5 PDF
5 PDF
3, JUNE 2019
   Abstract—The drastically increasing volume and the growing                 information mainly includes traffic-related data, such as road
trend on the types of data have brought in the possibility of real-           and weather conditions, and parking lot occupancy. The sub-
izing advanced applications such as enhanced driving safety, and              jective information includes things such as rating of a hotel
have enriched existing vehicular services through data sharing
among vehicles and data analysis. Due to limited resources with               and quality of vehicular services [4]. Sharing of data has made
vehicles, vehicular edge computing and networks (VECONs) i.e.,                it possible to realize goals such as improved driving safety, and
the integration of mobile edge computing and vehicular networks,              to obtain higher service quality during travelling.
can provide powerful computing and massive storage resources.                    Due to resource constraints, vehicles cannot support massive
However, road side units that primarily presume the role of vehic-            data storage and large-scale data sharing. Vehicle-generated
ular edge computing servers cannot be fully trusted, which may
lead to serious security and privacy challenges for such inte-                data becomes increasingly fine-grained and complex, which
grated platforms despite their promising potential and benefits.              increases the burden on data transmission. Meanwhile, the
We exploit consortium blockchain and smart contract technolo-                 data more locally relevant for vehicles has spatial scope and
gies to achieve secure data storage and sharing in vehicular                  explicit lifetime of utility, such as current traffic information
edge networks. These technologies efficiently prevent data sharing            at an intersection, which requires low latency and location
without authorization. In addition, we propose a reputation-based
data sharing scheme to ensure high-quality data sharing among                 awareness for vehicular data sharing [2]. To address these
vehicles. A three-weight subjective logic model is utilized for               challenges, mobile edge computing is a promising paradigm
precisely managing reputation of the vehicles. Numerical results              that can be embedded at the network edge infrastructures,
based on a real dataset show that our schemes achieve reasonable              e.g., roadside units (RSUs), to support massive data stor-
efficiency and high-level of security for data sharing in VECONs.             age, computing and sharing close to the vehicles [2], [5].
  Index Terms—Blockchain, reputation management, security                     Vehicular networks integrated with mobile edge computing
and privacy, smart contracts, vehicular edge computing.                       are evolving toward vehicular edge computing and networks
                                                                              (VECONs) [6].
                                                                                 Security and privacy issues are critical challenges for
                         I. I NTRODUCTION                                     VECONs. RSUs in VECONs play an important role to tem-
         ITH rapid development of vehicular telematics and
W        applications, vehicles generate a huge amount and sev-
eral different types of data. For example, a self-driving vehicle
                                                                              porally store and manage vehicular data. But the RSUs are
                                                                              semi-trusted as they are usually distributed along the road
                                                                              without any strong security measures, thus making them vul-
can create 1 GB data per second from cameras, radar, GPS,                     nerable to being compromised by attackers [2], [7], [8].
etc. [1]. Moreover, vehicles can cooperatively collect and share              Vehicles therefore may not be willing to upload their data
data of common interest [2], [3]. Data collected by the vehicles              to the RSUs because of privacy concerns. Likewise, peer to
consists of objective and subjective information. The objective               peer (P2P) data sharing among vehicles raises the issues such
                                                                              as data access without authorization and the need of ensuring
   Manuscript received April 17, 2018; revised September 7, 2018; accepted    security in a decentralized manner. These challenges influence
October 2, 2018. Date of publication October 11, 2018; date of current ver-
sion June 19, 2019. This work was supported in part by the NSFC under         the sharing of vehicular data, and thus hinder the pace for
Grant 61379115, Grant 61422201, Grant 61501127, Grant 61370159, Grant         development of VECONs [9].
61503083, Grant U1301255, and Grant U1501251, in part by the Science and         Recently, blockchain technology has attracted growing
Technology Program of Guangdong Province under Grant 2015B010129001,
Grant 2015B010106010, Grant 2016A030313705, Grant 2014B090907010,             attention and research work in the context of vehicular
and Grant 2015B010131014, and in part by the Projects funded by the           networks because of its characteristics of decentralization,
Research Council of Norway under Grant 240079/F20. (Corresponding             anonymity and trust. Blockchain can facilitate establish-
author: Yan Zhang.)
