ESP2CS: Securing Internet of Vehicles through Blockchain-enabled Communications and Payments
- URL: http://arxiv.org/abs/2312.02589v1
- Date: Tue, 5 Dec 2023 09:02:56 GMT
- Title: ESP2CS: Securing Internet of Vehicles through Blockchain-enabled Communications and Payments
- Authors: Rateb Jabbar, Mohamed Kharbeche,
- Abstract summary: The Internet of Vehicles (IoV) promises to revolutionize transportation through enhanced safety, efficiency, and environmental sustainability.
This research introduces the Everything based Secure Payment and Communication Solution (ESP2CS)
ESP2CS ensures robust and secure VehicleV2X communications and payments amidst rising cyber threats.
The solution is complemented by an Android Auto application for vehicles, streamlining inter vehicle communication, parking space detection, and transaction management.
- Score: 1.6574413179773761
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: The burgeoning domain of the Internet of Vehicles (IoV), a subset of the Internet of Things (IoT), promises to revolutionize transportation through enhanced safety, efficiency, and environmental sustainability. By amalgamating technologies like sensors and cloud computing, the IoV paves the way for optimized traffic management, heightened vehicle safety, and the birth of novel business paradigms. However, this growth is shadowed by significant security concerns, especially in the communication and payment sectors. Addressing the pressing need for secure Vehicle to Everything (V2X) communications and payments amidst rising cyber threats, this research introduces the Ethereum based Secure Payment and Communication Solution (ESP2CS). Utilizing Ethereum as a middleware, ESP2CS ensures robust and secure V2X interactions. The solution is complemented by an Android Auto application for vehicles, streamlining inter vehicle communication, parking space detection, and transaction management. Furthermore, dedicated Android applications are developed for parking space renters and the parking IoT system. Preliminary evaluations underscore ESP2CS's superior cost effectiveness, integrity and consistency over contemporary solutions, with Ethereum bolstering both security and efficiency.
Related papers
- Smart Car Privacy: Survey of Attacks and Privacy Issues [0.0]
Vehicular Ad hoc Networks (VANETs) are emerging mobile ad hoc network technologies.<n>Security and privacy are the major concerns in VANETs due to the mobility of the vehicles.<n>This paper provides an overview of various vehicular network architectures.
arXiv Detail & Related papers (2025-08-05T12:59:17Z) - FAPL-DM-BC: A Secure and Scalable FL Framework with Adaptive Privacy and Dynamic Masking, Blockchain, and XAI for the IoVs [0.0]
The FAPL-DM-BC solution is a new FL-based privacy, security, and scalability solution for the Internet of Vehicles (IoV)
It leverages Adaptive Privacy-Aware Learning (FAPL) and Dynamic Masking (DM) to learn and adaptively change privacy policies.
The FAPL-DM-BC assures federated learning that is secure, scalable, and interpretable.
arXiv Detail & Related papers (2025-01-02T05:21:52Z) - VMGuard: Reputation-Based Incentive Mechanism for Poisoning Attack Detection in Vehicular Metaverse [52.57251742991769]
vehicular Metaverse guard (VMGuard) protects vehicular Metaverse systems from data poisoning attacks.
VMGuard implements a reputation-based incentive mechanism to assess the trustworthiness of participating SIoT devices.
Our system ensures that reliable SIoT devices, previously missclassified, are not barred from participating in future rounds of the market.
arXiv Detail & Related papers (2024-12-05T17:08:20Z) - Contextualizing Security and Privacy of Software-Defined Vehicles: State of the Art and Industry Perspectives [7.160802183553593]
Survey explores the cybersecurity and privacy challenges posed by Software-Defined Vehicles (SDVs)
SDVs increasingly integrate features like Over-the-Air (OTA) updates and Vehicle-to-Everything (V2X) communication.
Transition to SDVs also raises significant privacy concerns, with vehicles collecting vast amounts of sensitive data.
arXiv Detail & Related papers (2024-11-15T22:30:07Z) - Cyber-Physical Authentication Scheme for Secure V2G Transactions [6.649289493897674]
The rapid adoption of electric vehicles (EVs) globally has catalyzed the need for robust cybersecurity measures within vehicle-to-grid (V2G) networks.
This paper proposes a cyber-physical authentication protocol and trading smart contract tailored to plug and charge (PnC) operations within blockchain-based V2G systems.
arXiv Detail & Related papers (2024-09-21T04:03:26Z) - Blockchain-Enabled IoV: Secure Communication and Trustworthy Decision-Making [10.36812720854941]
The Internet of Vehicles (IoV) enables interactions between vehicles, infrastructure, and the environment.
