Next Article in Journal
Application of Process Mining in Logistic Processes of Manufacturing Organizations: A Systematic Review
Next Article in Special Issue
A Blockchain-Based Shared Bus Service Scheduling and Management System
Previous Article in Journal
Research on an Investment Decision Model of Waste Incineration Power under Demand Guarantee Policies
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Blockchain with Quantum Mayfly Optimization-Based Clustering Scheme for Secure and Smart Transport Systems

by
Hayam Alamro
1,
Hamed Alqahtani
2,
Fahad F. Alruwaili
3,
Sumayh S. Aljameel
4 and
Mohammed Rizwanullah
5,*
1
Department of Information Systems, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh 11671, Saudi Arabia
2
Department of Information Systems, College of Computer Science, Center of Artificial Intelligence, Unit of Cybersecurity, King Khalid University, Abha 61421, Saudi Arabia
3
Department of Computer Science, College of Computing and Information Technology, Shaqra University, Sharqa P.O. Box 11911, Saudi Arabia
4
SAUDI ARAMCO Cybersecurity Chair, Computer Science Department, College of Computer Science and Information Technology, Imam Abdulrahman bin Faisal University, P.O. Box 1982, Dammam 31441, Saudi Arabia
5
Department of Computer and Self Development, Preparatory Year Deanship, Prince Sattam bin Abdulaziz University, Al-Kharj 11942, Saudi Arabia
*
Author to whom correspondence should be addressed.
Sustainability 2023, 15(15), 11782; https://doi.org/10.3390/su151511782
Submission received: 11 June 2023 / Revised: 19 July 2023 / Accepted: 26 July 2023 / Published: 31 July 2023

Abstract

:
Blockchain (BC) with a clustering scheme can be used to build secure and smart Vehicular Ad-Hoc Networks (VANETs), which provide improved data integrity, enhanced security, efficient resource allocation, and streamlined processes. This technology has revolutionized the transport industry by enabling safer, more efficient, and transparent transportation networks. Therefore, this paper concentrates on the design of a new Blockchain with a Quantum Mayfly Optimization-based Clustering Scheme for Secure and Smart Transport Systems (BQMFO-CSSTS) technique. The objective of the presented BQMFO-CSSTS technique is to build a secure VANET via a BC-based technology and clustering process. Moreover, the BQMFO-CSSTS technique initially uses a Quantum Mayfly Optimization (QMFO) system with a fitness function for the selection of cluster heads (CHs) and the cluster construction process. In addition, BC technology is used as trust infrastructure to provide trustworthy services to the user and protect the privacy of the CHs and cluster members (CMs). The proposed scheme leverages the decentralized and immutable nature of BC to establish trust and ensure the integrity of cluster formation in VANETs. Finally, the BQMFO-CSSTS technique uses trajectory similarity metrics to protect the integrity of the CMs against attacks. The simulation results of the BQMFO-CSSTS technique are validated using a series of measures. The comprehensive results reported the superior outcomes of the BQMFO-CSSTS method over other recent approaches, with the maximum throughput being 1644.52 kbps. Therefore, integration of BC technology provides a transparent and secure framework through which to manage cluster membership, data sharing, and trust establishment among vehicles.

1. Introduction

Smart public transport systems (such as community scooters, buses, subways, and taxis) are a vital part of the growth of the dependable smart cities initiative, since they contribute to enhanced mobility and diminished carbon footprints [1]. For instance, the Internet of Vehicles (IoV) refers to a dispersed network of nodes in automobiles that allow automobiles to exchange data and link and interact with one another over the Internet [2,3]. The IoV aids in the understanding of smart transportation systems, since it enables automobiles fortified with computing nodes, sensors, and software to communicate and interact with one another [4]. Different networks used in the maintenance of the smart public transport mechanisms are indispensably significant in terms of guaranteeing reliable operation without disturbance by illegal attacks [5,6]. These networks’ susceptibility to cyber-attacks that could alter critical and urgent maintenance data or halt fundamental transport structures can lead to catastrophic consequences. An intelligent transportation system (ITS) has three processes: data uploading, data collection, and data processing [7]. User utility, efficiency, and safety are three significant metrics, as their participation in ITS allows systems to focus on delivering Quality of Service (QoS), utilities, and data safety concurrently.
Additionally, Artificial Intelligence (AI) is a vital technical innovation that can enable smart cities’ applications [8]. Currently, along with AI and Internet of Things (IoT), Blockchain (BC) technology is recognized as an invention with the potential to enable integrated application processes, improve modern smart city applications, and generate new designs and methods [9,10]. BC can enhance the safety, transparency, security, trust, and privacy of different processes by presenting a shared and decentralized distributed ledger [11]. To this end, the BC evolution stages (1.0 to 4.0) were developed to create a range of properties, including strengths, functionality, challenges, security problems, and characteristics [12]. The BC method refers to the distributed ledger and has tamper-resistant, decentralized, anonymous, and trust-based features that can be combined with ITS to guarantee the safety of participants’ data [13]. Although few researchers have inspected the integration of ITS and BC, they have focused on trust management, data sharing, BC-enabled crowdsensing, energy delivery, and BC network structure [14]. However, to the best of our knowledge, existing studies have ignored BC safety.
This paper concentrates on the design of a new BQMFO-CSSTS technique. The BQMFO-CSSTS technique initially uses the QMFO method, with a fitness function used for the selection of Cluster Heads (CHs) and the cluster construction process. In addition, BC technology is used as a trust infrastructure to provide trustworthy services to the user and protect the privacy of the CHs and Cluster Members (CMs). Finally, the BQMFO-CSSTS technique uses trajectory similarity metrics to protect CMs against attacks. The simulation results of the BQMFO-CSSTS technique are validated using varied measures.

