This document proposes a tiered blockchain framework for vehicular forensics. It identifies key entities involved in the forensics process such as vehicles, manufacturers, technicians, authorities. It describes how these entities interact and how their interactions would be recorded on a permissioned blockchain to generate comprehensive evidence. It also introduces a watchdog entity to prevent collusion and proposes a vehicle state mechanism to verify vehicle sensor data after an accident. Finally, it conducts a security analysis and compares the framework to other proposals.
Vehicular Networks (VNs) seek to provide, among other applications, safer driving conditions. Vehicles need to periodically broadcast safety messages providing precise position information to nearby vehicles. Recent advances in development of Wireless Communication in Vehicular Adhoc Network (VANET) has provided emerging platform for industrialists and researchers. Vehicular adhoc networks are multi-hop networks with no fixed infrastructure. As a result, the driver’s privacy is at stake. In order to mitigate this threat, while complying with the safety requirements of VNs, the creation of mix-zones security at appropriate places of the VN to prevent the attacks Vehicle. Propose to do so with the use of cryptography algorithm AES with zone based routing protocol, analytically how the combination of mix-zones into mix-networks brings forth location privacy in vehicle node. Finally, show by simulations that the proposed zone based security is effective in various scenarios.
Blockchain for automotive: An insight towards the IPFS blockchain-based auto ...IJECEIAES
The advancing technology and industrial revolution have taken the automotive industry by storm in recent times. The auto sector’s constantly growing demand has paved the way for the automobile sector to embrace new technologies and disruptive innovations. The multi-trillion dollar, complex auto insurance sector is still stuck in the regulations of the past. Most of the customers still contact the insurance company by phone to buy new policies and process existing insurance claims. The customers still face the risk of fraudulent online brokers, as policies are mostly signed and processed on papers which often require human supervision, with a risk of error. The insurance sector faces a threat of failure due to losing and misconception of policies and information. We present a decentralized IPFS and blockchain-based framework for the auto insurance sector that regulates the activities in terms of insurance claims for automobiles and automates payments. This article also discusses how blockchain technology’s features can be useful for the decentralized autonomous vehicle’s ecosystem.
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...Dr. Amarjeet Singh
Vehicles in a vehicular ad-hoc network (VANET) broadcast information about the driving environment in the road. Due to the open-access environment, this means that the VANET is susceptible to security and privacy issues. However, none of the related works satisfies all security and privacy requirements. Besides, their proposed has huge overhead in terms of computation and communication. To address the above issues, we will propose the security and privacy scheme based on Elliptic Curve Cryptography (ECC) and one secure hash function. Hence the reliability of each message being signed and checked has been improved. The main aim of this work is to satisfy all aspect requirements of security and privacy and reduce the computational complexity of the system.
Vehicular Ad Hoc Network (VANET) is a more influential network in which vehicles depend on each other to communicate and for the secure exchange of the messages. With the improvement in the technology, mainly the vehicles are equipped with Wi-Fi and GPS devices to improve the traffic handling and road safety. But many vehicles may broadcast the bogus messages for their own purpose, so it needs a trustful environment and an effective trust management schemes to prevent the network from the various malicious attacks. Trust establishment is very challenging as the network is highly mobile and vehicles may come in or depart at any time. In this paper, we first discuss the VANET model to describe the environment, and then the trust management schemes to secure the network and lastly the various cryptography fundamentals for the fast and safe message transfer.
This PowerPoint discovers Indian Insurtech Industry and explores the benefits and pitfalls of Insrtech vis-a-vis traditional Insurance. This study further explores Indian Insurance Regulator IRDAI's attempts to promote this new tech trend and highlights the defects therein.
Find the research mentioned at https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3799576 (The Rise of Insurtech: The Ups and Downs of New Tech Trend)
How blockchain technology might transform wholesale insuranceIan Beckett
The document analyzes how blockchain technology could transform wholesale insurance markets. It conducted interviews with industry participants to identify potential use cases. Key findings include:
- Blockchain allows for tamper-proof record keeping and decentralizes processes by replacing central authorities.
- Major insurance processes like placement, reinsurance, claims management, and accounting could benefit from blockchain.
- Respondents saw opportunities for increased efficiency and reduced costs, but also challenges in implementing new technology.
- The study developed a proof-of-concept application to demonstrate how blockchain could solve business problems in insurance.
Connected Vehicles—Insurance: The Business of Preventing Crashes Andreas Mai
Connected vehicles have the potential to significantly reduce costs for the insurance industry and society by preventing crashes. Insurance companies can track driver behavior through telematics devices to better price premiums, with some offering pay-as-you-drive and pay-how-you-drive models. Connected vehicle technologies may be able to prevent up to 80% of crashes through features like collision avoidance systems and vehicle-to-vehicle communication. A unified in-vehicle connectivity platform could further reduce insurance operating costs and unlock additional value of over $380 per connected vehicle annually for insurance providers.
Enhanced Conditional Privacy Preservation In VANETsIJERDJOURNAL
Abstract:- The Vehicle drivers (users) do not want their personal information such as vehicle names, license plate, speed, positions, moving routes, and user information to be revealed, in order to protect them against any illegal tracing or user profiling. Thus, this information must be protected from any kind of misuse or attacks. For this the obscurity of vehicular nodes should be supported to preserve privacy of vehicles and their users. Also, we should be able to investigate for accidents or liabilities from non-repudiation. Hence, we present an enhanced conditional privacy preservation scheme for vehicular ad-hoc networks (VANETs). This scheme includes an ID-based cryptosystem to assure user's obscurity using pseudonyms; however the model provides a backdoor for authorities to track misbehaving and suspicious users
Vehicular Networks (VNs) seek to provide, among other applications, safer driving conditions. Vehicles need to periodically broadcast safety messages providing precise position information to nearby vehicles. Recent advances in development of Wireless Communication in Vehicular Adhoc Network (VANET) has provided emerging platform for industrialists and researchers. Vehicular adhoc networks are multi-hop networks with no fixed infrastructure. As a result, the driver’s privacy is at stake. In order to mitigate this threat, while complying with the safety requirements of VNs, the creation of mix-zones security at appropriate places of the VN to prevent the attacks Vehicle. Propose to do so with the use of cryptography algorithm AES with zone based routing protocol, analytically how the combination of mix-zones into mix-networks brings forth location privacy in vehicle node. Finally, show by simulations that the proposed zone based security is effective in various scenarios.
Blockchain for automotive: An insight towards the IPFS blockchain-based auto ...IJECEIAES
The advancing technology and industrial revolution have taken the automotive industry by storm in recent times. The auto sector’s constantly growing demand has paved the way for the automobile sector to embrace new technologies and disruptive innovations. The multi-trillion dollar, complex auto insurance sector is still stuck in the regulations of the past. Most of the customers still contact the insurance company by phone to buy new policies and process existing insurance claims. The customers still face the risk of fraudulent online brokers, as policies are mostly signed and processed on papers which often require human supervision, with a risk of error. The insurance sector faces a threat of failure due to losing and misconception of policies and information. We present a decentralized IPFS and blockchain-based framework for the auto insurance sector that regulates the activities in terms of insurance claims for automobiles and automates payments. This article also discusses how blockchain technology’s features can be useful for the decentralized autonomous vehicle’s ecosystem.
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...Dr. Amarjeet Singh
Vehicles in a vehicular ad-hoc network (VANET) broadcast information about the driving environment in the road. Due to the open-access environment, this means that the VANET is susceptible to security and privacy issues. However, none of the related works satisfies all security and privacy requirements. Besides, their proposed has huge overhead in terms of computation and communication. To address the above issues, we will propose the security and privacy scheme based on Elliptic Curve Cryptography (ECC) and one secure hash function. Hence the reliability of each message being signed and checked has been improved. The main aim of this work is to satisfy all aspect requirements of security and privacy and reduce the computational complexity of the system.
Vehicular Ad Hoc Network (VANET) is a more influential network in which vehicles depend on each other to communicate and for the secure exchange of the messages. With the improvement in the technology, mainly the vehicles are equipped with Wi-Fi and GPS devices to improve the traffic handling and road safety. But many vehicles may broadcast the bogus messages for their own purpose, so it needs a trustful environment and an effective trust management schemes to prevent the network from the various malicious attacks. Trust establishment is very challenging as the network is highly mobile and vehicles may come in or depart at any time. In this paper, we first discuss the VANET model to describe the environment, and then the trust management schemes to secure the network and lastly the various cryptography fundamentals for the fast and safe message transfer.
