Blockchain-based Trust Management in Security Credential Management System for Vehicular Network
- URL: http://arxiv.org/abs/2502.15653v1
- Date: Fri, 21 Feb 2025 18:22:28 GMT
- Title: Blockchain-based Trust Management in Security Credential Management System for Vehicular Network
- Authors: SangHyun Byun, Arijet Sarker, Sang-Yoon Chang, Jugal Kalita,
- Abstract summary: We build a vehicular-Based Trust Management (BBTM) to provide greater decentralization and security.<n>BBTM uses the blockchain to replace the existing Policy Generator (PG), manage the policy of each authority in SCMS, and aggregate the Global Certificate Chain File (GCCF)<n>Our experiments show that BBTM is lightweight in processing, efficient management in the certificate chain and ledger size, supports a bandwidth of multiple transactions per second, and provides validated end-entities.
- Score: 6.772249211312723
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Cellular networking is advancing as a wireless technology to support diverse applications in vehicular communication, enabling vehicles to interact with various applications to enhance the driving experience, even when managed by different authorities. Security Credential Management System (SCMS) is the Public Key Infrastructure (PKI) for vehicular networking and the state-of-the-art distributed PKI to protect the privacy-preserving vehicular networking against an honest-but-curious authority using multiple authorities and to decentralize the trust management. We build a Blockchain-Based Trust Management (BBTM) to provide even greater decentralization and security. Specifically, BBTM uses the blockchain to 1) replace the existing Policy Generator (PG), 2) manage the policy of each authority in SCMS, 3) aggregate the Global Certificate Chain File (GCCF), and 4) provide greater accountability and transparency on the aforementioned functionalities. We implement BBTM on Hyperledger Fabric using a smart contract for experimentation and analyses. Our experiments show that BBTM is lightweight in processing, efficient management in the certificate chain and ledger size, supports a bandwidth of multiple transactions per second, and provides validated end-entities.
Related papers
- Base Station Certificate and Multi-Factor Authentication for Cellular Radio Control Communication Security [1.3142127084199051]
Current cellular networking remains vulnerable to malicious fake base stations.
We design a base station certificate (certifying the base station's public key and location) and a multi-factor authentication to secure the authenticity and message integrity of the base station control communications.
arXiv Detail & Related papers (2025-04-02T21:12:29Z) - Balancing Confidentiality and Transparency for Blockchain-based Process-Aware Information Systems [46.404531555921906]
We propose an architecture for blockchain-based PAISs aimed at preserving both confidentiality and transparency.<n>Smart contracts enact, enforce and store public interactions, while attribute-based encryption techniques are adopted to specify access grants to confidential information.
arXiv Detail & Related papers (2024-12-07T20:18:36Z) - ChainGuard: A Blockchain-based Authentication and Access Control Scheme for Distributed Networks [0.3199881502576702]
ChainGuard is a fully decentralized authentication and access control mechanism based on smart contracts.<n>Our scheme supports user interactions across multiple organizations simultaneously, enhancing security, efficiency, and transparency.
arXiv Detail & Related papers (2024-12-01T05:38:53Z) - Blockchain-Enabled IoV: Secure Communication and Trustworthy Decision-Making [10.36812720854941]
The Internet of Vehicles (IoV) enables interactions between vehicles, infrastructure, and the environment.
This paper introduces a decentralized framework comprising a primary layer for managing inter-vehicle communication and a sub-layer for securing intra-vehicle interactions.
arXiv Detail & Related papers (2024-09-18T00:56:14Z) - Enhancing Trust and Privacy in Distributed Networks: A Comprehensive Survey on Blockchain-based Federated Learning [51.13534069758711]
Decentralized approaches like blockchain offer a compelling solution by implementing a consensus mechanism among multiple entities.
Federated Learning (FL) enables participants to collaboratively train models while safeguarding data privacy.
This paper investigates the synergy between blockchain's security features and FL's privacy-preserving model training capabilities.
arXiv Detail & Related papers (2024-03-28T07:08:26Z) - A Survey and Comparative Analysis of Security Properties of CAN Authentication Protocols [92.81385447582882]
The Controller Area Network (CAN) bus leaves in-vehicle communications inherently non-secure.
This paper reviews and compares the 15 most prominent authentication protocols for the CAN bus.
We evaluate protocols based on essential operational criteria that contribute to ease of implementation.
arXiv Detail & Related papers (2024-01-19T14:52:04Z) - HasTEE+ : Confidential Cloud Computing and Analytics with Haskell [50.994023665559496]
Confidential computing enables the protection of confidential code and data in a co-tenanted cloud deployment using specialized hardware isolation units called Trusted Execution Environments (TEEs)
TEEs offer low-level C/C++-based toolchains that are susceptible to inherent memory safety vulnerabilities and lack language constructs to monitor explicit and implicit information-flow leaks.
We address the above with HasTEE+, a domain-specific language (cla) embedded in Haskell that enables programming TEEs in a high-level language with strong type-safety.
arXiv Detail & Related papers (2024-01-17T00:56:23Z) - Enabling Data Confidentiality with Public Blockchains [5.749927436954179]
Multi-Authority Approach to Transaction Systems for Interoperating Applications (MARTSIA)
MARTSIA enables read-access control over shared data at the level of message parts.
Based on Multi-Authority Attribute-Based Encryption (MA-ABE), MARTSIA enables read-access control over shared data at the level of message parts.
arXiv Detail & Related papers (2023-08-04T13:21:48Z) - Will bots take over the supply chain? Revisiting Agent-based supply
chain automation [71.77396882936951]
Agent-based supply chains have been proposed since early 2000; industrial uptake has been lagging.
We find that agent-based technology has matured, and other supporting technologies that are penetrating supply chains are filling in gaps.
For example, the ubiquity of IoT technology helps agents "sense" the state of affairs in a supply chain and opens up new possibilities for automation.
arXiv Detail & Related papers (2021-09-03T18:44:26Z) - BE-RAN: Blockchain-enabled Open RAN for 6G with DID and Privacy-Preserving Communication [10.489000349804254]
We propose a novel decentralized RAN architecture enhancing security, privacy, and efficiency in authentication processes.
We envision a thoroughly decentralized RAN model and propose a privacy-preserving P2P communication approach.
arXiv Detail & Related papers (2021-01-26T15:24:22Z) - Regulation conform DLT-operable payment adapter based on trustless -
justified trust combined generalized state channels [77.34726150561087]
Economy of Things (EoT) will be based on software agents running on peer-to-peer trustless networks.
We give an overview of current solutions that differ in their fundamental values and technological possibilities.
We propose to combine the strengths of the crypto based, decentralized trustless elements with established and well regulated means of payment.
arXiv Detail & Related papers (2020-07-03T10:45:55Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.