2. Related Works

Fernandes et al. [15] described a decentralized reputation mechanism that depends on a consortium BC and an intellectual contract. This structure examines the dependability of data produced by vehicles, contributes to decision-making processes, and identifies malicious behaviours. The evaluation metrics, which are the comprehensive functional structure of the mechanism, describe the methods, message formats, and communication protocols that can be applied. In [16], the authors modelled an adaptation of BC that securely saves data in vehicular networks. The method can store externally sourced data, like information about a user’s reputation and traffic events. The presented solution has two interconnected elements: the reputation system and the ITS-BC. The study presented a synthetic test that authenticates the usage case of the solution, i.e., the user-reporting speed and alerts, which ensures that the author recognizes a fair reputation mechanism that penalizes the false users. Zia [17] presented B-DRIVE, which is a BC-related distributed IoT network for smart urban transportation. This network can to link a large fleet of IoT gadgets, as it uses nodes installed on roadside structures and different vehicles, which can be sent to data storage centres, known as Full-Nodes, to disseminate and log sensor-generated datasets.
Das et al. [18] devised an identity generation and management approach that utilizes BC to solve present difficulties in ITS applications related to the security of identity management and validation of vehicles. In [19], the authors presented the BC-related decentralized trust score structure that uses participating nodes to find and blacklist internal aggressors in VANETs. The authors devised a two-level recognition mechanism, in which at the primary level, neighbouring nodes separately computed trust. At the secondary level, a consortium BC-based system included certified Road Side Units (RSU) as validators, which created total trust scores for vehicular nodes. Next, depending on trust scores created by the neighbouring nodes, the blacklist node table was dynamically modified. Wang et al. [20] introduced a BC-related special vehicle priority access guarantee method (BSV-PAGS). The authors utilized a Machine Learning (ML) approach to train and design special vehicle detectors to enhance the accuracy of detection methods used to identify special vehicles.
In [21], the authors devised a new method that integrated BC technology and a Deep Learning (DL) approach to better protect smart public transport mechanisms. As a hybrid DL-related approach that Integrated Multilayer Perceptron (MLP) and Auto Encoder (AE), this method could identify Distributed Denial Of Service (DDoS) attacks that try to block or halt the urgent and serious exchange in transport maintenance data between stakeholders. Akhter et al. [22] introduced a multilevel BC-related privacy-preserving validation system. The study explained the process of forming of key generation tasks, validation centres, and vehicle registration. Though several models are available in the literature, there is still a need to improve their performance.
Chaudhary and Singh [23] examined a decentralized VANET design that contained BC technology. The presented BC-based method for VANET mechanisms had 4 steps: vehicle registration, BC maintenance, BC network initialization, and pseudonym upload. It could effectively resolve the issues that developed in centralized structures and solved trust problems that affected the entities. Gazdar et al. [24] solved these problems by presenting a decentralized BC-based Trust Management Framework (BC-TMF) that calculated trust metrics for vehicles. These trust metrics depended on the messages’ authenticity. Alharthi et al. [25] examined a Biometrics BC (BBC) structure used to secure data distribution between vehicles in VANETs and maintain statuary data using conventional and trusted methods. Using the presented system, the author presented benefits of using biometric data to keep a record of the genuine identities of the message senders, thus maintaining secrecy. Thus, the presented BBC technique ensured trust and security between vehicles connected via VANETs and had the capacity to trace identities when needed.

3. The Proposed Model

In this paper, a BQMFO-CSSTS technique is developed via the use of clustering and BC in VANETs. The presented BQMFO-CSSTS technique aims to enable secure VANETs using BC-based technology and clustering processes. It involves a series of processes, namely clustering, BC-based privacy-preserving, and security mechanisms. Figure 1 establishes the overall flow of the BQMFO-CSSTS approach.

