Advertisement

Blockchain-Enabled Security and Privacy for Internet-of-Vehicles

Chapter
  • 314 Downloads
Part of the Unmanned System Technologies book series (UST)

Abstract

The evolution of Internet-of-Vehicles (IoV) has promised improvement in traffic management and road safety. However, with continuously increasing number of vehicles on road, there are numerous challenges associated with IoV. Communication among vehicles is needed to be secure and bandwidth efficient. Messages exchanged between vehicles must be authentic so as to maintain trust among the network. On the other hand, blockchain is a rapidly emerging technology for various IoT related applications. It ensures security by maintaining transaction history in the form of an encrypted and immutable ledger. Therefore, blockchain-based communications can potentially solve various challenges of IoV. However, there are certain constraints which make the practical implementation of blockchain in IoV difficult. For example, one of the most common consensus algorithms of blockchain, Proof-of-Work, is energy inefficient and time consuming. Various other consensus algorithms have been developed but they compromise security. This chapter conceptualises the implementation of blockchain in IoV, particularly useful in emergency situations, such as accident. We discuss some consensus algorithms of blockchains and their suitability in IoV, ultimately leading to a formation of voting based consensus integrated with a relay selection mechanism. Furthermore, we present an economic model to incentivise vehicles for safe driving and cooperation through blockchain-enabled transaction of rewards. The security capacity of proposed blockchain against collusion of relay nodes is analysed by game theory. Simulation results of the proposed approach demonstrate its efficiency in terms of latency and success rate in message transmission as compared to other blockchain-based solutions for IoV.

