Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2022 Oct 21;22(20):8083.
doi: 10.3390/s22208083.

VBlock: A Blockchain-Based Tamper-Proofing Data Protection Model for Internet of Vehicle Networks

Affiliations

VBlock: A Blockchain-Based Tamper-Proofing Data Protection Model for Internet of Vehicle Networks

Collins Sey et al. Sensors (Basel). .

Abstract

The rapid advancement of the Internet of Vehicles (IoV) has led to a massive growth in data received from IoV networks. The cloud storage has been a timely service that provides a vast range of data storage for IoV networks. However, existing data storage and access models used to manage and protect data in IoV networks have proven to be insufficient. They are centralized and usually accompanied by a lack of trust, transparency, security, immutability, and provenance. In this paper, we propose VBlock, a blockchain-based system that addresses the issues of illegal modification of outsourced vehicular data for smart city management and improvement. We introduce a novel collusion-resistant model for outsourcing data to cloud storage that ensures the network remains tamper-proof, has good data provenance and auditing, and solves the centralized problems prone to the single point of failure. We introduced a key revocation mechanism to secure the network from malicious nodes. We formally define the system model of VBlock in the setting of a consortium blockchain. Our simulation results and security analysis show that the proposed model provides a strong security guarantee with high efficiency and is practicable in the IoV environment.

Keywords: Internet of Things (IoT); Internet of Vehicles (IoV); blockchain; collusion resistance; key revocation; smart city; tamper-proof.

PubMed Disclaimer

Conflict of interest statement

The authors declare no conflict of interest.

Figures

Figure 1
Figure 1
A typical scenario of IoV network.
Figure 2
Figure 2
A simplified Blockchain Structure.
Figure 3
Figure 3
Fabric blockchain network operated by three organizations.
Figure 4
Figure 4
VBlock architecture with key components.
Figure 5
Figure 5
VBlock design with five main layers and individual components.
Figure 6
Figure 6
Communication flow between the nodes in the system.
Figure 7
Figure 7
Transaction on the Hyperledger blockchain by the IoV node for outsourcing data.
Figure 8
Figure 8
System (a) Transactions per second (TPS) of query function with varying node groups (b) Latency of query function with varying node groups.
Figure 9
Figure 9
System (a) Transactions per second (TPS) of open function with varying node groups (b) Latency of open function with varying node groups.
Figure 10
Figure 10
System average latency for (a) Query function (b) Open function with varying number of transactions.
Figure 11
Figure 11
Average latency of VBlock data outsourcing model with and without the blockchain.

References

    1. Guerrero-Ibanez J.A., Zeadally S., Contreras-Castillo J. Integration challenges of intelligent transportation systems with connected vehicle, cloud computing, and internet of things technologies. IEEE Wirel. Commun. 2015;22:122–128. doi: 10.1109/MWC.2015.7368833. - DOI
    1. Ang L.-M., Seng K.P., Zungeru A.M., Ijemaru G.K. Big Sensor Data Systems for Smart Cities. IEEE Internet Things J. 2017;4:1259–1271. doi: 10.1109/JIOT.2017.2695535. - DOI
    1. Meneghello F., Calore M., Zucchetto D., Polese M., Zanella A. IoT: Internet of Threats? A Survey of Practical Security Vulnerabilities in Real IoT Devices. IEEE Internet Things J. 2019;6:8182–8201. doi: 10.1109/JIOT.2019.2935189. - DOI
    1. Manvi S.S., Tangade S. A survey on authentication schemes in VANETs for secured communication. Veh. Commun. 2017;9:19–30. doi: 10.1016/j.vehcom.2017.02.001. - DOI
    1. Ali I., Hassan A., Li F. Authentication and privacy schemes for vehicular ad hoc networks (VANETs): A survey. Veh. Commun. 2019;16:45–61. doi: 10.1016/j.vehcom.2019.02.002. - DOI

LinkOut - more resources