VBlock: A Blockchain-Based Tamper-Proofing Data Protection Model for Internet of Vehicle Networks
Abstract
:1. Introduction
- We design a secure model called VBlock for outsourcing data to the cloud by IoV nodes which ensures tamper-proofing, data provenance, and auditing. We utilize blockchain techniques to decentralize all data storing entities in the IoV network by integrating activities as transactions on the blockchain. The cloud server in our model only accepts the IoV data generated by the IoV node, provided the IoV node has a valid warrant, and a corresponding transaction is recorded on the blockchain for the data being outsourced. We describe this as warrant-based data outsourcing.
- We introduce a certificate/key revocation mechanism to ensure that all nodes communicating in the IoV environment are legitimate and have not been compromised by malicious activities.
- We conducted a series of experiments to evaluate the validity, security, and performance efficiency of our proposed model, and the results shows that our model is practical and efficient in the IoV scenario.
2. Related Works
3. Problem Statement
3.1. Cloud-Based IoV Network
3.2. Threat Model
3.2.1. External Threat
3.2.2. Internal Threat
- Semi-trusted IoV node. Users of the IoV nodes can all be classified as semi-trusted nodes. By this, we mean the nodes will operate normally during everyday scenarios. However, the user of the IoV node (attacker) may perform the following attacks.
- The attacker may collude with the cloud server, outsource forged IoV data to conceal evidence needed for criminal investigation or cause data integrity problems that affect smart city management.
- The attacker may violate the integrity of IoV data outsourced. The attacker may collude with the cloud server to illegally modify or delete portions of outsourced data from other nodes on the cloud server.
3.3. Design Goals
- How collusion between malicious deployed IoV node (attackers) and the cloud server can be avoided in the IoV network. A strong assumption exists in the current cloud-assisted data storage of IoV networks, that the cloud server will not collude with the IoV node or the user to modify outsourced IoV network data.
- How to securely timestamp the IoV data before outsourcing to verify the legitimacy of outsourced data and avoid replay attacks by malicious nodes. It is very important to accurately maintain and securely timestamp the data from the IoV network.
- How to securely authenticate the IoV nodes. Current cloud-assisted IoV networks utilize the traditional PKI schemes such as central authority (CA) or key generation center (KGC), which are prone to a single point of failure when data are tampered with in the CA or KGC.
- How to ensure trust in outsourced data in a cloud-assisted IoV system by eliminating the single point of trust in the cloud server. The current server-aided model is limited to a single point of trust in the outsourced cloud server where the security of data no longer holds when the server is compromised.
4. Preliminaries
4.1. Notations, Conventions, and Basic Theory
- Bilinearity: for all
- Non-degeneracy: For , where 1 is the identity element in .
- Computability: There exists an efficient computable algorithm to compute for .
4.2. Cryptographic Keys
4.3. Blockchain
4.4. Hyperledger Fabric Blockchain
5. Architecture of VBlock
5.1. Choice of Blockchain Platform
5.2. Key Components
- Roadside Units (RSUs): These are special wireless communication devices or base stations mounted along the road to provide connectivity and information support to moving vehicles within their range. RSUs communicate with IoV nodes (OBUs) via message exchanges within their communications zone. They usually have better storage capacity and computation power than the IoV nodes. In this work, we model the RSU as a warrant issuer that permits the IoV node to outsource data to the cloud server. The cloud server only receives data for storage if the IoV node provides a valid warrant from the RSU.
- IoV node (OBU): These are vehicles deployed with Internet of Things sensors that are able to collect, compute and send data to the cloud server or an edge server. They have inbuilt clocks that are used in timestamping communication messages. They are the main data generators on the network. They are tamper-proof; hence, information stored on them, such as secret key, cannot be uncovered. They communicate with the RSUs to obtain a warrant to outsource the data collected or generated to the cloud or edge server. In our model, they create transactions on the blockchain and store the hash of the corresponding data generated, before outsourcing the data to the cloud or edge server.
- Key Generation Center (KGC): This is a trusted entity that manages keys used in communication in our network. It registers RSUs and IoV nodes and generates partially private key and pseudo-identities (), for anonymity of entities communicating. It stores a mapping of the assigned pseudo-identity with the actual identity and public key in a hash map in its database. It can trace and revoke the identity of malicious entities. The KGC also has enormous computation resources.
- Cloud or Edge Server: This is a high-end computational resource and a huge storage-enabled server. Considering the limited resources of the IoV nodes for storage and managing large data generated, the cloud or edge server is the perfect solution. It provides unlimited data processing and storage resources to the IoV nodes. The IoV nodes outsource the data generated to the cloud server.
