scholarly journals Integration of Blockchain with Connected and Autonomous Vehicles: Vision and Challenge

2022 ◽  
Vol 14 (1) ◽  
pp. 1-10
Author(s):  
Tooska Dargahi ◽  
Hossein Ahmadvand ◽  
Mansour Naser Alraja ◽  
Chia-Mu Yu

Connected and Autonomous Vehicles (CAVs) are introduced to improve individuals’ quality of life by offering a wide range of services. They collect a huge amount of data and exchange them with each other and the infrastructure. The collected data usually includes sensitive information about the users and the surrounding environment. Therefore, data security and privacy are among the main challenges in this industry. Blockchain, an emerging distributed ledger, has been considered by the research community as a potential solution for enhancing data security, integrity, and transparency in Intelligent Transportation Systems (ITS). However, despite the emphasis of governments on the transparency of personal data protection practices, CAV stakeholders have not been successful in communicating appropriate information with the end users regarding the procedure of collecting, storing, and processing their personal data, as well as the data ownership. This article provides a vision of the opportunities and challenges of adopting blockchain in ITS from the “data transparency” and “privacy” perspective. The main aim is to answer the following questions: (1) Considering the amount of personal data collected by the CAVs, such as location, how would the integration of blockchain technology affect transparency , fairness , and lawfulness of personal data processing concerning the data subjects (as this is one of the main principles in the existing data protection regulations)? (2) How can the trade-off between transparency and privacy be addressed in blockchain-based ITS use cases?

Author(s):  
Sourav Banerjee ◽  
Debashis Das ◽  
Manju Biswas ◽  
Utpal Biswas

Blockchain-based technology is becoming increasingly popular and is now used to solve a wide range of tasks. And it's not all about cryptocurrencies. Even though it's based on secure technology, a blockchain needs protection as well. The risks of exploits, targeted attacks, or unauthorized access can be mitigated by the instant incident response and system recovery. Blockchain technology relies on a ledger to keep track of all financial transactions. Ordinarily, this kind of master ledger would be a glaring point of vulnerability. Another tenet of security is the chain itself. Configuration flaws, as well as insecure data storage and transfers, may cause leaks of sensitive information. This is even more dangerous when there are centralized components within the platform. In this chapter, the authors will demonstrate where the disadvantages of security and privacy in blockchain are currently and discuss how blockchain technology can improve these disadvantages and outlines the requirements for future solution.


2020 ◽  
Vol 10 (18) ◽  
pp. 6306 ◽  
Author(s):  
Luke Butler ◽  
Tan Yigitcanlar ◽  
Alexander Paz

Transportation disadvantage is about the difficulty accessing mobility services required to complete activities associated with employment, shopping, business, essential needs, and recreation. Technological innovations in the field of smart mobility have been identified as a potential solution to help individuals overcome issues associated with transportation disadvantage. This paper aims to provide a consolidated understanding on how smart mobility innovations can contribute to alleviate transportation disadvantage. A systematic literature review is completed, and a conceptual framework is developed to provide the required information to address transportation disadvantage. The results are categorized under the physical, economic, spatial, temporal, psychological, information, and institutional dimensions of transportation disadvantage. The study findings reveal that: (a) Primary smart mobility innovations identified in the literature are demand responsive transportation, shared transportation, intelligent transportation systems, electric mobility, autonomous vehicles, and Mobility-as-a-Services. (b) Smart mobility innovations could benefit urban areas by improving accessibility, efficiency, coverage, flexibility, safety, and the overall integration of the transportation system. (c) Smart mobility innovations have the potential to contribute to the alleviation of transportation disadvantage. (d) Mobility-as-a-Service has high potential to alleviate transportation disadvantage primarily due to its ability to integrate a wide-range of services.


Electronics ◽  
2020 ◽  
Vol 9 (9) ◽  
pp. 1358 ◽  
Author(s):  
Gyanendra Prasad Joshi ◽  
Eswaran Perumal ◽  
K. Shankar ◽  
Usman Tariq ◽  
Tariq Ahmad ◽  
...  

In recent times, vehicular ad hoc networks (VANET) have become a core part of intelligent transportation systems (ITSs), which aim to achieve continual Internet connectivity among vehicles on the road. The VANET has been used to improve driving safety and construct an ITS in modern cities. However, owing to the wireless characteristics, the message transmitted through the network can be observed, altered, or forged. Since driving safety is a major part of VANET, the security and privacy of these messages must be preserved. Therefore, this paper introduces an efficient privacy-preserving data transmission architecture that makes use of blockchain technology in cluster-based VANET. The cluster-based VANET architecture is used to achieve load balancing and minimize overhead in the network, where the clustering process is performed using the rainfall optimization algorithm (ROA). The ROA-based clustering with blockchain-based data transmission, called a ROAC-B technique, initially clusters the vehicles, and communication takes place via blockchain technology. A sequence of experiments was conducted to ensure the superiority of the ROAC-B technique, and several aspects of the results were considered. The simulation outcome showed that the ROAC-B technique is superior to other techniques in terms of packet delivery ratio (PDR), end to end (ETE) delay, throughput, and cluster size.


