Conference Paper

An Incentive Scheme for VANETs based on Traffic Event Validation using Blockchain

Authors:
  • Edo State University Iyamho
To read the full-text of this research, you can request a copy directly from the authors.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the authors.

... In [54,55,56,57,58], all the event information is stored in a VANET system where Zhang et al. store only the important event like accidents, violation, etc. [59] and Singh et al. store the reliability of the events in blockchain [60]. There are some exceptional uses of blockchain for example in [61,62] where incentive or rewards are awarded to the vehicles for different purposes like event validation or message forwarding. The earned point value is stored in the blockchain for security and transparency. ...
... Iftikhar et al. proposed an event validation method where incentives are awarded to the vehicles who participated in the event verification process [61]. According to the event, reputation values are updated by the RSUs and the vehicles who participated in the consensus get incentives. ...
... The system provides message authentication, conditional privacy preservation, and resilience from common attacks like impersonation, modification, DDoS, reply, MITM, stolen verifier table attacks, side-channel attacks by combining Blockchain, consensus, and encryption algorithms together. To prevent malicious attacks, Iftikhar et al. utilize the PoA consensus method in [61]. Moreover, blockchain and IPFS together provide other security services like non-repudiation, attack prevention, integrity, etc. ...
... Iftikhar et al. 2020 [118] Proof-of-authority algorithm 24. ...
... The control plane deals with the identity authentication procedure and deploying the intrusion detection policy for involved vehicles and managers. To solve the storage capability constraint problem, authors in [118] proposed an incentive and data storage scheme for VANETs by exploiting the benefits of the blockchain and IPFS. Authors store the event information in the IPFS and reputation (or trust) value of vehicles in the blockchain, respectively. ...
... (1) The cost of authenticating vehicles and store the data in IPFS increases with the increase data-size (2) Iftikhar et al. 2020 [118] (1) Storage constrain issues are resolved by using a distributed storage mechanism, (IPFS) (2) to provide the correct event and its validation, an incentive scheme has developed (1) Privacy-preserving authentication protocol has not provided (2) execution of IPFS in the blockchain plate-form has not done Not investigated leakage and SPoF. To resolve this issue, authors in [119] proposed two smart contracts (local storage smart contracts and record pool smart contracts) and consortium blockchain-assisted enabled framework for data storage and sharing in vehicular edge computing network. ...
Article
Vehicular ad-hoc networks (VANETs) are increasingly commonplace, partly due to the popularity of electric vehicles and the digitalization of cities. Data collected and shared in VANETs include traffic-related information, such as those relating to real-time traffic situations and road works. In recent times, there has been a trend of moving away from a centralized approach to a decentralized approach, for example, using Blockchain to facilitate secure data sharing and traceability of critical information. Hence, in this paper, we comprehensively survey the existing literature on blockchain-based VANET systems, focusing on the application of different blockchain technologies in different contexts, as well as the associated challenges and research opportunities.
... In Shrestha et al. (2018Shrestha et al. ( , 2019Shrestha et al. ( , 2020, Yang et al. (2019) and Kumar et al. (2020), all the event information is stored in a VANET system where Zhang et al. (2018) store only the important event like accidents, violation, etc. and Singh and Kim (2018c) store the reliability of the events in blockchain. There are some exceptional uses of blockchain for example in Iftikhar et al. (2020) and Ayaz et al. (2020a) where incentive or rewards are awarded to the vehicles for different purposes like event validation or message forwarding. The earned point value is stored in the blockchain for security and transparency. ...
... By utilising the layers separately proposed method ensures efficient computation and communication. Iftikhar et al. (2020) proposed an event validation method where incentives are awarded to the vehicles who participated in the event verification process. According to the event, reputation values are updated by the RSUs and the vehicles who participated in the consensus get incentives. ...
... The system provides message authentication, conditional privacy preservation, and resilience from common attacks like impersonation, modification, DDoS, reply, MITM, stolen verifier table attacks, side-channel attacks by combining vlockchain, consensus, and encryption algorithms together. To prevent malicious attacks, Iftikhar et al. (2020) utilise the PoA consensus method. Moreover, blockchain and IPFS together provide other security services like non-repudiation, attack prevention, integrity, etc. ...
