You are currently viewing a new version of our website. To view the old version click .
Sensors
  • Article
  • Open Access

28 February 2023

Secure Data Transfer Based on a Multi-Level Blockchain for Internet of Vehicles

Department of Information Management, China University of Technology, Taipei City 11695, Taiwan
This article belongs to the Special Issue Security and Communication Networks

Abstract

Because of the decentralized trait of the blockchain and the Internet of vehicles, both are very suitable for the architecture of the other. This study proposes a multi-level blockchain framework to secure information security on the Internet of vehicles. The main motivation of this study is to propose a new transaction block and ensure the identity of traders and the non-repudiation of transactions through the elliptic curve digital signature algorithm ECDSA. The designed multi-level blockchain architecture distributes the operations within the intra_cluster blockchain and the inter_cluster blockchain to improve the efficiency of the entire block. On the cloud computing platform, we exploit the threshold key management protocol, and the system can recover the system key as long as the threshold partial key is collected. This avoids the occurrence of PKI single-point failure. Thus, the proposed architecture ensures the security of OBU-RSU-BS-VM. The proposed multi-level blockchain framework consists of a block, intra-cluster blockchain and inter-cluster blockchain. The roadside unit RSU is responsible for the communication of vehicles in the vicinity, similar to a cluster head on the Internet of vehicles. This study exploits RSU to manage the block, and the base station is responsible for managing the intra-cluster blockchain named intra_clusterBC, and the cloud server at the back end is responsible for the entire system blockchain named inter_clusterBC. Finally, RSU, base stations and cloud servers cooperatively construct the multi-level blockchain framework and improve the security and the efficiency of the operation of the blockchain. Overall, in order to protect the security of the transaction data of the blockchain, we propose a new transaction block structure and adopt the elliptic curve cryptographic signature ECDSA to ensure that the Merkle tree root value is not changed and also make sure the transaction identity and non-repudiation of transaction data. Finally, this study considers information security in a cloud environment, and therefore we propose a secret-sharing and secure-map-reducing architecture based on the identity confirmation scheme. The proposed scheme with decentralization is very suitable for distributed connected vehicles and can also improve the execution efficiency of the blockchain.

1. Introduction

In recent years, the Internet of vehicles has become increasingly mature with the rise of electric vehicles and unmanned self-driving vehicles. In addition, the construction of 5G base stations by various telecom companies has become more popular year by year, which has gradually made the cloudification of the Internet of vehicles (IoV) more feasible, and the Internet of vehicles will be a hot topic, and hundreds of companies must compete in the near future.
The cloud Internet of vehicles can reach vehicles and neighboring equipment to exchange messages with both parties and deliver a large amount of sensing messages to the back-end cloud service platform for big data analysis and computing, generating valuable information. The composition of the Internet of vehicles includes vehicles-to-vehicles communication (vehicles-to-vehicles, V2V), vehicles-to-pedestrian (vehicles-to-pedestrian, V2P), vehicles-to-roadside device (vehicles-to-roadside, V2R), vehicles-to-group telecommunication (vehicles-to-group, V2G), vehicles-to-network (vehicles-to-network, V2N), vehicles-to-infrastructure (vehicles-to-infrastructure, V2I), as well as the vehicles-to-everything (vehicles-to-everything, V2X). The map task and the reduce task have a main cloud server at the back-end called the master, and multiple mapping servers named mapper are responsible for cloud-mapping task services, and the reducer server is responsible for the cloud-reducing task services.
As the vehicle travels, it is able to connect and exchange information with surrounding facilities via V2X and deliver messages to the Internet via roadside device RSUs or base stations. The message is then forwarded through the router to the classifier of the cloud service. Afterward, the classifier assigns the service type of service (ToS) required by the user to the matching cloud service platform. Once the master server of the cloud service platform receives the request, it immediately assigns the mapper server and the reducer server to participate in the operation and performs map/reduce operations according to the requested service.
At this stage, domestic vehicles manufacturers are still in the research stage, and the information of the architecture of the Internet of vehicles has not yet been popularized, but it can be expected that the Internet of vehicles will be one of the key industries for domestic and foreign development in the near future. As is known, the communication protocol of the 802.11P [1] intelligent transportation system proposed by the IEEE organization is an extended version of IEEE 802.11, which is mainly used in vehicles communication security, but there has been little further development after 2009. The newer LTE-V2X technology was proposed in 2015 [2], mainly intended for direct communication between vehicles through LTE, but many technical standards are still under discussion at this stage. However, both 802.11P and LTE-V2X focus on vehicles communications, and there is less discussion about vehicles information security. In the face of the vigorous development of IoVs and cloud computing, it is obvious that it is necessary to further supplement the information security field of the cloud Internet of vehicles in order to deal with the occurrence of information security problems in the near future.
RSUs act as an intermediary bridge and are responsible for transmitting information from the surrounding Internet of vehicles to the back-end base station and cloud service platform. During this data transmission process, we must acknowledge the information security issues between the vehicles OBU to the RSU, the RSU to the base station BS, and the BS to the cloud service platform. Therefore, this study proposes a transport architecture that can cover the information security issues of OBU–RSU–BS–VM communication. After many evaluations, we found that the blockchain used in monetary information security in recent years is quite appropriate for IoVs.
The blockchain has decentralization characteristics; it is difficult to tamper with and forge and contains traceable transaction information. The elliptic curve cryptosystem, ECC, has a fast operation speed, a short key length up to RSA information security strength, and saves computing resources and storage space. Therefore, the blockchain and ECC are very suitable for research relating to the cloud Internet of vehicles. In addition, the information exchange and transaction of the Internet of vehicles will be directly through the exchange of things and no longer reliant on manual transactions, highlighting that the blockchain is very suitable for use in the environment of the Internet of vehicles. Imagine that human beings will no longer need to exit a car, and they can instead communicate with a fuel dispenser through the OBU, or vehicle cleaning equipment connections and a variety of short-range Internet of things device communications and transactions. The blockchain will play an extremely important role in this process; therefore, we want to develop the information security of IoVs based on the blockchain.
The rest of the present document is structured as follows. An overview of the associated research is presented in Section 2. Section 3 presents the proposed secure data transfer based on a multi-level blockchain framework for the Internet of vehicles. Additionally, this section introduces the transaction block and the ECDSA digital signature, and the information security transmission method. Additionally, the secure mapped/reduced data transmission agreement is presented. The analysis of performance and security is provided in Section 4. Finally, conclusions and subsequent work are explained in Section 5.