This PowerPoint discovers Indian Insurtech Industry and explores the benefits and pitfalls of Insrtech vis-a-vis traditional Insurance. This study further explores Indian Insurance Regulator IRDAI's attempts to promote this new tech trend and highlights the defects therein.
Find the research mentioned at https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3799576 (The Rise of Insurtech: The Ups and Downs of New Tech Trend)
How blockchain technology might transform wholesale insuranceIan Beckett
The document analyzes how blockchain technology could transform wholesale insurance markets. It conducted interviews with industry participants to identify potential use cases. Key findings include:
- Blockchain allows for tamper-proof record keeping and decentralizes processes by replacing central authorities.
- Major insurance processes like placement, reinsurance, claims management, and accounting could benefit from blockchain.
- Respondents saw opportunities for increased efficiency and reduced costs, but also challenges in implementing new technology.
- The study developed a proof-of-concept application to demonstrate how blockchain could solve business problems in insurance.
Connected Vehicles—Insurance: The Business of Preventing Crashes Andreas Mai
Connected vehicles have the potential to significantly reduce costs for the insurance industry and society by preventing crashes. Insurance companies can track driver behavior through telematics devices to better price premiums, with some offering pay-as-you-drive and pay-how-you-drive models. Connected vehicle technologies may be able to prevent up to 80% of crashes through features like collision avoidance systems and vehicle-to-vehicle communication. A unified in-vehicle connectivity platform could further reduce insurance operating costs and unlock additional value of over $380 per connected vehicle annually for insurance providers.
Enhanced Conditional Privacy Preservation In VANETsIJERDJOURNAL
Abstract:- The Vehicle drivers (users) do not want their personal information such as vehicle names, license plate, speed, positions, moving routes, and user information to be revealed, in order to protect them against any illegal tracing or user profiling. Thus, this information must be protected from any kind of misuse or attacks. For this the obscurity of vehicular nodes should be supported to preserve privacy of vehicles and their users. Also, we should be able to investigate for accidents or liabilities from non-repudiation. Hence, we present an enhanced conditional privacy preservation scheme for vehicular ad-hoc networks (VANETs). This scheme includes an ID-based cryptosystem to assure user's obscurity using pseudonyms; however the model provides a backdoor for authorities to track misbehaving and suspicious users
Cyber-insurance and liability caps proposed as incentives by Department of Co...David Sweigert
It is important to note that while the incentives study was required within 120 days of the date of EO 13636, the preliminary version of the Framework is required within 240 days of the date of EO 13636. In addition, DHS will be establishing a voluntary program to support Framework adoption within 365 days of the signing of EO 13636. This report is limited by the current understanding of what the Framework will entail and would benefit from more specifics to inform the analysis and recommendation of the incentives designed for promoting its adoption. For example, knowledge of the Framework would allow the cost of Framework adoption to be quantified. Since the Framework is still under development, this was not possible, and so the incentives considered were evaluated at a more general level with the understanding that the analysis would be updated as needed as the Framework is developed. Since the Framework is still in development at the time of this writing, the incentives that are intended to promote its adoption were assessed prospectively, in terms of the likelihood that they will motivate organizations to adopt the Framework in the future. It is expected that the most effective incentives will not only promote adoption of the Framework.
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs ApplicationsIJCNCJournal
The VANET has seen a boom in the distribution of significant source data,enabling connected vehicle communications to enhance roadway safety.Despite the potential for interesting applications invehicle networks,thereare still unresolved issues that have the potential to hinder bandwidth utilization once deployed. Specifically, insider assaults on VANET platforms such as Blackhole attemptscan completely stop vehicle-to-vehicle communications and impair the networks' performance level. In this study, we provide the blockchain-based decentralized trust scoring architecture for the participants in the network to identify existing and blacklisted insider adversaries in VANET. To address this concern, we suggest a two-level detection technique, in the first level neighboring nodes determine theirtrustworthiness and in the second level it aggregates trust scores for vehicle nodes using a consortium blockchain-based mechanism that uses authorized Road Side Units (RSUs) as consensus mechanism. The blacklisted node records are then periodically changed based on the trust scores supplied by the nearby nodes. In regards to the practical scope of the network, the experimental study demonstrates that the suggested solution is effective and sustainable. To improve packet delivery ratio and vehicle node security in the VANET, the blockchain-based Trust-LEACH routing technique has also been created. The performance analysis has been carried out for Computational cost analysis, Computational time for block creation, Network analysis, SecurityAnalysis, and MITM attack analysis. Additionally, we provide proof that the suggested approach enhances VANET reliability by thwarting and removing insider threat initiation nodes from its blacklist.
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONSIJCNCJournal
The VANET has seen a boom in the distribution of significant source data,enabling connected vehicle
communications to enhance roadway safety.Despite the potential for interesting applications invehicle
networks,thereare still unresolved issues that have the potential to hinder bandwidth utilization once
deployed. Specifically, insider assaults on VANET platforms such as Blackhole attemptscan completely
stop vehicle-to-vehicle communications and impair the networks' performance level. In this study, we
provide the blockchain-based decentralized trust scoring architecture for the participants in the network to
identify existing and blacklisted insider adversaries in VANET. To address this concern, we suggest a twolevel detection technique, in the first level neighboring nodes determine theirtrustworthiness and in the
second level it aggregates trust scores for vehicle nodes using a consortium blockchain-based mechanism
that uses authorized Road Side Units (RSUs) as consensus mechanism. The blacklisted node records are
then periodically changed based on the trust scores supplied by the nearby nodes. In regards to the
practical scope of the network, the experimental study demonstrates that the suggested solution is effective
and sustainable. To improve packet delivery ratio and vehicle node security in the VANET, the blockchainbased Trust-LEACH routing technique has also been created. The performance analysis has been carried
out for Computational cost analysis, Computational time for block creation, Network analysis,
SecurityAnalysis, and MITM attack analysis. Additionally, we provide proof that the suggested approach
enhances VANET reliability by thwarting and removing insider threat initiation nodes from its blacklist.
IRJET - Automobile Black Box System for Vehicle Accident AnalysisIRJET Journal
This document summarizes research on using an automobile black box system to analyze vehicle accidents. It proposes using sensors like temperature, humidity, and gas sensors mounted on a Raspberry Pi 3 to continuously monitor vehicle and driver conditions. Video and location data would also be collected from external cameras and GPS. All sensor data would be stored on an SD card for retrieval after an accident occurs. The goal is to analyze accidents more accurately by objectively recording what happened leading up to the accident. This could help prevent future accidents by identifying risky driver behaviors from the collected data.
Satellite communication provides a secure and reliable solution for connected vehicles. It offers several key benefits:
High security due to fewer entry points than terrestrial networks. Updates can be distributed securely via private satellite broadcast networks.
Global coverage allows vehicles to be updated anywhere instantly and reliably without terrestrial dependencies. The network can scale globally as needed.
Comprehensive security programs throughout development and operation, including reducing attack surfaces, authentication, monitoring for threats, and fast global remediation for any issues discovered help ensure safety.
Vehicular ad hoc network is one of the most interesting research areas due to flexibility, low cost, high sensing fidelity, fault tolerance, creating many new and exciting application areas for remote sensing. So, it has emerged as a promising tool for monitoring the physical world with wireless sensor that can sense, process and communicate. Being ad-hoc in nature, VANET is a type of networks that is created from the concept of establishing a network of cars for a specific need or situation. VANETs have now been established as reliable networks that vehicles use for communication purpose on highways or urban environments. VANET considered as a distinct type of Mobile Ad Hoc Networks holds the opportunity to make peoples life and death decisions by predicting and helping the drivers and other people about the road safety and other critical conditions.