Article
Blockchain has been adopted in a wide range of application domains to enhance security and privacy. Vehicular ad hoc network (VANET) is an important application domain in today's communication systems where incorporation of blockchain is very timely. Recent literature highlights the prospects of blockchain technology in VANET, however, it is imperative to investigate the effectiveness to ensure viability. In this paper, a thorough investigation is conducted to identify the suitability of blockchain for VANET by identifying and answering key research issues. Unlike other existing surveys, challenges related to blockchain integration, evaluation criteria, privacy preservation, cyber security, etc. are also critically analysed. Future research directions such as 6G and large-scale deployment are also identified which need to be addressed by both VANET and blockchain community. Not only VANET, but also vehicular communication systems (VCSs) and intelligent transportation systems (ITSs) have been considered in this survey.
... The evaluations show that since the average utility of nodes is increased in LAIM, the cooperation of vehicle nodes is promoted. Iftikhar et al. [9] recommended a blockchain-enabled storage-based incentive scheme for VANET. The initiator gives incentives to all those who reply to reduce the selfish behavior of the vehicles. ...
Article
Full-text available
Nowadays, the increasing use of internet in vehicular environments leads to the Vehicular Social Network (VSN) concept as an instance of Internet of Things applications in transportation industry. Information sharing between users in vehicular networks should be done in a privacy-preserving manner, especially users’ location privacy should be preserved. It is also essential to motivate users to participate in the information-sharing system. Moreover, users should be encouraged to behave honestly in the system. This paper presents an information-sharing scheme in VSN, in which not only preserving the privacy of users is supported, but also provides sufficient incentives for users to participate in the system. In addition, the reputation factor is used to encourage users to behave honestly. In the proposed scheme, the Internet platform (Internet of Vehicles) is used for information sharing instead of using the commonly used short-range communication. Furthermore, a ticketing system is used for motivating users to participate in the system. To evaluate the proposed scheme, the Veins simulation tool is used along with the actual data in the Créteil data set. The results of evaluation and analysis of the proposed method show that the quality of the delivered messages affects the number of rewards received by users and also the system works in a fair manner. On the other hand, the system operation is monitored in the presence of whitewashing and slandering attackers. As the result, the proposed system could be reliable in the presence of certain percentages of attackers, depending on the used operation modes. Finally, to ensure the privacy of users, the appropriate size for the areas of movement of vehicles has been analyzed and discussed.
... Blockchain helps to ensure that data is stored across all nodes [33]. Within the last decade, blockchain has become the focus of research in several fields that span from stakeholders and industries to energy trading [34,35], vehicular network [36,37], healthcare, finance, real estate, rural electrification [38] and utilities [39]. Blockchain technically removed the dependency of trusted third parties, which eventually addresses the issue of a single point of failure or failure in trust. ...
Research Proposal
Full-text available
In today's smart community, smart grids (SGs) have emerged as a promising solution to the future generation of the power system. In SG, smart meters automatically collect and act on information such as the behavior of consumers and suppliers. The information collected is used to improve the efficiency, reliability and sustainability of the distribution and generation of electricity. However, major challenges faced in SG are privacy, dynamic pricing and trust. This study combines pail-lier cryptosystem, differential privacy and blockchain technique to resolve the problems of data privacy, integrity and ownership. These techniques are implemented on data sharing and energy trading. Data of each prosumer is first encrypted by paillier cryptosystem at the off-chain level and then recorded in a distributed ledger at the back end level. Prosumer who want to access his encrypted data communicates with the corresponding aggregator and decrypts the encrypted data off-chain that results in minimum gas consumption and transaction fee. A new proof of authority (PoA) consensus mechanism is proposed to achieve minimum gas consumption and cost. In the PoA, the reputation score for each node is derived using the PageRank mechanism. In addition, the security analyses of PoA are performed based on similarity attack, double spending attack and birthday collision resilience. Furthermore, the characteristics of the PoA in terms of consistency, availability and partition tolerance are addressed. Note that the blockchain conducted a privacy risk negotiation with the service provider before prosumer's data is shared. In addition, blockchain serves as a broker to ensure fair energy trading among prosumers. In our scenario, two categories of prosumers are considered, such as mobile prosumers and static prosumers. This study provides three security definitions of the proposed models, which are secure two-party computation, secure temporal information and secure spatial information. In addition, threat models and their security analyses are discussed. Finally, preliminary simulation results of the proposed schemes are also presented.
Article
In this paper, we propose FedChain, a novel framework for federated-blockchain systems, to enable effective transferring of tokens between different blockchain networks. Particularly, we first introduce a federated-blockchain system together with a cross-chain transfer protocol to facilitate the secure and decentralized transfer of tokens between chains. We then develop a novel PoS-based consensus mechanism for FedChain, which can satisfy strict security requirements, prevent various blockchain-specific attacks, and achieve a more desirable performance compared to those of other existing consensus mechanisms. Moreover, a Stackelberg game model is developed to examine and address the problem of centralization in the FedChain system. Furthermore, the game model can enhance the security and performance of FedChain. By analyzing interactions between the stakeholders and chain operators, we can prove the uniqueness of the Stackelberg equilibrium and find the exact formula for this equilibrium. These results are especially important for the stakeholders to determine their best investment strategies and for the chain operators to design the optimal policy to maximize their benefits and security protection for FedChain. Simulations results then clearly show that the FedChain framework can help stakeholders to maximize their profits and the chain operators to design appropriate parameters to enhance FedChain’s security and performance.
