1. Introduction
According to a study accomplished by the United Nations (UN), it is estimated that urbanization will continue to increase in the approaching decades. Approximately one billion people will live in cities by 2050. Megacities are also expected to grow steadily. The UN has estimated that by 2030, the number of mega-cities will settle at 43, leading urban sustainability to the forefront. However, it is necessary to take into account that poor city planning and inefficient transportation infrastructure are considered as major problems of urbanization for their negative impact on congestion and mobility in cities.
As a proposed solution, the use of Traffic Light Systems (TLSs) in intersections showed efficiency in reducing accidents and traffic congestion in urban areas, conforming to international traffic accident statistics. These systems encompass several traffic signals handled by a traffic controller. Traditional traffic light systems do not deliver sufficient real-time road traffic information which helps to reduce congestion in cities, greenhouse gas emissions, and fuel consumption for vehicles. Conversely, the advanced technology of communication and sensing technologies, including Wireless Sensor Networks (WSN), as well as the emergence of recent paradigms, namely machine learning, fog computing, and blockchain technology, are potential solutions for overcoming the limitations of the existing traffic light systems.
A modern traffic light system has three key layers: data collection, processing, and exploitation. The data sensing stage enables the fusion of traffic-related data from numerous sensors, which may be of diverse sorts, such as anisotropic magnetoresistive, acoustic, and optical sensors (cameras). The magnetoresistive sensor is a non-intrusive method that operates in many environmental conditions [
1]. Additionally, it can be used to classify, count the number of vehicles, and determine the speed of moving cars. Moreover, it is affordable and simple to set up [
2].
Sensing data is gathered and combined into a single format that is prepared for release to traffic-related apps for additional processing. The traffic light system uses the collected data to offer multiple services, namely, the prediction of traffic-related air pollution (TRAP), vehicle routing, and congestion prevention. Recent studies on the last item use deep reinforcement learning to grant emergency vehicles priority over other vehicles and machine learning techniques to predict traffic flow [
3,
4].
Cloud computing is typically used by the outdated traffic light system for data analysis and decision-making. In major cities, numerous traffic light controllers must cooperate and share traffic data in order to achieve network-wide objectives. A cloud-centric traffic light system creates a lot of traffic data that needs to be transferred from many locations, which increases network latency, exposes the data to security risks, and necessitates more energy. To overcome those limitations, a fog-based computer architecture was proposed in Ref. [
5]. Despite the fact that fog-IoT integration consumes less energy and has lower latency than cloud-IoT integration, data-sensing devices, also known as end nodes, are unquestionably vulnerable to a range of security threats. For example, a hacker may utilize the sensor node and fog node of an intelligent traffic system to broadcast false information about the flow and density of the traffic. At significant intersections, malicious alteration of traffic data might potentially result in tragic collisions.
An effective method for tackling security concerns is access control, which includes the phases of authentication and authorization [
6,
7]. It is worth mentioning that a variety of recently published papers tackled user authentication in various IoT applications but did not address the severe ramifications of leveraging unauthenticated devices. A secure data-sensing phase will surely be ensured by the secure transfer of the generated data. In fact, blockchain technology might be a better choice for handling traffic light systems’ initial stage security. Immutability, decentralization, robustness, and adaptability are some of the key attributes of the blockchain. Additionally, it resolves the single point of failure problem.
Few papers have focused on security issues in traffic light systems. In 2021, Ben Dhaou [
1] presented a sensor node with IoT-enabled security for the management of the traffic light system. Indeed, in the proposed solution the author concentrated his efforts on designing the node using the Zigbee communication protocol, a magnetoresistive sensor, and a microcontroller. The node is responsible for reporting the level of service at each intersection providing useful information for traffic management authorities. In addition, Ben Dhaou managed the security using the Elliptic Curve Digital Signature Algorithm (ECDSA) to sign the data generated by a sensor in one intersection. However, ensuring a good level of security while reducing computational complexity and energy savings was not the priority of the author.
All of the aforementioned issues, as well as the relevance of security in a related application field, motivated the search for a solution that permits a secure collaboration between multiple traffic light systems scattered around a city. Because of the characteristics of the system, a lightweight Vehicle Detector Authentication Scheme (VDAS) was developed to provide secure communication between neighboring traffic light systems while also accounting for IoT resource constraints. Before traffic data can be gathered, a sensor must first be identified by the system, and a constant secure connection must be established between the sensor node and the traffic light controller. Consequently, a tampered-with or malicious sensor would not disturb the operation of the network traffic light system. The authentication system (VDAS) is also coupled with blockchain technology to make use of its decentralization feature and to solve the single point of failure issue. This work’s main goal is to concurrently authenticate the sensor and the controller while ensuring the secure transmission of data in a constrained environment (processing power and memory size).
