Skip to main content
Top
Published in: Arabian Journal for Science and Engineering 8/2020

12-03-2020 | Research Article-Computer Engineering and Computer Science

Blockchain-Based Privacy-Aware Pseudonym Management Framework for Vehicular Networks

Authors: Leila Benarous, Benamar Kadri, Ahmed Bouridane

Published in: Arabian Journal for Science and Engineering | Issue 8/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Vehicular networks rely on public key infrastructure (PKI) to generate the long-term and short-term (pseudonyms) certified pair of keys. This allows vehicles to use these keys to sign and to encrypt their exchanged messages in order to authenticate the sender and to ensure the integrity of messages. Therefore, the use of pseudonyms is fundamental to safeguard the security, to satisfy the non-repudiation and to revoke misbehaving nodes. However, the current PKI infrastructure is centralized making it vulnerable and at risk of being single point of failure. In this paper, we propose a blockchain-based pseudonym management framework for vehicular networks that ensures the security and privacy while maintaining the functionality of the network. The security of the proposed solution was evaluated using attack tree method, and the results have shown an improved resiliency to attacks than the conventional vehicular PKI.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference IEEE standard for wireless access in vehicular environments—security services for applications and management messages. IEEE Std. 1609.2, Committee of Intelligent Transportation Systems (2013) IEEE standard for wireless access in vehicular environments—security services for applications and management messages. IEEE Std. 1609.2, Committee of Intelligent Transportation Systems (2013)
2.
go back to reference Al-Momani, A.; Kargl, F.; Waldschmidt, C.: Physical layer-based message authentication in VANETs. Fachgespräch Inter-Vehicle Communication (FG-IVC) (2016) Al-Momani, A.; Kargl, F.; Waldschmidt, C.: Physical layer-based message authentication in VANETs. Fachgespräch Inter-Vehicle Communication (FG-IVC) (2016)
3.
go back to reference Lozupone, V.: Analyze encryption and public key infrastructure (PKI). Int. J. Inf. Manag. 38, 42–44 (2018)CrossRef Lozupone, V.: Analyze encryption and public key infrastructure (PKI). Int. J. Inf. Manag. 38, 42–44 (2018)CrossRef
4.
go back to reference Dini, G.: Lecture Notes Public Key Infrastructures Security in Networked Computing Systems. Department of Ingegneria dell'Informazione, University of Pisa, Pisa (2018) Dini, G.: Lecture Notes Public Key Infrastructures Security in Networked Computing Systems. Department of Ingegneria dell'Informazione, University of Pisa, Pisa (2018)
5.
go back to reference Khodaei, M.: Dissertation: Secure Vehicular Communication Systems: Design and Implementation of a Vehicular PKI (VPKI). School of Electrical Engineering, Stockholm (2012) Khodaei, M.: Dissertation: Secure Vehicular Communication Systems: Design and Implementation of a Vehicular PKI (VPKI). School of Electrical Engineering, Stockholm (2012)
7.
go back to reference Crosby, M.; Pattanayak, P.; Verma, S.; Kalyanaraman, V.: BlockChain Technology Beyond Bitcoin. Sutardja Center for Entrepreneurship & Technology Technical Report, university of Berkeley, October 16 (2015) Crosby, M.; Pattanayak, P.; Verma, S.; Kalyanaraman, V.: BlockChain Technology Beyond Bitcoin. Sutardja Center for Entrepreneurship & Technology Technical Report, university of Berkeley, October 16 (2015)
8.
go back to reference Drescher, D.: Blockchain Basics: A Non-technical Introduction in 25 Steps. Apress, Frankfurt am Main (2017)CrossRef Drescher, D.: Blockchain Basics: A Non-technical Introduction in 25 Steps. Apress, Frankfurt am Main (2017)CrossRef
9.
go back to reference Wattenhofer, R.: The Science of the Blockchain. CreateSpace, South Carolina (2016) Wattenhofer, R.: The Science of the Blockchain. CreateSpace, South Carolina (2016)
10.
go back to reference Hasan, H.R.; Salah, K.: Combating deepfake videos using blockchain and smart contracts. IEEE Access 7, 41596–41606 (2019)CrossRef Hasan, H.R.; Salah, K.: Combating deepfake videos using blockchain and smart contracts. IEEE Access 7, 41596–41606 (2019)CrossRef
11.
go back to reference Salah, K.; Rehman, M.H.U.; Nizamuddin, N.; Al-Fuqaha, A.: Blockchain for AI: review and open research challenges. IEEE Access 7, 10127–10149 (2019)CrossRef Salah, K.; Rehman, M.H.U.; Nizamuddin, N.; Al-Fuqaha, A.: Blockchain for AI: review and open research challenges. IEEE Access 7, 10127–10149 (2019)CrossRef
