Blockchain-Based Authentication in Internet of Vehicles: A Survey
Abstract
:1. Introduction
- Highlighting the significance of the blockchain technology in IoV and VANETs by presenting a wide range of the blockchain-based authentication schemes that are proposed in the recent literature.
- Providing the first detailed survey focusing on the application of blockchain technology to a specific aspect of IoV security; that is, the authentication. Considering both IoV and VANETs technologies when surveying the different blockchain-based authentication schemes instead of restricting them to only one vehicular technology, which can provide a comprehensive source for researchers interested in the field of blockchain-based authentication.
2. Background
2.1. Internet of Vehicles
- VANETs’ framework could not fully support the global and sustainable services targeted by ITS applications. This is caused by the pure ad-hoc communication architecture, in which an on-road vehicle can lose its granted services once it disconnects from an ad-hoc network. This is due to the inability of collaborating with other alternative reachable networks.
- Internet connectivity in VANETS could not be ensured, which affects the availability of commercial applications for vehicles’ drivers and passengers since those applications rely on reliable Internet connectivity.
- Despite the rapid technological advancement of personal mobile devices, they could not communicate with VANETs due to the incompatible network architecture.
- Intelligent decision making, and big data analytics applications were not possible in certain VANETs architectures. This could be related to the computing and storage constraints and the lack of cloud computing services.
- The application services could not guarantee high level of accuracy, since VANETs localize the computation and processing of traffic data information.
2.2. Blockchain
2.3. Motivations to Use Blockchain in IoV
- Decentralization: Unlike the centralized-storage platforms where both data storage and management are handled by a trusted centralized node, blockchain technology exhibits a decentralized nature in which data records are kept and managed by all participating entities. This reduces the resource bottlenecks issue and maintenance cost associated with the centralized sever arrangements and avoids the single point of failure issue which all can be beneficial for IoV environments.
- Immutability: Since the creation and validation of new blocks of transactions should be agreed upon by all or most of the peers via the different consensus mechanisms before being added to the blockchain, the blockchain is almost impossible to be tampered with or modified.
- Security and privacy: The cryptographic nature of blockchain where both cryptographic hash functions and digital signatures are adopted can ensure the security of transactions data and the privacy of the participating users in IoV.
- Transparency: Since all participants keep a replica of the public ledger, they can access all the timestamped blockchain transactions. This enables the peers to manage, look up and verify transactions at any time in a transparent manner without an intermediary. This self-auditability and transparency not only promote the relief of the peers by managing their own transactions, but also mitigates the time and financial costs associated with the intermediate party.
- Automation: Blockchain technology supports the adoption of smart contracts which are software scripts that can be executed automatically by a triggering event or upon meeting some pre-defined set of rules. This automation property of blockchain can enhance the efficiency of many IoV applications and help provide various services autonomously without a need for a trusted entity.
- Traceability: Each transaction record is kept in the blockchain with a timestamp indicating its time of occurrence and joining the public ledger. This timestamped recording nature helps identifying the events in a chronological order which enhances the traceability and can support the non-repudiation requirement in IoV.
3. Security Issues in IoV and VANETs
3.1. Security Requirements and Challenges in Vehicular Networks
- Authentication: It means ensuring that the received data is generated by a legitimate sender, or in other words, making sure that the entity that sent the data must be the true actual entity it claims to be. It guarantees that the entities involved in the communication are authentic, not masqueraded by some attacker who forwards the messages on their behalf. Sybil attack, masquerading attack, impersonation attack, spoofing attack, replay attack, and wormhole attacks are examples of attacks that target the authenticity of IoV users.
- Availability: It is a basic requirement in IoV environment especially for the real-time critical applications where even a minor delay cannot be tolerated and made the information useless. Therefore, the IoV system should be available all the time to provide real-time information and services to all legitimate users and be able to tolerate partial system faults and failure issues through backups and replications. Moreover, a mature IoV system must have the ability to function under intense network load with the increasing number of participants. The common attacks that target the availability service are the denial-of-service and distributed denial-of-service attacks.
- Confidentiality: Some IoV applications include sensitive information that are accessed only by certain legitimate users. Therefore, confidentiality of this information must be insured through encryption to prevent it from being revealed and interpreted by any illegal entity even upon eavesdropping.
- Data integrity: It means there is no distortion—whether intentionally or accidentally—in the received data. In other words, the sent data and the received data are identical. Typical attacks on integrity can be data manipulation attack and malware attack.
- Non-repudiation: It guarantees that any involved user in the IoV environment cannot deny any of its past activities, i.e., sending or receiving any piece of information. This ensures that an attacker can be identified, and all its communicated messages can be retrieved if needed for subsequent actions.
- Access control: Each participating entity in the IoV network is assigned different rights and privileges to access the network resources. This security requirement guarantees that each node performs its functions based on the services it is entitled to.
- Privacy and anonymity: The users’ real identities may need to be made hidden using anonymous identities or pseudonyms to protect their privacy. Additionally, some location information such as the driving traces and tracks followed by the vehicles are sometimes preferred to be anonymous in order to prevent unauthorized location tracking.
- Data verification: Since malicious entities can modify the information sent by the sender, a regular data verification process is usually performed to identify the manipulated or tampered messages and thus reject or drop them (if found) to prevent misleading the receiving entities into taking improper decisions.
- Real-time guarantee and efficient routing: The majority of IoV and VANETs applications are real-time, such as accidents detection and warnings dissemination, which must be carried out within certain time constraints, otherwise the safety of drivers and passengers could be threatened, and the delayed information will become worthless. To be able to meet these time constraints, efficient secure routing protocols should be adopted to guarantee delivering the packets in their entirety and on time.
- Traceability and revocability: Despite the need for preserving the privacy of IoV users in general by hiding their real identities, the legal authorities should have the ability to retrieve the vehicles’ real identities in case of misbehaving to revoke them as well as in case of disputes.
- Scalability: With the increasing number of vehicles on the roads nowadays, more vehicles and entities are joining the network. Thus, a good vehicular network should be able to scale-up accordingly. However, this nodes extension may expose the network to higher security issues if not controlled and monitored properly. Therefore, monitored scalability is another security requirement of the IoV system.
- High mobility: Data packets must be preserved and kept unmodified during the entire uncertain routing process from the sender to the receiver and should also be delivered on time to satisfy the real-time security requirement. However, the high mobility of nodes in IoV and VANETs networks, and the continuously varying network topology have led to the transient nature of V2V and V2I interactions, which makes the real-time guarantee and non-repudiation security requirements much more difficult.
- Low errors tolerance: Any minor delay in receiving information or delivering packets in IoV may result in unacceptable situations or even road disasters, thus the time constraints are of high importance in such environments. However, the limited bandwidth and the unstable network quality in IoV caused by the huge number of vehicles being served, their mobility, and the unpredictable changes in wireless networks hinder the real-time security requirement. Therefore, some preventive security measures must be applied so that the drivers can be proactive in case of any emergency situations.
- Key management: Several authorities and stakeholders are considered important participants in IoV such as governmental institutions and vehicle manufacturers. Hence, it has always been a security challenge to delegate a certain authority among these stakeholders to serve as a fully Trusted Authority (TA) that is responsible for key distribution, management, and revocation, since choosing the wrong authority without considering its hidden intents and benefits could severely affect the security of the IoV system. Moreover, due to the scale of IoV and VANETs networks, the Certificates Revocation Lists (CRLs) that are responsible for the revocation of misbehaving and malicious vehicles become too long and thus not feasible which raises the overhead of the certificate revocation process. Thus, maintaining a balance between efficient key distribution/revocation process and low overhead is another challenge on IoV security.
- Tradeoff between security and privacy: In general, the more secure the system is, the less privacy it can provide for users. Many drivers and passengers may not be willing to sacrifice their privacy by sharing their private sensitive data such as their location and destination while caring for security at the same time. Thus, maintaining a good balance between high security and reasonable user privacy is another major security challenge in IoV.