3. A Secure Data Transfer Based on a Multi-Level Blockchain Framework for Internet of Vehicles

3.1. The Transaction Block and the ECDSA Digital Signature for IoVs

Due to the huge number of vehicles in the IoVs and the rapidly changing topology, we proposed a customized cloud IoV transaction block and a digital signature for the onboard transaction block through the ECDSA scheme, which can ensure the integrity and non-repudiation of transaction data, thus protecting the transmission security of vehicle transaction information. The proposed transaction block’s internal structure contains the following information, as shown in Figure 1b.
Transaction block header
(1)
Transaction number: the serial number of the transaction.
(2)
Timestamp of the transaction: when the transaction block was produced.
(3)
The sequence number of the transaction block: the sequence of the transaction block that is generated.
Transaction block body
(1)
Vehicle ID: Identification of the vehicle.
(2)
MAC add of the vehicle OBU: the vehicle hardware manufacturing number.
(3)
Timestamp of record: the time in which the transaction record is generated.
(4)
Transmitted plain data: textual information to be transmitted by vehicles.
(5)
The serial number of the transmitted plain data: the amount of data to be transmitted by the vehicles.
(6)
Type of service: The category of cloud service required for the vehicle.
In addition, this study considers the integrity and non-repudiation of the transaction data; we exploit the ECDSA to achieve the aforementioned functions.
ECDSA signature procedures
When the vehicles need to transmit data, the transaction block must be digitally signed by the ECDSA to assure the integrity and non-repudiation of the transaction data [20,21]. Here, we introduce the elliptic curve cryptosystem into the OBU and RSU, and the detailed signature process is described below, as shown in Figure 2.
Figure 2. The procedure of the ECDSA digital signature on the transaction block.
Initially phase:
Phase 1.
First, the registered OBU takes an elliptic curve EGF(p) (l, q) and owns an order d = |EGF(p) l, q)| + 1 and a generator R. Moreover, d indicates the number of points on this curve containing the distant point to infinity.
Phase 2.
Afterward, this vehicle OBU selects a private key S and a point R = (XR, YR); S is between 1 and d − 1, and d is the R order. In the meantime, the OBU computes the public key PK = S × R = S × (XR, YR) through the R generator. In this case, this system stands for the public key PK, as (l, q, p, d, R, PK).
Signature phase:
Phase 3.
The OBU randomly selects an integer number e that is equally between 1 and d − 1. After that, it calculates a P point = (XP, YP) = e × R = e × (XR, YR).
Phase 4.
Next, the OBU uses the delivered transaction block TD coming from the point P and a coordinate value (X, Y) as inputs and calculates f = Hash (TD) using SHA256.
Phase 5.
H = XP mod d.
Phase 6.
DS = (S × H + f) × e−1 (mod d).
Phase 7.
(TD, H, DS) is the result of the signature; if H or DS is equal to 0, the system replicates Phase 3 to generate an arbitrary integer e until it is accomplished from Phase 1 to Phase 7.
Verify phase
Phase 8.
Once the recipient receives the transaction block TD and the result (TD, H, DS) of the signature, the recipient calculates f = Hash (TD), Z = DS−1 mod d, W1 = f × Z mode d, W2 = H × Z mode d. M = (XM, YM) = W1 × R + W2 × PK.
Phase 9.
Afterward, the recipient checks if H is equivalent to XM.
Phase 10.
If H = XM, the recipient agrees to this signature or otherwise refuses the incoming signature.
Secure phase
If the vehicles want to deliver data to the cloud service platform, first, the vehicles need to execute the ECDSA digital signature procedure on the transaction block to obtain the digital signature result.
The architecture based on a multi-level security management
The IoVs integrates the topology logic of onboard, roadside devices and cloud-side servers. Since the Internet of vehicles changes rapidly, here we consider the information security efficiency of the IoVs. Different from the traditional blockchain framework, the designed multi-level blockchain architecture is divided into three layers as an edge computing architecture. Each layer is in charge of its own tasks and performs the operation of the blockchain. Thus, the proposed architecture can handle the latency issues of a traditional block. In this system, each level of security is similar to a layered delegation of authority, and each level performs its own responsibilities. The designed multi-layered security architecture of the Internet of vehicles blockchain mechanism is shown in Figure 3. This architecture is an intra-blockchain based on the M-Tree dynamic management of each base station to deal with the security issues of all levels of the IoVs [21]. Since the vehicle is located at the bottom of the multi-level security architecture of the Internet of vehicles blockchain system, we lay out the vehicle to the leaf node. Additionally, RSUs manage the transaction block transmitted from the vehicle’s OBU. In this study, RSUs are placed on the third level of the security level, the base station (local credential authorization) is placed at the second layer, and the cloud server VMmaster (global credential authorization) corresponds to the upper layer of the security level, which is the top layer and is responsible for cooperating with different base stations to construct an inter-blockchain.