Preprint
Full-text available
The Internet of Vehicles (IoV) is the next phase in the evolution of vehicular ad hoc networks (VANETs).Multiple types of Smart Networks exists in our surrounding.i.e., Wireless Sensor Networks (WSNs), Crowd Sensing Networks (CSNs), and Internet of Vehicles, etc A VANET is a collection of mobile nodes (vehicles) that share data through ad hoc on-demand connections. Vehicle Tracking is one of the uses of IOV(Internet of Vehicles) and Vehicle Security is one of the major issues for all vehicle owners. On a vehicle, there are various on-board sensors that sense a vehicle’s motion and the surrounding environment. On-board sensors can also warn drivers about approaching vehicles, speeding, and slippery road conditions. The main aim of the paper is to provide solutions for False Data Injection Attack by Integration of Blockchain Based IPFS-Trust Management System with ML SVR Regression Model. Due to Network Assaults and Threats under Vanet System, the safety of the drivers is under stake and Critical. A rogue node can send out erroneous messages, causing unavoidable scenarios. We first filter the received data from Vehicles creating false traffic jam warning messages using the Machine learning SVR Regression Model where data is created and split into train and test data. We used Machine learning supervised algorithm to find whether the vehicle is a legitimate vehicle or an attacker vehicle and the result is validated using the parameters like Accuracy, Loss Rate, Precision, Recall, and F-Test Score. Algorithm Implementation results show that the FDIA attack strategy achieves a better performance than the without using ML algorithm of SVR Regression Model based attack strategy in Predicting the Vanet Security. Also, we studied the various ways to mitigate the impact of false data injection into the network through a compromised node. Users can access the system through DApp, an Ethereum-distributed application, and manage their vehicle data.
Thesis
Full-text available
This thesis examines the privacy preserving energy management issue, taking into account both energy generation units and responsive demand in the smart grids. Firstly, because of the inherent stochastic behavior of the distributed energy resources, an optimal energy management problem is studied. Distributed energy resources are used in the decentralization of energy systems. Large penetration of distributed energy resources without the precise cybersecurity measures, such as privacy, monitoring and trustworthy communication may jeopardize the energy system and cause outages, and reliability problem for consumers. Therefore, a blockchain based decentralized energy system to accelerate electrification by improving service delivery while minimizing the cost of generation and addressing historical antipathy and cybersecurity risk is proposed. A case study of sub-Sahara Africa is considered. Also, a blockchain based energy trading system is proposed, which includes price negotiation and incentive mechanisms to address the imbalance of order. Besides, the Internet of energy makes it possible to integrate distributed energy resources and consumers. However, as the number of users involved in energy transactions increases, some factors are restricting conventional centralized energy trading. These factors include lack of trust, privacy, fixed energy pricing, and demurrage fees dispute. Therefore, additive homomorphic encryption and consortium blockchain are explored in this thesis to provide privacy and trust. Additionally, a dynamic energy pricing model is formulated based on the load demand response ratio of prosumers to address the fixed energy pricing problem. The proposed dynamic pricing model includes demurrage fees, which is a monetary penalty imposed on a prosumer if it failed to deliver energy within the agreed duration. Also, a new threat model is designed and analyzed. Secondly, mobile prosumers, such as electric vehicles offer a wide range of sophisticated services that contribute to the robustness and energy efficiency of the power grid. As the number of vehicles in the smart grid grows, it potentially exposes vehicle owners to a range of location related privacy threats. For example, when making payments, the location of vehicles is typically revealed during the charging process. Also, fixed pricing policy and lack of trust may restrict energy trading between vehicles and charging stations. Therefore, a private blockchain system is proposed to preserve the privacy of vehicle owners from linking based attack while a public blockchain system is established to enhance energy trading. Various parameters are used to formulate a demand based pricing policy for vehicles, such as time of demand, types of vehicles and locations. Using the demand based pricing policy, an optimal scheduling method is designed to maximize the vehicles both social welfare and utility. An improved consensus energy management algorithm is proposed to protect the privacy of vehicle owners by applying differential privacy. The proposed system is robust against temporal and spatial location based privacy related attacks. Thirdly, blockchain is an evolving decentralized data collection technology, which costeffectively exploits residential homes to collate large amounts of data. The problems of blockchain are the inability to withstand malicious nodes, which provide misleading information that destabilize the entire network, lack of privacy for individual node and shared data inaccuracy. Therefore, a secure system for energy users to share their multi-data using the consortium blockchain is proposed. In this system, a credibility based Byzantine fault tolerance algorithm is employed as the blockchain consensus mechanism to achieve the fault tolerance of the system. Also, a recurrent neural network is used by certain honest users with credibility to forecast the energy usage of other honest users. A recurrent neural network operates on the collated data without revealing the private information about honest users and its gradient parameters. Moreover, additive homomorphic encryption is used in the recurrent neural network