This paper represents an extension of the conference paper [
1]. The main contributions of this paper are the following:
Enhance the vehicle detection and counting algorithm to incorporate multiple sensors in various locations in the lane;
Propose a blockchain-based Vehicle Detector Authentication Scheme (VDAS) in a Fog-based architecture for networked traffic light systems;
Present formal and informal verifications of the proposed authentication strategy and validate the suggested scheme using simulation.
The paper is structured as follows.
Section 2 presents the recent related work papers.
Section 3 describes the proposed architecture while giving a brief description of blockchain technology and fog computing architecture.
Section 4 presents the Vehicle-Detector Authentication Scheme (VDAS) for collaborative traffic light systems.
Section 5 provides the formal and informal verification of the proposed scheme. The implementation details are given in
Section 6. A discussion is presented in
Section 7. Finally,
Section 8 concludes the paper.
2. Related Work
The use of blockchain in intelligent transportation systems is a new area of study. Blockchain has been utilized in the Internet of Vehicle (IoV) to increase security (storage and communication) and to generate a value-added service, as detailed in Ref. [
8]. A slew of access-control techniques based on blockchain technology have recently been developed to safeguard IoT devices and services [
7].
A blockchain-based access control scheme in a smart grid environment was presented by Zhou et al. [
9]. They used an identity-based combined encryption, signature, and signcryption scheme. Besides, the authors tried to solve the key escrow problem of the untrusted third party by designing a consensus algorithm in the power system. The performance evaluation of the proposed scheme showed a lower communication and computational costs compared to existing solutions. However, the authors did not present the formal and informal verification of the proposal.
Kumari et al. [
10] discussed the performance evaluation among a traditional smart grid architecture, a smart grid with cloud computing architecture, and a smart grid with cloud computing and fog layer. The authors observed that the fog layer reduced the bandwidth while ensuring data protection. Furthermore, the proposed 5G-enabled three-tier architecture reduced the end-to-end latency.
Rodriguez et al. [
11] analyzed and compared two existing authentication protocols developed for wireless sensor networks (WSNs). Then, they adjusted them for the use in unmanned aerial vehicles (UAV). The examination of the offered techniques revealed that the Drone to Ground Control Station (GCS) authentication required a longer average execution time due to the usage of expensive elliptic curve operations. The authors did not present the formal and informal verification of the proposed scheme.
Malani et al. [
12] designed a certificate-based device access control scheme in an IoT environment preserving anonymity and security against several mentioned attacks. The authors used the AVISPA tools, the ROR model, and informal verification to demonstrate the security strength of the proposed scheme.
Ali et al. [
13] analyzed the authentication scheme proposed in Ref. [
14] to ensure protection against unauthorized drone access. The authors highlight the scalability issues of this scheme and its ability to work only in one environmental flying zone. In addition, Ali et al. discovered that the Srinivas et al. protocol is vulnerable to traceability and impersonation. To overcome these issues, the authors used symmetric encryption/decryption operations and lightweight hash to improve the previously cited scheme. Performance evaluation showed that the new protocol consumes similar computational time as the Srinivas et al. scheme and is strong against several attacks.
Bera et al. [
15] designed a blockchain-based access control technique for the detection and mitigation of unauthorized unmanned aerial vehicles (UAV) in the Internet of Drones (IoD) environment. The authors presented formal security verification using the AVISPA tool and the Real-Or-Random (ROR) model. Furthermore, Bera et al. performed experiments on various cryptographic primitives under both server and Raspberry PI 3 configurations using the Multiprecision Integer and Rational Arithmetic Cryptographic Library (MIRACL). Finally, the authors compared the computation and communication overhead of their proposed solution to those of other well-known schemes.
A blockchain-based access control protocol in an IoT-enabled smart-grid system was presented by Bera et al. [
16]. The formal and informal verification of the proposed DBACP-IoTSG showed security against multiple attacks.
Kumari et al. [
17] proposed a blockchain-based Secure Energy Trading System (SETS) to store and process the data generated from smart meters (SMs). The authors evaluated the communication and computation costs of the proposed framework, it appears that the solution achieves good performance compared to Traditional Energy Trading System (TETS).