- Compatibility and cooperation: Due to the divergent interests and targets of the various IoV participating parties such as vehicle manufacturers, consumers, and governmental organizations, it is a big challenge to align their interests properly.
3.2. Security Threats and Attacks in Vehicular Networks
- Channel Interference Attack: This is also known as jamming attack, which is the act of interfering with the wireless communication links to hinder and disrupt the quality of communication between connected IoV devices.
- Denial of Service (DoS) Attack: In this attack the attacker floods the IoV network with fake unnecessary requests so that the service provider is no longer able to handle the legitimate requests issued by the genuine users.
- Distributed Denial of Service (DDoS) Attack: It is an advanced type of DoS attack, in which the fake requests are launched from several distributed nodes forming botnets.
- Man-in-the-Middle Attack: In this attack, an attacker places itself in the middle of two communicating legitimate entities to receive the data from the sender and then forward it to the receiver. When the message passes through the attacker, he/she could modify it before forwarding it to the receiver or just reveal its content.
- Message Tampering Attack: This attack aims to corrupt the messages and spread false information in the network by manipulating and fabricating the contents of the communicated messages. This can badly affect the road safety and the services provided by IoV thereby harming passengers and drivers.
- Eavesdropping Attack: It is also referred to as traffic analysis attack, in which the attacker monitors the network to track vehicle routes for some malicious purposes. The attacker eavesdrops on the communication channels to examine the messages flowing in the network.
- Malware Attack: In this attack, the attacker injects malicious software or viruses in the system files to contaminate the network, which can be leveraged to disrupt the network services and/or to manipulate users’ data.
- Message Holding Attack: Here, the attacker drops some sensitive messages that hold important data about road conditions that could greatly affect the decision of the drivers on road and thus the road safety is compromised. It also enables the drivers to keep these messages for future use (replaying) in the network.
- Sybil Attack: An adversary creates multiple fictitious vehicles on the road from a single node/vehicle by allocating it different identities to appear as it represents separate entities. In other words, an attacker creates (and then controls) more than one identity on a single physical node. This implies that other entities in the network will not be able to judge if the data originate from a single vehicle or multiple vehicles. This attack can be used to affect the route selection of a target vehicle by creating a fake traffic jam on the road which forces the targeted victim vehicle to choose an alternative path.
- GPS Deception/Spoofing Attack: It refers to the interception and manipulation of the GPS signals while being sent between two legitimate IoV nodes, to mislead the receiving entity by providing wrong location information about the sending vehicles. This can directly harm the drivers and the passengers by affecting their path decisions. Additionally, when a GPS receiver of a vehicle is attacked, it could provide the vehicle with false information about its location, speed, and other GPS information, which can greatly affect some IoV applications that depend on this GPS information such as navigation devices.
- Masquerading/Impersonation Attack: A node pretends to be another node by stealing its identity. Here, both the legitimate vehicle and the adversary vehicle can use the same identity simultaneously which can create a chaos in the network since other vehicles may receive contradictory information from the same identity. The malicious node can also enjoy the access privileges of the spoofed identity.
- Worm Hole Attack: Also known as tunneling attack, refers to the attack where at least two malicious vehicles create a private tunnel known as a worm hole which is used to forward the intercepted data between the two of them [89]. In this attack, the true distance information is faked where other entities are forced to route through the created tunnel thus controlling all the traffic flowing in the network.
- Replay Attack: In this attack, an adversary keeps iterating the old messages in the network to deceive the other nodes by dropping the messages with high priority from the queue. This can greatly affect the system’s efficiency and increase the cost of the bandwidth.
4. Blockchain-Based Authentication Schemes in Vehicular Networks
4.1. Private Blockchain-Based Authentication Protocols
4.2. Public Blockchain-Based Authentication Protocols
4.3. Consortium Blockchain-Based Authentication Protocols
5. Discussion
- The choice of the consensus mechanism used by the blockchain depends on many factors such as the amount of power consumption the system can afford, the percentage of faulty nodes the network can tolerate, and others. However, the size of the IoV network is also an important factor to be considered. For example, although the PBFT consensus is lightweight in power consumption and has a good fault-tolerance of approximately 33%, it does not support high network scalability; thus, it is chosen only by the small-scale IoV platforms such as in [128], or by fog-based IoV networks where the whole network can be large but the consensus is performed in fog-area-basis such as in [123,130,131,133]. On the other hand, PoW has been chosen by the large-scale IoV environments [119,122,125,126] due to its high scalability and high fault tolerance, despite its large power consumption. In general, we can say that these two consensus mechanisms are the most commonly used by the blockchains when applied for IoV and VANETs authentication.
- Some of the papers only considered a V2V model to investigate their authentication schemes such as [120], while most of them have considered an integrated network model (V2V and V2I). Due to the ad-hoc and mobile nature of V2V communication, the authentication is more challenging in it.
- In terms of performance analysis, the use of blockchain for authentication in IoV and VANETS networks introduces the need to include additional evaluation measures that reflect the efficiency of the blockchain itself such as the throughput which refers here to the number of transactions that can be verified and added to the blockchain per second [117,119,127,139], the transactions latency [119,122,127], and the blockchain storage overhead [123,126,133,136,137], beside other measures that are used commonly to evaluate the conventional cryptographic-based authentication schemes including the average packet delay, the average packet loss ratio, the communication cost, and the computational cost.
- Regarding the security analysis, the different authentication schemes have shown uneven levels of resistance against the various security attacks introduced in the previous sections.
6. Future Research Directions and Open Challenges
6.1. Efficient Design of Blockchain-Assisted IoV Authentication
- (1)
- Scalability: The scalability of a consensus mechanism depends on its way of reaching the consensus, whether it is Proof-based or Vote-based approach. Since Proof-based consensus protocols such as PoW and PoS do not require all the network entities to submit their individual decisions on the information to be verified, their scalability is not affected with more nodes being added to the network as at the end of the day they allocate the role of announcing the conclusions of all the participating nodes about the information to a single node. Thus, they can be suitable for large-scale networks such as the IoV environment. However, the huge amount of power consumed by these Proof-based consensus approaches undermines their efficiency and their suitability for all IoV environments especially the resource constrained ones. On the other hand, the Vote-based blockchain consensus making approaches such as the PBFT consensus mechanism exhibit negligible power consumption, yet their scalability is restricted to small-scale networks with limited number of nodes since all the nodes in the network are engaged in transaction verification and should submit their individual votes in order to reach consensus. For such a trade-off that is faced by the existing consensus mechanisms when employing blockchain for IoV, the challenge is represented in how to tune and improve these mechanisms in the future to be able to support efficient authentication in the highly scalable resource constrained IoV environments.
- (2)
- Fault tolerance: the different blockchain consensus mechanisms have uneven capabilities in terms of how many faulty nodes each can tolerate while still being able to ensure the integrity of the participants and data in the network. In such wide and publicly opened environments as IoV where a variety of attacks can be encountered in which attackers impersonate the authentic nodes, high fault-tolerant consensus protocols should be adopted to ensure that the integrity of the communicated data can still be guaranteed even if the authenticity of a considerable percentage of participants is compromised. Some existing consensus protocols such as PoW can offer the high fault tolerance required for IoV environments; however, as discussed before it exhibits a large power consumption which can be an issue when used for authentication in some resource constrained IoV platforms. Thus, the need appears for developing new consensus making approaches that can guarantee high fault tolerance for the vulnerable IoV arrangements while maintaining an acceptable level of power consumption. Alternatively, mitigating the power consumption effect of the already existing blockchain consensus protocols by finding other solutions such as the charge-as-go solution represented by providing mobile charging units to charge the vehicles’ batteries as they move to be able to tolerate the high power consumed during the authentication is a challenging proposal to be explored in the future.
