Skip to main content
Erschienen in: Peer-to-Peer Networking and Applications 5/2019

20.07.2019

Blockchain Meets VANET: An Architecture for Identity and Location Privacy Protection in VANET

verfasst von: Hui Li, Lishuang Pei, Dan Liao, Gang Sun, Du Xu

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 5/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With the breakthroughs in sensor technology and internet of things, Vehicular Ad Hoc Network (VANET) is developing into a new generation. The technical challenges of current VANET are decentralized architecture deployment and privacy protection. Since the blockchain owns the characteristics of being decentralized, distributed, collective maintenance and non-tampering, this paper designs a novel decentralized architecture using blockchain technology, which is called blockchain-based VANET. The blockchain-based VANET involves four major stages: blockchain set-up, registration of vehicles, SBMs upload, and blockchain record. It can effectively address the problems of centralization and mutual distrust between entities in current VANET. For protecting identity and location privacy, we propose UGG, IPP and LPP algorithms with the way of dynamic threshold encryption and k-anonymity unity in the stage of SBMs upload of blockchain-based VANET. To quantify the availability of k-anonymity unity, we propose two indicators: connectivity and average distance. Extensive simulations have been conducted to validate the effectiveness of blockchain-based VANET. We analyze the simulation results from four aspects: system time, average distance, connectivity, and privacy leakage. The simulation results show that our proposed architecture performs better in terms of processing time than current architectures. Furthermore, our proposed architecture shows its superior in the aspect of protecting identity and location privacy.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Vehicle/5G, available on https://http://www. sohu. com/a/229846324_114835, accessed on Apr. 28, 2018 Vehicle/5G, available on https://​http://www. sohu. com/a/229846324_114835, accessed on Apr. 28, 2018
2.
Zurück zum Zitat Dvir E, Strasser G (2018) Does Marketing Widen Borders? Cross-Country Price Dispersion in the European Car Market. Journal of International Economics, 134–149 Dvir E, Strasser G (2018) Does Marketing Widen Borders? Cross-Country Price Dispersion in the European Car Market. Journal of International Economics, 134–149
3.
Zurück zum Zitat Rasheed H, Donghyun K, Junggab S et al. (2018) Secure and Privacy-Aware Incentives-Based Witness Service in Social Internet of Vehicles Clouds, IEEE Internet of Things Journal, 2441–2448 Rasheed H, Donghyun K, Junggab S et al. (2018) Secure and Privacy-Aware Incentives-Based Witness Service in Social Internet of Vehicles Clouds, IEEE Internet of Things Journal, 2441–2448
4.
Zurück zum Zitat Jie C, Jing Z, Hong Z et al. (2018) An efficient certificateless aggregate signature without pairings for vehicular ad hoc networks, Information Sciences, 1–15 Jie C, Jing Z, Hong Z et al. (2018) An efficient certificateless aggregate signature without pairings for vehicular ad hoc networks, Information Sciences, 1–15
5.
6.
Zurück zum Zitat Sun G, Zhang Y, Liao D et al. (2018) Bus Trajectory-Based Street-Centric Routing for Message Delivery in Urban Vehicular Ad hoc Networks. IEEE Transactions on Vehicular Technology, 7550–7563 Sun G, Zhang Y, Liao D et al. (2018) Bus Trajectory-Based Street-Centric Routing for Message Delivery in Urban Vehicular Ad hoc Networks. IEEE Transactions on Vehicular Technology, 7550–7563
7.
Zurück zum Zitat Nzouonta J, Rajgure N, Wang G et al. (2009) VANET Routing on City Roads Using Real-Time Vehicular Traffic Information. IEEE Transactions on Vehicular Technology, 3609–3626 Nzouonta J, Rajgure N, Wang G et al. (2009) VANET Routing on City Roads Using Real-Time Vehicular Traffic Information. IEEE Transactions on Vehicular Technology, 3609–3626
8.
Zurück zum Zitat Li H Liao D, Sun G et al. (2017) Towards Location and Trajectory Privacy Preservation in 5G Vehicular Social Network. IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), 63–69 Li H Liao D, Sun G et al. (2017) Towards Location and Trajectory Privacy Preservation in 5G Vehicular Social Network. IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), 63–69
9.
