529 research outputs found

    A Review of Research on Privacy Protection of Internet of Vehicles Based on Blockchain

    Get PDF
    Numerous academic and industrial fields, such as healthcare, banking, and supply chain management, are rapidly adopting and relying on blockchain technology. It has also been suggested for application in the internet of vehicles (IoV) ecosystem as a way to improve service availability and reliability. Blockchain offers decentralized, distributed and tamper-proof solutions that bring innovation to data sharing and management, but do not themselves protect privacy and data confidentiality. Therefore, solutions using blockchain technology must take user privacy concerns into account. This article reviews the proposed solutions that use blockchain technology to provide different vehicle services while overcoming the privacy leakage problem which inherently exists in blockchain and vehicle services. We analyze the key features and attributes of prior schemes and identify their contributions to provide a comprehensive and critical overview. In addition, we highlight prospective future research topics and present research problems

    On M2M Micropayments : A Case Study of Electric Autonomous Vehicles

    Get PDF
    The proliferation of electric vehicles has spurred the research interest in technologies associated with it, for instance, batteries, and charging mechanisms. Moreover, the recent advancements in autonomous cars also encourage the enabling technologies to integrate and provide holistic applications. To this end, one key requirement for electric vehicles is to have an efficient, secure, and scalable infrastructure and framework for charging, billing, and auditing. However, the current manual charging systems for EVs may not be applicable to the autonomous cars that demand new, automatic, secure, efficient, and scalable billing and auditing mechanism. Owing to the distributed systems such as blockchain technology, in this paper, we propose a new charging and billing mechanism for electric vehicles that charge their batteries in a charging-on-the-move fashion. To meet the requirements of billing in electric vehicles, we leverage distributed ledger technology (DLT), a distributed peer-to-peer technology for micro-transactions. Our proof-of-concept implementation of the billing framework demonstrates the feasibility of such system in electric vehicles. It is also worth noting that the solution can easily be extended to the electric autonomous cars (EACs)

    Secure Authentication Mechanism for Cluster based Vehicular Adhoc Network (VANET): A Survey

    Full text link
    Vehicular Ad Hoc Networks (VANETs) play a crucial role in Intelligent Transportation Systems (ITS) by facilitating communication between vehicles and infrastructure. This communication aims to enhance road safety, improve traffic efficiency, and enhance passenger comfort. The secure and reliable exchange of information is paramount to ensure the integrity and confidentiality of data, while the authentication of vehicles and messages is essential to prevent unauthorized access and malicious activities. This survey paper presents a comprehensive analysis of existing authentication mechanisms proposed for cluster-based VANETs. The strengths, weaknesses, and suitability of these mechanisms for various scenarios are carefully examined. Additionally, the integration of secure key management techniques is discussed to enhance the overall authentication process. Cluster-based VANETs are formed by dividing the network into smaller groups or clusters, with designated cluster heads comprising one or more vehicles. Furthermore, this paper identifies gaps in the existing literature through an exploration of previous surveys. Several schemes based on different methods are critically evaluated, considering factors such as throughput, detection rate, security, packet delivery ratio, and end-to-end delay. To provide optimal solutions for authentication in cluster-based VANETs, this paper highlights AI- and ML-based routing-based schemes. These approaches leverage artificial intelligence and machine learning techniques to enhance authentication within the cluster-based VANET network. Finally, this paper explores the open research challenges that exist in the realm of authentication for cluster-based Vehicular Adhoc Networks, shedding light on areas that require further investigation and development

    Blockchain Application on the Internet of Vehicles (IoV)

    Full text link
    With the rapid development of the Internet of Things (IoT) and its potential integration with the traditional Vehicular Ad-Hoc Networks (VANETs), we have witnessed the emergence of the Internet of Vehicles (IoV), which promises to seamlessly integrate into smart transportation systems. However, the key characteristics of IoV, such as high-speed mobility and frequent disconnections make it difficult to manage its security and privacy. The Blockchain, as a distributed tamper-resistant ledge, has been proposed as an innovative solution that guarantees privacy-preserving yet secure schemes. In this paper, we review recent literature on the application of blockchain to IoV, in particular, and intelligent transportation systems in general

    Quantum Cyber-Attack on Blockchain-based VANET

    Full text link
    Blockchain-based Vehicular Ad-hoc Network (VANET) is widely considered as secure communication architecture for a connected transportation system. With the advent of quantum computing, there are concerns regarding the vulnerability of this architecture against cyber-attacks. In this study, a potential threat is investigated in a blockchain-based VANET, and a corresponding quantum cyber-attack is developed. Specifically, a quantum impersonation attack using Quantum-Shor algorithm is developed to break the Rivest-Shamir-Adleman (RSA) encrypted digital signatures of VANET and thus create a threat for the trust-based blockchain scheme of VANET. A blockchain-based VANET, vehicle-to-everything (V2X) communication, and vehicular mobility are simulated using OMNET++, the extended INET library, and vehicles-in-network simulation (VEINS) along with simulation of urban mobility (SUMO), respectively. A small key RSA based message encryption is implemented using IBM Qiskit, which is an open-source quantum software development kit. The findings reveal that the quantum cyber-attack, example, impersonation attack is able to successfully break the trust chain of a blockchain-based VANET. This highlights the need for a quantum secured blockchain.Comment: This paper consists of 10 pages with 7 figures. It has been submitted to IEEE Internet of Things Journa

    An overview of VANET vehicular networks

    Full text link
    Today, with the development of intercity and metropolitan roadways and with various cars moving in various directions, there is a greater need than ever for a network to coordinate commutes. Nowadays, people spend a lot of time in their vehicles. Smart automobiles have developed to make that time safer, more effective, more fun, pollution-free, and affordable. However, maintaining the optimum use of resources and addressing rising needs continues to be a challenge given the popularity of vehicle users and the growing diversity of requests for various services. As a result, VANET will require modernized working practices in the future. Modern intelligent transportation management and driver assistance systems are created using cutting-edge communication technology. Vehicular Ad-hoc networks promise to increase transportation effectiveness, accident prevention, and pedestrian comfort by allowing automobiles and road infrastructure to communicate entertainment and traffic information. By constructing thorough frameworks, workflow patterns, and update procedures, including block-chain, artificial intelligence, and SDN (Software Defined Networking), this paper addresses VANET-related technologies, future advances, and related challenges. An overview of the VANET upgrade solution is given in this document in order to handle potential future problems

    Reputation-based Miner Node Selection in Blockchain-based Vehicular Networks

    Get PDF
    The 21st century has brought many technological revolutions in transportation systems, data security, and network security, among many other technology elements. With the rise of smart cities, transportation systems are also being intelligent. An intelligent transportation system requires proper vehicle network infrastructure, data security, and intelligent decision-making capacity. Similarly, the networking for such systems can be provided by vehicular edge computing or vehicular ad-hoc network, which provides a required architecture for the communication between vehicles. The data transferred in such networks can be subjected to various attacks, such as false data injection attacks. To secure the system against such attacks, we need a secure architecture that guarantees the data security being transferred and stored in the system. Blockchain technology has the potential to provide such features. However, blockchain technology has vulnerabilities, such as majority attacks where the malicious actor/s control most miner nodes' mining power. To prevent the malicious actor/s from controlling the blockchain, we need a mechanism to identify and remove the malicious node from the consensus process. Such attacks can be countered if we can select the nodes allowed to take part in the consensus process, which can be done with the help of the miner node selection mechanism devised to select only specific miner nodes from all the available pool of nodes for the consensus process. In this study, we have proposed reputation-based miner node selection, where we have used an artificial neural network to calculate the reputation value of each miner node. Additionally, the vehicular network's purpose is to communicate with other entities in the network and interchange event information. This study proposed a novel accident event detection and validation method for our blockchain-based system. This study successfully implemented the proposed reputation-based miner node selection in Hyperledger Fabric and the accident event detection and validation in the blockchain network. We have obtained an accuracy of 77.56\% and a false positive rate of 2.76\% in our reputation model. Similarly, the implementation of reputation-based miner node selection in Hyperledger fabric yielded a throughput of approximately 125 ms per transaction. Additionally, the novel accident event detection and validation method required a validation time of 22 ms for a system with 5 nodes and increased proportionally with the number of nodes as expected. Thus, the study's result supported our proposed architecture and methodology to remove malicious nodes from the consensus process using reputation-based miner node selection and provided support for this system's real-time applicability and the novel accident event detection and validation system

    Performance Analysis of Blockchain-Enabled Security and Privacy Algorithms in Connected and Autonomous Vehicles: A Comprehensive Review

    Get PDF
    Strategic investment(s) in vehicle automation technologies led to the rapid development of technology that revolutionised transport services and reduced fatalities on a scale never seen before. Technological advancements and their integration in Connected Autonomous Vehicles (CAVs) increased uptake and adoption and pushed firmly for the development of highly supportive legal and regulatory and testing environments. However, systemic threats to the security and privacy of technologies and lack of data transparency have created a dynamic threat landscape within which the establishment and verification of security and privacy requirements proved to be an arduous task. In CAVs security and privacy issues can affect the resilience of these systems and hinder the safety of the passengers. Existing research efforts have been placed to investigate the security issues in CAVs and propose solutions across the whole spectrum of cyber resilience. This paper examines the state-of-the-art in security and privacy solutions for CAVs. It investigates their integration challenges, drawbacks and efficiencies when coupled with distributed technologies such as Blockchain. It has also listed different cyber-attacks being investigated while designing security and privacy mechanism for CAVs

    Cyber security analysis of connected vehicles

    Get PDF
    \ua9 2024 The Authors. IET Intelligent Transport Systems published by John Wiley & Sons Ltd on behalf of The Institution of Engineering and Technology.The sensor-enabled in-vehicle communication and infrastructure-centric vehicle-to-everything (V2X) communications have significantly contributed to the spark in the amount of data exchange in the connected and autonomous vehicles (CAV) environment. The growing vehicular communications pose a potential cyber security risk considering online vehicle hijacking. Therefore, there is a critical need to prioritize the cyber security issues in the CAV research theme. In this context, this paper presents a cyber security analysis of connected vehicle traffic environments (CyACV). Specifically, potential cyber security attacks in CAV are critically investigated and validated via experimental data sets. Trust in V2X communication for connected vehicles is explored in detail focusing on trust computation and trust management approaches and related challenges. A wide range of trust-based cyber security solutions for CAV have been critically investigated considering their strengths and weaknesses. Open research directions have been highlighted as potential new research themes in CAV cyber security area
    corecore