Figure 3. The multi-level security architecture.
This study takes into account the fact that the OBU devices equipped in vehicles generally do not have strong computing capabilities. Before deployment, we verify and register the BSs and RSUs; therefore, if nonregistered BSs and RSUs want to join the operation, this system will turn them down. In this study, RSUs are responsible for the communication transmission of the transaction blocks with surrounding vehicles, and the base stations BSs with more powerful computing functions are responsible for cooperating with different RSUs to construct an intra-blockchain, while the back-end cloud PKI is in charge of combining the intra-blockchains into a complete inter-blockchain for this IoVs system.
The proposed architecture can efficiently enhance the performance of the overall blockchain and reduce the synchronization time of the blockchain. Additionally, we adopt the ECDH key exchange protocol to compute the common conference key between the routers and encrypt/decrypt the transmitted data to ensure the security of the information transmission among the base station, routers and the PKI VMmaster.
To this end, a multi-level blockchain management protocol is proposed, and the elliptic curve signature cryptosystem is embedded into the vehicles’ OBU and roadside devices’ RSUs [21]. When the transaction message is transmitted by the vehicles, we adopt the transaction block and sign the transaction block through ECDSA to ensure the non-repudiation of the transaction and ensure the integrity of the transaction data.
Herein, this study assumes that when the moving vehicles pass through the path C1 ←→ C2 ←→ C3 ←→ C4 and transmit the transaction, the blocks are TD1~TD4, as shown in the red line of Figure 4. This study employs blockchain algorithms to protect the delivered transaction block. The detailed procedure is described below, and the usage notation in this system is represented in Table 1.
Figure 4. The routing path of the transaction block.
Table 1. The usage of notation in this system.
Phase 1:
First, the RSU is responsible for calculating the internal cluster blockchain named intra_clusterBC.
Step 1.
In this study, ECDSA digital signatures are used to digitally sign the transaction block. First, each vehicle C1~C4 performs an ECDSA signature on all of the transmitted transaction blocks TD1~TD4. Subsequently, we adopt SHA256 to calculate the hash value of each vehicle’s transaction block signature. Subsequently, H(SigCi(TDi)) is obtained, and the digital signature result is mapped to the Merkle tree leaf node MNi = [H(SigCi(TDi))||SigCi(TDi)], i = 1~4, as shown in Figure 5. For example, MN1 = [H(SigC1(TD1))||SigC1(TD1)], MN2 = [H(SigC2(TD2))||SigC2(TD2)], MN3 = [H(SigC3(TD3))||SigC3(TD3)], MN4 = [H(SigC4(TD4))||SigC4(TD4)].
Figure 5. The calculation and verification of the Merklet root hash value.
Step 2.
Afterward, we combine two nearby Malekle nodes together and execute the hash operation to obtain the parent node at level 1 MNL1[(i+1)/2] = [H(H(SigCi(TDi))|H(SigCi+1(TDi+1)))||SigCi(TDi)|SigCi+1(TDi+1)], i = 1, 3, 5, 7,….
Step 3.
The above similar steps are repeated to combine two nearby parent nodes and execute the hash operation to obtain the ancestor node at level 2 MNL2[(j+1)/2] = [H(H(H(SigCi(TDi))|H(SigCi+1(TDi+1)))|H(H(SigCi+2(TDi+2))|H(SigCi+3(TDi+3))))]|| H(SigCi(TDi)|SigCi+1(TDi+1)|SigCi+2(TDi+2)|SigCi+3(TDi+3) ], i = 1, 5, 9,…, j = 1, 3, 5, 7,….
Step 4.
Repeat step 2 until the system obtains the Markle tree root node, as shown by the black dotted line in Figure 5.
Phase 2:
The base station BS connects the blockchains named intra_clusterBC, which are formed by the RSU, and there is a corresponding RSU responsible for the connected vehicles. Since each RSU is in charge of the management of the block within the cluster, this study assigns RSUix, respectively, where i represents the level, and x represents the number of the RSU and also the intra_clusterBCx.
Additionally, multiple vehicles in each RSUix transmit their signed transaction block, the block name is Blockix, and the block is managed by RSUix. Afterward, BSi, where i represents the number of the base station, connects the intra_clusterBCi formed by the RSUix, as shown in Figure 6 and Figure 7.
Figure 6. The multi-level blockchain framework for Internet of vehicles.
Figure 7. The detailed structure of the intra_clusterBC.
Phase 3:
The cloud service platform PKI VMmaster combines each intra_clusterBCi coming from BSi to form inter_clusterBC, as shown in Figure 6.
Finally, the cloud service platform PKI VMmaster must integrate and manage the intracluster blockchain sent back by all the base stations. Since the cloud service platform VMmaster is located in the top layer of the whole system, the intra_clusterBCi is managed by BSi must be concatenated to form the intercluster blockchain named inter_clusterBC of the whole system, as shown in Figure 6.

