A secure priority vehicle movement based on blockchain technology in connected vehicles

With the rapid advancement in internet connectivity, Connected Vehicle network is becoming a promising technology in the current years. However, the increased connectivity most often results in intensifying risk of cyber security threats. In this regard, the network of connected vehicle is also vulnerable to various cyber-attacks. This paper discussed the security issues with connected Priority Vehicle. A priority vehicle must ensure the high level of security otherwise, the results would be devastating and the consequences might be very serious. To ensure the safe and secure movement of connected priority vehicle on the road using blockchain technology. In our proposed system, the priority vehicle movement is controlled by blockchain network, and it only accept messages and signals from blockchain authorized nodes. In particular, the priority vehicle's location, speed and travel time are the important parameters that we secure using blockchain network. This paper also discusses the possible attacks on the priority vehicles and show how our solution can mitigate these attacks. Here it justifies the effectiveness and performance of our security solution using simulation and proves that the blockchain technology shows the potential application towards securing the information in the connected vehicle network.

[1]  Eylem Ekici,et al.  Vehicular Networking: A Survey and Tutorial on Requirements, Architectures, Challenges, Standards and Solutions , 2011, IEEE Communications Surveys & Tutorials.

[2]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.

[3]  Jonathan Miller,et al.  Cyber Threats Facing Autonomous and Connected Vehicles: Future Challenges , 2017, IEEE Transactions on Intelligent Transportation Systems.

[4]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[5]  Martin Mullins,et al.  Connected and autonomous vehicles: A cyber-risk classification framework , 2019, Transportation Research Part A: Policy and Practice.

[6]  Mohd Murtadha Mohamad,et al.  A Survey of Security and Privacy in Connected Vehicles , 2015 .

[7]  Victor C. M. Leung,et al.  Blockchain-Based Decentralized Trust Management in Vehicular Networks , 2019, IEEE Internet of Things Journal.

[8]  Anis Laouiti,et al.  VANet security challenges and solutions: A survey , 2017, Veh. Commun..

[9]  Luca Delgrossi,et al.  IEEE 802.11p: Towards an International Standard for Wireless Access in Vehicular Environments , 2008, VTC Spring 2008 - IEEE Vehicular Technology Conference.

[10]  Zibin Zheng,et al.  Blockchain challenges and opportunities: a survey , 2018, Int. J. Web Grid Serv..

[11]  Dieter Hogrefe,et al.  Self-managed and blockchain-based vehicular ad-hoc networks , 2016, UbiComp Adjunct.

[12]  Zhaohui Wu,et al.  Intelligent Transportation Systems , 2006, IEEE Pervasive Computing.

[13]  Daniel Krajzewicz,et al.  SUMO - Simulation of Urban MObility An Overview , 2011 .

[14]  W. Buxton Human-Computer Interaction , 1988, Springer Berlin Heidelberg.

[15]  Anthony Skjellum,et al.  A brief survey of Cryptocurrency systems , 2016, 2016 14th Annual Conference on Privacy, Security and Trust (PST).

[16]  András Varga,et al.  An overview of the OMNeT++ simulation environment , 2008, SimuTools.

[17]  Satoshi Nakamoto Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .

[18]  Marion Berbineau,et al.  A framework to simulate VANET scenarios with SUMO , 2011 .

[19]  Zhili Sun,et al.  A Secure Key Management Scheme for Heterogeneous Secure Vehicular Communication Systems , 2016 .

[20]  Sherali Zeadally,et al.  5G for Vehicular Communications , 2018, IEEE Communications Magazine.

[21]  Zhang Zhe,et al.  A review on consensus algorithm of blockchain , 2017, 2017 IEEE International Conference on Systems, Man, and Cybernetics (SMC).

[22]  Jin Cui,et al.  A review on safety failures, security attacks, and available countermeasures for autonomous vehicles , 2019, Ad Hoc Networks.

[23]  Vijay Laxmi,et al.  Sybil Attack in VANETs: Detection and Prevention , 2010 .

[24]  Andy Extance The future of cryptocurrencies: Bitcoin and beyond , 2015, Nature.

[25]  Helena Handschuh,et al.  Security Analysis of SHA-256 and Sisters , 2003, Selected Areas in Cryptography.