Zurück zum Zitat Liao D, Li H, Sun G et al. (2018) Location and Trajectory Privacy Preservation in 5G-Enabled Vehicle Social Network Services. Journal of Network and Computer Applications, 108–118 Liao D, Li H, Sun G et al. (2018) Location and Trajectory Privacy Preservation in 5G-Enabled Vehicle Social Network Services. Journal of Network and Computer Applications, 108–118
10.
Zurück zum Zitat Li H, Liao D, Sun G et al. (2018) Two-stage Privacy-preserving Mechanism for a Crowdsensing -based VSN. IEEE Access, 40682–40695 Li H, Liao D, Sun G et al. (2018) Two-stage Privacy-preserving Mechanism for a Crowdsensing -based VSN. IEEE Access, 40682–40695
11.
Zurück zum Zitat Liao D, Li H, Sun G et al. (2015) Protecting User Trajectory in Location-Based Services, IEEE GLOBECOM, 1–6 Liao D, Li H, Sun G et al. (2015) Protecting User Trajectory in Location-Based Services, IEEE GLOBECOM, 1–6
12.
Zurück zum Zitat Liao D, Li H, Anand V et al. (2016) Using Location-labeling for Privacy Protection in Location-Based Services. International Conference on Internet of Things and Big Data, 299–306 Liao D, Li H, Anand V et al. (2016) Using Location-labeling for Privacy Protection in Location-Based Services. International Conference on Internet of Things and Big Data, 299–306
13.
Zurück zum Zitat Sun G, Liao D, Li H et al. (2017) L2P2: A location-label based approach for privacy preserving in LBS. Future Generation Computer Systems, 375–384 Sun G, Liao D, Li H et al. (2017) L2P2: A location-label based approach for privacy preserving in LBS. Future Generation Computer Systems, 375–384
14.
Zurück zum Zitat Liao D, Sun G, Li H et al. (2017) The Framework and Algorithm for Preserving User Trajectory while using Location-Based Services in IoT-Cloud Systems. Cluster Computing, 2283–2297 Liao D, Sun G, Li H et al. (2017) The Framework and Algorithm for Preserving User Trajectory while using Location-Based Services in IoT-Cloud Systems. Cluster Computing, 2283–2297
15.
Zurück zum Zitat Novo O (2018) Blockchain Meets IoT: An Architecture for Scalable Access Management in IoT. IEEE Internet of Things Journal, 1184–115 Novo O (2018) Blockchain Meets IoT: An Architecture for Scalable Access Management in IoT. IEEE Internet of Things Journal, 1184–115
16.
Zurück zum Zitat Sun G, Chang V, Ramachandran M et al. (2017) Efficient Location Privacy Algorithm for Internet of Things (IoT) Services and Applications. Journal of Network and Computer Applications, 3–13 Sun G, Chang V, Ramachandran M et al. (2017) Efficient Location Privacy Algorithm for Internet of Things (IoT) Services and Applications. Journal of Network and Computer Applications, 3–13
17.
Zurück zum Zitat Sun G, Xie Y, Liao D et al. (2017) User-Defined Privacy Location-Sharing System in Mobile Online Social Networks. Journal of Network and Computer Applications, 34–45 Sun G, Xie Y, Liao D et al. (2017) User-Defined Privacy Location-Sharing System in Mobile Online Social Networks. Journal of Network and Computer Applications, 34–45
18.
Zurück zum Zitat Tyagi A, Sreenath N (2015) Location privacy preserving techniques for location based services over road networks. International Conference on Communications and Signal Processing (ICCSP), 1319–1326 Tyagi A, Sreenath N (2015) Location privacy preserving techniques for location based services over road networks. International Conference on Communications and Signal Processing (ICCSP), 1319–1326
19.
Zurück zum Zitat Ullah I, Wahid A, Shah M et al. (2017) VBPC: Velocity based pseudonym changing strategy to protect location privacy of Vehicles in VANET. International Conference on Communication Technologies, 132–137 Ullah I, Wahid A, Shah M et al. (2017) VBPC: Velocity based pseudonym changing strategy to protect location privacy of Vehicles in VANET. International Conference on Communication Technologies, 132–137
20.
Zurück zum Zitat Au M, Liu J, Fang J et al. (2014) A New Payment System for Enhancing Location Privacy of Electric Vehicles. IEEE Transactions on Vehicular Technology, 3–18 Au M, Liu J, Fang J et al. (2014) A New Payment System for Enhancing Location Privacy of Electric Vehicles. IEEE Transactions on Vehicular Technology, 3–18
21.
