scholarly journals Enhanced IoV Security Network by Using Blockchain Governance Game

Mathematics ◽  
2021 ◽  
Vol 9 (2) ◽  
pp. 109
Author(s):  
Song-Kyoo (Amang) Kim

This paper deals with the design of the secure network in an Enhanced Internet of Vehicles by using the Blockchain Governance Game (BGG). The BGG is a system model of a stochastic game to find best strategies towards preparation of preventing a network malfunction by an attacker and the paper applies this game model into the connected vehicle security. Analytically tractable results for decision-making parameters enable to predict the moment for safety operations and to deliver the optimal combination of the number of reserved nodes with the acceptance probability of backup nodes to protect a connected car. This research helps for whom considers the enhanced secure IoV architecture with the BGG within a decentralized network.

Telecom ◽  
2021 ◽  
Vol 2 (1) ◽  
pp. 108-140
Author(s):  
Paulo Álvares ◽  
Lion Silva ◽  
Naercio Magaia

It had been predicted that by 2020, nearly 26 billion devices would be connected to the Internet, with a big percentage being vehicles. The Internet of Vehicles (IoVa) is a concept that refers to the connection and cooperation of smart vehicles and devices in a network through the generation, transmission, and processing of data that aims at improving traffic congestion, travel time, and comfort, all the while reducing pollution and accidents. However, this transmission of sensitive data (e.g., location) needs to occur with defined security properties to safeguard vehicles and their drivers since attackers could use this data. Blockchain is a fairly recent technology that guarantees trust between nodes through cryptography mechanisms and consensus protocols in distributed, untrustful environments, like IoV networks. Much research has been done in implementing the former in the latter to impressive results, as Blockchain can cover and offer solutions to many IoV problems. However, these implementations have to deal with the challenge of IoV node’s resource constraints since they do not suffice for the computational and energy requirements of traditional Blockchain systems, which is one of the biggest limitations of Blockchain implementations in IoV. Finally, these two technologies can be used to build the foundations for smart cities, enabling new application models and better results for end-users.


2016 ◽  
Vol 53 (3) ◽  
pp. 783-801 ◽  
Author(s):  
Eric Foxall

AbstractThe susceptible→exposed→infectious→susceptible (SEIS) model is well known in mathematical epidemiology as a model of infection in which there is a latent period between the moment of infection and the onset of infectiousness. The compartment model is well studied, but the corresponding particle system has so far received no attention. For the particle system model in one spatial dimension, we give upper and lower bounds on the critical values, prove convergence of critical values in the limit of small and large latent time, and identify a limiting process to which the SEIS model converges in the limit of large latent time.


2021 ◽  
Vol 12 (4) ◽  
pp. 222
Author(s):  
Zirui Ding ◽  
Junping Xiang

This paper reviews the development of vehicle road collaborative simulation in the new era, and summarizes the simulation characteristics of two core technologies in the field of transportation after entering the era of Intelligent Networking: Internet of Vehicles technology and automatic driving technology. This paper analyzes and compares the mainstream Internet of Vehicles (IoV) simulation and automatic driving simulation platforms on the market, deeply analyzes the model-based IoV simulation, and explores a new mode of IoV simulation in the era of big data. According to the latest classification standard of automatic driving in 2020, we summarize the simulation process of automatic driving. Finally, we offer suggestions on the development directions of intelligent network-connected vehicle simulation.


2012 ◽  
Vol 457-458 ◽  
pp. 1243-1249
Author(s):  
Bing Chen ◽  
Cheng Xiang Tan ◽  
Yue Bo Dai

With the development of the technology and industry of the Internet of Things, the application of the Internet of Things of government and industry has been one important subject for the further development of information construction in China. The paper presents the RFID-based vehicle security monitoring and administration system of the Internet of Things in order to assure the real-time monitoring and security administration in the process of the vehicles going and coming through the gates and the vehicle’s united administration, and designs the security implementation framework of the application of the Internet of Things, and discusses the key technology including super high frequency RFID and boundary security network gateway, and the system and the key technology can broadly apply to the united security monitoring and administration of many vehicles such as buses, cars, trains, and the system of the Internet of Things has been primary implemented and achieved good effects in actual applications.