5.3. Layers Design
- Data Generation Layer: This layer consists of vehicles deployed with IoT-enabled devices or simply IoV nodes and roadside units (RSUs). The IoV node sends generated or collected data to the data storage layer via the data management layer after it receives a warrant from the RSU. The data includes the GPS location data, speed, and safety condition status. The data cannot be outsourced without receiving a warrant from the RSU node.
- Data Management Layer: This layer consists of library functions that allow access and process requests received from the data generation layer or consumption layer. It focuses on some specific data processing and operations. Processing of requests in the system includes access to cloud storage data. It also interfaces with the data security and provenance layer. Additionally, it has structured functions that send activities to the data security and provenance. Both the data generation layer and consumption layer interface directly with the data management layer for the processing of requests.
- Data Security and Provenance Layer: This layer is responsible for data security and auditing. This layer stores hashes of corresponding data needing to be secured from illegal modification. It ensures the immutability of stored data which helps to ensure data provenance. It keeps track of changes made to stored data. It also ensures the security of communication by providing the underlying security communication scheme.
- Data Storage Layer: This layer is responsible for the scalability of the IoV system applications by providing a distributed or parallel computing environment. This layer plays a major role in storing and managing the IoV data received from the IoV node. Sensors on the vehicles continuously generate a significant amount of data that is collected and managed by the data storage layer.
- Data Consumption/Usage Layer: The layer consists of all kinds of user classifications, the aim of which are to access the outsourced data from the system for research, investigation, or other useful purposes. Most users at this level help analyze the data received by the cloud server for research purposes. Some of these users include insurance companies, security agencies such as police, healthcare organizations, research institutions such as universities, and governmental bodies.
5.4. Communication Design
5.5. Key Revocation
5.6. Assumptions
- All communication with the KGC is done via a secure channel.
- IoV nodes connect with the RSUs through a secure channel.
- IoV node uses a secure communication channel to outsource the generated data to the cloud server.
- The IoV nodes and RSUs have a secure communication channel with the blockchain network.
5.7. Construction of VBlock
5.7.1. Setup
5.7.2. Register
5.7.3. Store
5.7.4. Audit
- Trim the IoV data and obtain
- Extract the corresponding transactions from the blockchain.
- Check if the number of transactions created correspond to the number of stored IoV data. If the verification fails, reject.
- Check the validity of and . Reject if the validity check fails or is invalid.
- Verify the IoV data timelines by verifying the time of the transaction and reject if the check fails. The transaction time can be obtained from the block.
- Compute and confirm it is the same as the transaction information.
5.8. Algorithms
Algorithm 1 Requesting for Warrant from RSU node |
Require: , , , , , 1: signs warrant request message : = sign (,, ) 2: sends to nearest . 3: checks 4: Condition 1: Verify (, , ,) 5: Condition 2: Check if or is not revoked 6: if (Condition 1 && Condition 2) = True 7: computes warrant 8: 9: 10: sends warrant , to 11: else return fail end if |
Algorithm 2: Creating Transaction for Data Generated |
Require: , , , , , , 1: computes ciphertext of the data generated 2: extracts 3: computes 4: sets transaction proposal = 5: signs Transaction Proposal : = sign (,, ) 6: sends to endorsers , 7: for check 8: Condition 1: Verify (, , ) 9: Condition 2: Execute chaincode and check format of 10: if (Condition 1 && Condition 2) = True 11: signs : = sign (, ) 12: Send transaction proposal response to 13: else return fail end if 14: end for 15: sends to ordering service and wait for acknowledgment 16: for check 17: Condition 1: Verify (, ,, ) 18: Condition 2: Check Endorsement Policy 19: if (Condition 1 && Condition 2) = True 20: Set the transaction status = 21: Validate consensus and add transaction to block 22: Send acknowledgment to 23: else 24: Set transaction status = ; 25: Send acknowledgment to 26: end if 27: end for |
Algorithm 3: Outsourcing Data to the Cloud Server |
Require: , , , , S, 1: signs and sends to cloud server S 2: S checks 3: Condition 1: Verify (, ) 4: Condition 2: Verify transaction validity 5: Condition 3: Verify warrant; compute 6: if (Condition 1 && Condition 2 && Condition 3) = True 7: S, accept and store data 8: else return fail end if |
6. Security Analysis
6.1. Security against Forgery and Modification Attacks
6.2. VBlock Guarantees the Timeliness of IoV Data
6.3. VBlock Guarantees Public Key Security
6.4. Necessity of Blockchain Integration
6.5. VBlock Is Resistant to Replay Attacks
6.6. VBlock Ensures Data Access Control
7. Performance Evaluation
7.1. Evaluation Metrics
- The number of successful transactions executed out of the total transaction is known as the success rate.
