Conference PaperPDF Available

Using Blockchain Technology for the Internet Of Vehicles

Authors:

Figures

2021 International Mobile, Intelligent, and Ubiquitous Computing Conference (MIUCC) | 978-1-6654-1243-8/20/$31.00 ©2021 IEEE | DOI: 10.1109/MIUCC52538.2021.9447622
Using Blockchain Technology for the Internet Of
Vehicles
Ahmed M. Eltahlawy
Information Security Department,
Nile University, Cairo, Egypt.
a.eltahlawy@nu.edu.eg
Marianne A. Azer
National Telecommunication Institute,
Nile University, Cairo, Egypt.
mazer@nu.edu.eg
Abstract—The Internet of Vehicles (IoV) aims to connect
vehic les with their surroundings and share data. In IoV, various
wire less technologies like 5G, WIFI, D SRC, W iMAX, and
ZigBee are used. To share data with in wireless surroundin gs in
a secure way, some security aspects need to be fulfilled.
Blockchain technology is a good fit to cover these
countermeasures. Io V uses a lot of technologies and interacts
with different types of wireless nodes, and this increases the
vulnerability to some attacks that could endanger lives. Using
blockchain technology within the IoV architecture could
provide efficient solutio ns to overcom e these attacks. In this
paper, we present the IoV security requirements and their
countermeasures using blockchain technology. We also
introduce some serious attacks over the IoV architecture and the
different c ountermeasures to overcome these attacks.
Keywords— Attacks, Blockchain, Decentralized Network,
IoV, Security, Wir eless A d Hoc.
I. Intr oduction
The Internet of Vehicles (IoV) is a network under the Internet
of Things (IoT) umbrella that connects vehicles, people, and
smart devices together [1]. The IoV dynamic architecture and
scalability allow vehicles to interact together through the
internet and internal cloud. It also allows moving vehicles to
communicate without having a fixed network infrastructure
[21. IoV is a complex dynamic architecture that is efficient
for sharing data between vehicles and the surroundings [3],
the communication could be Vehicle to Vehicle (V2V),
Vehicle to Infrastructure (V2I, Vehicle to Pedestrian (V2P),
Vehicle to Cloud (V2C), Vehicle to Sensors (V2S), Vehicle
to Road (V2R) nodes, and Vehicle to Network (V2N). In
another way, it is a Vehicle to Everything (V2X)
communication. Fig. 1 [4] illustrates the V2X
communication.
Fig. 1- Vehicle to Everything communication [4]
To be a part of the IoV network, vehicles should be equipped
with some hardware parts to be fully functional. On-Board
Unit (OBU) is an important part that is put inside the vehicle
to be able to communicate with other OBUs and Road Side
Units (RSUs) like traffic lights, gas stations, and toll stations.
In addition, some sensors are needed to gather vehicle and
road important data [5 ]. The communication is done through
different well-known technologies like DSRC, WiFi, GSM,
LTE, Bluetooth, Zigbee, WiMAX. Global Positioning
System (GPS) is important for vehicle position localization.
Communication between RSUs and OBUs has two types of
messages. The first type is safety-relevant messages such as
Basic Safety Messages (BSMs), Cooperative Awareness
Messages (CAM), and Decentralized E nvironmental
Notification Messages (DENM ) in which the safety-relevant
information should be included such as message timestamp,
vehicle positions, vehicle speed, brakes status, and
emergency alerts [6]. The safety messages should be highly
secured and protected against attacks as they are critical
information that needs to be highly protected also should be
real-time. The second type is non-safety messages like
978-1-6654-1243-8/21/$31.00 ©2021 IEEE
54
Authorized licensed use limited to: UNIV OF ALABAMA-BIRMINGHAM. Downloaded on June 10,2021 at 17:21:10 UTC from IEEE Xplore. Restrictions apply.
infotainment messages which tolerate more delay and less
security [7]. Typical IoV network elements are shown in
Fig.2 m . '
Fig.2- IoV network elements [7J
In this paper, we present the IoV security requirem ents and
their countermeasures using the blockchain technology. We
also introduce some serious attacks over the IoV architecture
and the different countermeasures to overcome these attacks.
The rem ainder of this paper is organized as follows. Section
II introduces the blockchain technology and the process of
consensus agreement between netwo rk nodes. In section III,
we discuss the different security requirements needed for the
IoV architecture, and the blockchain features that fulfill the
needed network requirements. Section IV covers different
frameworks and system designs for blockchain architecture
based on blockchain technology. In section V, we explain
different security attacks breaching the IoV network and the
use of blockchain in mitigating these attacks. Finally,
conclusions and future work are presented in section VI.
II. Bac k g r o und
In the IoV architecture, vehicles communicate with each
other and with RSUs without any human interaction. To
ensure that messages are transferred efficiently, assure
message privacy, and control network performance; the
blockchain is the best fit to be integrated with IOV
architecture [8]. Blockchain technology is a powerful
technology to make interactions and data sharing in a trusted
and secure way. It uses peer-to-peer network concept, along
with public key cryptography techniques beside distributed
shared databases between all nodes [8].
Blockchain is a series of blocks that are linked together to
form one big set of connected blocks. Each block holds
information about the sender and some data. In the
blockchain, each node has a full identical record of the
blocks, this record is saved in a distributed manner in addition
to a centralized way inside the network ledger. Once a new
block is recorded into the ledger it is immutable to changes.
Each block has a block header which is used to identify this
block and refers to the previous block in the chain to link all
blocks together in one long virtual chain of blocks [9].
To create a block, all active nodes must trust each other and
have a consen sus agreement to valid ate the block. To do so,
there is a concept technique called the Proof of Work (PoW).
In the PoW, the vehicle miners that try to create a new block
race together, have a complex puzzle to solve based on the
processing power. Afterward, they collect the network data
together into one block and propose this block to the rest of
vehicles on the IoV network. Then comes the role of network
validators to validate this block. After having an agreem ent
on one of the proposed blocks created by the miners, all nodes
record this new block in their copy of the ledger and link it
with the previous one, to encourage miners to continue
creating new blocks all the time, they must be awarded for
that. Many awarding mechanisms were proposed, but they are
not covered in this paper. To have an agreement between all
nodes, a set of rules are saved inside a smart contract to be
able to make decisions.
The IoV architecture is a combination o f RSU nodes, and
each RSU is a part o f multiple VANET networks. For
communication inside a single VANET, the consensus and
communication are decentralized, and the agreement is done
between nodes without any central authority. After the
agreement, a selected vehicle of the VANET sends a new
blo ck to t he R SU 1101. Then , it bec o m e s th e res ponsibility of
the centralized RSU leader to have a decision to update its
ledger and verify the created blocks and then broadcast to the
rest of VANET. It is the R SU ’s responsibility is to secure
handover when a vehicle moves from one region to another
as show n in Fig .3 [10],
Fig.3- VANET network in IoV [101
III. Security R equir ements of IoV and
BLOCKCHAIN
There is a need for authentication, confidentiality,
availability, integrity, and access control in the IoV to be able
to secure safety messages from being faked, altered, or
sniffed, also to block non-authorized users or malicious nodes
from being a part of the network. Blockchain technology is
55
Authorized licensed use limited to: UNIV OF ALABAMA-BIRMINGHAM. Downloaded on June 10,2021 at 17:21:10 UTC from IEEE Xplore. Restrictions apply.
the best fit to cover the security requirements needed for the
IoV architecture Till. In a blockchain, any node must have
an identification address. Shared data is signed to assure
authentication, the data is encrypted by public-key encryption
elliptic curve algorithm which assures confidentiality. The
PoW consensus makes it almost impossible to alter the
message content, this assures data integrity. For privacy,
different privacy-preserving solution mechanisms are
proposed to overcome this big challenge r ill. In the
following, we present some of the main security
requirements.
A. A uthentic atio n
Authentication ensures that the sender vehicle ID is well
identified, and the message is from a genuine sender. To
authenticate users in the IoV architecture using blockchain
technology, the authors of [121 p r o p o s e d a B C - b a s e d syst em
in which blockchain is deployed and centralized at Road Side
Unit (RSU), the credential manager is used to verify the
user’s authentication and authorization. Also, the RSU
contains a ledger to store all vehicle authentication needed
da ta. The au thor s o f [131 proposed that instead of directly
asking the RSU for certification, one leader of the authorized
vehicles should send the request to nearby RSU. It is
somehow a decentralized consensus system where authorized
vehicles first validate the data and then share it within the
network.
B. Av ailability/R eal-tim e G u arantees
Availability ensures that the vehicle is always connected to
the netw ork and the critical data is available when needed
even if the node is under attack. The vehicle should remain
functional, and the network should be secure and fault
tolerant. R eal-Time Constraints are very sensitive and
critical, having the right data within the right time boundaries
is an important requirement. In addition, soft handover
between different VANET networks without disconnecting
from the network is needed.
Blockchain is a decentralized system that prevents a
single point of failure and assures data availability, the
problem exists when a vehicle cannot access any nearby
RSUs, or the communication link is disconnected. To
over c o m e this issu e , th e aut h ors i n [141 proposed a trust
assurance system based on V2V communication, where a
vehicle sends messages to nearby vehicles to create a V2V
network until the RSU connection is returned.
C. D a ta in te gr ity
Integrity means that the message is correct and has not
been altered or dropped. To assure integrity, a sender
signature with a hashing algorithm should be deployed.
Blockchain enhances data integrity using a trustless
consensus mechanism, as each node has its local ledger
containing all network shared data and transactions. The
Ledger is immutable and well trusted, where only valid
transactions and data are stored after having PoW consensus
to ensure data integrity. Also, transferred messages are signed
and protected using a hashing algorithm, a combination
between access control and authentication in addition to a
hash algorithm increases the level of trust over the whole
system.
D. Non-repudiation
Non-Repudiation means that the message sender cannot deny
sending the message. This is important, especially in case of
accidents, where the investigation unit checks the transmitted
messages before the accident to identify the accident
environment. In the blockchain, the consensus mechanism
assures that no one can deny sending a message. The
message is verified by different nodes and saved at the RSU
ledger and replicated in all nodes. Every node can verify the
other node transactions along with the sender signature and
em be dded timestam p for the whole block [151.
E. Co nfid en tiality
Confidentiality plays an important role in ensuring that
only legitim ate users can read and access this m essage and
other non-legitimate users do not have access. Confidential
information is encrypted using public-key algorithms and
only users with a decrypt key can access the needed
information. B lockchain uses an elliptic curve public key
Asymmetric cryptography algorithm to encrypt the messages
before sending them to assure data confidentiality.
F. A ccess control
Access control means having different access levels and
roles for nodes and applications to access some data inside
the network or perform some operations. To ensure access
control for the massive amount of data transferred, the
aut h o rs o f [161 p r oposed a vehicular management system
where RS Us are blockchain nodes to ensure accessibility of
the vehicles by checking the block header where there is a list
of allowed applications that have access to this content. In
addition, a load balancer is assured by spreading the load over
different RSUs.
G. Pr iva cy
The Vehicles private data like location, plate num ber
identity, and speed should not be revealed to any non-
legitimate authority. Privacy preservation techniques should
be used to protect private data from sniffing. To make sure of
user anonymity, the authors of [171 pr oposed a blockchain-
based privacy-preserving mechanism where an anonymous
authentication trust scheme is used not to reveal private data
and to use RSUs as a trusting authority.
H. Scala bility
Due to the increased number of vehicles that are expected
to reach two billion within the next ten years [261, high-speed
mobility, and handover between IoV networks, the network
should be scalable, and the number of vehicles should be
dynamic without any d isruption or limitation. Blockchain is
based on a decentralized approach where it has no limit for
the number of users and is flexible to frequent changes.
Table.1 concludes the security requirements of IoV
architecture and the blockchain specifications to meet these
requirements.
56
Authorized licensed use limited to: UNIV OF ALABAMA-BIRMINGHAM. Downloaded on June 10,2021 at 17:21:10 UTC from IEEE Xplore. Restrictions apply.
T able. 1 - Security Requirements of IoV and Blockchain
Security Requirement Description Blockchain Specifications
Au thentica tion ensures that the sender vehicle ID is
well identified, and the m essage is from
a genuine sender.
Blockchain systems can assure authentication
by having a credential manager ledger to store
all vehicle a uthentication needed data.
Av aila bility /Re al-tim e Gu arantees Availability ensures that the vehicle is
always connected to the network and
the critical data is available when
needed.
Blockchain is a decentralized system that
prevents a single point of failure and assured
data availability.
Data integrity Integrity m eans that the message is
always correct and has not been altered
or dropped.
Blockchain enhances data integrity using a
trustless consensus mechanism, where only
valid transactions and data are stored after
having consensus to ensure data integrity.
Non-repudiation Non-Repudiation means that the
message sender cannot deny sending the
message.
The consensus mechanism assures that no one
can deny sending a message.
Co nfid en tiality Confidentiality ensures that only
legitimate users can read, and access
messages and other non-legitimate users
do not have access.
Blockchain uses an elliptic curve public key
Asymmetric cryptography algorithm to
encrypt the messages before sending them to
assure data confidentiality.
Access control Access control means having different
access levels and roles for nodes and
applications to access some data inside
the network or perform some operations.
Blockchain nodes ensure accessibility o f the
vehicles by checking the block header where
there is a list of allowed applications that have
access to this content.
Privacy The vehicles private data should not be
revealed to any non-legitimate authority.
Blockchain assures anonymous
authentication trust using a trusting authority.
Scalability The network should be scalable, and the
number of vehicles should be dynamic
without any disruption or limitation.
Blockchain is based on a decentralized
approach where it has no limit for the number
of users and is flexible to frequent changes.
IV . BLOCKCHAIN SYSTEM DESIGN FOR THE IoV
FRAMEWORK
To design a secure and highly perform ing IoV network
structure using blockchain technology, there are some needed
design principles to be considered. The network should not
have a single point of failure. It should be easy for
deployment within existing infrastructure and flexible for
upgrades and future changes. Scalability is a m ust where IoV
manages a lot of vehicles, and this number is rapidly
increasing while taking into consideration the high-speed
mobility of the vehicles. The security and reliability aspects
are also a part of the network design choice [181.
Existing blockchain technology deals with
cryptocurrency while the IoV network deals with vehicle
information and roa d events such as accidents with all
associated needed information. Therefore, to adapt the
blockchain in the IoV network different proposals were
presented in the literature.
The au t h o rs o f [191 p r oposed an IoV system design based
on blockchain. The key components are RSUs, Traffic
Management Authority (TMA), Issuers, Law Enforcement
Departm ent (LED), and a group tracking system. For each
geographical region, the role of the issuer is to issue vehicle
credentials within this region, the group of trackers
cooperates to know the identity o f senders in case fake
messages are discovered. TMA authority is used to hold the
public key identifier for the whole system and cover it over,
while LED is authorized for revealing the identity o f the
sender in case fake messages are found and needs for
investigations arise. For each region, there is an auxiliary
blockchain branch of the parent blockchain and only one
parent blockchain including the smart contract to ensure
consistency betw een the whole system. In [201, the authors
proposed an ITS seven-layer framework model which is very
similar to the open system Interconnection (OSI) networking
model. The first layer is the Physical layer which includes all
infrastructure and physical components like vehicles,
sensors, OBUs, and RSUs. Then comes the data layer in
which all blockchain data exists like data blocks, timestamps,
and hashing algorithms. The third layer is the Network layer
in which all data verifications and forwarding mechanisms
are found. The fourth layer is the consensus layer including
the Pro of o f Work (PoW ) and Proof of Stake (PoS)
algorithms needed for consensus. The following layer is the
Incentive layer w here all mining activities and rewards exist.
The sixth layer is the contract layer where the smart contract
needed conditions are found, and the last layer is the
application layer where different applications could be
57
Authorized licensed use limited to: UNIV OF ALABAMA-BIRMINGHAM. Downloaded on June 10,2021 at 17:21:10 UTC from IEEE Xplore. Restrictions apply.
deployed over the network. Fig.4 depicts the ITS seven-layer
framework £20],
Ride- sharing, asset m anagemen t, etc.
7. Application layer
Scenarios and use cases of blockchain-
based ITS
Algorithms , mechanisms of smart
contract (
6. Contract layer
Encryption, signing, and predefined
condition of triggering
Mining , etc.
5. Incentive layer
Incorporating reward to motivate
par ticipa ting
Cons ensus algor ithm, PoW, PoS, etc.
4. Con sensu s layer Consensus algorithm
P2P, data forwa rd, etc.
3. Network layer
Mechanisms of distributed networking,
data forwarding, and verification
Data blocks, time stamps, Merkle
trees, e ncrypt ion, etc.
2. Data layer
Chained data blocks, together with the
related techniques including encryption,
time stamping, hash algorithms, and
Merkle trees
Vehic les, devic es, etc.
1. Physical layer
Physical entities (devices, vehicles, assets,
and other environmental objects)
invo lve d in IT S
Fig.4- ITS seven-layer framework f 20]
In [211, the authors proposed a four-layer system
architecture where the application is the uppermost layer used
by users to access the IOV network through web-based
interfaces or mobile applications. The application layer
interacts with the blockchain layer where smart contracts
allow different organizations and service providers to deploy
some rules and agreement protocols for successful
transactions. It also includes artificial intelligence algorithms
to predict and learn vehicle behavior and improve driving
assistance. In addition, it holds the consensus algorithms for
block validation to be saved inside the database ledger. It also
includes the needed algorithms to provide different services.