- (3)
- Communication mode: Due to the two types of communication used by the different consensus mechanisms which are synchronous and asynchronous communication modes, different time responses are expected. In the asynchronous mode, the sending entity does not wait for acknowledgement from the receiving node on a previous request, instead, it directly proceeds with the following communication steps. The consensus protocols that use this mode of communication such as Proof of Work (PoW) and Proof of Time (PoT) could be thought of as perfectly suitable to be used for authentication in the different IoV applications which are mostly time-critical applications in which even a small delay of milli seconds is not forgivable. However, when considering some availability issues scenarios where the receiving entity can be temporarily out of network, waiting for an acknowledgement from the receiving entity before proceeding on with further interaction would save a lot of time and bandwidth that were used for such useless communication. Therefore, developing novel consensus making protocols that combine synchronous and asynchronous modes into one hybrid mode that incorporates the advantages of both communication modes, for example, by setting some thresholds for the number of acknowledgments to be received before proceeding the rest of communication asynchronously, or by using timeouts. However, such proposed solution is in turn full of challenges, since this hybrid mode of operation needs to be repeated periodically and regulated with other thresholds, that is, the synchronous mode should be injected once after every consecutive asynchronous interaction to check periodically that the receiving entity can be reached. This arrangement imposes an extra overhead associated with designing the optimal thresholds, monitoring, and managing the different time windows and timeouts. Thus, the feasibility of developing such complicated hybrid consensus protocols to be used for IoV authentication while maintaining a relatively low operational cost is another future challenge to be investigated.
6.2. Employing Blockchain for other IoV Security Requirements
- (1)
- Data Integrity: Blockchain can be adopted by IoV environments to ensure that the data sent and received between two communicating IoV entities are identical. In other words, to make sure that no unauthorized modifications on the data take place during transmission. For instance, when a sender aims to send some data to another IoV node, it can send a copy of the data to the publicly accessible blockchain as well. At the other end, when the receiving entity receives the data, it can compare it with the copy stored in the immutable blockchain, if matched that means no manipulation was performed and data integrity is guaranteed. Otherwise, the received data cannot be trusted. The use of blockchains for ensuring data integrity in IoV may become even more important to explore when considering using them for big data analytics and data mining which require the data to have high level of accuracy to result in developing accurate and efficient decision making and AI-based applications.
- (2)
- Secure Routing: Blockchain technology can be used for guaranteeing a secure routing in IoV environments via different arrangements. An example could be maintaining a list of all possible legal next-hop nodes in the public ledger which can be accessed by all IoV entities. This list should be firstly developed by gradually adding the ids of the nodes that were successfully registered and authorized by the network. This means that any malicious unauthorized node will not be valid in this routing list. In this way, when an entity receives a packet that was routed through at least one illegal forwarder that does not exist in the routing list kept in the blockchain, this means the routing processes have been compromised and some illegal entity had access to the transmitted packet.
- (3)
- Availability: A feasible suggestion that could be investigated is the integration of blockchain with some physical identification modules in an attempt to prevent some availability attacks and threats. That is, obligating each single service request to include the physical identity of the request originator, e.g., MAC address of the NIC of the user’s mobile device or the vehicle’s hardware id assigned by the vehicle manufacturer. Then, upon receiving the request by an infrastructure node, i.e., a RSU, it should extract the physical identity of the requester and store it as a record in the blockchain while keeping track of a counter that counts the number of successive requests and a timer to monitor the time intervals between these successive requests. In such arrangement, availability attacks specifically the denial of service (DoS) attack that originates from a single physical entity with different logical identities, i.e., IP addresses, can be efficiently detected and thus blocked by any IoV entity through monitoring the public ledger records and noticing any extraordinary behavior of rapid successive requests originated from the same physical id.
6.3. Cloud Scalability, Security, and Privacy
7. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Chang, W.-J.; Chen, L.-B.; Su, K.-Y. DeepCrash: A deep learning-based Internet of vehicles system for head-on and single-vehicle accident detection with emergency notification. IEEE Access 2019, 7, 148163–148175. [Google Scholar] [CrossRef]
- Dandala, T.T.; Krishnamurthy, V.; Alwan, R. Internet of Vehicles (IoV) for traffic management. In Proceedings of the 2017 International Conference on Computer, Communication and Signal Processing (ICCCSP), Chennai, India, 10–11 January 2017; pp. 1–4. [Google Scholar]
- Vijayaraghavan, V.; Leevinson, J.R. Intelligent traffic management systems for next generation IoV in smart city scenario. In Connected Vehicles in the Internet of Things; Springer: Berlin/Heidelberg, Germany, 2020; pp. 123–141. [Google Scholar]
- Khan, Z.; Koubaa, A.; Farman, H. Smart route: Internet-of-vehicles (iov)-based congestion detection and avoidance (iov-based cda) using rerouting planning. Appl. Sci. 2020, 10, 4541. [Google Scholar] [CrossRef]
- Ang, L.-M.; Seng, K.P.; Ijemaru, G.K.; Zungeru, A.M. Deployment of IoV for smart cities: Applications, architecture, and challenges. IEEE Access 2018, 7, 6473–6492. [Google Scholar] [CrossRef]
- Hamid, U.Z.A.; Zamzuri, H.; Limbu, D.K. Internet of vehicle (IoV) applications in expediting the implementation of smart highway of autonomous vehicle: A survey. In Performability in Internet of Things; Springer: Berlin/Heidelberg, Germany, 2019; pp. 137–157. [Google Scholar]
- Sodhro, A.H.; Rodrigues, J.J.P.C.; Pirbhulal, S.; Zahid, N.; de Macedo, A.R.L.; de Albuquerque, V.H.C. Link optimization in software defined IoV driven autonomous transportation system. IEEE Trans. Intell. Transp. Syst. 2020, 22, 3511–3520. [Google Scholar] [CrossRef]
- Yu, C.; Lin, B.; Guo, P.; Zhang, W.; Li, S.; He, R. Deployment and dimensioning of fog computing-based internet of vehicle infrastructure for autonomous driving. IEEE Internet Things J. 2018, 6, 149–160. [Google Scholar] [CrossRef]
