5 PDF
5 PDF
5 PDF
3, JUNE 2019
Abstract—The drastically increasing volume and the growing information mainly includes traffic-related data, such as road
trend on the types of data have brought in the possibility of real- and weather conditions, and parking lot occupancy. The sub-
izing advanced applications such as enhanced driving safety, and jective information includes things such as rating of a hotel
have enriched existing vehicular services through data sharing
among vehicles and data analysis. Due to limited resources with and quality of vehicular services [4]. Sharing of data has made
vehicles, vehicular edge computing and networks (VECONs) i.e., it possible to realize goals such as improved driving safety, and
the integration of mobile edge computing and vehicular networks, to obtain higher service quality during travelling.
can provide powerful computing and massive storage resources. Due to resource constraints, vehicles cannot support massive
However, road side units that primarily presume the role of vehic- data storage and large-scale data sharing. Vehicle-generated
ular edge computing servers cannot be fully trusted, which may
lead to serious security and privacy challenges for such inte- data becomes increasingly fine-grained and complex, which
grated platforms despite their promising potential and benefits. increases the burden on data transmission. Meanwhile, the
We exploit consortium blockchain and smart contract technolo- data more locally relevant for vehicles has spatial scope and
gies to achieve secure data storage and sharing in vehicular explicit lifetime of utility, such as current traffic information
edge networks. These technologies efficiently prevent data sharing at an intersection, which requires low latency and location
without authorization. In addition, we propose a reputation-based
data sharing scheme to ensure high-quality data sharing among awareness for vehicular data sharing [2]. To address these
vehicles. A three-weight subjective logic model is utilized for challenges, mobile edge computing is a promising paradigm
precisely managing reputation of the vehicles. Numerical results that can be embedded at the network edge infrastructures,
based on a real dataset show that our schemes achieve reasonable e.g., roadside units (RSUs), to support massive data stor-
efficiency and high-level of security for data sharing in VECONs. age, computing and sharing close to the vehicles [2], [5].
Index Terms—Blockchain, reputation management, security Vehicular networks integrated with mobile edge computing
and privacy, smart contracts, vehicular edge computing. are evolving toward vehicular edge computing and networks
(VECONs) [6].
Security and privacy issues are critical challenges for
I. I NTRODUCTION VECONs. RSUs in VECONs play an important role to tem-
ITH rapid development of vehicular telematics and
W applications, vehicles generate a huge amount and sev-
eral different types of data. For example, a self-driving vehicle
porally store and manage vehicular data. But the RSUs are
semi-trusted as they are usually distributed along the road
without any strong security measures, thus making them vul-
can create 1 GB data per second from cameras, radar, GPS, nerable to being compromised by attackers [2], [7], [8].
etc. [1]. Moreover, vehicles can cooperatively collect and share Vehicles therefore may not be willing to upload their data
data of common interest [2], [3]. Data collected by the vehicles to the RSUs because of privacy concerns. Likewise, peer to
consists of objective and subjective information. The objective peer (P2P) data sharing among vehicles raises the issues such
as data access without authorization and the need of ensuring
Manuscript received April 17, 2018; revised September 7, 2018; accepted security in a decentralized manner. These challenges influence
October 2, 2018. Date of publication October 11, 2018; date of current ver-
sion June 19, 2019. This work was supported in part by the NSFC under the sharing of vehicular data, and thus hinder the pace for
Grant 61379115, Grant 61422201, Grant 61501127, Grant 61370159, Grant development of VECONs [9].
61503083, Grant U1301255, and Grant U1501251, in part by the Science and Recently, blockchain technology has attracted growing
Technology Program of Guangdong Province under Grant 2015B010129001,
Grant 2015B010106010, Grant 2016A030313705, Grant 2014B090907010, attention and research work in the context of vehicular
and Grant 2015B010131014, and in part by the Projects funded by the networks because of its characteristics of decentralization,
Research Council of Norway under Grant 240079/F20. (Corresponding anonymity and trust. Blockchain can facilitate establish-
author: Yan Zhang.)
J. Kang, R. Yu, X. Huang, M. Wu, and S. Xie are with the School of ing a secure, trusted and decentralized intelligent trans-
Automation, Guangdong University of Technology, Guangzhou 510006, China port ecosystem, to address data sharing problems thus
(e-mail: [email protected]; [email protected]; [email protected]; contributing in creating better usage of the transport
[email protected]; [email protected]).
