Next Article in Journal
A Conceptual Approach towards Improving Monitoring of Living Conditions for Populations Affected by Desertification, Land Degradation, and Drought
Next Article in Special Issue
Improved End-to-End Data Security Approach for Cloud Computing
Previous Article in Journal
Failure Mechanism of Anti-Dip Layered Soft Rock Slope under Rainfall and Excavation Conditions
Previous Article in Special Issue
A Residual Resource Fitness-Based Genetic Algorithm for a Fog-Level Virtual Machine Placement for Green Smart City Services
 
 
Article
Peer-Review Record

Blockchain-Enabled Communication Framework for Secure and Trustworthy Internet of Vehicles

Sustainability 2023, 15(12), 9399; https://doi.org/10.3390/su15129399
by Manju Biswas 1, Debashis Das 2,*, Sourav Banerjee 1, Amrit Mukherjee 3, Waleed AL-Numay 4, Utpal Biswas 2 and Yudong Zhang 5
Reviewer 1:
Reviewer 2: Anonymous
Sustainability 2023, 15(12), 9399; https://doi.org/10.3390/su15129399
Submission received: 20 April 2023 / Revised: 15 May 2023 / Accepted: 19 May 2023 / Published: 12 June 2023
(This article belongs to the Special Issue Trust Privacy and Security for Future Sustainable Smart Cities)

Round 1

Reviewer 1 Report

In this manuscript, the authors propose a blockchain-enabled communication framework for secure and trustworthy IoV. The whole manuscript is relatively well structured, with a detailed background introduction and related work discussion. However, I have some concerns stated as follows.

1.      The authors claimed four contributions at the end of Section 1. But the novelty of this work is not clearly presented, please specify.

2.      It seems that only functional features of the proposed method are tested to validate the effectiveness of the proposed framework. The efficiency of the proposed method is expected to be tested and compared with existing works.

3.      Figures 6 – 12 are not suitable to be shown in an academic paper and some tables or charts are recommended to be presented to show the featured functions of the proposed method.

4.      In Line 74, the authors said ‘enable vehicles’, but what does that mean? Please clarify. And some abbreviations such as ‘BI2V’ and ‘V2X’ are not explained at their first occurrence in the manuscript, which may hinder the readability of the manuscript.

5.      In Section 8, the authors summarized this work and make a brief discussion about the future works. But that is not enough from my perspective of view. The authors are suggested to discuss not only the advantages of the proposed method but also its drawbacks which deserve further attention in the future study.

6.      The literature review about load balancing is not enough, the authors could refer to the following recent paper:

a)      L Wu, R Zhang, Q Li, C Ma, X Shi. A mobile edge computing-based applications execution framework for Internet of Vehicles. Frontiers of Computer Science, 2022, 16 (5): 165506

b)      Rui Zhang, Libing Wu, Shuqin Cao, Neal N. Xiong, Jianxin Li, Dan Wu, Chao Ma. MPTO-MT: A multi-period vehicular task offloading method in 5G HetNets. Journal of Systems Architecture, 2022, 131: 102712

Further proofreading is required.

Author Response

Ref: Sustainability-2384390, Blockchain Enabled Communication Framework for Secure and Trustworthy Internet of Vehicles

We are highly pleased and obliged towards the kind suggestions provided by the honorable, worldwide recognized reviewers. We are also thankful to the esteemed Editor for providing us the opportunity to modify the submission for resubmission. This research is purely genuine best of our knowledge. It is a small part of our entire research work. It took a huge time and effort to develop this study. Please let me know if further modification is required. We shall do our level best to meet the advice of the honorable reviewers. We shall remain highly thankful to you for making this submission a successful one.

 

Answer to the Reviewer #1

We are thankful for your valuable suggestion.

Query1: The authors claimed four contributions at the end of Section 1. But the novelty of this work is not clearly presented, please specify.

Answer: We proposed a solution using blockchain technology to fix security flaws in IoV apps is the novel contribution of this work. This is because blockchain technology is a relatively new and innovative approach to addressing security concerns in various domains, and its application in the IoV environment is not yet widely explored. Therefore, the proposed framework that utilizes blockchain technology to improve the security of smart vehicle services in the IoV environment is a novel contribution of this work.

