Decentralised IOTA-Based Concepts of Digital Trust for Securing Remote Driving in an Urban Environment
Abstract
:1. Introduction
2. Methods for the Concept Development
2.1. Research Challenge and Methods
2.2. An Analysis of Challenges in Securing Remote Driving
2.3. A Discussion of the Prior Art
3. Concepts of Digital Trust
3.1. Conceptual Approach
3.2. Trust Relationships among System Actors
3.3. Credentials as Proof of Trust
3.4. Control of Data Exchange
3.5. Verifiable Data Registry—Trust Storage
3.6. Application of the Concept for Securing Remote Driving
4. Experimental Solutions of the Concepts of Digital Trust
4.1. Validation Scenario Description
4.2. Authentication and Credentials
- Each participant proves control over their DID via a challenge–response scheme that requires possession of the private signing key associated with the DID.
- Participants have cryptographically solid credentials for all attributes required for channel access.
- Credentials are issued by known trusted sources (and their credentials can also be verified).
- The common control channel is encrypted so that only subscribers can read the messages and only for the time they are subscribed.
- The supervisor controls access to the channel and can read and cryptographically verify the prospect subscribers’ credentials.
- The common control channel stamps every message with the sender’s DID to indicate the source of the message.
4.3. Establishing the Remote Drive Connection
4.4. Remote Drive Operation
4.5. Identities and Verifiable Credentials in IOTA Integration Services
4.6. Discussion of the Implementation
5. Evaluation Results
5.1. Evaluation of the IOTA-Based Experimental Solution
5.2. Evaluation of the Digital Trust Concepts
5.3. Evaluation of Challenges against Securing Remote Driving
- Requirement (R1): The solutions contribute towards ensuring that the source/sender of the mission plan is correct and that the plan has not been modified. This helps to ensure that the autonomous vehicle is not misused.
- R2: The source of the mission plan can be verified, which helps to prevent the use of an autonomous vehicle for malicious purposes.
- R3: The solutions contribute towards making autonomous driving safe.
- R4: The solutions can be used to verify the credentials of entities, which send information on the presence, location, and mobility of humans/animals/artificial entities on the road. Therefore, the trust level related to the referred information is improved, and the likelihood of the system suffering from fraudulent information is lower.
- R5: The sources of location information can be ensured, and they can be visualised on the dashboard of the supervisor. This is seen to improve the trust and safety level of the operation.
- R6: The application of IOTA for security trace can help in emergency reasoning because information concerning the vehicle and its surrounding situation can be stored on the occurrence of a critical event in a way that prevents its later manipulation.
- R7: The solutions can be used to ensure that the remote driver obtains information on the status of the vehicle from the correct and real vehicle.
- R8 and R10: The solutions do not cause additional delays or overheads for the e2e data flow between the autonomous vehicle and the remote driving system. The delays and overhead are estimated to stay the same, but they depend on the applied encryption/decryption between the vehicle and the remote driving system.
- R9: The solutions can be used to verify the credentials of the remote driver; therefore, the vehicle can better trust the information received from the remote driver.
- R11. The solutions do not rely on username/password systems only but always verify the actors, endpoints, and related credentials before allowing any real actions. This is expected to improve the system reliability and confidentiality, without relying too much on network-level security and usernames/passwords.
- R12: The solutions focus on the security control process, contribute towards application of PKI-based solutions, and rely on the distributed ledger as the shared trust register.
- R13: The application of IOTA for the security trace is estimated to help in enabling analysis of reasons for problems, dangerous situations, or even accidents. This is expected to contribute towards improving system safety in the future.
6. Concluding Remarks
Author Contributions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- EU Transact Project. Available online: https://transact-ecsel.eu/ (accessed on 16 December 2022).