- Latency refers to the time interval between the transaction initialization and the actual transaction execution.
- Throughput is the number of successful transactions per second.
7.2. Computation Cost
7.3. Simulation
- Experiment 1 was designed to evaluate the transaction per second (TPS) and latency of open functions (create, update, or delete) of the network. This is to measure the process of outsourcing data to the cloud server.
- Experiment 2 was designed to evaluate the transaction per second (TPS) and latency of query function of the network. This is to measure the performance of verifying information from the blockchain network.
7.4. Results and Discussion
8. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Guerrero-Ibanez, J.A.; Zeadally, S.; Contreras-Castillo, J. Integration challenges of intelligent transportation systems with connected vehicle, cloud computing, and internet of things technologies. IEEE Wirel. Commun. 2015, 22, 122–128. [Google Scholar] [CrossRef]
- Ang, L.-M.; Seng, K.P.; Zungeru, A.M.; Ijemaru, G.K. Big Sensor Data Systems for Smart Cities. IEEE Internet Things J. 2017, 4, 1259–1271. [Google Scholar] [CrossRef]
- Meneghello, F.; Calore, M.; Zucchetto, D.; Polese, M.; Zanella, A. IoT: Internet of Threats? A Survey of Practical Security Vulnerabilities in Real IoT Devices. IEEE Internet Things J. 2019, 6, 8182–8201. [Google Scholar] [CrossRef]
- Manvi, S.S.; Tangade, S. A survey on authentication schemes in VANETs for secured communication. Veh. Commun. 2017, 9, 19–30. [Google Scholar] [CrossRef]
- Ali, I.; Hassan, A.; Li, F. Authentication and privacy schemes for vehicular ad hoc networks (VANETs): A survey. Veh. Commun. 2019, 16, 45–61. [Google Scholar] [CrossRef]
- Li, M.; Lal, C.; Conti, M.; Hu, D. LEChain: A blockchain-based lawful evidence management scheme for digital forensics. Futur. Gener. Comput. Syst. 2021, 115, 406–420. [Google Scholar] [CrossRef]
- Upstream Security. Global Automotive Cybersecurity Report 2021. 2021. Available online: https://upstream.auto/2021Report/ (accessed on 20 May 2022).
- Wazid, M.; Das, A.K.; Hussain, R.; Succi, G.; Rodrigues, J.J. Authentication in cloud-driven IoT-based big data environment: Survey and outlook. J. Syst. Arch. 2018, 97, 185–196. [Google Scholar] [CrossRef]
- Rak, M.; Salzillo, G.; Granata, D. ESSecA: An automated expert system for threat modelling and penetration testing for IoT ecosystems. Comput. Electr. Eng. 2022, 99, 107721. [Google Scholar] [CrossRef]
- Al-Riyami, S.S.; Paterson, K.G. Certificateless Public Key Cryptography. In Proceedings of the 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, 30 November–4 December 2003; Volume 2003, pp. 452–473. [Google Scholar] [CrossRef] [Green Version]
- Le, T.-V.; Hsu, C.-L.; Chen, W.-X. A Hybrid Blockchain-Based Log Management Scheme With Nonrepudiation for Smart Grids. IEEE Trans. Ind. Informatics 2021, 18, 5771–5782. [Google Scholar] [CrossRef]
- Agyekum, K.O.-B.O.; Xia, Q.; Sifah, E.B.; Gao, J.; Xia, H.; Du, X.; Guizani, M. A Secured Proxy-Based Data Sharing Module in IoT Environments Using Blockchain. Sensors 2019, 19, 1235. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Sharma, P.K.; Moon, S.Y.; Park, J.H. Block-VN A Distributed Blockchain Based Vehicular Network Architecture in Smart City. J. Inf. Process. Syst. 2017, 13, 184–195. [Google Scholar] [CrossRef]
- Yuan, Y.; Wang, F.Y. Towards blockchain-based intelligent transportation systems. In Proceedings of the 2016 IEEE 19th International Conference on Intelligent Transportation Systems (ITSC), Rio de Janeiro, Brazil, 1–4 November 2016; pp. 2663–2668. [Google Scholar]
- Vallent, T.; Hanyurwimfura, D.; Mikeka, C. Efficient Certificate-Less Aggregate Signature Scheme with Conditional Privacy-Preservation for Vehicular Ad Hoc Networks Enhanced Smart Grid System. Sensors 2021, 21, 2900. [Google Scholar] [CrossRef] [PubMed]
