The Intelligent Transportation System has become one of the most globally researched topics, with Connected and Autonomous Vehicles(CAV) at its core. The CAV applications can be improved by the study of vehicle platooning immune to realtime traffic and vehicular network losses. In this work, we explore the need to integrate the Network model and Platooning system model for highway environments. The proposed platoon model is designed to be adaptive in length, providing the node vehicles to merge and exit. This overcomes the assumption that all the platoon nodes should have a common source and destination. The challenges of the existingmore »
EFFICIENT BLOCKCHAIN AUTHENTICATION SCHEME FOR VANETS
As the use of autonomous vehicles increase, the transportation infrastructure
as a whole becomes more susceptible to cyber-attacks due to
the increase of components that can communicate with one another and
the Internet. It has been shown that autonomous vehicles benefit greatly
from cooperating to perform many cost and life-saving applications such
as tailgating, advanced collision warning, and even traffic routing. To
secure the transportation infrastructure against this increasing risk, this
paper presents an efficient blockchain scheme for vehicular ad-hoc networks
of autonomous vehicles. In the proposed scheme, every vehicle
maintains blocks generated by its platoon which contain transactions
that evaluate the actions of every vehicle. Thus, vehicles will possess
different blocks and thus different blockchains as they join and leave platoons.
No central blockchain is maintained. These blocks are used as
a token by the vehicle to gain access to future platoons. The proposed
scheme uses the Schnorr digital signature scheme to create a secure signature
and reach consensus within the platoon. It is proven to be secure
under the given assumptions.
- Award ID(s):
- 1837472
- Publication Date:
- NSF-PAR ID:
- 10190266
- Journal Name:
- Critical Infrastructure Protection XIV.
- Sponsoring Org:
- National Science Foundation
More Like this
-
-
Internet of Vehicles (IoV) in 5G is regarded as a backbone for intelligent transportation system in smart city, where vehicles are expected to communicate with drivers, with road-side wireless infrastructure, with other vehicles, with traffic signals and different city infrastructure using vehicle-to-vehicle (V2V) and/or vehicle-to-infrastructure (V2I) communications. In IoV, the network topology changes based on drivers' destination, intent or vehicles' movements and road structure on which the vehicles travel. In IoV, vehicles are assumed to be equipped with computing devices to process data, storage devices to store data and communication devices to communicate with other vehicles or with roadside infrastructuremore »
-
Truck platooning is emerging as a promising solution with many economic incentives. However, securely admitting a new vehicle into a platoon is an extremely important yet difficult task. There is no adequate method today for verifying physical arrangements of vehicles within a platoon formation. Specifically, we address the problem of a platoon ghost attack wherein an attacker spoofs presence within a platoon to gain admission and subsequently execute malicious attacks. To address such concerns, we present Convoy, a novel autonomous platoon admission scheme which binds the vehicles' digital certificates to their physical context (i.e., locality). Convoy exploits the findings thatmore »
-
Cities have circumvented privacy norms and deployed sensors to track vehicles via toll transponders (like E-Zpass tags). The ethical problems regarding these practices have been highlighted by various privacy advocacy groups. The industry however, has yet to implement a standard privacy protection regime to protect users’ data. Further, existing risk management models do not adequately address user-controlled data sharing requirements. In this paper, we consider the challenges of protecting private data in the Internet of Vehicles (IoV) and mobile edge networks. Specifically, we present a privacy risk reduction model for electronic toll transponder data. We seek to preserve driver privacymore »
-
Collaborative intrusion detection system (CIDS) shares the critical detection-control information across the nodes for improved and coordinated defense. Software-defined network (SDN) introduces the controllers for the networking control, including for the networks spanning across multiple autonomous systems, and therefore provides a prime platform for CIDS application. Although previous research studies have focused on CIDS in SDN, the real-time secure exchange of the detection relevant information (e.g., the detection signature) remains a critical challenge. In particular, the CIDS research still lacks robust trust management of the SDN controllers and the integrity protection of the collaborative defense information to resist against themore »