Keywords

Blockchain Voting Reputation Incentive VANET PBFT 

References

  1. 1.
    Aldegheishem, A., Yasmeen, H., Maryam, H., Shah, M. A., Mehmood, A., Alrajeh, N., et al. (2018). Smart road traffic accidents reduction strategy based on intelligent transportation systems (TARS). Sensors, 18(7), 1983–2006.CrossRefGoogle Scholar
  2. 2.
    Chen, R., Jin, W. L., & Regan, A. (2010). Broadcasting safety information in vehicular networks: Issues and approaches. IEEE Network, 24(1), 20–25.CrossRefGoogle Scholar
  3. 3.
    Yáñez, A., Céspedes, S., & Rubio-Loyola, J. (2018). CaSSaM: Context-aware system for safety messages dissemination in VANETs. In Abstracts of the IEEE Colombian Conference on Communications and Computing, Medellin, Colombia, 16–18 May 2018.Google Scholar
  4. 4.
    Martuscelli, G., Boukerche, A., Foschini, L., & Bellavista, P. (2016). V2V protocols for traffic congestion discovery along routes of interest in VANETs: A quantitative study. Wireless Communications and Mobile Computing, 16(17), 2907–2923.CrossRefGoogle Scholar
  5. 5.
    Cataldi, P., & Harri, J. (2011). User/operator utility-based infrastructure deployment strategies for vehicular networks. In Abstracts of the IEEE Vehicular Technology Conference, San Francisco, CA, USA, 5–8 September 2011.Google Scholar
  6. 6.
    Yasser, A., Elzorkany, M., & Kader, N. A. (2017). Vehicle to vehicle implementation in developing countries. In A. Hassanien, K. Shaalan, T. Gaber, & M. Tolba (Eds.), Proceedings of the International Conference on Advanced Intelligent Systems and Informatics 2017. AISI 2017. Advances in Intelligent Systems and Computing (Vol. 639, pp. 809–819). Cham: Springer.Google Scholar
  7. 7.
    Kazmi, A., Khan, M. A., & Akram, M. U. (2016). DeVANET: Decentralized software-defined VANET architecture. In Abstracts of the IEEE International Conference on Cloud Engineering Workshop, Berlin, Germany, 4–8 April 2016.Google Scholar
  8. 8.
    Gazdar, T., Belghith, A., & Abutair, H. (2017). An enhanced distributed trust computing protocol for VANETs. IEEE Access, 6, 380–392.CrossRefGoogle Scholar
  9. 9.
    Zhang, L., Wu, Q., Domingo-Ferrer, J., Qin, B., & Hu, C. (2016). Distributed aggregate privacy-preserving authentication in VANETs. IEEE Transactions on Intelligent Transportation Systems, 18(3), 516–525.CrossRefGoogle Scholar
  10. 10.
    Manvi, S. S., & Tangade, S. (2017). A survey on authentication schemes in VANETs for secured communication. Vehicular Communications, 9, 19–30.CrossRefGoogle Scholar
  11. 11.
    Rehman, O., & Ould-Khaoua, M. (2019). A hybrid relay node selection scheme for message dissemination in VANETs. Future Generation Computer Systems, 93, 1–17.CrossRefGoogle Scholar
  12. 12.
    He, Y., Yu, F. R., Wei, Z., & Leung, V. (2019). Trust management for secure cognitive radio vehicular ad hoc networks. Ad-hoc Networks, 86, 154–165.CrossRefGoogle Scholar
  13. 13.
    Hasrouny, H., Samhat, A. E., Bassil, C., & Laouiti, A. (2019). Misbehavior detection and efficient revocation within VANET. Journal of Information Security and Applications, 46, 193–209.CrossRefGoogle Scholar
  14. 14.
    Janzadeh, H., Fayazbakhsh, K., & Dehghan, M. (2008). A secure credit-based cooperation stimulating mechanism for MANETs using hash chains. Future Generation Computer Systems, 25(8), 926–934.CrossRefGoogle Scholar
  15. 15.
    Crowcroft, J., Gibbens, R., Kelly, F., & Östring, S. (2004). Modelling incentives for collaboration in mobile ad hoc networks. Performance Evaluation, 57(4), 427–439.CrossRefGoogle Scholar
  16. 16.
    Refaei, M. T., DaSilva, L. A., Eltoweissy, M., & Nadeem, T. (2010) Adaptation of reputation management systems to dynamic network conditions in ad hoc networks. IEEE Transactions on Computers, 59(5), 707–719.MathSciNetzbMATHCrossRefGoogle Scholar
  17. 17.
    Dewan, P., Dasgupta, P., & Bhattacharya, A. (2004). On using reputations in ad hoc networks to counter malicious nodes. In Abstracts of the IEEE 10th International Conference on Parallel and Distributed Systems, Newport Beach, CA, USA, 9 July 2004.Google Scholar
  18. 18.
    Srivastava, V., Neel, J., MacKenzie, A. B., Menon, R., DaSilva, L. A., Hicks, J. E., et al. (2005). Using game theory to analyze wireless ad hoc networks. IEEE Communications Surveys and Tutorials, 7(4), 46–56.CrossRefGoogle Scholar
  19. 19.
    Li, Z., & Shen, H. (2011). Game-theoretic analysis of cooperation incentive strategies in mobile ad hoc networks. IEEE Transactions on Mobile Computing, 11(8), 1287–1303.CrossRefGoogle Scholar
  20. 20.
    Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system. Retrieved February 09, 2020, from https://bitcoin.org/bitcoin.pdf Google Scholar
  21. 21.
