ABSTRACT
In this paper, we propose a new Blockchain-based message and revocation accountability system called Blackchain. Combining a distributed ledger with existing mechanisms for security in V2X communication systems, we design a distributed event data recorder (EDR) that satisfies traditional accountability requirements by providing a compressed global state. Unlike previous approaches, our distributed ledger solution provides an accountable revocation mechanism without requiring trust in a single misbehavior authority, instead allowing a collaborative and transparent decision making process through Blackchain. This makes Blackchain an attractive alternative to existing solutions for revocation in a Security Credential Management System (SCMS), which suffer from the traditional disadvantages of PKIs, notably including centralized trust. Our proposal becomes scalable through the use of hierarchical consensus: individual vehicles dynamically create clusters, which then provide their consensus decisions as input for road-side units (RSUs), which in turn publish their results to misbehavior authorities. This authority, which is traditionally a single entity in the SCMS, responsible for the integrity of the entire V2X network, is now a set of authorities that transparently perform a revocation, whose result is then published in a global Blackchain state. This state can be used to prevent the issuance of certificates to previously malicious users, and also prevents the authority from misbehaving through the transparency implied by a global system state.
- Igor Bilogrevic, Mohammad Hossein Manshaei, Maxim Raya, and Jean-Pierre Hubaux. 2011. OREN: Optimal revocations in ephemeral networks. Computer Networks 55, 5 (April 2011), 1168--1180. Google ScholarDigital Library
- Norbert Bißmeyer, Joël Njeukam, Jonathan Petit, and Kpatcha M. Bayarou. 2012. Central misbehavior evaluation for VANETs based on mobility data plausibility. In Proceedings of the ninth ACM international workshop on Vehicular inter-networking, systems, and applications (VANET). ACM Press, New York, NY, USA, 73--82. Google ScholarDigital Library
- C. Cooper, D. Franklin, M. Ros, F. Safaei, and M. Abolhasan. 2017. A Comparative Survey of VANET Clustering Techniques. IEEE Communications Surveys Tutorials 19, 1 (Firstquarter 2017), 657--681.Google ScholarCross Ref
- Yuliya Kopylova, Csilla Farkas, and Wenyuan Xu. 2011. Accurate Accident Reconstruction in VANET. Springer Berlin Heidelberg, Berlin, Heidelberg, 271--279. Google ScholarDigital Library
- Bisheng Liu, Jerry T. Chiang, and Yih-Chun Hu. 2010. Limits on Revocation in VANETs. In Pre-Proceedings of the 8th International Conference on Applied Cryptography and Network Security (ACNS 2010 industry track).Google Scholar
- Loi Luu, Viswesh Narayanan, Chaodong Zheng, Kunal Baweja, Seth Gilbert, and Prateek Saxena. 2016. A Secure Sharding Protocol For Open Blockchains. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS '16). ACM, New York, NY, USA, 17--30. Google ScholarDigital Library
- Z. Ma, F. Kargl, and M. Weber. 2008. Pseudonym-On-Demand: A New Pseudonym Refill Strategy for Vehicular Communications. In 2008 IEEE 68th Vehicular Technology Conference. 1--5.Google Scholar
- Satoshi Nakamoto. 2009. Bitcoin: A Peer-to-Peer Electronic Cash System. (2009). https://bitcoin.org/bitcoin.pdf.Google Scholar
- Joseph Poon and Thaddeus Dryja. 2015. The bitcoin lightning network: Scalable off-chain instant payments. (2015). DRAFT Version 0.5.9.2.Google Scholar
- M. Raya, P. Papadimitratos, and J. p. Hubaux. 2006. SECURING VEHICULAR COMMUNICATIONS. IEEE Wireless Communications 13, 5 (October 2006), 8--15. Google ScholarDigital Library
- L. C. Tung, J. Mena, M. Gerla, and C. Sommer. 2013. A cluster based architecture for intersection collision avoidance using heterogeneous networks. In 2013 12th Annual Mediterranean Ad Hoc Networking Workshop (MED-HOC-NET). 82--88.Google Scholar
- Rens W van der Heijden, Stefan Dietzel, Tim Leinmüller, and Frank Kargl. 2016. Survey on Misbehavior Detection in Cooperative Intelligent Transportation Systems. arXiv preprint arXiv:1610.06810 (2016).Google Scholar
- W. Whyte, A. Weimerskirch, V. Kumar, and T. Hehn. 2013. A security credential management system for V2V communications. In 2013 IEEE Vehicular Networking Conference. 1--8.Google Scholar
Index Terms
- Blackchain: scalability for resource-constrained accountable vehicle-to-x communication
Recommendations
Efficient Certificate Revocation List Organization and Distribution
In this paper, we propose a lightweight mechanism for revoking security certificates that is appropriate for the limited bandwidth and hardware cost constraints of a VANET. A Certificate Authority (CA) issues certificates to trusted nodes, i.e., ...
GlobaliD - Privacy Concerns on a Federated Identity Provider Associated with the Users' National Citizen's Card
CENTRIC '10: Proceedings of the 2010 Third International Conference on Advances in Human-Oriented and Personalized Mechanisms, Technologies and ServicesPersonal information sharing is one of the most common online activities. Most of the times we feel forced to give up about some privacy in order to share a piece of information with others. This paper reflects on the anonymity, integrity, privacy of ...
Accountable key infrastructure (AKI): a proposal for a public-key validation infrastructure
WWW '13: Proceedings of the 22nd international conference on World Wide WebRecent trends in public-key infrastructure research explore the tradeoff between decreased trust in Certificate Authorities (CAs), resilience against attacks, communication overhead (bandwidth and latency) for setting up an SSL/TLS connection, and ...
Comments