ThesisPDF Available

Blockchain-based Data and Energy Trading in Internet of Electric Vehicles -MS Thesis

Authors:

Abstract and Figures

The radically increasing amount and enormous types of data generated by vehicles have brought in the innovated application of data trading in vehicular networks. Whereas the immense usage of Electric Vehicles (EVs) as mobile energy carriers have supported distributed energy trading due to their bidirectional charging and discharging capabilities. The trustless environment of Internet of Electric Vehicles (IoEV), including fuel vehicles and EVs, faces conflicting interests and disputes among trading parties. We exploit consortium blockchain for secure data trading to achieve information transparency and build trust in IoEV. All trading actions are performed by using smart contracts to tackle disputes and illegal actions. Moreover, bloom filters are used for fast data lookup and data duplication verification through previously stored hash-list at roadside units (RSUs). Removing data duplication at an earlier stage helps in reducing storage cost. The reliability and integrity of traded data are ensured by using the digital signature scheme based on elliptic curve bilinear pairing. An external distributed storage, InterPlanetary File System (IPFS), is used for long term availability of traded data, which provides reliable and high capacity storage resources. On the other hand, the energy trading transactions among EVs face some security and privacy protection challenges. An adversary can infer the energy trading records of EVs, and launch the data linkage attacks. To address this issue, an account generation technique is used that hides the energy trading trends. The new account generation for an EV depends upon its traded volume of energy. The experimental results verify that the proposed solution is efficient for data and energy trading in IoEV with the reliable and long term availability of data storage.
Content may be subject to copyright.
A preview of the PDF is not available
ResearchGate has not been able to resolve any citations for this publication.
Article
Full-text available
This paper investigates the problem of bidirectional energy exchange between electric vehicles (EVs) and road lanes embedded with wireless power transfer technologies called wireless charging-discharging lanes (WCDLs). As such, EVs could provide better services to the grid, especially for balancing the energy supply-demand, while bringing convenience for EV users, because no cables and EV stops are needed. To enable this EV-WCDL energy exchange, a novel decentralized peer-to-peer (P2P) trading mechanism is proposed, in which EVs directly negotiate with a WCDL to reach consensus on the energy price and amounts to be traded. Those energy price and amounts are solutions of an optimization problem aiming at optimizing private cost functions of EVs and WCDL. The negotiation process between EVs and WCDL is secured by a privacy-preserving consensus protocol. Further, to assure successful trading with desired energy price and amounts, an analytical and systematic method is proposed to select cost function parameters by EVs and WCDL in a decentralized manner. Simulations are then carried out to validate the developed theoretical results, which confirm the effectiveness and scalability of the proposed algorithm.
Article
Full-text available
Within the cloud environment, the availability of storage, as well as bandwidth, can be effectively preserved in virtue of data de-duplication. However, refraining redundancy from additional storage or communication is not trivial due to security concerns. Though intensive researches have been addressed on a convergent cryptosystem for secure data de-duplication, the conflicts amongst functionality, confidentiality, and authority remain unbalanced. More concretely, although data are obfuscated under convergent encryption, a violent dictionary attack is still efficacious since the whole pseudorandom process relies heavily on plaintexts. As for data ownership, the download privilege, which depends on hash value, may also be infringed due to the same reason. To dispose of these problems, we presented a conspiracy-free data de-duplication protocol based on a threshold blind signature in this article. With the help of multiple key servers, the outsourced file and de-duplication label will be computationally indistinguishable from random strings. We used the Boom filter as a tool to implement a proof of ownership, ensuring that the ownership claims made by users are real. It effectively prevents the attacker from using the stolen tag to get the whole file to gain file access without authorization. The most significant innovation of this article is to use homomorphism computation to aggregate and generate partial signature tags, and to introduce a secret sharing mechanism based on The Chinese Remainder Theorem to hide signature keys, thus balancing the security concerns of cloud and client. Compared with existing schemes, both communication and computation performances are preferable in our protocol. As far as we know, our scheme is the only data de-duplication scheme that satisfies the semantic security of ciphertext and label.