    Jindal, A., Aujla, G. S., & Kumar, N. (2019). SURVIVOR: A blockchain based edge-as-a-service framework for secure energy trading in SDN-enabled vehicle-to-grid environment. Computer Networks, 153, 36–48.CrossRefGoogle Scholar
  22. 22.
    Wang, X., Zha, X., Ni, W., Liu, R. P., Guo, Y. J., Niu, X., et al. (2019). Survey on blockchain for Internet of Things. Computer Communications, 136, 10–29.CrossRefGoogle Scholar
  23. 23.
    Zheng, Z., Xie, S., Dai, H., Chen, X., & Wang, H. (2017). An overview of blockchain technology: Architecture, consensus, and future trends. In Abstracts of the IEEE International Congress on Big Data, Honolulu, HI, USA, 25–30 June 2017.Google Scholar
  24. 24.
    Gao, W., Hatcher, W. G., & Yu, W. (2018). A survey of blockchain: Techniques, applications, and challenges. In Abstracts of the IEEE International Conference on Computer Communication and Networks, Hangzhou, China, 30 July–2 August 2018.Google Scholar
  25. 25.
    Decker, C., & Wattenhofer, R. (2013). Information propagation in the bitcoin network. In Abstracts of the IEEE International Conference on Peer-to-Peer Computing, Trento, Italy, 9–11 September 2013.Google Scholar
  26. 26.
    Ortega, V., Bouchmal, F., & Monserrat, J. F. (2018). Trusted 5G vehicular networks: Blockchains and content-centric networking. IEEE Vehicular Technology Magazine, 13(12), 121–127.CrossRefGoogle Scholar
  27. 27.
    Sankar, L. S., Sindhu, M., & Sethumadhavan, M. (2017). Survey of consensus protocols on blockchain applications. In Abstracts of the IEEE 4th International Conference on Advanced Computing and Communication Systems (ICACCS), Coimbatore, India, 6–7 January 2017.Google Scholar
  28. 28.
    Fairley, P. (2018). Ethereum will cut back its absurd energy use. IEEE Spectrum, 56(1), 29–32.CrossRefGoogle Scholar
  29. 29.
    Baliga, A. (2017). Understanding blockchain consensus models. Persistent, 4, 1.Google Scholar
  30. 30.
    Wang, W., Hoang, D. T., & Hu, P. (2019). A survey on consensus mechanisms and mining strategy management in blockchain networks. IEEE Access, 7, 22328–22370.CrossRefGoogle Scholar
  31. 31.
    Muratov, F., Lebedev, A., Iushkevich, N., Nasrulin, B., & Takemiya, M. (2018). YAC: BFT consensus algorithm for blockchain. Preprint. arXiv:1809.00554.Google Scholar
  32. 32.
    Dagher, G. G., Mohler, J., Milojkovic, M. (2018). Ancile: Privacy-preserving framework for access control and interoperability of electronic health records using blockchain technology. Sustainable Cities and Society, 39, 283–297.CrossRefGoogle Scholar
  33. 33.
    Samuel, O., Javaid, N., Shehzad, F., Iftikhar, M. S., Iftikhar, M. Z., Farooq, H., et al. (2020). Electric vehicles privacy preserving using blockchain in smart community. In L. Barolli, P. Hellinckx, & T. Enokido (Eds.), Advances on Broad-band Wireless Computing, Communication and Applications. BWCCA 2019. Lecture Notes in Networks and Systems (Vol. 97). Cham: Springer.Google Scholar
  34. 34.
    Li, L., Liu, J., Cheng, L., Qiu, S., Wang, W., Zhang, X., et al. (2018). Creditcoin: A privacy-preserving blockchain-based incentive announcement network for communications of smart vehicles. IEEE Transactions on Intelligent Transportation Systems, 19(7), 2204–220.CrossRefGoogle Scholar
  35. 35.
    Lu, Z., Wang, Q., Qu, G., et al. (2018). Bars: a blockchain-based anonymous reputation system for trust management in VANETs. In Abstracts of the IEEE 17th International Conference on Trust, Security and Privacy in Computing and Communications/12th International Conference on Big Data Science and Engineering, New York, NY, USA, 1–3 August 2018.Google Scholar
  36. 36.
    Liu, L., & Loper, M. (2018). Trust as a service: building and managing trust in the internet of things. In Abstracts of the IEEE International Symposium on Technologies for Homeland Security (HST), Woburn, MA, USA, 23–24 October 2018.Google Scholar
  37. 37.
    Kang, J., Xiong, Z., Niyato, D., Ye, D., Kim, D. I., & Zhao, J. (2018). Toward secure blockchain-enabled internet of vehicles: Optimizing consensus management using reputation and contract theory. IEEE Transactions on Vehicular Technology, 68(3), 2906–2920.CrossRefGoogle Scholar
  38. 38.
    Yang, Z., Yang, K., Lei, L., Zheng, K., & Leung, V. C. (2018). Blockchain-based decentralized trust management in vehicular networks. IEEE Internet of Things Journal, 6(2), 1495–1505.CrossRefGoogle Scholar
  39. 39.
    Khan, A. S., Balan, K., Javed, Y., Tarmizi, S., & Abdullah, J. (2019) Secure trust-based blockchain architecture to prevent attacks in VANET. Sensors, 19(22), 4954.CrossRefGoogle Scholar
  40. 40.
    Ali, N. A., Taha, A. E. M., & Barka, E. (2020). Integrating blockchain and IoT/ITS for safer roads. IEEE Network, 34(1), 32–37.CrossRefGoogle Scholar
  41. 41.