S. Maharjan is with the Simula Metropolitan Center for Digital infrastructures and resources [9]–[11]. Singh and Kim [12]
Engineering, Norway and University of Oslo, 0316 Oslo, Norway (e-mail: presented an intelligent vehicle-trust point mechanism using
[email protected]). blockchain to support secure communications among vehi-
Y. Zhang is with Department of Informatics, University of Oslo, Norway
(e-mail: [email protected]). cles. However, due to high cost to establish a public
Digital Object Identifier 10.1109/JIOT.2018.2875542 blockchain in resource-limited vehicles, the existing methods
2327-4662 c 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
KANG et al.: BLOCKCHAIN FOR SECURE AND EFFICIENT DATA SHARING IN VECONs 4661
TABLE I
M AIN S YMBOLS U SED IN T HIS PAPER
2) Step 2 (Building Information Blocks and Finding Proof- Protocol 1 Distributed Consensus Protocol for DAGs
of-Work): vi sends its data information index to a nearby 1. The leader broadcasts block data to all DAGs in the vehicular
blockchain for verification and audit.
DAG (e.g., DAGj ). DAGj collects all local information DAGj → All : Record = (Block_data||Block_hash
(e.g., indexes) during a certain period, and then encrypts ||CertBSj ||SigDAGj ||timestamp),
and digitally signs these indexes to guarantee authentic- where Block_hash = Hash(Block_Data||timestamp),
ity and accuracy. Fig. 1 shows that the index records SigDAGj = SignSKDAG (Block_data||Block_hash).
j
are structured into blocks. For traceability and verifica- 2. The DAGs broadcast their own audit results to each other for
tion, each block contains a cryptographic hash to the mutual supervision and verification, and then send their replies back
to the leader.
prior blocks in the vehicular blockchain. Similar to that DAGl → DAGj : Reply = EPKDAG (Data_2
in Bitcoin, the DAGs try to find their own valid proof- j
||CertDAGl ||SigDAGl ||timestamp),
of-work about data audit (i.e., a hash value meeting a where Data_2 = (my_result||Rece_results||Comparison),
certain level of difficulty). Each DAG calculates the hash SigDAGl = SignSKDAG (Data_2).
l
value of its block based on a random nonce value ϕ, the 3. The leader adds new block data into vehicular blockchain after
previous block hash value, timestamp, and data blocks’ verifying by DAGs, and broadcasts the block data to all DAGs for
merkel root, and so on (denoted as previousdata ) [21]. storage.
Namely, Hash(ϕ + previousdata ) < Difficulty. Here, DAGj → All : Data_block = (Data_3||SigDAGj ||
Difficulty can be adjusted by the system to control the timestamp),
speed of finding out the specific ϕ. After finding a valid where Data_3 = (Block_data||Block_hash||{CertDAGj }||
proof-of-work (i.e., ϕ), the fastest miner (DAG) broad- timestamp),
casts the block and the specific ϕ to other DAGs in the SigDAGj = SignSKDAG (Data_3).
j
vehicular blockchain. Other DAGs audit and verify the
records in the block and ϕ. If other DAGs agree on the
block, data information in this block will be added to
by information indexes. The data requestors choose their opti-
the vehicular blockchain by a linear, chronological order,
mal data providers according to reputation of providers. More
and the fastest miner (DAG) is awarded by vehicle coins.
details about the reputation calculation are given in Section IV.
3) Step 3 (Carrying Out a Consensus Process): The con-
For example, a data requestor vm sends a data sharing request
sensus process is carried out by authorized DAGs and
(Req) to a data provider vi . This request includes time, the
a leader acted by the fastest DAG with a valid proof-
usage of requested data, sharing times, etc.,
of-work. Fig. 3 shows that the leader broadcasts block
data Block_data with timestamp and its proof-of-work vm → vi : Req = EPKvi (Request||Certvm ||timestamp).
to other authorized DAGs for verification and audit.