Registration authority should be involved in this layer to
verify new registrations during the initial registration phase,
location certificate authority is also needed to prove vehicle
locations. In addition, vehicle service providers lay into this
layer to provide services such as vehicle insurance. The
following layer is the database layer, it provides the needed
services and stores vehicle details and all transactions over
the system. This database is divided into a primary big chain
DB database for normal vehicle details and an interplanetary
file system for large file storage like vehicle logs.
The lower layer is a peer-to-peer network layer that
provides communication between vehicles and IoV network
nodes.
Fig.5- Four layers blockchain architecture [211
The auth o rs in [221 p r oposed a system in which each layer
has its own ledger and miners to reach consensus over two
different layers. The proposal structure includes top-layer and
ground-layer where each layer is completely independent.
The ground layer consists of RSUs that are responsible for
mining and holding the smart contract, and vehicles to
transm it data with low effect range to RSUs, while the top
layer is responsible for the data with a high affect range in
which all transactions are transmitted by RSUs and Base
stations (BS) to check the data validity and integrity then save
the transaction over the network.
Fig.6- Hierarchical Blockchain Architecture f221
V. IoV Secu r it y Attacks And Sol ut ions ba sed
on blockchain TECHNOLOGY.
The IoV is vulnerable to different types of attacks due to the
lack of infrastructure, and high mobility nodes with a strict
security requirement. In this section, we present the different
IoV security attacks and solutions using blockchain
technology.
A. Sybil Attacks
In Sybil attacks, a vehicle attacker fabricates its identity and
claims to be an authentic valid node using its ID in the
network, which is called node im personation. It can even
pretend to be several vehicles with different identities and
positions at the same time or in succession.
Increasing the number of fake vehicles in the network could
lead to a majority and break the consensus mechanism if
gained more than 50 percent of the number of existing nodes
in the netw ork . In [171, t he aut hors pr oposed a three-phase
58
Authorized licensed use limited to: UNIV OF ALABAMA-BIRMINGHAM. Downloaded on June 10,2021 at 17:21:10 UTC from IEEE Xplore. Restrictions apply.
system architecture based on blockchain technology. It
consists of registration servers, service providers, blockchain,
and a trusted central. These components are responsible
together for the verification of vehicle’s identification and
offering different services if the vehicle is authorized. First,
the vehicle must register using its unique identifier then the
authentication is done inside the network infrastructure.
Afterward, if the vehicle is authorized, it can access the
offered services and shared data based on the allowed
permission that was predefined by the service provider. Fig.
7 [17] illustrates the three-phase system.
Registration
Block Chaln server
Users
Fig.7- Overview of three-phase system architecture [171
B. D enial of Service Attacks
The Denial o f Service (DoS/DDoS) attack is used to
consume the target system’s resources and disrupt the
comm unication to make some services or resources
unavailable or at least reduce network performance by
flooding the system with a coordinated massive number of
requests until the service becomes unavailable. DDoS
attackers control some innocent nodes and use them to launch
attacks from different locations at the same time to affect
availability. There are some types of DoS attacks in IoV like
Jellyfish, intelligent cheater, flooding, and jamming attacks.
Th e auth o rs in [221 proposed a defensive architecture to
DDoS attacks, the defense mechanism design is divided into
three layers,
1. The first layer is Software-Defined Networks (SDN) in which
traffic analysis and security policies are deployed,
2. The second layer is Network Function Virtualization (NFV)
where virtualized functions like packet inspection and
firewalls are used in response to attacks,
3. The third layer is the blockchain layer that uses smart
contracts to provide trusted consensus agreements.
Black and white list addresses are shared among the
blockchain network and saved inside the blockchain ledger.
The smart contract runs an authentication script so that only
certified and authentic nodes are allowed inside the IoV
net w o rk. The a uth o r s in [231 u s e d th e Et h ereu m m o d el a nd
integrated this technology over the IoV network. Ethereum
uses the Proof-Of-Stake (POS) concept in which each
transaction consumes some stakes (ex. bitcoin), and after
consensus, the consumed stakes are restored. However, in
case o f bad behavior like sending invalid transactions, the
stakes will be lost forever as a punishm ent and the node will
be considered unauthorized in the blockchain ledger. In
addition, each node has a predefined gas limit value to ensure
that it will not exceed the gas limit value while requesting a
resource inside the network. If the maximum value is reached
no m ore resources will be consumed. This protects the system
from malicious nodes as it will consume its predefined stakes
and gas limit before overloading the bandwidth. In case of a
planned attack, in which all malicious nodes try to consume
the bandwidth within the available gas limit, the bandwidth
will not be exhausted as the RSU server node also has a
maximum bandwidth for the whole network that should not
be exceeded. Fig. 8 [231 dep i cts t he D D o S p rev e n ti on.
Fig.8- DDoS prevention with gas limit approach [231
C. Blackhole/Wormhole Attacks
In blackhole attacks, the attackers claim that they have the
best routing path. Subsequently, they do not re-transmit the
message, so the data is lost forever or only sent to other
malicious nodes and not forwarded to the rest of the network.
In wormhole attacks, the attacker claims to be the best routing
path, then after receiving the message instead of dropping it
like in a blackhole attack, the intruder encapsulates the
message to disorder the hop count, it then forwards the
encapsulated message to another malicious node through a
private tunnel. The other node decapsulates and re-transmits
the message. In [241, the authors proposed using the
Euclidean distance method for validation. This method uses
signal strength in addition to the sender vehicle’s coordinates
as an indication for the message travel distance. This could
be a validation check for the blockchain network to identify
wormholes inside the network in which all nodes are aware
of the current position of others. W hen a malicious node is
detected, a consensus agreement is held to decrease the
59
Authorized licensed use limited to: UNIV OF ALABAMA-BIRMINGHAM. Downloaded on June 10,2021 at 17:21:10 UTC from IEEE Xplore. Restrictions apply.
sender ratings and drop the received message or even reject
all incoming messages from this malicious node. Another
proposed solution in [251 w as to u s e a c lu s t e r-b a s e d m e thod
where each VANET is divided into clusters, and each cluster
elects a cluster head internally. This election may be round-
robin or based on a random timer. The cluster head's
responsibility is to route information among all cluster
members. This head is an acceptor, and all other nodes are
proposers like in the Paxos consensus agreement [271.