Zurück zum Zitat Ying B, Makrakis D, Mouftah H (2013) Dynamic Mix-Zone for Location Privacy in Vehicular Networks. IEEE Communications Letters, 1524–1527 Ying B, Makrakis D, Mouftah H (2013) Dynamic Mix-Zone for Location Privacy in Vehicular Networks. IEEE Communications Letters, 1524–1527
22.
Zurück zum Zitat Kang J, Yu R, Huang X et al. (2018) Privacy-Preserved Pseudonym Scheme for Fog Computing Supported Internet of Vehicles. IEEE Transactions on Intelligent Transportation, 2627–2637 Kang J, Yu R, Huang X et al. (2018) Privacy-Preserved Pseudonym Scheme for Fog Computing Supported Internet of Vehicles. IEEE Transactions on Intelligent Transportation, 2627–2637
23.
Zurück zum Zitat Zhang S, Wang G, Liu Q et al. (2018) A trajectory privacy-preserving scheme based on query exchange in mobile social networks. Soft Computing, 6121–6133 Zhang S, Wang G, Liu Q et al. (2018) A trajectory privacy-preserving scheme based on query exchange in mobile social networks. Soft Computing, 6121–6133
24.
Zurück zum Zitat Zhu L, Xie H, Liu Y et al. (2018) PTPP: Preference-Aware Trajectory Privacy-Preserving over Location-Based Social Networks. Journal of Information Science and Engineering, 803–820 Zhu L, Xie H, Liu Y et al. (2018) PTPP: Preference-Aware Trajectory Privacy-Preserving over Location-Based Social Networks. Journal of Information Science and Engineering, 803–820
25.
Zurück zum Zitat Memon I, Chen L, Arain Q et al. (2018) Pseudonym changing strategy with multiple mix zones for trajectory privacy protection in road networks. International Journal of Communication Systems. 1–18 Memon I, Chen L, Arain Q et al. (2018) Pseudonym changing strategy with multiple mix zones for trajectory privacy protection in road networks. International Journal of Communication Systems. 1–18
26.
Zurück zum Zitat Cui J, Xu W, Zhong H (2018) et al. Privacy-Preserving Authentication Using a Double Pseudonym for Internet of Vehicles. Sensors, 1–15 Cui J, Xu W, Zhong H (2018) et al. Privacy-Preserving Authentication Using a Double Pseudonym for Internet of Vehicles. Sensors, 1–15
27.
Zurück zum Zitat Afifi M, Zhou K, Ren J (2018) Privacy Characterization and Quantification in Data Publishing. IEEE Transactions on Knowledge and Data Engineering, 1756–1769 Afifi M, Zhou K, Ren J (2018) Privacy Characterization and Quantification in Data Publishing. IEEE Transactions on Knowledge and Data Engineering, 1756–1769
28.
Zurück zum Zitat Takabi H, Joshi J, Karimi H (2009) A collaborative k-anonymity approach for location privacy in location-based services, International Conference on Collaborative Computing, 1–9 Takabi H, Joshi J, Karimi H (2009) A collaborative k-anonymity approach for location privacy in location-based services, International Conference on Collaborative Computing, 1–9
29.
Zurück zum Zitat Niu B, Li Q, Zhu X et al. (2014) Achieving k-anonymity in privacy aware location-based services. IEEE INFOCOM, 754–762 Niu B, Li Q, Zhu X et al. (2014) Achieving k-anonymity in privacy aware location-based services. IEEE INFOCOM, 754–762
30.
Zurück zum Zitat Islam S, Obaidat M, Vijayakumar P (2018) et al. A robust and efficient password-based conditional privacy preserving authentication and group-key agreement protocol for VANETs. Future Generation Computer Systems, 217–227 Islam S, Obaidat M, Vijayakumar P (2018) et al. A robust and efficient password-based conditional privacy preserving authentication and group-key agreement protocol for VANETs. Future Generation Computer Systems, 217–227
31.
Zurück zum Zitat Cui J, Zhang J, Zhong H et al. (2018) An efficient certificateless aggregate signature without pairings for vehicular ad hoc networks. Information Sciences, 1–15 Cui J, Zhang J, Zhong H et al. (2018) An efficient certificateless aggregate signature without pairings for vehicular ad hoc networks. Information Sciences, 1–15
32.