Author(s):  
Sourav Banerjee ◽  
Debashis Das ◽  
Manju Biswas ◽  
Utpal Biswas

Blockchain-based technology is becoming increasingly popular and is now used to solve a wide range of tasks. And it's not all about cryptocurrencies. Even though it's based on secure technology, a blockchain needs protection as well. The risks of exploits, targeted attacks, or unauthorized access can be mitigated by the instant incident response and system recovery. Blockchain technology relies on a ledger to keep track of all financial transactions. Ordinarily, this kind of master ledger would be a glaring point of vulnerability. Another tenet of security is the chain itself. Configuration flaws, as well as insecure data storage and transfers, may cause leaks of sensitive information. This is even more dangerous when there are centralized components within the platform. In this chapter, the authors will demonstrate where the disadvantages of security and privacy in blockchain are currently and discuss how blockchain technology can improve these disadvantages and outlines the requirements for future solution.


2021 ◽  
Author(s):  
Shatadru Shikta ◽  
Somania Nur Mahal ◽  
Kazi Bushra Al Jannat ◽  
MAHADY HASAN ◽  
M. ROKONUZZAMAN

2021 ◽  
Vol 03 (01) ◽  
pp. 33-41
Author(s):  
Vittorio Astarita ◽  
Vincenzo Pasquale Giofrè ◽  
Giuseppe Guido ◽  
Alessandro Vitale

This paper intends to explore the convergence of some technological innovations that could lead to new cooperative Intelligent Transportation Systems (ITS). The technologies that might soon converge and lead to some new developments are: the Blockchain Technology (BT) concept, Internet of Things (IoT) and Connected and Automated Vehicles (CAV). Advantages and disadvantages of the new concepts founding a new ITS system are discussed in this conceptual paper. Blockchain technology has been recently introduced and many research ideas have been presented for application in the transportation sector. In this paper, we discuss a system that is based on a dedicated blockchain, able to involve both drivers and city administrations in the adoption of promising and innovative technologies that will create cooperation among connected vehicles. The proposed blockchain-based system can allow city administrators to reward drivers when they are willing to share travel data. The system manages in a special way the creation of rewards which are assigned to drivers and institutions participating actively in the system. Moreover, the system allows keeping a complete track of all transactions and interactions between drivers and city management on a completely open and shared platform. The main idea is to combine connected vehicles with BT to promote Cooperative ITS use, a better use of infrastructures and a more sustainable eco-system of cryptocurrencies. A short description of BT is introduced to evidence energy problems of sustainability in the implementation of Proof of Work (PoW) that is adopted by many blockchains.


2020 ◽  
Vol 11 (2) ◽  
pp. 161-170
Author(s):  
Rochman Hadi Mustofa

AbstractBig Data has become a significant concern of the world, along with the era of digital transformation. However, there are still many young people, especially in developing countries, who are not yet aware of the security of their big data, especially personal data. Misuse of information from big data often results in violations of privacy, security, and cybercrime. This study aims to determine how aware of the younger generation of security and privacy of their big data. Data were collected qualitatively by interviews and focus group discussions (FGD) from. Respondents were undergraduate students who used social media and financial technology applications such as online shopping, digital payments, digital wallet and hotel/transportation booking applications. The results showed that students were not aware enough and understood the security or privacy of their digital data, and some respondents even gave personal data to potentially scam sites. Most students are not careful in providing big data information because they are not aware of the risks behind it, socialization is needed in the future as a step to prevent potential data theft.


Author(s):  
Sagar Shankar Rajebhosale ◽  
Mohan Chandrabhan Nikam

A log is a record of events that happens within an organization containing systems and networks. These logs are very important for any organization, because a log file will able to record all user activities. Due to this, log files play a vital role and contain sensitive information, and therefore security should be a high priority. It is very important to the proper functioning of any organization, to securely maintain log records over an extended period of time. So, management and maintenance of logs is a very difficult task. However, deploying such a system for high security and privacy of log records may be overhead for an organization and require additional costs. Many techniques have been designed for security of log records. The alternative solution for maintaining log records is using Blockchain technology. A blockchain will provide security of the log files. Log files over a Blockchain environment leads to challenges with a decentralized storage of log files. This article proposes a secured log management over Blockchain and the use of cryptographic algorithms for dealing the issues to access a data storage. This proposed technology may be one complete solution to the secure log management problem.


2020 ◽  
Vol 2020 ◽  
pp. 1-15
Author(s):  
Qiyi He ◽  
Xiaolin Meng ◽  
Rong Qu

CAV (connected and autonomous vehicle) is a crucial part of intelligent transportation systems. CAVs utilize both sensors and communication components to make driving decisions. A large number of companies, research organizations, and governments have researched extensively on the development of CAVs. The increasing number of autonomous and connected functions however means that CAVs are exposed to more cyber security vulnerabilities. Unlike computer cyber security attacks, cyber attacks to CAVs could lead to not only information leakage but also physical damage. According to the UK CAV Cyber Security Principles, preventing CAVs from cyber security attacks need to be considered at the beginning of CAV development. In this paper, a large set of potential cyber attacks are collected and investigated from the aspects of target assets, risks, and consequences. Severity of each type of attacks is then analysed based on clearly defined new set of criteria. The levels of severity for the attacks can be categorized as critical, important, moderate, and minor. Mitigation methods including prevention, reduction, transference, acceptance, and contingency are then suggested. It is found that remote control, fake vision on cameras, hidden objects to LiDAR and Radar, spoofing attack to GNSS, and fake identity in cloud authority are the most dangerous and of the highest vulnerabilities in CAV cyber security.


Sign in / Sign up

Export Citation Format

Share Document