| Literature DB >> 36080777 |
Tehreem Ashfaq1, Rabiya Khalid1, Adamu Sani Yahaya1,2, Sheraz Aslam3,4, Ahmad Taher Azar4,5,6, Tamim Alkhalifah7, Mohamed Tounsi4,5.
Abstract
The exponential growth of intelligent vehicles(IVs) development has resulted in a complex network. As the number of IVs in a network increases, so does the number of connections. As a result, a great deal of data is generated. This complexity leads to insecure communication, traffic congestion, security, and privacy issues in vehicular networks (VNs). In addition, detecting malicious IVs, data integration, and data validation are major issues in VNs that affect network performance. A blockchain-based model for secure communication and malicious IV detection is proposed to address the above issues. In addition, this system also addresses data integration and transaction validation using an encryption scheme for secure communication. A multi-chain concept separates the legitimate and malicious data into two chains: the Integrity chain (I-chain) and Fraud chain (F-chain). This multi-chain mechanism solves the storage problem and reduces the computing power. The integration of blockchain in the proposed model provides privacy, network security, transparency, and immutability. To address the storage issue, the InterPlanetary File System (IPFS) is integrated with Certificate Authority (CA). A reputation mechanism is introduced to detect malicious IVs in the network based on ratings. This reputation mechanism is also used to prevent Sybil attack. The evaluation of the proposed work is based on the cost of smart contracts and computation time. Furthermore, two attacker models are presented to prevent the selfish mining attack and the Sybil attack. Finally, a security analysis of the proposed smart contracts with their security vulnerabilities is also presented.Entities:
Keywords: InterPlanetary File System; certificate authority; intelligent vehicles; vehicular network
Mesh:
Year: 2022 PMID: 36080777 PMCID: PMC9460212 DOI: 10.3390/s22176318
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.847
Related Work.
| Addressed Problems | Proposed Solutions | Strengths | Limitations |
|---|---|---|---|
| Security and privacy preservation problems [ | Proposed an authentication protocol for privacy preservation | Outperforms in terms of delay, throughput and packet dropping rate | Does not consider the storage problem |
| Privacy, authentication, and communication problems in VANETs [ | Traceable decentralized framework is proposed | Achieved conditional privacy for anonymous vehicles | Large number of events affect the efficiency of the network |
| Malicious nodes broadcast forged messages and trust inconsistency [ | An active detection trust mechanism is proposed for the VANETs | Identitify the malicious behavior of EVs | Proposed mechanism has high computational costs |
| Problem of illusion attacks [ | An Applied Intelligence AppLied Intelligence in bloCkchaIn VANET (ALICIA) is proposed | Novel validation scheme | Low-level metrics in ALICIA |
| Inefficient Energy trading [ | Proposed a fog computing-based V2V energy trading architecture | Improved PBFT | System’s efficiency is threatened |
| Centralized storage and data validation problems [ | Proposed a reputation system for ITS | Secure data sharing | Validation of information is based on users |
| Storage issue [ | Proposed system exploits benefits of IPFS | Provide monetary incentives to active EVs | Consensus mechanism uses high computational power |
| Inefficient energy trading and security issues [ | Proposed an incentive scheme based on blockchain for energy trading | Enhance the security level | Distributed architecture for data storage is missing |
| Trust, authentication, and access control problems [ | Multiple smart contracts are proposed | Detection of misbehavior | Difficult to manage revolutionary mobile communication |
| Address the problem of peak hours charges [ | Proposed a framework for secure and efficient energy trading | Incentive mechanism for the motivation of EVs | An action to prevent against various attacks is missing |
| Address the charging problem of roaming vehicles [ | Proposed an architecture that provides charging services to roaming vehicles | Fair and unified billing solution | High computational power is used |
| Problem of uncertainty and randomness of EV charging and discharging [ | Proposed a blockchain-based trading model for Peer to Peer (P2P) transactions among EVs | Reduce the electricity purchaser cost | Face difficulty dealing with dense network |
| Growing energy demand issue in EV sector [ | Proposed different charging strategies for EVS | Modify the load profile and reduce the cost | Work only for economic perspective |
| Addressed the problems of insecure communication and lack of privacy in VANETs [ | Proposed an efficient mechanism for privacy preservation, aggregation of signature, and batch verification | Reduce the risk of privacy disclosure | However, because of the high cost, it cannot maintain the batch verification |
| Addressed the security and privacy issues in energy trading models [ | An account generation technique is proposed | Provides a fault-tolerant and reliable data storage | Scalability issue when the number of EVs are increased. |
| Address the trust issues [ | Proposed a blockchain-based Trusted Data Management scheme | Provides data protection and mutual authentication | Designing a uniform data format is still missing |
| Address the security issues [ | Proposed a mechanism to deal with the security issue | Provides secrecy and protection to the control system | High maintenance cost |
