Enhanced IoV Security Network by Using Blockchain Governance Game

This paper deals with the design of the secure network in an Enhanced Internet of Vehicles by using the Blockchain Governance Game (BGG). The BGG is a system model of a stochastic game to find best strategies towards preparation of preventing a network malfunction by an attacker and the paper applies this game model into the connected vehicle security. Analytically tractable results for decision-making parameters enable to predict the moment for safety operations and to deliver the optimal combination of the number of reserved nodes with the acceptance probability of backup nodes to protect a connected car. This research helps for whom considers the enhanced secure IoV architecture with the BGG within a decentralized network.


I. INTRODUCTION
The Enhanced BIoV (EBIoV) network [1] is emphasized in this paper. The EBIoV is the IoV network architecture based on the Edge Computing [2][3] with enabling the Blockchain Governance Game (BGG) [4] for improving the network security [1]. Atypical BIoV could be applied to trace the provenance of spare parts back through every step in the supply chain to its original manufacture date and location [1,5]. Car manufacturers concern that service centers and garages are knowingly fitting counterfeit spare parts to their vehicles of customers [2]. Identifying geniality of car parts by using the EBIoV has been introduced in the previous research [6] and it suggests that the network within car components is considered as the Edge network and the monitoring equipment in car service centers are Fog level and the database in the headquarter (HQ) is the level of the cloud network (see Fig.1) [2][3]7].  [1] This paper provides the mathematical functional of the EBIoV network architecture for enhancing the securities from attackers. The EBIoV security regarding counterfeits of the car parts already has been studied [1] and this research is focused on avoiding atypical IoV attack in a decentralized network (i.e., the 51 percent attack). In the BGG [4], an attacker and a defender compete each other by building blocks in private and public chains as the sequence of stages to generate ledgers. The historical strategies and the probabilistic stage transitions can be observed by both an attacker and a defender. Hence, the interaction between the attacker and the defender can be modeled as a stochastic game [4,8].
The Blockchain Governance Game (BGG) [4] has been tried to be adapted the BIoV network architecture to defend against the attacks. This system model consists of one attacker (i.e., the miner which intends to fork a private chain) and one defender (the miner which honestly mines on the public chain) [8]. This explicit function (Theorem BGG-1) from the BGG (Blockchain Governance Game) gives the predicted moment one step before the 51 percent attack [4]. The proposed BIoV network structure is considered and the components in a vehicle, the equipment of a service center and [1] the HQ database are hooked up as one Blockchain (see Fig. 2). Adapting BGG for the EBIoV architecture [1] Each car component beside the CPU (smart controller) generates the value based on its mechanical action and the generated values are sharing with all other components including assigned service centers and a company headquarter. Each number from a car component is unique and randomly generated. Unlike conventional Blockchain networks, the EBIoV network does not have any reward system which requires a heavy computational power for being a miner to generate ledgers. The Verifiable Random Function (VRF) is applied to select the node for generating ledgers [9] and it is a cryptographic primitive that maps inputs to verifiable pseudorandom outputs [10][11]. One Blockchain company has pioneered for using the VRF to perform secret cryptographic solution to select committees to run the consensus protocol [9]. By applying the VRF, all nodes will have an equal chance to become a miner for generating ledgers without requiring a heavy computational power. The mechanism for protecting the Blockchain is exactly same as the BGG.
To apply the BGG into the BIoV network structure, the antagonistic game of two players (called "A" and "H") are introduced to describe the Blockchain network in a connected car as a defender and an attacker. Both players compete to build the blocks either for honest or false ones. Let ( , , be probability space describing the evolution of a conflict between players A and H known to an observation process = The game is ended when on the -th observation where is the number of the reserved honest nodes from a headquarter (HQ) which is  depends on the availability from the HQ. The joint functional of the BIoV network model is as follows: where indicates the total number of nodes (or ledgers) in the BIoV network for  each car (see Fig. 2 . Players: " " " Regular Safety Based on the above conditions, the general cost matrix at the prior time to be burst   could be composed as follows: where is the probability of bursting blockchain network (i.e., an attacker wins      the game) and it depends on the strategic decision of player H: It is noted that the cost for the reserved nodes (i.e., the cost of " " operation Safety strategy by player H) should be smaller than the other strategy. The total number of reserved nodes that a company owns depends on the cost function and the optimal  number of reserved nodes which supported by the HQ. Similarly, the optimal value     is the success probability when the reserved honest nodes are supported from the HQ. The best combination could be found as follows: The governance in the Blockchain is followed by the decision making parameter and it also means no action until the time . An attacker still has the chance that all   nodes are governed by an attacker if the attacker catches more than the half of nodes at (i.e., . If the attacker catches the less than half of all nodes at , then the defender could run the safety mode to avoid the     attack at The total cost for developing the enhanced BIoV network is as follows: Recall from (5), the probability of bursting Blockchain network (i.e., an attacker wins the game) under the memoryless properties becomes the Poisson compound process:

10
A network security in a BIoV network for each car is considered in this subsection. The strategy for protecting the EBIoV is for supporting the additional nodes to give the less chance that an attacker catches blocks with false control requests. Since, the model of the BGG in the EBIoV network has been analytically solved, the values for the cost function and the calculations of the probability distributions are straight forward. However, it still requires the software implementation by using a programing language. Based on the above conditions, the LP (Linear Programing) model could be described as follows from (3.7) and (3.4): Objective From (7), the total cost is as follows: The total cost could be minimized by given and the parameter set  is the optimal combination of the reserved nodes which are supported by the HQ. The below illustration in Fig. 3 is atypical graph of an optimal result by using the BGG based BIoV (EBIoV) network based on the given conditions in Table I. The moment of requesting the additional nodes will be the time when is one step   prior than the time when an attacker catches more than half of the whole blocks (i.e.,   ).

V. CONCLUSION
This paper establishes the enhanced Blockchain based IoV network architecture by bringing a theoretical model in stochastic modeling. The Enhanced Blockchain enabled Internet of Vehicles (EBIoV) is an advanced secure IoT network architecture for protecting a connected car from attackers. This new architecture has been designed for a decentralized network by adapting the Blockchain Governance Game (BGG) to improve the connected car security. The BGG is a mathematically proven game model to develop optimal defense strategies to protect systems from attackers. The practical case in the paper demonstrates how an EBIoV network could be implemented for connected car securities. The EBIoV network is the first research that applies a BGG model into the IoV security domain. The BGG model shall be extended to various Blockchain based cybersecurity areas including IoT security and secured decentralized service network design.