skip to main content
10.1145/3152824.3152828acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmiddlewareConference Proceedingsconference-collections
research-article

Blackchain: scalability for resource-constrained accountable vehicle-to-x communication

Published:11 December 2017Publication History

ABSTRACT

In this paper, we propose a new Blockchain-based message and revocation accountability system called Blackchain. Combining a distributed ledger with existing mechanisms for security in V2X communication systems, we design a distributed event data recorder (EDR) that satisfies traditional accountability requirements by providing a compressed global state. Unlike previous approaches, our distributed ledger solution provides an accountable revocation mechanism without requiring trust in a single misbehavior authority, instead allowing a collaborative and transparent decision making process through Blackchain. This makes Blackchain an attractive alternative to existing solutions for revocation in a Security Credential Management System (SCMS), which suffer from the traditional disadvantages of PKIs, notably including centralized trust. Our proposal becomes scalable through the use of hierarchical consensus: individual vehicles dynamically create clusters, which then provide their consensus decisions as input for road-side units (RSUs), which in turn publish their results to misbehavior authorities. This authority, which is traditionally a single entity in the SCMS, responsible for the integrity of the entire V2X network, is now a set of authorities that transparently perform a revocation, whose result is then published in a global Blackchain state. This state can be used to prevent the issuance of certificates to previously malicious users, and also prevents the authority from misbehaving through the transparency implied by a global system state.

References

  1. Igor Bilogrevic, Mohammad Hossein Manshaei, Maxim Raya, and Jean-Pierre Hubaux. 2011. OREN: Optimal revocations in ephemeral networks. Computer Networks 55, 5 (April 2011), 1168--1180. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Norbert Bißmeyer, Joël Njeukam, Jonathan Petit, and Kpatcha M. Bayarou. 2012. Central misbehavior evaluation for VANETs based on mobility data plausibility. In Proceedings of the ninth ACM international workshop on Vehicular inter-networking, systems, and applications (VANET). ACM Press, New York, NY, USA, 73--82. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. C. Cooper, D. Franklin, M. Ros, F. Safaei, and M. Abolhasan. 2017. A Comparative Survey of VANET Clustering Techniques. IEEE Communications Surveys Tutorials 19, 1 (Firstquarter 2017), 657--681.Google ScholarGoogle ScholarCross RefCross Ref
  4. Yuliya Kopylova, Csilla Farkas, and Wenyuan Xu. 2011. Accurate Accident Reconstruction in VANET. Springer Berlin Heidelberg, Berlin, Heidelberg, 271--279. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Bisheng Liu, Jerry T. Chiang, and Yih-Chun Hu. 2010. Limits on Revocation in VANETs. In Pre-Proceedings of the 8th International Conference on Applied Cryptography and Network Security (ACNS 2010 industry track).Google ScholarGoogle Scholar
  6. Loi Luu, Viswesh Narayanan, Chaodong Zheng, Kunal Baweja, Seth Gilbert, and Prateek Saxena. 2016. A Secure Sharding Protocol For Open Blockchains. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS '16). ACM, New York, NY, USA, 17--30. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Z. Ma, F. Kargl, and M. Weber. 2008. Pseudonym-On-Demand: A New Pseudonym Refill Strategy for Vehicular Communications. In 2008 IEEE 68th Vehicular Technology Conference. 1--5.Google ScholarGoogle Scholar
  8. Satoshi Nakamoto. 2009. Bitcoin: A Peer-to-Peer Electronic Cash System. (2009). https://bitcoin.org/bitcoin.pdf.Google ScholarGoogle Scholar
  9. Joseph Poon and Thaddeus Dryja. 2015. The bitcoin lightning network: Scalable off-chain instant payments. (2015). DRAFT Version 0.5.9.2.Google ScholarGoogle Scholar
  10. M. Raya, P. Papadimitratos, and J. p. Hubaux. 2006. SECURING VEHICULAR COMMUNICATIONS. IEEE Wireless Communications 13, 5 (October 2006), 8--15. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. L. C. Tung, J. Mena, M. Gerla, and C. Sommer. 2013. A cluster based architecture for intersection collision avoidance using heterogeneous networks. In 2013 12th Annual Mediterranean Ad Hoc Networking Workshop (MED-HOC-NET). 82--88.Google ScholarGoogle Scholar
  12. Rens W van der Heijden, Stefan Dietzel, Tim Leinmüller, and Frank Kargl. 2016. Survey on Misbehavior Detection in Cooperative Intelligent Transportation Systems. arXiv preprint arXiv:1610.06810 (2016).Google ScholarGoogle Scholar
  13. W. Whyte, A. Weimerskirch, V. Kumar, and T. Hehn. 2013. A security credential management system for V2V communications. In 2013 IEEE Vehicular Networking Conference. 1--8.Google ScholarGoogle Scholar

Index Terms

  1. Blackchain: scalability for resource-constrained accountable vehicle-to-x communication

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          SERIAL '17: Proceedings of the 1st Workshop on Scalable and Resilient Infrastructures for Distributed Ledgers
          December 2017
          40 pages
          ISBN:9781450351737
          DOI:10.1145/3152824

          Copyright © 2017 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 11 December 2017

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader