529 research outputs found
A Review of Research on Privacy Protection of Internet of Vehicles Based on Blockchain
Numerous academic and industrial fields, such as healthcare, banking, and supply chain management, are rapidly adopting and relying on blockchain technology. It has also been suggested for application in the internet of vehicles (IoV) ecosystem as a way to improve service availability and reliability. Blockchain offers decentralized, distributed and tamper-proof solutions that bring innovation to data sharing and management, but do not themselves protect privacy and data confidentiality. Therefore, solutions using blockchain technology must take user privacy concerns into account. This article reviews the proposed solutions that use blockchain technology to provide different vehicle services while overcoming the privacy leakage problem which inherently exists in blockchain and vehicle services. We analyze the key features and attributes of prior schemes and identify their contributions to provide a comprehensive and critical overview. In addition, we highlight prospective future research topics and present research problems
On M2M Micropayments : A Case Study of Electric Autonomous Vehicles
The proliferation of electric vehicles has spurred the research interest in
technologies associated with it, for instance, batteries, and charging
mechanisms. Moreover, the recent advancements in autonomous cars also encourage
the enabling technologies to integrate and provide holistic applications. To
this end, one key requirement for electric vehicles is to have an efficient,
secure, and scalable infrastructure and framework for charging, billing, and
auditing. However, the current manual charging systems for EVs may not be
applicable to the autonomous cars that demand new, automatic, secure,
efficient, and scalable billing and auditing mechanism. Owing to the
distributed systems such as blockchain technology, in this paper, we propose a
new charging and billing mechanism for electric vehicles that charge their
batteries in a charging-on-the-move fashion. To meet the requirements of
billing in electric vehicles, we leverage distributed ledger technology (DLT),
a distributed peer-to-peer technology for micro-transactions. Our
proof-of-concept implementation of the billing framework demonstrates the
feasibility of such system in electric vehicles. It is also worth noting that
the solution can easily be extended to the electric autonomous cars (EACs)
Secure Authentication Mechanism for Cluster based Vehicular Adhoc Network (VANET): A Survey
Vehicular Ad Hoc Networks (VANETs) play a crucial role in Intelligent
Transportation Systems (ITS) by facilitating communication between vehicles and
infrastructure. This communication aims to enhance road safety, improve traffic
efficiency, and enhance passenger comfort. The secure and reliable exchange of
information is paramount to ensure the integrity and confidentiality of data,
while the authentication of vehicles and messages is essential to prevent
unauthorized access and malicious activities. This survey paper presents a
comprehensive analysis of existing authentication mechanisms proposed for
cluster-based VANETs. The strengths, weaknesses, and suitability of these
mechanisms for various scenarios are carefully examined. Additionally, the
integration of secure key management techniques is discussed to enhance the
overall authentication process. Cluster-based VANETs are formed by dividing the
network into smaller groups or clusters, with designated cluster heads
comprising one or more vehicles. Furthermore, this paper identifies gaps in the
existing literature through an exploration of previous surveys. Several schemes
based on different methods are critically evaluated, considering factors such
as throughput, detection rate, security, packet delivery ratio, and end-to-end
delay. To provide optimal solutions for authentication in cluster-based VANETs,
this paper highlights AI- and ML-based routing-based schemes. These approaches
leverage artificial intelligence and machine learning techniques to enhance
authentication within the cluster-based VANET network. Finally, this paper
explores the open research challenges that exist in the realm of authentication
for cluster-based Vehicular Adhoc Networks, shedding light on areas that
require further investigation and development
Blockchain Application on the Internet of Vehicles (IoV)
With the rapid development of the Internet of Things (IoT) and its potential
integration with the traditional Vehicular Ad-Hoc Networks (VANETs), we have
witnessed the emergence of the Internet of Vehicles (IoV), which promises to
seamlessly integrate into smart transportation systems. However, the key
characteristics of IoV, such as high-speed mobility and frequent disconnections
make it difficult to manage its security and privacy. The Blockchain, as a
distributed tamper-resistant ledge, has been proposed as an innovative solution
that guarantees privacy-preserving yet secure schemes. In this paper, we review
recent literature on the application of blockchain to IoV, in particular, and
intelligent transportation systems in general
Quantum Cyber-Attack on Blockchain-based VANET
Blockchain-based Vehicular Ad-hoc Network (VANET) is widely considered as
secure communication architecture for a connected transportation system. With
the advent of quantum computing, there are concerns regarding the vulnerability
of this architecture against cyber-attacks. In this study, a potential threat
is investigated in a blockchain-based VANET, and a corresponding quantum
cyber-attack is developed. Specifically, a quantum impersonation attack using
Quantum-Shor algorithm is developed to break the Rivest-Shamir-Adleman (RSA)
encrypted digital signatures of VANET and thus create a threat for the
trust-based blockchain scheme of VANET. A blockchain-based VANET,
vehicle-to-everything (V2X) communication, and vehicular mobility are simulated
using OMNET++, the extended INET library, and vehicles-in-network simulation
(VEINS) along with simulation of urban mobility (SUMO), respectively. A small
key RSA based message encryption is implemented using IBM Qiskit, which is an
open-source quantum software development kit. The findings reveal that the
quantum cyber-attack, example, impersonation attack is able to successfully
break the trust chain of a blockchain-based VANET. This highlights the need for
a quantum secured blockchain.Comment: This paper consists of 10 pages with 7 figures. It has been submitted
to IEEE Internet of Things Journa
An overview of VANET vehicular networks
Today, with the development of intercity and metropolitan roadways and with
various cars moving in various directions, there is a greater need than ever
for a network to coordinate commutes. Nowadays, people spend a lot of time in
their vehicles. Smart automobiles have developed to make that time safer, more
effective, more fun, pollution-free, and affordable. However, maintaining the
optimum use of resources and addressing rising needs continues to be a
challenge given the popularity of vehicle users and the growing diversity of
requests for various services. As a result, VANET will require modernized
working practices in the future. Modern intelligent transportation management
and driver assistance systems are created using cutting-edge communication
technology. Vehicular Ad-hoc networks promise to increase transportation
effectiveness, accident prevention, and pedestrian comfort by allowing
automobiles and road infrastructure to communicate entertainment and traffic
information. By constructing thorough frameworks, workflow patterns, and update
procedures, including block-chain, artificial intelligence, and SDN (Software
Defined Networking), this paper addresses VANET-related technologies, future
advances, and related challenges. An overview of the VANET upgrade solution is
given in this document in order to handle potential future problems
Reputation-based Miner Node Selection in Blockchain-based Vehicular Networks
The 21st century has brought many technological revolutions in transportation systems, data security, and network security, among many other technology elements. With the rise of smart cities, transportation systems are also being intelligent. An intelligent transportation system requires proper vehicle network infrastructure, data security, and intelligent decision-making capacity. Similarly, the networking for such systems can be provided by vehicular edge computing or vehicular ad-hoc network, which provides a required architecture for the communication between vehicles. The data transferred in such networks can be subjected to various attacks, such as false data injection attacks. To secure the system against such attacks, we need a secure architecture that guarantees the data security being transferred and stored in the system. Blockchain technology has the potential to provide such features.
However, blockchain technology has vulnerabilities, such as majority attacks where the malicious actor/s control most miner nodes' mining power. To prevent the malicious actor/s from controlling the blockchain, we need a mechanism to identify and remove the malicious node from the consensus process. Such attacks can be countered if we can select the nodes allowed to take part in the consensus process, which can be done with the help of the miner node selection mechanism devised to select only specific miner nodes from all the available pool of nodes for the consensus process.
In this study, we have proposed reputation-based miner node selection, where we have used an artificial neural network to calculate the reputation value of each miner node. Additionally, the vehicular network's purpose is to communicate with other entities in the network and interchange event information. This study proposed a novel accident event detection and validation method for our blockchain-based system. This study successfully implemented the proposed reputation-based miner node selection in Hyperledger Fabric and the accident event detection and validation in the blockchain network. We have obtained an accuracy of 77.56\% and a false positive rate of 2.76\% in our reputation model. Similarly, the implementation of reputation-based miner node selection in Hyperledger fabric yielded a throughput of approximately 125 ms per transaction. Additionally, the novel accident event detection and validation method required a validation time of 22 ms for a system with 5 nodes and increased proportionally with the number of nodes as expected. Thus, the study's result supported our proposed architecture and methodology to remove malicious nodes from the consensus process using reputation-based miner node selection and provided support for this system's real-time applicability and the novel accident event detection and validation system
Performance Analysis of Blockchain-Enabled Security and Privacy Algorithms in Connected and Autonomous Vehicles: A Comprehensive Review
Strategic investment(s) in vehicle automation technologies led to the rapid development of technology that revolutionised transport services and reduced fatalities on a scale never seen before. Technological advancements and their integration in Connected Autonomous Vehicles (CAVs) increased uptake and adoption and pushed firmly for the development of highly supportive legal and regulatory and testing environments. However, systemic threats to the security and privacy of technologies and lack of data transparency have created a dynamic threat landscape within which the establishment and verification of security and privacy requirements proved to be an arduous task. In CAVs security and privacy issues can affect the resilience of these systems and hinder the safety of the passengers. Existing research efforts have been placed to investigate the security issues in CAVs and propose solutions across the whole spectrum of cyber resilience. This paper examines the state-of-the-art in security and privacy solutions for CAVs. It investigates their integration challenges, drawbacks and efficiencies when coupled with distributed technologies such as Blockchain. It has also listed different cyber-attacks being investigated while designing security and privacy mechanism for CAVs
Cyber security analysis of connected vehicles
\ua9 2024 The Authors. IET Intelligent Transport Systems published by John Wiley & Sons Ltd on behalf of The Institution of Engineering and Technology.The sensor-enabled in-vehicle communication and infrastructure-centric vehicle-to-everything (V2X) communications have significantly contributed to the spark in the amount of data exchange in the connected and autonomous vehicles (CAV) environment. The growing vehicular communications pose a potential cyber security risk considering online vehicle hijacking. Therefore, there is a critical need to prioritize the cyber security issues in the CAV research theme. In this context, this paper presents a cyber security analysis of connected vehicle traffic environments (CyACV). Specifically, potential cyber security attacks in CAV are critically investigated and validated via experimental data sets. Trust in V2X communication for connected vehicles is explored in detail focusing on trust computation and trust management approaches and related challenges. A wide range of trust-based cyber security solutions for CAV have been critically investigated considering their strengths and weaknesses. Open research directions have been highlighted as potential new research themes in CAV cyber security area
- …