Skip to main content
Log in

Blockchain Meets VANET: An Architecture for Identity and Location Privacy Protection in VANET

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

With the breakthroughs in sensor technology and internet of things, Vehicular Ad Hoc Network (VANET) is developing into a new generation. The technical challenges of current VANET are decentralized architecture deployment and privacy protection. Since the blockchain owns the characteristics of being decentralized, distributed, collective maintenance and non-tampering, this paper designs a novel decentralized architecture using blockchain technology, which is called blockchain-based VANET. The blockchain-based VANET involves four major stages: blockchain set-up, registration of vehicles, SBMs upload, and blockchain record. It can effectively address the problems of centralization and mutual distrust between entities in current VANET. For protecting identity and location privacy, we propose UGG, IPP and LPP algorithms with the way of dynamic threshold encryption and k-anonymity unity in the stage of SBMs upload of blockchain-based VANET. To quantify the availability of k-anonymity unity, we propose two indicators: connectivity and average distance. Extensive simulations have been conducted to validate the effectiveness of blockchain-based VANET. We analyze the simulation results from four aspects: system time, average distance, connectivity, and privacy leakage. The simulation results show that our proposed architecture performs better in terms of processing time than current architectures. Furthermore, our proposed architecture shows its superior in the aspect of protecting identity and location privacy.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7:
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  1. Vehicle/5G, available on https://http://www. sohu. com/a/229846324_114835, accessed on Apr. 28, 2018

  2. Dvir E, Strasser G (2018) Does Marketing Widen Borders? Cross-Country Price Dispersion in the European Car Market. Journal of International Economics, 134–149

  3. Rasheed H, Donghyun K, Junggab S et al. (2018) Secure and Privacy-Aware Incentives-Based Witness Service in Social Internet of Vehicles Clouds, IEEE Internet of Things Journal, 2441–2448

  4. Jie C, Jing Z, Hong Z et al. (2018) An efficient certificateless aggregate signature without pairings for vehicular ad hoc networks, Information Sciences, 1–15

  5. Sun G, Yu M, Liao D et al. (2018) Analytical Exploration of Energy Savings for Parked Vehicles to Enhance VANET Connectivity. IEEE Transactions on Intelligent Transportation Systems, DOI: https://doi.org/10.1109/TITS.2018. 2834569

  6. Sun G, Zhang Y, Liao D et al. (2018) Bus Trajectory-Based Street-Centric Routing for Message Delivery in Urban Vehicular Ad hoc Networks. IEEE Transactions on Vehicular Technology, 7550–7563

  7. Nzouonta J, Rajgure N, Wang G et al. (2009) VANET Routing on City Roads Using Real-Time Vehicular Traffic Information. IEEE Transactions on Vehicular Technology, 3609–3626

  8. Li H Liao D, Sun G et al. (2017) Towards Location and Trajectory Privacy Preservation in 5G Vehicular Social Network. IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), 63–69

  9. Liao D, Li H, Sun G et al. (2018) Location and Trajectory Privacy Preservation in 5G-Enabled Vehicle Social Network Services. Journal of Network and Computer Applications, 108–118

  10. Li H, Liao D, Sun G et al. (2018) Two-stage Privacy-preserving Mechanism for a Crowdsensing -based VSN. IEEE Access, 40682–40695

  11. Liao D, Li H, Sun G et al. (2015) Protecting User Trajectory in Location-Based Services, IEEE GLOBECOM, 1–6

  12. Liao D, Li H, Anand V et al. (2016) Using Location-labeling for Privacy Protection in Location-Based Services. International Conference on Internet of Things and Big Data, 299–306

  13. Sun G, Liao D, Li H et al. (2017) L2P2: A location-label based approach for privacy preserving in LBS. Future Generation Computer Systems, 375–384

  14. Liao D, Sun G, Li H et al. (2017) The Framework and Algorithm for Preserving User Trajectory while using Location-Based Services in IoT-Cloud Systems. Cluster Computing, 2283–2297

  15. Novo O (2018) Blockchain Meets IoT: An Architecture for Scalable Access Management in IoT. IEEE Internet of Things Journal, 1184–115

  16. Sun G, Chang V, Ramachandran M et al. (2017) Efficient Location Privacy Algorithm for Internet of Things (IoT) Services and Applications. Journal of Network and Computer Applications, 3–13

  17. Sun G, Xie Y, Liao D et al. (2017) User-Defined Privacy Location-Sharing System in Mobile Online Social Networks. Journal of Network and Computer Applications, 34–45

  18. Tyagi A, Sreenath N (2015) Location privacy preserving techniques for location based services over road networks. International Conference on Communications and Signal Processing (ICCSP), 1319–1326

  19. Ullah I, Wahid A, Shah M et al. (2017) VBPC: Velocity based pseudonym changing strategy to protect location privacy of Vehicles in VANET. International Conference on Communication Technologies, 132–137

