169 research outputs found

    Enabling Seamless Data Security, Consensus, and Trading in Vehicular Networks

    Full text link
    Cooperative driving is an emerging paradigm to enhance the safety and efficiency of autonomous vehicles. To ensure successful cooperation, road users must reach a consensus for making collective decisions, while recording vehicular data to analyze and address failures related to such agreements. This data has the potential to provide valuable insights into various vehicular events, while also potentially improving accountability measures. Furthermore, vehicles may benefit from the ability to negotiate and trade services among themselves, adding value to the cooperative driving framework. However, the majority of proposed systems aiming to ensure data security, consensus, or service trading, lack efficient and thoroughly validated mechanisms that consider the distinctive characteristics of vehicular networks. These limitations are amplified by a dependency on the centralized support provided by the infrastructure. Furthermore, corresponding mechanisms must diligently address security concerns, especially regarding potential malicious or misbehaving nodes, while also considering inherent constraints of the wireless medium. We introduce the Verifiable Event Extension (VEE), an applicational extension designed for Intelligent Transportation System (ITS) messages. The VEE operates seamlessly with any existing standardized vehicular communications protocol, addressing crucial aspects of data security, consensus, and trading with minimal overhead. To achieve this, we employ blockchain techniques, Byzantine fault tolerance (BFT) consensus protocols, and cryptocurrency-based mechanics. To assess our proposal's feasibility and lightweight nature, we employed a hardware-in-the-loop setup for analysis. Experimental results demonstrate the viability and efficiency of the VEE extension in overcoming the challenges posed by the distributed and opportunistic nature of wireless vehicular communications

    APPLYING COLLABORATIVE ONLINE ACTIVE LEARNING IN VEHICULAR NETWORKS FOR FUTURE CONNECTED AND AUTONOMOUS VEHICLES

    Get PDF
    The main objective of this thesis is to provide a framework for, and proof of concept of, collaborative online active learning in vehicular networks. Another objective is to advance the state of the art in simulation-based evaluation and validation of connected intelligent vehicle applications. With advancements in machine learning and artificial intelligence, connected autonomous vehicles (CAVs) have begun to migrate from laboratory development and testing conditions to driving on public roads. Their deployment in our environmental landscape offers potential for decreases in road accidents and traffic congestion, as well as improved mobility in overcrowded cities. Although common driving scenarios can be relatively easily solved with classic perception, path planning, and motion control methods, the remaining unsolved scenarios are corner cases in which traditional methods fail. These unsolved cases are the keys to deploying CAVs safely on the road, but they require an enormous amount of data collection and high-quality human annotation, which are very cost-ineffective considering the ever-changing real-world scenarios and highly diverse road/weather conditions. Additionally, evaluating and testing applications for CAVs in real testbeds are extremely expensive, as obvious failures like crashes tend to be rare events and can hardly be captured through predefined test scenarios. Therefore, realistic simulation tools with the benefit of lower cost as well as generating reproducible experiment results are needed to complement the real testbeds in validating applications for CAVs. Therefore, in this thesis, we address the challenges therein and establish the fundamentals of the collaborative online active learning framework in vehicular network for future connected and autonomous vehicles.Ph.D

    Proof of Travel for Trust-Based Data Validation in V2I Communication Part I: Methodology

    Full text link
    Previous work on misbehavior detection and trust management for Vehicle-to-Everything (V2X) communication can identify falsified and malicious messages, enabling witness vehicles to report observations about high-criticality traffic events. However, there may not exist enough "benign" vehicles with V2X connectivity or vehicle owners who are willing to opt-in in the early stages of connected-vehicle deployment. In this paper, we propose a security protocol for the communication between vehicles and infrastructure, titled Proof-of-Travel (POT), to answer the research question: How can we transform the power of cryptography techniques embedded within the protocol into social and economic mechanisms to simultaneously incentivize Vehicle-to-Infrastructure (V2I) data sharing activities and validate the data? The key idea is to determine the reputation of and the contribution made by a vehicle based on its distance traveled and the information it shared through V2I channels. In particular, the total vehicle miles traveled for a vehicle must be testified by digital signatures signed by each infrastructure component along the path of its movement. While building a chain of proofs of spatial movement creates burdens for malicious vehicles, acquiring proofs does not result in extra cost for normal vehicles, which naturally want to move from the origin to the destination. The proof of travel for a vehicle can then be used to determine the contribution and reward by its altruistic behaviors. We propose short-term and long-term incentive designs based on the POT protocol and evaluate their security and performance through theoretical analysis and simulations

    Secure Harmonized Speed Under Byzantine Faults for Autonomous Vehicle Platoons Using Blockchain Technology

    Get PDF
    Autonomous Vehicle (AV) platooning holds the promise of safer and more efficient road transportation. By coordinating the movements of a group of vehicles, platooning offers benefits such as reduced energy consumption, lower emissions, and improved traffic flow. However, the realization of these advantages hinges on the ability of platooning vehicles to reach a consensus and maintain secure, cooperative behavior. Byzantine behavior [1,2], characterized by vehicles transmitting incorrect or conflicting information, threatens the integrity of platoon coordination. Vehicles within the platoon share vital data such as position, speed, and other relevant information to optimize their operation, ensuring safe and efficient driving. However, Byzantine behavior in AV platoons presents a critical challenge by disrupting coordinated operations. Consequently, the malicious transmission of conflicting information can lead to safety compromises, traffic disruptions, energy inefficiency, loss of trust, chain reactions of faults, and legal complexities [3,4]. In this light, this thesis delves into the challenges posed by Byzantine behavior within platoons and presents a robust solution using ConsenCar; a blockchain-based protocol for AV platoons which aims to address Byzantine faults in order to maintain reliable and secure platoon operations. Recognizing the complex obstacles presented by Byzantine faults in these critical real-time systems, this research exploits the potential of blockchain technology to establish Byzantine Fault Tolerance (BFT) through Vehicle-to-Vehicle (V2V) communications over a Vehicular Ad hoc NETwork (VANET). The operational procedure of ConsenCar involves several stages, including proposal validation, decision-making, and eliminating faulty vehicles. In instances such as speed harmonization, the decentralized network framework enables vehicles to exchange messages to ultimately agree on a harmonized speed that maximizes safety and efficiency. Notably, ConsenCar is designed to detect and isolate vehicles displaying Byzantine behavior, ensuring that their actions do not compromise the integrity of decision-making. Consequently, ConsenCar results in a robust assurance that all non-faulty vehicles converge on unanimous decisions. By testing ConsenCar on the speed harmonization operation, simulation results indicate that under the presence of Byzantine behavior, the protocol successfully detects and eliminates faulty vehicles, provided that more than two-thirds of the vehicles are non-faulty. This allows non-faulty vehicles to achieve secure harmonized speed and maintain safe platoon operations. As such, the protocol generalizes to secure other platooning operations, including splitting and merging, intersection negotiation, lane-changing, and others. The implications of this research are significant for the future of AV platooning, as it establishes BFT to enhance the safety, efficiency, and reliability of AV transportation, therefore paving the way for improved security and cooperative road ecosystems

    What is a Blockchain? A Definition to Clarify the Role of the Blockchain in the Internet of Things

    Get PDF
    The use of the term blockchain is documented for disparate projects, from cryptocurrencies to applications for the Internet of Things (IoT), and many more. The concept of blockchain appears therefore blurred, as it is hard to believe that the same technology can empower applications that have extremely different requirements and exhibit dissimilar performance and security. This position paper elaborates on the theory of distributed systems to advance a clear definition of blockchain that allows us to clarify its role in the IoT. This definition inextricably binds together three elements that, as a whole, provide the blockchain with those unique features that distinguish it from other distributed ledger technologies: immutability, transparency and anonimity. We note however that immutability comes at the expense of remarkable resource consumption, transparency demands no confidentiality and anonymity prevents user identification and registration. This is in stark contrast to the requirements of most IoT applications that are made up of resource constrained devices, whose data need to be kept confidential and users to be clearly known. Building on the proposed definition, we derive new guidelines for selecting the proper distributed ledger technology depending on application requirements and trust models, identifying common pitfalls leading to improper applications of the blockchain. We finally indicate a feasible role of the blockchain for the IoT: myriads of local, IoT transactions can be aggregated off-chain and then be successfully recorded on an external blockchain as a means of public accountability when required

    Proof of Kernel Work: a democratic low-energy consensus for distributed access-control protocols

    Get PDF
    We adjust the Proof of Work (PoW) consensus mechanism used in Bitcoin and Ethereum so that we can build on its strength while also addressing, in part, some of its perceived weaknesses. Notably, our work is motivated by the high energy consumption for mining PoW, and we want to restrict the use of PoW to a configurable, expected size of nodes, as a function of the local blockchain state. The approach we develop for this rests on three pillars: (i) Proof of Kernel Work (PoKW), a means of dynamically reducing the set of nodes that can participate in the solving of PoW puzzles such that an adversary cannot increase his attack surface because of such a reduction; (ii) Practical Adaptation of Existing Technology, a realization of this PoW reduction through an adaptation of existing blockchain and enterprise technology stacks; and (iii) Machine Learning for Adaptive System Resiliency, the use of techniques from artificial intelligence to make our approach adaptive to system, network and attack dynamics. We develop here, in detail, the first pillar and illustrate the second pillar through a real use case, a pilot project done with Porsche on controlling permissions to vehicle and data log accesses. We also discuss pertinent attack vectors for PoKW consensus and their mitigation. Moreover, we sketch how our approach may lead to more democratic PoKW-based blockchain systems for public networks that may inherit the resilience of blockchains based on PoW

    Rethinking blockchains in the Internet of Things era from a wireless communication perspective

    Get PDF
    Due to the rapid development of the internet of Things (ioT), a massive number of devices are connected to the internet. For these distributed devices in ioT networks, how to ensure their security and privacy becomes a significant challenge. Blockchain technology provides a promising solution to protect the data integrity, provenance, privacy, and consistency for ioT networks. in blockchains, communication is a prerequisite for participants, which are distributed in the system, to reach consensus. However, in ioT networks, most of the devices communicate through wireless links, which are not always reliable. Hence, the communication reliability of ioT devices influences the system security. in this article, we rethink the roles of communication and computing in blockchains by accounting for communication reliability. We analyze the trade-off between communication reliability and computing power in blockchain security, and present a lower bound to the computing power that is needed to conduct an attack with a given communication reliability. Simulation results show that adversarial nodes can succeed in tampering with a block with less computing power by hindering the propagation of blocks from other nodes
    corecore