A Blockchain-Based Approach to Track Traffic Messages in Vehicular Networks

被引:2
作者
Diallo, El-Hacen [1 ]
Dib, Omar [2 ]
Al Agha, Khaldoun [1 ]
机构
[1] Univ Paris Saclay, Lab Interdisciplinaire Sci Numer, CNRS, F-91190 Gif Sur Yvette, France
[2] Wenzhou Kean Univ, Dept Comp Sci, Wenzhou, Peoples R China
来源
PROCEEDINGS OF ACADEMIA-INDUSTRY CONSORTIUM FOR DATA SCIENCE (AICDS 2020) | 2022年 / 1411卷
关键词
Blockchain; Vehicular networks; Consensus algorithms;
D O I
10.1007/978-981-16-6887-6_28
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Sharing traffic information on the vehicular network is essential to implement an efficient transportation system. Earlier communication of road closure warnings, car accident notices, and driver route changes is crucial to reduce traffic congestion. Unfortunately, tracking the exchanged traffic data and ensuring their correctness are not easy tasks. Vehicles can act maliciously by sending erroneous information or being subject to cyber-attacks, causing incorrect messages in the system. To efficiently identify the incorrect traffic information and track the exchanged data, we use a blockchain due to its decentralization, data immutability, security, and transparency features. We consider both the well-secured proof of work (PoW) and the practical Byzantine fault tolerance (PBFT) consensus algorithms. We study the adaptation of those two algorithms to enable an efficient, secure, and transparent exchange of data in vehicular networks. We also discuss their empirical performance under real-world vehicular network settings.
引用
收藏
页码:345 / 362
页数:18
相关论文
共 27 条
[1]  
[Anonymous], 2015, P INT WORKSH OP PROB
[2]  
[Anonymous], 2017, ARXIV170809721
[3]   A Review of Blockchain-Based Systems in Transportation [J].
Astarita, Vittorio ;
Giofre, Vincenzo Pasquale ;
Mirabelli, Giovanni ;
Solina, Vittorio .
INFORMATION, 2020, 11 (01)
[4]   Practical byzantine fault tolerance and proactive recovery [J].
Castro, M ;
Liskov, B .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2002, 20 (04) :398-461
[5]  
De Angelis S, 2018, APPLYING CAP THEOREM
[6]  
Diallo El-hacen, 2020, Web, Artificial Intelligence and Network Applications. Proceedings of the Workshops of the 34th International Conference on Advanced Information Networking and Applications (WAINA-2020). Advances in Intelligent Systems and Computing (AISC 1150), P233, DOI 10.1007/978-3-030-44038-1_22
[7]  
Dib O., 2018, INT J ADV TELECOMMUN, V11, P51
[8]   VANET security surveys [J].
Engoulou, Richard Gilles ;
Bellaiche, Martine ;
Pierre, Samuel ;
Quintero, Alejandro .
COMPUTER COMMUNICATIONS, 2014, 44 :1-13
[9]   On Blockchain-Enhanced Secure Data Storage and Sharing in Vehicular Edge Computing Networks [J].
Firdaus, Muhammad ;
Rhee, Kyung-Hyune .
APPLIED SCIENCES-BASEL, 2021, 11 (01) :1-21
[10]  
Gervais A., 2016, P 2016 ACM SIGSAC C, DOI [10.1145/2976749.2978341, DOI 10.1145/2976749.2978341]