to secure the collated data and the gradient parameters of the network. Also, a credibility management system is proposed to prevent malicious users from attacking the system and it consists of two layers: upper and lower. The upper layer manages global credibility that reflects the overall readiness of honest users to engage in multi-data sharing. The lower layer performs local credibility that reflects certain feedback of honest users on the accuracy of the forecast data. Lastly, combining blockchain mining and application intensive tasks increases the computational cost for resource constrained energy users. Besides, the anonymity and privacy problems of the users are not completely addressed in the existing literature. Therefore, this thesis proposes an improved sparse neural network to optimize computation offloading cost for resource constrained energy users. Furthermore, a blockchain system based on garlic routing, known as GarliChain, is proposed to solve the problems of anonymity and privacy for energy users during energy trading in the smart grid. Furthermore, a trust method is proposed to enhance the credibility of nodes in the GarliChain network. Simulations evaluate the theoretical results and prove the effectiveness of the proposed solutions. From the simulation results, the performance of the proposed model and the least-cost option varies with the relative energy generation cost of centralized, decentralized and blockchain based decentralized system infrastructure. Case studies of Burkina Faso, Cote d’Ivoire, Gambia, Liberia, Mali, and Senegal illustrate situations that are more suitable for blockchain based decentralized system. For other sub-Sahara Africa countries, the blockchain based decentralized system can cost-effectively service a large population and regions. Additionally, the proposed blockchain based levelized cost of energy reduces energy costs by approximately 95% for battery and 75% for the solar modules. The future blockchain based levelized cost of energy varies across sub-Sahara Africa on an average of about 0.049 USD/kWh as compared to 0.15 USD/kWh of an existing system in the literature. The proposed model achieves low transaction cost, the minimum execution time for block creation, the transactional data privacy of prosumers and dispute resolution of demurrage fees. Moreover, the proposed system reduces the average system overhead cost up to 66.67% as compared to 33.43% for an existing scheme. Additionally, the proposed blockchain proof of authority consensus average hash power is minimized up to 82.75% as compared to 60.34% for proof of stake and 56.89% for proof of work consensus mechanisms. Simulations are also performed to evaluate the efficacy of the proposed demand based pricing policy for mobile prosumers. From the simulation results, the proposed demand based pricing policy is efficient in terms of both low energy price and average cost, high utility and social welfare maximization as compared to existing schemes in the literature. It means that about 89.23% energy price reduction is achieved for the proposed demand based pricing policy as compared to 83.46% for multi-parameter pricing scheme, 73.86% for fixed pricing scheme and 53.07% for the time of use pricing scheme. The vehicles minimize their operating costs up to 81.46% for the proposed demand based pricing policy as compared to 80.48% for multi-parameter pricing scheme, 69.75% for fixed pricing scheme and 68.29% for the time of use pricing scheme. Also, the proposed system outperforms an existing work, known as blockchain based secure incentive scheme in terms of low energy prices and high utility. Furthermore, the proposed system achieves an average block transaction cost of 1.66 USD. Besides, after applying the differential privacy, the risk of privacy loss is minimum as compared to existing schemes. Furthermore, higher privacy protection of vehicles is attained with a lower information loss against multiple background knowledge of an attacker. To analyze the efficiency of the proposed system regarding multi-data sharing, an experimental assessment reveals that about 85% of honest users share their data with stringent privacy measures. The remaining 15% share their data without stringent privacy measures. Moreover, the proposed system operates at a low operating cost while the credibility management system is used to detect malicious users in the system. Security analysis shows that the proposed system is robust against 51% attack, transaction hacking attack, impersonation attack and the double spending attack. To evaluate the proposed system regarding energy management of resource constrained blockchain energy users, a Jaya optimization algorithm is used to accelerate the error convergence rate while reducing the number of connections between different layers of the neurons for the proposed improved sparse neural network. Furthermore, the security of the users is ensured using blockchain technology while security analysis shows that the system is robust against the Sybil attack. Moreover, the probability of a successful Sybil attack is zero as the number of attackers’ identities and computational capacities increases. Under different sizes of data to be uploaded, the proposed improved sparse neural network scheme has the least average computational cost and data transmission time as compared to deep reinforcement learning combined with genetic algorithm, and sparse evolutionary training and multi-layer perceptron schemes in the literature. Simulation results of the proposed GarliChain system show that the system remains stable as the number of path requests increases. Also, the proposed trust method is 50.56% efficient in detecting dishonest behavior of nodes in the network as compared to 49.20% of an existing fuzzy trust model. Under different sizes of the blocks, the computational cost of the forwarding nodes is minimum. Security analysis shows that the system is robust against both passive and active attacks. Malicious nodes are detected using the path selection model. Moreover, a comparative study of the proposed system with existing systems in the literature is provided.