Author(s):  
Mahmoud Arafat ◽  
Mohammed Hadi ◽  
Thodsapon Hunsanon ◽  
Kamar Amine

Assessment of the safety and mobility impacts of connected vehicles (CVs) and cooperative automated vehicle applications is critical to the success of these applications. In many cases, there may be trade-offs in the mobility and safety impacts depending on the setting of the parameters of the applications. This study developed a method to evaluate the safety and mobility benefits of the Stop Sign Gap Assist (SSGA) system, a CV-based application at unsignalized intersections, which utilizes a calibrated microscopic simulation tool. The study results confirmed that it was critical to calibrate the drivers’ gap acceptance probability distributions in the utilized simulation model to reflect real-world driver behaviors when assessing SSGA impacts. The simulation models with the calibrated gap parameters were then used to assess the impacts of the SSGA. The results showed that SSGA can potentially improve overall minor approach capacity at unsignalized intersections by approximately 35.5% when SSGA utilization reaches 100%. However, this increase in capacity depended on the setting of the minimum gap time in the SSGA and there was a clear trade-off between capacity and safety. The analysis indicated that as the minimum gap time used in the SSGA increased, the safety of the intersection increased, showing for example that with the utilization of an 8-s gap at a 750 vph main street flow rate, the number of conflicts could decrease by 30% as the SSGA utilization rate increased from 0% to 100%.


2021 ◽  
Vol 2021 ◽  
pp. 1-16
Author(s):  
Ming Mao ◽  
Peng Yi ◽  
Tao Hu ◽  
Zhen Zhang ◽  
Xiangyu Lu ◽  
...  

One of the principal missions of security in the Internet of Vehicles (IoV) is to establish credible social relationships. The trust management system has been proved to be an effective security solution in a connected vehicle environment. The use of trust management can play a significant role in achieving reliable data collection and dissemination and enhanced user security in the Internet of Vehicles. However, due to a large number of vehicles, the limited computing power of individuals, and the highly dynamic nature of the network, a universal and flexible architecture is required to realize the trust of vehicles in a dynamic environment. The existing solutions for trust management cannot be directly applied to the Internet of Vehicles. To ensure the safe transmission of data between vehicles and overcome the problems of high communication delay and low recognition rate of malicious nodes in the current trust management scheme, an efficient flow forwarding mechanism of the RSU close to the controller in the Software-Defined Vehicular Network is used to establish a hierarchical hybrid trust management architecture. This method evaluates the dynamic trust change of vehicle behavior based on the trust between vehicles and the auxiliary trust management of the infrastructure to the vehicle, combined with static and dynamic information and other indicators. The proposed trust management scheme is superior to the comparative schemes in resisting simple attacks, selective misbehavior attacks, and time-dependent attacks under the condition of ensuring superior real-time performance. Its overall accuracy is higher than that of the baseline scheme.


Axioms ◽  
2022 ◽  
Vol 11 (1) ◽  
pp. 27
Author(s):  
Song-Kyoo (Amang) Kim

The research designs a new integrated system for the security enhancement of a decentralized network by preventing damages from attackers, particularly for the 51 percent attack. The concept of multiple layered design based on Blockchain Governance Games frameworks could handle multiple number of networks analytically. The Multi-Layered Blockchain Governance Game is an innovative analytical model to find the best strategies for executing a safety operation to protect whole multiple layered network systems from attackers. This research fully analyzes a complex network with the compact mathematical forms and theoretically tractable results for predicting the moment of a safety operation execution are fully obtained. Additionally, simulation results are demonstrated to obtain the optimal values of configuring parameters of a blockchain-based security network. The Matlab codes for the simulations are publicly available to help those whom are constructing an enhanced decentralized security network architecture through this proposed integrated theoretical framework.


Sign in / Sign up

Export Citation Format

Share Document