3.1. Design of QMFO-Based Clustering Process

In this study, the BQMFO-CSSTS technique initially uses the QMFO model and a fitness function for the selection of CHs and cluster construction processes. The MFO can be referred to as a bionics system, as it inspired by the social behaviours of the Mayfly (MF) [26]. The optimum and suboptimum individuals in all the populations, as well as the movement mode and reproduction processes of female and male individuals, are carefully chosen. In the meantime, via mating between the optimum female and male individuals, the optimum offspring generation and suboptimum offspring generation can be attained. The movement direction of all mayflies was impacted by the collective optimum position and dynamics of individual female and male MF targets when moving towards the location.
The flight mode of male MF is the same as the movement mode of the birds in a Particle Swarm Optimization (PSO) algorithm, and the distances and directions travelled by male MFs were changed based on their own flight experience using Equation (1):
x i n + 1 = x i n + v i n + 1
where x i n and v i n denotes the present location and speed, respectively, of male MF i on the n t h search, as given in Equation (2):
v i j n + 1 = v i j n + α 1 e β l p 2 p b e s t i j X i j n + α 2 e β l g 2 g b e s t i j X i j n
Since male MFs dance on the water surface to attract females, the locations of the male MFs continuously vary. v i j n is the speed of n-th search of MF i-th at j-th dimension, and x i j n denotes the location at that time. α 1 and α 2 are assessed based on the positive attraction coefficient of social interaction, and β denotes the visibility coefficients of the MF.
In the meantime, the optimum locations of the individual and collective MFs are denoted as p b e s t i j and g b e s t i j , respectively. Furthermore, the distances from an existing location to p b e s t i i and g b e s t i i are represented as l p and l g , respectively, and evaluated via Equation (3):
x j X i = j = 1 n ( x i j X i j ) 2 2
A fixed dance pattern should be used to better represents MFs within the population. In the meantime, a random component was presented to ensure that the speed changed continuously, as defined in Equation (4):
v i j n + 1 = v i j n + d × r
In Equation (4), d denotes the dance coefficient, and r indicates the random number.
The female MF movement relies on the attraction of male MFs, and the location renewal relies on the rise of speed that is formulated via Equation (5):
y i n + 1 = y i n + v i n + 1    
Speed updating is a specific procedure that guarantees the offspring quality; thus, the superior female should be attracted to the superior male. It is represented in Equation (6):
v i j n + 1 = v i j n + α 2 e β l f 2 ( x i j n y i j n ) v i j n + g × r      
where y i j n denotes the location of the female MF, g indicates the random walking coefficient of the female MF, and l f shows the distance between male and female MFs.
During mating, the optimum and suboptimum individuals in the female and male groups must be chosen for reproduction based on the fitness function. The outcomes of interbreeding that generate the optimum and suboptimum offspring are evaluated using Equation (7):
o f f s p r i n g 1 = L × m + 1 L × f m o f f s p r i n g 2 = L × f m + 1 L × m
In Equation (7), m and f m represent the male and female in the parent group, respectively, and L denotes the random integer within a specific range.
The conventional MFO algorithm could precisely search for the optimum value in a single-peak function using the features used in MF reproduction. However, due to the complicated process of assessing a large population, the convergence is not fine, and the search speed is slower, as it is easier to become trapped in local optima while handling multi-peak functions. Thus, the quantum concept was proposed using the classical MFO algorithm, thus forming the QMFO algorithm. Meanwhile, the location and velocity of MF could not be defined in quantum space; thus, wave function was utilized to characterize the MF location, and the Monte Carlo algorithm was employed to resolve the problems using Equation (8).
m b e s t n = 1 N Σ i = 1 a P b e s t i n i = 1 n P i t = γ × P b e s t i n + 1 γ × g b e s t n X i n + 1 = P i n ± ε m b e s t n x i n l o g 1 a
In Equation (8), r and a are uniformly distributed random values in the range 0–1, and c shows the last random motion parameter.   N and n denote the numbers of individuals and iterations, respectively. m b e s i n denotes the average past optimum location of the male MF, and P i n denotes the modified location of the i t h male MF at n-th iterations.
The implementation steps of the QMFO algorithm are shown below:
Step 1: initialize the position of female and male MFs in the space.
Step 2: compute the average optimum position m b e s t of male MFs based on Equation (8).
Step 3: Compute the fitness value and compare it to the prior iteration value. When the present function value is lesser than the prior iteration, the existing MF location is modified based on the individual optimum location; otherwise, it retains the prior iteration. Thus, the optimum male individual position p b e s i and collective position g b e s i are attained.
Step 4: estimate the new locations of both MFs based on Equations (5) and (8), respectively, and mate in sequence.
Step 5: evaluate the fitness function and update p b e s i and g b e s i .
Step 6: repeat Steps 2 to 5 until the stopping criteria are satisfied.
The QMFO algorithm derives a fitness function for the optimum cluster creation procedure [27]. The fitness function used in the BQMFO-CSSTS is introduced as a multi-objective fitness function, as given in Equation (9).
F i t F n = w 1 × f n ( 1 ) + w 2 × f n ( 2 )
In Equation (9), f n ( 1 ) and f n ( 2 ) functions characterize the sum of distances between all of the CMs and CHs of each cluster in the network and the differences between clusters in terms of route length. Based on Equation (10), the function f n ( 1 ) is computed.
F i t F n ( D i s t S u m ) = i = 1 N C ( q C H D ( E U D i s t ( C M q , c , C H q . c ) ) )
where E U D i s t ( C M q , c , C H q . c ) shows the Euclidean distance evaluated for the total number of clusters. The distances between every C M q , c vehicular network and the CHs C H q . c are related to all of the clusters based on the overall number of clusters. At the same time, function f n ( 2 ) represents the absolute degree, as equated in Equation (11).
F i t F n A B D e g r e e = i = 1 N C A B F n D e g C C M q , c
where | C M q , c | signifies the overall number of CM nodes based on route length, with the degree D e g C emphasizing the constant value of cluster density. We note that lesser density can be recognized as the lowest value.

