Abstract
Networks of autonomous vehicles roaming in smart cities raise new challenges for end-to-end protection of data in terms of integrity, privacy, efficiency, and scalability. This paper provides a survey of Networks of Trusted Execution Environments (NTEE) architectures. NTEE combine the strong, hardware-rooted security guarantees of the TEE deployed locally in the vehicle, with the distributed protection of a decentralized consensus protocol. We identify three main families of consensus protocols and analyze their architectures, performance, and security, including improvements brought by the TEE. Overall, voting protocols tend to be more efficient for smaller networks, while lottery-based schemes are not easy to apply in a vehicular context due to higher overheads. Both types of protocols reach an intermediate level of security, with variations in byzantine tolerance and types of threats. Graph-based protocols tend to achieve both efficiency and flexibility in terms of network topology support, but their security still remains to be explored.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Abera, T., Bahmani, R., Brasser, F., Ibrahim, A., Sadeghi, A., Schunter, M.: DIAT: data integrity attestation for resilient collaboration of autonomous systems. In: Annual Network and Distributed System Security Symposium (NDSS) (2019)
Alam, M., Ferreira, J., Fonseca, J.A.: Intelligent Transportation System (ITS): Dependable Vehicular Communications for Improved Road Safety. Springer, Switzerland (2016)
Amro, B.: Protecting privacy in VANETs using mix zones with virtual pseudonym change. arXiv:1801.10294 (2018)
Artery: OMNeT++ V2X simulation framework for ETSI ITS-G5. https://github.com/riebl/artery
Axelsson, J.: Safety in vehicle platooning: a systematic literature review. IEEE Trans. Intell. Transp. Syst. 18(5), 1033–1045 (2017)
Baird, L.: The swirlds hashgraph consensus algorithm: fair, fast, byzantine fault tolerance. Swirlds Technical report SWIRLDS-TR-2016-01 (2016)
Bano, S., Sonnino, A., Al-Bassam, M., Azouvi, S., McCorry, P., Meiklejohn, S., Danezis, G.: Consensus in the Age of Blockchains. arXiv:1711.03936 (2017)
Brandenburger, M., Cachin, C., Lorenz, M., Kapitza, R.: Rollback and forking detection for trusted execution environments using lightweight collective memory. In: IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) (2017)
Brandenburger, M., Cachin, C., Kapitza, R., Sorniotti, A.: Blockchain and Trusted Computing: Problems, Pitfalls, and a Solution for Hyperledger Fabric. arXiv:1805.08541 (2018)
C-Roads: The platform of harmonised C-ITS deployment in Europe. https://www.c-roads.eu/platform.html
Car2Car communication consortium. https://www.car-2-car.org/
Castro, M., Liskov, B.: Practical byzantine fault tolerance and proactive recovery. ACM Trans. Comput. Syst. (TOCS) 20(4), 398–461 (2002)
Chen, A., Xiao, H., Haeberlen, A., Phan, L.T.X.: Fault tolerance and the five-second rule. In: Workshop on Hot Topics in Operating Systems (HotOS) (2015)
Dolev, S.: Self-Stabilization. MIT Press, Cambridge (2000)
E-safety Vehicle Intrusion proTected Applications (EVITA). www.evita-project.org
ETSI TS 103 097 V1.3.1: Intelligent Transport Systems (ITS); Security; Security header and certificate formats (2017)
Gilbert, S., Lynch, N.: Brewer’s conjecture and the feasibility of consistent, available, partition-tolerant web services. ACM SIGACT News 33(2), 51–59 (2002)
Hamdan, S., Hudaib, A., Awajan, A.: Detecting Sybil attacks in vehicular ad hoc networks. arXiv:1905.03507 (2019)
Intel: PoET 1.0 specification (2015)
Kang, J., Yu, R., Huang, X., Wu, M., Maharjan, S., Xie, S., Zhang, Y.: Blockchain for secure and efficient data sharing in vehicular edge computing and networks. IEEE Internet of Things J. 6(3), 4660–4670 (2019)
Karnouskos, S., Kerschbaum, F.: Privacy and integrity considerations in hyperconnected autonomous vehicles. Proc. IEEE 106(1), 160–170 (2018)
Kelarestaghi, K.B., Foruhandeh, M., Heaslip, K., Gerdes, R.M.: Survey on vehicular ad hoc networks and its access technologies security vulnerabilities and countermeasures. arXiv:1903.01541 (2019)
Lima, A., Rocha, F., Völp, M., Esteves-VerÃssimo, P.: Towards safe and secure autonomous and cooperative vehicle ecosystems. In: ACM Workshop on Cyber-Physical Systems Security and Privacy (CPS-SPC) (2016)
Liu, J., Li, W., Karame, G.O., Asokan, N.: Scalable byzantine consensus via hardware-assisted secret sharing. IEEE Trans. Comput. 68(1), 139–151 (2019)
Lundbæk, L.N., Janes Beutel, D., Huth, M., Jackson, S., Kirk, L., Steiner, R.: Proof of Kernel work: a democratic low-energy consensus for distributed access-control protocols. R. Soc. Open Sci. 5(8), 180422 (2018)
Miller, A., Xia, Y., Croman, K., Shi, E., Song, D.: The honey badger of BFT protocols. In: ACM Conference on Computer and Communications Security (CCS) (2016)
Milutinovic, M., He, W., Wu, H., Kanwal, M.: Proof of luck: an efficient blockchain consensus protocol. In: ACM Workshop on System Software for Trusted Execution (SysTEX) (2016)
MovSim. http://www.movsim.org
Ortega, V., Bouchmal, F., Monserrat, J.F.: Trusted 5G vehicular networks: blockchains and content-centric networking. IEEE Veh. Technol. Mag. 13(2), 121–127 (2018)
Petit, J., Schaub, F., Feiri, M., Kargl, F.: Pseudonym schemes in vehicular networks: a survey. IEEE Commun. Surv. Tutor. 17, 228–255 (2015)
Santini, S., Salvi, A., Valente, A.S., Pescapè, A., Segata, M., Cigno, R.L.: Platooning maneuvers in vehicular networks: a distributed and consensus-based approach. IEEE Trans. Intell. Veh. 4(1), 59–72 (2019)
Veronese, G.S., Correia, M., Bessani, A.N., Lung, L.C., Verissimo, P.: Efficient byzantine fault-tolerance. IEEE Trans. Comput. 62(1), 16–30 (2013)
Vukolić, M.: The quest for scalable blockchain fabric: proof-of-work vs. BFT replication. In: International Workshop on Open Problems in Network Security (iNetSec) (2015)
Whitefield, J., Chen, L., Giannetsos, T., Schneider, S., Treharne, H.: Privacy-enhanced capabilities for VANETs using direct anonymous attestation. In: IEEE Vehicular Networking Conference (VNC) (2017)
Wolf, M., Gendrullis, T.: Design, implementation, and evaluation of a vehicular hardware security module. In: 14th International Conference on Information Security and Cryptology (ICISC) (2011)
Xiao, Y., Zhang, N., Lou, W., Hou, Y.T.: A survey of distributed consensus protocols for blockchain networks. arXiv:1904.04098 (2019)
Yin, M., Malkhi, D., Reiter, M.K., Gueta, G.G., Abraham, I.: HotStuff: BFT consensus with linearity and responsiveness. In: ACM Symposium on Principles of Distributed Computing (PODC) (2019)
Acknowledgements
We would like to thank Ahmad-Reza Sadeghi and David Koisser for their help and insightful comments on the paper.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Boos, P., Lacoste, M. (2020). Networks of Trusted Execution Environments for Data Protection in Cooperative Vehicular Systems. In: Laouiti, A., Qayyum, A., Mohamad Saad, M. (eds) Vehicular Ad-hoc Networks for Smart Cities. Advances in Intelligent Systems and Computing, vol 1144. Springer, Singapore. https://doi.org/10.1007/978-981-15-3750-9_8
Download citation
DOI: https://doi.org/10.1007/978-981-15-3750-9_8
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-3749-3
Online ISBN: 978-981-15-3750-9
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)