Sybil Attack-Resistant Blockchain-Based Proof-of-Location Mechanism with Privacy Protection in VANET
Abstract
:1. Introduction
- A new proof-of-location (PoL) mechanism is proposed for verification of vehicle location in VANET and the prevention of Sybil attacks. It does not impose an extra burden on the trusted authorities to manage the polling process as required in other works.
- The privacy of vehicles, including identity and location, is important. Thus, we handle the privacy issues with the help of a PoL privacy preservation mechanism. With the help of this approach, the trajectory of a given vehicle V cannot be traced by a third party T easily. And the validity of the location of a given vehicle V can be proved to a third party.
- Experiments and simulation show that the proposed PoL approach can mitigate Sybil attack problems in VANETs. Furthermore, the use of smart contracts will ensure the privacy of the vehicles and other entities involved in the VANET system.
2. Related Work
3. Requirements for Proof-of-Location Systems
3.1. Anonymous Identity and Privacy
3.2. Authenticity
3.3. Sybil Attack
4. Participating Entities of the System
4.1. Vehicles
4.2. Road Side Units (RSUs)
4.3. Certificate Authority (CA)
4.4. Department of Motor Vehicles (DMV)
4.5. Smart Contract (SC)
4.6. Prover
4.7. Verifier
4.8. Transactions
4.9. Blockchain
5. The Proposed Proof-of-Location Mechanism
Algorithm 1 Algorithm for the proposed PoL mechanism | |
1: | : location report () |
2: | : proof-of-location (PoL) for |
3: | Initialization: list of Vehicles (), list of RSUs (), , puzzle solution (), smart contract (), verifier (), g, q |
4: | Stage 1: |
5: | starts the polling process for vehicles in its communication zone |
6: | for each in list do |
7: | issues random puzzle to |
8: | solve the puzzle and sends solution with to |
9: | if is valid and on time then |
10: | stores location in |
11: | else if is invalid and not in time then |
12: | discard location |
13: | end if |
14: | end forend if |
15: | Stage 2: |
16: | sends to verifier through a secured channel |
17: | for each received in list do |
18: | query time and location to |
19: | computes the validity check function and verifies the equality of |
20: | if equality is valid, i.e., the location sent by vehicle matches with the information in then |
21: | The location of is verified |
22: | else if equality is not valid, i.e., the location sent by vehicle do not match with the information in then |
23: | The location of is not verified |
24: | end if |
25: | end for |
5.1. System Initialization
5.2. Vehicle and RSU Registration
5.3. Computational Puzzle-Based Polling Mechanism
5.4. Privacy-Preserving Proof of Location
5.5. Analysis of Polling Interval and Puzzle Computation Time
6. Experimentation and Performance Evaluation
6.1. Smart Contract Implementation and Gas Cost Analysis
6.2. Simulation Results
6.2.1. Simulation Setup
6.2.2. Evaluation Metrics
- Successful Sampling Probability is the probability that a vehicle is sampled by an RSU at least once while it passes the communication range of the RSU. It is computed as follows.
- Fake Location Registration Probability (FLRP) is the percentage of fake locations accepted by a given RSU in a given time interval. It is computed as follows.
- Malicious Block Insertion Probability is the ratio of malicious blocks mined over the total number of blocks mined in the proposed blockchain.
- Event Message Propagation Delay is the time required to authenticate an event message by a given RSU.
6.2.3. Successful Sampling Probability vs. Polling Interval
6.2.4. Successful Sampling Probability vs. Sampling Time
6.2.5. Fake Location Registration Probability
6.2.6. Malicious Block Insertion Probability
6.2.7. Event Message Propagation Delay
7. Security Analysis and Discussion
7.1. Resistance to Sybil Attack
7.2. Privacy Preservation
7.3. Denial-of-Service (DoS) Attack
7.4. Implementation and Scalability Issues
7.5. Discussion
8. Conclusions and Future Works
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Abbreviations
VANET | vehicular ad hoc network |
ITS | Intelligent Transportation System |
V2V | Vehicle-to-Vehicle Communication |
V2I | Vehicle-to-Infrastructure Communication |
V2N | Vehicle-to-Network Communication |
V2P | Vehicle-to-Pedestrian Communication |
V2G | Vehicle-to-Grid Communication |
DSRC | Dedicated Short Range Communication |
RSU | Road Side Unit |
CA | Certificate Authority |
OBU | On Board Unit |
PoL | Proof-of-Location |
PoW | Proof-of-Work |
CPU | Central Processing Unit |
DMV | Department of Motor Vehicles |
ZKP | Zero-Knowledge Proof |
TA | Trusted Authority |
VIN | Vehicle Identification Number |
ECU | Electronic Control Unit |
References
- Mateen, A.; Hanif, M.Z.; Khatri, N.; Lee, S.; Nam, S.Y. Smart roads for autonomous accident detection and warnings. Sensors 2022, 22, 2077. [Google Scholar] [CrossRef] [PubMed]
- IEEE 802.11p-2010; IEEE Standard for Information Technology—Local and Metropolitan Area Networks—Specific Requirements—Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 6: Wireless Access in Vehicular Environments. IEEE: Piscataway, NJ, USA, 2010.
- Wei, L.; Cui, J.; Zhong, H.; Bolodurina, I.; Gu, C.; He, D. A Decentralized Authenticated Key Agreement Scheme Based on Smart Contract for Securing Vehicular Ad-hoc Networks. IEEE Trans. Mob. Comput. 2023, 23, 4318–4333. [Google Scholar] [CrossRef]
- Shrestha, R.; Bajracharya, R.; Shrestha, A.P.; Nam, S.Y. A new type of blockchain for secure message exchange in VANET. Digit. Commun. Netw. 2020, 6, 177–186. [Google Scholar] [CrossRef]
- Yang, Y.T.; Chou, L.D.; Tseng, C.W.; Tseng, F.H.; Liu, C.C. Blockchain-based traffic event validation and trust verification for VANETs. IEEE Access 2019, 7, 30868–30877. [Google Scholar] [CrossRef]
- Shrestha, R.; Nam, S.Y. Regional blockchain for vehicular networks to prevent 51% attacks. IEEE Access 2019, 7, 95033–95045. [Google Scholar] [CrossRef]
- Baza, M.; Nabil, M.; Mahmoud, M.M.; Bewermeier, N.; Fidan, K.; Alasmary, W.; Abdallah, M. Detecting sybil attacks using proofs of work and location in vanets. IEEE Trans. Dependable Secur. Comput. 2020, 19, 39–53. [Google Scholar] [CrossRef]
- Benadla, S.; Merad-Boudia, O.R.; Senouci, S.M.; Lehsaini, M. Detecting Sybil attacks in vehicular fog networks using RSSI and Blockchain. IEEE Trans. Netw. Serv. Manag. 2022, 19, 3919–3935. [Google Scholar] [CrossRef]
- Chang, S.; Qi, Y.; Zhu, H.; Zhao, J.; Shen, X. Footprint: Detecting Sybil attacks in urban vehicular networks. IEEE Trans. Parallel Distrib. Syst. 2011, 23, 1103–1114. [Google Scholar] [CrossRef]
- Sinha, S. Towards a Centralized Multicore Automotive System. Ph.D. Thesis, Boston University, Boston, MA, USA, 2022. [Google Scholar]
- Zheng, D.; Jing, C.; Guo, R.; Gao, S.; Wang, L. A traceable blockchain-based access authentication system with privacy preservation in VANETs. IEEE Access 2019, 7, 117716–117726. [Google Scholar] [CrossRef]
- Alharthi, A.; Ni, Q.; Jiang, R. A privacy-preservation framework based on biometrics blockchain (BBC) to prevent attacks in VANET. IEEE Access 2021, 9, 87299–87309. [Google Scholar] [CrossRef]
- Li, H.; Pei, L.; Liao, D.; Sun, G.; Xu, D. Blockchain meets VANET: An architecture for identity and location privacy protection in VANET. Peer Netw. Appl. 2019, 12, 1178–1193. [Google Scholar] [CrossRef]
- Qureshi, K.N.; Jeon, G.; Hassan, M.M.; Hassan, M.R.; Kaur, K. Blockchain-based privacy-preserving authentication model intelligent transportation systems. IEEE Trans. Intell. Transp. Syst. 2022, 24, 7435–7443. [Google Scholar] [CrossRef]
- Ahmed, W.; Di, W.; Mukathe, D. Privacy-preserving blockchain-based authentication and trust management in VANETs. IET Netw. 2022, 11, 89–111. [Google Scholar] [CrossRef]
- Li, B.; Liang, R.; Zhu, D.; Chen, W.; Lin, Q. Blockchain-based trust management model for location privacy preserving in VANET. IEEE Trans. Intell. Transp. Syst. 2020, 22, 3765–3775. [Google Scholar] [CrossRef]
- Yang, Z.; Yang, K.; Lei, L.; Zheng, K.; Leung, V.C. Blockchain-based decentralized trust management in vehicular networks. IEEE Internet Things J. 2018, 6, 1495–1505. [Google Scholar] [CrossRef]
- Khatri, N.; Lee, S.; Mateen, A.; Nam, S.Y. Event message clustering algorithm for selection of majority message in VANETs. IEEE Access 2023, 11, 14621–14635. [Google Scholar] [CrossRef]
- Javaid, U.; Aman, M.N.; Sikdar, B. A scalable protocol for driving trust management in internet of vehicles with blockchain. IEEE Internet Things J. 2020, 7, 11815–11829. [Google Scholar] [CrossRef]
- Maffiola, D.; Longari, S.; Carminati, M.; Tanelli, M.; Zanero, S. Goliath: A decentralized framework for data collection in intelligent transportation systems. IEEE Trans. Intell. Transp. Syst. 2021, 23, 13372–13385. [Google Scholar] [CrossRef]
- Shrestha, R.; Nam, S.Y.; Bajracharya, R.; Kim, S. Evolution of V2X communication and integration of blockchain for security enhancements. Electronics 2020, 9, 1338. [Google Scholar] [CrossRef]
- Qiao, Z.; Ma, K.; Zhou, Y.; Yang, Q.; Xia, Z.; Yang, B.; Zhang, M. An Anonymous and Efficient Certificate-Based Identity Authentication Protocol for VANET. IEEE Internet Things J. 2023, 11, 11232–11245. [Google Scholar] [CrossRef]
- Ma, C.; Liu, Y.; Yang, Z.; Ma, J. Towards Building a Faster and Incentive Enabled Privacy-Preserving Proof of Location Scheme from GTOTP. Electronics 2024, 13, 1443. [Google Scholar] [CrossRef]
- Wei, W.; Zhu, N.; Wang, J.; Song, H.; He, J. A scalable blockchain storage scheme for VANET. In Cluster Computing; Springer: Berlin/Heidelberg, Germany, 2024; pp. 1–25. [Google Scholar]
- Rafique, W.; Khan, M.; Khan, S.; Ally, J.S. Securemed: A blockchain-based privacy-preserving framework for internet of medical things. Wirel. Commun. Mob. Comput. 2023, 2023, 2558469. [Google Scholar] [CrossRef]
- McCurley, K.S. The discrete logarithm problem. In Proceedings of the of Symposia in Applied Mathematics USA, Louisville, KY, USA, 16–17 January 1990; Volume 42, pp. 49–74. [Google Scholar]
- Cuellar, D.; Sallal, M.; Williams, C. BSM-6G: Blockchain-Based Dynamic Spectrum Management for 6G Networks: Addressing Interoperability and Scalability. IEEE Access 2024, 12, 59643–59664. [Google Scholar] [CrossRef]
- Sommer, C.; German, R.; Dressler, F. Bidirectionally Coupled Network and Road Traffic Simulation for Improved IVC Analysis. IEEE Trans. Mob. Comput. 2011, 10, 3–15. [Google Scholar] [CrossRef]
- IEEE 1609.4-2016; IEEE Standard for Wireless Access in Vehicular Environments (WAVE)—Multi-Channel Operation. IEEE: Piscataway, NJ, USA, 2016.