3.2. BC Technology for Privacy Preserving

The BQMFO-CSSTS architecture uses BC as a trust infrastructure to provide trustworthy services to the user and protect their privacy [4]. Two kinds of BC nodes are available based on the locations and capabilities of the entity in the ITS framework, vehicle gateways, servers, and RSUs that are set to these types and integrated with other functions. One example is a full BC node. The node works as a miner, as it synchronizes and maintains a full copy of the blocks. Meanwhile, this node could see every transaction that takes place in the BC; only the authorized node with high ability could be used as one of this type of node, which includes servers, gateways, and RSUs in the core network. Another example is a lightweight BC node. These types of nodes are analogous to the Simplified Payment-Verified (SPV) nodes used in Ethereum. The set of nodes could not authenticate transactions via mining; on the other hand, they could identify a transaction based on the network. It should be noted that based on the needs and positions of the ITS operator, the network entities, including RSUs, gateways, servers, routers, etc., are set as lightweight and full BC nodes. In particular, vehicles were set to lightweight and full BC nodes, allowing them to be deeply included in the ITS (i.e., included in the BC network to secure additional benefits) or utilize the secured services with data protection.

3.3. Security Mechanism

A new security mechanism can be developed to find malicious nodes to further improve the security and availability of VANETs [28]. In cluster networks, the security and availability of CHs are very important. CHs help the server to transmit to and collect data via CMs. If the attacker wants to access the private information of other vehicles, they must act as the CHs. The vehicles controlled by a malicious attacker provide various identities (i.e.,vehicles) during the Sybil attack, and each vehicle has an analogous position, direction, maximal acceleration, and speed. Henceforth, this vehicle should have a high probability of being chosen as the CH and high relative mobility metrics.
A S t trajectory similarity metric is defined to protect network attacks for the CMs’ privacy. The similarity metric is formulated in Equation (12):
S t c = 1 N 1 i = 1 N 1 ( Δ t i l i f e t i m e i ) ,
In Equation (12), l i f e t i m e i shows the lifetime of the i node, and Δ t i denotes the duration of c and node i that belongs to a similar cluster. The server evaluates the trajectory similarity metric used whenever a CH is selected. If a single CH has high trajectory similarity metrics, the server checks every node in the cluster to identify malicious attackers.

4. Performance Validation

In this section, the experimental validation of the BQMFO-CSSTS technique takes place, with consideration given to various aspects, such as the varying number of nodes n , transmission range r , and speed limit v . The proposed model was simulated using the NS3 tool. The existing models [29] used for comparative analysis were BC-Assisted Trusted Clustering Mechanism for IoT-Enabled Smart Transportation System (ATCM IOT-ESTS), Whale Optimization Algorithm for Clustering in Vehicular Ad hoc Networks (WOACNET), Deep learning-based Dynamic Stable Cluster Head Selection (DL-SCHS), and StabTrust (ST).
In Table 1 and Figure 2, the average cluster head lifetime (ACHL) results of the BQMFO-CSSTS technique are compared to those of recent models with varying r and v values [29]. The results indicate that the BQMFO-CSSTS technique identifies improved values of ACHL that are superior to those of other models. For instance, with r and v values of 50 and 30, the BQMFO-CSSTS technique gains an increased ACHL of 493.38 s, while the ATCM IOT-ESTS, WOACNET, DL-SCHS, and ST models obtain decreased ACHLs of 467.49 s, 342.89 s, 249.03 s, and 459.40 s, respectively. Moreover, with r and v values of 250 and 90, the BQMFO-CSSTS method acquires an increased ACHL of 543.55 s, while the ATCM IOT-ESTS, WOACNET, DL-SCHS, and ST techniques gain decreased ACHLs of 519.27 s, 456.16 s, 480.44 s, and 517.65 s, respectively.
In Table 2 and Figure 3, the average cluster duration lifetime (ACDL) outcomes of the BQMFO-CSSTS method are compared to recent methods with varying n and r values. The figure specifies that the BQMFO-CSSTS algorithm achieves improved values of ACDL superior to those of other models. For example, with n and r values of 20 and 50, the BQMFO-CSSTS method gains an increased ACDL of 502.45 s, while the ATCM IOT-ESTS, WOACNET, DL-SCHS, and ST methods attain decreased ACDLs of 479.45 s, 270.69 s, 484.76 s, and 491.83 s, respectively.
Furthermore, with the values n and r values of 120 and 300, the BQMFO-CSSTS method gains an increased ACDL of 599.75 s, while the ATCM IOT-ESTS, WOACNET, DL-SCHS, and ST methods gain decreased ACDLs of 589.14 s, 555.52 s, 564.37 s, and 566.14 s, respectively.
In Table 3 and Figure 4, the ACDL results of the BQMFO-CSSTS method are compared to recent approaches with varying r and v values. The figure specifies that the BQMFO-CSSTS method achieves improved values of ACDL superior to those of other approaches. For example, with r and v values of 50 and 30, the BQMFO-CSSTS algorithm gains an increased ACDL of 474.21 s, while the ATCM IOT-ESTS, WOACNET, DL-SCHS, and ST approaches gain decreased ACDLs of 464.53 s, 338.72 s, 253.24 s, and 456.47 s, respectively. Also, with r and v values of 250 and 90, the BQMFO-CSSTS method gains an increased ACDL of 543.57 s, while the ATCM IOT-ESTS, WOACNET, DL-SCHS, and ST approaches gain decreased ACDLs of 520.99 s, 464.53 s, 485.50 s, and 509.69 s, respectively.
Table 4 and Figure 5 represents the Overhead Ratio (OHR) results of the BQMFO-CSSTS technique compared to other recent methods and at varying points in time. The figure shows that the BQMFO-CSSTS method results in the lowest OHR values over all time intervals. At 50 min, the BQMFO-CSSTS technique gains a lower OHR of 4.94, while the ATCM IOT-ESTS, WOACNET, DL-SCHS, and ST models accomplish higher OHRs of 9.46, 13.97, 14.42, and 27.97, respectively. On the other hand, at 900 min, the BQMFO-CSSTS method gains a lower OHR of 43.2, while the ATCM IOT-ESTS, WOACNET, DL-SCHS, and ST approaches accomplish higher OHRs of 54.16, 107.89, 77.19, and 117.83, respectively.
In Table 5 and Figure 6, the Throughput (THROT) outcome of the BQMFO-CSSTS technique is compared to other recent approaches at varying times intervals. The outcomes imply that the BQMFO-CSSTS technique gains enhanced values of THROT relative to other models. For instance, at 50 min, the BQMFO-CSSTS technique gains an increased THROT of 352.93 kbps, while the ATCM IOT-ESTS, WOACNET, DL-SCHS, and ST systems reach lesser THROTs of 209.42 kbps, 281.17 kbps, 154.22 kbps, and 110.06 kbps, respectively. Additionally, at 900 min, the BQMFO-CSSTS system gains a higher THROT of 1644.52 kbps, while the ATCM IOT-ESTS, WOACNET, DL-SCHS, and ST methods obtain lower THROTs of 1561.73 kbps, 1368.54 kbps, 1197.43 kbps, and 888.33 kbps, respectively.
Table 6 and Figure 7 represent the Energy Consumption (ECON) results of the BQMFO-CSSTS method compared to other recent methods and using varying numbers of nodes. The results showed that the BQMFO-CSSTS technique resulted in the lowest number of ECON values over nodes. When using 50 nodes, the BQMFO-CSSTS technique gained a low ECON of 59.09 J, while the ATCM IOT-ESTS, WOACNET, DL-SCHS, and ST models accomplish higher ECONs of 93.41 J, 115.33 J, 153.45 J, and 186.81 J, respectively. On the other hand, when using 300 nodes, the BQMFO-CSSTS technique acquires a low ECON of 157.26 J, while the ATCM IOT-ESTS, WOACNET, DL-SCHS, and ST methods accomplish higher ECONs of 187.76 J, 322.15 J, 306.90 J, and 311.67 J, respectively. These results confirmed the enhanced performance of the BQMFO-CSSTS technique.

