{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T13:19:53Z","timestamp":1771075193327,"version":"3.50.1"},"reference-count":55,"publisher":"MDPI AG","issue":"12","license":[{"start":{"date-parts":[[2023,6,20]],"date-time":"2023-06-20T00:00:00Z","timestamp":1687219200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Vehicular ad hoc networks (VANETs) are used for improving traffic efficiency and road safety. However, VANETs are vulnerable to various attacks from malicious vehicles. Malicious vehicles can disrupt the normal operation of VANET applications by broadcasting bogus event messages that may cause accidents, threatening people\u2019s lives. Therefore, the receiver node needs to evaluate the authenticity and trustworthiness of the sender vehicles and their messages before acting. Although several solutions for trust management in VANETs have been proposed to address these issues of malicious vehicles, existing trust management schemes have two main issues. Firstly, these schemes have no authentication components and assume the nodes are authenticated before communicating. Consequently, these schemes do not meet VANET security and privacy requirements. Secondly, existing trust management schemes are not designed to operate in various contexts of VANETs that occur frequently due to sudden variations in the network dynamics, making existing solutions impractical for VANETs. In this paper, we present a novel blockchain-assisted privacy-preserving and context-aware trust management framework that combines a blockchain-assisted privacy-preserving authentication scheme and a context-aware trust management scheme for securing communications in VANETs. The authentication scheme is proposed to enable anonymous and mutual authentication of vehicular nodes and their messages and meet VANET efficiency, security, and privacy requirements. The context-aware trust management scheme is proposed to evaluate the trustworthiness of the sender vehicles and their messages, and successfully detect malicious vehicles and their false\/bogus messages and eliminate them from the network, thereby ensuring safe, secure, and efficient communications in VANETs. In contrast to existing trust schemes, the proposed framework can operate and adapt to various contexts\/scenarios in VANETs while meeting all VANET security and privacy requirements. According to efficiency analysis and simulation results, the proposed framework outperforms the baseline schemes and demonstrates to be secure, effective, and robust for enhancing vehicular communication security.<\/jats:p>","DOI":"10.3390\/s23125766","type":"journal-article","created":{"date-parts":[[2023,6,21]],"date-time":"2023-06-21T02:30:51Z","timestamp":1687314651000},"page":"5766","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Blockchain-Assisted Privacy-Preserving and Context-Aware Trust Management Framework for Secure Communications in VANETs"],"prefix":"10.3390","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4270-1422","authenticated-orcid":false,"given":"Waheeb","family":"Ahmed","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, Dalian University of Technology, Dalian 116024, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0972-6636","authenticated-orcid":false,"given":"Wu","family":"Di","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Dalian University of Technology, Dalian 116024, China"}]},{"given":"Daniel","family":"Mukathe","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Dalian University of Technology, Dalian 116024, China"}]}],"member":"1968","published-online":{"date-parts":[[2023,6,20]]},"reference":[{"key":"ref_1","unstructured":"(2021, October 11). Global Status Report on Road Safety. Available online: https:\/\/www.who.int\/publications\/i\/item\/9789241565684."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1177\/0885412211409754","article-title":"Does Traffic Congestion Slow the Economy?","volume":"26","author":"Matthias","year":"2011","journal-title":"J. Plan. Lit."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1109\/TITS.2007.894193","article-title":"Traffic Management Center Use of Incident Detection Algorithms: Findings of a Nationwide Survey","volume":"8","author":"Williams","year":"2007","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_4","unstructured":"Yang, X., Liu, J., Zhao, F., and Vaidya, N.H. (2004, January 26\u201326). A vehicle-to-vehicle communication protocol for cooperative collision warning. Proceedings of the First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, MOBIQUITOUS 2004, Boston, MA, USA."