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehicles’ identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehicles’ identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
LSKA-ID: A lightweight security and key agreement protocol based on an identi...TELKOMNIKA JOURNAL
Recently, a huge effort has been pushed to the wireless broadcasting nature in the open area. However, the vehicular ad hoc network (VANET) is disposed to various kinds of attacks. Hence, keeping the security in VANET is the most critical issue because of the VANET network related to human life. Thus, we propose a robust and lightweight security and key agreement-based identity protocol LSKA-ID for vehicular communication. Our protocol utilizes the elliptic curve cryptography, Chinese reminder theorem, and identity (ID)-based cryptosystem to resolve the issues found in the previously proposed schemes, in which our protocol can resolve the key escrow issues accompanied in most ID-based schemes. Also, it does not need batch verification operations, which cause some problems to the verifier in case the batch beacons have one or more illegal beacons. Moreover, the LSKA-ID protocol addresses the dependency on the trusted authority (TA) during the high frequent handover between the groups that may cause a bottleneck problem on the TA. The security analysis proves the correctness of the LSKA-ID protocol by using the random oracle model and has shown to be effective in a performance evaluation.
IRJET- Smart Contracts for Insurance based on Hyperledger FabricIRJET Journal
The document proposes a blockchain-based smart contract system for insurance using Hyperledger Fabric to increase transparency and trust between customers and insurers. It involves three main participants (peers)- the customer, insurer, and auditor. The system would include a mobile app for customers and a web console for insurers and auditors to automate processes like claims handling and make fraud detection easier through the distributed ledger.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Brisk and secure ad hoc vehicular communicationeSAT Journals
Abstract The idea of Car-to-Car communication is a revolutionary phenomenon in the automobile industry. This idea will surely change the future of humanity for good. This technology will surely change the perception of how a traditional automotive was initially thought of by adding endless applications as a boon to mankind. The application of cars communicating with each other is enormous and has already been discussed by many researchers by now. But, the important thing here is how to put it in practice with the increasing demand for cars and making it safe to use it, at least improve the current condition by this new technology and not worsen the situation by digital hacking and other flaws. Since the nature of the Communication System is highly dynamic a strict security mechanism is mandatory for its seamless functioning. We propose to encrypt the communication taking place in C2C communication which is not the same as using the Internet security mechanism due to limitation of its speed and residing hardware servers. Symmetric Cryptography thus fails to incorporate the scope of various security disciplines and hence it is ineffective to use such techniques. Asymmetric Cryptography on the other hand provides an ideal trade-off among various security disciplines and hence it is considered as an alternative approach to accomplish a secure system but it fails when applied in an ad-hoc environment. However, the traditional Public Key Infrastructure (PKI) technique fails in several ways so we propose a modified form of communication and authentication technique along with rapid communication and group messages to fasten the speed of communication. Keywords: Protocol, Communication, Security, Privacy
This document proposes a service-oriented security framework called VCC-SSF for vehicular cloud computing environments. The framework has three layers: a core technology layer handling vehicle-to-everything communication and cloud computing, a security layer providing authentication, encryption, access control and privacy protection, and an application service layer offering payment and accident management services. The payment service allows automatic payment for goods inside the vehicle. The accident management service works to prevent accidents, respond to accidents that occur, and manage vehicles involved in accidents. The framework aims to address security threats in vehicular cloud computing while providing convenient user-oriented services.
Secure and Transparent Insurance Application using Blockchain TechnologyIRJET Journal
This document proposes using a permissioned blockchain network with four peer nodes (insurance, police, shop, and repair) to securely and transparently handle insurance applications and claims. Smart contracts written in Go would be used on the Hyperledger Fabric blockchain to automate insurance processes. This would make the system faster, more secure against fraud, and provide transparency by immutably recording transactions on the distributed ledger. The blockchain approach could reduce insurance costs and improve customer satisfaction compared to traditional centralized insurance systems.
ACPN: A Novel Authentication Framework with Conditional Privacy-Preservation ...Nexgen Technology
This document describes several final year IEEE projects from Nexgen Technology for 2015-2016. The first project is called ACPN and proposes a novel authentication framework for VANETs that provides conditional privacy preservation and non-repudiation. It introduces public key cryptography to pseudonym generation to allow third parties to verify vehicle identities while preserving privacy through authentication using self-generated pseudonyms. Identification-based signature and identification-based online/offline signature schemes are used for authentication between vehicles and roadside units and among vehicles respectively. Analysis and evaluation show ACPN meets authentication, privacy, non-repudiation and performance objectives for VANETs.
This document describes an IEEE final year project titled "A Novel Authentication Framework with Conditional Privacy-Preservation and Non-Repudiation for VANETs". The project proposes a framework called ACPN that introduces public-key cryptography to pseudonym generation, allowing legitimate third parties to verify vehicle identities while preserving privacy. Vehicles use self-generated pseudonyms as identifiers for authentication between roadside units and other vehicles. ACPN aims to achieve authentication, privacy preservation, and non-repudiation in Vehicular Ad Hoc Networks. Performance evaluation shows the framework is feasible and efficient for use in VANET environments.
Patents are a good information resource for obtaining IoT (Internet of Things) technology development status. Followings illustrate some examples of patents that provide current status of the IoT connected car technology development: safety/collision avoidance, traffic information for smart driving, connected car security, infotainment and self-driving car monitoring.
SOTM : A Self Organized Trust Management System for VANET csandit
Security and trust management in Vehicular Adhoc NETworks (VANET) is a crucial research domain
which is the scope of many researches and domains. Although, the majority of the proposed trust
management systems for VANET are based on specific road infrastructure, which may not be present in all
the roads. Therefore, road security should be managed by vehicles themselves. In this paper, we propose a
new Self Organized Trust Management system (SOTM). This system has the responsibility to cut with the
spread of false warnings in the network through four principal components: cooperation, trust
management, communication and security.
SOTM: A SELF ORGANIZED TRUST MANAGEMENT SYSTEM FOR VANET cscpconf
Security and trust management in Vehicular Adhoc NETworks (VANET) is a crucial research domain which is the scope of many researches and domains. Although, the majority of the proposed trust management systems for VANET are based on specific road infrastructure, which may not be present in all the roads. Therefore, road security should be managed by vehicles themselves. In this paper, we propose a new Self Organized Trust Management system (SOTM). This system has the responsibility to cut with the spread of false warnings in the network through four principal components: cooperation, trust management, communication and security.
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...Transcat
Join us for this solutions-based webinar on the tools and techniques for commissioning and maintaining PV Systems. In this session, we'll review the process of building and maintaining a solar array, starting with installation and commissioning, then reviewing operations and maintenance of the system. This course will review insulation resistance testing, I-V curve testing, earth-bond continuity, ground resistance testing, performance tests, visual inspections, ground and arc fault testing procedures, and power quality analysis.
Fluke Solar Application Specialist Will White is presenting on this engaging topic:
Will has worked in the renewable energy industry since 2005, first as an installer for a small east coast solar integrator before adding sales, design, and project management to his skillset. In 2022, Will joined Fluke as a solar application specialist, where he supports their renewable energy testing equipment like IV-curve tracers, electrical meters, and thermal imaging cameras. Experienced in wind power, solar thermal, energy storage, and all scales of PV, Will has primarily focused on residential and small commercial systems. He is passionate about implementing high-quality, code-compliant installation techniques.
More Related Content
Similar to A TIERED BLOCKCHAIN FRAMEWORK FOR VEHICULAR FORENSICS
Cyber-insurance and liability caps proposed as incentives by Department of Co...David Sweigert
It is important to note that while the incentives study was required within 120 days of the date of EO 13636, the preliminary version of the Framework is required within 240 days of the date of EO 13636. In addition, DHS will be establishing a voluntary program to support Framework adoption within 365 days of the signing of EO 13636. This report is limited by the current understanding of what the Framework will entail and would benefit from more specifics to inform the analysis and recommendation of the incentives designed for promoting its adoption. For example, knowledge of the Framework would allow the cost of Framework adoption to be quantified. Since the Framework is still under development, this was not possible, and so the incentives considered were evaluated at a more general level with the understanding that the analysis would be updated as needed as the Framework is developed. Since the Framework is still in development at the time of this writing, the incentives that are intended to promote its adoption were assessed prospectively, in terms of the likelihood that they will motivate organizations to adopt the Framework in the future. It is expected that the most effective incentives will not only promote adoption of the Framework.
