Next Article in Journal
Intelligent Fault Diagnosis of Rotary Machinery by Convolutional Neural Network with Automatic Hyper-Parameters Tuning Using Bayesian Optimization
Next Article in Special Issue
Acceleration of Inner-Pairing Product Operation for Secure Biometric Verification
Previous Article in Journal
Self-Detecting Traffic Interference Control for Multi-Zone Services under 5G-Based Cellular Networks
Previous Article in Special Issue
Unsupervised Fault Detection on Unmanned Aerial Vehicles: Encoding and Thresholding Approach
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Decentralized Trusted Data Sharing Management on Internet of Vehicle Edge Computing (IoVEC) Networks Using Consortium Blockchain

1
Department of Artificial Intelligence Convergence, Pukyong National University, Busan 48513, Korea
2
Department of IT Convergence and Application Engineering, Pukyong National University, Busan 48513, Korea
*
Author to whom correspondence should be addressed.
Sensors 2021, 21(7), 2410; https://doi.org/10.3390/s21072410
Submission received: 31 January 2021 / Revised: 30 March 2021 / Accepted: 30 March 2021 / Published: 31 March 2021
(This article belongs to the Special Issue Selected Papers from WISA 2020)

Abstract

:
The emergence of the Internet of Vehicles (IoV) aims to facilitate the next generation of intelligent transportation system (ITS) applications by combining smart vehicles and the internet to improve traffic safety and efficiency. On the other hand, mobile edge computing (MEC) technology provides enormous storage resources with powerful computing on the edge networks. Hence, the idea of IoV edge computing (IoVEC) networks has grown to be an assuring paradigm with various opportunities to advance massive data storage, data sharing, and computing processing close to vehicles. However, the participant’s vehicle may be unwilling to share their data since the data-sharing system still relies on a centralized server approach with the potential risk of data leakage and privacy security. In addition, vehicles have difficulty evaluating the credibility of the messages they received because of untrusted environments. To address these challenges, we propose consortium blockchain and smart contracts to accomplish a decentralized trusted data sharing management system in IoVEC. This system allows vehicles to validate the credibility of messages from their neighboring by generating a reputation rating. Moreover, the incentive mechanism is utilized to trigger the vehicles to store and share their data honestly; thus, they will obtain certain rewards from the system. Simulation results substantially display an efficient network performance along with forming an appropriate incentive model to reach a decentralized trusted data sharing management of IoVEC networks.

1. Introduction

With the rapid movement of urbanization and industrialization, the number of registered vehicles worldwide is estimated to reach two billion within the next 10–20 years [1]. It will bring multiple challenges for the future transportation system. The intelligent transportation system (ITS) framework has gained expanding enthusiasm from academia and industry as the solution to address these challenges. ITS is expected to compose an indispensable part of developing smart cities in the vehicular network context by leveraging the internet of vehicles (IoV) concept. Hence, IoV that combines smart vehicles and the internet is a key enabler technology that facilitates the next generation of ITS. The IoV allows vehicles to share road-related information messages with their neighbors, e.g., road conditions, traffic congestions, accident information, and safety warnings. Consequently, vehicles can be more aware of traffic situations, as well as contribute to improving the system transportation safety and efficiency [2].
However, the conventional IoV system has difficulty overcoming the increasing complexity of ITS applications that exponentially led to the demand for the enormous data storage volumes with high computation and communication processing requirements. Hence, the notion of IoV edge computing (IoVEC) is introduced to enhance user experience with low latency, high bandwidth, and real-time communications with the help of mobile edge computing (MEC) technology [3]. IoVEC is defined as integrating vehicular networks and MEC that offers various opportunities to support massive data storage and provide computing process close to vehicles as a data provider. Moreover, IoVEC aims to reduce the communication overhead and support the delay-sensitive application by placing its computing resource in the edge network near the vehicular network user. Therefore, IoVEC allows the system to minimize service delay, achieve low transmission latency, alleviates network congestion, and enhances the quality of service (QoS) [4].
Despite the potentials mentioned above, the conventional architecture of IoVEC with a centralized approach has crucial challenges related to user’s data security and privacy. In this sense, the potential exposure of user information with single point of failure (SPoF) challenges still will reasonably occur since the IoVEC framework’s data is centralized on a central server. Hence, the IoV network participants might be hesitant in the data sharing process that contains private information, such as customer identities, vehicle numbers, and driving preference. Moreover, the risk of selfish behaviors might diminish participants’ enthusiasm to cooperate with each other in the system. This problem becomes more serious when there exists a malicious vehicle in the network. The various adversarial actions may threaten the privacy security to gather the user’s private information for personal benefit, as well as endanger traffic safety and efficiency, by giving the incorrect report to the system. Consequently, IoVEC needs to construct a reliable and trusted data sharing management model by removing a centralized intermediary scheme.
Previous work considers that vehicle may share their data voluntarily [5]. Unfortunately, it might cause the low participation of vehicles in the data sharing process and then affects the system’s reliability in the future. Moreover, due to self-interest characteristics, vehicles may also be unenthusiastic to share the data because they do not obtain particular benefits or compensation from the system. Therefore, some forms of incentive mechanism should be provided to motivate honest vehicle (as data owner) to give a relevant contribution with long-term participation for system reliability and sustainability. Incentive mechanism provides rewards to the vehicles that contribute to the data sharing process to form the trusted data management system in IoVEC. However, existing incentive mechanisms generally use a central trusted authority to orchestrate the system, such as monetary-based incentive [6] and reputation-based incentive [7]. In this sense, a central trusted authority that holds the user data poses a potential risk where a single mistake might affect the entire system’s orchestration. Therefore, the need to form fair incentives without involving the central trusted authority is vital for a secure and trusted data management system in IoVEC networks.
In recent years, since Nakamoto introduced Bitcoin [8] in 2008, blockchain as an emerging technology has gained much attention to cope with security and privacy issues because of its anonymity, decentralization, and trust characteristics. Basically, blockchain combines the advantages of peer-to-peer (P2P) networks and cryptography algorithms to ensure the transaction agreements’ validity among involved participants without intermediary authority. These recorded transactions are secure and cannot be altered maliciously after being added into an immutable distributed database. Hence, currently, blockchain with its various advantages has been applied in various fields [9], such as financial industry [10], healthcare industry [11], smart energy system [12], and industrial Internet of Things [13]. In the vehicular network context, blockchain is widely studied to form a secure, trusted, and decentralized ITS [14]. Several works proposed blockchain-based IoV to protect sharing road-related information among vehicles to improve traffic safety and efficiency [2,15,16]. Motivated by these developments, we utilize a consortium blockchain and leverage the smart contracts to develop a decentralized trusted data sharing management system in IoV. First, we design an information credibility assessment scenario to minimize irrelevant information data. The system allows the vehicle to assess the received information’s credibility from its neighboring vehicles in the same region by generating the specific rating. Second, we use the practical byzantine fault tolerance (PBFT) for consensus mechanism since it is suitable for consortium blockchain [17] as our proposed model framework. In the consortium blockchain, multiple preselected nodes (e.g., selected by the consortium members under the Department of Transportation supervision) are authorized to perform the consensus process to validate all transactions of the shared data before appending them into a distributed ledger database [18]. The roadside units (RSUs) are then defined as the preselected edge nodes and placed along the road, which plays a crucial role in providing a trusted data sharing management system in IoVEC. Third, we also present an appropriate incentive mechanism based on blockchain to trigger vehicles to participate positively to improve and maintain the system’s reliability and sustainability. Concisely, the contributions of this paper are summarized as follows.
1.
We design a decentralized trusted data sharing management framework for IoVEC networks by utilizing a consortium blockchain and smart contracts. This framework proposes a secure data sharing scenario among vehicles without relies on trusted intermediaries in distributed, verifiable, and immutable ledgers.
2.
We present an information credibility assessment scenario to minimize irrelevant information data and against malicious behaviors of the vehicle on the data sharing process.
3.
We design an appropriate incentive mechanism based on the vehicle’s contribution by leveraging smart contracts’ self-execution nature. This scheme aims to motivate vehicles to participate positively in maintaining trusted data sharing activities and ensuring the system’s security and sustainability.
4.
We formulate a decentralized data sharing of IoV networks prototype and evaluate its performance based on simulation results.
The remainder of this paper is organized as follows. Section 2 describes the problem definition based on traditional data sharing management on the conventional vehicular network with a centralized incentive mechanism. Related work is presented in Section 3. Then, we explain the design architecture of the IoV-blockchain, including its detailed procedures in Section 4. We demonstrate the proposed design by analyzing its performance in Section 5. Finally, Section 6 concludes the paper.

2. Related Work

In this section, we review relevant literature on conventional data sharing management on vehicular network and centralized incentive mechanism to position the existing approach in relation to our research.

2.1. Internet of Vehicle Edge Computing (IoVEC) Networks

Mobile edge computing (MEC) technology is introduced in 2014 by the European Telecommunications Standards Institute (ETSI), aiming to heighten user experiences with low latency, high bandwidth, and real-time communications [3]. MEC leverages the local server infrastructure to reduce response and delay time during the transaction process by placing its server in the edge network to be closer to the user. Encouraged by the advantages of MEC, many works have been dedicated to combining vehicular network (VN) into MEC, thereby establishing vehicular edge computing (VEC) networks, where an extra edge infrastructure is the main distinction that differentiates between conventional VN and VEC. In Reference [19], the authors formulated an offloading problem with joint load balancing in VEC to enhance system utility and network effectiveness. Moreover, they also proposed a low-complexity algorithm to optimize the decision-making on computation resource and offloading ratio selection. The authors in Reference [20] offered a novel mechanism, namely mixed-integer nonlinear programming (MINP) formulation, to minimize resource sharing expense while enhancing the quality of service (QoS) indicators. In Reference [21], the authors concentrated on providing an efficient distributed reputation management for VEC networks. The internet of vehicles edge computing (IoVEC) networks can be considered the extension of VEC in the IoV environment, which works in a similar fashion to the traditional VEC networks.

2.2. Conventional Data Sharing Management

In the vehicular network environment, the primary entities in the data sharing process are vehicles and roadside units (RSUs), which form two types of communication, namely vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I). Vehicles interact with other neighboring vehicles by using onboard units (OBUs) equipped with several sensing devices with simple computation and communication capabilities. OBUs are also used to automatically recognize traffic-related information and facilitate the vehicles to send notification messages to others using V2V communication standards to improve traffic safety and efficiency. On the other hand, V2I provides a single or multi-hop communication between vehicle and RSU, supported by dedicated short-range communication (DSRC) standards [22]. RSUs, as the roadside infrastructure, provide wireless communications along the road to vehicles. Thus, RSUs are prepared to aggregate the traffic data in a particular coverage area in the VN system.
Moreover, conventional VN data management relies on a cloud service platform with a centralized database approach. In this sense, the centralized server is employed to collect and store all vehicles’ shared data centrally. However, the centralized approach is still facing the threat of security and privacy risk, where the attackers can easily forge or tamper with the data sent by OBUs in an open wireless communication environment [23]. Further, a centralized server might also reveal and trade the user’s private data to personally obtain a particular profit by neglecting user privacy consideration. Therefore, we introduce the decentralized system to cope with the centralized approach problem to facilitate the trusted management system. In this regard, we propose blockchain as the distributed database system which facilitates a transparent data sharing transaction by involving all participants to approve each transaction using a particular consensus mechanism to validate data recorded with time-stamp before stored into an immutable database without the help of a central trusted intermediary.

2.3. Centralized Incentive Mechanism

Since the VN system relies on a centralized approach, vehicles might be reluctant to share their data due to data security and privacy protection issues. Moreover, the SPoF is likewise a significant problem for centralized networks. Another challenge is that vehicle participation in the data sharing process remains low due to self-interest characteristics, and the vehicles do not obtain the compensation or benefit from the system. Hence, the incentive scheme is used to boost vehicle participation with positive contribution and maintain the system’s reliability and sustainability. The existing incentive mechanism with a centralized approach allows simple transactions between vehicles and a trusted third party. In this case, a trusted third party holds the entire data transaction and provides transaction incentives among participants involved. In short, as a data provider, the trusted third party controls the whole system orchestration (including incentive scheme).
Current works that represent centralized incentive approach are monetary-based incentive [6] and reputation-based incentive [7]. The monetary-based incentive uses the payment strategy to avoid inefficient contributions and unnecessary rewards while manages payments and charges from a game-theoretic perspective. This scheme motivates participants to report their behavior honestly and receive electronic money as rewards. On the other hand, the reputation-based incentive evaluates the participants’ trustworthiness in certain actions according to their prior experiences using a game-theoretic model based on repeated games. This scheme is designed to provide an appropriate incentive according to participants’ contribution along with identifying uncooperative participants. However, both schemes are still insufficient to be implemented in a trusted data management system due to the centralized approach risks and challenges. It worth noting that in terms of SPoF, a single mistake might alter the entire system’s orchestration. Hence, malicious vehicles easily manipulate the system transactions and obtain all vehicles’ data as long as they control the attacked central server. Further, the centralized server may possibly be congested due to a large number of vehicle transactions resulting in reduced system performance [24]. In this case, we suggest leveraging blockchain-based smart contract to form an incentive mechanism in a decentralized approach to address these issues. This approach aims to improve privacy and security protection, encourage vehicles to participate positively in VN data sharing activities, along with improving the system’s performance.

