169 research outputs found
Enabling Seamless Data Security, Consensus, and Trading in Vehicular Networks
Cooperative driving is an emerging paradigm to enhance the safety and
efficiency of autonomous vehicles. To ensure successful cooperation, road users
must reach a consensus for making collective decisions, while recording
vehicular data to analyze and address failures related to such agreements. This
data has the potential to provide valuable insights into various vehicular
events, while also potentially improving accountability measures. Furthermore,
vehicles may benefit from the ability to negotiate and trade services among
themselves, adding value to the cooperative driving framework. However, the
majority of proposed systems aiming to ensure data security, consensus, or
service trading, lack efficient and thoroughly validated mechanisms that
consider the distinctive characteristics of vehicular networks. These
limitations are amplified by a dependency on the centralized support provided
by the infrastructure. Furthermore, corresponding mechanisms must diligently
address security concerns, especially regarding potential malicious or
misbehaving nodes, while also considering inherent constraints of the wireless
medium. We introduce the Verifiable Event Extension (VEE), an applicational
extension designed for Intelligent Transportation System (ITS) messages. The
VEE operates seamlessly with any existing standardized vehicular communications
protocol, addressing crucial aspects of data security, consensus, and trading
with minimal overhead. To achieve this, we employ blockchain techniques,
Byzantine fault tolerance (BFT) consensus protocols, and cryptocurrency-based
mechanics. To assess our proposal's feasibility and lightweight nature, we
employed a hardware-in-the-loop setup for analysis. Experimental results
demonstrate the viability and efficiency of the VEE extension in overcoming the
challenges posed by the distributed and opportunistic nature of wireless
vehicular communications
APPLYING COLLABORATIVE ONLINE ACTIVE LEARNING IN VEHICULAR NETWORKS FOR FUTURE CONNECTED AND AUTONOMOUS VEHICLES
The main objective of this thesis is to provide a framework for, and proof of concept of, collaborative online active learning in vehicular networks. Another objective is to advance the state of the art in simulation-based evaluation and validation of connected intelligent vehicle applications. With advancements in machine learning and artificial intelligence, connected autonomous vehicles (CAVs) have begun to migrate from laboratory development and testing conditions to driving on public roads. Their deployment in our environmental landscape offers potential for decreases in road accidents and traffic congestion, as well as improved mobility in overcrowded cities. Although common driving scenarios can be relatively easily solved with classic perception, path planning, and motion control methods, the remaining unsolved scenarios are corner cases in which traditional methods fail. These unsolved cases are the keys to deploying CAVs safely on the road, but they require an enormous amount of data collection and high-quality human annotation, which are very cost-ineffective considering the ever-changing real-world scenarios and highly diverse road/weather conditions. Additionally, evaluating and testing applications for CAVs in real testbeds are extremely expensive, as obvious failures like crashes tend to be rare events and can hardly be captured through predefined test scenarios. Therefore, realistic simulation tools with the benefit of lower cost as well as generating reproducible experiment results are needed to complement the real testbeds in validating applications for CAVs. Therefore, in this thesis, we address the challenges therein and establish the fundamentals of the collaborative online active learning framework in vehicular network for future connected and autonomous vehicles.Ph.D
Proof of Travel for Trust-Based Data Validation in V2I Communication Part I: Methodology
Previous work on misbehavior detection and trust management for
Vehicle-to-Everything (V2X) communication can identify falsified and malicious
messages, enabling witness vehicles to report observations about
high-criticality traffic events. However, there may not exist enough "benign"
vehicles with V2X connectivity or vehicle owners who are willing to opt-in in
the early stages of connected-vehicle deployment. In this paper, we propose a
security protocol for the communication between vehicles and infrastructure,
titled Proof-of-Travel (POT), to answer the research question: How can we
transform the power of cryptography techniques embedded within the protocol
into social and economic mechanisms to simultaneously incentivize
Vehicle-to-Infrastructure (V2I) data sharing activities and validate the data?
The key idea is to determine the reputation of and the contribution made by a
vehicle based on its distance traveled and the information it shared through
V2I channels. In particular, the total vehicle miles traveled for a vehicle
must be testified by digital signatures signed by each infrastructure component
along the path of its movement. While building a chain of proofs of spatial
movement creates burdens for malicious vehicles, acquiring proofs does not
result in extra cost for normal vehicles, which naturally want to move from the
origin to the destination. The proof of travel for a vehicle can then be used
to determine the contribution and reward by its altruistic behaviors. We
propose short-term and long-term incentive designs based on the POT protocol
and evaluate their security and performance through theoretical analysis and
simulations
Secure Harmonized Speed Under Byzantine Faults for Autonomous Vehicle Platoons Using Blockchain Technology
Autonomous Vehicle (AV) platooning holds the promise of safer and more efficient road transportation. By coordinating the movements of a group of vehicles, platooning offers benefits such as reduced energy consumption, lower emissions, and improved traffic flow. However, the realization of these advantages hinges on the ability of platooning vehicles to reach a consensus and maintain secure, cooperative behavior.