- Gupta, N.; Prakash, A.; Tripathi, R. Internet of Vehicles and Its Applications in Autonomous Driving; Springer: Berlin/Heidelberg, Germany, 2021; ISBN 3030463354. [Google Scholar]
- Du, H.; Leng, S.; Wu, F.; Chen, X.; Mao, S. A new vehicular fog computing architecture for cooperative sensing of autonomous driving. IEEE Access 2020, 8, 10997–11006. [Google Scholar] [CrossRef]
- Raja, G.; Dhanasekaran, P.; Anbalagan, S.; Ganapathisubramaniyan, A.; Bashir, A.K. SDN-enabled traffic alert system for IoV in smart cities. In Proceedings of the IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Toronto, ON, Canada, 6–9 July 2020; pp. 1093–1098. [Google Scholar]
- Nouh, R.; Singh, M.; Singh, D. SafeDrive: Hybrid recommendation system architecture for early safety predication using Internet of Vehicles. Sensors 2021, 21, 3893. [Google Scholar] [CrossRef] [PubMed]
- Chen, L.-W.; Chen, H.-M. Driver behavior monitoring and warning with dangerous driving detection based on the internet of vehicles. IEEE Trans. Intell. Transp. Syst. 2020, 22, 7232–7241. [Google Scholar] [CrossRef]
- Hussain, R.; Kim, D.; Son, J.; Lee, J.; Kerrache, C.A.; Benslimane, A.; Oh, H. Secure and privacy-aware incentives-based witness service in social Internet of Vehicles clouds. IEEE Internet Things J. 2018, 5, 2441–2448. [Google Scholar] [CrossRef]
- Xie, J.; Tang, H.; Huang, T.; Yu, F.R.; Xie, R.; Liu, J.; Liu, Y. A survey of blockchain technology applied to smart cities: Research issues and challenges. IEEE Commun. Surv. Tutor. 2019, 21, 2794–2830. [Google Scholar] [CrossRef]
- Biswas, K.; Muthukkumarasamy, V. Securing smart cities using blockchain technology. In Proceedings of the IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS), Sydney, NSW, Australia, 12–14 December 2016; pp. 1392–1393. [Google Scholar]
- Ibba, S.; Pinna, A.; Seu, M.; Pani, F.E. CitySense: Blockchain-oriented smart cities. In Proceedings of the XP2017 Scientific Workshops, Cologne, Germany, 22–26 May 2017; pp. 1–5. [Google Scholar]
- Mollah, M.B.; Zhao, J.; Niyato, D.; Lam, K.-Y.; Zhang, X.; Ghias, A.M.Y.M.; Koh, L.H.; Yang, L. Blockchain for future smart grid: A comprehensive survey. IEEE Internet Things J. 2020, 8, 18–43. [Google Scholar] [CrossRef]
- Wang, S.; Taha, A.F.; Wang, J.; Kvaternik, K.; Hahn, A. Energy crowdsourcing and peer-to-peer energy trading in blockchain-enabled smart grids. IEEE Trans. Syst. Man Cybern. Syst. 2019, 49, 1612–1623. [Google Scholar] [CrossRef] [Green Version]
- Ferrag, M.A.; Maglaras, L. DeepCoin: A novel deep learning and blockchain-based energy exchange framework for smart grids. IEEE Trans. Eng. Manag. 2019, 67, 1285–1297. [Google Scholar] [CrossRef] [Green Version]
- Koshy, P.; Babu, S.; Manoj, B.S. Sliding window blockchain architecture for internet of things. IEEE Internet Things J. 2020, 7, 3338–3348. [Google Scholar] [CrossRef]
- Hassan, M.U.; Rehmani, M.H.; Chen, J. Privacy preservation in blockchain based IoT systems: Integration issues, prospects, challenges, and future research directions. Futur. Gener. Comput. Syst. 2019, 97, 512–529. [Google Scholar] [CrossRef]
- Rathore, H.; Mohamed, A.; Guizani, M. A survey of blockchain enabled cyber-physical systems. Sensors 2020, 20, 282. [Google Scholar] [CrossRef] [Green Version]
- Lee, J.; Azamfar, M.; Singh, J. A blockchain enabled Cyber-Physical System architecture for Industry 4.0 manufacturing systems. Manuf. Lett. 2019, 20, 34–39. [Google Scholar] [CrossRef]
- Xu, Q.; Su, Z.; Yang, Q. Blockchain-based trustworthy edge caching scheme for mobile cyber-physical system. IEEE Internet Things J. 2019, 7, 1098–1110. [Google Scholar] [CrossRef]
- Du, Y.; Cao, J.; Yin, J.; Song, S. An overview of blockchain-based swarm robotics system. Artif. Intell. China 2020, 572, 353–360. [Google Scholar]
- Ferrer, E.C. The blockchain: A new framework for robotic swarm systems. In Proceedings of the Future Technologies Conference, Vancouver, BC, Canada, 13–14 November 2018; pp. 1037–1058. [Google Scholar]
- Singh, S.; Sharma, P.K.; Yoon, B.; Shojafar, M.; Cho, G.H.; Ra, I.-H. Convergence of blockchain and artificial intelligence in IoT network for the sustainable smart city. Sustain. Cities Soc. 2020, 63, 102364. [Google Scholar] [CrossRef]
- Chen, X.; Ji, J.; Luo, C.; Liao, W.; Li, P. When machine learning meets blockchain: A decentralized, privacy-preserving and secure design. In Proceedings of the 2018 IEEE International Conference on Big Data (Big Data), Seattle, WA, USA, 10–13 December 2018; pp. 1178–1187. [Google Scholar]
- Wang, R.; Liu, H.; Wang, H.; Yang, Q.; Wu, D. Distributed security architecture based on blockchain for connected health: Architecture, challenges, and approaches. IEEE Wirel. Commun. 2019, 26, 30–36. [Google Scholar] [CrossRef]
- Ramani, V.; Kumar, T.; Bracken, A.; Liyanage, M.; Ylianttila, M. Secure and efficient data accessibility in blockchain based healthcare systems. In Proceedings of the 2018 IEEE Global Communications Conference (GLOBECOM), Abu Dhabi, United Arab Emirates, 9–13 December 2018; pp. 206–212. [Google Scholar]
- Wang, S.; Wang, J.; Wang, X.; Qiu, T.; Yuan, Y.; Ouyang, L.; Guo, Y.; Wang, F.-Y. Blockchain-powered parallel healthcare systems based on the ACP approach. IEEE Trans. Comput. Soc. Syst. 2018, 5, 942–950. [Google Scholar] [CrossRef]
- Kang, J.; Yu, R.; Huang, X.; Wu, M.; Maharjan, S.; Xie, S.; Zhang, Y. Blockchain for secure and efficient data sharing in vehicular edge computing and networks. IEEE Internet Things J. 2018, 6, 4660–4670. [Google Scholar] [CrossRef]
- Shi, K.; Zhu, L.; Zhang, C.; Xu, L.; Gao, F. Blockchain-based multimedia sharing in vehicular social networks with privacy protection. Multimed. Tools Appl. 2020, 79, 8085–8105. [Google Scholar] [CrossRef]
- Li, Z.; Yang, Z.; Xie, S. Computing resource trading for edge-cloud-assisted Internet of Things. IEEE Trans. Ind. Inform. 2019, 15, 3661–3669. [Google Scholar] [CrossRef]
- Qiao, G.; Leng, S.; Chai, H.; Asadi, A.; Zhang, Y. Blockchain empowered resource trading in mobile edge computing and networks. In Proceedings of the ICC 2019—2019 IEEE International Conference on Communications (ICC), Shanghai, China, 20–24 May 2019; pp. 1–6. [Google Scholar]
- Chai, H.; Leng, S.; Zhang, K.; Mao, S. Proof-of-reputation based-consortium blockchain for trust resource sharing in internet of vehicles. IEEE Access 2019, 7, 175744–175757. [Google Scholar] [CrossRef]
- Wang, S.; Huang, X.; Yu, R.; Zhang, Y.; Hossain, E. Permissioned blockchain for efficient and secure resource sharing in vehicular edge computing. arXiv 2019, arXiv:1906.06319. [Google Scholar]
- Al Amiri, W.; Baza, M.; Banawan, K.; Mahmoud, M.; Alasmary, W.; Akkaya, K. Privacy-preserving smart parking system using blockchain and private information retrieval. In Proceedings of the 2019 International Conference on Smart Applications, Communications and Networking (SmartNets), Sharm El Sheikh, Egypt, 17–19 December 2019; pp. 1–6. [Google Scholar]
- Chen, C.; Xiao, T.; Qiu, T.; Lv, N.; Pei, Q. Smart-contract-based economical platooning in blockchain-enabled urban internet of vehicles. IEEE Trans. Ind. Inform. 2019, 16, 4122–4133. [Google Scholar] [CrossRef]
- Li, M.; Zhu, L.; Lin, X. Efficient and privacy-preserving carpooling using blockchain-assisted vehicular fog computing. IEEE Internet Things J. 2018, 6, 4573–4584. [Google Scholar] [CrossRef]
