skip to main content

Title: EFFICIENT BLOCKCHAIN AUTHENTICATION SCHEME FOR VANETS
As the use of autonomous vehicles increase, the transportation infrastructure as a whole becomes more susceptible to cyber-attacks due to the increase of components that can communicate with one another and the Internet. It has been shown that autonomous vehicles benefit greatly from cooperating to perform many cost and life-saving applications such as tailgating, advanced collision warning, and even traffic routing. To secure the transportation infrastructure against this increasing risk, this paper presents an efficient blockchain scheme for vehicular ad-hoc networks of autonomous vehicles. In the proposed scheme, every vehicle maintains blocks generated by its platoon which contain transactions that evaluate the actions of every vehicle. Thus, vehicles will possess different blocks and thus different blockchains as they join and leave platoons. No central blockchain is maintained. These blocks are used as a token by the vehicle to gain access to future platoons. The proposed scheme uses the Schnorr digital signature scheme to create a secure signature and reach consensus within the platoon. It is proven to be secure under the given assumptions.
Authors:
;
Award ID(s):
1837472
Publication Date:
NSF-PAR ID:
10190266
Journal Name:
Critical Infrastructure Protection XIV.
Sponsoring Org:
National Science Foundation
More Like this
  1. The Intelligent Transportation System has become one of the most globally researched topics, with Connected and Autonomous Vehicles(CAV) at its core. The CAV applications can be improved by the study of vehicle platooning immune to realtime traffic and vehicular network losses. In this work, we explore the need to integrate the Network model and Platooning system model for highway environments. The proposed platoon model is designed to be adaptive in length, providing the node vehicles to merge and exit. This overcomes the assumption that all the platoon nodes should have a common source and destination. The challenges of the existingmore »platoon model, such as relay selection, acceleration threshold, are addressed for highly modular platoon design. The presented algorithm for merge and exit events optimizes the trade-off between network parameters such as communication range and vehicle dynamic parameters such as velocity and acceleration threshold. It considers the network bounds like SINR and link stability and vehicle trajectory parameters like the duration of the vehicle in the platoon. This optimizes the traffic throughput while maintaining stability using the PID controller. The work tries to increase the vehicle inclusion time in the platoon while preserving the overall traffic throughput.« less
  2. Internet of Vehicles (IoV) in 5G is regarded as a backbone for intelligent transportation system in smart city, where vehicles are expected to communicate with drivers, with road-side wireless infrastructure, with other vehicles, with traffic signals and different city infrastructure using vehicle-to-vehicle (V2V) and/or vehicle-to-infrastructure (V2I) communications. In IoV, the network topology changes based on drivers' destination, intent or vehicles' movements and road structure on which the vehicles travel. In IoV, vehicles are assumed to be equipped with computing devices to process data, storage devices to store data and communication devices to communicate with other vehicles or with roadside infrastructuremore »(RSI). It is vital to authenticate data in IoV to make sure that legitimate data is being propagated in IoV. Thus, security stands as a vital factor in IoV. The existing literature contains some limitations for robust security in IoV such as high delay introduced by security algorithms, security without privacy, unreliable security and reduced overall communication efficiency. To address these issues, this paper proposes the Elliptic Curve Cryptography (ECC) based Ant Colony Optimization Ad hoc On-demand Distance Vector (ACO-AODV) routing protocol which avoids suspicious vehicles during message dissemination in IoV. Specifically, our proposed protocol comprises three components: i) certificate authority (CA) which maps vehicle's publicly available info such as number plates with cryptographic keys using ECC; ii) malicious vehicle (MV) detection algorithm which works based on trust level calculated using status message interactions; and iii) secure optimal path selection in an adaptive manner based on the intent of communications using ACO-AODV that avoids malicious vehicles. Experimental results illustrate that the proposed approach provides better results than the existing approaches.« less
  3. Connected Autonomous Vehicular (CAV) platoon refers to a group of vehicles that coordinate their movements and operate as a single unit. The vehicle at the head acts as the leader of the platoon and determines the course of the vehicles following it. The follower vehicles utilize Vehicle-to-Vehicle (V2V) communication and automated driving support systems to automatically maintain a small fixed distance between each other. Reliance on V2V communication exposes platoons to several possible malicious attacks which can compromise the safety, stability, and efficiency of the vehicles. We present a novel distributed resiliency architecture, RePLACe for CAV platoon vehicles to defendmore »against adversaries corrupting V2V communication reporting preceding vehicle position. RePLACe is unique in that it can provide real-time defense against a spectrum of communication attacks. RePLACe provides systematic augmentation of a platoon controller architecture with real-time detection and mitigation functionality using machine learning. Unlike computationally intensive cryptographic solutions RePLACe accounts for the limited computation capabilities provided by automotive platforms as well as the real-time requirements of the application. Furthermore, unlike control-theoretic approaches, the same framework works against the broad spectrum of attacks. We also develop a systematic approach for evaluation of resiliency of CAV applications against V2V attacks. We perform extensive experimental evaluation to demonstrate the efficacy of RePLACe.« less
  4. Connected automated vehicles (CAVs), built upon advanced vehicle control and communication technology, can improve traffic throughput, safety, and energy efficiency. Previous studies on CAVs control focus on instability and stability properties of CAV platoons; however, these analyses cannot reveal the damping platoon oscillation characteristics, which are important for enhancing CAV platoon reliability against variant continuous perturbations. To this end, this research seeks to characterize the damping oscillations of CAVs through exploiting the platoon's unforced oscillatory, i.e., damping behavior. Inspired by the mechanical vibration theory, the proposed approach is applied to a CAV platoon with linear car-following control formulated as Helly'smore »model and the predecessor-following communication topology. The proposed approach is applied to a CAV platoon with the linear car-following control formulated as Helly's model and the predecessor-following communication topology. Numerical analysis results show that a periodic perturbation with the resonance frequency of the CAV platoon will amplify the oscillation and lead to the severest oscillatory traffic. Our analysis highlights the importance of preventing platoon oscillations from resonance in ensuring CAV platooning reliability.« less
  5. The performance of connected and automated vehicle (CAV) platoons, aimed at improving traffic efficiency and safety, depends on vehicle dynamics and communication reliability. However, CAVs are vulnerable to perturbations in vehicular communication. Such endogenous vulnerability can induce oscillatory dynamics to CAVs, leading to the failure of platooning. Differing from previous work on CA V platoon stability, this research exploits CAV platooning vulnerability under periodic perturbation by formulating the oscillatory dynamics as vibrations in a mechanical system. Akin to other mechanical systems, a CAV platoon has its inherent oscillation frequency, exhibiting unique characteristics in a perturbed travel environment. To this end,more »this paper proposes an approach to characterize the CAV platooning vulnerability using the mechanical vibration theory. The employed theory reveals that CAV platooning vulnerability mainly associates with its resonance frequency, through which a small periodic perturbation can amplify the platoon oscillation. The analytical formulation and simulation results show that preventing periodic perturbations from a platoon's resonance frequency is crucial to enhance the CAV platooning reliability and suppress large amplitude oscillations, helping to secure the expected benefits of CAV platoons.« less