A hierarchical blockchain-enabled security-threat assessment architecture for IoV

被引:1
作者
Liu, Yuanni [1 ]
Pan, Ling [1 ]
Chen, Shanzhi [2 ]
机构
[1] Chongqing Univ Posts & Telecommun, Sch Cyber Secur & Informat Law, Chongqing 400065, Peoples R China
[2] China Acad Telecommun Technol, State Key Lab Wireless Mobile Commun, Beijing 100191, Peoples R China
关键词
Internet of vehicles; Blockchain; Edge computing; Data virtualization; Data service composition; DATA VIRTUALIZATION; FRAMEWORK; INTERNET;
D O I
10.1016/j.dcan.2022.12.019
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In Internet of Vehicles (IoV), the security-threat information of various traffic elements can be exploited by hackers to attack vehicles, resulting in accidents, privacy leakage. Consequently, it is necessary to establish security-threat assessment architectures to evaluate risks of traffic elements by managing and sharing securitythreat information. Unfortunately, most assessment architectures process data in a centralized manner, causing delays in query services. To address this issue, in this paper, a Hierarchical Blockchain-enabled Security threat Assessment Architecture (HBSAA) is proposed, utilizing edge chains and global chains to share data. In addition, data virtualization technology is introduced to manage multi-source heterogeneous data, and a metadata association model based on attribute graph is designed to deal with complex data relationships. In order to provide high-speed query service, the ant colony optimization of key nodes is designed, and the HBSAA prototype is also developed and the performance is tested. Experimental results on the large-scale vulnerabilities data gathered from NVD demonstrate that the HBSAA not only shields data heterogeneity, but also reduces service response time.
引用
收藏
页码:1035 / 1047
页数:13
相关论文
共 50 条
[21]   The security and privacy of blockchain-enabled EMR storage management scheme [J].
Wu, Guangfu ;
Wang, Yingjun .
2020 16TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS 2020), 2020, :283-287
[22]   Blockchain-Enabled Social Security Services Using Smart Contracts [J].
Tang, Song ;
Wang, Zhiqiang ;
Dong, Jia ;
Ma, Yandong .
IEEE ACCESS, 2022, 10 :73857-73870
[23]   TIIA: A blockchain-enabled Threat Intelligence Integrity Audit scheme for IIoT [J].
Zhang, Wenbo ;
Bai, Yayu ;
Feng, Jingyu .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2022, 132 :254-265
[24]   Blockchain-enabled infrastructural security solution for serverless consortium fog and edge computing [J].
Khan, Abdullah Ayub ;
Laghari, Asif Ali ;
Baqasah, Abdullah M. ;
Alroobaea, Roobaea ;
Almadhor, Ahmad ;
Sampedro, Gabriel Avelino ;
Kryvinska, Natalia .
PEERJ COMPUTER SCIENCE, 2024, 10
[25]   Blockchain-Enabled Security in Electric Vehicles Cloud and Edge Computing [J].
Liu, Hong ;
Zhang, Yan ;
Yang, Tao .
IEEE NETWORK, 2018, 32 (03) :78-83
[26]   A Blockchain-Enabled Incentivised Framework for Cyber Threat Intelligence Sharing in ICS [J].
Nguyen, Kathy ;
Pal, Shantanu ;
Jadidi, Zahra ;
Dorri, Ali ;
Jurdak, Raja .
2022 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS AND OTHER AFFILIATED EVENTS (PERCOM WORKSHOPS), 2022,
[27]   Blockchain-enabled circular supply chain management: A system architecture for fast fashion [J].
Wang, Bill ;
Luo, Wen ;
Zhang, Abraham ;
Tian, Zonggui ;
Li, Z. .
COMPUTERS IN INDUSTRY, 2020, 123
[28]   Blockchain-Enabled Cognitive Approach for Record Sharing Security and Privacy [J].
Ahmed, Farooq ;
Zhang, Chi ;
Wei, Linbo ;
Li, Xudong ;
Chaudhry, Shehzad Ashraf .
HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2025, 15
[29]   Blockchain-enabled efficient distributed attribute-based access control framework with privacy-preserving in IoV [J].
Zhang, Ye ;
Zhang, Leyou ;
Wu, Qing ;
Mu, Yi .
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (10) :9216-9227
[30]   A blockchain-enabled security management framework for mobile edge computing [J].
Alzubi, Jafar A. ;
Alzub, Omar A. ;
Singh, Ashish ;
Mahmod Alzubi, Tareq .
INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2023, 33 (05)