2.4. Blockchain-Based Decentralized Data Sharing Management

Blockchain is considered as a solution to improve security and privacy protection since it is suitable to overcome the centralized problem approach. Blockchain is a distributed ledger technology that enables participator entities to accept and share recorded activities with a time-stamp to the network. The particular consensus mechanism validates those activities before it is filed in a changeless database. Generally, blockchain can be utilized to achieve three objectives: managing distributed services relying on smart contracts, operating a distributed ledger, and accomplishing decentralized storage [25]. There exist many efforts that concentrate on implementing blockchain technology into VN. The authors in Reference [26] reviewed the latest researches of the blockchain-based IoV by classifying research barriers and technical problems. They separate blockchain into three layers: perception, networking, and application layer. The perception layer is utilized to address trusted management problems by achieving an accurate data sharing perception. The networking layer aims to protect network security, while the application layer solves accountability and privacy issues.
Moreover, the authors in Reference [2] proposed a blockchain-based decentralized trust management system in VN. They utilize the Bayesian inference model for message credibility assessment to prevent unrelated or false data from a malicious vehicle. The system enables the nearby vehicle to assess the accepted message by generating the message rating to RSUs. On the other hand, RSUs play as miners to create the block by applying joint proof-of-work (PoW) and proof-of-stake (PoS) consensus algorithm. In Reference [27], the authors also exploit a Bayesian network that quickly identifies fake messages by counting the subsequent probability of an event. The event probability is calculated based on several parameters, such as pre-traffic probability, traffic event period, vehicle honesty, and the number of events provided by vehicles. Further, in Reference [28], the authors proposed blockchain to form a trust authentication mechanism in VN. They focus on the secondary authentication model to form a decentralized autonomous VN system that is more reliable and safe from numerous attacks.
Furthermore, several efforts study employing consortium blockchain’s advantages to minimize malicious entities’ existence during the consensus mechanism. The authors of Reference [15] proposed consortium blockchain and smart contract to build a secure P2P data sharing system in VEC. They manage the vehicle’s reputation scheme using a three-weight subjective logic model. A joint PoW and PoS consensus mechanism is utilized to improve system security and efficiency. In Reference [16], the authors presented a data-sharing framework using a consortium blockchain by applying a smart contract through the preselected nodes to maintain data storing and sharing system. The digital signature technique guarantees the data’s integrity and security during the data sharing process. Further, a joint PoW and PBFT consensus is deployed to validate each block transaction before saving toward an immutable blockchain ledger. On the other hand, the authors in Reference [29] proposed a novel privacy-preserving incentive announcement network using blockchain called CreditCoin. CreditCoin motivates users with incentives to share traffic information based on the PBFT consensus mechanism scheme. In Reference [30], the authors proposed an incentive model to trigger the vehicle in accurate and timely data sharing by leveraging Ethereum smart contract. Furthermore, to verify the data sharing transactions and improve system performance, they employ a consensus mechanism based on Proof-of-Authority (PoA).

3. The Framework of IoVEC-Blockchain for Trusted Data Management

This section explains our proposed model, blockchain-based secure and trusted data sharing management in IoVEC networks. Inspired by Reference [31], our architecture model relies on consortium blockchain that consists of three layers, as shown in Figure 1. First, the user network layer provides data sharing communication among vehicles as the network user. Second, the blockchain edge layer responsible for validating data sharing transactions. Third, the blockchain network layer provides a decentralized incentive mechanism based on the vehicle’s contribution. Additionally, the proposed model authorizes RSUs as the multiple preselected edge nodes to perform the consensus mechanism. Here, RSUs are distributed along the road to be traffic handlers to control a group of vehicles in a certain radius range. We consider many users (i.e., message provider vehicle and message assessor vehicle) and many validators (i.e., RSUs), both play as the primary entities to form trusted data sharing management systems IoVEC. We use the PBFT consensus mechanism to facilitate strong consistency and a proper consortium blockchain framework. Furthermore, to motivate the vehicle’s contribution, we propose a decent incentive mechanism in a decentralized manner. Table 1 summarizes the notation used to describe our proposed method.The detail system is described as follows.

3.1. User Network Layer

User network layer manages vehicle enrollment and authentication, the road-related message broadcasting, and the message credibility assessment process.

3.1.1. Vehicle Initialization and Enrollment

In our scenario, vehicles represent the user network that communicates with other vehicles and RSUs to improve traffic safety and efficiency. Before entering and accessing the network service, all vehicles must be authorized by a trusted party (TP), e.g., the Department of Transportation, to guarantee vehicle identity legitimation by binding their real identities (e.g., vehicle ID or driver’s license). Then, a legitimate vehicle ( V i ) that passes the authentication process with real identity creates its public keys ( P K V i ) , private keys ( S K V i ) , and certificates ( C e r t V i ) for securing data sharing transaction. After entering the network, V i downloads the latest data from the nearby edge node’s local data storage (RSU). V i equipped with OBUs and their sensing devices automatically collect road-related messages M = ( M 1 , M 2 , , M I ) according to the road occurring events, such as snow reports on the road, weather conditions, traffic jams, safety warnings, and accident information. In IoVEC-blockchain, these messages are encrypted using the elliptic curve digital signature (ECDSA) algorithm as the asymmetric cryptography to ensure communication security and identity anonymity, such as used in Reference [25]. The system enforces the user to use a new address for every new data-sharing transaction. Using this many-addresses scenario, the user’s ownership will be more difficult to trace, thus preserving identity anonymity.

3.1.2. Message Credibility Assessment

In collecting M i , V i is helped by OBUs that consists of sensor devices, a memory unit, and a communication module to form simple computation and communication. In the message credibility assessment process, V i plays different roles: as a message provider ( V P ) and a message assessor ( V A ) . With the help of OBUs, V P collects M V P at a specific location k and time t and encrypts those messages before being broadcasted to the network by utilizing V2V and V2I communication. Nevertheless, V P might behave as a dishonest vehicle and endanger traffic safety and efficiency by giving the incorrect report of M V P to the system. Hence, the system allows the nearby vehicles with the occurred events M V P to be the message assessor V A and evaluate the credibility of M V P . V A divides all messages into groups ( G m 1 , G m 2 , G m k , ) , where G m k represent the M i in the event location k. We consider that the message sent by vehicles near the event location is more trusted compared to the vehicle in a far distance. Therefore, the message credibility is defined based on Equation (1).
c p k = β + M t , P k γ . d p k ,
where
M t , P k = ( M V P | | t i m e s t a m p | | l o c a t i o n ) .
From Equation (1), c p k is the message credibility of V P in group G m k , while d p k is the distance among the occurred event in location k and the message provider V P . There are two predefined parameters: γ represents a criterion that influences the rate of c p k based on d p k , while β is the message rating’s lower bound [2]. After calculating c p k , V A obtains a credibility set for M V P which then result in C k = ( c 1 k , c 2 k , c 3 k , c N k ) . Hence, V A can calculate the aggregated credibility of M V P according to the credibility set C k using Bayesian Inference [32] by the following equation:
P [ M V P C k ] = P [ M V P ] P = 1 N P [ c p k M V P ] h = 1 I ( P [ M h ] P = 1 N P [ c p k M h ] ) ,
where P [ M V P ] is the prior probability of M V P , and P [ c p k M V P ] = c p k . We consider M h as the complementary of M V P ; thus, P [ c p k M h ] = 1 c p k . Here, the range value of P [ c p k M V P ] [ 0 , 1 ] , whereas if c p k = 0 , it represents that V P does not report M V P . Then, V A generates the rating based on P [ M V P C k ] , defined by a certain threshold: a positive rating (+1) for the correct messages, otherwise a negative rating (−1). For example, let the aggregated message credibility yield the value of 0.75. If the threshold is defined as 0.51, the system will regard messages reporting the event as correct and give positive ratings (+1) to the corresponding vehicles. For messages stating otherwise, the reporting vehicles will be given negative ratings (−1). Accordingly, the rating of M V P is uploaded by V A to a nearby edge node with format M V A = ( V P , V A , M t , P k , ϕ P A ) , with ϕ P A refers to the rating value, where ϕ P A ∈ [−1,1]. Therefore, the main activities in the user network layer are: V P periodically transmits M V P , while V A evaluates the credibility of the M V P by generating and uploading M V A to blockchain edge layer.

3.2. Blockchain Edge Layer

Blockchain edge layer plays a critical role in forming a trusted data sharing management system in IoVEC, including message aggregation, consensus mechanism, and block generation.

