B-IoMV: Blockchain-based onion routing protocol for D2D communication in an IoMV environment beyond 5G

Abstract With the popularity of blockchain technology in terms of security, privacy, traceability, and trust, it is being applied in various major applications concerning connected autonomous vehicles. One of the most sensitive applications is military operations, where we do not compromise with either security, privacy, trust, and communication latency of connected military vehicles, i.e., Internet of military vehicles (IoMVs). Achieving anonymity along with security and privacy of sender, receiver, and a data path for IoMVS is still an open question. Efforts we have made to address the aforementioned issue by proposing a blockchain-based onion routing protocol for IoMVs, i.e., B-IoMV, to achieve secure, trusted, and anonymous D2D communication. We studied the working of onion routing and presented a blockchain and token-based solution to strengthen its security and anonymity of IoMVs. A blockchain-based solution is quite costly and we use InterPlanetary File System (IPFS) to make the proposed B-IoMV system cost-effective. Finally, results show that the proposed B-IoMV system achieved better performance in communication latency, data storage cost, and network bandwidth utilization.

[1]  Neeraj Kumar,et al.  Blockchain-based scheme for the mobile number portability , 2021, J. Inf. Secur. Appl..

[2]  Anita Gehlot,et al.  Adoption of blockchain technology in various realms: Opportunities and challenges , 2020, Secur. Priv..

[3]  Fergal Reid,et al.  An Analysis of Anonymity in the Bitcoin System , 2011, PASSAT 2011.

[4]  Sudip Misra,et al.  AT-MAC: Adaptive MAC-Frame Payload Tuning for Reliable Communication in Wireless Body Area Networks , 2017, IEEE Transactions on Mobile Computing.

[5]  Mohammad S. Obaidat,et al.  Deep Learning-Based Content Centric Data Dissemination Scheme for Internet of Vehicles , 2018, 2018 IEEE International Conference on Communications (ICC).

[6]  Neeraj Kumar,et al.  Tactile Internet for Autonomous Vehicles: Latency and Reliability Analysis , 2019, IEEE Wireless Communications.

[7]  Christiane Kuhn,et al.  Breaking and (Partially) Fixing Provably Secure Onion Routing , 2019, 2020 IEEE Symposium on Security and Privacy (SP).

[8]  Víctor Gayoso Martínez,et al.  Analysis of the Cryptographic Tools for Blockchain and Bitcoin , 2020, Mathematics.

[9]  Mohammad Sayad Haghighi,et al.  Highly Anonymous Mobility-Tolerant Location-Based Onion Routing for VANETs , 2020, IEEE Internet of Things Journal.

[10]  Francesco Buccafurri,et al.  WIP: An Onion-Based Routing Protocol Strengthening Anonymity , 2021, 2021 IEEE 22nd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).

[11]  Rajesh Gupta,et al.  Blockchain and AI amalgamation for energy cloud management: Challenges, solutions, and future directions , 2020, J. Parallel Distributed Comput..

[12]  Ni Made Satvika Iswari Key generation algorithm design combination of RSA and ElGamal algorithm , 2016, 2016 8th International Conference on Information Technology and Electrical Engineering (ICITEE).

[13]  Diego Merani,et al.  A Security Reference Model for Autonomous Vehicles in Military Operations , 2020, 2020 IEEE Conference on Communications and Network Security (CNS).

[14]  Sindhu,et al.  A Blockchain and IPFS based framework for secure Research record keeping , 2022 .

[15]  Wei-Chiang Hong,et al.  A Survey on Decentralized Consensus Mechanisms for Cyber Physical Systems , 2020, IEEE Access.

[16]  Pierluigi Pisu,et al.  Real-Time Detection and Estimation of Denial of Service Attack in Connected Vehicle Systems , 2018, IEEE Transactions on Intelligent Transportation Systems.

[17]  Samiran Chattopadhyay,et al.  Design of an Anonymity-Preserving Group Formation Based Authentication Protocol in Global Mobility Networks , 2018, IEEE Access.

[18]  Dong Kun Noh,et al.  Efficient and Secure Identity-Based Onion Routing , 2014, J. Res. Pract. Inf. Technol..

[19]  Daniel Davis Wood,et al.  ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .

[20]  Jian Weng,et al.  Onionchain: Towards Balancing Privacy and Traceability of Blockchain-Based Applications , 2019, ArXiv.

[21]  Kazumasa Oida,et al.  Tracing Website Attackers by Analyzing Onion Routers’ Log Files , 2020, IEEE Access.

[22]  Anandarup Mukherjee,et al.  UAV Virtualization for Enabling Heterogeneous and Persistent UAV-as-a-Service , 2020, IEEE Transactions on Vehicular Technology.

[23]  Jan Camenisch,et al.  A Formal Treatment of Onion Routing , 2005, CRYPTO.