   J. Kang, R. Yu, X. Huang, M. Wu, and S. Xie are with the School of         ing a secure, trusted and decentralized intelligent trans-
Automation, Guangdong University of Technology, Guangzhou 510006, China       port ecosystem, to address data sharing problems thus
(e-mail: kjwx886@163.com; yurong@ieee.org; huangxu_min@163.com;               contributing in creating better usage of the transport
maoqiang.wu@vip.163.com; shlxie@gdut.edu.cn).
   S. Maharjan is with the Simula Metropolitan Center for Digital             infrastructures and resources [9]–[11]. Singh and Kim [12]
Engineering, Norway and University of Oslo, 0316 Oslo, Norway (e-mail:        presented an intelligent vehicle-trust point mechanism using
sabita@simula.no).                                                            blockchain to support secure communications among vehi-
   Y. Zhang is with Department of Informatics, University of Oslo, Norway
(e-mail: yanzhang@ieee.org).                                                  cles. However, due to high cost to establish a public
   Digital Object Identifier 10.1109/JIOT.2018.2875542                        blockchain in resource-limited vehicles, the existing methods
                      2327-4662 c 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
                           See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
KANG et al.: BLOCKCHAIN FOR SECURE AND EFFICIENT DATA SHARING IN VECONs                                                                      4661
                            TABLE I
                M AIN S YMBOLS U SED IN T HIS PAPER
  2) Step 2 (Building Information Blocks and Finding Proof-       Protocol 1 Distributed Consensus Protocol for DAGs
     of-Work): vi sends its data information index to a nearby    1. The leader broadcasts block data to all DAGs in the vehicular
                                                                  blockchain for verification and audit.
     DAG (e.g., DAGj ). DAGj collects all local information       DAGj → All : Record = (Block_data||Block_hash
     (e.g., indexes) during a certain period, and then encrypts                      ||CertBSj ||SigDAGj ||timestamp),
     and digitally signs these indexes to guarantee authentic-    where Block_hash = Hash(Block_Data||timestamp),
     ity and accuracy. Fig. 1 shows that the index records               SigDAGj = SignSKDAG (Block_data||Block_hash).
                                                                                                j
     are structured into blocks. For traceability and verifica-   2. The DAGs broadcast their own audit results to each other for
     tion, each block contains a cryptographic hash to the        mutual supervision and verification, and then send their replies back
                                                                  to the leader.
     prior blocks in the vehicular blockchain. Similar to that    DAGl → DAGj : Reply = EPKDAG (Data_2
     in Bitcoin, the DAGs try to find their own valid proof-                                         j
                                                                                   ||CertDAGl ||SigDAGl ||timestamp),
     of-work about data audit (i.e., a hash value meeting a       where Data_2 = (my_result||Rece_results||Comparison),
     certain level of difficulty). Each DAG calculates the hash          SigDAGl = SignSKDAG (Data_2).
                                                                                               l
     value of its block based on a random nonce value ϕ, the      3. The leader adds new block data into vehicular blockchain after
     previous block hash value, timestamp, and data blocks’       verifying by DAGs, and broadcasts the block data to all DAGs for
     merkel root, and so on (denoted as previousdata ) [21].      storage.
     Namely, Hash(ϕ + previousdata ) < Difficulty. Here,          DAGj → All : Data_block = (Data_3||SigDAGj ||
     Difficulty can be adjusted by the system to control the                       timestamp),
     speed of finding out the specific ϕ. After finding a valid   where Data_3 = (Block_data||Block_hash||{CertDAGj }||
     proof-of-work (i.e., ϕ), the fastest miner (DAG) broad-             timestamp),
     casts the block and the specific ϕ to other DAGs in the       SigDAGj = SignSKDAG (Data_3).