For mutual supervision and verification, these DAGs 2) Step 2 (Data Sharing Authorization): After receiving the
audit the block data and broadcast their audit results request Req, vi verifies the identity of vm , and defines the data
with their signatures to each other. After receiving the access constraints based on the request from vm . After that,
audit results, each DAG compares its result with oth- vi sends the access constraints, pseudonyms’ private keys of
ers and sends a reply (Reply) back to the leader. This uploaded data, public key of the data requestor, and so on to
reply consists of the DAG’s audit result my_result, com- a nearby RSU, e.g., RSUj
parison result Comparison, signatures, and records of vi → RSUj : Message
received audit results Rece_results. The leader analyzes
= EPKRSUj (Constraints||SKPIDk ||PKvm ||timestamp||Certvi ).
the received replies from DAGs. If all the DAGs agree i
on the block data, the leader will send records including The ISSC is triggered by Message from vi . RSUs first verify
current audited block data and a corresponding signature the certificate of vi , and check the shared data information of
to all authorized DAGs for storage. After that, this block vi in the vehicular blockchain. The RSUs obtain and integrate
is stored in the vehicular blockchain, and the leader is the shared data stored in the vehicular blockchain according to
awarded by vehicle coins. More details about the con- the given pseudonyms’ private keys of shared data. The shared
sensus process are given in Protocol 1. If some DAGs data is encrypted with the public key of data requestor vm . If
do not agree on the block data, the leader will analyze vi and vm are at the same coverage of a local DAG, the shared
the audit results, and send the block data to these DAGs data will be sent to vm directly. Otherwise, the shared data
once again for audit if necessary [13]. will be sent to a DAG nearby vm
RSUj → RSUj+1 : Shared_data
= EPKRSUj+1 (Data_2||timestamp||CertRSUj )
C. Secure and Efficient Data Sharing Scheme Using ISSC
Data_2 = EPKvm (Data||Certvi ||CertRSUj ||timestamp).
The P2P data sharing process among vehicles using ISSC
consists of the following steps. 3) Step 3 (Recording and Generating Data Sharing Events
1) Step 1 (Uploading Data Sharing Requests): Data in the Vehicular Blockchain): After obtaining the shared data,
requestors first download the latest data blocks in the vehic- the data requestor pays for the provider using vehicle coins,
ular blockchain from DAGs, and search their data of interest and generates a record of the data sharing event, and adds this
KANG et al.: BLOCKCHAIN FOR SECURE AND EFFICIENT DATA SHARING IN VECONs 4665
3) Trajectory Similarity: Data collected by vehicles is two trajectories Li and Lj . More specifically,
locally relevant for vehicles, and has spatial scope.
sin ϕ
To enable location awareness and improve data rele- ,0 < ϕ ≤ π
direction Li , Lj = 1 2 |sin(ϕ+ π )| 2 π (9)
2 + , 2 < ϕ ≤ π.
2
vance, trajectory similarity is taken into consideration on 2
reputation calculation during data sharing among vehi-
Therefore, the overall weight of reputation for local
cles. The higher trajectory similarity means the sharing
opinions is
data from the data provider is more relevant leading
to high-quality, more accurate and reliable data shar- δi→j = ρ1 IFi→j + ρ2 SIM Li , Lj (10)
ing [20]. The trajectory coefficients of vehicles are
where ρ1 + ρ2 = 1, and 0 < ρ1 ≤ 1, 0 < ρ2 ≤ 1.
represented by υ = {speed, location, direction}. The
weights of corresponding coefficients in υ are ψ1 , ψ2 ,
and ψ3 , and ψ1 + ψ2 + ψ3 = 1. The similarity C. Combining Recommended Opinions
degree of two trajectory segments (denoted as Li and After calculating the weights, the opinions are com-
Lj ) for vehicle i and vehicle j is SIM(Li , Lj ), which is bined into a common opinion in the form ωx→j rec :=
calculated as {bx→j , dx→j , ux→j }, where
rec rec rec
⎧ rec
⎪ bx→j = δx→j bx→j
⎪ 1
SIM Li , Lj = 1 − DISS Li , Lj . (5) ⎪ δx→j
⎪
⎨ rec x∈X x∈X
Here, DISS(Li , Lj ) is the normalized dissimilarity dx→j = 1δ δx→j dx→j (11)
x→j
⎪
⎪ x∈X x∈X
of two trajectory segments Li and Lj , and is ⎪
⎪
⎩ ux→j = δx→j ux→j
rec 1
defined as δ x→j
x∈X x∈X
where x ∈ X is a set of recommended vehicles that have
DISS Li , Lj = ψ1 speed Li , Lj + ψ2 location Li , Lj
interacted with vj . Thus, the subjective opinions from different
+ ψ3 direction Li , Lj . (6)
recommenders (neighboring vehicles) are integrated into one
single opinion, which is named as the recommended opinion
We consider that DISS(Li , Lj ) depends on differences
according to each opinion’s weights [23].