- Liu, G.; Fan, N.; Wu, C.Q.; Zou, X. On a Blockchain-Based Security Scheme for Defense against Malicious Nodes in Vehicular Ad-Hoc Networks. Sensors 2022, 22, 5361. [Google Scholar] [CrossRef] [PubMed]
- Ma, X.; Ge, C.; Liu, Z. Blockchain-Enabled Privacy-Preserving Internet of Vehicles: Decentralized and Reputation-Based Network Architecture. In Proceedings of the International Conference on Network and System Security 2019, Sapporo, Japan, 15–18 December 209; pp. 336–351. [CrossRef]
- Kang, J.; Yu, R.; Huang, X.; Wu, M.; Maharjan, S.; Xie, S.; Zhang, Y. Blockchain for Secure and Efficient Data Sharing in Vehicular Edge Computing and Networks. IEEE Internet Things J. 2019, 6, 4660–4670. [Google Scholar] [CrossRef]
- Javaid, U.; Aman, M.N.; Sikdar, B. DrivMan: Driving Trust Management and Data Sharing in VANETs with Blockchain and Smart Contracts. In Proceedings of the 2019 IEEE 89th Vehicular Technology Conference (VTC2019-Spring), Kuala Lumpur, Malaysia, 28 April 2019–1 May 2019; pp. 1–5. [Google Scholar] [CrossRef]
- Shi, K.; Zhu, L.; Zhang, C.; Xu, L.; Gao, F. Blockchain-based multimedia sharing in vehicular social networks with privacy protection. Multimedia Tools Appl. 2020, 79, 8085–8105. [Google Scholar] [CrossRef]
- Ali, I.; Gervais, M.; Ahene, E.; Li, F. A blockchain-based certificateless public key signature scheme for vehicle-to-infrastructure communication in VANETs. J. Syst. Arch. 2019, 99, 101636. [Google Scholar] [CrossRef]
- Su, T.; Shao, S.; Guo, S.; Lei, M. Blockchain-Based Internet of Vehicles Privacy Protection System. Wirel. Commun. Mob. Comput. 2020, 2020, 1–10. [Google Scholar] [CrossRef]
- Malik, N.; Nanda, P.; Arora, A.; He, X.; Puthal, D. Blockchain Based Secured Identity Authentication and Expeditious Revocation Framework for Vehicular Networks. In Proceedings of the 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE), New York, NY, USA, 1–3 August 2018; pp. 674–679. [Google Scholar] [CrossRef]
- Jabbar, R.; Kharbeche, M.; Al-Khalifa, K.; Krichen, M.; Barkaoui, K. Blockchain for the Internet of Vehicles: A Decentralized IoT Solution for Vehicles Communication Using Ethereum. Sensors 2020, 20, 3928. [Google Scholar] [CrossRef]
- Zhang, Y.; Xu, C.; Li, H.; Liang, X. Cryptographic Public Verification of Data Integrity for Cloud Storage Systems. IEEE Cloud Comput. 2016, 3, 44–52. [Google Scholar] [CrossRef]
- Zhang, Y.; Xu, C.; Li, H.; Yang, K.; Zhou, J.; Lin, X. HealthDep: An Efficient and Secure Deduplication Scheme for Cloud-Assisted eHealth Systems. IEEE Trans. Ind. Inform. 2018, 14, 4101–4112. [Google Scholar] [CrossRef]
- Kumar, R.; Sharma, R. Leveraging blockchain for ensuring trust in IoT: A survey. J. King Saud Univ. Comput. Inf. Sci. 2021. [Google Scholar] [CrossRef]
- Mollah, M.B.; Zhao, J.; Niyato, D.; Guan, Y.L.; Yuen, C.; Sun, S.; Lam, K.-Y.; Koh, L.H. Blockchain for the Internet of Vehicles Towards Intelligent Transportation Systems: A Survey. IEEE Internet Things J. 2020, 8, 4157–4185. [Google Scholar] [CrossRef]
- Seon, C. Blockchain for IoT-based smart cities: Recent advances, requirements, and future challenges. J. Netw. Comput. Appl. 2021, 181, 103007. [Google Scholar] [CrossRef]
- Saxena, S.; Bhushan, B.; Ahad, M.A. Blockchain based solutions to secure IoT: Background, integration trends and a way forward. J. Netw. Comput. Appl. 2021, 181, 103050. [Google Scholar] [CrossRef]
- Armknecht, F.; Bohli, J.-M.; Karame, G.O.; Liu, Z.; Reuter, C.A. Outsourced Proofs of Retrievability. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AR, USA, 3–7 November 2014; pp. 831–843. [Google Scholar] [CrossRef]
- Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System. Decentralized Bus. Rev. 2008, 21260. Available online: https://bitcoin.org/en/bitcoin-paper (accessed on 23 June 2022).