This paper introduces a decentralized framework comprising a primary layer for managing inter-vehicle communication and a sub-layer for securing intra-vehicle interactions.
arXiv Detail & Related papers (2024-09-18T00:56:14Z) - EAIA: An Efficient and Anonymous Identity Authentication Scheme in 5G-V2V [14.315350766867814]
This paper proposes an efficient anonymous V2V identity authentication protocol tailored for scenarios that lack Roadside Units (RSUs) support.
The proposed protocol has been formally assessed using the Scyther tool, demonstrating its capability to withstand major typical malicious attacks.
arXiv Detail & Related papers (2024-06-07T07:26:09Z) - Differentiated Security Architecture for Secure and Efficient Infotainment Data Communication in IoV Networks [55.340315838742015]
Negligence on the security of infotainment data communication in IoV networks can unintentionally open an easy access point for social engineering attacks.
In particular, we first classify data communication in the IoV network, examine the security focus of each data communication, and then develop a differentiated security architecture to provide security protection on a file-to-file basis.
arXiv Detail & Related papers (2024-03-29T12:01:31Z) - Blockchain-based Pseudonym Management for Vehicle Twin Migrations in Vehicular Edge Metaverse [73.79237826420925]
Vehicle Twins (VTs) provide valuable metaverse services to improve driving safety and on-board satisfaction for VMUs throughout journeys.
To maintain uninterrupted metaverse experiences, VTs must be migrated among edge servers following the movements of vehicles.
This can raise concerns about privacy breaches during the dynamic communications among vehicular edge metaverses.
Existing pseudonym management methods fall short in meeting the extensive pseudonym demands in vehicular edge metaverses.
arXiv Detail & Related papers (2024-03-22T15:31:37Z) - Cyber-Twin: Digital Twin-boosted Autonomous Attack Detection for Vehicular Ad-Hoc Networks [8.07947129445779]
The rapid evolution of Vehicular Ad-hoc NETworks (VANETs) has ushered in a transformative era for intelligent transportation systems (ITS)
VANETs are increasingly susceptible to cyberattacks, such as jamming and distributed denial of service (DDoS) attacks.
Existing methods face difficulties in detecting dynamic attacks and integrating digital twin technology and artificial intelligence (AI) models to enhance VANET cybersecurity.
This study proposes a novel framework that combines digital twin technology with AI to enhance the security of RSUs in VANETs.
arXiv Detail & Related papers (2024-01-25T08:05:41Z) - The Security and Privacy of Mobile Edge Computing: An Artificial Intelligence Perspective [64.36680481458868]
Mobile Edge Computing (MEC) is a new computing paradigm that enables cloud computing and information technology (IT) services to be delivered at the network's edge.
This paper provides a survey of security and privacy in MEC from the perspective of Artificial Intelligence (AI)
We focus on new security and privacy issues, as well as potential solutions from the viewpoints of AI.
arXiv Detail & Related papers (2024-01-03T07:47:22Z) - The Internet of Senses: Building on Semantic Communications and Edge
Intelligence [67.75406096878321]
The Internet of Senses (IoS) holds the promise of flawless telepresence-style communication for all human receptors'
We elaborate on how the emerging semantic communications and Artificial Intelligence (AI)/Machine Learning (ML) paradigms may satisfy the requirements of IoS use cases.
arXiv Detail & Related papers (2022-12-21T03:37:38Z) - Reinforcement Learning based Cyberattack Model for Adaptive Traffic
Signal Controller in Connected Transportation Systems [61.39400591328625]
In a connected transportation system, adaptive traffic signal controllers (ATSC) utilize real-time vehicle trajectory data received from vehicles to regulate green time.
This wirelessly connected ATSC increases cyber-attack surfaces and increases their vulnerability to various cyber-attack modes.
One such mode is a'sybil' attack in which an attacker creates fake vehicles in the network.
An RL agent is trained to learn an optimal rate of sybil vehicle injection to create congestion for an approach(s)
arXiv Detail & Related papers (2022-10-31T20:12:17Z) - Local Differential Privacy based Federated Learning for Internet of
Things [72.83684013377433]
Internet of Vehicles (IoV) simulates a large variety of crowdsourcing applications such as Waze, Uber, and Amazon Mechanical Turk, etc.
Users of these applications report the real-time traffic information to the cloud server which trains a machine learning model based on traffic information reported by users for intelligent traffic management.
In this paper, we propose to integrate federated learning and local differential privacy (LDP) to facilitate the crowdsourcing applications to achieve the machine learning model.
arXiv Detail & Related papers (2020-04-19T14:03:10Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.