CreditCoin: A Privacy-Preserving Blockchain-Based Incentive Announcement Network for Communications of Smart Vehicles

The vehicular announcement network is one of the most promising utilities in the communications of smart vehicles and in the smart transportation systems. In general, there are two major issues in building an effective vehicular announcement network. First, it is difficult to forward reliable announcements without revealing users’ identities. Second, users usually lack the motivation to forward announcements. In this paper, we endeavor to resolve these two issues through proposing an effective announcement network called CreditCoin, a novel privacy-preserving incentive announcement network based on Blockchain via an efficient anonymous vehicular announcement aggregation protocol. On the one hand, CreditCoin allows nondeterministic different signers (i.e., users) to generate the signatures and to send announcements anonymously in the nonfully trusted environment. On the other hand, with Blockchain, CreditCoin motivates users with incentives to share traffic information. In addition, transactions and account information in CreditCoin are tamper-resistant. CreditCoin also achieves conditional privacy since Trace manager in CreditCoin traces malicious users’ identities in anonymous announcements with related transactions. CreditCoin thus is able to motivate users to forward announcements anonymously and reliably. Extensive experimental results show that CreditCoin is efficient and practical in simulations of smart transportation.

[1]  Song Guo,et al.  A Game Theoretical Incentive Scheme for Relay Selection Services in Mobile Social Networks , 2016, IEEE Transactions on Vehicular Technology.

[2]  Patrick Weber,et al.  OpenStreetMap: User-Generated Street Maps , 2008, IEEE Pervasive Computing.

[3]  Jacques Stern,et al.  Threshold Ring Signatures and Applications to Ad-hoc Groups , 2002, CRYPTO.

[4]  Bo Yu,et al.  Detecting Sybil attacks in VANETs , 2013, J. Parallel Distributed Comput..

[5]  Josep Domingo-Ferrer,et al.  Trustworthy Privacy-Preserving Car-Generated Announcements in Vehicular Ad Hoc Networks , 2009, IEEE Transactions on Vehicular Technology.

[6]  Alfred Menezes,et al.  The Elliptic Curve Digital Signature Algorithm (ECDSA) , 2001, International Journal of Information Security.

[7]  Leslie Lamport,et al.  The Byzantine Generals Problem , 1982, TOPL.

[8]  Satoshi Nakamoto Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .

[9]  Aniket Kate,et al.  Introduction to Credit Networks: Security, Privacy, and Applications , 2016, CCS.

[10]  Matthew Green,et al.  Accountable Privacy for Decentralized Anonymous Payments , 2016, Financial Cryptography.

[11]  Ghassan O. Karame,et al.  Ripple: Overview and Outlook , 2015, TRUST.

[12]  Sven Lachmund,et al.  Proving Reliability of Anonymous Information in VANETs , 2009, IEEE Transactions on Vehicular Technology.

[13]  Pandi Vijayakumar,et al.  EAAP: Efficient Anonymous Authentication With Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks , 2017, IEEE Transactions on Intelligent Transportation Systems.

[14]  Eli Ben-Sasson,et al.  Zerocash: Decentralized Anonymous Payments from Bitcoin , 2014, 2014 IEEE Symposium on Security and Privacy.

[15]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[16]  Rui Zhang,et al.  An IBE scheme using ECC combined public key , 2010, Comput. Electr. Eng..

[17]  Josep Domingo-Ferrer,et al.  APPA: Aggregate Privacy-Preserving Authentication in Vehicular Ad Hoc Networks , 2011, ISC.

[18]  Mauro Conti,et al.  Fast and Secure Multihop Broadcast Solutions for Intervehicular Communication , 2014, IEEE Transactions on Intelligent Transportation Systems.

[19]  Hannes Hartenstein,et al.  A tutorial survey on vehicular ad hoc networks , 2008, IEEE Communications Magazine.

[20]  Steven E. Shladover,et al.  Potential Cyberattacks on Automated Vehicles , 2015, IEEE Transactions on Intelligent Transportation Systems.

[21]  Huirong Fu,et al.  Privacy Issues of Vehicular Ad-Hoc Networks , 2010 .

[22]  Siaw-Lynn Ng,et al.  Threshold Anonymous Announcement in VANETs , 2011, IEEE Journal on Selected Areas in Communications.

[23]  Hannes Federrath,et al.  VANETsim: An open source simulator for security and privacy concepts in VANETs , 2014, 2014 International Conference on High Performance Computing & Simulation (HPCS).

[24]  Leslie Lamport,et al.  Reaching Agreement in the Presence of Faults , 1980, JACM.

[25]  Feng Xia,et al.  CAIS: A Copy Adjustable Incentive Scheme in Community-Based Socially Aware Networking , 2017, IEEE Transactions on Vehicular Technology.

[26]  David M. Pennock,et al.  Mechanism Design on Trust Networks , 2007, WINE.

[27]  David Schwartz,et al.  The Ripple Protocol Consensus Algorithm , 2014 .

[28]  Alejandro Quintero,et al.  VANET security surveys , 2014, Comput. Commun..

[29]  Adrian Perrig,et al.  Challenges in Securing Vehicular Networks , 2005 .

[30]  Andreas M. Antonopoulos,et al.  Mastering Bitcoin: Unlocking Digital Crypto-Currencies , 2014 .

[31]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[32]  Xiaodong Lin,et al.  A Threshold Anonymous Authentication Protocol for VANETs , 2016, IEEE Transactions on Vehicular Technology.

[33]  Josep Domingo-Ferrer,et al.  Balanced Trustworthiness, Safety, and Privacy in Vehicle-to-Vehicle Communications , 2010, IEEE Transactions on Vehicular Technology.

[34]  Ralph C. Merkle,et al.  A Certified Digital Signature , 1989, CRYPTO.

[35]  Xuelong Li,et al.  Adaptive Multimedia Data Forwarding for Privacy Preservation in Vehicular Ad-Hoc Networks , 2017, IEEE Transactions on Intelligent Transportation Systems.

[36]  Maxim Raya,et al.  Efficient secure aggregation in VANETs , 2006, VANET '06.

[37]  Ralph C. Merkle,et al.  Protocols for Public Key Cryptosystems , 1980, 1980 IEEE Symposium on Security and Privacy.

[38]  Josep Domingo-Ferrer,et al.  Distributed Privacy-Preserving Secure Aggregation in Vehicular Communication , 2011, 2011 Third International Conference on Intelligent Networking and Collaborative Systems.

[39]  Xiaodong Lin LSR: Mitigating Zero-Day Sybil Vulnerability in Privacy-Preserving Vehicular Peer-to-Peer Networks , 2013, IEEE Journal on Selected Areas in Communications.

[40]  Josep Domingo-Ferrer,et al.  Aggregation of Trustworthy Announcement Messages in Vehicular Ad Hoc Networks , 2009, VTC Spring 2009 - IEEE 69th Vehicular Technology Conference.

[41]  Mianxiong Dong,et al.  Game Theoretic Resource Allocation in Media Cloud With Mobile Social Users , 2016, IEEE Transactions on Multimedia.

[42]  Earl T. Barr,et al.  TrustDavis: a non-exploitable online reputation system , 2005, Seventh IEEE International Conference on E-Commerce Technology (CEC'05).

[43]  Lein Harn,et al.  An Efficient Threshold Anonymous Authentication Scheme for Privacy-Preserving Communications , 2013, IEEE Transactions on Wireless Communications.

[44]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[45]  Yan Wang,et al.  Incentive Based Data Sharing in Delay Tolerant Mobile Networks , 2014, IEEE Transactions on Wireless Communications.