- Wood, G. Ethereum: A Secure Decentralized Generalized Distributed Ledger. 2018, 151, pp. 1–32. Available online: https://gavwood.com/paper.pdf (accessed on 22 July 2022).
- Hopwood, D.; Bowe, S.; Hornby, T.; Wilcox, N. Zcash Protocol Specification; GitHub: San Francisco, CA, USA, 2019; pp. 1–143. [Google Scholar]
- Fromknecht, C.; Velicanu, D. A Decentralized Public Key Infrastructure with Identity Retention. IACR Cryptol. ePrint Arch. 2014, 803, 1–16. [Google Scholar]
- Kodjiku, S.L.; Fang, Y.; Han, T.; Asamoah, K.O.; Aggrey, E.S.E.B.; Sey, C.; Aidoo, E.; Ejianya, V.N.; Wang, X. ExCrowd: A Blockchain Framework for Exploration-Based Crowdsourcing. Appl. Sci. 2022, 12, 6732. [Google Scholar] [CrossRef]
- IoTeX Team. IoTeX A Decentralized Network for Internet of Things Powered by a Privacy-Centric Blockchain. 2018. Available online: https://iotex.io/research (accessed on 15 July 2022).
- Labs, S. Storj: A Decentralized Cloud Storage Network Framework. 2018. Available online: https://www.storj.io/storj.pdf (accessed on 15 July 2022).
- Cao, S.; Zhang, G.; Liu, P.; Zhang, X.; Neri, F. Cloud-assisted secure eHealth systems for tamper-proofing EHR via blockchain. Inf. Sci. 2019, 485, 427–440. [Google Scholar] [CrossRef]
- Sey, C.; Lei, H.; Qian, W.; Li, X.; Fiasam, L.D.; Sha, R.; He, Z. FIRMBLOCK: A Scalable Blockchain-Based Malware-Proof Firmware Update Architecture With Revocation For IoT Devices. In Proceedings of the 2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP), Chengdu, China, 17–19 December 2021; pp. 134–140. [Google Scholar] [CrossRef]
- Sey, C.; Li, X.; Qian, W.; Fiasam, L.D.; Kodjiku, S.L.; Baffour, A.A.; Adjei-Mensah, I. TRADEBLOCK: Blockchain Based System For Online Classified Advertisement Industries. In Proceedings of the 2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP), Chengdu, China, 17–19 December 2021; pp. 127–133. [Google Scholar] [CrossRef]
- Elhabob, R.; Zhao, Y.; Sella, I.; Xiong, H. Efficient Certificateless Public Key Cryptography with Equality Test for Internet of Vehicles. IEEE Access 2019, 7, 68957–68969. [Google Scholar] [CrossRef]
- Boneh, D.; Lynn, B.; Shacham, H. Short Signatures from the Weil Pairing. In Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, 9–13 December 2001; pp. 514–532. [Google Scholar]
- Hyperledger. Hyperldger Raft. Available online: https://hyperledger-fabric.readthedocs.io/en/release-2.2/orderer/ordering_service.html (accessed on 20 February 2022).
- Caliper, H. Hyperledger Caliper Architecture. Available online: https://hyperledger.github.io/caliper/v0.5.0/getting-started/#architecture (accessed on 20 March 2022).