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"4108231","DOI":"10.1155\/2022\/4108231","article-title":"Enhancing Vehicular Ad Hoc Networks\u2019 Dynamic Behavior by Integrating Game Theory and Machine Learning Techniques for Reliable and Stable Routing","volume":"2022","author":"Phull","year":"2022","journal-title":"Secur. Commun. Netw."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"779","DOI":"10.1109\/COMST.2018.2873088","article-title":"Survey on misbehavior detection in cooperative intelligent transportation systems","volume":"21","author":"Dietzel","year":"2019","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Akwirry, B., Bessis, N., Malik, H., and McHale, S. (2022). A Multi-Tier Trust-Based Security Mechanism for Vehicular Ad-Hoc Network Communications. Sensors, 22.","DOI":"10.3390\/s22218285"},{"key":"ref_8","first-page":"7","article-title":"VANet security challenges and solutions: A survey","volume":"7","author":"Hasrouny","year":"2017","journal-title":"Veh. Commun."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Soomro, I.A., Hasbullah, H., and Manan, J.B.A. (2010, January 15\u201317). User requirements model for vehicular Ad hoc network applications. Proceedings of the 2010 International Symposium on Information Technology, Kuala Lumpur, Malaysia.","DOI":"10.1109\/ITSIM.2010.5561602"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"101740","DOI":"10.1016\/j.adhoc.2018.08.010","article-title":"On trust models for communication security in vehicular ad-hoc networks","volume":"90","author":"Fan","year":"2018","journal-title":"Ad Hoc Netw."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Sumithra, S., and Vadivel, R. (2018, January 10\u201312). An Overview of Various Trust Models for VANET Security Establishment. Proceedings of the 2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT), Bengaluru India.","DOI":"10.1109\/ICCCNT.2018.8494009"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"31309","DOI":"10.1109\/ACCESS.2021.3060046","article-title":"A Comprehensive Review of Authentication Schemes in Vehicular Ad-Hoc Network","volume":"9","author":"Azam","year":"2021","journal-title":"IEEE Access"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1007\/s12083-012-0136-8","article-title":"A social network approach to trust management in VANETs","volume":"7","author":"Huang","year":"2014","journal-title":"Peer Peer Netw. Appl."},{"key":"ref_14","first-page":"1","article-title":"Trust On the Security of Wireless Vehicular Ad-hoc Networking","volume":"24","author":"Rawat","year":"2015","journal-title":"Ad Hoc Sens. Wirel. Netw."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"380","DOI":"10.1109\/ACCESS.2017.2765303","article-title":"An Enhanced Distributed Trust Computing Protocol for VANETs","volume":"6","author":"Gazdar","year":"2018","journal-title":"IEEE Access"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"7108","DOI":"10.1109\/TVT.2019.2919681","article-title":"An Attack-Resistant Trust Inference Model for Securing Routing in Vehicular Ad Hoc Networks","volume":"68","author":"Xia","year":"2019","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Siddiqui, S.A., Mahmood, A., Sheng, Q.Z., Suzuki, H., and Ni, W. (2021, January 20\u201322). A Time-aware Trust Management Heuristic for the Internet of Vehicles. Proceedings of the 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Shenyang, China.","DOI":"10.1109\/TrustCom53373.2021.00019"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"155014771982582","DOI":"10.1177\/1550147719825820","article-title":"Trust management in social Internet of vehicles: Factors, challenges, blockchain, and fog solutions","volume":"15","author":"Iqbal","year":"2019","journal-title":"Int. J. Distrib. Sens. Networks"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1186\/s13638-021-01958-8","article-title":"A survey: Applications of blockchain in the Internet of Vehicles","volume":"2021","author":"Wang","year":"2021","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"key":"ref_20","first-page":"100458","article-title":"Security of Vehicular Ad Hoc Networks using blockchain: A comprehensive review","volume":"34","author":"Grover","year":"2022","journal-title":"Veh. Commun."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"102980","DOI":"10.1016\/j.adhoc.2022.102980","article-title":"Blockchain-based vehicular ad-hoc networks: A comprehensive survey","volume":"137","author":"Dwivedi","year":"2022","journal-title":"Ad Hoc Netw."