3.2.1. Message Aggregation and Vehicle’s Reputation

The RSUs are the edge nodes infrastructure and traffic handlers distributed along the road to manage the vehicle network layer’s data sharing process. In our proposed model, we design RSU equipped with two types of smart contracts: message record smart contract (MRSC) and validation block smart contract (VBSC). MRSC collects, records, and aggregates the number of message information (i.e., M V P from V P and M V A from V A ) from the user network layer in a distributed framework, whereas VBSC stores the resulted data from MRSC into a blockchain network layer. It is worth noting that MRSC records all the participants, i.e., V P and V A , which contribute to the data sharing process. Once V A uploads the message ratings M V A into MRSC, the nearby RSU validates the message M t , P k by calculating the aggregation of trust value rating using the majority rule. Here, we assumed that malicious vehicles could not control most of the vehicles in the network. Thus, the trust value rating ( ψ P t , k ) must be greater than the minimum threshold (e.g., ψ P t , k ⩾ 0.5). Otherwise, the system will discard M V P because it is recognized as an untrustworthy message. The result of trust value ψ P t , k will be a new candidate block ( δ B l o c k i ) to be validated in the consensus mechanism. The weighted aggregation of trust value ψ P t , k , or the average ratings from the assessors, is defined as the sum of the message credibility c P t , k multiplied by the rating from each assessor ϕ P A , divided by the number of assessors A, as presented in Equation (4).
ψ P t , k = i = 1 A c P t , k * ϕ P i A .

3.2.2. Consensus Mechanism & Blockchain Generation

A consensus mechanism is utilized to achieve the required agreement between the authorized participant entities to generate a new block transaction into a blockchain network using a particular set of rules. Here, only authorized RSUs are eligible to be the nodes participants (validators) in the consensus mechanism with more extensive storage and computation capability compared to the OBUs. We use the PBFT algorithm to conduct a consensus mechanism due to its advantages, including small resource consumption, high efficiency, consistency, and maturity, making it proper for our proposed scheme. Moreover, PBFT permits the presence of anomalous nodes ( f ) , without changing the consensus decision amongst all of the participating nodes ( n ) , where anomalous nodes are defined as f = ( n 1 ) / 3 [33]. Figure 2 illustrates the typical round of PBFT consensus mechanism in blockchain-based IoVEC networks. Several steps of the consensus mechanism are described as follows.
  • Leader selection step: In consortium blockchain, RSUs are selected as validators to verify the block δ B l o c k i transaction in the consensus process. It is assumed that there are n edge nodes RSUs ( μ n ) at region k, where μ k = ( μ 1 k , μ 2 k , μ n k ) . In each round r, a leader is responsible for storing δ B l o c k i into the blockchain network layer. The leader ( Γ r ) is chosen among the number of μ k before the consensus process, and it does not change until after the consensus process.
  • Request step: The request step represents a new candidate block generation ( δ B l o c k i ) process in MRSC. After MRSC aggregates ψ P t , k , the result of δ B l o c k i will be validated using consensus mechanism in VBSC.
  • Pre-prepare step: In this step, as shown in Figure 2, μ 1 k represents the RSU leader Γ r that broadcasts δ B l o c k i to all of the involved nodes μ k or validators in the consensus mechanism process. Here, the validator nodes ( μ 2 k , μ 3 k , μ n k ) receive δ B l o c k i using its VBSC.
  • Prepare step: Each validator verifies the δ B l o c k i and broadcasts the message verification among other authorized RSUs μ k . In our scenario, we consider that μ 3 k portrays an anomalous node that ignores all validators’ verification request during consensus.
  • Commit step: Then, the validators broadcast the commit message after receiving over 2 f + 1 of verification message from other validators in the prepare-step.
  • Reply step: Finally, the leader Γ r proves that the consensus process on round r is finished after the consensus reaches over f + 1 of the commit message and then uploads the verified block ( B l o c k v e r i f i e d ) to the blockchain network. Thus, the distributed RSUs automatically obtain the log and authentication of δ B l o c k i , as well as update their ledger, simultaneously. Otherwise, the block δ B l o c k i will be rejected, and the system starts the next round consensus ( r + 1 ) .

3.3. Blockchain Network Layer

Figure 3 shows the structure of transaction blocks, which comprise a block header and block transaction. The block header contains block ID, version, and timestamp as the basic information of block; Merkle root as the hash of the root of Merkle tree structure [34] which is formed by hashing all the recorded transactions; and previous and current block hash used for tracing the information history, as well as proving the validity of transaction block. On the other hand, the block transaction mainly contains the information of the message, which includes transaction ID, trust value rating, and the specific time and location of the event. Additionally, the blockchain network layer is responsible for providing an incentive mechanism based on the ratio of participants’ contribution recorded in MRSC. The incentive is utilized to motivate vehicles to form a trusted data sharing management in IoVEC. V P and V A , which correctly provide the road-related messages and assess the message credibility, respectively, will obtain the proportional incentive. Here, the system gives ( R w ) reward to the contributing participants ( V n ) . Let χ n be the contribution amount of V n and T r e c o r d s be the total of recorded contribution in MRSC. Then, the contributing participants obtain the rewards based on the following calculation:
r n = R w χ n T r e c o r d s ,
where r n is the reward obtained by V n (i.e., V P and V A ). In this case, we considered that the V P reward ( r P ) is higher rather than that of the V A reward ( r A ) . Figure 4 illustrates the incentive mechanism scenario, where we assume V P provides valid information about the road-related event in r e g i o n K with a specific time t according to the message credibility assessment from V A . On the other region (i.e., r e g i o n L ), there is V R , which requests the event information of r e g i o n K . V R selects the provided information from V P due to its positive reputation and rating. Then, V R pays a particular incentive to the system to download the data information. Hence, all of the contributing participants (i.e., V P and V A ) obtain a proportional incentive from the system. As a result, the incentive system enables a trusted data sharing management among vehicles in a decentralized manner.
Figure 5 summarizes the workflow of the whole framework of trusted data sharing management in IoVEC using blockchain. An information message is broadcasted from the vehicle provider to RSU and the neighboring vehicles as the message assessors. The vehicle assessors evaluate the message credibility by generating ratings and uploaded them to the nearby RSU. Then, the RSU as the edge node aggregates all ratings to obtain the trust value and generates a new candidate block to be validated in the consensus mechanism. The consortium edge nodes perform the PBFT algorithm to validate the candidate transaction block ’s correctness before uploading to the blockchain network. Finally, the blockchain network distributes the incentive based on the vehicle’s contribution in maintaining a trusted data sharing management system in the IoVEC.

4. Simulation and Results

4.1. System Setup

We designed a trusted data sharing management IoVEC network based on the proposed model, consisting of three layers, i.e., user network layer, blockchain edge layer, and blockchain network layer. Each layer has its setting that distinct from one another. Using the OSMWebWizard package provided in the simulation of urban mobility (SUMO), we modeled a highway traffic scenario to prototype and evaluate IoVEC networks’ efficiency. Here, NS3 as a discrete-event network simulator is used to verify the result, analyzing a trace file for vehicle mobility and message credibility.
Figure 6 shows the scenario map that simulates the region of Daeyon in Busan metropolitan city, Republic of Korea. In our study, Hyperledger Sawtooth [35] is utilized to construct a consortium blockchain that supports the PBFT consensus mechanism for its block generation. Furthermore, we leveraged the smart contract feature to form the decentralized incentive scheme to encourage vehicles in the data sharing process. Since Hyperledger Sawtooth allows integration with Ethereum platform [36], our decentralized reward approach is designed using the Ganache CLI-Truffle-Suite interface. The experiments were carried out in Ubuntu 16.04 on Oracle VM VirtualBox, hosted on a personal computer with a CPU Intel(R) Core(TM) i5-4690 CPU @ 3.50 GHz; 3.50 GHz, supported with 16.00 GB RAM. The detailed setting of the simulation is described in Table 2.