                                                                                        j
     vehicular blockchain. Other DAGs audit and verify the
     records in the block and ϕ. If other DAGs agree on the
     block, data information in this block will be added to
                                                                  by information indexes. The data requestors choose their opti-
     the vehicular blockchain by a linear, chronological order,
                                                                  mal data providers according to reputation of providers. More
     and the fastest miner (DAG) is awarded by vehicle coins.
                                                                  details about the reputation calculation are given in Section IV.
  3) Step 3 (Carrying Out a Consensus Process): The con-
                                                                  For example, a data requestor vm sends a data sharing request
     sensus process is carried out by authorized DAGs and
                                                                  (Req) to a data provider vi . This request includes time, the
     a leader acted by the fastest DAG with a valid proof-
                                                                  usage of requested data, sharing times, etc.,
     of-work. Fig. 3 shows that the leader broadcasts block
     data Block_data with timestamp and its proof-of-work             vm → vi : Req = EPKvi (Request||Certvm ||timestamp).
     to other authorized DAGs for verification and audit.
     For mutual supervision and verification, these DAGs             2) Step 2 (Data Sharing Authorization): After receiving the
     audit the block data and broadcast their audit results       request Req, vi verifies the identity of vm , and defines the data
     with their signatures to each other. After receiving the     access constraints based on the request from vm . After that,
     audit results, each DAG compares its result with oth-        vi sends the access constraints, pseudonyms’ private keys of
     ers and sends a reply (Reply) back to the leader. This       uploaded data, public key of the data requestor, and so on to
     reply consists of the DAG’s audit result my_result, com-     a nearby RSU, e.g., RSUj
     parison result Comparison, signatures, and records of        vi → RSUj : Message
     received audit results Rece_results. The leader analyzes
                                                                      = EPKRSUj (Constraints||SKPIDk ||PKvm ||timestamp||Certvi ).
     the received replies from DAGs. If all the DAGs agree                                             i
     on the block data, the leader will send records including    The ISSC is triggered by Message from vi . RSUs first verify
     current audited block data and a corresponding signature     the certificate of vi , and check the shared data information of
     to all authorized DAGs for storage. After that, this block   vi in the vehicular blockchain. The RSUs obtain and integrate
     is stored in the vehicular blockchain, and the leader is     the shared data stored in the vehicular blockchain according to
     awarded by vehicle coins. More details about the con-        the given pseudonyms’ private keys of shared data. The shared
     sensus process are given in Protocol 1. If some DAGs         data is encrypted with the public key of data requestor vm . If
     do not agree on the block data, the leader will analyze      vi and vm are at the same coverage of a local DAG, the shared
     the audit results, and send the block data to these DAGs     data will be sent to vm directly. Otherwise, the shared data
     once again for audit if necessary [13].                      will be sent to a DAG nearby vm
                                                                        RSUj → RSUj+1 : Shared_data
                                                                             = EPKRSUj+1 (Data_2||timestamp||CertRSUj )
C. Secure and Efficient Data Sharing Scheme Using ISSC
                                                                      Data_2 = EPKvm (Data||Certvi ||CertRSUj ||timestamp).
   The P2P data sharing process among vehicles using ISSC
consists of the following steps.                                     3) Step 3 (Recording and Generating Data Sharing Events
   1) Step 1 (Uploading Data Sharing Requests): Data              in the Vehicular Blockchain): After obtaining the shared data,
requestors first download the latest data blocks in the vehic-    the data requestor pays for the provider using vehicle coins,
ular blockchain from DAGs, and search their data of interest      and generates a record of the data sharing event, and adds this
KANG et al.: BLOCKCHAIN FOR SECURE AND EFFICIENT DATA SHARING IN VECONs                                                               4665
  3) Trajectory Similarity: Data collected by vehicles is                         two trajectories Li and Lj . More specifically,
     locally relevant for vehicles, and has spatial scope.                                              
                                                                                                          sin ϕ
     To enable location awareness and improve data rele-                                            	          ,0 < ϕ ≤ π
                                                                                    direction Li , Lj = 1 2 |sin(ϕ+ π )| 2 π          (9)
                                                                                                          2 +            , 2 < ϕ ≤ π.