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1016\/j.inffus.2021.03.003","article-title":"LPPTE: A lightweight privacy-preserving trust evaluation scheme for facilitating distributed data fusion in cooperative vehicular safety applications","volume":"73","author":"Liu","year":"2020","journal-title":"Inf. Fusion"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"5943","DOI":"10.1109\/JIOT.2021.3060751","article-title":"PPTM: A Privacy-Preserving Trust Management Scheme for Emergency Message Dissemination in Space\u2013Air\u2013Ground-Integrated Vehicular Networks","volume":"9","author":"Liu","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"6647","DOI":"10.1109\/JIOT.2020.2975084","article-title":"TROVE: A Context-Awareness Trust Model for VANETs Using Reinforcement Learning","volume":"7","author":"Guo","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"16504","DOI":"10.1109\/TITS.2021.3129458","article-title":"A Hybrid Approach to Trust Node Assessment and Management for VANETs Cooperative Data Communication: Historical Interaction Perspective","volume":"23","author":"Gao","year":"2022","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"15079","DOI":"10.1109\/TITS.2021.3136548","article-title":"DUEL: Dempster Uncertainty-Based Enhanced- Trust Level Scheme for VANET","volume":"23","author":"Bhargava","year":"2022","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"4028","DOI":"10.1109\/JIOT.2019.2957520","article-title":"TCEMD: A Trust Cascading-Based Emergency Message Dissemination Model in VANETs","volume":"7","author":"Liu","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_28","first-page":"100350","article-title":"Blockchain-based distributed management system for trust in VANET","volume":"30","author":"Inedjaren","year":"2021","journal-title":"Veh. Commun."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Ghaleb, F.A., Maarof, M.A., Zainal, A., Al-Rimy, B.A.S., Alsaeedi, A., and Boulila, W. (2019). Ensemble-Based Hybrid Context-Aware Misbehavior Detection Model for Vehicular Ad Hoc Network. Remote Sens., 11.","DOI":"10.3390\/rs11232852"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"28643","DOI":"10.1109\/ACCESS.2018.2837887","article-title":"TEAM: A Trust Evaluation and Management Framework in Context-Enabled Vehicular Ad-Hoc Networks","volume":"6","author":"Ahmad","year":"2018","journal-title":"IEEE Access"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Ghaleb, F.A., Saeed, F., Alkhammash, E.H., Alghamdi, N.S., and Al-Rimy, B.A.S. (2022). A Fuzzy-Based Context-Aware Misbehavior Detecting Scheme for Detecting Rogue Nodes in Vehicular Ad Hoc Network. Sensors, 22.","DOI":"10.3390\/s22072810"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"73685","DOI":"10.1109\/ACCESS.2022.3189349","article-title":"CTMF: Context-Aware Trust Management Framework for Internet of Vehicles","volume":"10","author":"Rehman","year":"2022","journal-title":"IEEE Access"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Ghajar, F.G., Sratakhti, J.S., and Sikora, A. (2021). SBTMS: Scalable Blockchain Trust Management System for VANET. Appl. Sci., 11.","DOI":"10.3390\/app112411947"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"3092","DOI":"10.1007\/s12083-021-01164-9","article-title":"Trust and scalable blockchain-based message exchanging scheme on VANET","volume":"14","author":"Chukwuocha","year":"2021","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Hasrouny, H., Samhat, A.E., Bassil, C., and Laouiti, A. (2018, January 3\u20135). A security solution for V2V communication within VANETs. Proceedings of the 2018 Wireless Days (WD), Dubai, United Arab Emirates.","DOI":"10.1109\/WD.2018.8361716"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"328","DOI":"10.1007\/978-3-642-35416-8_23","article-title":"Efficient Self-organized Trust Management in Location Privacy Enhanced VANETs","volume":"Volume 7690","author":"Lee","year":"2012","journal-title":"Information Security Applications"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"3076","DOI":"10.1007\/s11227-018-2312-y","article-title":"Secure CLS and CL-AS schemes designed for VANETs","volume":"75","author":"Kumar","year":"2019","journal-title":"J. Supercomput."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1109\/JSYST.2020.2966526","article-title":"Efficient Certificateless Aggregate Signature with Conditional Privacy Preservation in IoV","volume":"15","author":"Mei","year":"2021","journal-title":"IEEE Syst. J."