5. Conclusions

In this paper, a privacy-preserving cluster scheme known as the BQMFO-CSSTS technique on VANET is developed. The presented BQMFO-CSSTS technique aims to accomplish secure VANET via BC technology and clustering process. It involves a series of processes, namely clustering, BC-based privacy-preserving, and security mechanisms. Moreover, the BQMFO-CSSTS technique initially uses the QMFO approach with a fitness function for the selection of CHs and the cluster construction process. In addition, BC technology is used as trust infrastructure to provide trustworthy services to the user and protect the privacy of the CHs and CMs. Finally, the BQMFO-CSSTS technique uses trajectory similarity metrics to protect the privacy of the CMs against attacks. The simulation results of the BQMFO-CSSTS technique are validated utilizing a series of measures. The comprehensive outcomes stated the superior performance of the BQMFO-CSSTS method over those of other recent algorithms. While the integration of BC technology provides the groundwork for enabling secure clustering in VANETs, future research can concentrate on improving the security aspects using privacy-preserving techniques, robust consensus mechanisms, and secure communication protocols to protect sensitive information and prevent malicious attacks from occurring within the clustering technique. In addition, the proposed clustering scheme should be implemented and tested in real-world VANET environments to validate its effectiveness and evaluate its performance under various realistic scenarios.

Author Contributions

Conceptualization, H.A. (Hayam Alamro); Methodology, H.A. (Hamed Alqahtani); Software, S.S.A.; Validation, F.F.A. and S.S.A.; Investigation, H.A. (Hayam Alamro); Data curation, S.S.A.; Writing—original draft, H.A. (Hayam Alamro), H.A. (Hamed Alqahtani), F.F.A. and M.R.; Writing—review & editing, H.A. (Hayam Alamro), H.A. (Hamed Alqahtani), F.F.A., S.S.A. and M.R.; Visualization, M.R.; Project administration, M.R.; Funding acquisition, H.A. (Hamed Alqahtani). All authors have read and agreed to the published version of the manuscript.

Funding

The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work through a large group research project under grant number (RGP2/159/44). Princess Nourah bint Abdulrahman University Researchers Supporting Project number (PNURSP2023R361), Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia. We would like to thank SAUDI ARAMCO Cybersecurity Chair for funding this project. This study is supported via funding from Prince Sattam bin Abdulaziz University project number (PSAU/2023/R/1444).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

This article does not contain any studies in which human participants took part.

Data Availability Statement

Data sharing concerns do not apply to this article, as no datasets were generated during the current study.

Conflicts of Interest

The authors declare that they have no conflict of interest. The manuscript was written with the contribution of all authors. All authors have read and approved the final version of the manuscript.