- Li, M.; Zhu, L.; Lin, X. CoRide: A privacy-preserving collaborative-ride hailing service using blockchain-assisted vehicular fog computing. In Proceedings of the International Conference on Security and Privacy in Communication Systems, Orlando, VA, USA, 23–25 October 2019; pp. 408–422. [Google Scholar]
- Ren, Q.; Man, K.L.; Li, M.; Gao, B.; Ma, J. Intelligent design and implementation of blockchain and Internet of things–based traffic system. Int. J. Distrib. Sens. Netw. 2019, 15, 1550147719870653. [Google Scholar] [CrossRef] [Green Version]
- Cheng, L.; Liu, J.; Xu, G.; Zhang, Z.; Wang, H.; Dai, H.-N.; Wu, Y.; Wang, W. SCTSC: A semicentralized traffic signal control mode with attribute-based blockchain in IoVs. IEEE Trans. Comput. Soc. Syst. 2019, 6, 1373–1385. [Google Scholar] [CrossRef]
- Pourvahab, M.; Ekbatanifard, G. Digital forensics architecture for evidence collection and provenance preservation in iaas cloud environment using sdn and blockchain technology. IEEE Access 2019, 7, 153349–153364. [Google Scholar] [CrossRef]
- Cebe, M.; Erdin, E.; Akkaya, K.; Aksu, H.; Uluagac, S. Block4forensic: An integrated lightweight blockchain framework for forensics applications of connected vehicles. IEEE Commun. Mag. 2018, 56, 50–57. [Google Scholar] [CrossRef] [Green Version]
- Ferrag, M.A.; Maglaras, L.A.; Janicke, H.; Jiang, J.; Shu, L. Authentication protocols for internet of things: A comprehensive survey. Secur. Commun. Netw. 2017, 2017, 1–41. [Google Scholar] [CrossRef]
- Manvi, S.S.; Tangade, S. A survey on authentication schemes in VANETs for secured communication. Veh. Commun. 2017, 9, 19–30. [Google Scholar] [CrossRef]
- El-Hajj, M.; Fadlallah, A.; Chamoun, M.; Serhrouchni, A. A survey of internet of things (IoT) authentication schemes. Sensors 2019, 19, 1141. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Ali, I.; Hassan, A.; Li, F. Authentication and privacy schemes for vehicular ad hoc networks (VANETs): A survey. Veh. Commun. 2019, 16, 45–61. [Google Scholar] [CrossRef]
- Manivannan, D.; Moni, S.S.; Zeadally, S. Secure authentication and privacy-preserving techniques in Vehicular Ad-hoc NETworks (VANETs). Veh. Commun. 2020, 25, 100247. [Google Scholar] [CrossRef]
- Bagga, P.; Das, A.K.; Wazid, M.; Rodrigues, J.J.P.C.; Park, Y. Authentication protocols in internet of vehicles: Taxonomy, analysis, and challenges. IEEE Access 2020, 8, 54314–54344. [Google Scholar] [CrossRef]
- Kumar, S.; Velliangiri, S.; Karthikeyan, P.; Kumari, S.; Kumar, S.; Khan, M.K. A survey on the blockchain techniques for the Internet of Vehicles security. Trans. Emerg. Telecommun. Technol. 2021, e4317. [Google Scholar] [CrossRef]
- Wang, C.; Cheng, X.; Li, J.; He, Y.; Xiao, K. A survey: Applications of blockchain in the Internet of Vehicles. Eurasip J. Wirel. Commun. Netw. 2021, 2021, 1–16. [Google Scholar] [CrossRef]
- Mendiboure, L.; Chalouf, M.A.; Krief, F. Survey on blockchain-based applications in internet of vehicles. Comput. Electr. Eng. 2020, 84, 106646. [Google Scholar] [CrossRef]
- Contreras-Castillo, J.; Zeadally, S.; Guerrero-Ibañez, J.A. Internet of vehicles: Architecture, protocols, and security. IEEE Internet Things J. 2017, 5, 3701–3709. [Google Scholar] [CrossRef]
- Kaiwartya, O.; Abdullah, A.H.; Cao, Y.; Altameem, A.; Prasad, M.; Lin, C.-T.; Liu, X. Internet of vehicles: Motivation, layered architecture, network model, challenges, and future aspects. IEEE Access 2016, 4, 5356–5373. [Google Scholar] [CrossRef]
- Ji, B.; Zhang, X.; Mumtaz, S.; Han, C.; Li, C.; Wen, H.; Wang, D. Survey on the internet of vehicles: Network architectures and applications. IEEE Commun. Stand. Mag. 2020, 4, 34–41. [Google Scholar] [CrossRef]
- Xu, C.; Liu, H.; Zhang, Y.; Wang, P. Mutual authentication for vehicular network in complex and uncertain driving. Neural Comput. Applic. 2020, 32, 61–72. [Google Scholar] [CrossRef]
- Yang, F.; Li, J.; Lei, T.; Wang, S. Architecture and key technologies for Internet of Vehicles: A survey. J. Commun. Inf. Netw. 2017, 2, 1–17. [Google Scholar] [CrossRef] [Green Version]
- Alouache, L.; Nguyen, N.; Aliouat, M.; Chelouah, R. Toward a hybrid SDN architecture for V2V communication in IoV environment. In Proceedings of the 2018 Fifth International Conference on Software Defined Systems (SDS), Barcelona, Spain, 23–26 April 2018; pp. 93–99. [Google Scholar]
- Contreras-Castillo, J.; Zeadally, S.; Guerrero Ibáñez, J.A. A seven-layered model architecture for Internet of Vehicles. J. Inf. Telecommun. 2017, 1, 4–22. [Google Scholar] [CrossRef] [Green Version]
- Darwish, T.S.J.; Bakar, K.A. Fog based intelligent transportation big data analytics in the internet of vehicles environment: Motivations, architecture, challenges, and critical issues. IEEE Access 2018, 6, 15679–15701. [Google Scholar] [CrossRef]
- Aggarwal, S.; Chaudhary, R.; Aujla, G.S.; Kumar, N.; Choo, K.-K.R.; Zomaya, A.Y. Blockchain for smart communities: Applications, challenges and opportunities. J. Netw. Comput. Appl. 2019, 144, 13–48. [Google Scholar] [CrossRef]
- Raikwar, M.; Gligoroski, D.; Kralevska, K. SoK of used cryptography in blockchain. IEEE Access 2019, 7, 148550–148575. [Google Scholar] [CrossRef]
- Zhai, S.; Yang, Y.; Li, J.; Qiu, C.; Zhao, J. Research on the application of cryptography on the blockchain. J. Phys. Conf. Ser. 2019, 1168, 32077. [Google Scholar] [CrossRef]
- Zhang, S.; Lee, J.H. Analysis of the main consensus protocols of blockchain. ICT Express 2020, 6, 93–97. [Google Scholar] [CrossRef]
- Zheng, Z.; Xie, S.; Dai, H.; Chen, X.; Wang, H. An overview of blockchain technology: Architecture, consensus, and future trends. In Proceedings of the 2017 IEEE 6th International Congress on Big Data, BigData Congress 2017, Honolulu, HI, USA, 25–30 June 2017; pp. 557–564. [Google Scholar]
- Wazid, M.; Das, A.K.; Shetty, S.; Jo, M. A tutorial and future research for building a blockchain-based secure communication scheme for internet of intelligent things. IEEE Access 2020, 8, 88700–88716. [Google Scholar] [CrossRef]
- Mollah, M.B.; Zhao, J.; Niyato, D.; Guan, Y.L.; Yuen, C.; Sun, S.; Lam, K.Y.; Koh, L.H. Blockchain for the internet of vehicles towards intelligent transportation systems: A survey. IEEE Internet Things J. 2021, 8, 4157–4185. [Google Scholar] [CrossRef]
- Viriyasitavat, W.; Hoonsopon, D. Blockchain characteristics and consensus in modern business processes. J. Ind. Inf. Integr. 2019, 13, 32–39. [Google Scholar] [CrossRef]
- Begicheva, A.; Kofman, A. Fair proof of stake. Tech. Rep. 2018, 1–13. [Google Scholar] [CrossRef]
- Kumar, M.A.; Radhesyam, V.; Srinivasarao, B. Front-End IoT application for the bitcoin based on proof of elapsed time (PoET). In Proceedings of the 3rd International Conference on Inventive Systems and Control, ICISC 2019, Coimbatore, India, 10–11 January 2019; pp. 646–649. [Google Scholar]
- Liu, Z.; Tang, S.; Chow, S.S.M.; Liu, Z.; Long, Y. Fork-free hybrid consensus with flexible Proof-of-Activity. Futur. Gener. Comput. Syst. 2019, 96, 515–524. [Google Scholar] [CrossRef]
- NEM, T. Nem Technical Reference. 2018. Available online: https//nem.io/wpcontent/themes/nem/files/NEM_techRef.pdf (accessed on 18 June 2021).