Article
Full-text available
In Vehicular Ad-hoc Networks (VANETs), a large amount of data is shared between vehicles and Road Side Units (RSUs) in real-time. VANETs assist in sharing traffic information effectively and timely to improve traffic efficiency and reliability. However, less storage capability and selfish behavior of the vehicles are important issues that need to be tackled. The traditional storage mechanisms involve third parties for data management, which are insecure, untrustworthy, non-transparent, and unreliable. To overcome these issues, a blockchain-based data storage scheme for VANETs is proposed in this paper. It exploits the benefits of the Interplanetary File System (IPFS) and blockchain is implemented on RSUs. The RSUs receive the aggregation packets sent by vehicles. These packets contain the events' information that occur in vehicles' surroundings. After verifying an aggregation packet, the RSUs store the event's information in IPFS and the reputation values of the sender vehicle in the blockchain. The reputation value is calculated based on the witnesses' (others vehicles) opinion, whether they agree with the initiator or not about an event. The initiator is the vehicle who initializes the event. Moreover, an incentive mechanism is also proposed in this work in which monetary incentives are given to the repliers who respond to the event information. These incentives are given by the initia-tors after verifying the signatures of the repliers. All the transactions involved in the incentive process are stored in the blockchain. Finally, Oyente is used for the security analysis of the proposed smart contracts. A comparison of the proposed scheme with the logistic regression scheme is also presented.
Article
Full-text available
Smart contract technology is reshaping conventional industry and business processes. Being embedded in blockchains, smart contracts enable the contractual terms of an agreement to be enforced automatically without the intervention of a trusted third party. As a result, smart contracts can cut down administration and save services costs, improve the efficiency of business processes and reduce the risks. Although smart contracts are promising to drive the new wave of innovation in business processes, there are a number of challenges to be tackled. This paper presents a survey on smart contracts. We first introduce blockchains and smart contracts. We then present the challenges in smart contracts as well as recent technical advances. We also compare typical smart contract platforms and give a categorization of smart contract applications along with some representative examples.
Article
Full-text available
An unprecedented proliferation of autonomous driving technologies has been observed in recent years, resulting in the emergence of reliable and safe transportation services. In the foreseeable future, millions of autonomous cars will communicate with each other and become prevalent in smart cities. Thus, scalable, robust, secure, fault-tolerant, and interoperable technologies are required to support such a plethora of autonomous cars. In this article, we investigate, highlight, and report premier research advances made in autonomous driving by devising a taxonomy. A few indispensable requirements for successful deployment of autonomous cars are enumerated and discussed. Furthermore, we discover and present recent synergies and prominent case studies on autonomous driving. Finally, several imperative open research challenges are identified and discussed as future research directions.
Article
Full-text available
In this paper, we propose a blockchain-based solution and framework for document sharing and version control to facilitate multiuser collaboration and track changes in a trusted, secure, and decentralized manner, with no involvement of a centralized trusted entity or third party. This solution is based on utilizing Ethereum smart contracts to govern and regulate the document version control functions among the creators and developers of the document and its validators. Moreover, our solution leverages the benefits of IPFS (InterPlanetary File System) to store documents on a decentralized file system. The proposed solution automates necessary interactions among multiple actors comprising developers and approvers. Smart contracts have been developed using Solidity language, and their functionalities were tested using the Remix IDE (Integrated Development Environment). The paper demonstrates that our smart contract code is free of commonly known security vulnerabilities and attacks. The code has been made publically available at Github.