of speed, location, and direction for two trajectory seg-
ments. The speed difference of two trajectory segments
can be expressed as D. Combining Local Opinions With Recommended Opinions
After obtaining shared data from data providers, a data
Vave (Li ) − Vave Lj
requestor has a subjective opinion (i.e., local opinion) for each
speed Li , Lj = (7)
max V(Li ), V Lj data provider based on interaction histories. This local opinion
should still be considered while forming the final opinion to
where V(Li ) and V(Lj ) are the speeds of vehicles i and avoid cheating [23]. The final opinion of vi to vj is formed as
j during their trajectory segments, respectively. Vave (Li ) final := {bfinal , d final , ufinal }, where bfinal , d final , and ufinal are,
ωx→j x→j x→j x→j i→j i→j i→j
and Vave (Lj ) are the average speeds of these two vehi- respectively, calculated as
cles. We use location(Li , Lj ) to describe the location ⎧
⎪ bi→j urec +brec
x→j ui→j
difference of trajectory segments. The number of sam- ⎪
⎪ bfinal = ui→j +ux→j
⎪
⎨
i→j rec −urec u
x→j x→j i→j
ple points of Li and Lj are, respectively, denoted as e x→j +dx→j ui→j
di→j urec rec
di→j = ui→j +urec −urec ui→j
final (12)
and k during a time window T. The sets of sample ⎪
⎪ x→j x→j
points in chronological order are {Pi1 , Pi2 , . . . , Pie } and ⎪ final
⎪ urec ui→j
⎩ ui→j = x→j
.
ui→j +urec −urec ui→j
{Pj1 , Pj2 , . . . , Pjk }. We measure the similarity of the tra- x→j x→j
jectory segments by the longest common subsequence Similar to (2), the final reputation of vi to vj is
(LCS) that has been widely used in time series trajectory
clustering. The LCS is utilized to match two sequences
final
Ti→j = bfinal
i→j + γ ui→j .
final
(13)
by allowing them to stretch without rearranging the
sequence of the elements [22]. For trajectory segments E. Choosing the Optimal Data Provider for Data Sharing
Li and Lj , the LCS is described as lcs(Li , Lj ) = {Pie = For a data requestor, it chooses an optimal data provider
Pjk |e = k}, here, e ∈ {1, 2, . . . , E}, k ∈ {1, 2, . . . , K}. by comparing the final reputation values of data provider can-
Hence, the location difference of trajectory segments didates. There exists a candidate with the highest reputation
location(Li , Lj ) is given by value for each data requestor during a period of time. The
optimal data provider can be found by
max(e, k) − num lcs Li , Lj
location Li , Lj = (8) v∗j = arg max Ti→j
final
. (14)
max(e, k) j∈M
where num[lcs(Li , Lj )] is the number of points in LCS As shown in Fig. 4, the operations of finding the optimal
for trajectory segments Li and Lj . The directory differ- data provider consist of the following steps.
ence of two trajectory segments is the angle between 1) Step 1: A data requestor vi first downloads the latest
two trajectory segments. Here, we use ϕ as the angle of data blocks on the vehicular blockchain. vi searches
KANG et al.: BLOCKCHAIN FOR SECURE AND EFFICIENT DATA SHARING IN VECONs 4667
R EFERENCES
[1] W. Xu et al., “Internet of Vehicles in big data era,” IEEE/CAA J.
Automatica Sinica, vol. 5, no. 1, pp. 19–35, Jan. 2018.
[2] J. Ni, A. Zhang, X. Lin, and X. S. Shen, “Security, privacy, and fairness
in fog-based vehicular crowdsensing,” IEEE Commun. Mag., vol. 55,
no. 6, pp. 146–152, Jun. 2017.
