Securing Connected Vehicle Applications with an Efficient Dual Cyber- Physical Blockchain Framework

While connected vehicle (CV) applications have the potential to revolutionize traditional transportation system, cyber and physical attacks on them may lead to disastrous consequences. In this work, we propose an efficient dual cyber-physical blockchain framework to build trust and secure communication for CV applications. Our approach incorporates blockchain technology and physical sensing capabilities of vehicles to quickly react to attacks in a large-scale vehicular network, with low resource overhead. We explore the application of our framework to three CV applications, i.e., highway merging, intelligent intersection management, and traffic network with route choices. Simulation results demonstrate the effectiveness of our blockchain-based framework in defending against spoofing attacks, bad mouthing attacks, and Sybil and voting attacks. We also provide analysis to show the timing and resource efficiency of our framework.

[1]  Tigang Jiang,et al.  Blockchain-Based Internet of Vehicles: Distributed Network Architecture and Performance Analysis , 2019, IEEE Internet of Things Journal.

[2]  George Danezis,et al.  SybilInfer: Detecting Sybil Nodes using Social Networks , 2009, NDSS.

[3]  Zhu Han,et al.  A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[4]  Kate Hartman Connected vehicle pilot deployment program. , 2014 .

[5]  Victor C. M. Leung,et al.  Blockchain-Based Decentralized Trust Management in Vehicular Networks , 2019, IEEE Internet of Things Journal.

[6]  Hui Li,et al.  A Blockchain-Based Hierarchical Reputation Management Scheme in Vehicular Network , 2019, 2019 IEEE Global Communications Conference (GLOBECOM).

[7]  Randy H. Katz,et al.  Core Concepts, Challenges, and Future Directions in Blockchain , 2020, ACM Comput. Surv..

[8]  Yonggang Wen,et al.  A Survey on Consensus Mechanisms and Mining Management in Blockchain Networks , 2018, ArXiv.

[9]  Feng Gao,et al.  A Blockchain-Based Privacy-Preserving Payment Mechanism for Vehicle-to-Grid Networks , 2018, IEEE Network.

[10]  Andrej Kos,et al.  Blockchain Based Autonomous Selection of Electric Vehicle Charging Station , 2016, 2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI).

[11]  Michael Kaminsky,et al.  SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks , 2008, S&P 2008.

[12]  Ping Qin,et al.  A review of Beijing׳s vehicle registration lottery: Short-term effects on vehicle growth and fuel consumption , 2014 .

[13]  Silvio Micali,et al.  Algorand: Scaling Byzantine Agreements for Cryptocurrencies , 2017, IACR Cryptol. ePrint Arch..

[14]  Salil S. Kanhere,et al.  Towards an Optimized BlockChain for IoT , 2017, 2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI).

[15]  Yun-Pang Flötteröd,et al.  Microscopic Traffic Simulation using SUMO , 2018, 2018 21st International Conference on Intelligent Transportation Systems (ITSC).

[16]  Khaled Salah,et al.  Trust management in social Internet of vehicles: Factors, challenges, blockchain, and fog solutions , 2019, Int. J. Distributed Sens. Networks.

[17]  Jonathan Miller,et al.  Cyber Threats Facing Autonomous and Connected Vehicles: Future Challenges , 2017, IEEE Transactions on Intelligent Transportation Systems.

[18]  Phillip B. Gibbons,et al.  SybilGuard: Defending Against Sybil Attacks via Social Networks , 2006, IEEE/ACM Transactions on Networking.

[19]  Jing Chen,et al.  Algorand: A secure and efficient distributed ledger , 2019, Theor. Comput. Sci..

[20]  Bowen Zheng,et al.  Design and Analysis of Delay-Tolerant Intelligent Intersection Management , 2020, ACM Trans. Cyber Phys. Syst..

[21]  Madhusudan Singh,et al.  Branch based blockchain technology in intelligent vehicle , 2018, Comput. Networks.

[22]  Feng Xiao,et al.  SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).

[23]  Yiheng Feng,et al.  Exposing Congestion Attack on Emerging Connected Vehicle based Traffic Signal Control , 2018, NDSS.

[24]  Yiheng Feng,et al.  CVShield: Guarding Sensor Data in Connected Vehicle with Trusted Execution Environment , 2020, AutoSec@CODASPY.

[25]  Nael B. Abu-Ghazaleh,et al.  Application level attacks on Connected Vehicle Protocols , 2019, RAID.

[26]  Fei-Yue Wang,et al.  Towards blockchain-based intelligent transportation systems , 2016, 2016 IEEE 19th International Conference on Intelligent Transportation Systems (ITSC).