Article
Full-text available
Blockchain technology is among the most significant developments and revolutionary innovations of the Information Technology industry. It corners a crucial space in the present digital era and has already made significant differences in human life. Moreover, it is anticipated that the Blockchain technology will improvise the existing IT facilities in the next several years in many domains. Recent technological developments are allowing for a major advancement in Healthcare sectors. Information security and accessibility are critical considerations for the integration and communication with Electronic Healthcare Record (EHR) systems when sharing private medical information. In this context, selecting the most effective blockchain model for secure and trustworthy EHRs in the healthcare sector requires an accurate mechanism for evaluating the impact of different available blockchain models for its features. The present study uses a scientifically proven approach for evaluating the impact of blockchain technology and provides a novel idea and path to the future researchers. This research analysis garnered the feedback of 56 domain experts in the healthcare management for assessing the impact of different blockchain models. To eliminate the ambiguities that arose due to multiple opinions of these experts and for the externalization and organization of information about the selection context of the blockchain model, the study used a decision model. Fuzzy Analytic Analytical Network Process (F-ANP) method was used to calculate the weights of the criteria as well as the Fuzzy-Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) technique was used to evaluate the effect of alternative solutions. Further, the results obtained through this empirical investigation will be an instrumental reference for choosing the most appropriate Blockchain model for maintaining breach-free EHRs.
Article
Full-text available
Increasingly, blockchain technology is attracting significant attentions in various agricultural applications. These applications could satisfy the diverse needs in the ecosystem of agricultural products, e.g., increasing transparency of food safety and IoT based food quality control, provenance traceability, improvement of contract exchanges, and transactions efficiency. As multiple untrusted parties, including small-scale farmers, food processors, logistic companies, distributors and retailers, are involved into the complex farm-to-fork pipeline, it becomes vital to achieve optimal trade-off between efficiency and integrity of the agricultural management systems as required in contexts. In this paper, we provide a survey to study both techniques and applications of blockchain technology used in the agricultural sector. First, the technical elements, including data structure, cryptographic methods, and consensus mechanisms are explained in detail. Secondly, the existing agricultural blockchain applications are categorized and reviewed to demonstrate the use of the blockchain techniques. In addition, the popular platforms and smart contract are provided to show how practitioners use them to develop these agricultural applications. Thirdly, we identify the key challenges in many prospective agricultural systems, and discuss the efforts and potential solutions to tackle these problems. Further, we conduct an improved food supply chain in the post COVID-19 pandemic economy as an illustration to demonstrate an effective use of blockchain technology.
Article
A smart contract is an agreement between two or more parties, which is executed by the computer code. The code does the execution without giving either party the ability to back out, so it ensures the trustless execution. The smart contract is one of the most important features in blockchain applications, which implements trusted transactions without third parties. However, with the rapid development, blockchain smart contracts have also exposed many security problems, and some attacks caused by contract vulnerabilities have led to terrible losses. In order to better deal with such dilemma, making a comprehensive survey about the security verification of blockchain smart contracts from major scientific databases is quite indispensable. Even though the significance of studying security verification of blockchain smart contracts is evident, it is really fresh yet. The major contributions of our survey work come from three aspects. First, after retrieving all-sided research studies, we select 53 most related papers to show the state-of-the art of this topic, where 20 papers focus on dealing with security assurance of blockchain smart contracts, and 33 papers focus on the correctness verification of blockchain smart contracts. Second, we propose a taxonomy toward the topic of security verification of blockchain smart contracts and discuss the pros and cons of each category of related studies. Third, through in-depth analysis of these studies, we come to know that the correctness verification of smart contracts based on the formal method has already become the more significant and more effective method to validate whether a smart contract is credible and accurate. So, we further present representative studies of formal verification of smart contracts in detail to demonstrate that using a formal method to validate blockchain smart contracts must have a promising and meritorious future.