References

  1. Liu, J.; Zhang, L.; Li, C.; Bai, J.; Lv, H.; Lv, Z. Blockchain-based secure communication of intelligent transportation digital twins system. IEEE Trans. Intell. Transp. Syst. 2022, 23, 22630–22640. [Google Scholar] [CrossRef]
  2. Ning, Z.; Sun, S.; Wang, X.; Guo, L.; Guo, S.; Hu, X.; Hu, B.; Kwok, R.Y. Blockchain-enabled intelligent transportation systems: A distributed crowdsensing framework. IEEE Trans. Mob. Comput. 2021, 21, 4201–4217. [Google Scholar] [CrossRef]
  3. Finogeev, A.; Deev, M.; Parygin, D.; Finogeev, A. Intelligent SDN Architecture with Fuzzy Neural Network and Blockchain for Monitoring Critical Events. Appl. Artif. Intell. 2022, 36, 2145634. [Google Scholar] [CrossRef]
  4. Li, Y.; Ouyang, K.; Li, N.; Rahmani, R.; Yang, H.; Pei, Y. A blockchain-assisted intelligent transportation system promoting data services with privacy protection. Sensors 2020, 20, 2483. [Google Scholar] [CrossRef]
  5. Ali, M.; Karimipour, H.; Tariq, M. Integration of blockchain and federated learning for Internet of Things: Recent advances and future challenges. Comput. Secur. 2021, 108, 102355. [Google Scholar] [CrossRef]
  6. Beenish, H.; Javid, T.; Fahad, M.; Siddiqui, A.A.; Ahmed, G.; Syed, H.J. A Novel Markov Model-Based Traffic Density Estimation Technique for Intelligent Transportation System. Sensors 2023, 23, 768. [Google Scholar] [CrossRef]
  7. Chandio, A.A.; Tziritas, N.; Xu, C.Z. Big-data processing techniques and their challenges in transport domain. ZTE Commun. 2015, 1, 1–21. [Google Scholar]
  8. Wang, Q.A.; Zhang, C.; Ma, Z.G.; Ni, Y.Q. Modelling and forecasting of SHM strain measurement for a large-scale suspension bridge during typhoon events using variational heteroscedastic Gaussian process. Eng. Struct. 2022, 251, 113554. [Google Scholar] [CrossRef]
  9. Wang, Q.A.; Dai, Y.; Ma, Z.G.; Wang, J.F.; Lin, J.F.; Ni, Y.Q.; Ren, W.X.; Jiang, J.; Yang, X.; Yan, J.R. Towards high-precision data modeling of SHM measurements using an improved sparse Bayesian learning scheme with strong generalization ability. Struct. Health Monit. 2023, 14759217231170316. [Google Scholar] [CrossRef]
  10. Wang, Q.A.; Wang, C.B.; Ma, Z.G.; Chen, W.; Ni, Y.Q.; Wang, C.F.; Yan, B.G.; Guan, P.X. Bayesian dynamic linear model framework for structural health monitoring data forecasting and missing data imputation during typhoon events. Struct. Health Monit. 2022, 21, 2933–2950. [Google Scholar] [CrossRef]
  11. Baker, T.; Asim, M.; Samwini, H.; Shamim, N.; Alani, M.M.; Buyya, R. A blockchain-based Fog-oriented lightweight framework for smart public vehicular transportation systems. Comput. Netw. 2022, 203, 108676. [Google Scholar] [CrossRef]
  12. Medel, D.K.S.; Perez, B.A.M.; Alpaño, P.V.; Pedrasa, J.R. Mitigation of Data Integrity Attacks using Blockchain-based Intelligent Transportation System. In Proceedings of the 2021 26th IEEE Asia-Pacific Conference on Communications (APCC), Kuala Lumpur, Malaysia, 11–13 October 2021; pp. 13–18. [Google Scholar]
  13. Maskey, S.R.; Badsha, S.; Sengupta, S.; Khalil, I. Bits: Blockchain-based intelligent transportation system with outlier detection for the smart city. In Proceedings of the 2020 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), Austin, TX, USA, 23–27 March 2020; pp. 1–6. [Google Scholar]
  14. Das, D.; Banerjee, S.; Chatterjee, P.; Biswas, M.; Biswas, U.; Alnumay, W. Design and development of an intelligent transportation management system using blockchain and smart contracts. Clust. Comput. 2022, 25, 1899–1913. [Google Scholar] [CrossRef]
  15. Fernandes, C.P.; Montez, C.; Adriano, D.D.; Boukerche, A.; Wangham, M.S. A blockchain-based reputation system for trusted VANET nodes. Ad Hoc Netw. 2023, 140, 103071. [Google Scholar] [CrossRef]
  16. Cocîrlea, D.; Dobre, C.; Hîrţan, L.A.; Purnichescu-Purtan, R. Blockchain in intelligent transportation systems. Electronics 2020, 9, 1682. [Google Scholar] [CrossRef]
  17. Zia, M. B-DRIVE: A blockchain-based distributed IoT network for smart urban transportation. Blockchain Res. Appl. 2021, 2, 100033. [Google Scholar] [CrossRef]
  18. Das, D.; Dasgupta, K.; Biswas, U. A secure blockchain-enabled vehicle identity management framework for intelligent transportation systems. Comput. Electr. Eng. 2023, 105, 108535. [Google Scholar] [CrossRef]