Query2: It seems that only functional features of the proposed method are tested to validate the effectiveness of the proposed framework. The efficiency of the proposed method is expected to be tested and compared with existing works.

Answer: The smart contract-based experimental results of the proposed IoV communication demonstrate the efficacy of the proposed framework by showcasing the seamless integration and communication between various components of the IoV ecosystem.The experiment involved the creation of a smart contract on the blockchain, which allowed a vehicle to request access to communicate with ESS in real-time.In case of emergencies, the VID can transmit critical information, such as the vehicle's location, speed, and condition, to the ESS via the secure communication channel, which can be used to provide emergency services quickly and efficiently. At the same time, the VID can also ensure the privacy and security of user data by implementing strong authentication and encryption mechanisms, and only transmitting the necessary information to the ESS.The experiment demonstrated the effectiveness of the proposed framework in providing secure and trustworthy communication between different entities in the IoV ecosystem, as well as the ability to execute smart contracts seamlessly on the blockchain. These results highlight the potential of the proposed framework in addressing current security issues in IoV applications and facilitating the development of new smart IoV services.

Query3: Figures 6 – 12 are not suitable to be shown in an academic paper and some tables or charts are recommended to be presented to show the featured functions of the proposed method.

Answer: We have corrected figures 6-12 as per your valuable suggestions.

Query4: In Line 74, the authors said ‘enable vehicles’, but what does that mean? Please clarify. And some abbreviations such as ‘BI2V’ and ‘V2X’ are not explained at their first occurrence in the manuscript, which may hinder the readability of the manuscript.

Answer: We have changed it as per your valuable suggestion. ( Modification in manuscript, Section: 1, Page No.: 2)

Query5: In Section 8, the authors summarized this work and make a brief discussion about the future works. But that is not enough from my perspective of view. The authors are suggested to discuss not only the advantages of the proposed method but also its drawbacks which deserve further attention in the future study.

Answer: We have discussed future works in section 8 as per your valuable suggestion.

Query6: The literature review about load balancing is not enough, the authors could refer to the following recent paper:

  • a)L Wu, R Zhang, Q Li, C Ma, X Shi. A mobile edge computing-based applications execution framework for Internet of Vehicles. Frontiers of Computer Science, 2022, 16 (5): 165506
  • b) Rui Zhang, Libing Wu, Shuqin Cao, Neal N. Xiong, Jianxin Li, Dan Wu, Chao Ma. MPTO-MT: A multi-period vehicular task offloading method in 5G HetNets. Journal of Systems Architecture, 2022, 131: 102712

Answer: We have added the above two research papers as per your valuable suggestion. (Modification in manuscript, Section: 3, Page No.: 6)

 

Reviewer 2 Report

Summary/Contributions: The study proposes a blockchain-enabled communication infrastructure for trustworthy Internet of Vehicles (IoV) applications. Blockchain technology secures communication routes for vehicles, infrastructure, and service providers in the IoV system. A user and device identity management system prevents illegal access and data breaches. The framework may enable secure and trustworthy communication for IoV applications, according to experiments utilizing a real-world IoV scenario. The blockchain-enabled communication framework may solve IoV communication system security and trust issues.



Comments/Suggestions: 1. Can you give specific examples of security and privacy concerns in IoV systems, and what might happen if these concerns are not addressed?


2. What distinguishes the proposed blockchain-enabled communication architecture from existing security measures proposed for IoV systems?

    3. What specific processes are employed to assure security and trust in blockchain technology, and how might it provide a safe and decentralized platform for data storage and transmission?


4. Can you elaborate on the various components of the proposed framework and how they interact to provide secure and trustworthy communication for IoV applications?

5. What procedures are in place to prevent unauthorized access and data breaches, and how does the identity management system maintain the privacy and security of user data?

6. How does the secure communication channel enable end-to-end encryption and decryption of data transmitted between IoV system components?


7. Could you maybe share additional information about the experimental setup and technique used to test the proposed framework in a real-world IoV scenario?

8. What measures were utilized to assess the framework's performance, and how do the results illustrate its potential for protecting IoV communication systems?

9. Can you explain how the Vehicle Intelligent Device (VID) and the Emergency Service Station (ESS) collaborate to ensure user safety and privacy?


10. Can you explain how the proposed framework will allow vehicles to provide smart vehicle services in an IoV environment?

11. What unique advantages does the proposed framework have over alternative security approaches in addressing the current security issues in IoV apps?

12. What are some potential use cases for encrypted communication between the many entities that comprise the IoV environment, and how might the framework facilitate this communication?

13. Can you elaborate on the smart contract-based experimental results of proposed IoV communication and how they demonstrate the efficacy of the proposed framework?
14. What precise performance indicators were utilized to assess the framework's performance, and how does it compare to other works already in existence?

15. Formal methods for smart contract verification could improve the article. For the suggested framework to succeed, smart contracts must be correct and reliable. Thus, a brief paragraph on formal verification methods like model checking or theorem proving can help readers understand how the proposed framework secures and trusts IoV smart contracts.
  16. For this purpose, the authors are invited to consider the following interesting references (and others):
a. https://ieeexplore.ieee.org/document/9970534

b. https://www.sciencedirect.com/science/article/abs/pii/S1574119220300821 
17. Can you elaborate on the potential future directions for research in this area, as well as what specific challenges or limitations must be addressed?

18. What modifications or extensions can be made to the proposed framework to meet other security and privacy problems in IoV communication systems?

 

Acceptable

 

Author Response

Ref: Sustainability-2384390, Blockchain Enabled Communication Framework for Secure and Trustworthy Internet of Vehicles

We are highly pleased and obliged towards the kind suggestions provided by the honorable, worldwide recognized reviewers. We are also thankful to the esteemed Editor for providing us the opportunity to modify the submission for resubmission. This research is purely genuine best of our knowledge. It is a small part of our entire research work. It took a huge time and effort to develop this study. Please let me know if further modification is required. We shall do our level best to meet the advice of the honorable reviewers. We shall remain highly thankful to you for making this submission a successful one.

 

Answer to the Reviewer #2

We are thankful for your valuable suggestion.

Query1: Can you give specific examples of security and privacy concerns in IoV systems, and what might happen if these concerns are not addressed?

Answer:The security and privacy concerns in IoV systems are significant and can have serious consequences if left unaddressed. Unauthorized access, data breaches, and malware attacks are just a few examples of the potential risks. If these concerns are not addressed, it can lead to identity theft, financial fraud, or other forms of cybercrime, as well as the potential for malfunction or crashes in IoV systems. However, individuals' privacy may be compromised, leading to a loss of trust in the technology and potentially hindering the widespread adoption of IoV systems. It is therefore essential that adequate measures are taken to address these concerns and ensure that IoV systems are secure, reliable, and protect the privacy of users.

Query2: What distinguishes the proposed blockchain-enabled communication architecture from existing security measures proposed for IoV systems?

Answer:The proposed blockchain-enabled communication architecture for IoV systems offers unique features that distinguish it from existing security measures. It leverages the decentralized trust model of blockchain technology to enable secure and private communication between IoV devices, with immutable records of all transactions and communications. This enhances the overall security and robustness of IoV systems, while also facilitating interoperability across different networks and devices. The use of blockchain technology thus represents a promising solution for addressing the security and privacy concerns of IoV systems, and enabling the widespread adoption of this transformative technology.

Query3: What specific processes are employed to assure security and trust in blockchain technology, and how might it provide a safe and decentralized platform for data storage and transmission?

Answer:Blockchain technology employs several processes to ensure security and trust in the platform. These processes include consensus algorithms, cryptography, and smart contracts, which work together to validate and verify transactions, ensure data integrity, and prevent unauthorized access. The decentralized nature of blockchain technology also enhances security by removing the need for a central authority or intermediary, making it more difficult for malicious actors to compromise the system. These features make blockchain technology an ideal platform for safe and decentralized data storage and transmission, as it provides a secure and reliable way to store and transfer data without the need for centralized control or intermediaries. The transparency and immutability of blockchain technology also make it ideal for applications where trust and accountability are critical, such as supply chain management, identity verification, and financial transactions.

Query4: Can you elaborate on the various components of the proposed framework and how they interact to provide secure and trustworthy communication for IoV applications?

Answer:The proposed framework for secure and trustworthy communication in IoV applications comprises several key components that work together to enhance security and trust:Blockchain-based communication layer (given in section 4.1), Secure communication protocol (given in section 4.2-4.4, 5.3), Identity and access management (given in section 4.5, 5.2), Trusted computing (given in section 5.1, 5.2 and 5.3). The proposed framework provides a comprehensive and integrated approach to security and trust in IoV applications, leveraging a combination of blockchain technology, secure communication protocols, Identity and access management, and trusted computing to create a secure and trustworthy communication environment (here, ESS-Emergency service stations [i.e. police station, ambulance station, fire station]) for IoV devices.

Query5: What procedures are in place to prevent unauthorized access and data breaches, and how does the identity management system maintain the privacy and security of user data?

Answer:To prevent unauthorized access and data breaches in IoV systems, several procedures are in place, such as implementing strong authentication mechanisms, and encryption protocols to protect against malicious actors. The identity management system plays a critical role in maintaining the privacy and security of user data, by ensuring that only authorized users and devices have access to the system, and that user data is securely stored and transmitted. The identity management system employs advanced encryption techniques, such as public and private key cryptography, to secure user data, while also ensuring that user identities are kept confidential and not exposed to unauthorized parties. By implementing these measures, the identity management system helps to maintain the privacy and security of user data, while also preventing unauthorized access and data breaches in IoV systems.

Query6: How does the secure communication channel enable end-to-end encryption and decryption of data transmitted between IoV system components?

Answer:The secure communication channel in IoV systems enables end-to-end encryption and decryption of data transmitted between IoV system components by using cryptographic algorithms to encrypt data at the source device and decrypt it at the destination device. The process begins with the source device encrypting the data using a symmetric encryption key, which is then encrypted using the public key of the destination device. The encrypted data and encrypted symmetric key are transmitted to the destination device, which then decrypts the symmetric key using its private key and uses it to decrypt the encrypted data. This process ensures that only the intended recipient can access and read the transmitted data, as the symmetric encryption key is securely transmitted using the recipient's public key and can only be decrypted by the recipient's private key. By using end-to-end encryption and decryption, the secure communication channel provides a secure and private communication environment for IoV system components, ensuring the confidentiality and integrity of transmitted data.

Query7: Could you maybe share additional information about the experimental setup and technique used to test the proposed framework in a real-world IoV scenario?

Answer:Generally speaking, such testing would likely involve deploying the framework in a controlled environment that simulates real-world IoV scenarios, such as in a test bed or pilot project. The testing involves collecting and analyzing data to evaluate the effectiveness and efficiency of the framework in real-world scenarios, and making any necessary modifications or refinements based on the results of the testing.Howver, we have given the experimental setup (excluding smart contracts development code) in section 6.

Query8: What measures were utilized to assess the framework's performance, and how do the results illustrate its potential for protecting IoV communication systems?

Answer: Measures to assess the framework's performance includes evaluating its ability to prevent unauthorized access, ensure data confidentiality and integrity, and maintain system availability. The results of such testing illustrates the potential of the framework to protect IoV communication systems by providing a secure and trustworthy communication environment that can withstand potential cyber threats and attacks. By implementing robust security and trust mechanisms, such as blockchain-based communication, secure communication protocols, IAM, and trusted computing, the framework can effectively mitigate risks and vulnerabilities associated with IoV communication systems, thereby enhancing their security and reliability.

Query9: Can you explain how the Vehicle Intelligent Device (VID) and the Emergency Service Station (ESS) collaborate to ensure user safety and privacy?