                                                                                                                      2
     vance, trajectory similarity is taken into consideration on                                                    2
     reputation calculation during data sharing among vehi-
                                                                                  Therefore, the overall weight of reputation for local
     cles. The higher trajectory similarity means the sharing
                                                                                  opinions is
     data from the data provider is more relevant leading                                                                    	
     to high-quality, more accurate and reliable data shar-                                  δi→j = ρ1 IFi→j + ρ2 SIM Li , Lj      (10)
     ing [20]. The trajectory coefficients of vehicles are
                                                                                  where ρ1 + ρ2 = 1, and 0 < ρ1 ≤ 1, 0 < ρ2 ≤ 1.
     represented by υ = {speed, location, direction}. The
     weights of corresponding coefficients in υ are ψ1 , ψ2 ,
     and ψ3 , and ψ1 + ψ2 + ψ3 = 1. The similarity                         C. Combining Recommended Opinions
     degree of two trajectory segments (denoted as Li and                     After calculating the weights, the opinions are com-
     Lj ) for vehicle i and vehicle j is SIM(Li , Lj ), which is           bined into a common opinion in the form ωx→j       rec   :=
     calculated as                                                         {bx→j , dx→j , ux→j }, where
                                                                             rec    rec    rec
                           	                    	                                         ⎧ rec               
                                                                                            ⎪ bx→j =                δx→j bx→j
                                                                                            ⎪         1
                 SIM Li , Lj = 1 − DISS Li , Lj .            (5)                            ⎪             δx→j
                                                                                            ⎪
                                                                                            ⎨ rec     x∈X       x∈X
                                                                                                                
       Here, DISS(Li , Lj ) is the normalized dissimilarity                                    dx→j =  1δ          δx→j dx→j     (11)
                                                                                                            x→j
                                                                                            ⎪
                                                                                            ⎪         x∈X       x∈X
                                                                                                                
       of two trajectory segments Li and Lj , and is                                        ⎪
                                                                                            ⎪
                                                                                            ⎩ ux→j =                δx→j ux→j
                                                                                                rec      1
       defined as                                                                                         δ      x→j
                                                                                                           x∈X         x∈X
                    	                 	                     	           where x ∈ X is a set of recommended vehicles that have
         DISS Li , Lj = ψ1 speed Li , Lj + ψ2 location Li , Lj
                                             	                            interacted with vj . Thus, the subjective opinions from different
                        + ψ3 direction Li , Lj .              (6)
                                                                           recommenders (neighboring vehicles) are integrated into one
                                                                           single opinion, which is named as the recommended opinion
       We consider that DISS(Li , Lj ) depends on differences
                                                                           according to each opinion’s weights [23].
       of speed, location, and direction for two trajectory seg-
       ments. The speed difference of two trajectory segments
       can be expressed as                                                 D. Combining Local Opinions With Recommended Opinions
                                
                 	
                          After obtaining shared data from data providers, a data
                           	 
Vave (Li ) − Vave Lj 
                      requestor has a subjective opinion (i.e., local opinion) for each
               speed Li , Lj =                   	        (7)
                                  max V(Li ), V Lj                         data provider based on interaction histories. This local opinion
                                                                           should still be considered while forming the final opinion to
       where V(Li ) and V(Lj ) are the speeds of vehicles i and            avoid cheating [23]. The final opinion of vi to vj is formed as
       j during their trajectory segments, respectively. Vave (Li )          final := {bfinal , d final , ufinal }, where bfinal , d final , and ufinal are,
                                                                           ωx→j         x→j x→j x→j                             i→j     i→j       i→j
       and Vave (Lj ) are the average speeds of these two vehi-            respectively, calculated as
       cles. We use location(Li , Lj ) to describe the location                                ⎧
                                                                                               ⎪                 bi→j urec +brec
                                                                                                                               x→j ui→j
       difference of trajectory segments. The number of sam-                                   ⎪
                                                                                               ⎪   bfinal  = ui→j +ux→j
                                                                                               ⎪
                                                                                               ⎨
                                                                                                     i→j                rec −urec u
                                                                                                                        x→j     x→j i→j
       ple points of Li and Lj are, respectively, denoted as e                                                         x→j +dx→j ui→j
                                                                                                                 di→j urec     rec
                                                                                                   di→j = ui→j +urec −urec ui→j
                                                                                                     final                                              (12)
       and k during a time window T. The sets of sample                                        ⎪
                                                                                               ⎪                        x→j     x→j
       points in chronological order are {Pi1 , Pi2 , . . . , Pie } and                        ⎪ final
                                                                                               ⎪                       urec  ui→j
                                                                                               ⎩ ui→j =                  x→j
                                                                                                                                         .