Khalid et al. [
18] focused on power consumption and latency issues. They proposed a lightweight decentralized blockchain-based authentication mechanism for a smart hospital environment. The proposed scheme is based on a fog computing architecture while ensuring device-fog node authentication and device-device authentication. Moreover, the authors used blockchain technology to benefit from its decentralized nature and cryptographic features. The obtained evaluation results affirm that the use of fog architecture can reduce the time required to create and send an authentication request. However, Khalid et al. did not present a formal verification of the proposed scheme.
A fog computing architecture for multiple intersections was proposed by Hossan and Nower [
5]. The main objective of this paper was to reduce vehicle waiting time. The evaluation of the proposed solution showed that their approach consumes the minimum quantity of fuel in different traffic densities and guarantees the lowest waiting time compared to other algorithms. However, the proposed solution neglected the security of such a system. It is obvious that the system is not secure against sensor impersonation attacks. For instance, the data generated by a sensor node can be altered easily by an attacker and ultimately threaten human lives.
A lightweight authentication and authorization framework was presented by Tahir et al. [
19]. They used a probabilistic model for blockchain-enabled IoT networks. Tahir et al. used random numbers for the authentication phase, taking into account two types of IoT devices: homogeneous and heterogeneous. In addition, they focused on a fog computing architecture to overcome the limitations of the blockchain. The suggested method was examined by the authors using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and the Cooja simulator. However, they did not present the informal verification of the proposed scheme.
Kumari et al. [
20] proposed a decentralized peer-to-peer energy trading scheme using the Ethereum blockchain. The main purpose of this solution was to reduce the grid’s energy generation while increasing the profit for both prosumers and consumers. The authors evaluated the proposed scheme in terms of data transfer rate, scalability, and storage cost. The obtained results showed that the solution can be considered as effective.
In 2021, Ben Dhaou [
1] focused on the design of a secure sensor node using Zigbee as a low-power communication protocol, and a magnetoresistive sensor for the detection of moving or stopped vehicles. The integrity of the message issued by the sensor node is protected using ECDSA. However, access control has not been addressed.
Recently, the authors started to combine blockchain technology and fog computing architecture in IoT environments. In Ref. [
19], Al Naji and Zagrouba presented a user authentication scheme for general IoT applications. The proposed mechanism was divided into three phases, namely registration, static authentication, and continuous authentication. The authors did not present a formal verification of the proposed scheme.
Altaf Haqani et al. [
21] proposed mutual authentication among users and devices in smart home environments. The paper presented both the formal and informal verification of the proposed scheme. However, the solution is based on a cloud computing paradigm, leading to latency and bandwidth challenges. Adopting a fog computing-based architecture in smart home environments can be presented as a suitable solution to deal with the mentioned issues.
A comparative analysis of the related work is presented in
Table 1 using several comparison criteria, namely: the Application Domain (AD), Blockchain (BC), Fog Computing (FC), the Authentication Type (AT), the Computation Cost (CC), the Communication Cost (MC), the Formal Verification (FV) and the Informal Verification (IV). According to
Table 1, it is notable that only the paper of Ben Dhaou [
1] took into consideration the traffic light systems security issue. All the remaining papers directed the focus in different application domains, for instance, smart grid environment [
9,
10,
16,
17,
20], internet of drones [
11,
13,
16], smart home environment [
21], and general IoT environment [
12,
19]. By having a decentralization property that permits to face the single point of failure problem by avoiding the need for a trusted third party, blockchain technology can be used to resolve several issues. To illustrate , numerous solutions have used blockchain in a different manner, for instance, Refs. [
9,
15,
16,
21,
22] used this technology combined with their proposed authentication protocols considering the constraint nature of tiny devices, namely sensors, actuators, and smart meters that do not support costly blockchain computation. Furthermore, Refs. [
17,
20] proposed a blockchain-based energy management schemes in a smart grid environment. The fog computing paradigm permits to make data storage and computation more adjacent to data gathering devices, reducing the data processing cost and the network latency. According to
Table 1, only Refs. [
10,
22] proposed a fog computing architecture. Regarding the Authentication Type (AT), it can be classified in the following categories according to the system architecture entities: user–device authentication [
13,
21,
22], user–server authentication [
9,
15,
16,
17,
20], and device–device authentication [
11,
12,
15]. Multiple papers have evaluated the Computation Cost (CC) and the Communication Cost (MC) [
9,
11,
12,
15,
16,
17], whereas Refs. [
21,
22] solely considered the calculation cost, which is the time spent managing the authentication request. The security level of an authentication scheme can be evaluated using Formal Verification (FV) through different known tools, namely AVISPA, Scyther, and ProVerif. The two types of verification were managed in Refs. [
12,
13,
15,
16,
21] while Ref. [
22], presented only the Informal Verification (IV).