Article
Full-text available
Sharing traffic information on the vehicular network can help in the implementation of intelligent traffic management, such as car accident warnings, road construction notices, and driver route changes to reduce traffic congestion earlier. In the future, in the case of autonomous driving, traffic information will be exchanged more frequently and more immediately. Once the exposed traffic incident is incorrect, the driving route will be misleading and the driving response may be in danger. The blockchain ensures the correctness of data and tamper resistance in the consensus mechanism, which can solve such similar problems. This paper proposes a Proof-of-Event consensus concept applicable to vehicular networks rather than Proof-of-Work or Proof-of-Authority approaches. The traffic data are collected through the roadside units and the passing vehicles will verify the correctness when receiving the event notification. In addition, two-phase transaction on blockchain is introduced to send warning messages in appropriate regions and time periods. The simulation results show that the proposed mechanism can effectively feedback the correctness of traffic events and provide traceable events with trust verification.
Conference Paper
Full-text available
Large files cannot be efficiently stored on blockchains. On one hand side, the blockchain becomes bloated with data that has to be propagated within the blockchain network. On the other hand, since the blockchain is replicated on many nodes, a lot of storage space is required without serving an immediate purpose, especially if the node operator does not need to view every file that is stored on the blockchain. It furthermore leads to an increase in the price of operating blockchain nodes because more data needs to be processed, transferred and stored. IPFS is a file sharing system that can be leveraged to more efficiently store and share large files. It relies on cryptographic hashes that can easily be stored on a blockchain. Nonetheless, IPFS does not permit users to share files with selected parties. This is necessary, if sensitive or personal data needs to be shared. Therefore, this paper presents a modified version of the InterPlanetary Filesystem (IPFS) that leverages Ethereum smart contracts to provide access controlled file sharing. The smart contract is used to maintain the access control list, while the modified IPFS software enforces it. For this, it interacts with the smart contract whenever a file is uploaded, downloaded or transferred. Using an experimental setup, the impact of the access controlled IPFS is analyzed and discussed.
Article
Full-text available
Electric vehicles are gaining widespread adoption and are a key component in the establishment of the smart grid. Beside the increasing number of electric vehicles, a dense and widespread charging infrastructure will be required. This offers the opportunity for a broad range of different energy providers and charging station operators, both of which can offer energy at different prices depending on demand and supply. While customers benefit from a liberalized market and a wide selection of tariff options, such dynamic pricing use cases are subject to privacy issues and allow to detect the customer’s position and to track vehicles for, e.g., targeted advertisements. In this paper we present a reliable, automated and privacy-preserving selection of charging stations based on pricing and the distance to the electric vehicle. The protocol builds on a blockchain where electric vehicles signal their demand and charging stations send bids similar to an auction. The electric vehicle owner then decides on a particular charging station based on the supply-side offers it receives. This paper shows that the use of blockchains increases the reliability and the transparency of this approach while preserving the privacy of the electric vehicle owners.
Article
Full-text available
Wireless vehicular communication has the potential to enable a host of new applications, the most important of which are a class of safety applications that can prevent collisions and save thousands of lives. The automotive industry is working to develop the dedicated short-range communication (DSRC) technology, for use in vehicle-to-vehicle and vehicle-to-roadside communication. The effectiveness of this technology is highly dependent on cooperative standards for interoperability. This paper explains the content and status of the DSRC standards being developed for deployment in the United States. Included in the discussion are the IEEE 802.11p amendment for wireless access in vehicular environments (WAVE), the IEEE 1609.2, 1609.3, and 1609.4 standards for Security, Network Services and Multi-Channel Operation, the SAE J2735 Message Set Dictionary, and the emerging SAE J2945.1 Communication Minimum Performance Requirements standard. The paper shows how these standards fit together to provide a comprehensive solution for DSRC. Most of the key standards are either recently published or expected to be completed in the coming year. A reader will gain a thorough understanding of DSRC technology for vehicular communication, including insights into why specific technical solutions are being adopted, and key challenges remaining for successful DSRC deployment. The U.S. Department of Transportation is planning to decide in 2013 whether to require DSRC equipment in new vehicles.
Article
As the infrastructure of the intelligent transportation system, vehicular ad hoc networks (VANETs) have greatly improved traffic efficiency. However, due to the openness characteristics of VANETs, trust and privacy are still two challenging issues in building a more secure network environment: it is difficult to protect the privacy of vehicles and meanwhile to determine whether the message sent by the vehicle is credible. In this article, a blockchain-based trust management model, combined with conditional privacy-preserving announcement scheme (BTCPS), is proposed for VANETs. First, an anonymous aggregate vehicular announcement protocol is designed to allow vehicles to send messages anonymously in the nonfully trusted environment to guarantee the privacy of the vehicle. Second, a blockchain-based trust management model is present to realize the message synchronization and credibility. Roadside units (RSUs) are able to calculate message reliability based on vehicles’ reputation values which are safely stored in the blockchain. In addition, BTCPS also achieves conditional privacy since trusted authority can trace malicious vehicles’ identities in anonymous announcements with the related public addresses. Finally, a mixed consensus algorithm based on proof-of-work and practical Byzantine fault tolerates algorithm is suggested for better efficiency. Security analysis and performance evaluation demonstrate that the proposed scheme is secure and effective in VANETs.