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs ApplicationsIJCNCJournal
The VANET has seen a boom in the distribution of significant source data,enabling connected vehicle communications to enhance roadway safety.Despite the potential for interesting applications invehicle networks,thereare still unresolved issues that have the potential to hinder bandwidth utilization once deployed. Specifically, insider assaults on VANET platforms such as Blackhole attemptscan completely stop vehicle-to-vehicle communications and impair the networks' performance level. In this study, we provide the blockchain-based decentralized trust scoring architecture for the participants in the network to identify existing and blacklisted insider adversaries in VANET. To address this concern, we suggest a two-level detection technique, in the first level neighboring nodes determine theirtrustworthiness and in the second level it aggregates trust scores for vehicle nodes using a consortium blockchain-based mechanism that uses authorized Road Side Units (RSUs) as consensus mechanism. The blacklisted node records are then periodically changed based on the trust scores supplied by the nearby nodes. In regards to the practical scope of the network, the experimental study demonstrates that the suggested solution is effective and sustainable. To improve packet delivery ratio and vehicle node security in the VANET, the blockchain-based Trust-LEACH routing technique has also been created. The performance analysis has been carried out for Computational cost analysis, Computational time for block creation, Network analysis, SecurityAnalysis, and MITM attack analysis. Additionally, we provide proof that the suggested approach enhances VANET reliability by thwarting and removing insider threat initiation nodes from its blacklist.
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONSIJCNCJournal
The VANET has seen a boom in the distribution of significant source data,enabling connected vehicle
communications to enhance roadway safety.Despite the potential for interesting applications invehicle
networks,thereare still unresolved issues that have the potential to hinder bandwidth utilization once
deployed. Specifically, insider assaults on VANET platforms such as Blackhole attemptscan completely
stop vehicle-to-vehicle communications and impair the networks' performance level. In this study, we
provide the blockchain-based decentralized trust scoring architecture for the participants in the network to
identify existing and blacklisted insider adversaries in VANET. To address this concern, we suggest a twolevel detection technique, in the first level neighboring nodes determine theirtrustworthiness and in the
second level it aggregates trust scores for vehicle nodes using a consortium blockchain-based mechanism
that uses authorized Road Side Units (RSUs) as consensus mechanism. The blacklisted node records are
then periodically changed based on the trust scores supplied by the nearby nodes. In regards to the
practical scope of the network, the experimental study demonstrates that the suggested solution is effective
and sustainable. To improve packet delivery ratio and vehicle node security in the VANET, the blockchainbased Trust-LEACH routing technique has also been created. The performance analysis has been carried
out for Computational cost analysis, Computational time for block creation, Network analysis,
SecurityAnalysis, and MITM attack analysis. Additionally, we provide proof that the suggested approach
enhances VANET reliability by thwarting and removing insider threat initiation nodes from its blacklist.
IRJET - Automobile Black Box System for Vehicle Accident AnalysisIRJET Journal
This document summarizes research on using an automobile black box system to analyze vehicle accidents. It proposes using sensors like temperature, humidity, and gas sensors mounted on a Raspberry Pi 3 to continuously monitor vehicle and driver conditions. Video and location data would also be collected from external cameras and GPS. All sensor data would be stored on an SD card for retrieval after an accident occurs. The goal is to analyze accidents more accurately by objectively recording what happened leading up to the accident. This could help prevent future accidents by identifying risky driver behaviors from the collected data.
Satellite communication provides a secure and reliable solution for connected vehicles. It offers several key benefits:
High security due to fewer entry points than terrestrial networks. Updates can be distributed securely via private satellite broadcast networks.
Global coverage allows vehicles to be updated anywhere instantly and reliably without terrestrial dependencies. The network can scale globally as needed.
Comprehensive security programs throughout development and operation, including reducing attack surfaces, authentication, monitoring for threats, and fast global remediation for any issues discovered help ensure safety.
Vehicular ad hoc network is one of the most interesting research areas due to flexibility, low cost, high sensing fidelity, fault tolerance, creating many new and exciting application areas for remote sensing. So, it has emerged as a promising tool for monitoring the physical world with wireless sensor that can sense, process and communicate. Being ad-hoc in nature, VANET is a type of networks that is created from the concept of establishing a network of cars for a specific need or situation. VANETs have now been established as reliable networks that vehicles use for communication purpose on highways or urban environments. VANET considered as a distinct type of Mobile Ad Hoc Networks holds the opportunity to make peoples life and death decisions by predicting and helping the drivers and other people about the road safety and other critical conditions.
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehicles’ identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehicles’ identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
LSKA-ID: A lightweight security and key agreement protocol based on an identi...TELKOMNIKA JOURNAL
Recently, a huge effort has been pushed to the wireless broadcasting nature in the open area. However, the vehicular ad hoc network (VANET) is disposed to various kinds of attacks. Hence, keeping the security in VANET is the most critical issue because of the VANET network related to human life. Thus, we propose a robust and lightweight security and key agreement-based identity protocol LSKA-ID for vehicular communication. Our protocol utilizes the elliptic curve cryptography, Chinese reminder theorem, and identity (ID)-based cryptosystem to resolve the issues found in the previously proposed schemes, in which our protocol can resolve the key escrow issues accompanied in most ID-based schemes. Also, it does not need batch verification operations, which cause some problems to the verifier in case the batch beacons have one or more illegal beacons. Moreover, the LSKA-ID protocol addresses the dependency on the trusted authority (TA) during the high frequent handover between the groups that may cause a bottleneck problem on the TA. The security analysis proves the correctness of the LSKA-ID protocol by using the random oracle model and has shown to be effective in a performance evaluation.
IRJET- Smart Contracts for Insurance based on Hyperledger FabricIRJET Journal
The document proposes a blockchain-based smart contract system for insurance using Hyperledger Fabric to increase transparency and trust between customers and insurers. It involves three main participants (peers)- the customer, insurer, and auditor. The system would include a mobile app for customers and a web console for insurers and auditors to automate processes like claims handling and make fraud detection easier through the distributed ledger.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Brisk and secure ad hoc vehicular communicationeSAT Journals
Abstract The idea of Car-to-Car communication is a revolutionary phenomenon in the automobile industry. This idea will surely change the future of humanity for good. This technology will surely change the perception of how a traditional automotive was initially thought of by adding endless applications as a boon to mankind. The application of cars communicating with each other is enormous and has already been discussed by many researchers by now. But, the important thing here is how to put it in practice with the increasing demand for cars and making it safe to use it, at least improve the current condition by this new technology and not worsen the situation by digital hacking and other flaws. Since the nature of the Communication System is highly dynamic a strict security mechanism is mandatory for its seamless functioning. We propose to encrypt the communication taking place in C2C communication which is not the same as using the Internet security mechanism due to limitation of its speed and residing hardware servers. Symmetric Cryptography thus fails to incorporate the scope of various security disciplines and hence it is ineffective to use such techniques. Asymmetric Cryptography on the other hand provides an ideal trade-off among various security disciplines and hence it is considered as an alternative approach to accomplish a secure system but it fails when applied in an ad-hoc environment. However, the traditional Public Key Infrastructure (PKI) technique fails in several ways so we propose a modified form of communication and authentication technique along with rapid communication and group messages to fasten the speed of communication. Keywords: Protocol, Communication, Security, Privacy
This document proposes a service-oriented security framework called VCC-SSF for vehicular cloud computing environments. The framework has three layers: a core technology layer handling vehicle-to-everything communication and cloud computing, a security layer providing authentication, encryption, access control and privacy protection, and an application service layer offering payment and accident management services. The payment service allows automatic payment for goods inside the vehicle. The accident management service works to prevent accidents, respond to accidents that occur, and manage vehicles involved in accidents. The framework aims to address security threats in vehicular cloud computing while providing convenient user-oriented services.
Secure and Transparent Insurance Application using Blockchain TechnologyIRJET Journal
This document proposes using a permissioned blockchain network with four peer nodes (insurance, police, shop, and repair) to securely and transparently handle insurance applications and claims. Smart contracts written in Go would be used on the Hyperledger Fabric blockchain to automate insurance processes. This would make the system faster, more secure against fraud, and provide transparency by immutably recording transactions on the distributed ledger. The blockchain approach could reduce insurance costs and improve customer satisfaction compared to traditional centralized insurance systems.