4.2. Message Credibility

To form an IoVEC, we use an optimized link-state routing protocol (OLSR) as one of the protocol standards in the wireless access for the vehicular environments (WAVE). This protocol enables the system to provide better performance in terms of vehicle mobility, speed, and delay communication [37]. Here, vehicle communication (i.e., V2V and V2I) is supported by DSCR communication standard according to the IEEE 802.11p in the frequency of 5.9 GHz. In this scenario, there are 26 vehicles in the user network layer. However, only ten vehicles are proposed to be neighboring vehicles V A n and placed 50 m apart from the occurred event. Once the vehicle provider V P n broadcasts the road-related message M V P via V2V communication, the neighboring vehicle V A n is allowed to evaluate the message credibility by generating the message rating to edge node. We consider the packet delivery ratio (PDR) as one of the critical parameters for analyzing the performance of IoVEC in terms of message credibility. PDR represents the message credibility ratio that will be aggregated in MRSC of edge node (i.e., RSU).
Table 3 describes the result of message credibility assessment of M V P , whereas Figure 7 shows the trust value rating aggregation based on message credibility assessment over 10 V A on various separations. Green spectrum indicates the highest value of the message’s credibility (i.e., the information is valid). On the contrary, red spectrum indicates the lowest value of the message’s credibility (i.e., the information is false). In short, the result shows that M V P is categorized as trustworthy with trust value rating of 0.8097, as illustrated by the the black dash in Figure 7. This value is obtained from the aggregation of message credibility values from 10 V A on various distances. In this case, each assessor vehicle (i.e., V A 1 to V A 10 ) evaluates the message credibility of M V P and upload the result to the nearby RSU. The vehicle V A 1 which is closest to the occurred event M V P has the highest trust value with 0.9430. Meanwhile, V A 7 to V A 10 , whose distance is the farthest to M V P , obtain the lowest trust value of 0.7096.
Furthermore, we also observed the relationship between the distance of V P to the occurred event and the message credibility. We placed V P in various distance from the occurred event in the range of 100–1000 m. As shown in Figure 8, the highest value of the message credibility rating comes from the closest distance between V P and M V P (distance of 50 m). Conversely, the lowest value of message credibility is obtained from the highest distance between V P and M V P (distance of 1000 m).

4.3. Block Generation

After the MRSC aggregates the trust value rating, its result is then validated using a consensus mechanism in the VBSC consortium blockchain. To construct a consortium blockchain, we use Hyperledger Sawtooth as part of the Hyperledger platform. Hyperledger Sawtooth platform is suitable for our proposed model because it supports the PBFT consensus mechanism equipped by several validators. We utilized Docker containers to facilitate the main core components of Hyperledger Sawtooth architecture, such as transaction processors, validators that represent preselected edge nodes, and Sawtooth Representational State Transfer (REST) server. The consensus mechanism is then conducted by preselected RSUs (validators) to validate a new block transaction. Before that block is stored in the blockchain network layer, the PBFT algorithm requires the agreement over 2 f + 1 among the participating nodes in the consensus process. Moreover, Hyperledger Sawtooth offers the batch size that represents the block with many transactions involved. Figure 9 presents the effect of batch size on throughput. We evaluate this scenario by running multiple tests to change the batch size up to 100 tx/block. As a result, we can see that the throughput on various batch sizes increases linearly and reaches 543 tx/sec at the total batch size of 100 tx/block.

4.4. Distributed Incentive Model

To support an adequate incentive for the information provider (vehicle V P n ), we implemented Ethereum smart contracts as a decentralized and tamper-proof incentive mechanism. Each vehicle in various regions broadcasts the respective road-related message to the RSU with a varying amount of information. After the message M V P is validated using blockchain consortium, V P n promptly receives a certain amount of incentive whenever another party (RSU and other vehicles) uses V P n ’s information. The incentive distributed is in Ether, with a linear amount with the information provided by V P n . The exact amount of Ether to the data size can be freely adjusted by the system as required.
We utilized a smart contract feature in the Ethereum platform through Ganache Truffle (v.2.4.0) graphical user interface (GUI). The default setting is applied where the gas limit is set to be 6,721,975 units, with the gas price is 20,000,000,000 wei running on a remote procedure call (RPC) server HTTP://127.0.0.1:7545 (accessed on 11 January 2021) with an auto mining mode. The address for all vehicles is derived from Ganache that holds 100.00 ETH each (publicly available). In a real-world implementation, the address does not depend on a single user interface, and the address is managed in the private wallet of each entity.
We performed the incentive distribution with a different number of vehicles (the message providers) V P K n R S U n with a specific number of M V P sizes together with their respective RSUs for ease of presentation. Experiments were carried out (Exp. 1 and Exp. 2) with the main objective of knowing the total number of gas usage units (units) in distributing incentives for the message providers. The incentives for each V P K n are differentiated by the amount of valid data provided by the respective vehicles. For the first five experimental sequences, vehicles V P K 1 V P K 5 are connected to R S U 1 , which is in regional K. Meanwhile, for the last five experimental sequences, vehicles V P L 1 V P L 5 are connected to R S U 2 in regional L as shown in Table 4.
Table 4 presents the performance of the total gas usage and Ether distribution for the message provider. The message sizes are sorted from least to largest size. In the Exp. 1 GU (gas usage), the average gas usage by the RSU to distribute incentives was 117,944 units, with the minimum usage recorded at 117,779 units (414 bits) in V P K 4 R S U 1 , and the largest usage was 118,063 units (304 bits) in V P K 3 R S U 1 . Meanwhile, on Exp. 2, the recorded average use of gas was 117,966 units, with the minimum usage was 117,792 units ( V P L 1 R S U 2 with 600 bits of PDR size), and the largest usage of gas was recorded at 118,086 units ( V P K 1 R S U 1 ). Furthermore, Figure 10 illustrates the information on gas usage by RSU in distributing Ether for the contributed vehicles. Even though Figure 10 shows the amount of gas usage is significant from one another, the amount of gas difference between transactions is relatively the same by using units notion. Smart contracts store the address information of the requester and provider, while PDR data is stored off-chain. The Ethereum network only stores arbitrary values of related information.