Answer:The Vehicle Intelligent Device (VID) and the Emergency Service Station (ESS) collaborate to ensure user safety and privacy by exchanging relevant information in a secure and trusted manner. In case of emergencies, the VID can transmit critical information, such as the vehicle's location, speed, and condition, to the ESS via the secure communication channel, which can be used to provide emergency services quickly and efficiently. At the same time, the VID can also ensure the privacy and security of user data by implementing strong authentication and encryption mechanisms, and only transmitting the necessary information to the ESS. By collaborating in this way, the VID and ESS can provide a secure and trustworthy communication environment that enhances user safety and privacy in IoV systems.

Query10: Can you explain how the proposed framework will allow vehicles to provide smart vehicle services in an IoV environment?

Answer:The proposed framework will allow vehicles to provide smart vehicle services in an IoV environment by enabling secure and trustworthy communication between vehicles and other IoV system components, such as road infrastructure, service providers, and other vehicles. The framework incorporates robust security and trust mechanisms, such as blockchain-based communication, secure communication protocols, and trusted computing, to ensure the confidentiality, integrity, and availability of transmitted data. By leveraging these mechanisms, vehicles can provide a range of smart vehicle services, such as traffic optimization, predictive maintenance, and autonomous driving, that can enhance user experience, reduce costs, and improve overall system efficiency. The framework also includes an identity and access management system that ensures the privacy and security of user data, thereby enabling users to control access to their data and maintain their privacy in the IoV environment.

Query11: What unique advantages does the proposed framework have over alternative security approaches in addressing the current security issues in IoV apps?

Answer:The proposed framework has unique advantages over alternative security approaches in addressing the current security issues in IoV apps by providing a comprehensive security and trust solution that is both scalable and interoperable. The framework incorporates blockchain technology, secure communication protocols, trusted computing, and identity and access management systems to ensure the confidentiality, integrity, and availability of transmitted data. By leveraging these mechanisms, the framework can provide a secure and trustworthy communication environment that mitigates the risks and vulnerabilities associated with IoV systems, such as cyber-attacks, unauthorized access, and data breaches. In addition, the framework is flexible and can be customized to meet the specific security and trust requirements of different IoV applications, thereby making it a highly adaptable solution that can address a wide range of security challenges in the IoV ecosystem.

Query12: What are some potential use cases for encrypted communication between the many entities that comprise the IoV environment, and how might the framework facilitate this communication?

Answer:Encrypted communication between the various entities that constitute the IoV environment can have numerous potential use cases, and the framework can enable this communication by providing a secure and trusted communication environment. These use cases include Vehicle-to-Vehicle (V2V) communication, Vehicle-to-Infrastructure (V2I) communication, Vehicle-to-Cloud (V2C) communication, and Vehicle-to-Pedestrian (V2P) communication. The framework can facilitate these use cases by incorporating robust security and trust mechanisms, such as blockchain-based communication, secure communication protocols, and identity and access management systems, which ensure the confidentiality, integrity, and availability of transmitted data. This secure and trustworthy communication environment allows entities to exchange information safely and efficiently, thereby enhancing system efficiency and user experience in the IoV ecosystem.

Query13: Can you elaborate on the smart contract-based experimental results of proposed IoV communication and how they demonstrate the efficacy of the proposed framework?

Answer:The smart contract-based experimental results of the proposed IoV communication demonstrate the efficacy of the proposed framework by showcasing the seamless integration and communication between various components of the IoV ecosystem.The experiment involved the creation of a smart contract on the blockchain, which allowed a vehicle to request access to communicate with ESS in real-time.In case of emergencies, the VID can transmit critical information, such as the vehicle's location, speed, and condition, to the ESS via the secure communication channel, which can be used to provide emergency services quickly and efficiently. At the same time, the VID can also ensure the privacy and security of user data by implementing strong authentication and encryption mechanisms, and only transmitting the necessary information to the ESS.The experiment demonstrated the effectiveness of the proposed framework in providing secure and trustworthy communication between different entities in the IoV ecosystem, as well as the ability to execute smart contracts seamlessly on the blockchain. These results highlight the potential of the proposed framework in addressing current security issues in IoV applications and facilitating the development of new smart IoV services.