[3] Z. Su, Y. Hui, and Q. Yang, “The next generation vehicular networks:
A content-centric framework,” IEEE Wireless Commun., vol. 24, no. 1,
pp. 60–66, Feb. 2017.
[4] Q. Yang, B. Zhu, and S. Wu, “An architecture of cloud-assisted infor-
mation dissemination in vehicular networks,” IEEE Access, vol. 4,
pp. 2764–2770, 2016.
[5] X. Huang, R. Yu, J. Kang, Y. He, and Y. Zhang, “Exploring mobile edge
computing for 5G-enabled software defined vehicular networks,” IEEE
Wireless Commun., vol. 24, no. 6, pp. 55–63, Dec. 2017.
[6] X. Huang, R. Yu, J. Kang, and Y. Zhang, “Distributed reputation
management for secure and efficient vehicular edge computing and
Fig. 9. Detection rates under different trust thresholds. networks,” IEEE Access, vol. 5, pp. 25408–25420, 2017.
[7] D. Huang, S. Misra, M. Verma, and G. Xue, “PACP: An efficient
pseudonymous authentication-based conditional privacy protocol for
VANETs,” IEEE Trans. Intell. Transp. Syst., vol. 12, no. 3, pp. 736–746,
misbehavior probability impacts the reputation values. With Sep. 2011.
[8] Z. Yang, K. Yang, L. Lei, K. Zheng, and V. C. M. Leung,
the higher misbehavior probability, the average reputation “Blockchain-based decentralized trust management in vehicular
value of the abnormal vehicles using our TWSL scheme is networks,” IEEE Internet Things J., to be published. [Online].
lower than that of TSL scheme because of the considered Available: https://ieeexplore.ieee.org/abstract/document/8358773,
doi: 10.1109/JIOT.2018.2836144.
weights. For example, when the misbehavior probability is [9] L. Yue, H. Junqin, Q. Shengzhi, and W. Ruijin, “Big data model of
60%, our TWSL scheme is 38% lower than that of TSL security sharing based on blockchain,” in Proc. 3rd Int. Conf. Big Data
scheme. So our TWSL scheme is sensitive for the misbehav- Comput. Commun. (BIGCOM), 2017, pp. 117–121.
[10] Z. Xiong, Y. Zhang, D. Niyato, P. Wang, and Z. Han, “When mobile
ior, although malicious vehicles try to camouflage themselves. blockchain meets edge computing,” IEEE Commun. Mag., vol. 56, no. 8,
It is beneficial to detect and eliminate the misbehaviors timely pp. 33–39, Aug. 2018.
in VECONs. [11] Y. Yuan and F.-Y. Wang, “Towards blockchain-based intelligent trans-
portation systems,” in Proc. IEEE 19th Int. Conf. Intell. Transp. Syst.
We study detection rate of abnormal vehicles using TWSL (ITSC), Nov. 2016, pp. 2663–2668.
scheme and TSL scheme within 60 min. Fig. 9 shows the [12] M. Singh and S. Kim, “Trust bit: Reward-based intelligent vehicle com-
proposed TWSL scheme can distinguish much more abnor- mination using blockchain paper,” in Proc. IEEE 4th World Forum
Internet Things, Feb. 2018, pp. 62–67.
mal vehicles compared to TSL scheme. Note that, with higher [13] J. Kang et al., “Enabling localized peer-to-peer electricity trading among
threshold value of trust, more abnormal vehicles will be dis- plug-in hybrid electric vehicles using consortium blockchains,” IEEE
tinguished. When the threshold value of trust is 0.35, the Trans. Ind. Informat., vol. 13, no. 6, pp. 3154–3164, Dec. 2017.
[14] Z. Li et al., “Consortium blockchain for secure energy trading in indus-
recognition rate of abnormal vehicles in TWSL scheme has trial Internet of Things,” IEEE Trans. Ind. Informat., vol. 14, no. 8,
already been more than 100%, while that of TSL scheme pp. 3690–3700, Aug. 2018.
is only 50%. Due to higher detection rate in the proposed [15] Q. Yang and H. Wang, “Toward trustworthy vehicular social networks,”
IEEE Commun. Mag., vol. 53, no. 8, pp. 42–47, Aug. 2015.