5. Discussion

Recently, blockchain has been widely studied to form a secure, trusted, and decentralized data management in the vehicular network. Several works have proposed blockchain-based IoV solutions to protect road-related information sharing among vehicles to improve traffic safety and efficiency [2,15,16]. Here, our proposed system combines these solutions’ advantages to develop a decentralized trusted data sharing management in IoVEC. Table 5 shows the key parameter comparison of our proposed system with other solutions by emphasizing the five distinguished parameters: type of blockchain, implementation of MEC technology, design of message credibility assessment, type of consensus algorithm, and implementation of incentive mechanism in the system.
Compared to the proposals by Yang et al. [2] and Zhang et al. [16] which adopt conventional vehicular network architectures, our proposed model employs a combination of MEC technology and IoV to achieve better performance in data storage and sharing. Our proposed model, i.e., IoVEC, also aims to improve user experience by allowing the computing process be closer to the vehicles. Hence, it can reduce service delay and transmission latency while also enhancing QoS.
Kang et al. [15] also make use of MEC technology. However, they do not make use of message credibility assessment, which can protect the system from malicious vehicles that try to sabotage the system by transmitting wrong information (i.e., spoofing attack). On the other hand, our system allows the neighboring vehicle to evaluate the received messages and generate a credibility rating, which helps in evading spoofing attacks. Furthermore, no incentive scheme is present in their model. In this case, vehicles may not be interested in sharing the information to the system since no apparent benefit are received. In contrast, our incentive mechanism can encourage vehicles to contribute, thus promoting information sharing within the system.
Furthermore, we employ consortium blockchain to avoid SPoF attacks in a centralized system and prevent data modification attacks that may broadcast and create a modified block transaction in the consensus process conducted by compromised RSUs. Compared to other works which mainly use a joint PoW and PoS mechanisms (i.e., References [2,15,16]) we utilize PBFT consensus mechanism which is better in ensuring the system’s consistency and guarantee that the new validated block will be distributed to all nodes in the system. Hence, all the legitimate nodes have a consistently updated database in the IoVEC network. Additionally, to support an adequate incentive mechanism for the information provider and assessors, we implement Ethereum smart contract as a decentralized and tamper-proof incentive mechanism. This incentive is aimed to encourage vehicle participation in maintaining the system’s reliability and sustainability.
By leveraging the several advantages of our proposed framework as discussed above, the blockchain-based IoVEC framework can be utilized to address the limitation of ITS application (e.g., connected cars application), especially in terms of enhancing system performance and security protection. In IoVEC, MEC can improve the system performance; providing low latency, high bandwidth, and real-time communication by placing its server in the edge network to be closer to the user. Furthermore, the blockchain can form a decentralized and trusted data management system, as well as to provide the users with privacy and security. Nevertheless, future discussions are encouraged to address relevant issues in the blockchain-based IoVEC. For instance, the construction of a robust message authentication mechanism in order to strengthen privacy and security protection in the blockchain-based IoVEC would be of great importance. In Reference [17], the authors explain several techniques that might be adequate to be implemented for message authentication mechanisms, such as ring signature, attribute-based encryption, secure multi-party encryption, homomorphic encryption, group signature, and trusted execution environment (TEE)-based solution. Furthermore, the blockchain scalability issue still needs to be considered in the real-world blockchain-based application implementation. Several works have proposed solutions to overcome these issues, such as leveraging layer-two protocols with off-chain transaction [38], sharding [39], and alternative blockchain consensus architectures [40]. We consider these challenges as part of our future research.

6. Conclusions

We have introduced a consortium blockchain and smart contracts to achieve a decentralized trusted data sharing management system in IoVEC. In this paper, smart contracts are exploited to accomplish an efficient, reliable, and secure data management system. Here, two smart contracts, MRSC and VBSC, are employed and placed on RSUs as the distributed edge network infrastructure. MRSC is used to collect and aggregate the trust value rating, while VBSC performs the consensus mechanism. Furthermore, this framework permits vehicles to validate the credibility of messages from their neighboring vehicles by generating a reputation rating. Additionally, we utilized an incentive mechanism based on Ethereum smart contract to motivate and propel the vehicles to contribute and sincerely share their data to obtain certain rewards from the system. Packet delivery ratio, considered to represent trust value rating of data sharing efficiency in IoVEC-Blockchain, shows a favorably positive performance and feasible to form a decentralized trusted data management system. Lastly, further studies are still required to apply a robust message authentication mechanism and cope with the blockchain scalability issue.

Author Contributions

Conceptualization, M.F.; methodology, M.F.; software, M.F., S.R.; validation, M.F.; formal analysis, M.F.; investigation, M.F., K.-H.R.; resources, K.-H.R.; data curation, M.F., S.R.; writing—original draft preparation, M.F., S.R.; writing—review and editing, M.F., K.-H.R.; visualization, M.F.; supervision, K.-H.R. All authors have read and agreed to the published version of the manuscript.

Funding

This research was supported by the MSIT (Ministry of Science and ICT), Korea, under the ITRC (Information Technology Research Center) support program (IITP-2020-0-01797) supervised by the IITP (Institute of Information and Communications Technology Planning and Evaluation). This research was supported by the Republic of Korea’s MSIT (Ministry of Science and ICT), under the High-Potential Individuals Global Training Program) (2020-0-01596) supervised by the IITP (Institute of Information and Communications Technology Planning and Evaluation).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

M.F. would like to thank Harashta Tatimma Larasati for her assistance in proofreading the manuscript and addressing the reviewers’ feedback. Adittionally, all authors would like to thank the anonymous reviewers for their constructive suggestions, which significantly improve the quality of this work.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
IoVInternet of Vehicle
ITSIntelligent Transportation System
VANETVehicular Ad hoc Network
IoVECIoV Edge Computing Network
SPoFSingle Point of Failure
MECMobile Edge Computing
PBFTPractical Byzantine Fault Tolerance
RSURoadside Unit
OBUOnboard Unit
V2IVehicle to Infrastructure Communication
V2VVehicle to Vehicle Communication
TPTrusted Party
DSRCDedicated Short-Range Communication
MRSCMEssage Record Smart Contract
VBSCValidation Block Smart Contract
WAVEWireless Access for Vehicular Network
SUMOSimulation of Urban Mobility
MAC/PHYMedium Access Control/Physical Layer
OLSROptimized Link-State Routing
PDRPacket Delivery Ratio

References

  1. Jia, D.; Lu, K.; Wang, J.; Zhang, X.; Shen, X. A survey on platoon-based vehicular cyber-physical systems. IEEE Commun. Surv. Tutor. 2015, 18, 263–284. [Google Scholar] [CrossRef] [Green Version]
  2. Yang, Z.; Yang, K.; Lei, L.; Zheng, K.; Leung, V.C. Blockchain-based decentralized trust management in vehicular networks. IEEE Internet Things J. 2018, 6, 1495–1505. [Google Scholar] [CrossRef]
  3. Hu, Y.C.; Patel, M.; Sabella, D.; Sprecher, N.; Young, V. Mobile edge computing—A key technology towards 5G. ETSI White Pap. 2015, 11, 1–16. [Google Scholar]
  4. Liu, L.; Chen, C.; Pei, Q.; Maharjan, S.; Zhang, Y. Vehicular edge computing and networking: A survey. Mob. Netw. Appl. 2020, 1–24. [Google Scholar] [CrossRef]
  5. Xu, C.; Wang, Y.; Zhou, Z.; Gu, B.; Frascolla, V.; Mumtaz, S. A Low-latency and Massive-connectivity Vehicular Fog Computing Framework for 5G. In Proceedings of the 2018 IEEE Globecom Workshops (GC Wkshps), Abu Dhabi, UAE, 9–13 December 2018; pp. 1–6. [Google Scholar]
  6. Peng, D.; Wu, F.; Chen, G. Pay as How Well You Do: A Quality Based Incentive Mechanism for Crowdsensing. In Proceedings of the 16th ACM International Symposium on Mobile Ad Hoc Networking and Computing, Hangzhou, China, 22–25 June 2015; pp. 177–186. [Google Scholar]
  7. Jurca, R.; Faltings, B. An Incentive Compatible Reputation Mechanism. In Proceedings of the EEE International Conference on E-Commerce, 2003 (CEC 2003), Newport Beach, CA, USA, 24–27 June 2003; pp. 285–292. [Google Scholar]
  8. Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System. Available online: https://bitcoin.org/bitcoin.pdf (accessed on 19 December 2020).
  9. Al-Jaroodi, J.; Mohamed, N. Blockchain in industries: A survey. IEEE Access 2019, 7, 36500–36515. [Google Scholar] [CrossRef]
  10. Treleaven, P.; Brown, R.G.; Yang, D. Blockchain technology in finance. Computer 2017, 50, 14–17. [Google Scholar] [CrossRef]
  11. Mettler, M. Blockchain Technology in Healthcare: The Revolution Starts Here. In Proceedings of the 2016 IEEE 18th International Conference on E-Health Networking, Applications and Services (Healthcom), Munich, Germany, 14–16 September 2016; pp. 1–3. [Google Scholar]
  12. Mengelkamp, E.; Notheisen, B.; Beer, C.; Dauer, D.; Weinhardt, C. A blockchain-based smart grid: Towards sustainable local energy markets. Comput. Sci. Res. Dev. 2018, 33, 207–214. [Google Scholar] [CrossRef]
  13. Firdaus, M.; Rhee, K.H. Empowering Blockchain For Secure Data Storing in Industrial IoT. In Proceedings of the Korea Information Processing Society Conference, Seoul, Korea, 29–30 May 2020; Korea Information Processing Society: Seoul, Korea, 2020; pp. 231–234. Available online: http://koreascience.or.kr/article/CFKO202024664104787.page (accessed on 5 January 2021).
  14. Yuan, Y.; Wang, F.Y. Towards Blockchain-based Intelligent Transportation Systems. In Proceedings of the 2016 IEEE 19th International Conference on Intelligent Transportation Systems (ITSC), Rio de Janeiro, Brazil, 1–4 November 2016; pp. 2663–2668. [Google Scholar]
  15. Kang, J.; Yu, R.; Huang, X.; Wu, M.; Maharjan, S.; Xie, S.; Zhang, Y. Blockchain for secure and efficient data sharing in vehicular edge computing and networks. IEEE Internet Things J. 2018, 6, 4660–4670. [Google Scholar] [CrossRef]
  16. Zhang, X.; Chen, X. Data security sharing and storage based on a consortium blockchain in a vehicular ad-hoc network. IEEE Access 2019, 7, 58241–58254. [Google Scholar] [CrossRef]
  17. Zhang, R.; Xue, R.; Liu, L. Security and privacy on blockchain. ACM Comput. Surv. (CSUR) 2019, 52, 1–34. [Google Scholar] [CrossRef] [Green Version]
  18. Li, Z.; Kang, J.; Yu, R.; Ye, D.; Deng, Q.; Zhang, Y. Consortium blockchain for secure energy trading in industrial internet of things. IEEE Trans. Ind. Inform. 2017, 14, 3690–3700. [Google Scholar] [CrossRef] [Green Version]
  19. Dai, Y.; Xu, D.; Maharjan, S.; Zhang, Y. Joint load balancing and offloading in vehicular edge computing and networks. IEEE Internet Things J. 2018, 6, 4377–4387. [Google Scholar] [CrossRef]
  20. Nguyen, T.D.; Nguyen, T.D.; Nguyen, V.D.; Pham, X.Q.; Huh, E.N. Cost-effective resource sharing in an internet of vehicles-employed mobile edge computing environment. Symmetry 2018, 10, 594. [Google Scholar] [CrossRef] [Green Version]
  21. Huang, X.; Yu, R.; Kang, J.; Zhang, Y. Distributed reputation management for secure and efficient vehicular edge computing and networks. IEEE Access 2017, 5, 25408–25420. [Google Scholar] [CrossRef]
  22. Kenney, J.B. Dedicated short-range communications (DSRC) standards in the United States. Proc. IEEE 2011, 99, 1162–1182. [Google Scholar] [CrossRef]
  23. Wang, D.; Zhang, X. Secure data sharing and customized services for intelligent transportation based on a consortium blockchain. IEEE Access 2020, 8, 56045–56059. [Google Scholar] [CrossRef]
  24. Lian, X.; Zhang, C.; Zhang, H.; Hsieh, C.J.; Zhang, W.; Liu, J. Can Decentralized Algorithms Outperform Centralized Algorithms? A Case Study for Decentralized Parallel Stochastic Gradient Descent. In Proceedings of the Advances in Neural Information Processing Systems, Long Beach, CA, USA, 4–9 December 2017. [Google Scholar]
  25. Guo, S.; Hu, X.; Guo, S.; Qiu, X.; Qi, F. Blockchain meets edge computing: A distributed and trusted authentication system. IEEE Trans. Ind. Inform. 2019, 16, 1972–1983. [Google Scholar] [CrossRef]
  26. Peng, C.; Wu, C.; Gao, L.; Zhang, J.; Alvin Yau, K.L.; Ji, Y. Blockchain for vehicular internet of things: Recent advances and open issues. Sensors 2020, 20, 5079. [Google Scholar] [CrossRef]
  27. Xiao, Y.; Liu, Y.; Li, T. Edge Computing and Blockchain for Quick Fake News Detection in IoV. Sensors 2020, 20, 4360. [Google Scholar] [CrossRef]
  28. Rahmadika, S.; Lee, K.; Rhee, K.H. Blockchain-Enabled 5G Autonomous Vehicular Networks. In Proceedings of the 2019 International Conference on Sustainable Engineering and Creative Computing (ICSECC), Bandung, Indonesia, 20–22 August 2019; pp. 275–280. [Google Scholar]
  29. Li, L.; Liu, J.; Cheng, L.; Qiu, S.; Wang, W.; Zhang, X.; Zhang, Z. Creditcoin: A privacy-preserving blockchain-based incentive announcement network for communications of smart vehicles. IEEE Trans. Intell. Transp. Syst. 2018, 19, 2204–2220. [Google Scholar] [CrossRef] [Green Version]
  30. Javed, M.U.; Rehman, M.; Javaid, N.; Aldegheishem, A.; Alrajeh, N.; Tahir, M. Blockchain-Based Secure Data Storage for Distributed Vehicular Networks. Appl. Sci. 2020, 10, 2011. [Google Scholar] [CrossRef] [Green Version]
  31. Firdaus, M.; Rhee, K.H. On Blockchain-Enhanced Secure Data Storage and Sharing in Vehicular Edge Computing Networks. Appl. Sci. 2021, 11, 414. [Google Scholar] [CrossRef]
  32. Raya, M.; Papadimitratos, P.; Gligor, V.D.; Hubaux, J.P. On Data-centric Trust Establishment in Ephemeral ad hoc Networks. In Proceedings of the IEEE INFOCOM 2008—The 27th Conference on Computer Communications, Phoenix, AZ, USA, 13–18 April 2008; pp. 1238–1246. [Google Scholar]
  33. Castro, M.; Liskov, B. Practical Byzantine fault tolerance and proactive recovery. ACM Trans. Comput. Syst. TOCS 2002, 20, 398–461. [Google Scholar] [CrossRef]
  34. Morrison, D.R. PATRICIA—Practical algorithm to retrieve information coded in alphanumeric. J. ACM 1968, 15, 514–534. [Google Scholar] [CrossRef]
  35. Ampel, B.; Patton, M.; Chen, H. Performance Modeling of Hyperledger Sawtooth Blockchain. In Proceedings of the 2019 IEEE International Conference on Intelligence and Security Informatics (ISI), Shenzhen, China, 1–3 July 2019; pp. 59–61. [Google Scholar]
  36. Olson, K.; Bowman, M.; Mitchell, J.; Amundson, S.; Middleton, D.; Montgomery, C. Sawtooth: An Introduction; The Linux Foundation: San Francisco, CA, USA, 2018. [Google Scholar]
  37. Jaiswal, R.K.; Jaidhar, C.D. An Applicability of AODV and OLSR Protocols on IEEE 802.11 p for City Road in Vanet. In Internet of Things, Smart Spaces, and Next Generation Networks and Systems; Springer: Cham, Switzerland, 2015; pp. 286–298. [Google Scholar]
  38. Gudgeon, L.; Moreno-Sanchez, P.; Roos, S.; McCorry, P.; Gervais, A. SoK: Layer-two Blockchain Protocols. In Proceedings of the International Conference on Financial Cryptography and Data Security, Kota Kinabalu, Malaysia, 14 February 2020; Springer: Cham, Switzerland, 2020; pp. 201–226. [Google Scholar]
  39. Kokoris-Kogias, E.; Jovanovic, P.; Gasser, L.; Gailly, N.; Syta, E.; Ford, B. Omniledger: A Secure, Scale-out, Decentralized Ledger via Sharding. In Proceedings of the 2018 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 20–24 May 2018; pp. 583–598. [Google Scholar]
  40. Eyal, I.; Gencer, A.E.; Sirer, E.G.; Van Renesse, R. Bitcoinng: A Scalable Blockchain Protocol. In Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16), Santa Clara, CA, USA, 16–18 March 2016; pp. 45–59. [Google Scholar]
Figure 1. Overview of proposed model.
Figure 1. Overview of proposed model.
Sensors 21 02410 g001
Figure 2. Consensus process in validation block smart contract (VBSC).
Figure 2. Consensus process in validation block smart contract (VBSC).
Sensors 21 02410 g002
Figure 3. Block structure of transaction.
Figure 3. Block structure of transaction.
Sensors 21 02410 g003
Figure 4. Illustration of incentive mechanism.
Figure 4. Illustration of incentive mechanism.
Sensors 21 02410 g004
Figure 5. Workflow summary of blockchain-based data sharing management system on Internet of Vehicles edge computing (IoVEC).
Figure 5. Workflow summary of blockchain-based data sharing management system on Internet of Vehicles edge computing (IoVEC).
Sensors 21 02410 g005
Figure 6. Simulation scenario map.
Figure 6. Simulation scenario map.
Sensors 21 02410 g006
Figure 7. Trust value rating aggregation based on message credibility assessment by V A n .
Figure 7. Trust value rating aggregation based on message credibility assessment by V A n .
Sensors 21 02410 g007
Figure 8. Message credibility rating versus distance of V P to occurred event.
Figure 8. Message credibility rating versus distance of V P to occurred event.
Sensors 21 02410 g008
Figure 9. Effect of batch size to throughput [31].
Figure 9. Effect of batch size to throughput [31].
Sensors 21 02410 g009
Figure 10. The information on gas usage by RSU in distributing Ether for V P K n .
Figure 10. The information on gas usage by RSU in distributing Ether for V P K n .
Sensors 21 02410 g010
Table 1. Summary of notations.
Table 1. Summary of notations.
SymbolDescription
V i The legitimate vehicle in the network
P K V i , S K V i The vehicle’s public and private key pair
TPThe trusted party for managing vehicle enrollment
C e r t V i The vehicle’s corresponding certificate
V P The provider vehicle that share the road-related message
V A The assessor vehicle that assess the road-related message from V P
M i The road-related message from the legitimate vehicle V i
M V P The information message from V P
M t , P k The collected information message by V P in t time and location k
c p k The credibility of the message M t , P k
M V A The message credibility assessment uploaded by V A
ϕ P A The message rating of V P generated by V A
δ B l o c k i The new block candidate that will be validated in consensus mechanism
ψ P t , k The aggregated trust value of M V P according to ϕ P A
Table 2. Simulation parameters of IoVEC.
Table 2. Simulation parameters of IoVEC.
ParameterValue
number of Vehicles26
vehicle speed20 m/s
WAVE ITS band5.9 GHz
MAC typeIEEE 802.11p
physical modeOFDM (6 Mbps rate)
the type of routing protocolOLSR
transmission rate2.048 Kbps
the model of propoagation lossTwo-ray ground
fading modelNakagami fading
data rate6 Mbps
power transmission20 dBm
packet interval100 ms
data rate6 Mbps
channel bandwidth10 MHz
antenna height1.5 m
simulation time100 s
Table 3. Result of message credibility assessment of M V P .
Table 3. Result of message credibility assessment of M V P .
Vehicle NeighborsDistance from M V P Message Credibility [0–1]Accuracy Reduction [0–1]
V A 1 50 m0.94300.0570
V A 2 100 m0.9129050.0871
V A 3 150 m0.894470.1055
V A 4 200 m0.8742770.1257
V A 5 250 m0.8416860.1583
V A 6 300 m0.7919510.2080
V A 7 350 m0.7096430.2904
V A 8 400 m0.7096430.2904
V A 9 450 m0.7096430.2904
V A 10 500 m0.7096430.2904
Table 4. Performance of the total gas usage and Ether distribution for the packet delivery ratio (PDR) provider.
Table 4. Performance of the total gas usage and Ether distribution for the packet delivery ratio (PDR) provider.
Vehicle (Message Provider)Message SizeIncentive (Ether)Exp. 1 GU (Units)Exp. 2 GU (Units)Regional
V P K 1 R S U 1 112 bits0.0001117,987118,086L→ K
V P K 2 R S U 1 213 bits0.0002117,888117,993L→ K
V P K 3 R S U 1 304 bits0.0003118,003117,953L→ K
V P K 4 R S U 1 414 bits0.0004117,779117,854L→ K
V P K 5 R S U 1 513 bits0.0005117,960117,861L→ K
V P L 1 R S U 2 600 bits0.0006117,891117,792K→ L
V P L 2 R S U 2 711 bits0.0007117,985118,084K→ L
V P L 3 R S U 2 807 bits0.0008117,923118,022K→ L
V P L 4 R S U 2 904 bits0.0009117,969118,029K→ L
V P L 5 R S U 2 1007 bits0.001118,063117,987K→ L
Table 5. The key parameter comparison of our proposed system with other solutions.
Table 5. The key parameter comparison of our proposed system with other solutions.
Key Parameter/TechnologyYang et al. [2]Kang et al. [15]Zhang et al. [16]Proposed System
Blockchain typePublicConsortiumConsortiumConsortium
MEC technologyNoYesNoYes
Message credibility assessmentYesNoNoYes
Consensus mechanismJoint PoW and PoSJoint PoW and PoSJoint PoW and PBFTPBFT
Incentive schemeNoNoNoYes
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Firdaus, M.; Rahmadika, S.; Rhee, K.-H. Decentralized Trusted Data Sharing Management on Internet of Vehicle Edge Computing (IoVEC) Networks Using Consortium Blockchain. Sensors 2021, 21, 2410. https://doi.org/10.3390/s21072410

AMA Style

Firdaus M, Rahmadika S, Rhee K-H. Decentralized Trusted Data Sharing Management on Internet of Vehicle Edge Computing (IoVEC) Networks Using Consortium Blockchain. Sensors. 2021; 21(7):2410. https://doi.org/10.3390/s21072410

Chicago/Turabian Style

Firdaus, Muhammad, Sandi Rahmadika, and Kyung-Hyune Rhee. 2021. "Decentralized Trusted Data Sharing Management on Internet of Vehicle Edge Computing (IoVEC) Networks Using Consortium Blockchain" Sensors 21, no. 7: 2410. https://doi.org/10.3390/s21072410

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop