Enhancing Privacy Preservation in Vehicular Trust Management Systems through Blockchain Technology
Abstract
:1. Introduction
- Designing a trust management framework based on the consortium chain to provide a decentralized, secure, and reliable environment for trust computation in IoV data transactions.
- Proposing data privacy protection and identity privacy protection schemes based on homomorphic encryption and pseudonym technology, respectively, to ensure the integrity, confidentiality, and anonymity of user data and identities.
- Utilizing PEPA to conduct formal modeling and performance analysis, validating the effectiveness and efficiency of our privacy-preserved blockchain-based vehicular trust management scheme.
2. Related Work
2.1. Trust Management for Internet of Vehicles
2.2. Privacy Protection for Vehicular Trust Management
2.3. Further Research on Blockchain-Based Vehicular Networks and Their Applications
3. Preliminaries
3.1. Theoretical Foundation of Cryptography
3.2. Blockchain and Hyperledger Fabric
3.3. PEPA
4. Blockchain-Based Trust Management Framework for IoV
4.1. System Framework
4.1.1. System Model
4.1.2. Initialization
Algorithm 1 Initialization |
Input: . Output: .
|
4.2. Network Model
4.3. Comparative Analysis
5. Privacy Protection Design
5.1. Data Privacy Protection Scheme Based on Homomorphic Encryption and TEE
5.1.1. Detailed Protection Plan
Algorithm 2 Trust Value Calculation Based on Homomorphic Encryption and TEE |
Input: . Output: .
|
5.1.2. Security Analysis
5.2. Identity Privacy Protection Scheme Based on Pseudonym Technology
- Non-Inference of Vehicle Node Identity: The scheme ensures that an RSU cannot deduce the true identity of a vehicle node when interacting with it. The RSU is only aware of the pseudonym associated with the vehicle node, without any knowledge of its actual identity.
- Anonymous Vehicle Node Interactions: When vehicle nodes engage in communication, they are only aware that they have received a message from another legitimate vehicle node. However, they remain oblivious to the real identity of the communicating vehicle node, as the interaction occurs under the veil of pseudonyms.
5.2.1. Detailed Protection Plan
Algorithm 3 New Pseudonym Generation Strategy |
Input: . Output: .
|
5.2.2. Security Analysis
5.3. Analysis of Blockchain-Related Attacks
6. Modeling and Performance Analysis
- represents an action a with a time rate followed by the continuation process P.
- denotes the choice between two processes P and Q.
- indicates a synchronization between processes P and Q over a label L.
- stands for the parallel composition of processes P and Q.
- A represents atomic processes or the base case of the syntax.
6.1. Homomorphic Encryption-Based Data Privacy Preserving
6.1.1. Modeling of Trust Value Calculation Based on Homomorphic Encryption and TEE
6.1.2. Hyperledger Fabric-Based Trust Value Update Modeling
6.1.3. Performance Evaluation and Analysis
6.2. Identity Privacy Protection Based on Pseudonym Technology
6.2.1. New Pseudonym Generation Process Modeling
6.2.2. New Pseudonym Generation to Update Complete Process Modeling
6.2.3. Performance Evaluation and Analysis
6.3. Practical Experiments and Performance Analysis
7. Discussion
8. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Contreras-Castillo, J.; Zeadally, S.; Guerrero-Ibañez, J.A. Internet of Vehicles: Architecture, Protocols, and Security. IEEE Internet Things J. 2017, 5, 3701–3709. [Google Scholar] [CrossRef]
- Chen, X.; Xue, G.; Yu, R.; Wu, H.; Wang, D. A Vehicular Trust Blockchain Framework with Scalable Byzantine Consensus. IEEE Trans. Mob. Comput. 2023, 1–13. [Google Scholar] [CrossRef]
- Zhu, H.; Wang, Z.; Yang, F.; Zhou, Y.; Luo, X. Intelligent Traffic Network Control in the Era of Internet of Vehicles. IEEE Trans. Veh. Technol. 2021, 70, 9787–9802. [Google Scholar] [CrossRef]
- Ji, B.; Zhang, X.; Mumtaz, S.; Han, C.; Li, C.; Wen, H.; Wang, D. Survey on the Internet of Vehicles: Network Architectures and Applications. IEEE Commun. Stand. Mag. 2020, 4, 34–41. [Google Scholar] [CrossRef]
- Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System. SSRN 2019, 1–9. [Google Scholar] [CrossRef]
- Moin, S.; Karim, A.; Safdar, Z.; Safdar, K.; Ahmed, E.; Imran, M. Securing IoTs in Distributed Blockchain: Analysis, Requirements and Open Issues. Future Gener. Comput. Syst. 2019, 100, 325–343. [Google Scholar] [CrossRef]
- Wood, G. Ethereum: A Secure Decentralised Generalised Transaction Ledger. Ethereum Proj. Yellow Pap. 2014, 151, 1–32. [Google Scholar]
- Androulaki, E.; Barger, A.; Bortnikov, V.; Cachin, C.; Christidis, K.; De Caro, A.; Enyeart, D.; Ferris, C.; Laventman, G.; Manevich, Y.; et al. Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains. In Proceedings of the Thirteenth EuroSys Conference, Porto, Portugal, 23–26 April 2018; pp. 1–15. [Google Scholar]
- Chen, C.; Wu, J.; Lin, H.; Chen, W.; Zheng, Z. A Secure and Efficient Blockchain-based Aata Trading Approach for Internet of Vehicles. IEEE Trans. Veh. Technol. 2019, 68, 9110–9121. [Google Scholar] [CrossRef]
- Hillston, J. A Compositional Approach to Performance Modelling. Ph.D. Thesis, University of Edinburgh, Edinburgh, UK, 1994. [Google Scholar]
- Li, Q.; Malip, A.; Martin, K.M.; Ng, S.L.; Zhang, J. A Reputation-based Announcement Scheme for VANETs. IEEE Trans. Veh. Technol. 2012, 61, 4095–4108. [Google Scholar]
- Li, B.; Liang, R.; Zhu, D.; Chen, W.; Lin, Q. Blockchain-based Trust Management Model for Location Privacy Preserving in VANET. IEEE Trans. Intell. Transp. Syst. 2020, 22, 3765–3775. [Google Scholar] [CrossRef]
- Zhang, H.; Liu, J.; Zhao, H.; Wang, P.; Kato, N. Blockchain-based Trust Management for Internet of Vehicles. IEEE Trans. Emerg. Top. Comput. 2020, 9, 1397–1409. [Google Scholar] [CrossRef]
- Malik, S.; Dedeoglu, V.; Kanhere, S.S.; Jurdak, R. Trustchain: Trust Management in Blockchain and IOT Supported Supply Chains. In Proceedings of the 2019 IEEE International Conference on Blockchain (Blockchain), Seoul, Republic of Korea, 14–17 May 2019; pp. 184–193. [Google Scholar]
- Kouicem, D.E.; Imine, Y.; Bouabdallah, A.; Lakhlef, H. A Decentralized Blockchain-based Trust Management Protocol for the Internet of Things. IEEE Trans. Dependable Secur. Comput. 2022, 19, 1292–1306. [Google Scholar] [CrossRef]
- Chen, X. Scaling Byzantine Fault-Tolerant Consensus with Optimized Shading Scheme. IEEE Trans. Ind. Inform. 2023, 1–14. [Google Scholar] [CrossRef]
- Nilsson, D.K.; Larson, U.E.; Jonsson, E. Efficient In-Vehicle Delayed Data Authentication Based on Compound Message Authentication Codes. In Proceedings of the 2008 IEEE 68th Vehicular Technology Conference, Calgary, AL, Canada, 21–24 September 2008; pp. 1–5. [Google Scholar] [CrossRef]
- Bayat, M.; Barmshoory, M.; Rahimi, M.; Aref, M.R. A Secure Authentication Scheme for VANETs with Batch Verification. Wirel. Netw. 2015, 21, 1733–1743. [Google Scholar] [CrossRef]
