Abstract

In this paper, a blockchain-based secure data sharing mechanism is proposed for Vehicular Networks (VNs). Edge service providers are introduced along with ordinary nodes to efficiently manage service provisioning. The edge service providers are placed in the neighborhood of the ordinary nodes to ensure smooth communication between them. The huge amount of data generated by smart vehicles is stored in a distributed file storage system, known as Interplanetary File System (IPFS). It is used to tackle the issues related to data storage in centralized architectures, such as data tampering, lack of privacy, vulnerability to hackers, etc. Monetary incentives are given to edge vehicle nodes to motivate them for accurate and timely service provisioning to ordinary nodes. In response, ordinary nodes give reviews to the edge nodes against the services provided by them, which are further stored in a blockchain to ensure integrity, security and transparency. Smart contracts are used to automate the system processes without the inclusion of an intermediate party and to check the reviews given to the edge nodes. To optimize gas consumption and to enhance the system performance, a Proof of Authority (PoA) consensus mechanism is used to validate the transactions. Moreover, a caching system is introduced at the edge nodes to store frequently used services. Furthermore, both security and privacy are enhanced in the proposed system by incorporating a symmetric key cryptographic mechanism. A trust management mechanism is also proposed in this work to calculate the nodes’ reputation values based upon their trust values. These values determine the authenticity of the nodes involved in the network. Eventually, it is concluded from the simulation results that the proposed system is efficient for VNs.

Highlights

  • With the drastic advancements made during the last few years, the number of smart vehicles has increased manifold

  • We proposed a blockchain-based Vehicular Networks (VNs) for reliable data sharing between resource constrained ordinary nodes, to store the huge data generated by smart vehicles, a distributed file system, i.e., Interplanetary File System (IPFS) is used, all the transactions are automated and the reviews are checked using smart contracts, Proof of Work (PoW) is replaced with Proof of Authority (PoA) to reduce latency and increase throughput of the system, cryptocurrency based incentive mechanism is proposed for edge vehicle nodes

  • If a valid service is provided by an edge vehicle node, it is awarded with some incentive, caching technique is introduced in edge vehicle nodes to optimize the cost of the proposed system, Intelligent Vehicle Trust Point (IVTP) is introduced to calculate the trust values of ordinary vehicle nodes and to share data in a secure manner, a cryptographic mechanism: symmetric key encryption/decryption, is used

Read more

Summary

Introduction

With the drastic advancements made during the last few years, the number of smart vehicles has increased manifold. The huge increase in the number of smart vehicles leads to the generation of huge amount of real-time sensory data, which become quite difficult to handle as the time progresses To store this huge data in a secured manner, a secure communication channel is required. Ensure privacy and establish trust between entities, blockchain technology was introduced by Satoshi Nakamoto in 2008 [3] It is an increasing list of records, stored in the form of blocks, which are joined together in a chronological order to form a chain using cryptographic hashes. A secure blockchain-based data sharing architecture is proposed for VNs. Each ordinary vehicle communicates with edge node vehicle for the required service. The reputation values of vehicles are stored in blockchain against their respective IDs

Motivation
Problem Statement
Contributions
Literature Review
Blockchain in IoT
Limitations
Blockchain in Healthcare
Proposed System Model
Architecture Overview
Edge Node Model Overview
Incentive Mechanism in VN
RSU Overview
Authentication of VN
Caching and IPFS
Workflow of Proposed System
Simulation Environment
Ganache
Results and Discussions
Security Analysis of the Proposed System
Attacker Model
Propositions
Data Integrity
Privacy Preservation
Data Confidentiality
Single Point of Failure
Availability
Conclusions and Future Work
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call