Zurück zum Zitat Peters D, Wetzlich J, Thiel F et al. (2018) Blockchain applications for legal metrology. IEEE International Instrumentation and Measurement Technology Conference (I2MTC), 1–6 Peters D, Wetzlich J, Thiel F et al. (2018) Blockchain applications for legal metrology. IEEE International Instrumentation and Measurement Technology Conference (I2MTC), 1–6
33.
Zurück zum Zitat Joy J, Cusack M (2017) Internet of Vehicles and Autonomous Connected Car-Privacy and Security Issues. IEEE International Conference on Computer Communication and Networks, 1–9 Joy J, Cusack M (2017) Internet of Vehicles and Autonomous Connected Car-Privacy and Security Issues. IEEE International Conference on Computer Communication and Networks, 1–9
34.
Zurück zum Zitat Joy J, Cusack G, Gerla M (2017) Poster: Time Analysis of the Feasibility of Vehicular Blocktrees. ACM 3rd Workshop on Experiences with the Design and Implementation of Smart Objects, 25–26 Joy J, Cusack G, Gerla M (2017) Poster: Time Analysis of the Feasibility of Vehicular Blocktrees. ACM 3rd Workshop on Experiences with the Design and Implementation of Smart Objects, 25–26
35.
Zurück zum Zitat Dorri A, Kanhere S, Jurdak R (2017) Towards an Optimized BlockChain for IoT. ACM 2nd International Conference on Internet-of-Things Design and Implementation, 173–178 Dorri A, Kanhere S, Jurdak R (2017) Towards an Optimized BlockChain for IoT. ACM 2nd International Conference on Internet-of-Things Design and Implementation, 173–178
36.
Zurück zum Zitat Sharma P, Moon S, Park J (2017) Block-VN: A Distributed Blockchain Based Vehicular Network Architecture in Smart City. J Inf Process Syst 13(1):184–195 Sharma P, Moon S, Park J (2017) Block-VN: A Distributed Blockchain Based Vehicular Network Architecture in Smart City. J Inf Process Syst 13(1):184–195
37.
Zurück zum Zitat Lei A, Cruickshank H, Cao Y et al. (2017) Blockchain-Based Dynamic Key Management for Heterogeneous Intelligent Transportation Systems. IEEE Internet of Things Journal, 1832–1843 Lei A, Cruickshank H, Cao Y et al. (2017) Blockchain-Based Dynamic Key Management for Heterogeneous Intelligent Transportation Systems. IEEE Internet of Things Journal, 1832–1843
38.
Zurück zum Zitat Amoretti M, Brambilla G, Medioli F et al. (2018) Blockchain-Based Proof of Location. IEEE International Conference on Software Quality, Reliability and Security, 146–153 Amoretti M, Brambilla G, Medioli F et al. (2018) Blockchain-Based Proof of Location. IEEE International Conference on Software Quality, Reliability and Security, 146–153
39.
Zurück zum Zitat Herzberg A, Jarecki S, Krawczyk H et al. (1995) Proactive Secret Sharing Or: How to Copy with Perpetual Leakage. Proc of Crypto, 339–352 Herzberg A, Jarecki S, Krawczyk H et al. (1995) Proactive Secret Sharing Or: How to Copy with Perpetual Leakage. Proc of Crypto, 339–352
40.
Zurück zum Zitat Alphand O, Amoretti M, Claeys T et al. (2018) IoTChain: A Blockchain Security Architecture for the Internet of Things. IEEE Wireless Communications and Networking Conference (WCNC), 1–6 Alphand O, Amoretti M, Claeys T et al. (2018) IoTChain: A Blockchain Security Architecture for the Internet of Things. IEEE Wireless Communications and Networking Conference (WCNC), 1–6
41.
Zurück zum Zitat A. Said, M. Marot, A. Ibrahim, et al. (2016) Modeling interactive real-time applications in VANETs with performance evaluation. Computer Networks, 66–78 A. Said, M. Marot, A. Ibrahim, et al. (2016) Modeling interactive real-time applications in VANETs with performance evaluation. Computer Networks, 66–78
Metadaten
Titel
Blockchain Meets VANET: An Architecture for Identity and Location Privacy Protection in VANET
verfasst von
Hui Li
Lishuang Pei
Dan Liao
Gang Sun
Du Xu
Publikationsdatum
20.07.2019
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 5/2019
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-019-00786-4

Weitere Artikel der Ausgabe 5/2019

Peer-to-Peer Networking and Applications 5/2019 Zur Ausgabe