D. Bogus Information Attack
Attackers broadcast meaningless or fake information to
manipulate other vehicles for evil intentions. This fake
information could be false position information to mislead
other vehicles about the true position. Illusion attacks send
fake information like sensor readings. Other attacks include
GPS spoofing attacks in which the attacker uses GPS
simulators to generate signals about GPS coordinates, which
are more powerful than the satellite signals to mislead
innocent vehicles.
E. Replay/Timing attacks
Also known as playback attack. Receiving the needed
inform ation w ithin the correct time is important in the IoV
network. In this attack, m alicious nodes add some delay time
slots to the transmitted message w ithout any change in the
message content. It follows that neighboring vehicles receive
time-sensitive messages at a future time when they are no
longer needed.
F. Eavesdropping/sniffing attacks
A passive attack is used to monitor and analyze the
netw ork traffic and steal vehicle confidential and sensitive
information like location and vehicle’s identity.
G. M a n in the Midd le (M iMA) Atta ck s
In this attack, the attacker gains access to confidential
information and even deletes or alters its content. A malicious
vehicle stands between two innocent nodes (V2V or V2I),
receives the message from the transmitter node, changes its
content, and then forwards the wrong message to the receiver.
H. Unauthorized access attacks
In this type of attack, network resources and different
services are being accessed by unauthorized nodes which
have no privileges or rights to do so.
I. Brute-force attacks
Malicious nodes try to steal sensitive inform ation from
innocent nodes like ID, or private security keys. They make
many trials based on the security algorithm and encryption
technique used to secure the information. In blockchain
technology, any transmitted message is encrypted using
public-key encryption technique, which is unbreakable
within a reasonable time, the moving vehicles and frequently
changed netw ork nodes increase the difficulty to have such
an attack within the blockchain network.
VI. Conclusions and Fut ure Work
The Internet of vehicles is a promising architecture for
vehicle connectivity and data sharing among nodes. It has
some security requirements and known attacks. Therefore, it
is important to integrate the blockchain technology within the
IoV network to fulfill the needed requirements and overcome
the security attacks. In this paper, we introduced the IoV
network architecture and the needed security requirements,
we also mentioned how to reach these requirements through
the integration of blockchain technology within IoV. In
addition, we presented different types of possible attacks over
the IoV and the solutions proposed in the literature to
overcome these attacks using blockchain. In the future, we
plan to propose solutions to other attacks using blockchain
technology.
ACKNOWLEDGMENTS
This work is fully supported and funded by Valeo Egypt
Research and Software Development Center.
REFERENCS
[11 Sheng Ding and Maode Ma. Springer Nature Singapore Pte Ltd. 2021. An
Attribute-Based Access Control Mechanism for Blockchain-Enabled
Internet of Vehicles.
[21 Nishant Sharma, Naveen Chauhan, and Narottam Chand. 2018 First
International Conference on Secure Cyber Computing and Communication
(ICSCCC). Security challenges on the Internet of Vehicles (IoV)
environment.
[31 Harsha Vasudev and Debasis Das. 978-1-7281-1217-6/19/$31.00 2019
IEEE. An Efficient Authentication and Secure Vehicle-to-Vehicle
Communications in an IoV.
[41 Xinshu Ma, Chunpeng Ge, and Zhe Liu. Springer Nature Switzerland AG
2019 J. K. Liu and X. Huang (Eds.): NSS 2019, LNCS 11928, pp. 336-351,
2019. Blockchain-Enabled Privacy-Preserving Internet o f Vehicles:
Decentralized and Reputation-Based Network Architecture.
[51 Alberto Marroquin, Marco Antonio To RLICT, Cesar A. Azurdia-Meza,
Sandy Boluf'e. Conference: IEEE XXXIX CONCAPAN 2019, At
Guatemala City, Guatemala. A General Overview of Vehicle-to-X (V2X)
Beacon-Based Cooperative Vehicular Networks.
[61 Chaitanya Yavvari. 2019 published by ProQuest LLC. USING
VEHICULAR DYNAMICS TO ENHANCE SAFETY AND SECURITY
IN CONNECTED AUTONOMOUS VEHICLES.
[71 HAIBO ZHOU, WENCHAO XU, JIACHENG CHEN, AND WEI WANG.
0018-9219 2020 IEEE. Evolutionary V2X Technologies Toward the
Internet of Vehicles: Challenges and Opportunities.
[81 V. Dedeoglu, R. Jurdak, A. Dorri, R. C. Lunardi, R. A. Michelin, A. F.
Zorzo and S. S. Kanhere. Springer Nature Singapore Pte Ltd. 2020.
Blockchain Technologies for IoT.
[91 Priyanka Rathee. Springer Nature Singapore Pte Ltd. 2020. Introduction to
Blockchain and IoT
[101 Mirador Labrador, Weiyan Hou. (2019) International Conference on
Intelligent Computing and its Emerging Applications (ICEA) Implementing
blockchain technology on the Internet o f Vehicle (IoV).
[111 Le o Me nd ibour e, M oha me d Ay me n Cha lou f, Fra nc ine Krief .
https://doi.org/10.1016/j.compeleceng.2020.106646 0045-7906/ 2020
Elsevier Ltd.Survey on blockchain-based applications on the internet of
vehicles.
[121 Noureddine Lasla, Mohamed Younis, Wassim Znaidi, and Dhafer Ben
Arbia. 978-1-5386-3662-6/18/$31.00 2018 IEEE. Efficient Distributed
Admission and Revocation using Blockchain for Cooperative ITS.
[131 van der Heijden RW, Engelmann F, Modinger D, Schonig F, Kargl F. In:
Proceedings of the 1st Workshop on Scalable and Resilient Infrastructures
for Distributed Ledgers. ACM 2017. p. 4. Blockchain: Scalability for
resource-constrained accountable vehicle-to-x communication.