- Liu, Y.; Wang, Y.; Chang, G. Efficient Privacy-Preserving Dual Authentication and Key Agreement Scheme for Secure V2V Communications in an IoV Paradigm. IEEE Trans. Intell. Transp. Syst. 2017, 18, 2740–2749. [Google Scholar] [CrossRef]
- Song, J.H.; Wong, V.W.; Leung, V. Wireless Location Privacy Protection in Vehicular Ad-hoc Networks. Mob. Netw. Appl. 2010, 15, 160–171. [Google Scholar] [CrossRef]
- Ying, B.; Makrakis, D. Pseudonym Changes Scheme Based on Candidate-location-list in Vehicular Networks. In Proceedings of the 2015 IEEE International Conference on Communications (ICC), London, UK, 8–12 June 2015; pp. 7292–7297. [Google Scholar] [CrossRef]
- Shao, J.; Lin, X.; Lu, R.; Zuo, C. A Threshold Anonymous Authentication Protocol for VANETs. IEEE Trans. Veh. Technol. 2016, 65, 1711–1720. [Google Scholar] [CrossRef]
- Wu, H.; Wang, L.; Xue, G.; Tang, J.; Yang, D. Enabling Data Trustworthiness and User Privacy in Mobile Crowdsensing. IEEE/ACM Trans. Netw. 2019, 27, 2294–2307. [Google Scholar] [CrossRef]
- Wang, Q.; Gao, D.; Foh, C.H.; Zhang, H.; Leung, V.C.M. Decentralized CRL Management for Vehicular Networks with Permissioned Blockchain. IEEE Trans. Veh. Technol. 2022, 71, 11408–11420. [Google Scholar] [CrossRef]
- Fan, Q.; Xin, Y.; Jia, B.; Zhang, Y.; Wang, P. COBATS: A Novel Consortium Blockchain-Based Trust Model for Data Sharing in Vehicular Networks. IEEE Trans. Intell. Transp. Syst. 2023, 24, 12255–12271. [Google Scholar] [CrossRef]
- Li, X.; Yin, X.; Ning, J. Trustworthy Announcement Dissemination Scheme With Blockchain-Assisted Vehicular Cloud. IEEE Trans. Intell. Transp. Syst. 2023, 24, 1786–1800. [Google Scholar] [CrossRef]
- Alladi, T.; Chamola, V.; Sahu, N.; Venkatesh, V.; Goyal, A.; Guizani, M. A Comprehensive Survey on the Applications of Blockchain for Securing Vehicular Networks. IEEE Commun. Surv. Tutor. 2022, 24, 1212–1239. [Google Scholar] [CrossRef]
- Adams, C.; Lloyd, S. Understanding Public-Key Infrastructure: Concepts, Standards, and Deployment Considerations; Sams Publishing: Indianapolis, IN, USA, 1999. [Google Scholar]
- Merkle, R.C. A Digital Signature Based on a Conventional Encryption Function. In Proceedings of the Conference on the Theory and Application of Cryptographic Techniques; Springer: Berlin/Heidelberg, Germany, 1987; pp. 369–378. [Google Scholar]
- Rivest, R.L.; Adleman, L.; Dertouzos, M.L. On Data Banks and Privacy Homomorphisms. Found. Secur. Comput. 1978, 4, 169–180. [Google Scholar]
- Paillier, P. Public-key Cryptosystems Based on Composite Degree Residuosity Classes. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques; Springer: Berlin/Heidelberg, Germany, 1999; pp. 223–238. [Google Scholar]
- Yuan, Y.; Wang, F.Y. Blockchain and Cryptocurrencies: Model, Techniques, and Applications. IEEE Trans. Syst. Man Cybern. Syst. 2018, 48, 1421–1428. [Google Scholar] [CrossRef]
- Li, W.; Song, H. ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks. IEEE Trans. Intell. Transp. Syst. 2016, 17, 960–969. [Google Scholar] [CrossRef]
- Huang, X.; Yu, R.; Kang, J.; Zhang, Y. Distributed Reputation Management for Secure and Efficient Vehicular Edge Computing and Networks. IEEE Access 2017, 5, 25408–25420. [Google Scholar] [CrossRef]
- Castro, M.; Liskov, B. Practical Byzantine Fault Tolerance. In Proceedings of the Third Symposium on Operating Systems Design and Implementation, OSDI’99, New Orleans, LO, USA, 22 March 1999; pp. 173–186. [Google Scholar]