Article
A distributed charging system based on the Internet of Things can provide important supports to ensure the safe and sustainable operation of electric vehicles (EVs). Usually, drivers prefer to use local charging piles by querying the remote cloud server. Frequent communication with the cloud server will not only produce an unnecessary communication overhead but also increase the latency of response. More seriously, the cloud-based centralized management mode is vulnerable to cyber-attacks, which usually leads to privacy leakage. However, previous studies seldom focus on the privacy issue of the charging system for EVs. In this article, a decentralized and privacy-preserving charging scheme for EVs is proposed, which is based on blockchain and fog computing. In this scheme, fog computing is introduced to provide local computing with low latency. Specifically, a fog computing network, which is composed of fog computing nodes (FCNs), is used to provide localized services. Besides, a flexible consortium blockchain architecture is proposed. The blockchain system is deployed on the distributed FCNs, providing a decentralized and secure storage environment. By combining mutual authentication, smart contract, and blockchain-based storage, the security of privacy in the charging process can be ensured. The theoretical analysis and experiments demonstrate the advantages of the proposed scheme.
Article
Data sharing and privacy securing present extensive opportunities and challenges in vehicular network. This paper introduces 'trust access authentication scheme' as a mechanism to achieve real-time monitoring and promote collaborative sharing for vehicles. Blockchain, which can provide secure authentication and protected privacy, is a crucial technology. However, traditional cloud computing performs poorly in supplying low-latency and fast-response services for moving vehicles. In this situation, edge computing enabled Blockchain network appeals to be a promising method, where moving vehicles can access storage or computing resource and get authenticated from Blockchain edge nodes directly. In this paper, a hierarchical architecture is proposed consist of vehicular network layer, Blockchain edge layer and Block-chain network layer. Through a authentication mechanism adopting digital signature algorithm, it achieves trusted authentication and ensures valid verification. Moreover, a caching scheme based on many-to-many matching is proposed to minimize average delivery delay of vehicles. Simulation results prove that the proposed caching scheme has a better performance than existing schemes based on centralized model or edge caching strategy in terms of hit ratio and average delay.
Article
Ethereum started the blockchain-based smart contract technology that due to its scalability more and more decentralized applications are now based on. On the downside this has led to the exposure of more and more security issues and challenges, which has gained widespread attention in terms of research in the field of Ethereum smart contract vulnerabilities in both academia and industry. This article presents a survey of the Ethereum smart contract's various vulnerabilities and the corresponding defense mechanisms that have been applied to combat them. In particular, we focus on the random number vulnerability in the Fomo3d-like game contracts, as well as that attack and defense methods applied. Finally, we summarize the existing Ethereum smart contract security audit methods and compare several mainstream audit tools from various perspectives.
Article
In the Internet of Vehicles (IoV), vehicles communicate wirelessly with other vehicles, sensors, pedestrians, and roadside units. IoV is aimed at improving road safety, driving comfort, and traffic efficiency. However, IoV is exposed to a range of threats to security and privacy. The presence of dishonest and misbehaving peers in the system is of a major concern, which may put lives in danger. Thus, establishing trust among these probable untrusted vehicles is one of the most significant challenges of such a network. The critical pitfalls of existing and traditional mechanisms are scalability, a single point of failure, maintaining the quality of service, verification, and revocation and dealing with sparsity, consistency, availability, efficiency, robustness, privacy concerns are some of the biggest challenges to be addressed. Blockchain technology, with its great success in applications like cryptocurrencies and smart contracts, is considered as one of the potential candidates to build trust in IoV. In this paper, we propose a blockchain-based decentralized trust management scheme using smart contracts. Specifically, we introduce the concept of blockchain sharding for reducing the load on the main blockchain and increasing the transaction throughput. Our proposal has two key contributions: blockchain to maintain and update reliable and consistent trust values across the network and incentive scheme to encourage peers to perform well. We also conduct extensive experiments, which demonstrate the implementation feasibility of proposed mechanisms in the real world.