[141 Wagner M, McMillin B. 2018 IEEE 23rd Pacific Rim International
Symposium on Dependable Computing (PRDC). IEEE; 2018. p. 64-73.
Cyber-physical transactions: A method for securing VANETs with
blockchains.
[151 Phi li p As uq uo, C hi bueze Ogah, Waleed Hathal and Shihan Bao. Springer
Nature Singapore Pte Ltd. 2020. Blockchain Meets Cybersecurity: Security,
Privacy, Challenges, and Opportunity
[161 Rohit Sharma, and Suchetana Chakraborty. 978-1-5386-4920-6/18/$31.00
2018 IEEE. BlockAPP: Using Blockchain for Authentication and Privacy
Preservation in IoV.
60
Authorized licensed use limited to: UNIV OF ALABAMA-BIRMINGHAM. Downloaded on June 10,2021 at 17:21:10 UTC from IEEE Xplore. Restrictions apply.
[17] Li M, Zhu L, Lin X . IEEE 2019;6(3):4573_84. Efficient and privacy-
preserving carpooling using blockchain-assisted vehicular fog computing.
[18] Tigang Jiang, Hua Fang, and Honggang Wang. IEEE INTERNET OF
THINGS JOURNAL, VOL. 6, NO. 3, JUNE 2019. Blockchain-Based
Internet of Vehicles: Distributed Network Architecture and Performance
Analysis.
[19] LeiZhang, Mingxing Luo, JiangtaoLi, Man HoAu, Kim-Kwang
RaymondChoo, TongChen, ShengweiTian. 2214-2096/2019 Elsevier Inc.
Blockchain-based secure data sharing system for the Internet of vehicles: A
position paper
[20] Shiho Kim. 2018 Elsevier Inc.
https://doi.org/10.1016/bs.adcom.2018.03.010. Blockchain for a Trust
Network Among Intelligent Vehicles.
[21] R. Ramaguru , M. Sindhu , and M. Sethumadhavan. Springer Nature
Singapore Pte Ltd. 2019. Blockchain for the Internet of Vehicles.
[22] Haoye Chai,Supeng Leng,Ming Zeng, and Haoyang Liang. 978-1-5386-
8088-9/19/$31.00 2019 IEEE. A Hierarchical Blockchain Aided Proactive
Caching Scheme for Internet of Vehicles.
[23] Uzair Javaid, Ang Kiang Siang, Muhammad Naveed Aman, and Biplab
Sikdar. CryBlock’18, June 15, 2018, Munich, Germany, Association for
Computing Machinery, ACM ISBN 978-1-4503-5838-5/18/06. Mitigating
IoT Device based DDoS Attacks using Blockchain.
[24] Snehal Deshmukh-Bhosalea, and Santosh S. Sonavane. 2351-9789 2019
Elsevier Ltd under responsibility of the 12th International Conference
Interdisciplinarity in Engineering. A Real-Time Intrusion Detection System
for Wormhole Attack in the RPL based Internet of Things.
[25] Maliheh Shahryari, and Hamid Reza Naj. 2015 Journal of Advanced
Computer Science & Technology. A cluster based approach for wormhole
attack detection.
[26] Sperling, D., and D. Gordon. Two Billion Cars: Driving Toward
Sustainability. Oxford University Press, 2009.
[27] Aleksey Charapko, Ailidani Ailijiang, and Murat Demirbas, Bridging
Paxos and Blockchain Consensus, 2018 IEEE International Conference on
Internet of Things (iThings) and IEEE Green Computing and
Communications (GreenCom) and IEEE Cyber.
61
Authorized licensed use limited to: UNIV OF ALABAMA-BIRMINGHAM. Downloaded on June 10,2021 at 17:21:10 UTC from IEEE Xplore. Restrictions apply.
... Therefore, modifying a transaction will cost a lot in the entire network. And it is almost impossible to tamper with the transaction data, thus ensuring the security of data storage [25] . ...
Preprint
Full-text available
The existing research on the Internet of Vehicles (IoV) based on blockchain adopts the single chain mode. However, in the face of large-scale data environment, it is difficult to ensure the security and efficiency of large-scale data storage by using single chain. Thus, this paper is devoted to the research on the master-slave multi-chain IoV architecture. In the proposed architecture, there are two major innovations: 1) By defining three different data structures, micro-block, key-block and verification-block, the master-slave multi-chain model based on hash anchoring is designed to break through the data of the whole network. It ensures the consistency and integrity of IoV data, and solves the problem of privacy disclosure caused by insecure data storage; 2) A data upload and access mechanism based on attribute encryption is designed between users and RSU nodes. It solves the problem of privacy disclosure caused by insecure transmission outside the data chain. Finally, we verify that the proposed architecture is more suitable for large-scale data scenario by simulation analysis of system response time and encryption/decryption overhead.
... The more resources are allocated to the system, the better it will perform. However, in a blockchain-based IoV system, the number of vehicles is always changing, and the data flow generated by the vehicles will also change with the density of vehicles and road conditions [12]. If we allocate the resources for the system based on the data flow during the peak period, there will be a huge waste of resources in idle time. ...
Article
Full-text available
With the development of advanced information and communication technology, the traditional centralized cloud architecture cannot satisfy the exploding demand for data exchange in Internet of Vehicle (IoV) systems. Moreover, the traditional centralized architecture of the vehicular network has the potential risk of a single point of failure and lacks autonomy since the system highly relies on a trusted third party (TTP) to provide identity management. Fortunately, the emergence of blockchain technology provides a potential direction to address these problems. However, there are still some problems existing in the construction of an efficient blockchain system in IoV systems, such as the dynamic network topology and limited resources. In this paper, we propose a hierarchical resource scheduling scheme for blockchain-enabled IoV systems that improves the performance of the blockchain-enabled IoV system by efficiently allocating computational resources. The superiority of the proposed method is fully demonstrated by comparing it with existing baseline methods.