| Address the repudiation issue [ | Proposed a blockchain-based fair non-repudiation scheme | Smart contract is implemented to resolve the disputes | Reputation system for service providers is missing |
| High computational power requirement and privacy [ | Proposed a lightweight blockchain-based model for V2G network | Negotiate between the vehicle and grid at less cost | Designing the blockchain layer in proposed framework is an issue |
| Imbalance distribution of assets [ | A novel configuration mechanism to serve the objective of deploying distributed assets | Automation is achieved | Size of memory is not calculated |
| Address the authentication problem [ | Proposed a key agreement protocol for the authentication | Reduce the time of authentication | Unable to deal with damage of data |
| Address the privacy problem during the charging of EVs [ | Proposed a decentralized privacy-preserving charging scheme based on blockchain and fog computing | Blockchain is deployed on fog computing nodes | Only theoretical analysis is provided |
| Address the problem of privacy in sellers [ | A double auction mechanism is proposed | Case studies are provided to show the effectiveness of proposed model | Off-chain payment can cause disputes |
| Security problems in vehicular systems [ | Proposed a secure charging system based on blockchain | Energy allocation mechanism to allocate the limited renewable energy for EVs | Latency issue |
| Storage problem [ | Proposed an efficient data sharing scheme | Consensus and signature mechanism guaranteed the data security | Current storage mechanisms need to be revised to handle the growing size of blockchain |
| Addressed the internal and external adversarial attacks [ | Develop a consensus protocol termed as Proof of Reputation (PoR) for the security | Implemented secure energy delivery | Computationally expensive |
| Inefficient charging issue [ | a new system of EV charging based on consortium blockchain is proposed | Provided convenient charging services for EVs | Scalability issue |
| Security threats of data and the leakage of privacy [ | Proposed a system of consortium blockchain-enabled framework | Analyze the efficiency and security of proposed model | Computational Overhead |
| Issues of communication and insecure transactions [ | Proposed adopting blockchain expertise in Real-Time Applications (RTA) | Achieved secure communication and create decentralized cloud computing platform | No assessment mechanism for unreliable source |
| Central server for IoVs that creates security issues [ | Introduced a Secure and Highly Efficient Practical Byzantine Fault Tolerance (SG-PBFT) | Reduced the burden on the central server and minimized the possibility of single-node threats | Required highest Cost |
Figure 1The Proposed Model for the Detection of Malicious IVs.
Figure 2Flow Chart of the Proposed scenario.
Figure 3Intersection Scenario.
Figure 4Authentication of IVs.
Figure 5Assign Reputation to IVs.
Figure 6Data Stored in IPFS.
Contract Deployment Cost of Authentication of IVs.
| Parameter | Value |
|---|---|
| status | true Transaction mined and execution succeed |
| transaction hash | 0xa4f56,…,b10edd1985594 |
| from | 0x5B38D,…,eddC4 |
| to | VN_Authentication.(constructor) |
| gas | 2507800 gas |
| transaction cost | 2180695 gas |
| execution cost | 2180695 gas |
| hash | 0xa4f5,…,d1985594 |
| input | 0x608…10032 |
| decoded input | {} |
| decoded output | - |
| logs | [] |
| value | 0 wei |
Contract Deployment Cost of Assigning Reputation.
| Parameter | Value |
|---|---|
| status | true Transaction mined and execution succeed |
| transaction hash | 0xe19a,…,dee9d |
| from | 0x5B38,…,dC4 |
| to | Reputation.(constructor) |
| gas | 477940 gas |
| transaction cost | 415600 gas |
| execution cost | 415600 gas |
| input | 0x608…30029 |
| decoded input | {} |
| decoded output | - |
| logs | [] |
| value | 0 wei |
Contract Deployment Cost of IPFS Storage.
| Parameter | Value |
|---|---|
| status | true Transaction mined and execution succeed |
| transaction hash | 0x5eac1f9ea,…,71b6e139e |
| from | 0xca35b, …, a733c |
| to | Storage.(constructor) |
| gas | 144529 gas |
| transaction cost | 125677 gas |
| execution cost | 125677 gas |
| hash | 0x98933,…, 75f15 |
| input | 0x60806,…,70033 |
| decoded input | { } |
| decoded output | - |
| logs | [] |
| value | 0 wei |
Figure 7Validating and Signing Time against the Number of Vehicles.
Figure 8Users’ Status in Network.
Figure 9The Generated Data against Computational Time.
Figure 10Intersection Scenario of IVs.
Mapping Table of Limitations and Proposed Solutions.
| Limitations | Proposed Solutions | Validations |
|---|---|---|
| Intensive data increase the computational power and delay | Division of data into multiple chains | Multi-chains are shown in terms of the relationship between the amount of data generated and time taken, as shown in |
| Insecure communication | Blockchain, CA, authentication process, and AES are used to provide secure communication in the proposed system | |
| Inefficient storage management | Through IPFS, data are not stored on blockchain, only hashes of data are stored on blockchain | |
| Road congestion | To tackle the road congestion, intersection criteria are set and followed | Intersection criteria are shown in |
| Validation of transactions | The encryption technique AES is used for the validation of data |
Figure 11Security Analysis of the Proposed System.
Figure 12Security Analysis of the Proposed System.
Figure 13Security Analysis of the Proposed Smart Contracts.
Figure 14The Impact of alpha on the Number of Blocks Mined.
Figure 15The values of alpha against the Revenue Ratio.
Figure 16Probability of Sybil Attack versus Number of Fake Identities.
Figure 17Probability of Sybil Attack versus Computational Power.