ACPN: A Novel Authentication Framework with Conditional Privacy-Preservation ...Nexgen Technology
This document describes several final year IEEE projects from Nexgen Technology for 2015-2016. The first project is called ACPN and proposes a novel authentication framework for VANETs that provides conditional privacy preservation and non-repudiation. It introduces public key cryptography to pseudonym generation to allow third parties to verify vehicle identities while preserving privacy through authentication using self-generated pseudonyms. Identification-based signature and identification-based online/offline signature schemes are used for authentication between vehicles and roadside units and among vehicles respectively. Analysis and evaluation show ACPN meets authentication, privacy, non-repudiation and performance objectives for VANETs.
This document describes an IEEE final year project titled "A Novel Authentication Framework with Conditional Privacy-Preservation and Non-Repudiation for VANETs". The project proposes a framework called ACPN that introduces public-key cryptography to pseudonym generation, allowing legitimate third parties to verify vehicle identities while preserving privacy. Vehicles use self-generated pseudonyms as identifiers for authentication between roadside units and other vehicles. ACPN aims to achieve authentication, privacy preservation, and non-repudiation in Vehicular Ad Hoc Networks. Performance evaluation shows the framework is feasible and efficient for use in VANET environments.
Patents are a good information resource for obtaining IoT (Internet of Things) technology development status. Followings illustrate some examples of patents that provide current status of the IoT connected car technology development: safety/collision avoidance, traffic information for smart driving, connected car security, infotainment and self-driving car monitoring.
SOTM : A Self Organized Trust Management System for VANET csandit
Security and trust management in Vehicular Adhoc NETworks (VANET) is a crucial research domain
which is the scope of many researches and domains. Although, the majority of the proposed trust
management systems for VANET are based on specific road infrastructure, which may not be present in all
the roads. Therefore, road security should be managed by vehicles themselves. In this paper, we propose a
new Self Organized Trust Management system (SOTM). This system has the responsibility to cut with the
spread of false warnings in the network through four principal components: cooperation, trust
management, communication and security.
SOTM: A SELF ORGANIZED TRUST MANAGEMENT SYSTEM FOR VANET cscpconf
Security and trust management in Vehicular Adhoc NETworks (VANET) is a crucial research domain which is the scope of many researches and domains. Although, the majority of the proposed trust management systems for VANET are based on specific road infrastructure, which may not be present in all the roads. Therefore, road security should be managed by vehicles themselves. In this paper, we propose a new Self Organized Trust Management system (SOTM). This system has the responsibility to cut with the spread of false warnings in the network through four principal components: cooperation, trust management, communication and security.
Similar to A TIERED BLOCKCHAIN FRAMEWORK FOR VEHICULAR FORENSICS (20)
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...Transcat
Join us for this solutions-based webinar on the tools and techniques for commissioning and maintaining PV Systems. In this session, we'll review the process of building and maintaining a solar array, starting with installation and commissioning, then reviewing operations and maintenance of the system. This course will review insulation resistance testing, I-V curve testing, earth-bond continuity, ground resistance testing, performance tests, visual inspections, ground and arc fault testing procedures, and power quality analysis.
Fluke Solar Application Specialist Will White is presenting on this engaging topic:
Will has worked in the renewable energy industry since 2005, first as an installer for a small east coast solar integrator before adding sales, design, and project management to his skillset. In 2022, Will joined Fluke as a solar application specialist, where he supports their renewable energy testing equipment like IV-curve tracers, electrical meters, and thermal imaging cameras. Experienced in wind power, solar thermal, energy storage, and all scales of PV, Will has primarily focused on residential and small commercial systems. He is passionate about implementing high-quality, code-compliant installation techniques.
Digital Twins Computer Networking Paper Presentation.pptxaryanpankaj78
A Digital Twin in computer networking is a virtual representation of a physical network, used to simulate, analyze, and optimize network performance and reliability. It leverages real-time data to enhance network management, predict issues, and improve decision-making processes.
Open Channel Flow: fluid flow with a free surfaceIndrajeet sahu
Open Channel Flow: This topic focuses on fluid flow with a free surface, such as in rivers, canals, and drainage ditches. Key concepts include the classification of flow types (steady vs. unsteady, uniform vs. non-uniform), hydraulic radius, flow resistance, Manning's equation, critical flow conditions, and energy and momentum principles. It also covers flow measurement techniques, gradually varied flow analysis, and the design of open channels. Understanding these principles is vital for effective water resource management and engineering applications.
Mechatronics is a multidisciplinary field that refers to the skill sets needed in the contemporary, advanced automated manufacturing industry. At the intersection of mechanics, electronics, and computing, mechatronics specialists create simpler, smarter systems. Mechatronics is an essential foundation for the expected growth in automation and manufacturing.
Mechatronics deals with robotics, control systems, and electro-mechanical systems.
Software Engineering and Project Management - Software Testing + Agile Method...Prakhyath Rai
Software Testing: A Strategic Approach to Software Testing, Strategic Issues, Test Strategies for Conventional Software, Test Strategies for Object -Oriented Software, Validation Testing, System Testing, The Art of Debugging.
Agile Methodology: Before Agile – Waterfall, Agile Development.
Accident detection system project report.pdfKamal Acharya
The Rapid growth of technology and infrastructure has made our lives easier. The
advent of technology has also increased the traffic hazards and the road accidents take place
frequently which causes huge loss of life and property because of the poor emergency facilities.
Many lives could have been saved if emergency service could get accident information and
reach in time. Our project will provide an optimum solution to this draw back. A piezo electric
sensor can be used as a crash or rollover detector of the vehicle during and after a crash. With
signals from a piezo electric sensor, a severe accident can be recognized. According to this
project when a vehicle meets with an accident immediately piezo electric sensor will detect the
signal or if a car rolls over. Then with the help of GSM module and GPS module, the location
will be sent to the emergency contact. Then after conforming the location necessary action will
be taken. If the person meets with a small accident or if there is no serious threat to anyone’s
life, then the alert message can be terminated by the driver by a switch provided in order to
avoid wasting the valuable time of the medical rescue team.
Discover the latest insights on Data Driven Maintenance with our comprehensive webinar presentation. Learn about traditional maintenance challenges, the right approach to utilizing data, and the benefits of adopting a Data Driven Maintenance strategy. Explore real-world examples, industry best practices, and innovative solutions like FMECA and the D3M model. This presentation, led by expert Jules Oudmans, is essential for asset owners looking to optimize their maintenance processes and leverage digital technologies for improved efficiency and performance. Download now to stay ahead in the evolving maintenance landscape.
A TIERED BLOCKCHAIN FRAMEWORK FOR VEHICULAR FORENSICS
1. International Journal of Network Security & Its Applications (IJNSA) Vol. 10, No.5, September 2018
DOI: 10.5121/ijnsa.2018.10503 25
A TIERED BLOCKCHAIN FRAMEWORK FOR
VEHICULAR FORENSICS
Marcel C. Ugwu1
, Izunna U. Okpala2
and Collins I. Oham3
, Cosmas I.
Nwakanma3
1
Seamfix Nigeria Limited, Lagos, Nigeria
2
Department of Communication Arts,
National Institute for Nigerian Languages, Aba, Abia, Nigeria
3
Department of Information Management Technology,
Federal University of Technology, Owerri. Nigeria
ABSTRACT
In this paper, we present a tiered vehicular forensics framework based on permission BlockChain. We
integrate all entities involved in the forensics process and record their interactions in the BlockChain to
generate comprehensive evidence for settling disputes and appropriating blame. We incorporate a
watchdog entity in our tiered framework to prevent collusive tendencies of potentiality liable entities and
to prevent exploitation of evidence. Also, we incorporate a state mechanism to prove the state of a smart
vehicle when an accident occurs. Furthermore, we conduct a security analysis to demonstrate the
resilience of our framework against identified attacks and describe security mechanisms used to achieve
key requirements for vehicular forensics. Finally, we comparatively evaluate our framework against
existing proposals.