  20. Au M, Liu J, Fang J et al. (2014) A New Payment System for Enhancing Location Privacy of Electric Vehicles. IEEE Transactions on Vehicular Technology, 3–18

  21. Ying B, Makrakis D, Mouftah H (2013) Dynamic Mix-Zone for Location Privacy in Vehicular Networks. IEEE Communications Letters, 1524–1527

  22. Kang J, Yu R, Huang X et al. (2018) Privacy-Preserved Pseudonym Scheme for Fog Computing Supported Internet of Vehicles. IEEE Transactions on Intelligent Transportation, 2627–2637

  23. Zhang S, Wang G, Liu Q et al. (2018) A trajectory privacy-preserving scheme based on query exchange in mobile social networks. Soft Computing, 6121–6133

  24. Zhu L, Xie H, Liu Y et al. (2018) PTPP: Preference-Aware Trajectory Privacy-Preserving over Location-Based Social Networks. Journal of Information Science and Engineering, 803–820

  25. Memon I, Chen L, Arain Q et al. (2018) Pseudonym changing strategy with multiple mix zones for trajectory privacy protection in road networks. International Journal of Communication Systems. 1–18

  26. Cui J, Xu W, Zhong H (2018) et al. Privacy-Preserving Authentication Using a Double Pseudonym for Internet of Vehicles. Sensors, 1–15

  27. Afifi M, Zhou K, Ren J (2018) Privacy Characterization and Quantification in Data Publishing. IEEE Transactions on Knowledge and Data Engineering, 1756–1769

  28. Takabi H, Joshi J, Karimi H (2009) A collaborative k-anonymity approach for location privacy in location-based services, International Conference on Collaborative Computing, 1–9

  29. Niu B, Li Q, Zhu X et al. (2014) Achieving k-anonymity in privacy aware location-based services. IEEE INFOCOM, 754–762

  30. Islam S, Obaidat M, Vijayakumar P (2018) et al. A robust and efficient password-based conditional privacy preserving authentication and group-key agreement protocol for VANETs. Future Generation Computer Systems, 217–227

  31. Cui J, Zhang J, Zhong H et al. (2018) An efficient certificateless aggregate signature without pairings for vehicular ad hoc networks. Information Sciences, 1–15

  32. Peters D, Wetzlich J, Thiel F et al. (2018) Blockchain applications for legal metrology. IEEE International Instrumentation and Measurement Technology Conference (I2MTC), 1–6

  33. Joy J, Cusack M (2017) Internet of Vehicles and Autonomous Connected Car-Privacy and Security Issues. IEEE International Conference on Computer Communication and Networks, 1–9

  34. Joy J, Cusack G, Gerla M (2017) Poster: Time Analysis of the Feasibility of Vehicular Blocktrees. ACM 3rd Workshop on Experiences with the Design and Implementation of Smart Objects, 25–26

  35. Dorri A, Kanhere S, Jurdak R (2017) Towards an Optimized BlockChain for IoT. ACM 2nd International Conference on Internet-of-Things Design and Implementation, 173–178

  36. Sharma P, Moon S, Park J (2017) Block-VN: A Distributed Blockchain Based Vehicular Network Architecture in Smart City. J Inf Process Syst 13(1):184–195

    Google Scholar 

  37. Lei A, Cruickshank H, Cao Y et al. (2017) Blockchain-Based Dynamic Key Management for Heterogeneous Intelligent Transportation Systems. IEEE Internet of Things Journal, 1832–1843

  38. Amoretti M, Brambilla G, Medioli F et al. (2018) Blockchain-Based Proof of Location. IEEE International Conference on Software Quality, Reliability and Security, 146–153

  39. Herzberg A, Jarecki S, Krawczyk H et al. (1995) Proactive Secret Sharing Or: How to Copy with Perpetual Leakage. Proc of Crypto, 339–352

  40. Alphand O, Amoretti M, Claeys T et al. (2018) IoTChain: A Blockchain Security Architecture for the Internet of Things. IEEE Wireless Communications and Networking Conference (WCNC), 1–6

  41. A. Said, M. Marot, A. Ibrahim, et al. (2016) Modeling interactive real-time applications in VANETs with performance evaluation. Computer Networks, 66–78

  42. G. Wood. Ethereum: A Secure Decentralised Generalised Transaction Ledger. Available: https://www.ethereum.org/

Download references

Acknowledgements

This research was partially supported by Natural Science Foundation of China (61571098), 111 project (B14039), Fundamental Research Funds for the Central Universities (002).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dan Liao.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Li, H., Pei, L., Liao, D. et al. Blockchain Meets VANET: An Architecture for Identity and Location Privacy Protection in VANET. Peer-to-Peer Netw. Appl. 12, 1178–1193 (2019). https://doi.org/10.1007/s12083-019-00786-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-019-00786-4

Keywords

Navigation