                                                                                                               ui→j +urec −urec ui→j
       {Pj1 , Pj2 , . . . , Pjk }. We measure the similarity of the tra-                                               x→j   x→j
       jectory segments by the longest common subsequence                     Similar to (2), the final reputation of vi to vj is
       (LCS) that has been widely used in time series trajectory
       clustering. The LCS is utilized to match two sequences
                                                                                                    final
                                                                                                   Ti→j   = bfinal
                                                                                                             i→j + γ ui→j .
                                                                                                                      final
                                                                                                                                                      (13)
       by allowing them to stretch without rearranging the
       sequence of the elements [22]. For trajectory segments              E. Choosing the Optimal Data Provider for Data Sharing
       Li and Lj , the LCS is described as lcs(Li , Lj ) = {Pie =            For a data requestor, it chooses an optimal data provider
       Pjk |e = k}, here, e ∈ {1, 2, . . . , E}, k ∈ {1, 2, . . . , K}.    by comparing the final reputation values of data provider can-
       Hence, the location difference of trajectory segments               didates. There exists a candidate with the highest reputation
       location(Li , Lj ) is given by                                      value for each data requestor during a period of time. The
                                                              	         optimal data provider can be found by
                                	 max(e, k) − num lcs Li , Lj                                                     
           location Li , Lj =                                        (8)                      v∗j = arg max Ti→j
                                                                                                              final
                                                                                                                     .               (14)
                                             max(e, k)                                                           j∈M
       where num[lcs(Li , Lj )] is the number of points in LCS               As shown in Fig. 4, the operations of finding the optimal
       for trajectory segments Li and Lj . The directory differ-           data provider consist of the following steps.
       ence of two trajectory segments is the angle between                  1) Step 1: A data requestor vi first downloads the latest
       two trajectory segments. Here, we use ϕ as the angle of                   data blocks on the vehicular blockchain. vi searches
KANG et al.: BLOCKCHAIN FOR SECURE AND EFFICIENT DATA SHARING IN VECONs                                                                 4667
                                                                                                         R EFERENCES
                                                                            [1] W. Xu et al., “Internet of Vehicles in big data era,” IEEE/CAA J.
                                                                                Automatica Sinica, vol. 5, no. 1, pp. 19–35, Jan. 2018.
                                                                            [2] J. Ni, A. Zhang, X. Lin, and X. S. Shen, “Security, privacy, and fairness
                                                                                in fog-based vehicular crowdsensing,” IEEE Commun. Mag., vol. 55,
                                                                                no. 6, pp. 146–152, Jun. 2017.
                                                                            [3] Z. Su, Y. Hui, and Q. Yang, “The next generation vehicular networks:
                                                                                A content-centric framework,” IEEE Wireless Commun., vol. 24, no. 1,
                                                                                pp. 60–66, Feb. 2017.
                                                                            [4] Q. Yang, B. Zhu, and S. Wu, “An architecture of cloud-assisted infor-
                                                                                mation dissemination in vehicular networks,” IEEE Access, vol. 4,
                                                                                pp. 2764–2770, 2016.
                                                                            [5] X. Huang, R. Yu, J. Kang, Y. He, and Y. Zhang, “Exploring mobile edge
                                                                                computing for 5G-enabled software defined vehicular networks,” IEEE
                                                                                Wireless Commun., vol. 24, no. 6, pp. 55–63, Dec. 2017.