Article
Vehicular energy network (VEN), as an important part of the Internet of Things (IoT) for the smart city, which can facilitate the renewable energy (RE) transportation over a large geographical area by means of electric vehicles (EVs). In this paper, firstly, a novel permissioned blockchain system is introduced in VEN to implement secure charging/discharging services for EVs and energy nodes through the use of distributed ledgers and cryptocurrency. Secondly, a proof of trust (PoT) consensus protocol is proposed to efficiently reach consensus in the energy blockchain, where the trust derivation is constructed based on the direct trust and credibility computing.Thirdly, motivated by the pricing mechanism, an incentive model is developed to stimulate EVs to behave cooperatively to allocate RE to various areas with different electricity loads while maximizing EVs' utilities.Finally, extensive numerical results are carried out to evaluate and demonstrate the efficiency of the proposed scheme by comparison with conventional schemes.
Article
Through the Industrial Internet of Things (IIoT), a smart factory has entered the booming period. However, as the number of nodes and network size become larger, the traditional IIoT architecture can no longer provide effective support for such enormous system. Therefore, we introduce the Blockchain architecture, which is an emerging scheme for constructing the distributed networks, to reshape the traditional IIoT architecture. First, the major problems of the traditional IIoT architecture are analyzed, and the existing improvements are summarized. Second, we introduce a security and privacy model to help design the Blockchain-based architecture. On this basis, we decompose and reorganize the original IIoT architecture to form a new, multi-center, partially decentralized architecture. Then, we introduce some relative security technologies to improve and optimize the new architecture. After that, we design the data interaction process and the algorithms of the architecture. Finally, we use an automatic production platform to discuss the specific implementation. The experimental results show that the proposed architecture provides better security and privacy protection than the traditional architecture. Thus, the proposed architecture represents a significant improvement of the original architecture, which provides a new direction for the IIoT development.
Article
Significant increase in the installation and penetration of Renewable Energy Resources (RES) has raised intermittency and variability issues in the electric power grid. Solutions based on fast-response energy storage can be costly, especially when dealing with higher renewable energy penetration rate. The rising popularity of electric vehicles (EVs) also brings challenges to the system planning, dispatching and operation. Due to the random dynamic nature of electric vehicle charging and routing, electric vehicle load can be challenging to the power distribution operators and utilities. The bright side is that the load of EV charging is shiftable and can be leveraged to reduce the variability of renewable energy by consuming it locally. In this paper, we proposed a real-time system that incorporates the concepts of prioritization and cryptocurrency, named SMERCOIN, to incentivize electric vehicle users to collectively charge with a renewable energy-friendly schedule. The system implements a ranking scheme by giving charging priority to users with a better renewable energy usage history. By incorporating a blockchain-based cryptocurrency component, the system can incentivize user with monetary and non-monetary means in a flat-rate system. The effectiveness of the system mechanism has been verified by both numerical simulations and experiments. The system experiment has been implemented on campus of the University of California, Los Angeles (UCLA) for 15 months and the results show that the usage of solar energy has increased significantly.
Article
Vehicular ad hoc networks (VANETs) are becoming the most promising research topic in intelligent transportation systems, because they provide information to deliver comfort and safety to both drivers and passengers. However, unique characteristics of VANETs make security, privacy, and trust management challenging issues in VANETs' design. This survey article starts with the necessary background of VANETs, followed by a brief treatment of main security services, which have been well studied in other fields. We then focus on an in-depth review of anonymous authentication schemes implemented by five pseudonymity mechanisms. Because of the predictable dynamics of vehicles, anonymity is necessary but not sufficient to thwart tracking an attack that aims at the drivers' location profiles. Thus, several location privacy protection mechanisms based on pseudonymity are elaborated to further protect the vehicles' privacy and guarantee the quality of location-based services simultaneously. We also give a comprehensive analysis on various trust management models in VANETs. Finally, considering that current and near-future applications in VANETs are evaluated by simulation, we give a much-needed update on the latest mobility and network simulators as well as the integrated simulation platforms. In sum, this paper is carefully positioned to avoid overlap with existing surveys by filling the gaps and reporting the latest advances in VANETs while keeping it self-explained.