- Latvakoski, J.; Mäki, K.; Ronkainen, J.; Julku, J.; Koivusaari, J. Simulation-Based Approach for Studying the Balancing of Local Smart Grids with Electric Vehicle Batteries. Systems 2015, 3, 81–108. [Google Scholar] [CrossRef]
- Rose, S.; Borchert, O.; Mitchell, S.; Connelly, S. Zero Trust Architecture; 2020 NIST Special Publication 800-207; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2020. [CrossRef]
- The Law Commission (UK). Remote Driving: Advice to Government SUMMARY. 2023. Available online: https://s3-eu-west-2.amazonaws.com/lawcom-prod-storage-11jsxou24uy7q/uploads/2023/02/RD-Summary-for-20-02-23.pdf (accessed on 1 August 2023).
- World Wide Web Consortium (W3C). Decentralized Identifiers (DIDs) v1.0—Core Architecture, Data Model, and Representations. W3C Proposed Recommendation 3 August 2021. 2021. Available online: https://www.w3.org/TR/did-core/ (accessed on 28 April 2022).
- Sovrin. Self-Sovereign Identity and IoT. Sovrin Foundation SSI in IoT Task Force. 2020. Available online: https://sovrin.org/wp-content/uploads/SSI-in-IoT-whitepaper_Sovrin-design.pdf (accessed on 28 April 2022).
- Kronfellner, B.; Merey, T.; Beron, D.; Terbu, O. Me, Myself and (SS)I. Boston Consulting Group. 2021. Available online: https://web-assets.bcg.com/6b/6d/84e00cad4c939c870d833b96321c/white-paper-me-myself-ssi.pdf (accessed on 28 April 2022).
- Housley, R. Public Key Infrastructure (PKI). Available online: https://onlinelibrary.wiley.com/doi/10.1002/047148296X.tie149 (accessed on 2 January 2023).
- Shi, J.; Zeng, X.; Han, R. A Blockchain-Based Decentralized Public Key Infrastructure for Information-Centric Networks. Information 2022, 13, 264. [Google Scholar] [CrossRef]
- Trust over IP Foundation. Introduction to Trust over IP. Version 2.0. 17 November 2021. Available online: https://trustoverip.org/wp-content/uploads/Introduction-to-ToIP-V2.0-2021-11-17.pdf (accessed on 22 November 2022).
- Liu, X.; Farahani, B.; Firouzi, F. Distributed Ledger Technology. Intelligent Internet of Things; Springer: Cham, Switzerland, 2020; pp. 393–431. ISBN 978-3-030-30367-9. [Google Scholar] [CrossRef]
- Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System. Available online: https://bitcoin.org/bitcoin.pdf (accessed on 22 November 2022).
- IOTA Foundation. IOTA Overview. 2022. Available online: https://wiki.IOTA.org/learn/about-IOTA/an-introduction-to-IOTA (accessed on 23 November 2022).
- Green, M. Hash-Based Signatures: An Illustrated Primer. Available online: https://blog.cryptographyengineering.com/2018/04/07/hash-based-signatures-an-illustrated-primer/ (accessed on 23 November 2022).
- Silvano, W.F.; Marcelino, R. IOTA Tangle: A cryptocurrency to communicate Internet-of-Things data. Future Gener. Comput. Syst. 2020, 112, 307–319. [Google Scholar] [CrossRef]
- Cech, J. Chrysalis (IOTA 1.5) Phase 2. Update and Next Steps. Available online: https://blog.IOTA.org/chrysalis-IOTA-1-5-phase-2-update-and-next-steps-eecabe55d7bd/amp/ (accessed on 23 November 2022).