                                                                            [6] X. Huang, R. Yu, J. Kang, and Y. Zhang, “Distributed reputation
                                                                                management for secure and efficient vehicular edge computing and
Fig. 9.   Detection rates under different trust thresholds.                     networks,” IEEE Access, vol. 5, pp. 25408–25420, 2017.
                                                                            [7] D. Huang, S. Misra, M. Verma, and G. Xue, “PACP: An efficient
                                                                                pseudonymous authentication-based conditional privacy protocol for
                                                                                VANETs,” IEEE Trans. Intell. Transp. Syst., vol. 12, no. 3, pp. 736–746,
misbehavior probability impacts the reputation values. With                     Sep. 2011.
                                                                            [8] Z. Yang, K. Yang, L. Lei, K. Zheng, and V. C. M. Leung,
the higher misbehavior probability, the average reputation                      “Blockchain-based decentralized trust management in vehicular
value of the abnormal vehicles using our TWSL scheme is                         networks,” IEEE Internet Things J., to be published. [Online].
lower than that of TSL scheme because of the considered                         Available:         https://ieeexplore.ieee.org/abstract/document/8358773,
                                                                                doi: 10.1109/JIOT.2018.2836144.
weights. For example, when the misbehavior probability is                   [9] L. Yue, H. Junqin, Q. Shengzhi, and W. Ruijin, “Big data model of
60%, our TWSL scheme is 38% lower than that of TSL                              security sharing based on blockchain,” in Proc. 3rd Int. Conf. Big Data
scheme. So our TWSL scheme is sensitive for the misbehav-                       Comput. Commun. (BIGCOM), 2017, pp. 117–121.
                                                                           [10] Z. Xiong, Y. Zhang, D. Niyato, P. Wang, and Z. Han, “When mobile
ior, although malicious vehicles try to camouflage themselves.                  blockchain meets edge computing,” IEEE Commun. Mag., vol. 56, no. 8,
It is beneficial to detect and eliminate the misbehaviors timely                pp. 33–39, Aug. 2018.
in VECONs.                                                                 [11] Y. Yuan and F.-Y. Wang, “Towards blockchain-based intelligent trans-
                                                                                portation systems,” in Proc. IEEE 19th Int. Conf. Intell. Transp. Syst.
   We study detection rate of abnormal vehicles using TWSL                      (ITSC), Nov. 2016, pp. 2663–2668.
scheme and TSL scheme within 60 min. Fig. 9 shows the                      [12] M. Singh and S. Kim, “Trust bit: Reward-based intelligent vehicle com-
proposed TWSL scheme can distinguish much more abnor-                           mination using blockchain paper,” in Proc. IEEE 4th World Forum
                                                                                Internet Things, Feb. 2018, pp. 62–67.
mal vehicles compared to TSL scheme. Note that, with higher                [13] J. Kang et al., “Enabling localized peer-to-peer electricity trading among
threshold value of trust, more abnormal vehicles will be dis-                   plug-in hybrid electric vehicles using consortium blockchains,” IEEE
tinguished. When the threshold value of trust is 0.35, the                      Trans. Ind. Informat., vol. 13, no. 6, pp. 3154–3164, Dec. 2017.
                                                                           [14] Z. Li et al., “Consortium blockchain for secure energy trading in indus-
recognition rate of abnormal vehicles in TWSL scheme has                        trial Internet of Things,” IEEE Trans. Ind. Informat., vol. 14, no. 8,
already been more than 100%, while that of TSL scheme                           pp. 3690–3700, Aug. 2018.
is only 50%. Due to higher detection rate in the proposed                  [15] Q. Yang and H. Wang, “Toward trustworthy vehicular social networks,”
                                                                                IEEE Commun. Mag., vol. 53, no. 8, pp. 42–47, Aug. 2015.
TWSL scheme, potential security threats can be removed more                [16] S. Delgado-Segura, C. Tanas, and J. Herrera-Joancomartí, “Reputation
effectively, which makes VECONs more secure.                                    and reward: Two sides of the same bitcoin,” Sensors, vol. 16, no. 6,
                                                                                pp. 1–23, 2016.