- Jiang, S.; Wu, J. A game-theoretic approach to storage offloading in PoC-based mobile blockchain mining. Proc. Int. Symp. Mob. Ad Hoc Netw. Comput. 2020, 1, 171–180. [Google Scholar] [CrossRef]
- Karantias, K.; Kiayias, A.; Zindros, D. Proof-of-Burn BT—Financial Cryptography and Data Security; Springer: Berlin/Heidelberg, Germany, 2020; pp. 523–540. [Google Scholar]
- Li, K.; Li, H.; Hou, H.; Li, K.; Chen, Y. Proof of vote: A high-performance consensus protocol based on vote mechanism & consortium blockchain. In Proceedings of the IEEE 19th Intl Conference on High Performance Computing and Communications, HPCC 2017, IEEE 15th Intl Conference on Smart City, SmartCity 2017 and IEEE 3rd Intl Conference on Data Science and Systems, DSS, Bangkok, Thailand, 18–20 December 2017; pp. 466–473. [Google Scholar]
- Niranjanamurthy, M.; Nithya, B.N.; Jagannatha, S. Analysis of blockchain technology: Pros, cons and SWOT. Clust. Comput. 2019, 22, 14743–14757. [Google Scholar] [CrossRef]
- Vujičić, D.; Jagodić, D.; Ranđić, S. Blockchain technology, bitcoin, and Ethereum: A brief overview. In Proceedings of the 2018 17th International Symposium Infoteh-Jahorina (Infoteh), East Sarajevo, Bosnia and Herzegovina, 21–23 March 2018; pp. 1–6. [Google Scholar]
- Lee, X.T.; Khan, A.; Sen Gupta, S.; Ong, Y.H.; Liu, X. Measurements, analyses, and insights on the entire ethereum blockchain network. In Proceedings of the Web Conference 2020, New York, NY, USA, 20–24 April 2020; pp. 155–166. [Google Scholar]
- Cachin, C. Architecture of the hyperledger blockchain fabric. In Proceedings of the Workshop on Distributed Cryptocurrencies and Consensus Ledgers, Chicago, IL, USA, 25 July 2016; Volume 310. [Google Scholar]
- Benji, M.; Sindhu, M. A study on the Corda and Ripple blockchain platforms. In Advances in Big Data and Cloud Computing; Springer: Berlin/Heidelberg, Germany, 2019; pp. 179–187. [Google Scholar]
- Liu, M.; Wu, K.; Xu, J.J. How will blockchain technology impact auditing and accounting: Permissionless versus permissioned blockchain. Curr. Issues Audit. 2019, 13, A19–A29. [Google Scholar] [CrossRef] [Green Version]
- Tripathi, G.; Ahad, M.A.; Sathiyanarayanan, M. The Role of Blockchain in Internet of Vehicles (IoV): Issues, challenges and opportunities. In Proceedings of the 2019 International Conference on contemporary Computing and Informatics (IC3I), Singapore, 12–14 December 2019; pp. 26–31. [Google Scholar]
- Ali, M.S.; Vecchio, M.; Pincheira, M.; Dolui, K.; Antonelli, F.; Rehmani, M.H. Applications of blockchains in the internet of things: A comprehensive survey. IEEE Commun. Surv. Tutor. 2019, 21, 1676–1717. [Google Scholar] [CrossRef]
- Hasrouny, H.; Samhat, A.E.; Bassil, C.; Laouiti, A. VANet security challenges and solutions: A survey. Veh. Commun. 2017, 7, 7–20. [Google Scholar] [CrossRef]
- Qureshi, K.N.; Din, S.; Jeon, G.; Piccialli, F. Internet of vehicles: Key technologies, network model, solutions and challenges with future aspects. IEEE Trans. Intell. Transp. Syst. 2021, 22, 1777–1786. [Google Scholar] [CrossRef]
- Sharma, S.; Kaushik, B. A survey on internet of vehicles: Applications, security issues & solutions. Veh. Commun. 2019, 20, 100182. [Google Scholar] [CrossRef]
- Garg, T.; Kagalwalla, N.; Churi, P.; Pawar, A.; Deshmukh, S. A survey on security and privacy issues in IoV. Int. J. Electr. Comput. Eng. 2020, 10, 5409–5419. [Google Scholar] [CrossRef]
- Abu Talib, M.; Abbas, S.; Nasir, Q.; Mowakeh, M.F. Systematic literature review on Internet-of-Vehicles communication security. Int. J. Distrib. Sens. Netw. 2018, 14. [Google Scholar] [CrossRef] [Green Version]
- Abdus, S.; Shadab, A.; Mohammed, S.; Bokhari, M.U. Internet of Vehicles (IoV) requirements, attacks and countermeasures. In Proceedings of the 5 International Conference on "Computing for Sustainable Global Development", New Delhi, India, 14–16 March 2018; pp. 4037–4040. [Google Scholar]
- Sun, Y.; Wu, L.; Wu, S.; Li, S.; Zhang, T.; Zhang, L.; Xu, J.; Xiong, Y.; Cui, X. Attacks and countermeasures in the internet of vehicles. Ann. Telecommun. 2017, 72, 283–295. [Google Scholar] [CrossRef]
- Sun, Y.; Wu, L.; Wu, S.; Li, S.; Zhang, T.; Zhang, L.; Xu, J.; Xiong, Y. Security and privacy in the internet of vehicles. In Proceedings of the 2015 International Conference on Identification, Information, and Knowledge in the Internet of Things (IIKI), Beijing, China, 22–23 October 2015; pp. 116–121. [Google Scholar]
- Qu, F.; Wu, Z.; Wang, F.-Y.; Cho, W. A security and privacy review of VANETs. IEEE Trans. Intell. Transp. Syst. 2015, 16, 2985–2996. [Google Scholar] [CrossRef]
- Aouzellag, H.; Ghedamsi, K.; Aouzellag, D. Energy management and fault tolerant control strategies for fuel cell/ultra-capacitor hybrid electric vehicles to enhance autonomy, efficiency and life time of the fuel cell system. Int. J. Hydrogen Energy 2015, 40, 7204–7213. [Google Scholar] [CrossRef]
- Wu, W.; Yang, Z.; Li, K. Internet of Vehicles and applications. In Internet of Things; Elsevier: Amsterdam, The Netherlands, 2016; pp. 299–317. [Google Scholar]
- Al-Jarrah, O.Y.; Maple, C.; Dianati, M.; Oxtoby, D.; Mouzakitis, A. Intrusion detection systems for intra-vehicle networks: A review. IEEE Access 2019, 7, 21266–21289. [Google Scholar] [CrossRef]
- Sakiz, F.; Sen, S. A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV. Ad Hoc Netw. 2017, 61, 33–50. [Google Scholar] [CrossRef]
- Hao, Y.; Tang, J.; Cheng, Y. Cooperative Sybil attack detection for position based applications in privacy preserved VANETs. In Proceedings of the 2011 IEEE Global Telecommunications Conference-GLOBECOM 2011, Houston, TX, USA, 5–9 December 2011; pp. 1–5. [Google Scholar]
- Lee, B.; Jeong, E.; Jung, I. A DTSA (detection technique against a sybil attack) protocol using SKC (session key based certificate) on VANET. Int. J. Secur. Its Appl. 2013, 7, 1–10. [Google Scholar]
- Feng, X.; Li, C.; Chen, D.; Tang, J. A method for defensing against multi-source Sybil attacks in VANET. Peer-to-Peer Netw. Appl. 2017, 10, 305–314. [Google Scholar] [CrossRef] [Green Version]
- Chang, S.; Qi, Y.; Zhu, H.; Zhao, J.; Shen, X. Footprint: Detecting Sybil attacks in urban vehicular networks. IEEE Trans. Parallel Distrib. Syst. 2012, 23, 1103–1114. [Google Scholar] [CrossRef] [Green Version]