Byzantine behavior [1,2], characterized by vehicles transmitting incorrect or conflicting information, threatens the integrity of platoon coordination. Vehicles within the platoon share vital data such as position, speed, and other relevant information to optimize their operation, ensuring safe and efficient driving. However, Byzantine behavior in AV platoons presents a critical challenge by disrupting coordinated operations. Consequently, the malicious transmission of conflicting information can lead to safety compromises, traffic disruptions, energy inefficiency, loss of trust, chain reactions of faults, and legal complexities [3,4].
In this light, this thesis delves into the challenges posed by Byzantine behavior within platoons and presents a robust solution using ConsenCar; a blockchain-based protocol for AV platoons which aims to address Byzantine faults in order to maintain reliable and secure platoon operations.
Recognizing the complex obstacles presented by Byzantine faults in these critical real-time systems, this research exploits the potential of blockchain technology to establish Byzantine Fault Tolerance (BFT) through Vehicle-to-Vehicle (V2V) communications over a Vehicular Ad hoc NETwork (VANET). The operational procedure of ConsenCar involves several stages, including proposal validation, decision-making, and eliminating faulty vehicles. In instances such as speed harmonization, the decentralized network framework enables vehicles to exchange messages to ultimately agree on a harmonized speed that
maximizes safety and efficiency. Notably, ConsenCar is designed to detect and isolate vehicles displaying Byzantine behavior, ensuring that their actions do not compromise the integrity of decision-making. Consequently, ConsenCar results in a robust assurance that all non-faulty vehicles converge on unanimous decisions.
By testing ConsenCar on the speed harmonization operation, simulation results indicate that under the presence of Byzantine behavior, the protocol successfully detects and eliminates faulty vehicles, provided that more than two-thirds of the vehicles are non-faulty. This allows non-faulty vehicles to achieve secure harmonized speed and maintain safe platoon operations. As such, the protocol generalizes to secure other platooning operations, including splitting and merging, intersection negotiation, lane-changing, and others. The implications of this research are significant for the future of AV platooning, as it establishes BFT to enhance the safety, efficiency, and reliability of AV transportation, therefore paving the way for improved security and cooperative road ecosystems
What is a Blockchain? A Definition to Clarify the Role of the Blockchain in the Internet of Things
The use of the term blockchain is documented for disparate projects, from cryptocurrencies to applications for the Internet of Things (IoT), and many more. The concept of blockchain appears therefore blurred, as it is hard to believe that the same technology can empower applications that have extremely different requirements and exhibit dissimilar performance and security. This position paper elaborates on the theory of distributed systems to advance a clear definition of blockchain that allows us to clarify its role in the IoT. This definition inextricably binds together three elements that, as a whole, provide the blockchain with those unique features that distinguish it from other distributed ledger technologies: immutability, transparency and anonimity. We note however that immutability comes at the expense of remarkable resource consumption, transparency demands no confidentiality and anonymity prevents user identification and registration. This is in stark contrast to the requirements of most IoT applications that are made up of resource constrained devices, whose data need to be kept confidential and users to be clearly known. Building on the proposed definition, we derive new guidelines for selecting the proper distributed ledger technology depending on application requirements and trust models, identifying common pitfalls leading to improper applications of the blockchain. We finally indicate a feasible role of the blockchain for the IoT: myriads of local, IoT transactions can be aggregated off-chain and then be successfully recorded on an external blockchain as a means of public accountability when required
Recommended from our members
Blockchain-empowered AI for 6G-enabled internet of vehicles
The 6G communication technologies are expected to provide fast data rates and incessant connectivity to heterogeneous networks, such as the Internet of Vehicles (IoV). However, the resulting unprecedented surge in data traffic, massive increase in the number of nodes with high mobility, and low-latency requirements give rise to serious security, privacy, and trust challenges. The blockchain could potentially ensure trust and security in IoV due to its features, including consensus for credibility and immutability for tamper proofing. In parallel, federated learning (FL) is a privacy-preserving artificial-intelligence paradigm that does not require to share data for model training in machine learning. It can reduce data traffic and resolve privacy challenges of intelligent IoV networks. The blockchain can also complement FL by ensuring the decentralization and securing distribution of incentives. This article reviews the trends and challenges of the blockchain and FL in 6G IoV networks. Then, the impact of their combination, challenges in implementation, and future research directions are highlighted. We also evaluate our proposal of blockchain-based FL to protect IoV security and privacy that utilizes smart contract and secure transactions of incentives via the blockchain to protect FL. Compared with other solutions, the failure rate of the proposed solution was at least 5% lower with 30% malicious nodes in the network
Recommended from our members
Blockchain based secure message dissemination in vehicular networks
Vehicular ad-hoc networks (VANETs) are one of the key elements in Intelligent Transportation System (ITS) to enable information exchange among vehicles and Roadside Units (RSUs) via vehicle-to-vehicle (V2V) and vehicle-to- nfrastructure (V2I) communications. With continuously increasing number of vehicles on road, there are numerous security and privacy challenges associated with VANETs. Communication among vehicles is needed to be secure and bandwidth efficient. Also, the messages exchanged between vehicles must be authentic so as to maintain a trusted network in a privacy-preserving manner. Furthermore, a sustainable economic model is required to incentivise honest and cooperative vehicles. Traditional security and privacy solutions in centralised networks are not applicable to VANETs due to its distributed nature, heterogeneity, high mobility and low latency requirements. Meanwhile, the new development of blockchain has been attracting significant interests due to its key features including consensus to evaluate message credibility and immutable storage in distributed ledger, which provides an alternative solution to the security and privacy challenges in VANETs.