                                                                           [17] Y. Zhang and J. Wen, “The IoT electric business model: Using
                            VI. C ONCLUSION                                     blockchain technology for the Internet of Things,” Peer-to-Peer Netw.
                                                                                Appl., vol. 10, no. 4, pp. 983–994, 2017.
  In this paper, we have presented a secure P2P data shar-                 [18] S. Nakamoto. (2012). Bitcoin: A Peer-to-Peer Electronic Cash System,
ing system in vehicular computing and networks. We utilized                     2009. [Online]. Available: http://www.bitcoin.org/bitcoin.pdf
4670                                                                                           IEEE INTERNET OF THINGS JOURNAL, VOL. 6, NO. 3, JUNE 2019
[19] J. Kang et al., “Location privacy attacks and defenses in cloud-enabled                                Maoqiang Wu is currently pursuing the Ph.D.
     Internet of Vehicles,” IEEE Wireless Commun., vol. 23, no. 5, pp. 52–59,                               degree in networked control systems at the
     Oct. 2016.                                                                                             Guangdong University of Technology, Guangzhou,
[20] R. Yu et al., “MixGroup: Accumulative pseudonym exchanging for loca-                                   China.
     tion privacy enhancement in vehicular social networks,” IEEE Trans.                                       His current research interests include blockchain,
     Depend. Secure Comput., vol. 13, no. 1, pp. 93–105, Jan./Feb. 2016.                                    resource management in wireless communications
[21] I. Alqassem and D. Svetinovic, “Towards reference architecture for cryp-                               and networking.
     tocurrencies: Bitcoin architectural analysis,” in Proc. IEEE Int. Conf.
     Internet Things (iThings) IEEE Green Comput. Commun. (GreenCom)
     IEEE Cyber Phys. Soc. Comput. (CPSCom), 2014, pp. 436–443.
[22] L. Zheng, Q. Feng, W. Liu, and X. Zhao, “Discovering trip hot routes
     using large scale taxi trajectory data,” in Proc. Int. Conf. Adv. Data Min.
     Appl., 2016, pp. 534–546.
[23] Y. Liu, K. Li, Y. Jin, Y. Zhang, and W. Qu, “A novel reputation com-
     putation model based on subjective logic for mobile ad hoc networks,”
     Future Gener. Comput. Syst., vol. 27, no. 5, pp. 547–554, 2011.                                     Sabita Maharjan (S’09–M’13) received the Ph.D.
[24] J. Kang, R. Yu, X. Huang, and Y. Zhang, “Privacy-preserved pseudonym                                degree in networks and distributed systems from
     scheme for fog computing supported Internet of Vehicles,” IEEE Trans.                               the University of Oslo, Oslo, Norway, and Simula
     Intell. Transp. Syst., vol. 19, no. 8, pp. 2627–2637, Aug. 2018.                                    Research Laboratory, Fornebu, Norway, in 2013.
[25] G. Zyskind, O. Nathan, and A. Pentland, “Decentralizing privacy: Using                                 She is currently a Senior Research Scientist
     blockchain to protect personal data,” in Proc. IEEE Security Privacy                                with the Simula Metropolitan Center for Digital
     Workshops (SPW), 2015, pp. 180–184.                                                                 Engineering, Oslo, Norway, and an Associate
[26] C Projects. (2013). [Online]. Available: http://www.yellowcabsf.com/                                Professor (adjunct position) with the University of
[27] M. A. Hoque, X. Hong, and B. Dixon, “Analysis of mobility patterns for                              Oslo. Her current research interests include wireless
     urban taxi cabs,” in Proc. Int. Conf. Comput. Netw. Commun. (ICNC),                                 networks, network security and resilience, smart grid
     2012, pp. 756–760.                                                                                  communications, cyber-physical systems, machine-
[28] S. Zhong, J. Chen, and Y. R. Yang, “Sprite: A simple, cheat-proof, credit-    to-machine communications, and software defined wireless networking.
     based system for mobile ad-hoc networks,” in Proc. INFOCOM 22nd
     Annu. Joint Conf. IEEE Comput. IEEE Commun. Soc., vol. 3, 2003,
     pp. 1987–1997.