- Alladi, T.; Chamola, V.; Sahu, N.; Venkatesh, V.; Goyal, A.; Guizani, M. A Comprehensive Survey on the Applications of Blockchain for Securing Vehicular Networks. IEEE Commun. Surv. Tutor. 2022, 24, 1212–1239. [Google Scholar] [CrossRef]
- Fang, L.; Wu, C.; Kang, Y.; Ou, W.; Zhou, D.; Ye, J. Zero-Trust-Based Protection Scheme for Users in Internet of Vehicles. Secur. Commun. Netw. 2022, 2022, 9896689. [Google Scholar] [CrossRef]
- Dorri, M.; Steger, S.; Kanhere, S.; Jurdak, R. BlockChain: A Distributed Solution to Automotive Security and Privacy. IEEE Commun. Mag. 2017, 55, 119–125. [Google Scholar] [CrossRef]
- den Ouden, J.; Ho, V.; van der Smagt, T.; Kakes, G.; Rommel, S.; Passchier, I.; Juza, J.; Tafur, M. Design and Evaluation of Remote Driving Architecture on 4G and 5G Mobile Networks. Front. Future Transp. 2022, 2, 801567. [Google Scholar] [CrossRef]
- Saez-Perez, J.; Wang, Q.; Alcaraz-Calero, J.M.; Garcia-Rodriguez, J. Design, Implementation, and Empirical Validation of a Framework for Remote Car Driving Using a Commercial Mobile Network. Sensors 2023, 23, 1671. [Google Scholar] [CrossRef] [PubMed]
- Neumeier, S.; Walelgne, E.A.; Bajpai, V.; Ott, J.; Facchi, C. Measuring the Feasibility of Teleoperated Driving in Mobile Networks. In Proceedings of the 2019 Network Traffic Measurement and Analysis Conference (TMA), Paris, France, 19–21 June 2019; pp. 113–120. [Google Scholar] [CrossRef]
- Amador Molina, O.; Aramrattana, M.; Vinel, A. A Survey on Remote Operation of Road Vehicles. IEEE Access 2022, 10, 130135–130154. [Google Scholar] [CrossRef]
- MetaMask. A Crypto Wallet & Gateway to Blockchain Apps. Available online: https://metamask.io/ (accessed on 9 January 2023).
- IOTA Foundation. Successful Conclusion of ENSURESEC Part 2. Available online: https://blog.iota.org/conclusion-of-ensuresec-part-2/ (accessed on 9 January 2023).
- IOTA Foundation. IOTA Smart Contracts Beta Release. Available online: https://blog.iota.org/iota-smart-contracts-beta-release/ (accessed on 9 January 2023).
- Microchip Technology Inc. CEC 1702 Cryptographic Embedded Controller Data Sheet. Available online: http://ww1.microchip.com/downloads/en/DeviceDoc/00002207C.pdf (accessed on 9 January 2023).
- Yubico. YubiHSM 2 Hardware Security Module. Available online: https://www.yubico.com/fi/product/yubihsm-2/ (accessed on 9 January 2023).
- Spark Innovations Inc. Introducing the SC4-HSM. Available online: https://sc4.us/hsm/ (accessed on 9 January 2023).
- Hyperledger Foundation. Hyperledger Aries. Available online: https://www.hyperledger.org/use/aries (accessed on 9 January 2023).
- Sovrin Foundation. Sovrin Governance Framework. Available online: https://sovrin.org/library/sovrin-governance-framework/ (accessed on 9 January 2023).
- IOTA Foundation. Unifying Digital Identities. Available online: https://www.iota.org/solutions/digital-identity (accessed on 9 January 2023).
- IOTA Foundation. IOTA Streams. Available online: https://www.iota.org/solutions/streams (accessed on 9 January 2023).
- IOTA Foundation. Streams Specification, Rev:1.0 A, p. 20. Available online: https://github.com/iotaledger/streams/blob/develop/specification/Streams_Specification_1_0A.pdf (accessed on 9 January 2023).
- IOTA Foundation. Integration Services Wiki. Available online: https://web.archive.org/web/20230604211029/https://wiki.iota.org/integration-services/welcome/ (accessed on 1 August 2023).
- IOTA Foundation. SSI Bridge. Available online: https://web.archive.org/web/20230604203630/https://wiki.iota.org/integration-services/explanations/services/SSI-bridge/introduction/ (accessed on 1 August 2023).
- IOTA Foundation. Ecommerce-Audit Trail Gateway (GW). Available online: https://web.archive.org/web/20230528153958/https://wiki.iota.org/integration-services/explanations/services/audit-trail-gateway/introduction (accessed on 1 August 2023).
