or false messages may undermine the efficiency of VANETs. In this paper, we propose a security scheme based on blockchain technology, where two types of blockchain are constructed based on roadside units (RSUs) and Certificate Authorities (CAs), respectively. The proposed security scheme has multifold goals to identify malicious nodes and detect forged messages based on multiple factors, such as reputation of sender nodes, and time and distance effectiveness of messages. In addition, an incentive mechanism is introduced on the RSU blockchain to encourage RSUs to adopt active behaviors. Extensive simulations show that the proposed scheme exhibits superior performances to existing methods in detecting forged messages and identifying malicious nodes. Meanwhile, it provides privacy protection and improves the efficiency of vehicular networks.<\/jats:p>","DOI":"10.3390\/s22145361","type":"journal-article","created":{"date-parts":[[2022,7,19]],"date-time":"2022-07-19T00:19:21Z","timestamp":1658189961000},"page":"5361","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["On a Blockchain-Based Security Scheme for Defense against Malicious Nodes in Vehicular Ad-Hoc Networks"],"prefix":"10.3390","volume":"22","author":[{"given":"Guandong","family":"Liu","sequence":"first","affiliation":[{"name":"School of Economics and Management, Chang\u2019an University, Xi\u2019an 710064, China"}]},{"given":"Na","family":"Fan","sequence":"additional","affiliation":[{"name":"School of Information Engineering, Chang\u2019an University, Xi\u2019an 710064, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8218-1209","authenticated-orcid":false,"given":"Chase Q.","family":"Wu","sequence":"additional","affiliation":[{"name":"Department of Data Science, New Jersey Institute of Technology, Newark, NJ 07102, USA"}]},{"given":"Xiaomin","family":"Zou","sequence":"additional","affiliation":[{"name":"School of Information Engineering, Chang\u2019an University, Xi\u2019an 710064, China"}]}],"member":"1968","published-online":{"date-parts":[[2022,7,18]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1109\/COMST.2015.2410831","article-title":"A survey on platoon-based vehicular cyber-physical systems","volume":"18","author":"Jia","year":"2015","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Kerrache, C.A., Lakas, A., and Lagraa, N. (2017, January 20\u201322). Detection of Intelligent Malicious and Selfish Nodes in VANET using Threshold Adaptive Control. Proceedings of the International Conference on Electronic Devices IEEE, Coimbatore, India.","DOI":"10.1109\/ICEDSA.2016.7818492"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"4428","DOI":"10.1002\/sec.1618","article-title":"Rita: Risk-aware trust-based architecture for collaborative multi-hop vehicular communications","volume":"9","author":"Kerrache","year":"2016","journal-title":"Secur. Commun. Netw."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Kothari, A., Shukla, P., and Pandey, R. (2017, January 21\u201323). Trusit centric approach based on similarity in VANET. Proceedings of the International Conference on Signal Processing IEEE, Xiamen, China.","DOI":"10.1109\/SCOPES.2016.7955781"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1109\/JIOT.2015.2388581","article-title":"A contex- t-aware trust-based information dissemination framework for vehicular networks","volume":"2","author":"Rostamzadeh","year":"2015","journal-title":"IEEE Internet Things J."},{"key":"ref_6","first-page":"131","article-title":"An Identity and Location for Vehicle Networking Methods","volume":"39","author":"Qun","year":"2012","journal-title":"Comput. Sci."},{"key":"ref_7","unstructured":"Li, L. (2017). Research on Pseudo-Name Based Privacy Protection in the Internet of Vehicles, Springer."},{"key":"ref_8","unstructured":"Xu, H., Zhengguo, S., Daxin, T., Yunpeng, W., Xuting, D., and Victor C.M., L. (2018, January 25). Optimized anonymity updating in VANET based on information and privacy joint metrics. Proceedings of the 8th ACM International Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications, Montreal, QC, Canada."},{"key":"ref_9","first-page":"134","article-title":"Research on Group Signature Based Identity Authentication Protocol in Internet of Vehicles","volume":"50","author":"Minghui","year":"2018","journal-title":"Eng. Sci. Technol."},{"key":"ref_10","first-page":"620","article-title":"Efficient conditional privacy-preserving and authentication scheme for secure service provision in VANET","volume":"21","author":"Hong","year":"2017","journal-title":"Tsinghua Sci. Technol."