    Yang, Z., Zheng, K., Yang, K., & Leung, V. C. (2017). A blockchain-based reputation system for data credibility assessment in vehicular networks. In Abstracts of the IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications, Montreal, QC, Canada, 8–13 October 2017.Google Scholar
  42. 42.
    Tian, F. (2017). A supply chain traceability system for food safety based on HACCP, blockchain & Internet of things. In Abstracts of the International Conference on Service Systems and Service Management, Dalian, China, 16–18 June 2017.Google Scholar
  43. 43.
    Sharma, P. K., Moon, Y. S., & Park, H. J. (2017). Block-VN: A distributed blockchain based vehicular network architecture in smart city. Journal of Information Processing Systems, 13(1), 184–195.Google Scholar
  44. 44.
    Dao, T. C., Nguyen, B. M., & Do, B. L. (2019). Challenges and strategies for developing decentralized applications based on blockchain technology. In L. Barolli, M. Takizawa, F. Xhafa, & T. Enokido (Eds.), Advanced Information Networking and Applications. AINA 2019. Advances in Intelligent Systems and Computing (Vol. 926). Cham: Springer.Google Scholar
  45. 45.
    Leiding, B., Memarmoshrefi, P., & Hogrefe, D. (2016). Self-managed and blockchain-based vehicular ad-hoc networks. In Abstracts of the ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct, Heidelberg, Germany, 12–16 September 2016.Google Scholar
  46. 46.
    Alouache, L., Nguyen, N., Aliouat, M., & Chelouah, R. (2018). Credit based incentive approach for V2V cooperation in vehicular cloud computing. In A. Skulimowski, Z. Sheng, S. Khemiri-Kallel, C. Cérin, & C. H. Hsu (Eds.), Internet of Vehicles, Technologies and Services Towards Smart City. IOV 2018. Lecture Notes in Computer Science (Vol. 11253, pp. 92–105). Cham: Springer.Google Scholar
  47. 47.
    Ayaz, F., Sheng, Z., Tian, D., Guan, YL., & Leung, V. (2020, accepted). A voting blockchain based message dissemination in vehicular ad-hoc networks (VANETs). In IEEE International Conference on Communications, Virtual Conference, 7–11 June 2020.Google Scholar
  48. 48.
    Pescaru, D. (2013). Urban traffic congestion prediction based on routes information. In Abstracts of the IEEE 8th International Symposium on Applied Computational Intelligence and Informatics (SACI), Timisoara, Romania, 23–25 May 2013.Google Scholar
  49. 49.
    Abedi, O., Berangi, R., Azgomi, M. A. (2009). Improving route stability and overhead on AODV routing protocol and make it usable for VANET. In Abstracts of the 29th International Conference on Distributed Computing Systems Workshops, Montreal, QC, Canada, 22–26 June 2009.Google Scholar
  50. 50.
    Iza-Paredes, C., Mezher, A. M., Aguilar Igartua, M., & Forné, J. (2018). Game-theoretical design of an adaptive distributed dissemination protocol for VANETs. Sensors, 18(1), 294–325.CrossRefGoogle Scholar
  51. 51.
    Fatemidokht, H., & Rafsanjani, M. K. (2018). F-Ant: An effective routing protocol for ant colony optimization based on fuzzy logic in vehicular ad hoc networks. Neural Computing and Applications, 29(11), 1127–1137.CrossRefGoogle Scholar
  52. 52.
    Bettstetter, C., Hartenstein, H., & Pérez-Costa, X. (2004). Stochastic properties of the random waypoint mobility model. Wireless Networks, 10(5), 555–567.CrossRefGoogle Scholar
  53. 53.
    Chatterjee, S., & Das, S. (2015). Ant colony optimization based enhanced dynamic source routing algorithm for mobile ad-hoc network. Information Science, 295, 67–90.MathSciNetCrossRefGoogle Scholar
  54. 54.
    Boban, M., & d’Orey, P. M. (2016). Exploring the practical limits of cooperative awareness in vehicular communications. IEEE Transactions on Vehicular Technology, 65(6), 3904–3916.CrossRefGoogle Scholar
  55. 55.
    Shao, J., Lin, X., Lu, R., & Zuo, C. (2015). A threshold anonymous authentication protocol for VANETs. IEEE Transactions on Vehicular Technology, 65(3), 1711–1720.CrossRefGoogle Scholar
  56. 56.
    Ahmad, A., Saad, M., Njilla, L., Kamhoua, C., Bassiouni, M., & Mohaisen, A. (2018). Blocktrail: A scalable multichain solution for blockchain-based audit trails. In Abstracts of the IEEE International Conference on Communications (ICC), Shanghai, China, 20–24 May 2019.Google Scholar
  57. 57.
    Choi, B., Sohn, J. Y., Han, D. J., & Moon, J. (2019). Scalable network-coded PBFT consensus algorithm. In Abstracts of the IEEE International Symposium on Information Theory (ISIT), Paris, France, 7–12 July 2019.Google Scholar

Copyright information

© Springer Nature Switzerland AG 2021

Authors and Affiliations

  1. 1.Department of Engineering and DesignUniversity of SussexBrightonUK
  2. 2.School of Transportation Science and EngineeringBeihang UniversityBeijingChina
  3. 3.Department of Electrical and Computer EngineeringUniversity of British Columbia (UBC)VancouverCanada

Personalised recommendations