This thesis aims to present blockchain solutions for the security and privacy of VANETs meeting the stringent requirements of low latency and bandwidth-efficient message dissemination. VANETs are simulated in OMNeT++ to validate the proposed solutions. Specifically, two novel blockchain consensus algorithms have been developed for message authentication and relay selection in presence of malicious vehicles. The first employs a voting based message validation and relay selection, which reduces the failure rate in message validation by 11% as compared to reputation based consensus. The second utilises federated learning supported by blockchain as a better privacy-preserving solution, which is 65.2% faster than the first voting based solution. Both approaches include blockchain-based incentive mechanisms and game theory analysis to observe strategic behaviour of honest and malicious vehicles. To further study the privacy aspect of vehicular networks, the integration of blockchain with physical layer security is also theoretically analysed in Vehicle-to-Everything (V2X) communications scenarios. The integration results in 8.2 Mbps increased goodput as compared to the blockchain solution alone.
In essence, our research work shows that blockchain can offer better control and security, as compared to centralised solutions, if properly adjusted according to the application and network requirements. Thus, the proposed solutions can provide guidelines for practically feasible application of blockchain in vehicular networks
Proof of Kernel Work: a democratic low-energy consensus for distributed access-control protocols
We adjust the Proof of Work (PoW) consensus mechanism used in Bitcoin and Ethereum so that we can build on its strength while also addressing, in part, some of its perceived weaknesses. Notably, our work is motivated by the high energy consumption for mining PoW, and we want to restrict the use of PoW to a configurable, expected size of nodes, as a function of the local blockchain state. The approach we develop for this rests on three pillars: (i) Proof of Kernel Work (PoKW), a means of dynamically reducing the set of nodes that can participate in the solving of PoW puzzles such that an adversary cannot increase his attack surface because of such a reduction; (ii) Practical Adaptation of Existing Technology, a realization of this PoW reduction through an adaptation of existing blockchain and enterprise technology stacks; and (iii) Machine Learning for Adaptive System Resiliency, the use of techniques from artificial intelligence to make our approach adaptive to system, network and attack dynamics. We develop here, in detail, the first pillar and illustrate the second pillar through a real use case, a pilot project done with Porsche on controlling permissions to vehicle and data log accesses. We also discuss pertinent attack vectors for PoKW consensus and their mitigation. Moreover, we sketch how our approach may lead to more democratic PoKW-based blockchain systems for public networks that may inherit the resilience of blockchains based on PoW
Rethinking blockchains in the Internet of Things era from a wireless communication perspective
Due to the rapid development of the internet of Things (ioT), a massive number of devices are connected to the internet. For these distributed devices in ioT networks, how to ensure their security and privacy becomes a significant challenge. Blockchain technology provides a promising solution to protect the data integrity, provenance, privacy, and consistency for ioT networks. in blockchains, communication is a prerequisite for participants, which are distributed in the system, to reach consensus. However, in ioT networks, most of the devices communicate through wireless links, which are not always reliable. Hence, the communication reliability of ioT devices influences the system security. in this article, we rethink the roles of communication and computing in blockchains by accounting for communication reliability. We analyze the trade-off between communication reliability and computing power in blockchain security, and present a lower bound to the computing power that is needed to conduct an attack with a given communication reliability. Simulation results show that adversarial nodes can succeed in tampering with a block with less computing power by hindering the propagation of blocks from other nodes
- …