  19. Kudva, S.; Badsha, S.; Sengupta, S.; La, H.; Khalil, I.; Atiquzzaman, M. A scalable blockchain-based trust management in VANET routing protocol. J. Parallel Distrib. Comput. 2021, 152, 144–156. [Google Scholar] [CrossRef]
  20. Wang, Y.; Yu, J.; Yan, B.; Wang, G.; Shan, Z. BSV-PAGS: Blockchain-based special vehicles priority access guarantee scheme. Comput. Commun. 2020, 161, 28–40. [Google Scholar] [CrossRef]
  21. Liu, T.; Sabrina, F.; Jang-Jaccard, J.; Xu, W.; Wei, Y. Artificial intelligence-enabled DDoS detection for blockchain-based smart transport systems. Sensors 2022, 22, 32. [Google Scholar] [CrossRef]
  22. Akhter, A.S.; Ahmed, M.; Shah, A.S.; Anwar, A.; Zengin, A. A secured privacy-preserving multi-level blockchain framework for cluster-based VANET. Sustainability 2021, 13, 400. [Google Scholar] [CrossRef]
  23. Chaudhary, B.; Singh, K. A Blockchain enabled location-privacy preserving scheme for vehicular ad-hoc networks. Peer-to-Peer Netw. Appl. 2021, 14, 3198–3212. [Google Scholar] [CrossRef]
  24. Gazdar, T.; Alboqomi, O.; Munshi, A. A Decentralized Blockchain-Based Trust Management Framework for Vehicular Ad Hoc Networks. Smart Cities 2022, 5, 348–363. [Google Scholar] [CrossRef]
  25. Alharthi, A.; Ni, Q.; Jiang, R. A privacy-preservation framework based on biometrics blockchain (BBC) to prevent attacks in VANET. IEEE Access 2021, 9, 87299–87309. [Google Scholar] [CrossRef]
  26. Liu, X.; Zhao, M.; Wei, Z.; Lu, M. Economic Optimal Scheduling of Wind–Photovoltaic-Storage with Electric Vehicle Microgrid Based on Quantum Mayfly Algorithm. Appl. Sci. 2022, 12, 8778. [Google Scholar] [CrossRef]
  27. Konduru, S.; Sathya, M. Remora optimization algorithm-based optimized node clustering technique for reliable data delivery in VANETs. Int. J. Intell. Netw. 2022, 3, 74–79. [Google Scholar] [CrossRef]
  28. Cheng, X.; Huang, B. A center-based secure and stable clustering algorithm for VANETs on highways. Wirel. Commun. Mob. Comput. 2019, 2019, 8415234. [Google Scholar] [CrossRef] [Green Version]
  29. Awan, K.A.; Din, I.U.; Almogren, A. A Blockchain-Assisted Trusted Clustering Mechanism for IoT-Enabled Smart Transportation System. Sustainability 2022, 14, 14889. [Google Scholar] [CrossRef]
Figure 1. The overall flow of the BQMFO-CSSTS approach.
Figure 1. The overall flow of the BQMFO-CSSTS approach.
Sustainability 15 11782 g001
Figure 2. ACHL outcomes of BQMFO-CSSTS approach compared to other systems and with varying r and v values.
Figure 2. ACHL outcomes of BQMFO-CSSTS approach compared to other systems and with varying r and v values.
Sustainability 15 11782 g002
Figure 3. ACDL outcome of BQMFO-CSSTS method with varying n and r values.
Figure 3. ACDL outcome of BQMFO-CSSTS method with varying n and r values.
Sustainability 15 11782 g003
Figure 4. ACDL outcome of BQMFO-CSSTS approach with varying r and v values.
Figure 4. ACDL outcome of BQMFO-CSSTS approach with varying r and v values.
Sustainability 15 11782 g004
Figure 5. OHR outcome of BQMFO-CSSTS approach at varying points in time.
Figure 5. OHR outcome of BQMFO-CSSTS approach at varying points in time.
Sustainability 15 11782 g005
Figure 6. THROT outcome of BQMFO-CSSTS approach at varying points of time.
Figure 6. THROT outcome of BQMFO-CSSTS approach at varying points of time.
Sustainability 15 11782 g006
Figure 7. Comparative ECON outcome of BQMFO-CSSTS approach using varying numbers of nodes.
Figure 7. Comparative ECON outcome of BQMFO-CSSTS approach using varying numbers of nodes.
Sustainability 15 11782 g007
Table 1. ACHL analysis of BQMFO-CSSTS approach compared to other systems and with varying r and v values.
Table 1. ACHL analysis of BQMFO-CSSTS approach compared to other systems and with varying r and v values.
Average Cluster Head Lifetime BQMFO-CSSTSATCM IOT-ESTSWOACNETDL-SCHSStab Trust
(r, v) (50, 30)493.38467.49342.89249.03459.40
(r, v) (100, 40)543.55519.27394.67457.78418.94
(r, v) (125, 50)541.93520.89397.91428.65418.94
(r, v) (150, 60)527.36506.33472.34464.25321.85
(r, v) (200, 70)541.93528.98485.29509.56504.71
(r, v) (225, 80)541.93522.51449.69501.47399.52
(r, v) (250, 90)543.55519.27456.16480.44517.65
Table 2. ACDL outcome of BQMFO-CSSTS approach compared to other systems and with varying n and r values.
