309 research outputs found

    Empowering Communications in Vehicular Networkswith an Intelligent Blockchain-Based Solution

    Get PDF
    Blockchains have emerged over time as a reliable and secure way to record transactions in an immutable manner in a wide range of application domains. However, current related solutions are not yet capable of appropriately checking the authenticity of data when their volumes are huge. They are not also capable of updating Blockchain data blocks and synchronizing them within reasonable timeframes. This is the case within the specific context of Blockchain vehicular networks, where these solutions are commonly cumbersome when attempting to add new vehicles to the network. In order to address these problems, we propose in this paper a new Blockchain-based solution that intelligently implement selective communication and collaborative endorsement approaches to reduce communications between vehicles. Our solution represents the vehicles of the Blockchain as intelligent software agents with a Belief-Desire-Intention (BDI) architecture. Furthermore, we propose an approach based on multi-endorsement levels to exchange data of varying sensitive categories. This approach, which is based on endorsing scores, is also used to shorten the admission of new vehicles into the Blockchain. We run simulations using the Hyperledger Fabric Blockchain tool. Results show the efficiency of our solution in reducing the processing times of transactions within two different scenarios

    Counter Unmanned Aircraft Systems Technologies and Operations

    Get PDF
    As the quarter-century mark in the 21st Century nears, new aviation-related equipment has come to the forefront, both to help us and to haunt us. (Coutu, 2020) This is particularly the case with unmanned aerial vehicles (UAVs). These vehicles have grown in popularity and accessible to everyone. Of different shapes and sizes, they are widely available for purchase at relatively low prices. They have moved from the backyard recreation status to important tools for the military, intelligence agencies, and corporate organizations. New practical applications such as military equipment and weaponry are announced on a regular basis – globally. (Coutu, 2020) Every country seems to be announcing steps forward in this bludgeoning field. In our successful 2nd edition of Unmanned Aircraft Systems in the Cyber Domain: Protecting USA’s Advanced Air Assets (Nichols, et al., 2019), the authors addressed three factors influencing UAS phenomena. First, unmanned aircraft technology has seen an economic explosion in production, sales, testing, specialized designs, and friendly / hostile usages of deployed UAS / UAVs / Drones. There is a huge global growing market and entrepreneurs know it. Second, hostile use of UAS is on the forefront of DoD defense and offensive planners. They are especially concerned with SWARM behavior. Movies like “Angel has Fallen,” where drones in a SWARM use facial recognition technology to kill USSS agents protecting POTUS, have built the lore of UAS and brought the problem forefront to DHS. Third, UAS technology was exploding. UAS and Counter- UAS developments in navigation, weapons, surveillance, data transfer, fuel cells, stealth, weight distribution, tactics, GPS / GNSS elements, SCADA protections, privacy invasions, terrorist uses, specialized software, and security protocols has exploded. (Nichols, et al., 2019) Our team has followed / tracked joint ventures between military and corporate entities and specialized labs to build UAS countermeasures. As authors, we felt compelled to address at least the edge of some of the new C-UAS developments. It was clear that we would be lucky if we could cover a few of – the more interesting and priority technology updates – all in the UNCLASSIFIED and OPEN sphere. Counter Unmanned Aircraft Systems: Technologies and Operations is the companion textbook to our 2nd edition. The civilian market is interesting and entrepreneurial, but the military and intelligence markets are of concern because the US does NOT lead the pack in C-UAS technologies. China does. China continues to execute its UAS proliferation along the New Silk Road Sea / Land routes (NSRL). It has maintained a 7% growth in military spending each year to support its buildup. (Nichols, et al., 2019) [Chapter 21]. They continue to innovate and have recently improved a solution for UAS flight endurance issues with the development of advanced hydrogen fuel cell. (Nichols, et al., 2019) Reed and Trubetskoy presented a terrifying map of countries in the Middle East with armed drones and their manufacturing origin. Guess who? China. (A.B. Tabriski & Justin, 2018, December) Our C-UAS textbook has as its primary mission to educate and train resources who will enter the UAS / C-UAS field and trust it will act as a call to arms for military and DHS planners.https://newprairiepress.org/ebooks/1031/thumbnail.jp

    Distributed Anonymity Based on Blockchain in Vehicular Ad Hoc Network by Block Size Calibrating

    Get PDF
    The network connectivity problem is one of the critical challenges of an anonymous server implementation in the VANET. The objective and main contribution of this paper are to assure the anonymity in VANET environments. In the proposed blockchain method, before packaging transactions into blocks, anonymity risk reduced through techniques such as k-anonymity, graph processing, dummy node, and silence period. This paper addresses the challenges of anonymous servers, such as update challenges and single point of failure, by exploiting append-only, distributed, and anonymity features. Although mounting the blockchain process with asymmetric cryptography solves the connectivity challenge, start-up delay and network overhead are severe. The significant feature of the proposed method solves this delay challenge by aggregating many transactions into a block and fixing constraint range of multicasting blocks. Also, aggregating transactions of various end-users into a block preserves the path anonymity. The asymmetric cryptography with ring public and private keys protects the identity anonymity as well as unlinkability. The robust anonymity mechanism existence and the traceability of all transactions constitute the main advantages of the proposed method. The simulation is running by the python to evaluate blockchain performance in VANET with connectivity failure and rapidly changing topology. The results indicate the stabilization of the proposed method in the VANET environment

    A Privacy-Preservation Framework based on Biometrics Blockchain (BBC) to Prevent Attacks in VANET

    Get PDF
    In the near future, intelligent vehicles will be part of the Internet of Things (IoT) and will offer valuable services and opportunities that could revolutionise human life in smart cities. The Vehicular Ad-hoc Network (VANET) is the core structure of intelligent vehicles. It ensures the accuracy and security of communication in vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) modes to enhance road safety and decrease traffic congestion. However, VANET is subject to security vulnerabilities such as denial-of-service (DoS), replay attacks and Sybil attacks that may undermine the security and privacy of the network. Such issues may lead to the transmission of incorrect information from a malicious node to other nodes in the network. In this paper, we present a biometrics blockchain (BBC) framework to secure data sharing among vehicles in VANET and to retain statuary data in a conventional and trusted system. In the proposed framework, we take advantage of biometric information to keep a record of the genuine identity of the message sender, thus preserving privacy. Therefore, the proposed BBC scheme establishes security and trust between vehicles in VANET alongside the capacity to trace identities whenever required. Simulations in OMNeT++, veins and SUMO were carried out to demonstrate the viability of the proposed framework using the urban mobility model. The performance of the framework is evaluated in terms of packet delivery rate, packet loss rate and computational cost. The results show that our novel model is superior to existing approaches
    • …
    corecore