},{"key":"ref_11","first-page":"700","article-title":"Social contribution-based routing protocol for vehicular network with selfish nodes","volume":"2014","author":"Gong","year":"2014","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"570","DOI":"10.1109\/JIOT.2014.2366120","article-title":"An efficient and lightweight intrusion detection mechanism for service-oriented vehicular networks","volume":"1","author":"Sedjelmaci","year":"2014","journal-title":"IEEE Internet Things J."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"965","DOI":"10.1016\/j.procs.2015.01.006","article-title":"Detection of malicious nodes (DMN) in vehicular ad hoc networks","volume":"46","author":"Khan","year":"2015","journal-title":"Proc. Comput. Sci."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"3657","DOI":"10.1109\/TVT.2014.2360883","article-title":"A job market signaling scheme for incentive and trust management in vehicular ad hoc networks","volume":"64","author":"Haddadou","year":"2015","journal-title":"Veh. Technol. IEEE Trans."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Bali, R.S., and Kumar, N. (2016). Secure Clustering for Efficient Data Dissemination in Vehicular Cyber Physical Systems, Elsevier.","DOI":"10.1016\/j.future.2015.09.004"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"1652","DOI":"10.1002\/sec.862","article-title":"Intrusion-aware trust model for vehicular ad hoc networks","volume":"7","author":"Shaikh","year":"2016","journal-title":"Secur. Commun. Netw."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Gurung, S., Lin, D., Squicciarini, A.C., and Bertino, E. (2013). Information-Oriented Trust-Worthiness Evaluation in Vehicular Ad-Hoc Networks, Springer.","DOI":"10.1007\/978-3-642-38631-2_8"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Mohamed, M.S., Hussein, S., and Krings, A. (2017, January 9\u201311). An Enhanced Voting Algorithm for Hybrid Jamming attacks in VANET. Proceedings of the IEEE 7th Annual Computing and Communication Workshop and Conference(CCWC), Las Vegas, NV, USA.","DOI":"10.1109\/CCWC.2017.7868347"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Alturkostani, H., and Krings, A. (2014, January 3\u20137). The impact of jamming on threshold-based agreement in VANET. Proceedings of the International Conference on Connected Vehicles and Expo (ICCVE), Vienna, Austria.","DOI":"10.1109\/ICCVE.2014.7297682"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Ahmed, S., and Tepe, K. (2017, January 24\u201327). Recommendation trust for improved malicious node detection in ad hoc networks. Proceedings of the IEEE 86th VTC-Fall, Toronto, ON, Canada.","DOI":"10.1109\/VTCFall.2017.8288217"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1016\/j.adhoc.2016.10.011","article-title":"Using trust model to ensure reliable data acquisition in VANETs","volume":"55","author":"Yao","year":"2016","journal-title":"Ad Hoc Netw."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"960","DOI":"10.1109\/TITS.2015.2494017","article-title":"ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks","volume":"17","author":"Li","year":"2016","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Ahmed, S., and Tepe, K. (2016, January 3\u20136). Misbehaviour detection in vehicular networks using logistictrust. Proceedings of the Wireless Communications and Networking Conference (WCNC), Doha, Qatar.","DOI":"10.1109\/WCNC.2016.7564966"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1016\/j.compeleceng.2015.02.018","article-title":"An accurate and efficient collaborative intrusion detection framework to secure vehicular networks","volume":"43","author":"Sedjelmaci","year":"2015","journal-title":"Comput. Electr. Eng."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"384","DOI":"10.1109\/JSYST.2013.2245971","article-title":"Vehicular Security Through Reputation and Plausibility Checks","volume":"8","author":"Dhurandher","year":"2014","journal-title":"IEEE Syst. J."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Arora, A., and Yadav, S.K. (2018, January 26\u201327). Block Chain Based Security Mechanism for Internet of Vehicles (IoV). Proceedings of the 3rd International Conference on Internet of Things and Connected Technologies, (ICIoTCT) 2018, Jaipur, India.","DOI":"10.2139\/ssrn.3166721"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"45655","DOI":"10.1109\/ACCESS.2018.2864189","article-title":"A privacy-preserving trust model based on blockchain for VANETs","volume":"6","author":"Lu","year":"2018","journal-title":"IEEE Access"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"1495","DOI":"10.1109\/JIOT.2018.2836144","article-title":"Blockchain-based decentralized trust management in vehicular networks","volume":"6","author":"Yang","year":"2018","journal-title":"IEEE Internet Things J."