SpeedyChain: A framework for decoupling data from blockchain for smart cities

被引:77
作者
Michelin, Regio A. [1 ,2 ]
Dorri, Ali [3 ,4 ]
Steger, Marco [5 ]
Lunardi, Roben C. [1 ,2 ]
Kanhere, Salil S. [3 ]
Jurdak, Raja [4 ]
Zorzo, Avelino F. [2 ]
机构
[1] IFRS, Porto Alegre, RS, Brazil
[2] Pontificia Univ Catolica Rio Grande do Sul, Porto Alegre, RS, Brazil
[3] UNSW, CSE, Sydney, NSW, Australia
[4] CSIRO, DATA61, Sydney, NSW, Australia
[5] Virtual Vehicle Res Ctr, Graz, Austria
来源
PROCEEDINGS OF THE 15TH EAI INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING AND SERVICES (MOBIQUITOUS 2018) | 2018年
关键词
Blockchain; Smart Vehicles; Smart Cities; SECURITY; INTERNET;
D O I
10.1145/3286978.3287019
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
There is increased interest in smart vehicles acting as both data consumers and producers in smart cities. Vehicles can use smart city data for decision-making, such as dynamic routing based on traffic conditions. Moreover, the multitude of embedded sensors in vehicles can collectively produce a rich data set of the urban landscape that can be used to provide a range of services. Key to the success of this vision is a scalable and private architecture for trusted data sharing. This paper proposes a framework called SpeedyChain, that leverages blockchain technology to allow smart vehicles to share their data while maintaining privacy, integrity, resilience, and non-repudiation in a decentralized and tamper-resistant manner. Differently from traditional blockchain usage (e.g., Bitcoin and Ethereum), the proposed framework uses a blockchain design that decouples the data stored in the transactions from the block header, thus allowing fast addition of data to the blocks. Furthermore, an expiration time for each block is proposed to avoid large sized blocks. This paper also presents an evaluation of the proposed framework in a network emulator to demonstrate its benefits.
引用
收藏
页码:145 / 154
页数:10
相关论文
共 30 条
  • [1] Ahrenholz J, 2008, IEEE MILIT COMMUN C, P3856
  • [2] Algarni Abdullah M., 2016, 2016 2nd International Conference on Information Management (ICIM), P26, DOI 10.1109/INFOMAN.2016.7477530
  • [3] [Anonymous], 2013, IEEE COMMUNICATIONS
  • [4] [Anonymous], 2018, IOTA NEXT GEN BLOCKC
  • [5] [Anonymous], COMPUTING RES REPOSI
  • [6] [Anonymous], 5G COMM KEY AUT DRIV
  • [7] [Anonymous], 2017, P 13 S US PRIV SEC
  • [8] A Cross-Layer Approach to Privacy-Preserving Authentication in WAVE-Enabled VANETs
    Biswas, Subir
    Misic, Jelena
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2013, 62 (05) : 2182 - 2192
  • [9] A Survey on Security and Privacy Issues of Bitcoin
    Conti, Mauro
    Kumar, E. Sandeep
    Lal, Chhagan
    Ruj, Sushmita
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (04): : 3416 - 3452
  • [10] Defending the Sybil attack in P2P networks: Taxonomy, challenges, and a proposal for self-registration
    Dinger, Jochen
    Hartenstein, Hannes
    [J]. FIRST INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2006, : 756 - +