KEYWORDS
BlockChain, Smart Vehicles, Dispute settlement, Vehicular forensics
1. MOTIVATION AND INTRODUCTION
The existing liability attribution model is not well-adapted for the anticipated smart vehicles. This
is because compared to modern day vehicles where blame is significantly attributed to the driver
when an accident occurs, smart vehicles are equipped with sensors which facilitate independent
decision making and therefore underpin a new liability model where blame is also attributed to
entities responsible for keeping the vehicle operator such as the vehicle manufacturer, auto-
technician and vehicle owner. Given the possibility to share blame among multiple entities and
the possibility to remotely interact with the smart vehicle, these entities become motivated to
execute rogue actions to evade liability. A solution to mitigate this possibility must keep track of
the interactions between potentially liable entities in a way that an executed action cannot be
repudiated and ensure that data emanating from a vehicle in the event of an accident must be
reliable for making liability decisions and to facilitate the vehicular forensics process.
Previous proposals that address vehicular forensics has relied on eyewitness accounts [1], data
recorded in the vehicle’s black box [2] and centralized storage of evidence [3].
However, several challenges remain open for smart vehicles including (1) that eye witnesses
accounts are hardly reliable for making liability decisions [4], (2) vehicle’s black box data only
describes the state of the vehicle when the accident occurs and not sufficient for making liability
2. International Journal of Network Security & Its Applications (IJNSA) Vol. 10, No.5, September 2018
26
decisions involving multiple potential liable entities [5] and evidence required for vehicular
forensics are stored in centralized servers that are susceptible to a single point of failure [6].
Block Chain [7], a distributed and decentralized ledger technology first proposed by Satoshi
Nakamoto is perceived to possess salient features such as immutability, security, privacy, and
undeniability. These features make it a veritable technology to address the aforementioned
problems.
BlockChain could be public or permissioned [8] and this classification is based on the capabilities
of users in the BlockChain network. While public BlockChain permits wide entry and allows
every user to distributedly manage the BlockChain network, permissioned BlockChain restricts
BlockChain participation to invited members and restricts the management of the BlockChain
network to selected network members. Also, compared to public BlockChain, permissioned
BlockChain users are known. Given the requirement to keep track of interaction between
potential liable entities and appropriate blame to a known entity, we propose a permissioned
BlockChain framework for vehicular forensics and liability attribution.
The main contributions of our paper are itemized below:
- We present a tiered vehicular forensics framework for smart vehicles based on
permission BlockChain. We demonstrate the efficacy of our proposal via a practical
use case scenario.
- We introduce a watchdog entity in our framework to prevent evidence tampering and
propose a state mechanism to prove the state of a smart vehicle in event of an
accident.
- We conduct a security analysis to demonstrate the resilience of our proposed
framework against selected attacks and highlight how key requirements for vehicular
forensics are met.
- We comparatively evaluate our proposal against existing BlockChain based proposals
for vehicular forensics.
The rest of the paper is organized as follows. We present a review of previous works on vehicular
forensics in Section 2. In Section 3, we describe the proposed Block Chain based framework for
vehicular forensics and present a use case scenario to demonstrate the efficacy of our proposal. In
Section 4, we discuss the security of our proposed framework and comparatively evaluate it
against existing Block Chain based framework for vehicular forensics. Section 5 concludes the
paper and outlines our future work.
2. RELATED WORKS
In this section, we provide a critical review of already proposed works on vehicular forensics. We
describe the works that highlight problems of previous work described in Section 1 and we
describe proposed work on vehicular forensics using BlockChain.
2.1. EYE WITNESS ACCOUNT, VEHICLE’S BLACKBOX AND CENTRALIZED STORAGE
The author in [3] proposed an evidence generation protocol to facilitate vehicular forensics.
However, the proposed solution relies significantly on the availability of witnesses that are not
guaranteed to be available. The authors in [9, 10] proposed a vehicular forensic solution that
3. International Journal of Network Security & Its Applications (IJNSA) Vol. 10, No.5, September 2018
27
relies on the data generated by the vehicle and stored in its black box when an accident occurs.
While data stored in a vehicle’s black box only presents partial information for liability decision
making, we also argue that given the exposure of the vehicle to the internet a rogue entity in the
liability model such as a vehicle manufacturer could remotely exploit the data stored in the black
box to deny its complicity in the accident. Furthermore, evidence generated are stored in different
central servers which pose a single point of failure challenge [6].
2.2. BLOCKCHAIN BASED SOLUTIONS FOR VEHICULAR FORENSICS
The author in [11] proposed Block4Forensic, a BlockChain based vehicular forensic solution for
smart vehicles. However, in their work they neither considered the reliability of messages
generated by a smart vehicle nor did they consider that liable validators could execute malicious
actions to deny their complicity in event of an accident. The author in proposed a BlockChain
based liability attribution solution for autonomous vehicles. While their proposal represents an
improvement of Block4Forensics [11], they also did not consider the reliability of messages
generated by an autonomous vehicle also, their solution is vulnerable to sophisticated collusion
attacks where rogue validators could collaborate to exploit the validation process.
3. BLOCKCHAIN BASED FRAMEWORK FOR VEHICULAR FORENSICS
In this section, we describe the proposed BlockChain based framework for vehicular forensics.
We begin by identifying the components of the proposed framework. Following this, we present a
use case that shows the efficacy of our proposed Blockchain solution for vehicular forensics.
3.1. COMPONENTS OF BLOCKCHAIN FRAMEWORK
In this section, we describe the components of our proposed architecture. The components of our
architecture are classified as interacting entities and transactions. We provide a detailed
description of these components below.
3.1.1 INTERACTING ENTITIES
The interacting entities in our proposed framework include smart vehicles, auto-technicians,
smart vehicle manufacturers, insurance provider, law enforcement, transport authority, and
roadside units. Their roles are described as follows:
SMART VEHICLES: They generate data as evidence to facilitate the vehicular forensics process.
We assume that smart vehicles possess a tamper-proof device for storing accident-related data
and security credentials. For communication of accident related data, we also assume that smart
vehicles possess 5G technology [12] for the swift communication of accident-related data to
relevant authorities.
AUTO-TECHNICIANS: The auto technicians are responsible for providing maintenance service for
smart vehicles. They generate a report after their action on the vehicle as a proof of their
interaction with the vehicles.
VEHICLE MANUFACTURERS: Vehicle manufacturers periodically receive sensor data information
from smart vehicles and provide updates for smart vehicle sensors when necessary.
INSURANCE PROVIDER: Insurance companies receive data from smart vehicles when an accident-
related event occurs for attributing liability. The insurance company also receives complimentary
evidence from legal and transport authorities to facilitate liability attribution.
4. International Journal of Network Security & Its Applications (IJNSA) Vol. 10, No.5, September 2018
28
LAW ENFORCEMENT: Law enforcement authorities include police and law courts who use
evidence received to make dispute settlement decisions. The law enforcement authorities also
provide supporting or complimentary evidence to insurance companies for liability attribution.
TRANSPORT AUTHORITY: The transport authority issues communication credentials to vehicles
in a given region for vehicular communication. Vehicular communication involves the interaction
between vehicles (vehicle-to-vehicle) and the interaction between smart vehicles and roadside
units (v2R). The transport authority is responsible for the management of road side units.
ROADSIDE UNITS: For vehicular forensics, we consider roadside units as witnesses that record
accident related events in their line-of-sight and receives accident related data from vehicles that
witness the collision event. The roadside unit also contains a tamper-proof device for storing
cryptographic secrets for vehicular communication and communication with the transport
authority.
The communication between interacting entities occurs either as a direct communication or a
Block chain communication. Direct communication in our architecture occurs as a point-to-point
communication between two interacting entities. The interaction between operational smart
vehicles, between a smart vehicle and a roadside unit or the interaction between a road side unit
and a transport authority, is classified as a direct communication. Communication described in
the above scenarios is facilitated by the transport authority who provides communication
credentials to smart vehicles during their initial registration and the road side units when installed
on the roads. For this communication, we use a public key infrastructure where the transport
authority is the certified authority and provides digital identities to communicating entities to
facilitate authorized and authenticated communications.