Chapter
All over the world, the increase in the use of transport systems is defined as the cause of traffic problems reflected mainly by the increase in the number of road accidents due to poor traffic management. In order to ensure an intelligent mobility and transport and thus in the trend of building smart cities, the interest has turned to the development of the internet of vehicles (IoV). The IoV communication network involves the evolution of vehicle connectivity enabling the exchange of real-time traffic data between vehicles, with their environment and everything related to it, through different network technologies. Given the complexity of the IoV, it is necessary that its environment is secure, reliable, and protected against attacks, and that it allows the diffusion of information throughout the network. The blockchain technology allows the securing of different data transactions exchanged between IoV nodes, given its provision of several cryptographic techniques and that it provides a distributed, transparent, and highly confidential database. In order to expand the area of the covered network, long-range (LoRa) designed for low power wide area networks (LPWANs) is used to ensure simultaneous and long range transmissions. This chapter presents an IoV-based architecture that integrates blockchain technology to cover the database security aspects and the LoRa network as a service for vehicle tracking that allows to collect information from different vehicles including location in order to be able to prevent the presence of road accidents with the aim of warning, alleviating traffic and minimizing the risk of having others. For its implementation, this system is based mainly on the measurement of the speed of vehicles to detect the deceleration or blockage of traffic in order to identify the presence of accidents.
Chapter
The Internet of Vehicles (IoV) is an emerging concept that helps to realize intelligent transportation systems (ITSs). IoV is an area of great interest given the rapid evolution of vehicle technologies, which enables communication between intelligent vehicles and the various system components related to their environment. However, the IoV suffers from security issues regarding the storage and management of exchanged information, in addition to the inability to manage traffic due to the increasing number of connected vehicles. To overcome these constraints, blockchain represents a promising technology in the IoV that provides a distributed, transparent and highly confidential database by recording immutable transactions. This study proposes a systematic review of the literature on the application of blockchain technology in the IoV. The objective is to identify the current challenges in the IoV and highlight the value of blockchain in solving these challenges based on papers published from 2017 to 2022 in Web of Science (WoS)-indexed scientific journals. In addition, the limitations removed from the theoretical foundations of several research works were identified, as well as the perspectives and directions to be addressed for future research.
Chapter
One of the recent advancements in Internet of Things (IoT) is connected vehicles (CV), where each vehicle can connect to the things or vehicles nearby using wireless networks such as Dedicated Short Range Communication (DSRC). This gives rise to many vehicular applications such as platooning. A group of vehicles can negotiate and drive jointly close to each other in a cooperative manner to form a platoon. Using connected and automated driving systems, platooning can aid in cutting total fuel costs, reducing CO2 emissions, improving efficiency, decreasing traffic congestion, increasing safety, and providing comfort for the drivers. The existing work on platooning assumes sensors besides DSRC sensors which may not be reliable in extremely poor weather conditions. In this work, we propose DSRC only based platoon negotiation where each vehicle is an edge node. A vehicle that is interested in platooning can broadcast a DSRC message and interesting vehicles can establish communication to negotiate their route. Then, in a series of transactions over the DSRC channel they can agree upon the leader position as well as the follower position(s). We employ the relative position estimation technique we proposed in prior work. The host vehicle (HV) computes the relative angle with the remote vehicle (RV) to accurately estimate its relative position based on Basic Safety Messages (BSMs) only. In this paper, we propose a new platoon negotiation algorithm based only on DSRC communication messages that works well in any weather condition. To test this, we extend CARLA, an autonomous driving simulator to support IoT connectivity as well as platooning. We implemented DSRC agent class for connectivity that can be instantiated for every vehicle in the simulation. The proposed edge node negotiation algorithms include platoon-ready, pre-negotiation, negotiation resolver, and platoon member algorithms. We experimented with a two-vehicle case scenario in the platoon negotiation phase and validated the algorithms in simulation.
Article
Full-text available
The use of Blockchain technology has recently become widespread. It has emerged as an essential tool in various academic and industrial fields, such as healthcare, transportation, finance, cybersecurity, and supply chain management. It is regarded as a decentralized, trustworthy, secure, transparent, and immutable solution that innovates data sharing and management. This survey aims to provide a systematic review of Blockchain application to intelligent transportation systems in general and the Internet of Vehicles (IoV) in particular. The survey is divided into four main parts. First, the Blockchain technology including its opportunities, relative taxonomies, and applications is introduced; basic cryptography is also discussed. Next, the evolution of Blockchain is presented, starting from the primary phase of pre-Bitcoin (fundamentally characterized by classic cryptography systems), followed by the Blockchain 1.0 phase, (characterized by Bitcoin implementation and common consensus protocols), and finally, the Blockchain 2.0 phase (characterized by the implementation of smart contracts, Ethereum, and Hyperledger). We compared and identified the strengths and limitations of each of these implementations. Then, the state of the art of Blockchain-based IoV solutions (BIoV) is explored by referring to a large and trusted source database from the Scopus data bank. For a well-structured and clear discussion, the reviewed literature is classified according to the research direction and implemented IoV layer. Useful tables, statistics, and analysis are also presented. Finally, the open problems and future directions in BIoV research are summarized.
Article
Full-text available
The vehicular networks are evolving towards a new paradigm, the Internet of Vehicles (IoV). With Internet of Vehicles, vehicles should be able to communicate with each other and with other devices using heterogeneous access technologies. To enable the advent of Internet of Vehicles, security, privacy, cooperation and trust establishment in vehicular networks should be considered. Blockchain (BC), a popular distributed ledger technology, could be a way to overcome these challenges and to improve the vehicular communication architecture. That is why the integration of this technology within the vehicular networks is currently under study. The aim of this survey is to provide directions for future work in the area of Blockchain-based vehicular networks. To do so, existing research works based on this technology and aiming to overcome some vehicular challenges (security, privacy, cooperation, trust) are presented and compared in terms of scheme, Blockchain solution and limitations. Moreover, different requirements (storage, latency, computation , etc.) related to the deployment of Blockchain-based applications in vehicular networks are identified and analysed. Finally, different challenges related to the integration of the Blockchain technology within the vehicular networks and the future of the vehicular networks (Artificial Intelligence, edge computing, etc.) are discussed.
Conference Paper
Full-text available
Nowadays, much effort has been put on Intelligent Transport Systems (ITS) and Vehicle-to-Anything (V2X) communications , given the immense impact these technologies are going to make in the near future. V2X communications have become mainstream, pushing the standardization of various protocols in order to facilitate their implementation and interoperability between vendors and hardware manufacturers. Furthermore, V2X related standards are under the 5G umbrella, leading to this work where we describe the IEEE 1609 and IEEE 802.11p standards, which define the Dedicated Short-Range Communication (DSRC) and the Wireless Access in Vehicular Environments (WAVE) technologies. Emphasis is made on the Physical and Data Link Layers, along with the specifics for the previous mentioned standards.
Chapter
Rapid development of wireless technology and Internet of things (IoT) has indirectly promoted the development of Internet of vehicles (IoV). The data collected by the sensors equipped on the vehicles become richer and more detailed. However, most data are sensitive and private which is relevant to the privacy of the driver and the core information of the system. To protect the data from unauthorized access, fine-grained access control must be enforced. Due to the centralized and complicated access management, traditional access control mechanisms are unfit for IoV systems. In this paper, we propose an attribute-based access control scheme for blockchain-enabled IoV systems. A new type of transaction has been designed to represent the authorization of attributes. The proposed scheme could simplify the access management, and effectively prevent the systems from single point of failure and data tampering. We also improve the access control part to decrease its computation overhead for resource-constrained members in the IoV systems. The security analysis demonstrates that the proposed scheme can resist various attacks and the performance analysis shows our scheme can be implemented efficiently.
Conference Paper
The distributed consensus problem has been extensively studied in the last four decades as an important problem in distributed systems. Recent advances in decentralized consensus and blockchain technology, however, arose from a disparate model and gave rise to disjoint knowledge-base and techniques than those in the classical consensus research. In this paper we make a case for bridging these two seemingly disparate approaches in order to help transfer the lessons learned from the classical distributed consensus world to the blockchain world and vice versa. To this end, we draw parallels between blockchain consensus and a classical consensus protocol, Paxos. We also survey prominent approaches to improving the throughput and providing instant irreversibility to blockchain consensus and show analogies to the techniques from classical consensus protocols. Finally, inspired by the central role formal methods played in the success of classical consensus research, we suggest more extensive use of formal methods in modeling the blockchains and smartcontracts.
Article
One of the benefits of Internet of Vehicles (IoV) is improved traffic safety and efficiency, for example due to the capability to share vehicular messages in real-time. While most of the vehicular messages only need to be shared by nearby vehicles, some messages (e.g., announcement messages) may need to be more broadly distributed, for example to vehicles in a wider region. Finding a single trusted entity to store and distribute such messages can be challenging, and vehicles may not be inclined to participate (e.g., generation and distribution of announcement messages) unless they can benefit from such participation. In addition, achieving both security and privacy can be challenging. In this paper, we propose a blockchain based secure data sharing system to address the above challenges in an IoV setting. Specifically, in our system, announcement messages are stored using blockchain. To encourage/incentivize participation, vehicles that faithfully broadcast the announcement messages and/or contribute to the block generation will be rewarded by some cryptocurrency. Our system is also designed to be privacy-preserving and realizes both priori and posteriori countermeasures.
Article
The rapid growth of Internet of Vehicles (IoV) has brought huge challenges for large data storage, intelligent management, and information security for the entire system. The traditional centralized management approach for IoV faces the difficulty in dealing with real time response. The blockchain, as an effective technology for decentralized distributed storage and security management, has already showed great advantages in its application of Bitcoin. In this paper, we investigate how the blockchain technology could be extended to the application of vehicle networking, especially with the consideration of the distributed and secure storage of big data. We define several types of nodes such as vehicle and roadside for vehicle networks and form several sub-blockchain networks. In the paper, we present a model of the outward transmission of vehicle blockchain data, and then give detail theoretical analysis and numerical results. Our study has shown the potential to guide the application of Blockchain for future vehicle networking.
Article
Carpooling enables passengers to share a vehicle to reduce traveling time, vehicle carbon emissions and traffic congestion. However, the majority of passengers lean to find local drivers, but querying a remote cloud server leads to an unnecessary communication overhead and an increased response delay. Recently, fog computing is introduced to provide local data processing with low latency, but it also raises new security and privacy concerns because users’ private information (e.g., identity, location) could be disclosed when theses information are shared during carpooling. While they can be encrypted before transmission, it makes user matching a challenging task and malicious users can upload false locations. Moreover, carpooling records should be kept in a distributed manner to guarantee reliable data auditability. To address these problems, we propose an efficient and privacy-preserving carpooling scheme using blockchain-assisted vehicular fog computing to support conditional privacy, one-to-many matching, destination matching and data auditability. Specifically, we authenticate users in a conditionally anonymous way. Also, we adopt private proximity test to achieve one-to-many proximity matching and extend it to efficiently establish a secret communication key between a passenger and a driver. We store all location grids into a tree and achieve get-off location matching using a range query technique. A private blockchain is built to store carpooling records. Finally, we analyze the security and privacy properties of the proposed scheme, and evaluate its performance in terms of computational costs and communication overhead. IEEE
Chapter
The intelligent vehicle communication network is prone to cyberthreats, which are difficult to solve using traditional centralized security approaches. Blockchain is an immutable peer-to-peer distributed database containing cryptographically secured information. Blockchain shows successful use cases in financial applications, smart contact, protecting digital copyright of media contents. It extends to all industries including the secure IoT devices, embedded systems, etc. The superior feature of blockchain is its decentralized, immutable, auditable database that secures transactions by protecting privacy. In this chapter, we contemplate the environment of the intelligent vehicle communication network and issues regarding methods of building a blockchain-based trust network among intelligent vehicles. We present the use cases of blockchain in intelligent vehicles in the phase of ongoing research or that under development from automotive industries and academic institutes. We also deliberate the challenging issue of blockchain for intelligent vehicles.