Thus, many papers have proposed to guarantee security in different IoT environments, and the introduction of blockchain technology permits them to solve the single point of failure issue. However, the proposed solutions did not manage all the comparison criteria cited in
Table 1. In this paper, we propose a blockchain-based Vehicle Detector Authentication Scheme (VDAS). The solution is based on three layers of fog computing architecture. The combination of blockchain technology with fog computing ensures a decentralized authentication while reducing network latency. Furthermore, the proposed VDAS has lower computation and communication costs compared to the existing schemes.
4. Blockchain-Based Authentication Scheme for Collaborative Traffic Light Systems
We designed a novel blockchain-based authentication scheme for a collaborative traffic light management system. In short, this protocol is called a Vehicle Detector Authentication Scheme (VDAS), it permits the authentication of the sensor nodes that detect vehicles and count their number. The proposed VDAS consists of the following phases: the initialization and registration phase and the authentication phase. All parameters used in the protocol are listed in
Table 2.
4.1. Initialization and Registration Phase of VDAS
In this section, we present a detailed description of our system model that substitutes four entities as follows: a controller, a sensor, a blockchain, and a trusted authority (TA). During this phase, the trust authority, also referred to as an Ethereum client, creates the authentication smart contract. The latter encompasses two main functions and other secondary functions that help to achieve authentication in a more efficient manner. The first function attributes each controller to its corresponding sensors. Each controller represents an Ethereum client with an Ethereum address and its corresponding private key, allowing the signature of the transactions generated by each controller. The main role of this key is to authenticate the controller, and simultaneously sending a transaction to invoke a function in the smart contract. The smart contract function calls can be of two types: call and transaction. The first type represents a local invocation of a contract function that does not broadcast or publish anything on the blockchain. However, the second type broadcasts a signed transaction to the network. This transaction is processed by miners and, if valid, is published on the blockchain. The second main function of the smart contract manages the sensor authentication request. Its essential goal is to calculate certain parameters that allow us to authenticate the sensor.
During the sensor registration phase, the TA provides a smart card to the sensor node containing the identity of the controller to which it belongs. Further, each controller has enough computing power to authenticate the sensor nodes within its coverage. After the sensor registration phase, the controller authenticates the sensor node to send real-time traffic information.
4.2. Authentication Phase of VDAS
During the authentication phase, the sensor node generates two random numbers: and a timestamp . Then, it calculates = .P. The sensor sends its , the calculated , and to the controller to which it belongs (the of the controller provided by the trust authority during the registration phase on the smart card).
Upon receiving the sensor message, the controller sends a transaction to the smart contract authentication. This transaction is signed with the controller’s private key. First, the smart contract will check if the sensor belongs to the controller . If the sensor belongs, the controller will call another function to generate two random numbers . Then, it calculates the following parameters:
=
= .
= .P
=
= +
=
The controller sends to the sensor node and the encryption of , , and using the session key . Upon receiving the controller message, the sensor starts by calculating the key as :
= ., then it calculates
’ = .P - ..P)
if ’ =
the sensor node calculates = b.P
=
= b + (
Then it sends to the controller the encryption of and using . The controller calculates ’ as: ’ = .P - ..P).
if the ’ = then the controller authenticated the sensor .
After the authentication phase, the sensor will use to encrypt the number of vehicles that it detected. is calculated as: =
Upon receiving the number of vehicles, the controller decrypts this message using the same key. The obtained value will be stored on the blockchain using a transaction signed by the controller. This value can be used by the controllers of adjacent intersections to optimize road traffic and reduce congestion.
Figure 4 gives a summary of the authentication phase of VDAS.
Figure 5 presents a sequence diagram of the proposed Vehicle Detector Authentication Scheme (VDAS). This diagram summarizes the entire protocol. It begins with the registration phase carried out by the trusted authority. Then follows the authentication step, where each of the actors (sensor node, controller) performs the calculation of its own parameters. The controller uses the smart contract to perform these calculations. Finally, the sensor node is authenticated if the calculated parameters on each side are equal.