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"30868","DOI":"10.1109\/ACCESS.2019.2903202","article-title":"Blockchain-Based Traffic Event Validation and Trust Verification for VANETs","volume":"7","author":"Tsung","year":"2019","journal-title":"IEEE Access"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Wagner, M., and McMillin, B. (2018, January 4\u20137). Cyber-Physical Transactions: A Method for Securing VANETs with Blockchains. Proceedings of the IEEE Pacific Rim International Symposium on Dependable Computing, PRDC, Taipei, China.","DOI":"10.1109\/PRDC.2018.00017"},{"key":"ref_31","unstructured":"Nisha, M., Priyadarsi, N., Arushi, A., Xiangjian, H., and Deepak, P. (2018, January 1\u20133). Blockchain Based Secured Identity Authentication and Expeditious Revocation Framework for Vehicular Networks. Proceedings of the 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications\/12th IEEE International Conference on Big Data Science and Engineering, New York, NY, USA."},{"key":"ref_32","unstructured":"Zhaojun, L., Qian, W., Gang, Q., and Zhenglin, L. (2018, January 1\u20133). BARS: A Blockchain-Based Anonymous Reputation System for Trust Management in VANETs. Proceedings of the 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, New York, NY, USA."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Khan, A.S., Balan, K., Javed, Y., Tarmizi, S., and Abdullah, J. (2019). Secure Trust-Based Blockchain Architecture to Prevent Attacks in VANET. Sensors, 19.","DOI":"10.3390\/s19224954"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"1178","DOI":"10.1007\/s12083-019-00786-4","article-title":"Blockchain Meets VANET: An Architecture for Identity and Location Privacy Protection in VANET","volume":"12","author":"Li","year":"2019","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"ref_35","unstructured":"Javaid, U., Aman, M.N., and Sikdar, A.B. (May, January 28). DrivMan: Driving Trust Management and Data Sharing in VANETs with Blockchain and Smart Contracts. Proceedings of the IEEE Vehicular Technology Conference, Kuala Lumpur, Malaysia."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Dai, C., Xiao, X., Ding, Y., Xiao, L., Tang, Y., and Zhou, S. (2018, January 19\u201321). Learning Based Security for VANET with Blockchain. Proceedings of the IEEE International Confrence onCommunication System(ICCS), Chengdu, China.","DOI":"10.1109\/ICCS.2018.8689228"},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Zheng, Z., Xie, S., Dai, H., Chen, X., and Wang, H. (2017, January 25\u201330). An overview of blockchain technology: Architecture, consensus, and future trends. Proceedings of the IEEE 6th International Congress on Big Data, BigData Congress 2017, Honolulu, HI, USA.","DOI":"10.1109\/BigDataCongress.2017.85"},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"5897","DOI":"10.1007\/s11276-020-02413-0","article-title":"Optimal solution for malicious node detection and prevention using hybrid chaotic particle dragonfly swarm algorithm in VANETs","volume":"26","author":"Prabakeran","year":"2020","journal-title":"Wirel. Netw."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1002\/sec.1506","article-title":"Genetic-based framework for preventionof masquerade and DDoS attacks invehicularad-hocnetworks","volume":"9","author":"Malhi","year":"2016","journal-title":"Secur. Commun. Netw."},{"key":"ref_40","first-page":"1","article-title":"A trust based model (TBM) to detect rogue nodes in vehicular ad-hoc networks (VANETS)","volume":"11","author":"Tripathi","year":"2019","journal-title":"Int. J. Syst. Assur. Eng. Manag."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/14\/5361\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T23:53:10Z","timestamp":1760140390000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/14\/5361"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,18]]},"references-count":40,"journal-issue":{"issue":"14","published-online":{"date-parts":[[2022,7]]}},"alternative-id":["s22145361"],"URL":"https:\/\/doi.org\/10.3390\/s22145361","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,7,18]]}}}