Block Chain communication, on the other hand, occurs in two-tiers to facilitate the
communication of relevant data in each block chain tier. In the first tier, interacting entities
exchange relevant information needed to facilitate the forensics process and make liability
decisions. In the second tier, information exchanges in the first tier are analyzed and used for
making liability decisions. The roles of interacting entities in both tiers are classified as senders,
validators, and monitor. The senders are entities that send data to a Block chain network while
validators validate data sent by senders. In the first tier, interacting entities include the smart
vehicles, smart vehicle manufacturers, auto-technicians, law enforcement authorities and
insurance companies. In the second tier, interacting entities include the insurance companies,
smart vehicle manufacturers,
Transport authorities and law enforcement authorities. The senders in the first tier include the
smart vehicle, auto-technician and the vehicle manufacturer. The validators include the vehicle
manufacturer, insurance companies and the auto-technicians. The law enforcement authority acts
as a monitoring entity in tier-1 that keeps track of changes in the state of tier-1 Block Chain. In
the second tier, the senders are the insurance companies and the smart vehicle manufacturers
while the validators are the law enforcement authority and the transport authority.
We present our proposed Block Chain based framework for vehicular forensics in Figure 1 which
describes the interaction between entities in our framework.
5. International Journal of Network Security & Its Applications (IJNSA) Vol. 10, No.5, September 2018
29
Figure 1. Proposed Block Chain Based Framework
For Block Chain communication, a membership service provider like the certified authority in
public key infrastructure provides unique communication credentials including certificates for
Block Chain communications to all interacting entities. The verification certificate of the
membership service provider (VC) is however stored in the genesis block which initiates the
Block Chain. The verification certificate is used by validators to authenticate Block Chain
communications. Smart vehicles are envisaged to generate tons of personally identifiable data
thus privacy preservation of vehicle owner is paramount in the proposed framework. For this, we
assume that the membership service provider issues pseudonyms to smart vehicles which allow
them to use unique keys for every Block Chain communication. In the next section, we describe
the communications in our proposed framework.
3.1.2 TRANSACTIONS
We refer to communication exchanges between interacting entities in the Block Chain as
transactions. The transactions considered in our framework ensures that all interactions
contributing to evidence for dispute settlement are stored in the Block Chain. Given that all data
contributing to evidence are generated in tier-1, the interactions between potentially liable
entities occur in the tier-1 request for more evidence is made in tier-2, we classify transactions in
our framework as evidence and request transactions.
EVIDENCE TRANSACTION: The evidence transactions considered in our framework include data
generated when an accident occurs, interactions between potentially liable entities such as the
interaction between a vehicle manufacturer and a smart vehicle or interaction between an auto-
technician and a smart vehicle. To ensure that data generated by a smart vehicle is reliable for
making liability decisions, we assume that the vehicle manufacturer locally stores the hash values
of all sensors in a smart vehicle and stores the cumulative hash of these sensors in the first tier
Block Chain to reflect the state of the Block Chain when manufactured. Post-manufacture
interactions with other potential liable tier -1 entity as the smart vehicle becomes operational such
as the notifications from a vehicle manufacturer to execute an update on a sensor or the execution
of an action that changes the state of a sensor by an auto-technician are recorded in the Block
Chain and updates the cumulative hash value of sensors. In the event of an accident, as part of the
forensic process, to retrieve complementary evidence on the state of the smart vehicle, the current
state of the vehicle is retrieved by extracting the current firmware image from the smart vehicle
sensors and computing the cumulative hash value of all sensors. The computed value is then
comparatively evaluated against the supposed state in the Block Chain.
6. International Journal of Network Security & Its Applications (IJNSA) Vol. 10, No.5, September 2018
30
Figure 2. Single-sign Evidence Transaction Structure.
Evidence transactions could be single-signed transactions or MultiSig transactions signed by
multiple interacting entities. Data generated by a smart vehicle when an accident occurs are single
signed and data generated by a tier-1 entity interacting with the smart vehicle such as a vehicle
manufacturer and auto-technician are signed by both the data generator and the smart vehicle.
Figure 2 describes the structure of a single sign evidence transaction generated by a smart vehicle
when an accident occurs. The Transaction identifier is the hash of the transaction contained in the
transaction. The Time stamp is the event time of occurrence. The Transaction data contains the
data generated by the smart vehicle when the event occurred. It includes the speed of the vehicle,
smart vehicle location, and encrypted witness accounts such as those from neighboring vehicles
where the accident occurred or from the road side units. SignatureSV is the signature of the smart
vehicle that generated the transaction. Once generated, the data is sent to the tier-1 validators for
verification and validation of the transaction. In contrast to the vehicle generated by a smart
vehicle when an accident occurs, transactions generated by a vehicle manufacturer and sent to the
smart vehicle also include the signature of the vehicle manufacturer and a metadata field which
describes the details of the interaction between the vehicle manufacturer and the smart vehicle.
REQUEST TRANSACTION: The request transaction is a transaction initiated by an insurance
company to the tier-2 validators to obtain complimentary evidence such as the decrypted accounts
of witnesses to facilitate liability decisions. It is a single sign transaction that includes the
transaction data contained in the evidence transaction sent by a smart vehicle in the event of an
accident and the signature of the insurance company.
3.2. USE CASE SCENARIO
In this section, we present a use case that describes the efficacy of our proposed framework as a
veritable solution for vehicular forensics for smart vehicles. In this use case, we assume that a
smart vehicle is involved in a stationary collision in the presence of two operational vehicles
called witnesses. Upon colliding with a stationary object, the smart vehicle generates the evidence
transaction and stores the perception of the witnesses and sends the transaction to the tier-1
validators. Once received by tier-1 validators, the validators verify the authenticity of the smart
vehicle and upon a successful verification, the validators validate the transaction and reach
consensus on the state of the current block as described in [5] by computing the hash of the block
when a transaction is added to the block until the block reaches maximum capacity. At this point,
it is appended to the BlockChain. After a successful validation of the transaction, the insurance
company sends a request transaction to the tier-2 validators. Upon receipt of the transaction, the
transport authority retrieves the transaction data contained to retrieve the time of event and
location of event. Once retrieved, it queries road side units in the location if available for
supporting evidence, once retrieved, it collaborates with the law enforcement authority to decrypt
the encrypted accounts of users in the transaction data sent by the insurance company. Once
decrypted, the law enforcement authority and transport authority cross validate all presented
evidence including the evidence retrieved from the road side units. After the cross-validation
exercise, they present the complimentary evidence to the insurance company to finalise liability
attribution. If a faulty sensor is deemed responsible for the accident, the forensic process would
also include the extraction of the firmware of the sensors in the smart vehicle and the computation
7. International Journal of Network Security & Its Applications (IJNSA) Vol. 10, No.5, September 2018
31
of the cumulative hash value of the sensors in the vehicle, if the cumulative value is same as the
value in the BlockChain, the vehicle manufacturer or auto-technician is blamed for the accident
based on what actor last acted on the faulty sensor. This is achieved by going through all MultiSig
transactions stored on the tier-1 BlockChain to identify what actor last influenced the state of the
faulty sensor. If the value differs, the smart vehicle owner is blamed for its action on the sensor.
4. EVALUATION AND DISCUSSION
4.1. SECURITY ANALYSIS
In this section, we discuss and evaluate the security of our proposed framework. We also
comparatively evaluate the framework against proposed Block Chain based architecture for
vehicle forensics. We begin by describing the mechanisms that allow our framework meet
identified requirements.
INTEGRITY: Each transaction includes the hash of every other field contained in the transaction.
NON-REPUDIATION: Transactions communicated in each Block Chain tier is authenticated and
stored in the Block Chain where no entity can repudiate their action.
COMPREHENSIVE EVIDENCE: By keeping track of the interactions between liable entities and the
interaction between a smart vehicle and witnesses, we offer comprehensive evidence to facilitate
the process of liability attribution.
Next, we demonstrate the resilience of our proposed framework to selected attacks. The following
attacks have been identified in our framework and we describe how we prevent them in our
proposed framework.
ALTERATION OF EVIDENCE: An evidence submitted in tier-1 is validated and stored in the
current block of transactions. However, because the evidence is not yet appended to the Block
Chain, a rogue validator such as a vehicle manufacturer or auto-technician could Tamper
evidence if it senses that it could be liable for the accident. This possibility would disrupt the
consensus process as tier-1 validators would find it difficult to reach consensus on the current
state of the block. We prevent this possibility in our framework by allowing the law enforcement
authority record validation process outputs which could be used to prevent rogue tendencies from
potential liable validators. Also, by cross validating evidence generated from witnesses, our
framework is able to identify cases of evidence alteration.
SENSOR ALTERATION: A smart vehicle owner could conduct or permit the conduct of a chip
tuning attack as described in [13] for his gains by altering a sensor in his vehicle. Also, a vehicle
manufacturer or auto-technician could remotely exploit a sensor in the smart vehicle to evade
liability. In our framework, we prevent this attack from the owner’s exploit by keeping track of
the changes in the state of the smart vehicle’s sensors and recording changes in our immutable
Block Chain. If the value in the Block Chain differs from the computed value of the current state
of the vehicle when an accident occurs, the smart vehicle owner is blamed for its action on the
vehicle. From the vehicle manufacturer and auto -technician’s point of view, their interaction
with the vehicle is also acknowledged by the vehicle owner and recorded in the Block Chain.
COLLUSION: A smart vehicle owner could collude with its vehicle manufacturer in the event of a
multiple collision to generate false and misleading information to deny complicity. For this to be
possible, the vehicle manufacturer with the permission of the smart vehicle owner would
remotely exploit an evidence generating sensor. In our framework, we argue that there is no
8. International Journal of Network Security & Its Applications (IJNSA) Vol. 10, No.5, September 2018
32
incentive for the smart vehicle owner to collude with its vehicle manufacturer due to the
following reasons:
- When data from the vehicle is cross verified against other accounts from vehicles or
roadside units, the discrepancies in reports would be identified; and
- If after the cross-verification exercise and the vehicle is deemed liable due to a faulty
sensor. The feedback is sent to the insurance company whose adjuster along sides forensic
investigators computes and compares the cumulative hash values of the sensors in vehicle
with the state of the vehicle in the Block Chain. As stated in Section 3.2, if the value
differs, the vehicle owner is blamed.
4.2. COMPARATIVE EVALUATION
In this section, we compare our proposed framework to Block4Forensic [11] and the proposed
BlockChain based framework in [5] for dispute settlement and liability attribution. Table 1.0
presents the comparative analysis and reflects the strength of our proposed framework to existing
BlockChain based framework for dispute settlement.
Table 1. Comparative Evaluation of our Framework against existing BlockChain Architectures
Evaluation criteria Our proposal Block4Forensics [11] Proposed BlockChain
framework [5]
Proof of vehicle state By storing the state of
smart vehicle sensors on
the BlockChain, we prove
the state of the sensors in
a smart vehicle and
identify cases of sensor
exploitation.
Not possible. Not possible.
Proof of interaction By keeping track of the
interactions between
liable entities and storing
it on the BlockChain, we
identify a case of
instruction negligence.
Not possible Possible
Proof of BlockChain
state
The monitoring entity in
tier-1 BlockChain, also
keeps track of changes of
the state of the
BlockChain after a
successfulvalidation. This
possibility makes it
difficult for colluding
entities to exploit the state
of the BlockChain.
Not applicable Partially possible.
5. CONCLUSIONS
In this paper, we present a tiered Block Chain based framework for vehicular forensics. We
introduce a watchdog entity in our proposed framework to prevent the possibility of evidence
alteration and state management mechanism that ensures all changes in the state of the smart
vehicle is recorded in the Block Chain to prevent unauthorized vehicle sensor tampering. We
present a use case to demonstrate the strength of our proposed framework and conduct security
analysis to demonstrate the resilience of our framework against identified attacks. Furthermore,
9. International Journal of Network Security & Its Applications (IJNSA) Vol. 10, No.5, September 2018
33
via comparative analysis, we demonstrate the strength of our proposed framework against
existing Block Chain based frameworks. In the future, we will develop a prototype
implementation of our proposed framework to understand its performance in real-world scenario.
REFERENCES
[1] C. P. Young, B. R. Chang, J.J. Lin and R. Y. Fang, Cooperative Collision Warning Based Highway
Vehicle Accident Reconstruction. Eight International Conference on Intelligent Systems Design and
Applications. 2008.
[2] C. Anderson, and D. Robbins, Toyota secretive on blackbox data. Also available on:
http://www.drive.com.au/motor-news/toyotasecretiveon-black-box-data-20100305-14bi0.html March
2010.
[3] J. Fuentes, A. Tablas, A. Ribagorda, Witness-based Evidence Generation in Vehicular Ad-hoc
Networks. ESCAR, 2009.
[4] S. Rahman and U. Hengartner, Secure Crash Reporting in Vehicular Adhoc Networks. University of
Waterloo, 2017.
[5] C. Oham, S. S. Kanhere, R. Jurdak and S. Jha, A Blockchain Based Liability Attribution Framework
for Autonomous Vehicles. Also available on: https://arxiv.org/abs/1802.05050
[6] Z. Liu, J. Ma, Z. Jiang, H. Zhu and Y. Miao, LSOT: A Lightweight Self-Organized Trust Model in
VANETs. Mobile Information Systems, 2016.
[7] S. Nakamoto, Bitcoin: A peer-to-peer electronic cash system. 2008.
[8] A. Kulkarni, How to Choose Between Public and Permissioned Blockchain For Your Project. Also
available on: https://blog.chronicled.com/how-to-choose-between-public-andpermissioned-
blockchain-for-your-project-3c5d4796e3c8
[9] Y. Kopylova, C. Farkas, and W. Xu, Accurate Accident Reconstruction in VANET. Data and
Applications Security and Privacy XXV. Springer Berlin Heidelberg, 2011. 271-279.
[10] Richard Boon, Post-accident Analysis of Digital Sources for Traffic Accidents. 21st Twente Student
Conference on IT, June 23rd, 2014, Enschede, The Netherlands.
[11] M. Cebe, E. Erdin, K. Akkaya, H. Aksu and S. Uluagac, Block4Forensic: An Integrated Lightweight
Blockchain Framework for Forensics Applications of Connected Vehicles. Also available at:
https://arxiv.org/pdf/1802.00561.pdf 2018.
[12] L. Nkenyereye, J. Kwon and Y. Choi, Secure and Lightweight Cloud-Assisted Video Reporting
Protocol over 5G-Enabled Vehicular Networks.Sensors, MDPI 2017.
[13] A. Wasicek and A. Weimerskirch, Recognizing Manipulated Electronic Control Units. 2014.
10. International Journal of Network Security & Its Applications (IJNSA) Vol. 10, No.5, September 2018
34
AUTHORS
Marcel Ugwu is a software engineer by profession and holds a First Class Bachelor's
degree in Information Technology from Federal University of Technology Owerri.
Marcel works as a tech lead at Seamfix where he leads a development team, architect and
drive software development. He loves to write code at least 40% of the time. His current
work is on the application of BlockChain in the vehicular network domain.
Okpala Izunna Udebuana is currently a Graduate Research Assistant in Communication
Arts department of National Institute for Nigerian Languages, Aba, Abia State, Nigeria.
He's an ardent researcher, enterprising software developer passionate about Africa’s Tech
advancement. He does research on Artificial Neural Network, Machine Learning, IOT
and IOE, Blockchain Technology, Natural Language Processing, cyber security,
Computer speech production and recognition, Fuzzy Logic, Data Mining, Decision
Support system and Executive support system
Collins I. Oham is an undergraduate student of the Federal University of Technology,
Owerri, Nigeria. His research interests focus on computer networks and process
optimization. He is currently working on adopting Blockchain as a distributed solution for
trust management in business processed and large scale networks.
Engr. Nwakanma, Ifeanyi Cosmas is a lecturer at the Federal University of Technology,
Owerri Nigeria where he coaches and mentors undergraduate students of the Department
of Information Management Technology. Specifically, he teaches Business
Telecommunication, Data structure and Algorithm, Systems Evaluation and
Implementation, C++ Programming and Introduction to Telecommunication Technology.
He worked for about three years in First bank of Nigeria PLC prior to joining the
lecturing profession Nine years ago (2009). He has a degree in Communication
Engineering, Masters in Information Technology and an MBA in Project Management
Technology. He is about concluding his PhD in Information Management Technology. He has over 25
articles and Conference papers to his credit