- IOTA Foundation. Incentives to Run an IOTA Node. Available online: https://blog.iota.org/incentives-to-run-an-iota-node/ (accessed on 9 January 2023).
- Syed, N.F.; Shah, S.W.; Shaghaghi, A.; Anwar, A.; Baig, Z.; Doss, R. Zero Trust Architecture (ZTA): A Comprehensive Survey. IEEE Access 2022, 10, 57143–57179. [Google Scholar] [CrossRef]
- Hu, V.; Farraiolo, D.; Kuhn, R.; Schnitzer, A.; Sandlin, K.; Miller, R.; Scarfone, K. Guide to Attribute Based Access Control (ABAC) Definition and Considerations; Technical Report NIST 800-162; NIST: Gaithersburg, MD, USA, 2014. Available online: https://csrc.nist.gov/publications/detail/sp/800-162/final (accessed on 1 August 2023).
Requirement | Justification |
---|---|
Requirement 1 (R1). The source/sender of the mission plan must be trusted. It must be verified that the plan is sent by a real mission planner and that the plan is not modified. | The autonomous vehicle is not misused. |
R2. Mission plan must be stored encrypted and can be updated only by a trusted source. | The autonomous vehicle is not used for illegal purposes. |
R3. The autonomous vehicle must be able to drive safely. | Safe autonomous driving. |
R4. Information on the presence, location, and mobility of humans/animals/artificial entities on the road must be trusted. It must be verified that input information is sent by real entities and the information is not modified. | Fraudulent information is not sent to the system. |
R5. The location of input information must agree with the location of the vehicle. | Safe autonomous driving. |
R6. The results of the emergency reasoning based on vehicle situation information must be kept safe. Manipulating the results may cause wrong emergency operations. | Emergency stops and vehicle pullovers are performed as they should be. |
R7. The vehicle information for the remote driver must be trusted. It must be verified that vehicle information is sent by a real vehicle and that the information is not modified. | The remote driver receives correct information from the vehicle. |
R8. The vehicle information for the remote driver must be real-time, i.e., the delay must be below a defined threshold (ms/s). Otherwise, the remote driver may perform fatal remote driving operations. This can be checked with timestamps, for example. | The remote driver receives correct information from the vehicle. |
R9. The information from the remote driver to the vehicle must be trusted. It must be verified that information is sent by a real remote driver and that the information is not modified. | The vehicle receives correct information from remote driver. |
R10. The information from the remote driver to the vehicle must be in real-time. This can be checked, for example, with timestamps. | The vehicle receives correct information from the remote driver. |
R11. The operating systems of all system components must be kept up to date. Firewalls and antivirus software are used. Complex passcodes and passwords are used. Secure networks are used. Router security is checked, which can be low by default. | Emphasises system confidentiality. |
R12. The communication between all the components of the system should be secure. Secure communication protocols (HTTPS, SSH, SFTP, FTPS) and encryption should be used. Cryptographic keys should be protected, for example, using subsystem isolation. | Emphasises system confidentiality. |
R13. The system must be traceable. This makes it possible to analyse reasons for problems, which increases the system safety in the future. | To be able to analyse what happened in a dangerous situation or accident. Developing system safety. |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Latvakoski, J.; Kyllönen, V.; Ronkainen, J. Decentralised IOTA-Based Concepts of Digital Trust for Securing Remote Driving in an Urban Environment. IoT 2023, 4, 582-609. https://doi.org/10.3390/iot4040025
Latvakoski J, Kyllönen V, Ronkainen J. Decentralised IOTA-Based Concepts of Digital Trust for Securing Remote Driving in an Urban Environment. IoT. 2023; 4(4):582-609. https://doi.org/10.3390/iot4040025
Chicago/Turabian StyleLatvakoski, Juhani, Vesa Kyllönen, and Jussi Ronkainen. 2023. "Decentralised IOTA-Based Concepts of Digital Trust for Securing Remote Driving in an Urban Environment" IoT 4, no. 4: 582-609. https://doi.org/10.3390/iot4040025