- Miller, A.; Xia, Y.; Croman, K.; Shi, E.; Song, D. The Honey Badger of BFT Protocols. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS’16, Vienna, Austria, 24–28 October 2016; pp. 31–42. [Google Scholar] [CrossRef]
- Meng, K.; Sun, L. A Decentralized Vehicle-to-Vehicle Energy Trading System Based on Efficient Sharding Services. In Proceedings of the 21st IEEE International Symposium on Parallel and Distributed Processing with Applications, Wuhan, China, 21–24 December 2023. [Google Scholar]
- Gueta, G.G.; Abraham, I.; Grossman, S.; Malkhi, D.; Pinkas, B.; Reiter, M.; Seredinschi, D.; Tamir, O.; Tomescu, A. SBFT: A Scalable and Decentralized Trust Infrastructure. In Proceedings of the 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Los Alamitos, CA, USA, 24–27 June 2019; pp. 568–580. [Google Scholar] [CrossRef]
- Yin, M.; Malkhi, D.; Reiter, M.K.; Gueta, G.G.; Abraham, I. HotStuff: BFT Consensus with Linearity and Responsiveness. In Proceedings of the 2019 ACM Symposium on Principles of Distributed Computing, PODC’19, New York, NY, USA, 29 July–2 August 2019; pp. 347–356. [Google Scholar] [CrossRef]
Symbol | Description |
---|---|
A roadside unit k. | |
The i-th vehicle node. | |
The real identity of vehicle . | |
The public key of the TEE in . | |
The private key of TEE in . | |
Public key of vehicle . | |
Private key of vehicle . | |
Initial pseudonym for vehicle . | |
Initial trust value of vehicle . |
Notations | Description |
---|---|
The j-th message sent by within the coverage of . | |
The rating value obtained by the evaluation of by the vehicle node . | |
The value obtained after encrypts with . | |
signs the evaluation result transaction with its own private key. | |
The preprocessing summation result of the j messages of vehicle node . | |
Preprocessing summation result after TEE decryption. | |
Direct trust value of vehicle node . | |
Historical trust value of vehicle node . | |
Final trust value of vehicle node . | |
Current pseudonym of vehicle node . | |
Current trust value of vehicle node . | |
The new pseudonym of vehicle node . | |
Timestamp when vehicle node initiates the pseudonym request. | |
A pseudonym update request initiated by . | |
The response of to the pseudonym request of . | |
A random number returned by . | |
Timestamp when responds . |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Jin, N.; Meng, K.; Ding, J.; Sun, L.; Wu, H.; Chen, X. Enhancing Privacy Preservation in Vehicular Trust Management Systems through Blockchain Technology. Electronics 2023, 12, 4949. https://doi.org/10.3390/electronics12244949
Jin N, Meng K, Ding J, Sun L, Wu H, Chen X. Enhancing Privacy Preservation in Vehicular Trust Management Systems through Blockchain Technology. Electronics. 2023; 12(24):4949. https://doi.org/10.3390/electronics12244949
Chicago/Turabian StyleJin, Nian, Kun Meng, Jie Ding, Lijun Sun, Haiqin Wu, and Xiao Chen. 2023. "Enhancing Privacy Preservation in Vehicular Trust Management Systems through Blockchain Technology" Electronics 12, no. 24: 4949. https://doi.org/10.3390/electronics12244949
APA StyleJin, N., Meng, K., Ding, J., Sun, L., Wu, H., & Chen, X. (2023). Enhancing Privacy Preservation in Vehicular Trust Management Systems through Blockchain Technology. Electronics, 12(24), 4949. https://doi.org/10.3390/electronics12244949