- Studer, A.; Luk, M.; Perrig, A. Efficient mechanisms to provide convoy member and vehicle sequence authentication in VANETs. In Proceedings of the 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops-SecureComm 2007, Nice, France, 17–21 September 2007; pp. 422–432. [Google Scholar]
- He, L.; Zhu, W.T. Mitigating DoS attacks against signature-based authentication in VANETs. In Proceedings of the 2012 IEEE International Conference on Computer Science and Automation Engineering (CSAE), Zhangjiajie, China, 25–27 May 2012; Volume 3, pp. 261–265. [Google Scholar]
- Al-Kahtani, M.S. Survey on security attacks in vehicular ad hoc networks (VANETs). In Proceedings of the 2012 6th International Conference on Signal Processing and Communication Systems, Gold Coast, Australia, 12–14 December 2012; pp. 1–9. [Google Scholar]
- Xie, Y.; Wu, L.; Shen, J.; Alelaiwi, A. EIAS-CP: New efficient identity-based authentication scheme with conditional privacy-preserving for VANETs. Telecommun. Syst. 2017, 65, 229–240. [Google Scholar] [CrossRef]
- Safi, S.M.; Movaghar, A.; Mohammadizadeh, M. A novel approach for avoiding wormhole attacks in VANET. In Proceedings of the 2009 Second International Workshop on Computer Science and Engineering, Qingdao, China, 28–30 October 2009; Volume 2, pp. 160–165. [Google Scholar]
- Biswas, S.; Mišić, J. A cross-layer approach to privacy-preserving authentication in WAVE-enabled VANETs. IEEE Trans. Veh. Technol. 2013, 62, 2182–2192. [Google Scholar] [CrossRef]
- Adjih, C.; Raffo, D.; Muhlethaler, P. Attacks against OLSR: Distributed key management for security. In Proceedings of the 2nd OLSR Interop/Workshop, Palaiseau, France, 28 August 2005; Volume 14, pp. 1–5. [Google Scholar]
- Wang, X.; Zeng, P.; Patterson, N.; Jiang, F.; Doss, R. An improved authentication scheme for internet of vehicles based on blockchain technology. IEEE Access 2019, 7, 45061–45072. [Google Scholar] [CrossRef]
- Xu, Z.; Liang, W.; Li, K.C.; Xu, J.; Jin, H. A blockchain-based Roadside Unit-assisted authentication and key agreement protocol for Internet of Vehicles. J. Parallel Distrib. Comput. 2021, 149, 29–39. [Google Scholar] [CrossRef]
- Yang, F.; Zhou, W.; Wu, Q.; Long, R.; Xiong, N.N.; Zhou, M. Delegated proof of stake with downgrade: A secure and efficient blockchain consensus algorithm with downgrade mechanism. IEEE Access 2019, 7, 118541–118555. [Google Scholar] [CrossRef]
- Blanchet, B. Proverif Automatic Cryptographic Protocol Verifier User Manual; CNRS: Paris, France; Departement dInformatique, Ecole Normale Superieure: Paris, France, 2005. [Google Scholar]
- Sharma, R.; Chakraborty, S. BlockAPP: Using blockchain for authentication and privacy preservation in IoV. In Proceedings of the IEEE Globecom Workshops (GC Wkshps), Abu Dhabi, United Arab Emirates, 9–13 December 2018; pp. 1–6. [Google Scholar] [CrossRef]
- Ahirwal, R.R.; Ahke, M. Elliptic curve diffie-hellman key exchange algorithm for securing hypertext information on wide area network. Int. J. Comput. Sci. Inf. Technol. 2013, 4, 363–368. [Google Scholar]
- Malik, N.; Nanda, P.; Arora, A.; He, X.; Puthal, D. Blockchain based secured identity authentication and expeditious revocation framework for vehicular networks. In Proceedings of the 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE, New York, NY, USA, 1–3 August 2018; pp. 674–679. [Google Scholar] [CrossRef]
- Khalique, A.; Singh, K.; Sood, S. Implementation of elliptic curve digital signature algorithm. Int. J. Comput. Appl. 2010, 2, 21–27. [Google Scholar] [CrossRef]
- Noh, J.; Jeon, S.; Cho, S. Distributed blockchain-based message authentication scheme for connected vehicles. Electronics 2020, 9, 74. [Google Scholar] [CrossRef] [Green Version]
- Kamal, M.; Srivastava, G.; Tariq, M. Blockchain-based lightweight and secured V2V communication in the internet of vehicles. IEEE Trans. Intell. Transp. Syst. 2020, 22, 3997–4004. [Google Scholar] [CrossRef]
- Benesty, J.; Chen, J.; Huang, Y.; Cohen, I. Pearson correlation coefficient. In Noise Reduction in Speech Processing; Springer: Berlin/Heidelberg, Germany, 2009; pp. 1–4. [Google Scholar]
- Javaid, U.; Aman, M.N.; Sikdar, B. A scalable protocol for driving trust management in internet of vehicles with blockchain. IEEE Internet Things J. 2020, 7, 11815–11829. [Google Scholar] [CrossRef]
- Bagga, P.; Sutrala, A.K.; Das, A.K.; Vijayakumar, P. Blockchain-based batch authentication protocol for Internet of Vehicles. J. Syst. Archit. 2021, 113, 101877. [Google Scholar] [CrossRef]
- Vangala, A.; Bera, B.; Saha, S.; Das, A.K.; Kumar, N.; Park, Y.H. Blockchain-enabled certificate-based authentication for vehicle accident detection and notification in intelligent transportation systems. IEEE Sens. J. 2020, 1748, 15824–15838. [Google Scholar] [CrossRef]
- Lin, C.; He, D.; Huang, X.; Kumar, N.; Choo, K.-K.R. BCPPA: A blockchain-based conditional privacy-preserving authentication protocol for vehicular ad hoc networks. IEEE Trans. Intell. Transp. Syst. 2020, 1–13. [Google Scholar] [CrossRef]
- Ma, Z.; Zhang, J.; Guo, Y.; Liu, Y.; Liu, X.; He, W. An efficient decentralized key management mechanism for VANET with blockchain. IEEE Trans. Veh. Technol. 2020, 69, 5836–5849. [Google Scholar] [CrossRef]
- Lu, Z.; Wang, Q.; Qu, G.; Zhang, H.; Liu, Z. A blockchain-based privacy-preserving authentication scheme for VANETs. IEEE Trans. Very Large Scale Integr. Syst. 2019, 27, 2792–2801. [Google Scholar] [CrossRef]
- Hu, W.; Hu, Y.; Yao, W.; Li, H. A blockchain-based byzantine consensus algorithm for information authentication of the internet of vehicles. IEEE Access 2019, 7, 139703–139711. [Google Scholar] [CrossRef]
- Cooper, M.C.; Herzig, A.; Maffre, F.; Maris, F.; Régnier, P. The epistemic gossip problem. Discrete Math. 2019, 342, 654–663. [Google Scholar] [CrossRef] [Green Version]
- Yao, Y.; Chang, X.; Misic, J.; Misic, V.B.; Li, L. BLA: Blockchain-assisted lightweight anonymous authentication for distributed vehicular fog services. IEEE Internet Things J. 2019, 6, 3775–3784. [Google Scholar] [CrossRef]
- Kaur, K.; Garg, S.; Kaddoum, G.; Gagnon, F.; Ahmed, S.H. Blockchain-based lightweight authentication mechanism for vehicular fog infrastructure. arXiv 2019, arXiv:1904.01168v1, 2019, 1–6, 1–6. [Google Scholar]
- Feng, Q.; He, D.; Zeadally, S.; Liang, K. BPAS: Blockchain-assisted privacy-preserving authentication system for vehicular ad hoc networks. IEEE Trans. Ind. Inform. 2020, 16, 4146–4155. [Google Scholar] [CrossRef]