},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Zhao, N., and Zhang, G. (2019, January 23\u201325). Privacy-Protected Certificateless Aggregate Signature Scheme in VANET. Proceedings of the 2019 11th International Conference on Wireless Communications and Signal Processing (WCSP), Xi\u2019an, China.","DOI":"10.1109\/WCSP.2019.8928040"},{"key":"ref_40","first-page":"1","article-title":"On the security of privacy-preserving authentication scheme with full aggregation in vehicular ad hoc network","volume":"3","author":"Kamil","year":"2020","journal-title":"Secur. Priv."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"5276813","DOI":"10.1155\/2020\/5276813","article-title":"Efficient Certificateless Aggregate Signature Scheme for Performing Secure Routing in VANETs","volume":"2020","author":"Xu","year":"2020","journal-title":"Secur. Commun. Netw."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"50974","DOI":"10.1109\/ACCESS.2018.2869543","article-title":"MDBV: Monitoring Data Batch Verification for Survivability of Internet of Vehicles","volume":"6","author":"Liu","year":"2018","journal-title":"IEEE Access"},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"15605","DOI":"10.1109\/ACCESS.2022.3147595","article-title":"A Conditional Privacy-Preserving Certificateless Aggregate Signature Scheme in the Standard Model for VANETs","volume":"10","author":"Wang","year":"2022","journal-title":"IEEE Access"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"722","DOI":"10.1109\/TDSC.2019.2904274","article-title":"PA-CRT: Chinese Remainder Theorem Based Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks","volume":"18","author":"Zhang","year":"2021","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"7863","DOI":"10.1109\/TVT.2022.3169948","article-title":"Efficient Certificateless Conditional Privacy-Preserving Authentication for VANETs","volume":"71","author":"Zhou","year":"2022","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"2563","DOI":"10.1109\/JIOT.2019.2944632","article-title":"CB-CAS: Certificate-Based Efficient Signature Scheme with Compact Aggregation for Industrial Internet of Things Environment","volume":"7","author":"Verma","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"5000","DOI":"10.1109\/JIOT.2020.3034307","article-title":"An Enhanced Certificateless Aggregate Signature Without Pairings for E-Healthcare System","volume":"8","author":"Yang","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"2681","DOI":"10.1109\/TIFS.2015.2473820","article-title":"An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks","volume":"10","author":"He","year":"2015","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_49","unstructured":"(2021, April 05). Veins. Available online: http:\/\/veins.car2x.org."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1109\/TMC.2010.133","article-title":"Bidirectionally coupled network and road simulation for improved IVC analysis","volume":"10","author":"Sommer","year":"2011","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_51","unstructured":"Behrisch, M., Bieker, L., Erdmann, J., and Krajzewicz, D. (2021, April 05). SUMO\u2014Simulation of Urban MObility. Iaria 2011. Available online: https:\/\/www.eclipse.org\/sumo\/."},{"key":"ref_52","unstructured":"Behrisch, M., Bieker, L., Erdmann, J., and Krajzewicz, D. (2011, January 23\u201329). SUMO\u2014Simulation of Urban MObility: An overview. Proceedings of the SIMUL 2011, the Third International Conference on Advances in System Simulation, ThinkMind, Barcelona, Spain."},{"key":"ref_53","unstructured":"(2021, April 05). OMNET. Available online: https:\/\/omnetpp.org\/."},{"key":"ref_54","unstructured":"(2022, January 20). OpenStreetMap. Available online: https:\/\/www.openstreetmap.org."},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1109\/MPRV.2008.80","article-title":"OpenStreetMap: User-Generated Street Maps","volume":"7","author":"Haklay","year":"2008","journal-title":"IEEE Pervasive Comput."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/12\/5766\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T19:57:25Z","timestamp":1760126245000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/12\/5766"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,20]]},"references-count":55,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2023,6]]}},"alternative-id":["s23125766"],"URL":"https:\/\/doi.org\/10.3390\/s23125766","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6,20]]}}}