| Literature DB >> 31323870 |
Geetanjali Rathee1, Ashutosh Sharma2, Razi Iqbal3, Moayad Aloqaily4, Naveen Jaglan5, Rajiv Kumar5.
Abstract
Recently, connected vehicles (CV) are becoming a promising research area leading to the concept of CV as a Service (CVaaS). With the increase of connected vehicles and an exponential growth in the field of online cab booking services, new requirements such as secure, seamless and robust information exchange among vehicles of vehicular networks are emerging. In this context, the original concept of vehicular networks is being transformed into a new concept known as connected and autonomous vehicles. Autonomous vehicular use yields a better experience and helps in reducing congestion by allowing current information to be obtained by the vehicles instantly. However, malicious users in the internet of vehicles may mislead the whole communication where intruders may compromise smart devices with the purpose of executing a malicious ploy. In order to prevent these issues, a blockchain technique is considered the best technique that provides secrecy and protection to the control system in real time conditions. In this paper, the issue of security in smart sensors of connected vehicles that can be compromised by expert intruders is addressed by proposing a blockchain framework. This study has further identified and validated the proposed mechanism based on various security criteria, such as fake requests of the user, compromise of smart devices, probabilistic authentication scenarios and alteration in stored user's ratings. The results have been analyzed against some existing approach and validated with improved simulated results that offer 79% success rate over the above-mentioned issues.Entities:
Keywords: IoT; blockchain; connected vehicles, internet of vehicles; security; vehicular ad-hoc network
Year: 2019 PMID: 31323870 PMCID: PMC6679321 DOI: 10.3390/s19143165
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1The blockchain framework.
Figure 2The architectural framework of a connected vehicle blockchain.
Figure 3The blockchain network.
Figure 4Flow work of the proposed framework.
Figure 5Consent through the blockchain among provider and ride requester.
Figure 6The blockchain among sender and receiver.
Parameters.
| Number of Nodes in a CRN | 25, 500 |
| Grid facet | 700 × 700 m |
| Transmission Range | 140 m (approx.) |
| Data Size or users request | 256 Bytes |
| Simulation time | 80 s |
| Physical Layer | PHY 802.11 |
Figure 7An adversary network model of the proposed phenomenon.
The configuration of NS2 for a different network environment.
| S. No. | Transmitting Nodes | IoT Nodes | Compromised Miners | Attack Probability |
|---|---|---|---|---|
| 1 | 25 | 5, 10, 20 | 2, 10, 20 | 5% |
| 2 | 100 | 25, 50, 75 | 15, 25, 50 | 25% |
Figure 8The users’ fake requests corresponding to network congestion.
Figure 9The attack possibility against compromised devices.
Figure 10In user’s stored ratings by intruders.
Figure 11Probabilistic scenarios of attack possibility.