| Literature DB >> 32349402 |
Yuhong Li1,2, Kun Ouyang1, Nanxuan Li3, Rahim Rahmani4, Haojun Yang1, Yiwei Pei1.
Abstract
Being able to obtain various environmental and driving data from vehicles is becoming more and more important for current and future intelligent transportation systems (ITSs) to operate efficiently and economically. However, the limitations of privacy protection and security of the current ITSs are hindering users and vehicles from providing data. In this paper, we propose a new ITS architecture by using blockchain technology solving the privacy protection and security problems, and promoting users and vehicles to provide data to ITSs. The proposed architecture uses blockchain as a trust infrastructure to protect users' privacy and provide trustworthy services to users. It is also compatible with the legacy ITS infrastructure and services. In addition, the hierarchical organization of chains enables the scalability of the system, and the use of smart contracts provides a flexible way for introducing new services in the ITS. The proposed architecture is demonstrated by a proof of concept implementation based on Ethereum. The test results show that the proposed architecture is feasible.Entities:
Keywords: Keywords: intelligent transportation system; blockchain; data services; security and privacy protection; vehicular networks
Year: 2020 PMID: 32349402 PMCID: PMC7248822 DOI: 10.3390/s20092483
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Comparisons of the current work on secure ITS.
| Traditional ITS Infrastructure | Blockchain-Based ITS | |||||
|---|---|---|---|---|---|---|
| [ | [ | [ | [ | [ | [ | |
| Privacy | User can be traced | User can be traced | User can be traced | Anonymity | Anonymity | NA |
| Trust | Signature | Signature | NA | Yes | Yes | Yes |
| Authentication | Yes | Yes | Yes | Yes | Yes | Yes |
| Accountability | Yes | Yes | Yes | Yes | Yes | Yes |
| Attacks Protection | Bogus message attacks | Tampering | Spoofing | NA | NA | NA |
| Data Consistency | NA | NA | NA | Yes | Yes | Yes |
| Confidentiality | NA | Yes | Yes | Yes | Yes | No |
| Integrity | Yes | Yes | Yes | Yes | Yes | Yes |
| Non-repudiation | Yes | Yes | NA | Yes | Yes | Yes |
| Access Control | Yes | Yes | No | NA | NA | NA |
| Scalability | NA | NA | NA | NA | NA | NA |
| Implementation Limitations | Require to collect the behavior of vehicles | Require to register in a group | Broadcasting delay of messages | High computing power and memory requirement | High memory requirement | High memory requirement |
Figure 1The ITS architecture with blockchain overlay.
Figure 2Hierarchical organization of blockchains in Ba-ITS.
Figure 3Vehicles upload data to the V-chain.
Figure 4Data query initiated by a vehicle.
Figure 5Data query when no data are found in the blockchain.
Figure 6Topology of a vehicular network with ten blockchain nodes.
Figure 7Vehicles can use dApp to query and upload data.
Figure 8Data in the V-chain blocks are encrypted.
Figure 9Distribution of data response time when the requested data exist in Ba-ITS.
Figure 10Distribution of data response time when the requested data do not exist in Ba-ITS.
Time for data onto chain.
| Difficulty Parameter | Time (ms/block) | |
|---|---|---|
| CPU1 | CPU2 | |
| 0x5FFFFA | 12000 | 15000 |
| 0x99999 | 1075.28 | 1258.07 |
| 0x40000 | 433.34 | 522.53 |
| 0x30000 | 292.30 | 325.59 |
| 0x20000 | 287.99 | 324.27 |
| 0x10000 | 242.95 | 256.53 |
Parameters setting for ns-3.
| Parameters | Values |
|---|---|
| Simulator | ns-3(version 3.29) |
| Simulation time | 900 s |
| Simulation area | 9320 m × 8099 m |
| WLAN Protocol | 802.11 g |
| Data rate | 1 Mbps |
| Mobility model | Constant Position Mobility Model |
| Signal propagation loss model | Range Propagation Loss Model |
| Delay model | Constant speed propagation delay model |
| Radio transmission range | 300 m |
| Radio frequency | 2.4 GHz |
| Vehicle speed | 40–50 km/h |
Figure 11Map used in ns3 for route planning.
Figure 12Comparisons of service response time (milliseconds).