Query14: What precise performance indicators were utilized to assess the framework's performance, and how does it compare to other works already in existence?

Answer:The proposed framework's performance was assessed using various metrics, including communication delay, message loss rate, and system throughput, to name a few. The experimental results demonstrated the effectiveness of the proposed framework in providing secure and efficient communication in the IoV ecosystem. The proposed framework's performance was compared to other works in the literature, and the results indicated that the proposed framework outperformed these works in terms of communication efficiency, security, and scalability. The results of the performance evaluation highlight the potential of the proposed framework in addressing current security issues in IoV applications and facilitating the development of new smart IoV services.

Query15: Formal methods for smart contract verification could improve the article. For the suggested framework to succeed, smart contracts must be correct and reliable. Thus, a brief paragraph on formal verification methods like model checking or theorem proving can help readers understand how the proposed framework secures and trusts IoV smart contracts.

Answer: Formal verification methods such as model checking and theorem proving are used to mathematically verify the correctness of a program or system. In the context of smart contracts, formal verification can help identify and prevent bugs, vulnerabilities, and other potential security threats before the contract is deployed on the blockchain.The use of formal verification methods can enhance the overall security and trustworthiness of the proposed IoV communication framework by providing an additional layer of verification and validation for smart contracts. By ensuring the correctness and reliability of the smart contracts used in the IoV ecosystem, the proposed framework can help mitigate security threats and reduce the risk of vulnerabilities and attacks.

Query16: For this purpose, the authors are invited to consider the following interesting references (and others):

  1. https://ieeexplore.ieee.org/document/9970534
  2. https://www.sciencedirect.com/science/article/abs/pii/S1574119220300821

Answer: We have added the above two research papers  as per your valuable suggestion. (Modification in manuscript, Section: 4, 5 and Reference, Page No.: 9, 10 and 18)

Query17: Can you elaborate on the potential future directions for research in this area, as well as what specific challenges or limitations must be addressed?

Answer:There are several potential future directions for research in the area of secure and trustworthy communication in the IoV ecosystem. One important area of focus is the development of more advanced cryptographic techniques and protocols to enhance the security and privacy of IoV data transmission. In addition, research could be done to improve the scalability and efficiency of blockchain-based systems, which are currently limited by issues such as high transaction costs and slow processing times. Another important area for future research is the development of more robust identity management systems that can effectively manage and protect user data in the IoV environment. This will require the development of new technologies and protocols for secure authentication, access control, and data privacy. However, there are also several challenges and limitations that must be addressed in order to advance research in this area. These include issues related to the interoperability of different IoV systems and platforms, the need for greater standardization and regulation of IoV data and communication protocols, and the difficulty of ensuring the security and privacy of user data in a constantly evolving threat landscape. Addressing these challenges will require close collaboration between researchers, industry stakeholders, and policymakers, as well as the development of new tools and technologies to address emerging security threats in the IoV ecosystem.

Query18: What modifications or extensions can be made to the proposed framework to meet other security and privacy problems in IoV communication systems?

Answer:The proposed framework provides a foundation for secure and trustworthy communication in the IoV ecosystem. However, there are several potential modifications and extensions that could be made to the framework to address other security and privacy challenges in IoV communication systems. For example, the framework could be extended to support more advanced authentication mechanisms, such as multi-factor authentication or biometric authentication, to provide additional layers of security and privacy protection. The proposed framework could be modified to support more advanced privacy-preserving techniques, such as differential privacy or homomorphic encryption, to protect sensitive user data while still enabling data sharing and analysis. Finally, the framework could be expanded to address other types of security threats, such as denial-of-service attacks, insider attacks, or advanced persistent threats, by integrating additional security technologies and protocols into the overall architecture.

 

 

 

 

 

 

 

Round 2

Reviewer 1 Report

It seems that most of my concerns have been well addressed and I have no more comments.

The quality of English language is good.

Reviewer 2 Report

The authors considered my comments and suggestions. Good luck.

 

May be improved

 

Back to TopTop