12.
go back to reference Khan, M.A.; Salah, K.: IoT security: review, blockchain solutions, and open challenges. Future Gener. Comput. Syst. 82, 395–411 (2018)CrossRef Khan, M.A.; Salah, K.: IoT security: review, blockchain solutions, and open challenges. Future Gener. Comput. Syst. 82, 395–411 (2018)CrossRef
13.
go back to reference Wang, H.; Wang, Q.; He, D.; Li, Q.; Liu, Z.: BBARS: blockchain-based anonymous rewarding scheme for V2G networks. IEEE Internet Things J. 6(2), 3676–3687 (2019)CrossRef Wang, H.; Wang, Q.; He, D.; Li, Q.; Liu, Z.: BBARS: blockchain-based anonymous rewarding scheme for V2G networks. IEEE Internet Things J. 6(2), 3676–3687 (2019)CrossRef
14.
go back to reference Baza, M.; Lasla, N.; Mahmoud, M.; Abdallah, M.: B-ride: ride sharing with privacy-preservation, trust and fair payment atop public blockchain. IEEE Trans. Netw. Sci. Eng. ArXiv preprint, arXiv:1906.09968 (2019) Baza, M.; Lasla, N.; Mahmoud, M.; Abdallah, M.: B-ride: ride sharing with privacy-preservation, trust and fair payment atop public blockchain. IEEE Trans. Netw. Sci. Eng. ArXiv preprint, arXiv:1906.09968 (2019)
15.
go back to reference Amiri, W.A.; Baza, M.; Banawan, K.; Mahmoud, M.; Alasmary, W.; Akkaya, K.: Privacy-preserving smart parking system using blockchain and private information retrieval. In: IEEE International Conference on Smart Applications, Communications and Networking (SmartNets 2019). ArXiv preprint, arXiv:1904.09703 (2019) Amiri, W.A.; Baza, M.; Banawan, K.; Mahmoud, M.; Alasmary, W.; Akkaya, K.: Privacy-preserving smart parking system using blockchain and private information retrieval. In: IEEE International Conference on Smart Applications, Communications and Networking (SmartNets 2019). ArXiv preprint, arXiv:1904.09703 (2019)
16.
go back to reference Baza, M.; Nabil, M.; Lasla, N.; Fidan, K.; Mahmoud, M.; Abdallah, M.: Blockchain-based firmware update scheme tailored for autonomous vehicles. In: 2019 IEEE Wireless Communications and Networking Conference (WCNC), pp. 1–7. IEEE (2019) Baza, M.; Nabil, M.; Lasla, N.; Fidan, K.; Mahmoud, M.; Abdallah, M.: Blockchain-based firmware update scheme tailored for autonomous vehicles. In: 2019 IEEE Wireless Communications and Networking Conference (WCNC), pp. 1–7. IEEE (2019)
17.
go back to reference Baza, M.; Nabil, M.; Ismail, M.; Mahmoud, M.; Serpedin, E.; Rahman, M.: Blockchain-based charging coordination mechanism for smart grid energy storage units. In: 2nd IEEE International Conference on Blockchain (Blockchain 2019). ArXiv preprint, arXiv:1811.02001 (2018) Baza, M.; Nabil, M.; Ismail, M.; Mahmoud, M.; Serpedin, E.; Rahman, M.: Blockchain-based charging coordination mechanism for smart grid energy storage units. In: 2nd IEEE International Conference on Blockchain (Blockchain 2019). ArXiv preprint, arXiv:1811.02001 (2018)
18.
go back to reference Nizamuddin, N.; Hasan, H.; Salah, K.; Iqbal, R.: Blockchain-based framework for protecting author royalty of digital assets. Arab. J. Sci. Eng. 44(4), 3849–3866 (2019)CrossRef Nizamuddin, N.; Hasan, H.; Salah, K.; Iqbal, R.: Blockchain-based framework for protecting author royalty of digital assets. Arab. J. Sci. Eng. 44(4), 3849–3866 (2019)CrossRef
19.
go back to reference Mao, D.; Hao, Z.; Wang, F.; Li, H.: Novel automatic food trading system using consortium blockchain. Arab. J. Sci. Eng. 44(4), 3439–3455 (2019)CrossRef Mao, D.; Hao, Z.; Wang, F.; Li, H.: Novel automatic food trading system using consortium blockchain. Arab. J. Sci. Eng. 44(4), 3439–3455 (2019)CrossRef
20.
go back to reference Omar Dib, K.-L.B., Durand, A., Thea, E., Hamida, E.B.: Consortium blockchains: overview, applications and challenges. Int. J. Adv. Telecommun. 11(1), 51–64 (2018) Omar Dib, K.-L.B., Durand, A., Thea, E., Hamida, E.B.: Consortium blockchains: overview, applications and challenges. Int. J. Adv. Telecommun. 11(1), 51–64 (2018)
21.
go back to reference Buterin, V.: A next-generation smart contract and decentralized application platform. White Paper 3(37) (2014) Buterin, V.: A next-generation smart contract and decentralized application platform. White Paper 3(37) (2014)
23.
go back to reference Yaga, D.; Mell, P.; Roby, N.; Scarfone, K.: NISTIR 8202 Blockchain Technology Overview. National Institute of Standards and Technology, US Department of Commerce, Washington (2018)CrossRef Yaga, D.; Mell, P.; Roby, N.; Scarfone, K.: NISTIR 8202 Blockchain Technology Overview. National Institute of Standards and Technology, US Department of Commerce, Washington (2018)CrossRef
24.