Article
As an integral part of V2G networks, EVs receive electricity from not only the grid but also other EVs and may frequently feed the power back to the grid. Payment records in V2G networks are useful for extracting user behaviors and facilitating decision-making for optimized power supply, scheduling, pricing, and consumption. Sharing payment and user information, however, raises serious privacy concerns in addition to the existing challenge of secure and reliable transaction processing. In this article, we propose a blockchain-based privacy preserving payment mechanism for V2G networks, which enables data sharing while securing sensitive user information. The mechanism introduces a registration and data maintenance process that is based on a blockchain technique, which ensures the anonymity of user payment data while enabling payment auditing by privileged users. Our design is implemented based on Hyperledger to carefully evaluate its feasibility and effectiveness.
Article
The vehicular announcement network is one of the most promising utilities in the communications of smart vehicles and in the smart transportation systems. In general, there are two major issues in building an effective vehicular announcement network. First, it is difficult to forward reliable announcements without revealing users' identities. Second, users usually lack the motivation to forward announcements. In this paper, we endeavor to resolve these two issues through proposing an effective announcement network called CreditCoin, a novel privacy-preserving incentive announcement network based on Blockchain via an efficient anonymous vehicular announcement aggregation protocol. On the one hand, CreditCoin allows nondeterministic different signers (i.e., users) to generate the signatures and to send announcements anonymously in the nonfully trusted environment. On the other hand, with Blockchain, CreditCoin motivates users with incentives to share traffic information. In addition, transactions and account information in CreditCoin are tamper-resistant. CreditCoin also achieves conditional privacy since Trace manager in CreditCoin traces malicious users' identities in anonymous announcements with related transactions. CreditCoin thus is able to motivate users to forward announcements anonymously and reliably. Extensive experimental results show that CreditCoin is efficient and practical in simulations of smart transportation.
Article
In recent years, two technologies, the cloud computing, and the Internet of Things (IoT) have a synergistic effect in the modern organizations as digitization is a new business trend for various industries. Therefore, many organizations outsource their crowdsourced Industrial-IoT (IIoT) data in the cloud system to reduce data management overhead. However, data authentication is one of the fundamental security/trust requirements in such IIoT network. Certificateless signature (CLS) scheme is a cryptographic primitive that provides data authenticity in IIoT systems. Recently, CLS has become a prime research focus due to its ability to solve the key-escrow problem in very recent identity-based signature technique. Many CLS schemes have already been developed using map-to-point (MTP) hash function and random oracle model (ROM). However, due to the implementation difficulty and probabilistic nature of MTP function and ROM, those CLSs are impractical. Hence, the development of a CLS for lightweight devices mounted in IIoT has become one of the most focused research trends. This paper presents a new pairing-based CLS scheme without MTP function and ROM. The new CLS is secure against both the Type-I and Type-II adversaries under the hardness of Extended Bilinear Strong Diffie-Hellman (EBSDH) and Bilinear Strong Diffie-Hellman (BSDH) assumptions, respectively. Performance evaluation and comparison proves that our scheme outperforms other CLS schemes.
Article
A purely peer-to-peer version of electronic cash would allow online payments to be sent directly from one party to another without going through a financial institution. Digital signatures provide part of the solution, but the main benefits are lost if a trusted third party is still required to prevent double-spending. We propose a solution to the double-spending problem using a peer-to-peer network. The network timestamps transactions by hashing them into an ongoing chain of hash-based proof-of-work, forming a record that cannot be changed without redoing the proof-of-work. The longest chain not only serves as proof of the sequence of events witnessed, but proof that it came from the largest pool of CPU power. As long as a majority of CPU power is controlled by nodes that are not cooperating to attack the network, they'll generate the longest chain and outpace attackers. The network itself requires minimal structure. Messages are broadcast on a best effort basis, and nodes can leave and rejoin the network at will, accepting the longest proof-of-work chain as proof of what happened while they were gone.
Provably secure and lightweight certificateless signature scheme for IIoT environments
  • Arijit Karati
  • Marimuthu Islam
  • Karuppiah
A blockchain-based trust management with conditional privacy-preserving announcement scheme for VANETs
  • Haiping Liu Xingchen
  • Fu Huang
  • Ziyang Xiao
  • Ma
Autonomous Driving Cars in Smart Cities: Recent Advances, Requirements, and Challenges
  • Yaqoob Ibrar
  • U Latif
  • Khan
  • Muhammad Sm Ahsan Kazmi
  • Nadra Imran
  • Choong Seon Guizani
  • Hong