- Salah, M.; Amine, M.; Friha, O.; Maglaras, L. EASBF: An efficient authentication scheme over blockchain for fog computing-enabled internet of vehicles. J. Inf. Secur. Appl. 2021, 59, 102802. [Google Scholar]
- Koblitz, N.; Menezes, A.J. The random oracle model: A twenty-year retrospective. Des. Codes Cryptogr. 2015, 77, 587–610. [Google Scholar] [CrossRef]
- Armando, A.; Basin, D.; Boichut, Y.; Chevalier, Y.; Compagna, L.; Cuéllar, J.; Drielsma, P.H.; Héam, P.-C.; Kouchnarenko, O.; Mantovani, J. The AVISPA tool for the automated validation of internet security protocols and applications. In Proceedings of the International Conference on Computer Aided Verification, Edinburgh, UK, 6–10 July 2005; Springer: Berlin/Heidelberg, Germany, 2005; pp. 281–285. [Google Scholar]
- Wang, L.; Zheng, D.; Guo, R.; Hu, C.; Jing, C. A blockchain-based privacy-preserving authentication scheme with anonymous identity in vehicular networks. Int. J. Netw. Secur. 2020, 22, 981–990. [Google Scholar] [CrossRef]
- Tan, H.; Chung, I. Secure authentication and key management with blockchain in VANETs. IEEE Access 2020, 8, 2482–2498. [Google Scholar] [CrossRef]
- Pei, D.; Salomaa, A.; Ding, C. Chinese Remainder Theorem: Applications in Computing, Coding, Cryptography; World Scientific: Singapore, 1996; ISBN 981449836X. [Google Scholar]
- Zhang, Y.; Tong, F.; Xu, Y.; Tao, J.; Cheng, G. A privacy-preserving authentication scheme for VANETs based on consortium blockchain. In Proceedings of the 2020 IEEE 92nd Vehicular Technology Conference (VTC2020-Fall), Victoria, BC, Canada, 18 November–16 December 2020. [Google Scholar] [CrossRef]
Ref. | Year | Target Area | VANETs to IoV Transition | Security Attacks and/or Requirements | Blockchain-Based Authentication | Features |
---|---|---|---|---|---|---|
[47] | 2017 | IoT | X | √ | X |
|
[48] | 2017 | VANETs | X | √ | X |
|
[49] | 2019 | IoT | X | √ | X |
|
[50] | 2019 | VANETs | X | √ | X |
|
[51] | 2020 | VANETs | X | X | X |
|
[52] | 2020 | IoV | √ | √ | X |
|
[53] | 2020 | IoV | √ | X | √ |
|
[54] | 2021 | IoV | √ | X | X |
|
[55] | 2021 | IoV | X | √ | √ |
|
Our survey | 2021 | VANETs and IoV | √ | √ | √ |
|
Attack Targets | Description | Examples | Attack Type |
---|---|---|---|
Availability | Attacks that affect the IoV system’s availability normally use techniques that can make the bandwidth and transmission power of the IoV system unusable by occupying its maximum resource capacity. |
| Active |
| Active | ||
| Active | ||
Authentication | Attacks that fake the identity of the original sender and act on its behalf, which could be used to spread harmful information in the network. |
| Active |
| Active | ||
| Passive/Active | ||
| Active | ||
| Active | ||
Data Integrity | Attacks that tamper with the original message content to badly affect the decisions of the receiving entity which could threaten the overall system. |
| Active |
| Active | ||
Confidentiality | Attacks that compromise the privacy of data through receiving unauthorized copies of the messages being transmitted between the legitimate sending and receiving entities by an illegal third party. |
| Passive/Active |
| Passive | ||
| Active | ||
Routing | Attacks that manipulate the original route of a packet by injecting some malicious recipients in the middle to eavesdrop or even sometimes alter the message before further forwarding it towards its targeted destination. |
| Passive |
| Active | ||
| Active | ||
| Active |
Attack | Targeted OSI Layer | Possible Solutions | References |
---|---|---|---|
Sybil attack | Network layer | Group signatures, session key certificates, event based reputation system, footprint | [100,101,102,103] |
GPS deception attack | Physical layer | Dead reckoning, signature-based mechanisms | [104,105] |
Masquerading/Impersonation attack | Multi-layer (Physical, Data link, Network, Transport, and Application layers) | Digital certificates, identity-based cryptography | [106,107] |
Wormhole attack | Network layer | Geographical leashes | [108,109] |
Replay attack | Network layer | Timestamps | [110] |
Ref. | Technique | Attack Counteracted | Network Model and Entities (Other than Blockchain) | Evaluation | Metrics | Features and Limitations | Privacy Preservation of Vehicle’s Identity? |
---|---|---|---|---|---|---|---|
[111] |
|
|
|
|
|
| No |
[112] |
|
|
|
|
|
| Yes |
[115] |
|
|
|
|
|
| Yes |
[117] |
|
|
|
|
|
| Yes |
[119] |
|
|
|
|
|
| Yes |
Ref. | Technique | Attack Counteracted | Network Model and Entities (Other than Blockchain) | Evaluation | Metrics | Features and Limitations | Privacy Preservation of Vehicle’s Identity? |
---|---|---|---|---|---|---|---|
[120] | Link fingerprinting | Replay |
|
|
|
| No |
[122] |
|
|
|
|
|
| Yes |
[123] |
|
|
|
|
|
| Yes |
[124] |
|
|
|
|
|
| Yes |
[125] |
|
|
|
|
|
| Yes |
[126] |
|
|
|
|
|
| No |
[127] |
|
|
|
|
|
| Yes |
Ref. | Technique | Attack Counteracted | Network Model and Entities (Other than Blockchain) | Evaluation | Metrics | Features and Limitations | Privacy Preservation of Vehicle’s Identity? |
---|---|---|---|---|---|---|---|
[128] |
| Byzantine/faulty nodes attack |
| Mathematical modeling | Simple data comparisons |
| No |
[130] |
| Impersonation |
|
| Time overhead (ms) |
| Yes |
[131] |
|
|
|
|
|
| Yes |
[132] |
|
|
|
| Time overhead (5.693 s) |
| Yes |
[133] |
|
|
|
|
|
| Yes |
[136] | Elliptic curve cryptography | Replay attacks |
| Not specified |
|
| Yes |
[137] |
|
|
|
|
|
| Yes |
[139] |
|
|
|
|
|
| Yes |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Abbas, S.; Talib, M.A.; Ahmed, A.; Khan, F.; Ahmad, S.; Kim, D.-H. Blockchain-Based Authentication in Internet of Vehicles: A Survey. Sensors 2021, 21, 7927. https://doi.org/10.3390/s21237927
Abbas S, Talib MA, Ahmed A, Khan F, Ahmad S, Kim D-H. Blockchain-Based Authentication in Internet of Vehicles: A Survey. Sensors. 2021; 21(23):7927. https://doi.org/10.3390/s21237927
Chicago/Turabian StyleAbbas, Sohail, Manar Abu Talib, Afaf Ahmed, Faheem Khan, Shabir Ahmad, and Do-Hyeun Kim. 2021. "Blockchain-Based Authentication in Internet of Vehicles: A Survey" Sensors 21, no. 23: 7927. https://doi.org/10.3390/s21237927
APA StyleAbbas, S., Talib, M. A., Ahmed, A., Khan, F., Ahmad, S., & Kim, D. -H. (2021). Blockchain-Based Authentication in Internet of Vehicles: A Survey. Sensors, 21(23), 7927. https://doi.org/10.3390/s21237927