TWSL scheme, potential security threats can be removed more [16] S. Delgado-Segura, C. Tanas, and J. Herrera-Joancomartí, “Reputation
effectively, which makes VECONs more secure. and reward: Two sides of the same bitcoin,” Sensors, vol. 16, no. 6,
pp. 1–23, 2016.
[17] Y. Zhang and J. Wen, “The IoT electric business model: Using
VI. C ONCLUSION blockchain technology for the Internet of Things,” Peer-to-Peer Netw.
Appl., vol. 10, no. 4, pp. 983–994, 2017.
In this paper, we have presented a secure P2P data shar- [18] S. Nakamoto. (2012). Bitcoin: A Peer-to-Peer Electronic Cash System,
ing system in vehicular computing and networks. We utilized 2009. [Online]. Available: http://www.bitcoin.org/bitcoin.pdf
4670 IEEE INTERNET OF THINGS JOURNAL, VOL. 6, NO. 3, JUNE 2019
[19] J. Kang et al., “Location privacy attacks and defenses in cloud-enabled Maoqiang Wu is currently pursuing the Ph.D.
Internet of Vehicles,” IEEE Wireless Commun., vol. 23, no. 5, pp. 52–59, degree in networked control systems at the
Oct. 2016. Guangdong University of Technology, Guangzhou,
[20] R. Yu et al., “MixGroup: Accumulative pseudonym exchanging for loca- China.
tion privacy enhancement in vehicular social networks,” IEEE Trans. His current research interests include blockchain,
Depend. Secure Comput., vol. 13, no. 1, pp. 93–105, Jan./Feb. 2016. resource management in wireless communications
[21] I. Alqassem and D. Svetinovic, “Towards reference architecture for cryp- and networking.
tocurrencies: Bitcoin architectural analysis,” in Proc. IEEE Int. Conf.
Internet Things (iThings) IEEE Green Comput. Commun. (GreenCom)
IEEE Cyber Phys. Soc. Comput. (CPSCom), 2014, pp. 436–443.
[22] L. Zheng, Q. Feng, W. Liu, and X. Zhao, “Discovering trip hot routes
using large scale taxi trajectory data,” in Proc. Int. Conf. Adv. Data Min.
Appl., 2016, pp. 534–546.
[23] Y. Liu, K. Li, Y. Jin, Y. Zhang, and W. Qu, “A novel reputation com-
putation model based on subjective logic for mobile ad hoc networks,”
Future Gener. Comput. Syst., vol. 27, no. 5, pp. 547–554, 2011. Sabita Maharjan (S’09–M’13) received the Ph.D.
[24] J. Kang, R. Yu, X. Huang, and Y. Zhang, “Privacy-preserved pseudonym degree in networks and distributed systems from
scheme for fog computing supported Internet of Vehicles,” IEEE Trans. the University of Oslo, Oslo, Norway, and Simula
Intell. Transp. Syst., vol. 19, no. 8, pp. 2627–2637, Aug. 2018. Research Laboratory, Fornebu, Norway, in 2013.
[25] G. Zyskind, O. Nathan, and A. Pentland, “Decentralizing privacy: Using She is currently a Senior Research Scientist
blockchain to protect personal data,” in Proc. IEEE Security Privacy with the Simula Metropolitan Center for Digital
Workshops (SPW), 2015, pp. 180–184. Engineering, Oslo, Norway, and an Associate
[26] C Projects. (2013). [Online]. Available: http://www.yellowcabsf.com/ Professor (adjunct position) with the University of
[27] M. A. Hoque, X. Hong, and B. Dixon, “Analysis of mobility patterns for Oslo. Her current research interests include wireless
urban taxi cabs,” in Proc. Int. Conf. Comput. Netw. Commun. (ICNC), networks, network security and resilience, smart grid
2012, pp. 756–760. communications, cyber-physical systems, machine-
[28] S. Zhong, J. Chen, and Y. R. Yang, “Sprite: A simple, cheat-proof, credit- to-machine communications, and software defined wireless networking.
based system for mobile ad-hoc networks,” in Proc. INFOCOM 22nd
Annu. Joint Conf. IEEE Comput. IEEE Commun. Soc., vol. 3, 2003,
pp. 1987–1997.