- Behrisch, M.; Bieker, L.; Erdmann, J.; Krajzewicz, D. SUMO–simulation of urban mobility: An overview. In Proceedings of the SIMUL 2011, The Third International Conference on Advances in System Simulation, Barcelona, Spain, 23–29 October 2011; ThinkMind: Coimbatore, India, 2011. [Google Scholar]
- Varga, A. OMNeT++. In Modeling and Tools for Network Simulation; Springer: Berlin/Heidelberg, Germany, 2010; pp. 35–59. [Google Scholar]
- Awan, K.M.; Nadeem, M.; Sadiq, A.S.; Alghushami, A.; Khan, I.; Rabie, K. Smart handoff technique for internet of vehicles communication using dynamic edge-backup node. Electronics 2020, 9, 524. [Google Scholar] [CrossRef]
Notations | Description |
---|---|
vehicle i | |
RSU j | |
plate number of | |
location of | |
secret key of | |
the time when issues its location information | |
T | difficulty target to solve the computational puzzle |
pseudo ID of vehicle | |
pseudo ID of RSU | |
vehicle identification number of | |
public key of | |
private key of | |
public key of | |
private key of | |
public key of smart contract SC at | |
private key of smart contract SC at | |
public key of verifier | |
private key of verifier | |
certificate of | |
certificate of | |
H | cryptographic hash function |
RSU ID of | |
g | generator |
q | a prime number |
Time | Location | Z | v | Random Number for OTP |
---|---|---|---|---|
Function | Gas Consumed | Ether Cost (ETH) | Cost In USD |
---|---|---|---|
registerVehicle | 92,041 | 0.00000114715776573 | 0.0031 |
registerRSU | 92,118 | 0. 000000101428973069 | 0.00027 |
registerEvent | 145,142 | 0.000000096121497696 | 0.00026 |
registerSignature | 96,283 | 0.000000088568049906 | 0.00024 |
update_info | 59,721 | 0.000000079384553594 | 0.00021 |
revokeVehicle | 25,527 | 0.00000008284361536 | 0.00022 |
get | 25,087 | 0.000000089158179441 | 0.00024 |
Parameter | Value |
---|---|
Simulation area | |
Obstacle shadowing model | Simple obstacle shadowing |
Number of vehicles | 100 |
Number of RSUs | 5 |
Max speed | 40 km/h |
Data transmission rate | 6 Gbps |
Wave range | 40 m |
Blocksize | 50,000 bytes |
Block time | 15 s |
Consensus algorithm | PoW (Proof-of-Work) |
Computation power () | 0.05 |
Simulation time | 100 s |
Sybil Attack | Privacy | DoS | Scalability | Computation Cost | Blockchain-Based | Overhead | Advantages | Limitations | |
---|---|---|---|---|---|---|---|---|---|
Proposed Scheme | ✓ | ✓ | ✓ | ✓ | Low | ✓ | Low | scalable solution, do not impose burden to TA | single-core ECU assumption |
[7] | ✓ | ✗ | ✗ | ✗ | Low | ✗ | Medium | high detection rate | burden to TA for managing the trajectories |
[8] | ✓ | ✗ | ✗ | ✗ | Low | ✓ | Medium | high detection rate | burden to TA for managing the trajectories |
[9] | ✓ | ✓ | ✗ | ✓ | Medium | ✗ | Medium | high detection | RSU dependent |
[11] | ✗ | ✓ | ✗ | ✓ | Low | ✓ | Low | blockchain based solution | can not detect Sybil attack |
[12] | ✗ | ✓ | ✗ | ✓ | Low | ✓ | Low | biometrics-based blockchain system | do not consider Sybil attack |
[13] | ✗ | ✓ | ✗ | ✗ | High | ✓ | High | efficient for privacy protection | increase system overhead |
[16] | ✗ | ✓ | ✗ | ✓ | Low | ✓ | Low | low overhead | can not detect Sybil attack |
[17] | ✗ | ✗ | ✗ | ✗ | High | ✓ | High | decentralized approach | lack privacy and security solutions |
[19] | ✓ | ✓ | ✗ | ✓ | Low | ✓ | Low | scalable solution | do not consider Sybil attack |
[20] | ✗ | ✗ | ✓ | ✗ | High | ✓ | High | decentralized data collection framework | high overhead |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Khatri, N.; Lee, S.; Nam, S.Y. Sybil Attack-Resistant Blockchain-Based Proof-of-Location Mechanism with Privacy Protection in VANET. Sensors 2024, 24, 8140. https://doi.org/10.3390/s24248140
Khatri N, Lee S, Nam SY. Sybil Attack-Resistant Blockchain-Based Proof-of-Location Mechanism with Privacy Protection in VANET. Sensors. 2024; 24(24):8140. https://doi.org/10.3390/s24248140
Chicago/Turabian StyleKhatri, Narayan, Sihyung Lee, and Seung Yeob Nam. 2024. "Sybil Attack-Resistant Blockchain-Based Proof-of-Location Mechanism with Privacy Protection in VANET" Sensors 24, no. 24: 8140. https://doi.org/10.3390/s24248140
APA StyleKhatri, N., Lee, S., & Nam, S. Y. (2024). Sybil Attack-Resistant Blockchain-Based Proof-of-Location Mechanism with Privacy Protection in VANET. Sensors, 24(24), 8140. https://doi.org/10.3390/s24248140