3.2. Information Security Transmission Method between IoVs and Routers

When the intra_clusterBCx is complete, the base station BSx is responsible for transmitting the intra_clusterBCx to the cloud service platform VMmaster, and the transmission process must pass through the router to protect the intra_clusterBCx information. This study adopts the elliptic curve cryptographic exchange protocol, ECDH, to protect the transmitted data. Here, we assume that the base station BSx and router are secure and certified before deployment. The delivered data are routed through the BS1R1R2R3R4→PKI VMmaster path, as shown by the red line in Figure 4.
Initially, the vehicle digitally signs the transaction block using ECDSA and then performs a hash operation through the RSU to obtain the hash value of the Merkle tree root and the complete block. When each RSU performs similar operations and individually transmits its blocks to the BS, the BS can concatenate the received blocks into an intra_clusterBC. The router then transfers the intra_clusterBC to the destination, VMmaster. In this study, ECDH key agreement is used on the routing side, and the two parties use the ECDH conference key to cipher and decipher the transmitted data [21]. The ECDH mechanism is similar to the traditional Diffie–Hellman key exchange protocol, where both sides set up a conference key over an unsecured channel [22]. Since asymmetric cryptosystems have a key length of at least 1024 bits, they offer an elevated grade of security. However, ECDH utilizes the key protocol of Diffie–Hellman to implement elliptic curve cryptosystems that require merely a 160-bit key strength and use less computing power to achieve similar security intensity [23,24]. Therefore, it is highly adapted to the Internet of vehicles that are short of computer capabilities. Similarly, in this study, the information security transmission between the router and the cloud service platform can also be protected by ECDH.
Cloud information security transmission mechanism
When BS1 receives the intra_clusterBC1, BS1 and R1 cooperate to figure out the common conference key SKBS1_R1 using the ECDH key exchange protocol, and then BS1 and R1 adopt SKBS1_R1 to encrypt and protect the timestamp, sequence number, routing path, and intra_clusterBC1. Then, the encrypted result is delivered to the R1 router.
#BS1R1
ENSKBS1_R1[(BS1)|SN|TS|intra_clusterBC1]
When the router R1 receives the message, it decrypts the accepted encrypted message through the common conference key of SKBS1_R1 and adds its identity ID to the passing path. Then, depending on the routing table, R1 and the following router R2 use the ECDH protocol to jointly calculate the conference key of SKR1_R2, and then R1 encrypts the entire message and transmits the encryption result to the R2 router.
#R1R2
ENSKR1_R2[(R1, BS1)|SN|TS|intra_clusterBC1]
In the same way, when the router R2 receives the message, it decrypts the accepted encrypted message through the common conference key of SKR1_R2 and adds its own ID to the passing path. Then, depending on the routing table, R2 and the following router R3 use the ECDH protocol to jointly calculate the conference key of SKR2_R3, and then R1 encrypts the entire message and transmits the encryption result to the R2 router. Therefore, it repeats until the message is delivered to the PKI VMmaster.
#R2R3
ENSKR2_R3[(R2, R1, BS1)|SN|TS|intra_clusterBC1]
#R3R4
ENSKR3_R4[(R3, R2, R1, BS1)|SN|TS|intra_clusterBC1]
#R4→PKI VMm
ENSKR4_VMmaster[(R4, R3, R2, R1, BS1)|SN|TS|Intra_clusterBC1]
When VMmaster receives the encrypted message, it immediately uses the SKR4_VMmaster to decrypt the encrypted message to obtain intra_clusterBC1, and so on to obtain the cluster blockchain from BS2~BSN, where there are intra_clusterBC1~intra_clusterBCN, and then they are concatenated together to become a complete inter_clusterBC.
Under special circumstances, such as vehicle emergencies wherein the vehicle needs to transmit data immediately, only RSU1 is responsible for clustering the internal vehicles to transmit the transaction information in a single block. In order to facilitate the explanation of the block transmitted by this single RSU1 for explanation, we assume that RSU1 contains vehicles C1~C4. To guarantee security during data transmission, first, BS1 and R1 calculate the conference key of SKBS1_R1 between each other via the ECDH key exchange agreement, and subsequently, BS1 encrypts and protects the routing path, sequence number, timestamp stamp and the Merkle tree root HMAC value in the block, concatenating the original data, and then transmitting the encrypted result to the R1 router.
#BS1R1
ENSKBS1_R1[(BS1)|SN|TS|[H(H(H(SigC1(TD1))|H(SigC2(TD2)))|H(H(SigC3(TD3))|H(SigC4(TD4))))||(SigC1(TD1)|SigC2(TD2)|SigC3(TD3)|SigC4(TD4))]]
When R1 receives the message, the two parties can decrypt the accepted encrypted message because they have a common conference key of SKBS1_R1. Then, its own ID is appended to the passing path, and referring to the routing table, R1 and the following router R2, the two parties cooperate via the ECDH key exchange agreement to calculate the conference key of SKR1_R2, and then R1 encrypts the entire message[(R1, BS1)|SN|TS|[H(H(H(SigC1(TD1))|H(SigC2(TD2)))|H(H(SigC3(TD3))|H(SigC4(TD4))))||(SigC1(TD1)|SigC2(TD2)|SignC3(TD3)|SignC4(TD4))]], transmitting the encryption result to the R2 router.
#R1R2
ENSKR1_R2[(R1,BS1)|SN|TS|[H(H(H(SigC1(TD1))|H(SigC2(TD2)))|H(H(SigC3(TD3))|H(SigC4(TD4))))||(SigC1(TD1)|SigC2(TD2)|SigC3(TD3)|SigC4(TD4))]]
When R2 obtains the data transmitted by R1, both parties decrypt the encrypted data through SKR1_R2, the common conference key, and then R2 adds its ID to the passing path. Then, depending on the routing table, R2 and the following router, R3, work together to calculate the conference key of SKR2_R3 using the ECDH key exchange protocol, and then R2 use SKR2_R3 to encrypt the entire message [(R2, R1, BS1)|SN|TS |[H(H(H(SigC1(TD1))|H(SigC2(TD2)))|H(H(SigC3(TD3))|H(SigC4(TD4))))||(SigC1(TD1)|SigC2(TD2)|SigC3(TD3)|SigC4(TD4))]], transmitting the encrypted result to the R3 router.
#R2R3
ENSKR2_R3[(R2, R1, BS1)|SN|TS |[H(H(H(SigC1(TD1))|H(SigC2(TD2)))|H(H(SigC3(TD3))|H(SigC4(TD4))))||(SigC1(TD1)|SigC2(TD2)|SigC3(TD3)|SigC4(TD4))]]
Similarly, when R3 obtains the data transmitted by R2, both parties calculate the common conference key of SKR2_R3, decrypt the received encrypted data, and append its own ID to the passing path. Afterward, based on the routing table, R3 and the following router, R4, calculate the common conference key of SKR3_R4 via the ECDH key exchange agreement, and then R3 uses the SKR3_R4 to cipher the entire message [(R3, R2, R1,BS1)|SN|TS|[H(H(H(SigC1(TD1))|H(SigC2(TD2)))|H(H(SigC3(TD3))|H(SigC4(TD4))))||(SigC1(TD1)|SigC2(TD2)|SigC3(TD3)|SigC4(TD4))]], subsequently delivering the enciphered result to the router R4.
#R3R4
ENSKR3_R4[(R3, R2, R1, BS1)| SN|TS |[H(H(H(SigC1(TD1))|H(SigC2(TD2)))|H(H(SigC3(TD3))|H(SigC4(TD4))))||(SigC1(TD1)|SigC2(TD2)|SigC3(TD3)|SigC4(TD4))]]
#R4R5
ENSKR4_R5[(R4, R3, R2, R1, BS1)|SN|TS |[H(H(H(SigC1(TD1))|H(SigC2(TD2)))|H(H(SigC3(TD3))|H(SigC4(TD4))))||(SigC1(TD1)|SigC2(TD2)|SigC3(TD3)|SigC4(TD4))]]
The above steps are repeated, and R4 and R5 obtain the transmitted encrypted message; then, SKR3_R4 and SKR4_R5 decrypt the encrypted message through the common conference key and append their own ID to the routing path. Subsequently, R5 finds the destination of VMmaster according to the routing path table, and then the two parties use ECDH to jointly calculate the conference key SKR5_VMmaster, and then R5 uses the SKR5_VMmaster to encrypt the entire message [(R5, R4, R3, R2, R1, BS1)|SN|TS|[H(H(H(SigC1(TD1))|H(SigC2(TD2)))|H(H(SigC3(TD3))|H(SigC4(TD4))))||(SigC1(TD1)|SigC2(TD2)|SigC3(TD3)|SigC4(TD4))]] and send the encrypted result to VMmaster.
#R5→PKI VMmaster
ENSKR5_VMmaster[(R5, R4, R3, R2, R1, BS1)|SN|TS |[H(H(H(SigC1(TD1))|H(SigC2(TD2)))|H(H(SigC3(TD3))|H(SigC4(TD4))))||(SigC1(TD1)|SigC2(TD2)|SigC3(TD3)|SigC4(TD4))]]
Upon receiving the data, PKI VMmaster deciphers the enciphered data through the SKR5_Vmmaster, confirms the service type required by the TS (type of service) field inside each onboard transaction block, and then transmits the data to the correlative cloud service server to perform the emergency service required by the vehicle. Since the PKI VMmaster is the master VM of the cloud service platform [21], the VMmaster subsequently continues to perform mapping/reduction tasks.

3.3. The Secure Data Transmission Agreement for Map/Reduce

When the transaction block of the vehicle is transmitted to the cloud platform to perform mapping/reduction operations, it may be attacked by malicious VMs. Therefore, this study considers the certainty and security of the identity of VMs that have joined operations to avoid identity spoofing. When the reduction operation reads the data from the mapper, it must also confirm the integrity of the data and confirm the identity of the mapper so as to avoid malicious modifications of the data and read the data transmitted by the malicious VMs. In summary, this study proposes that the group signature and threshold key protection mechanism perform secure mapping and reduction operations, mainly using the secret sharing method proposed by Shamir and Blakley [25]. This mechanism contains two essential parameters. There is the threshold value, n, and the number of shared keys, m, which are generally expressed as (m, n), and this method has a secret fault tolerance mechanism.
First, the system distributes the selected master key into m different sharing keys, and each computer participating in the cloud computing obtains a shared key, and when the number of shared keys obtained is greater than or equal to the n value, the master key can be recovered. However, when the number of shared keys obtained is less than n, the master key cannot be recovered.
In the proposed model, the PKI VMmaster computer first calculates the system key, S, and its corresponding public key, P, and then divides the system key into m shared secret keys (S1, S2, …, Sm). PKI VMmaster is responsible for assigning each shared secret key to the m mapper VMi computers.
When the system is destroyed, the newly appointed PKI VMmaster only needs to collect n shared secret keys to restore the original system key of S. After passing through the threshold to share the secret operation, each mapper VMi in the cloud has the shared key, Si, and its corresponding public key, Pi.
In addition, we use {Mi, TDsigi} to represent the individual signature of each mapper, VMi, and when the PKI VMmaster receives each TDsigi and verifies the signatures of m VMi, the signature, Mi and TDsigi (i = 1, 2, 3, …, m), are combined to form a group signature {M, TDSig}, which must satisfy TDSig = TDSig1 + TDSig2 + TDSig3 +...+ TDSigm mod p, where p is a prime. By using this step, we can confirm that the data are calculated by the correct computer VMi and that the restructured data are correct.
Map operation
(1)
Initially, when the PKI VMmaster receives the request from the user, it then decides which mapper VMi can participate in the operation in the future and then transmits the task to VMi. With the purpose of confirming the validity of the PKI VMmaster identity of the request, the PKI VMmaster is required to sign the request information sent to the mapper VMi, the identity of the PKI VMmaster as IDVMmaster and the data to be transmitted as TDSigi, so the mapper VMi subsequently sends a request to verify the identity of the PKI VMmaster. Here, we represent the complete data TD = [H(H(H(SigC1(TD1))|H(SigC2(TD2)))|H(H(SigC3(TD3))|H(SigC4(TD4))))||(SigC1(TD1)|SigC2(TD2)|SigC3(TD3)|SigC4(TD4))], and divide TD into several segments, according to mapping/reduction operations.
[Request| IDVMmaster, TDSigi]VMmaster_sig
Once the mapper VMi receives the signature message, it uses the VMmaster’s public key to verify whether the identity of the requestor VMmaster is correct and then signs the response message to reply, the mapper VMi’s own identity IDVMi-mapper, and the transmitted message {Mi, TDSigi}.
[Reply|IDVMi-mapper, {Mi, TDSigi}]VMi_sig
(2)
Next, PKI VMmaster adopts the data segment of TDSigi as the input and computes its HMAC (TDSigi) value, accompanied by the mapper VMi’s identity IDVMi-mapper, the original data TDSigi, the timestamp and the results of the partial group signatures {Mi, TDSigi}. Finally, PKI VMmaster signs the entirety of the data through the secret sharing key of Si on the receiving end and transmits the signature result to the mapper VMi.
[Si, [IDVMi-mapper, TDsigi, Time Stamp, {Mi, TDSigi}||HMAC(TDsigi)]Si_sig
The transmitted data received by the mapper VMi are then decrypted with the public key of Pi corresponding to the secret sharing key of Si, and the correctness of the shared key of Si and the integrity of the HMAC are verified.
Reduce operation
(3)
Once the reducer, VMx, accepts an appointed job from the VMmaster, for the purpose of ensuring that the sender is accurate, the PKI VMmaster must sign the requested information, the VMmaster identity IDVMmaster and the delivered data Infreq, and the reducer of VMx will then be able to verify the identity of the VMmaster.
[Request| [IDVMmaster, Infreq] ]VMmaster_sig
After receiving the delivered data, VMx has to confirm whether the VMmaster identity named IDVMmaster is correct through the VMmaster public key and subsequently signs the response reply, the reducer’s identity IDVMx-reducer and the response data Infrep.
[Reply|IDVMx-reducer, Infrep]VMx-reducer_Sig
(4)
Successively, the reducer, VMx, receives the data segments {Mi, TDSigi}~{Mn, TDSigm }, the timestamp, and the sequence number signed by the mappers VMi’s secret-sharing key Si from mappers VMi (i = 1~m).
Mappers VM(1~m)→The reducer VMx
[{Mi, TDSigi}, Time Stamp, SqNo]Si_Sig
(5)
After receiving the delivered data from the mapper, VM(1~m), the VMx reducer immediately requests the corresponding Pi public key to the VMi mapper from the PKI VMmaster.
The reducer VMx→PKI VMmaster
[Request|Pi]VMx-reducer_Sig
(6)
Subsequently, the VMx reducer gains the public key corresponding to the Si from VMmaster, which participates in the operation mapper, VM(1~m).
The PKI VMmaster→The reducer VMx
[Reply|Pi]VMmaster_Sig
After the reducer, VMx, obtains the public key corresponding to Si, the encrypted data are encrypted, and the signatures {Mi, TDSigi} (i = 1, 2, 3,..., m) of each VMi are merged to become the group signature, {M, TDSig}, where TDSig = TDSig1 + TDSig2 + TDSig3 + … + TDSigm mod p. The reducer, VMx, then uses the PKI VMmaster’s public key to confirm the {M, TDSig} group signature and then merges the data segments into an integral message. Eventually, the VMx reducer delivers this integral information to the vehicle that sent the request to complete the map/reduce operation with a confirmed identity and secure data transmission.
The proposed mechanism is fast, effective and also fault-tolerant. When the master is damaged, only n mapper’s shared secret keys need to be collected to reassemble the system secret key, S. Additionally, the mapper and the reducer protect each other through each other’s secret shared keys to secure the transmitted data from being changed during data transmission. The time stamp and the sequence number protect against repeated reply transmissions. Moreover, by verifying the identity of the mapper/reducer and assigning work through the master, malicious computers can also be prevented from impersonating mappers or reducers to perform DoS, denial of service.

4. The Analysis of Security Additionally, Performance

This section presents an analysis of the security and performance of the proposed scheme. While the data are being transferred, we have to esnure the integrity of the transaction block and discover the modified block. Additionally, we also need to ensure the participant of joining secure map/reduce operations to avoid impersonal attacks. Additionally, this section provides the efficiency analysis of performing a group signature to compare it with the Kerberos scheme. The detailed descriptions are as follows:
(1)
Merkle tree verification
The advantage of Merkle trees is that if a block is collapsed or altered, the root value of the Merkle tree can be gained by recomputing along the path of the destroyed node to the root node of the Merkle tree. In addition, we can also determine the location of the damaged child nodes of the Merkle tree according to the following steps, as shown by the blue line in Figure 5.
Step 1.
Taking SigC1(TD1), SigC2(TD2), SigC3(TD3), SigC4(TD4) as the input, calculate the latest H* hash value for the MNL21 root node and confirm if the original value [H(H(H(SigC1(TD1))|H(SigC2(TD2)))|H(H(SigC3(TD3))|H(SigC4(TD4))))||(SigC1(TD1)|SigC2(TD2)|SigC3(TD3)|SigC4(TD4))] is equal to H*. When they are not equal, proceed to verify their child nodes, MNL11 and MNL12.
Step 2.
Similar hash jobs are performed repeatedly, and if MNL11 is the same and the node MNL12 is different, this study will examine the child nodes, MN3 and MN4, of the node MNL12.
Step 3.
Similar hash jobs are repeated, and if MN3 is equal but MN4 is not, this study will examine MN4 and finally realize the accurate collapsed node.
In the process of this comparison manipulation, this mechanism merly consumes the time complexity of comparison O(log2M), and M is the number of transaction blocks. In addition, O(M) of creating this Merkle tree is the amount of hash operations computed.
(2)
Group signature verification
Initially, the PKI VMmaster announces a public key, Z, to the participating group members to confirm the message {Mi, TDSigi} of the signature. Additionally, this formula for the verification is as follows:
Z T D S i g i = M M g T D S i g mod p
If the above verification formula (1) can be derived, it means that the group signature of the message {Mi, TDSigi} is correct because the VMi signature value {Mi, TDSigi} can be satisfied.
Z i T D S i g i j = 1 , j i n x j x i x j = M i M g T D S i g i mod p
Multiply the above equation (2) n times (i = 1, 2, 3, …, n) to obtain Equation (3).
j = 1 n Z i T D S i g i j = 1 , j i n x j x i x j = i = 1 , j 1 n M i M g T D S i g i mod p
Additionally,
g T D S i g i i = 1 i f x i j = 1 , j i n x i x i x j mod p = i = 1 n M i M g i = 1 n T D S i g i mod p
Let Xi = 0, and this study can derive the following equation
g T D S i g i f 0 = M M g T D S i g mod p .
The correct verification equation for the signature of the verification group can be derived from the above equation.
Z T D S i g i = M M g T D S i g mod p
(3)
Efficiency evaluation
In this study, we adopt MediaTek MT7697 CPU with ARM®® Cortex®®-M4 with a floating-point computing unit and 1T1R 802.11 b/g/n Wi-Fi as OBUs and RSUs. In addition, this study embeds the blockchain protocol and the ECDSA cryptosystem in OBUs and RSUs to simulate the proposed multi-level blockchain management protocol. Moreover, in order to prove system efficiency and facilitate the evaluation of the time of reconstructing the system key, S, this study exploits a (m, n) threshold scheme and gradually increases the threshold value from 1 to n on the m mapper VMs to rebuild the S system key and evaluate the consuming time. Figure 8a indicates that in the beginning, the system increases stably and needs more time to recover the system key, S, with the increasing threshold values. However, when the system reaches the threshold value, the time consumed becomes smooth, as shown in Figure 8a. Additionally, when we compare our group signature scheme with no security and the Kerberos scheme, Figure 8b depicts that our proposed scheme costs more time than a no-security scheme when we increase the number of the mappers m under the fixed threshold value n. However, it is still better than the Kerberos scheme because the need for Kerberos is an authentication server and a ticket-granting server, thus consuming extra operations in cloud operations.
Figure 8. The time consumed during reconstructing the system key, S. (a) Under various threshold values. (b) Under various schemes and fixed threshold value.
In addition, the limitations of the proposed method depend on the threshold value of reconstructing the system key. With the increase in the number of vehicles, Figure 8b shows that our proposed threshold signature does not change significantly compared to Kerberos’s time consumption growth. This is mainly because the system key can be reconstructed as long as we collect the partial key that reaches the threshold value, unlike Kerberos, which must obtain partial keys from all of the participants in order to reconstruct the system key. Therefore, after reaching the threshold value, our system only needs a fixed time to reconstruct the system key, and thus the communication overhead is not huge. Figure 8b shows a few changes in consuming time after collecting n partial keys to reconstruct the system key under a fixed threshold value of n.
(4)
The threshold cryptosystem with fault tolerance
Since this study adopts the threshold-sharing key mechanism, it has a fault-tolerant mechanism and can avoid a single point of error. When the system key of S is damaged or VMmaster collapses. Mapper VMs collect the secret-sharing key, Si, of the surviving mappers to recover the system key, S, through Lagrange interpolation polynomial to figure out S, and then the system key can be regained and avoid the system collapsing. Even if the system faces malicious attacks, only n mappers VMs exit to sign the transmitted data instead of m members, and then the system can verify whether the transmitted data are correct.
(5)
Blockchain integrity
Since the prev_hash field of the next block indicates the hash value of the previous block header, the system can use this as a certificate of overall blockchain integrity [26,27]. When an intruder modifies the historical transaction in the previous block number, N − 1, even if only any node value in the Merkle tree is modified, the Merkle root value of the block header will be affected by the linkage, and the prev_hash value of the subsequent block number N will also be invalidated, unless the intruder also changes the prev_hash value of each block header in the blockchain, but there are technical difficulties due to the decentralized nature of the blockchain.
(6)
Comparison of the related research
This study compares our proposed scheme with the related research on scalability, communication cost and a single-point failure. The proposed multi-level blockchain is composed of three levels, which are responsible for blockchain operation. Therefore, when the number of vehicles is increased, the problem of excessive single-point calculation and single-point failure can be avoided. At the same time, it can reduce much of the communication costs between vehicles and make the system more scalable. By contrast, other approaches mostly use the traditional blockchain architecture. They have problems related to expansion difficulty, huge communication costs and the single-point failure of authentication, as described in Table 2.
Table 2. The comparison of the related research.

5. Conclusions

Since the IoVs operates in a communication environment open to all, personal information is shared within the wireless network. Consequently, the issue of information security in terms of the IoVs will therefore be important [29,30]. The main contribution of this study is to propose a new transaction block and ECDSA digital signature that are able to ensure the non-repudiation of the transaction and assure the integrity of the transaction data. In addition, the designed multi-level blockchain architecture distributes the operations within intra_clusterBC and inter_clusterBC to improve the efficiency of the entire block. Moreover, in order to secure the security of OBU-RSU-BS-VM, this research adopts ECDH key exchange agreement to protect the transmitted information. Eventually, we consider the collected data from vehicles that will be delivered to the back-end cloud service platform to perform the big data computing and analysis and generate value-added information [31,32]. This research has to ensure the VMs identity of joining the map/reduce operations, and therefore we exploit the secret-sharing mechanism to propose the group signature and threshold key protection mechanism to accomplish the secure map and reduce operations. The threshold scheme can recover the system key as long as the threshold partial key is collected. This avoids the occurrence of PKI single-point failure. Overall, the proposed architecture is capable of securing data transmission among IoV devices and cloud service platforms. In this way, this study can ensure the security of the information and obtain a secure IoV.

Funding

This research received no external funding.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Benkirane, B.; Benaziz, M. Performance evaluation of IEEE 802.11p and IEEE 802.16e for vehicular ad hoc networks using simulation tools. In Proceedings of the IEEE 5th International Congress on Information Science and Technology, Marrakech, Morocco, 21–27 October 2018. [Google Scholar]
  2. Zhu, P.; Zhu, K.; Zhang, L. Security analysis of LTE-V2X and a platooning case study. In Proceedings of the IEEE Conference on Computer Communications Workshops, Toronto, ON, Canada, 6–9 July 2020. [Google Scholar]
  3. Wang, X.; Zha, X.; Ni, W.; Liu, R.P.; Guo, Y.J.; Niu, X.; Zheng, K. Survey on blockchain for Internet of things. Comput. Commun. 2019, 136, 10–29. [Google Scholar] [CrossRef]
  4. Han, D.; Zhu, Y.; Li, D.; Liang, W.; Souri, A.; Li, K.C. A blockchain-based auditable access control system for private data in service-centric IoT environments. IEEE Trans. Ind. Inform. 2022, 18, 3530–3540. [Google Scholar] [CrossRef]
  5. Lin, H.Y. Secure cloud Internet of vehicles based on blockchain and data transmission scheme of map/reduce. Comput. Sci. Inf. Syst. 2023, 20, 137–156. [Google Scholar] [CrossRef]
  6. Wang, D.; Wang, H.; Fu, Y. Blockchain-based IoT device identification and management in 5G smart grid. EURASIP J. Wirel. Commun. Netw. 2021, 125. [Google Scholar] [CrossRef]
  7. Jiang, T.; Fang, H.; Wang, H. Blockchain-based internet of vehicles: Distributed network architecture and performance analysis. IEEE Internet Things J. 2019, 6, 4640–4649. [Google Scholar] [CrossRef]
  8. Shrestha, R.; Nam, S.Y. Regional blockchain for vehicular networks to prevent 51% attacks. IEEE Access 2019, 7, 95033–95045. [Google Scholar] [CrossRef]
  9. Ma, X.; Ge, C.; Liu, Z. Blockchain-enabled privacy preserving Internet of vehicles: Decentralized and reputation-based network architecture. Netw. Syst. Secur. 2019, 11928, 336–351. [Google Scholar]
  10. Dai, H.; Zheng, Z.; Zhang, Y. Blockchain for internet of things: A survey. IEEE Internet Things J. 2019, 6, 8076–8094. [Google Scholar] [CrossRef]
  11. Lu, Y.; Huang, X.; Zhang, K.; Maharjan, S.; Zhang, Y. Blockchain empowered asynchronous federated learning for secure data sharing in internet of vehicles. IEEE Trans. Veh. Technol. 2020, 69, 4298–4311. [Google Scholar] [CrossRef]
  12. Liu, K.; Chen, W.; Zheng, Z.; Li, Z.; Liang, W. A novel debt credit mechanism for blockchain-based data-trading in internet of vehicles. IEEE Internet Things J. 2019, 6, 9098–9111. [Google Scholar] [CrossRef]
  13. Lu, Z.; Wang, Q.; Qu, G.; Zhang, H.; Liu, Z. A blockchain-based privacy-preserving authentication scheme for VANETs. IEEE Trans. Very Large Scale Integr. Syst. 2019, 27, 2792–2801. [Google Scholar] [CrossRef]
  14. Cui, J.; Ouyang, F.; Ying, Z.; Wei, L.; Zhong, H. Secure and efficient data sharing among vehicles based on consortium blockchain. IEEE Trans. Intell. Transp. Syst. 2022, 23, 8857–8867. [Google Scholar] [CrossRef]
  15. Bagga, P.; Sutrala, A.K.; Das, A.K.; Vijayakumar, P. Blockchain-based batch authentication protocol for Internet of vehicles. J. Syst. Archit. 2021, 113, 101877. [Google Scholar] [CrossRef]
  16. Maria, A.; Rajasekaran, A.S.; Fadi, A.T.; Altrjman, C.; Mostarda, L. BAIV: An efficient blockchain-based anonymous authentication and integrity preservation scheme for secure communication in VANETs. Electronics 2022, 11, 488. [Google Scholar] [CrossRef]
  17. Zheng, J.; Wang, X.; Yang, Q.; Xiao, W.; Sun, Y.; Liang, W. A blockchain-based lightweight authentication and key agreement scheme for internet of vehicles. Connect. Sci. 2022, 34, 1430–1453. [Google Scholar] [CrossRef]
  18. Liang, W.; Yang, Y.; Yang, C.; Hu, Y.; Xie, S.; Li, K.C.; Cao, J. PDPChain: A consortium blockchain-based privacy protection scheme for personal data. IEEE Trans. Reliab. 2022, 1–13. [Google Scholar] [CrossRef]
  19. Stephen, S.M.; Jaekel, A. Blockchain based vehicle authentication scheme for vehicular ad-hoc networks. In Proceedings of the IEEE Intelligent Vehicles Symposium Workshops, Najoya, Japan, 11–17 July 2021. [Google Scholar]
  20. Genc, Y.; Afacan, E. Design and implementation of an efficient elliptic curve digital signature algorithm (ECDSA). In Proceedings of the IEEE International IoT, Electronics and Mechatronics Conference, Toronto, ON, Canada, 21–24 April 2021. [Google Scholar]
  21. Lin, H.Y.; Hsieh, M.Y. A dynamic key management and secure data transfer based on m-tree structure with multi-level security framework for Internet of vehicles. Connect. Sci. 2022, 34, 1089–1118. [Google Scholar] [CrossRef]
  22. Vijayakumar, P.; Azees, M.; Kozlov, S.A.; Rodrigues, J.J.P.C. An anonymous batch authentication and key exchange protocols for 6G enabled VANETs. IEEE Trans. Intell. Transp. Syst. 2022, 23, 1630–1638. [Google Scholar] [CrossRef]
  23. Moghadam, M.F.; Nikooghadam, M.; Jabban, M.A.B.A.; Alishahi, M.; Mortazavi, L.; Mohajerzadeh, A. An efficient authentication and key agreement scheme based on ECDH for wireless sensor network. IEEE Access 2020, 8, 73182–73192. [Google Scholar] [CrossRef]
  24. Abusukhon, A.; Mohammad, Z.; Al, A. Efficient and secure key exchange protocol based on elliptic curve and security models. In Proceedings of the IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology, Amman, Jordan, 9–11 April 2019. [Google Scholar]
  25. Lin, H.Y.; Hsieh, M.Y.; Li, K.C. Secured map reduce computing based on virtual machine using threshold secret sharing and group signature mechanisms in cloud computing environments. Telecommun. Syst. 2015, 60, 303–313. [Google Scholar] [CrossRef]
  26. Zhang, L.; Xu, J. Blockchain-based anonymous authentication for traffic reporting in VANETs. Connect. Sci. 2022, 34, 1038–1065. [Google Scholar] [CrossRef]
  27. Wu, Z.; Huang, H.; Zhou, Y.; Wu, C. A secure and efficient data deduplication framework for the internet of things via edge computing and blockchain. Connect. Sci. 2022, 34, 1999–2025. [Google Scholar] [CrossRef]
  28. Song, F.; Zhu, M.; Zhu, Y.; You, I.; Zhang, H. Smart collaborative tracking for ubiquitous power IoT in edge-cloud interplay domain. IEEE Internet Things J. 2020, 7, 6046–6055. [Google Scholar] [CrossRef]
  29. Liang, W.; Fan, Y.; Li, K.C.; Zhang, D.; Gaudiot, J.L. Secure data storage and recovery in industrial blockchain network environments. IEEE Trans. Ind. Inform. 2020, 16, 6543–6552. [Google Scholar] [CrossRef]
  30. Wang, Z.; Zhang, L.; Ding, X.; Choo, K.R.; Jin, H. A dynamic-efficient structure for secure and verifiable location-based skyline queries. IEEE Trans. Inf. Forensics Secur. 2022, 18, 920–935. [Google Scholar] [CrossRef]
  31. Yang, H.; Li, Y. A blockchain-based anonymous authentication scheme for Internet of vehicles. In Proceedings of the 13th International Conference on Ambient Systems, Networks and Technologies, Porto, Portugal, 22–25 March 2022. [Google Scholar]
  32. Lin, H.Y.; Hsieh, M.Y.; Li, K.C. A secure information transmission scheme for the cluster blockchain of the Internet of vehicles. In Proceedings of the Computing Conference, London, UK, 22–23 June 2023. [Google Scholar]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.