- Górski, T. The k + 1 Symmetric Test Pattern for Smart Contracts. Symmetry 2022, 14, 1686. [Google Scholar] [CrossRef]
Description | Symbol | Running Time (ms) |
---|---|---|
Encrypt message by certificateless encryption | 2.3615 | |
Exponentiation in | 0.987 | |
Bilinear pairing operation | 3.038 | |
Hash function | 0.0003 | |
Point multiplication | 0.0193 | |
Point addition | 0.081 | |
Open Function Transaction on Blockchain | 304.42 | |
Query Function Transaction on Blockchain | 5.005 |
Nodes | Message Exchanges | Data Outsourcing/Storage |
---|---|---|
RSU | ≈ 14.5056 ms | ≈ 304.4203 ms |
IoV node | ≈ 3.4249 ms | ≈ 306.821 ms |
Cloud Server | ≈ 11.4682 ms | None |
KGC | ≈ 3.4246 ms | ≈ 304.4203 ms |
Models | Nodes | Message Exchanges | Data Outsourcing/Storage |
---|---|---|---|
[15] | RSU | ≈ 0.2822 ms | |
IoV node | ≈ 0.1006 ms | ||
KGC | ≈ 0.1006 ms | ||
[16] | RSU | ≈ 1.986 ms | ≈ 304.4203 ms |
IoV node | ≈ 1.986 ms | ||
KGC/CA | ≈ 6.9802 ms | ≈ 304.4203 ms | |
[21] | RSU | ≈ 13.0679 ms | |
IoV node | ≈ 3.4249 ms | ||
KGC | ≈ 13.0679 ms | ||
Ours | RSU | ≈ 14.5056 ms | ≈ 304.4203 ms |
IoV node | ≈ 3.4249 ms | ≈ 306.821 ms | |
KGC | ≈ 3.4246 ms | ≈ 304.4203 ms |
Component | Description |
---|---|
CPU | Intel(R) Core (TM) i9-10900K CPU @ 3.70GHz 3.70 GHz |
Memory | 32 GB |
Operating System | Ubuntu 20.04.4 LTS |
Node.js | v14 LTS |
Docker | Version 20.10.11 |
CLI Tool | Node-gyp |
Fabric | V2.2 |
Models | Metrics | ||||||||
---|---|---|---|---|---|---|---|---|---|
Blockchain Based | Access Control | Replay Attack Resistance | Tamper-Proof Audit | Forgery Attacks Resistance | Certificateless PKI | Key Revocation Mechanism | Collusion-Resisting Attack | Warrant-Based Data Outsourcing | |
[15] | NO | YES | YES | NO | NO | YES | YES | NO | NO |
[16] | YES | NO | YES | NO | YES | NO | YES | YES | NO |
[17] | YES | YES | NO | NO | YES | NO | NO | YES | NO |
[18] | YES | YES | NO | NO | YES | NO | NO | YES | NO |
[19] | YES | NO | YES | YES | YES | NO | YES | NO | NO |
[20] | YES | NO | YES | YES | YES | NO | YES | YES | NO |
[21] | YES | YES | YES | NO | NO | YES | YES | NO | NO |
[22] | YES | NO | YES | YES | YES | NO | YES | YES | NO |
[23] | YES | YES | YES | YES | NO | NO | YES | NO | NO |
[24] | YES | NO | NO | YES | YES | NO | NO | YES | NO |
Ours | YES | YES | YES | YES | YES | YES | YES | YES | YES |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Sey, C.; Lei, H.; Qian, W.; Li, X.; Fiasam, L.D.; Kodjiku, S.L.; Adjei-Mensah, I.; Agyemang, I.O. VBlock: A Blockchain-Based Tamper-Proofing Data Protection Model for Internet of Vehicle Networks. Sensors 2022, 22, 8083. https://doi.org/10.3390/s22208083
Sey C, Lei H, Qian W, Li X, Fiasam LD, Kodjiku SL, Adjei-Mensah I, Agyemang IO. VBlock: A Blockchain-Based Tamper-Proofing Data Protection Model for Internet of Vehicle Networks. Sensors. 2022; 22(20):8083. https://doi.org/10.3390/s22208083
Chicago/Turabian StyleSey, Collins, Hang Lei, Weizhong Qian, Xiaoyu Li, Linda Delali Fiasam, Seth Larweh Kodjiku, Isaac Adjei-Mensah, and Isaac Osei Agyemang. 2022. "VBlock: A Blockchain-Based Tamper-Proofing Data Protection Model for Internet of Vehicle Networks" Sensors 22, no. 20: 8083. https://doi.org/10.3390/s22208083
APA StyleSey, C., Lei, H., Qian, W., Li, X., Fiasam, L. D., Kodjiku, S. L., Adjei-Mensah, I., & Agyemang, I. O. (2022). VBlock: A Blockchain-Based Tamper-Proofing Data Protection Model for Internet of Vehicle Networks. Sensors, 22(20), 8083. https://doi.org/10.3390/s22208083