Table 2. ACDL outcome of BQMFO-CSSTS approach compared to other systems and with varying n and r values.
Average Cluster Duration LifetimeBQMFO-CSSTSATCM IOT-ESTSWOACNETDL-SCHSStab Trust
(n, r) (20, 50)502.45479.45270.69484.76491.83
(n, r) (40, 100)539.60521.91290.15511.29507.76
(n, r) (60, 150)594.45573.22304.30523.68571.45
(n, r) (80, 200)592.68583.83472.37578.52482.99
(n, r) (100, 250)597.98590.91518.37589.14589.14
(n, r) (120, 300)599.75589.14555.52564.37566.14
Table 3. ACDL outcome of BQMFO-CSSTS approach compared to other systems and with varying r and v values.
Table 3. ACDL outcome of BQMFO-CSSTS approach compared to other systems and with varying r and v values.
Average Cluster Durational Lifetime BQMFO-CSSTSATCM IOT-ESTSWOACNETDL-SCHSStab Trust
(r, v) (50, 30)474.21464.53338.72253.24456.47
(r, v) (100, 40)532.28516.15382.27461.31429.05
(r, v) (125, 50)540.34524.21400.01416.14409.69
(r, v) (150, 60)537.11503.24467.76464.53324.21
(r, v) (200, 70)541.95520.99480.66498.40501.63
(r, v) (225, 80)535.50520.99450.02506.47408.08
(r, v) (250, 90)543.57520.99464.53485.50509.69
Table 4. OHR outcome of BQMFO-CSSTS approach compared to other systems and at varying points in time.
Table 4. OHR outcome of BQMFO-CSSTS approach compared to other systems and at varying points in time.
Overhead Ratio
Time (Min)BQMFO-CSSTSATCM IOT-ESTSWOACNETDL-SCHSStab Trust
5004.9409.46013.9714.42027.97
10005.8413.07017.1318.94033.39
15008.1017.13020.7425.71039.26
20008.1015.33021.6528.42041.06
25008.1016.23024.3626.61046.48
30009.9117.58027.9734.74050.09
35013.5220.74030.2339.26054.16
40013.5223.91031.1343.77059.58
45014.8727.52037.9047.84063.64
50018.9430.23042.4249.64065.00
55021.2031.13044.6855.06073.12
60023.4531.58047.3957.77077.19
65024.8134.29053.2660.48083.96
70026.6135.65059.5864.54085.77
75032.4839.26069.5165.45090.73
80037.4546.48078.5467.25098.41
85039.7149.64088.0270.87101.57
90043.3254.16107.8977.19117.83
Table 5. THROT outcome of BQMFO-CSSTS approach compared to other systems and at varying points in time.
Table 5. THROT outcome of BQMFO-CSSTS approach compared to other systems and at varying points in time.
Throughput Ratio (kbps)
Time (Min)BQMFO-CSSTSATCM IOT-ESTSWOACNETDL-SCHSStab Trust
500352.930209.420281.170154.22110.06
1000490.920341.890281.170225.98121.10
1500529.560363.970347.410237.02176.30
2000579.230375.010397.080281.17237.02
2500612.350413.640485.400286.69275.65
3000689.620468.840595.790308.77292.21
3500816.580546.110684.100325.33292.21
4000866.250634.430728.260380.53303.25
4500949.050783.460728.260419.16347.41
5001015.280766.900800.020496.44363.97
5501120.160899.370822.100546.11375.01
6001213.990982.160882.810667.55413.64
6501225.031009.760965.610728.26468.84
7001307.821114.640971.130827.62524.04
7501401.661169.831098.080899.37601.31
8001489.971313.341208.470926.97673.07
8501556.211401.661263.671087.04805.54
9001644.521561.731368.541197.43888.33
Table 6. ECON outcome of BQMFO-CSSTS approach compared to other systems and using varying numbers of nodes.
Table 6. ECON outcome of BQMFO-CSSTS approach compared to other systems and using varying numbers of nodes.
Energy Consumption (Joule)
No. of NodesBQMFO-CSSTSATCM IOT-ESTSWOACNETDL-SCHSStab Trust
50059.09093.41115.33153.45186.81
100127.72172.51182.04162.03222.08
150166.79193.48233.51205.87237.32
200119.14147.73270.68233.51255.43
250099.12138.20307.86249.72288.79
300157.26187.76322.15306.90311.67
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Alamro, H.; Alqahtani, H.; Alruwaili, F.F.; Aljameel, S.S.; Rizwanullah, M. Blockchain with Quantum Mayfly Optimization-Based Clustering Scheme for Secure and Smart Transport Systems. Sustainability 2023, 15, 11782. https://doi.org/10.3390/su151511782

AMA Style

Alamro H, Alqahtani H, Alruwaili FF, Aljameel SS, Rizwanullah M. Blockchain with Quantum Mayfly Optimization-Based Clustering Scheme for Secure and Smart Transport Systems. Sustainability. 2023; 15(15):11782. https://doi.org/10.3390/su151511782

Chicago/Turabian Style

Alamro, Hayam, Hamed Alqahtani, Fahad F. Alruwaili, Sumayh S. Aljameel, and Mohammed Rizwanullah. 2023. "Blockchain with Quantum Mayfly Optimization-Based Clustering Scheme for Secure and Smart Transport Systems" Sustainability 15, no. 15: 11782. https://doi.org/10.3390/su151511782

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop