Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3357613.3357631acmotherconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
research-article

A secure priority vehicle movement based on blockchain technology in connected vehicles

Published: 12 September 2019 Publication History

Abstract

With the rapid advancement in internet connectivity, Connected Vehicle network is becoming a promising technology in the current years. However, the increased connectivity most often results in intensifying risk of cyber security threats. In this regard, the network of connected vehicle is also vulnerable to various cyber-attacks. This paper discussed the security issues with connected Priority Vehicle. A priority vehicle must ensure the high level of security otherwise, the results would be devastating and the consequences might be very serious. To ensure the safe and secure movement of connected priority vehicle on the road using blockchain technology. In our proposed system, the priority vehicle movement is controlled by blockchain network, and it only accept messages and signals from blockchain authorized nodes. In particular, the priority vehicle's location, speed and travel time are the important parameters that we secure using blockchain network. This paper also discusses the possible attacks on the priority vehicles and show how our solution can mitigate these attacks. Here it justifies the effectiveness and performance of our security solution using simulation and proves that the blockchain technology shows the potential application towards securing the information in the connected vehicle network.

References

[1]
G. Dimitrakopoulos and P. Demestichas, "Intelligent transportation systems," IEEE Vehicular Technology Magazine, vol. 5, no. 1, pp. 77--84, 2010.
[2]
R. Coppola and M. Morisio, "Connected car: technologies, issues, future trends," ACM Computing Surveys (CSUR), vol. 49, no. 3, p. 46, 2016.
[3]
G. Karagiannis, O. Altintas, E. Ekici, G. Heijenk, B. Jarupan, K. Lin, and T. Weil, "Vehicular networking: A survey and tutorial on requirements, architectures, challenges, standards and solutions," IEEE communications surveys & tutorials, vol. 13, no. 4, pp. 584--616, 2011.
[4]
S. A. A. Shah, E. Ahmed, M. Imran, and S. Zeadally, "5g for vehicular communications," IEEE Communications Magazine, vol. 56, no. 1, pp. 111--117, 2018.
[5]
S. Parkinson, P. Ward, K. Wilson, and J. Miller, "Cyber threats facing autonomous and connected vehicles: Future challenges," IEEE transactions on intelligent transportation systems, vol. 18, no. 11, pp. 2898--2915, 2017.
[6]
L. B. Othmane, H. Weffers, M. M. Mohamad, and M. Wolf, "A survey of security and privacy in connected vehicles," in Wireless sensor and mobile ad-hoc networks, pp. 217--247, Springer, 2015.
[7]
M. Behrisch, L. Bieker, J. Erdmann, and D. Krajzewicz, "Sumo-simulation of urban mobility: an overview," in Proceedings of SIMUL 2011, The Third International Conference on Advances in System Simulation, ThinkMind, 2011.
[8]
A. Varga and R. Hornig, "An overview of the omnet++ simulation environment," in Proceedings of the 1st international conference on Simulation tools and techniques for communications, networks and systems & workshops, p. 60, ICST (Institute for Computer Sciences, Social-Informatics and ..., 2008.
[9]
F. Kaisser, C. Gransart, M. Kassab, and M. Berbineau, "A framework to simulate vanet scenarios with sumo," in Opnetwork, 2011.
[10]
A. Extance, "The future of cryptocurrencies: Bitcoin and beyond," Nature News, vol. 526, no. 7571, p. 21, 2015.
[11]
S. Nakamoto et al., "Bitcoin: A peer-to-peer electronic cash system," 2008.
[12]
U. Mukhopadhyay, A. Skjellum, O. Hambolu, J. Oakley, L. Yu, and R. Brooks, "A brief survey of cryptocurrency systems," in 2016 14th annual conference on privacy, security and trust (PST), pp. 745--752, IEEE, 2016.
[13]
D. Mingxiao, M. Xiaofeng, Z. Zhe, W. Xiangwei, and C. Qijun, "A review on consensus algorithm of blockchain," in 2017 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 2567--2572, IEEE, 2017.
[14]
J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-policy attribute-based encryption," in Security and Privacy, 2007. SP'07. IEEE Symposium on, pp. 321--334, IEEE, 2007.
[15]
B. Waters, "Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization," in International Workshop on Public Key Cryptography, pp. 53--70, Springer, 2011.
[16]
A. Dix, "Human-computer interaction," in Encyclopedia of database systems, pp. 1327--1331, Springer, 2009.
[17]
H. Gilbert and H. Handschuh, "Security analysis of sha-256 and sisters," in International workshop on selected areas in cryptography, pp. 175--193, Springer, 2003.
[18]
D. Jiang and L. Delgrossi, "Ieee 802.11 p: Towards an international standard for wireless access in vehicular environments," in VTC Spring 2008-IEEE Vehicular Technology Conference, pp. 2036--2040, IEEE, 2008.
[19]
H. Hasrouny, A. E. Samhat, C. Bassil, and A. Laouiti, "Vanet security challenges and solutions: A survey," Vehicular Communications, vol. 7, pp. 7--20, 2017.
[20]
J. Grover, M. Gaur, and V. Laxmi, "Sybil attack in vanets," in Security of self-organizing networks: MANET, WSN, WMN, VANET, vol. 269, 2010.
[21]
J. Cui, L. S. Liew, G. Sabaliauskaite, and F. Zhou, "A review on safety failures, security attacks, and available countermeasures for autonomous vehicles," Ad Hoc Networks, vol. 90, p. 101823, 2019.
[22]
B. Sheehan, F. Murphy, M. Mullins, and C. Ryan, "Connected and autonomous vehicles: A cyber-risk classification framework," Transportation Research Part A: Policy and Practice, vol. 124, pp. 523--536, 2019.
[23]
Z. Zheng, S. Xie, H.-N. Dai, X. Chen, and H. Wang, "Blockchain challenges and opportunities: A survey," International Journal of Web and Grid Services, vol. 14, no. 4, pp. 352--375, 2018.
[24]
B. Leiding, P. Memarmoshrefi, and D. Hogrefe, "Self-managed and blockchain-based vehicular ad-hoc networks," in Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct, pp. 137--140, ACM, 2016.
[25]
Z. Yang, K. Yang, L. Lei, K. Zheng, and V. C. Leung, "Blockchain-based decentralized trust management in vehicular networks," IEEE Internet of Things Journal, vol. 6, no. 2, pp. 1495--1505, 2018.
[26]
A. Lei, C. Ogah, P. Asuquo, H. Cruickshank, and Z. Sun, "A secure key management scheme for heterogeneous secure vehicular communication systems," ZTE Communications, vol. 21, p. 1, 2016.

Cited By

View all
  • (2024)Multimodal biometric user authentication using improved decentralized fuzzy vault scheme based on Blockchain networkJournal of Information Security and Applications10.1016/j.jisa.2024.10374082(103740)Online publication date: May-2024
  • (2024)A bibliometric survey on impact of Blockchain in Robotics: Trends and ApplicationsComputers and Electrical Engineering10.1016/j.compeleceng.2024.109744120(109744)Online publication date: Dec-2024
  • (2023)A survey of Internet of vehicles/vehicle to everything security based on BlockchainSCIENTIA SINICA Informationis10.1360/SSI-2022-001953:5(841)Online publication date: 6-May-2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
SIN '19: Proceedings of the 12th International Conference on Security of Information and Networks
September 2019
179 pages
ISBN:9781450372428
DOI:10.1145/3357613
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 12 September 2019

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. blockchain
  2. distributed networks
  3. priority vehicle
  4. security and privacy

Qualifiers

  • Research-article

Conference

SIN 2019

Acceptance Rates

Overall Acceptance Rate 102 of 289 submissions, 35%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)14
  • Downloads (Last 6 weeks)3
Reflects downloads up to 17 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Multimodal biometric user authentication using improved decentralized fuzzy vault scheme based on Blockchain networkJournal of Information Security and Applications10.1016/j.jisa.2024.10374082(103740)Online publication date: May-2024
  • (2024)A bibliometric survey on impact of Blockchain in Robotics: Trends and ApplicationsComputers and Electrical Engineering10.1016/j.compeleceng.2024.109744120(109744)Online publication date: Dec-2024
  • (2023)A survey of Internet of vehicles/vehicle to everything security based on BlockchainSCIENTIA SINICA Informationis10.1360/SSI-2022-001953:5(841)Online publication date: 6-May-2023
  • (2023)Collaborative DDoS Attack Defense for OTA Updates in CAVs using Hyperledger Fabric Blockchain2023 International Conference on Smart Applications, Communications and Networking (SmartNets)10.1109/SmartNets58706.2023.10215881(1-6)Online publication date: 25-Jul-2023
  • (2022)Blockchain Technology for Intelligent Transportation Systems: A Systematic Literature ReviewIEEE Access10.1109/ACCESS.2022.314995810(20995-21031)Online publication date: 2022
  • (2021)Blockchain and Autonomous Vehicles: Recent Advances and Future DirectionsIEEE Access10.1109/ACCESS.2021.31136499(130264-130328)Online publication date: 2021
  • (2021)Blockchain-based solutions for security, privacy, and trust management in vehicular networks: a surveyThe Journal of Supercomputing10.1007/s11227-021-03659-xOnline publication date: 10-Feb-2021
  • (2021)Blockchain-Based Internet-of-VehicleIntelligent Technologies for Internet of Vehicles10.1007/978-3-030-76493-7_10(313-340)Online publication date: 10-Jun-2021
  • (2021)Using Blockchain in Autonomous VehiclesArtificial Intelligence and Blockchain for Future Cybersecurity Applications10.1007/978-3-030-74575-2_15(285-305)Online publication date: 1-May-2021
  • (2021)A survey on the blockchain techniques for the Internet of Vehicles securityTransactions on Emerging Telecommunications Technologies10.1002/ett.431735:4Online publication date: 17-Jun-2021
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media