go back to reference Seang, S.; Torre, D.: Proof of work and proof of stake consensus protocols: a blockchain application for local complementary currencies. GREDEG Working Papers 2019–24, Groupe de REcherche en Droit, Economie, Gestion (GREDEG CNRS), Université Côte d'Azur, France (2018) Seang, S.; Torre, D.: Proof of work and proof of stake consensus protocols: a blockchain application for local complementary currencies. GREDEG Working Papers 2019–24, Groupe de REcherche en Droit, Economie, Gestion (GREDEG CNRS), Université Côte d'Azur, France (2018)
25.
go back to reference Zheng, Z.; Xie, S.; Dai, H.; Chen, X.; Wang, H.: An overview of blockchain technology: architecture, consensus, and future trends. In: 2017 IEEE International Congress on Big Data (BigData Congress), pp. 557–564. IEEE (2017) Zheng, Z.; Xie, S.; Dai, H.; Chen, X.; Wang, H.: An overview of blockchain technology: architecture, consensus, and future trends. In: 2017 IEEE International Congress on Big Data (BigData Congress), pp. 557–564. IEEE (2017)
28.
go back to reference Rivest, R.L.; Shamir, A.; Tauman, Y.: How to leak a secret. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 552–565. Springer, Berlin (2001) Rivest, R.L.; Shamir, A.; Tauman, Y.: How to leak a secret. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 552–565. Springer, Berlin (2001)
29.
go back to reference Yakubov, A.; Shbair, W.M.; Wallbom, A.; Sanda, D.; State, R.: A blockchain-based PKI management framework. In: The First IEEE/IFIP International Workshop on Managing and Managed by Blockchain (Man2Block) Colocated with IEEE/IFIP NOMS (2018) Yakubov, A.; Shbair, W.M.; Wallbom, A.; Sanda, D.; State, R.: A blockchain-based PKI management framework. In: The First IEEE/IFIP International Workshop on Managing and Managed by Blockchain (Man2Block) Colocated with IEEE/IFIP NOMS (2018)
30.
go back to reference Axon, L.: Privacy-Awareness in Blockchain-Based PKI. University of Oxford, Oxford (2015) Axon, L.: Privacy-Awareness in Blockchain-Based PKI. University of Oxford, Oxford (2015)
31.
go back to reference Nisha Malik, P.N.; Arora, A.; He, X.; Puthal, D.: Blockchain based secured identity authentication and expeditious revocation framework for vehicular networks. In: 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering (2018) Nisha Malik, P.N.; Arora, A.; He, X.; Puthal, D.: Blockchain based secured identity authentication and expeditious revocation framework for vehicular networks. In: 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering (2018)
32.
go back to reference Lasla, N.; Younis, M.; Znaidi, W.; Arbia, D.B.: Efficient distributed admission and revocation using blockchain for cooperative its. In: 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS), pp. 1–5. IEEE (2018) Lasla, N.; Younis, M.; Znaidi, W.; Arbia, D.B.: Efficient distributed admission and revocation using blockchain for cooperative its. In: 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS), pp. 1–5. IEEE (2018)
33.
go back to reference Lei, A.; Cruickshank, H.; Cao, Y.; Asuquo, P.; Ogah, C.P.A.; Sun, Z.: Blockchain-based dynamic key management for heterogeneous intelligent transportation systems. IEEE Internet Things J. 4(6), 1832–1843 (2017)CrossRef Lei, A.; Cruickshank, H.; Cao, Y.; Asuquo, P.; Ogah, C.P.A.; Sun, Z.: Blockchain-based dynamic key management for heterogeneous intelligent transportation systems. IEEE Internet Things J. 4(6), 1832–1843 (2017)CrossRef
34.
go back to reference Schneier, B.: Attack trees. Dr. Dobb’s journal 24(12), 21–29 (1999) Schneier, B.: Attack trees. Dr. Dobb’s journal 24(12), 21–29 (1999)
36.
go back to reference Ren, D.; Du, S.; Zhu, H.: A novel attack tree-based risk assessment approach for location privacy preservation in the VANETs. In: 2011 IEEE International Conference on Communications (ICC). IEEE, pp. 1–5 (2011) Ren, D.; Du, S.; Zhu, H.: A novel attack tree-based risk assessment approach for location privacy preservation in the VANETs. In: 2011 IEEE International Conference on Communications (ICC). IEEE, pp. 1–5 (2011)
Metadata
Title
Blockchain-Based Privacy-Aware Pseudonym Management Framework for Vehicular Networks
Authors
Leila Benarous
Benamar Kadri
Ahmed Bouridane
Publication date
12-03-2020
Publisher
Springer Berlin Heidelberg
Published in
Arabian Journal for Science and Engineering / Issue 8/2020
Print ISSN: 2193-567X
Electronic ISSN: 2191-4281
DOI
https://doi.org/10.1007/s13369-020-04448-z

Other articles of this Issue 8/2020

Arabian Journal for Science and Engineering 8/2020 Go to the issue

Premium Partners