Next Article in Journal
On a New Geometric Constant Related to the Euler-Lagrange Type Identity in Banach Spaces
Next Article in Special Issue
Grid Frequency and Amplitude Control Using DFIG Wind Turbines in a Smart Grid
Previous Article in Journal
Assessing the Current Situation of the World Wheat Market Leadership: Using the Semi-Parametric Approach
Previous Article in Special Issue
Common-Ground-Type Single-Source High Step-Up Cascaded Multilevel Inverter for Transformerless PV Applications
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Enhanced IoV Security Network by Using Blockchain Governance Game

by
Song-Kyoo (Amang) Kim
School of Applied Sciences, Macao Polytechnic Institute, R. de Luis Gonzaga Gomes, Macao
Mathematics 2021, 9(2), 109; https://doi.org/10.3390/math9020109
Submission received: 8 December 2020 / Revised: 28 December 2020 / Accepted: 29 December 2020 / Published: 7 January 2021

Abstract

:
This paper deals with the design of the secure network in an Enhanced Internet of Vehicles by using the Blockchain Governance Game (BGG). The BGG is a system model of a stochastic game to find best strategies towards preparation of preventing a network malfunction by an attacker and the paper applies this game model into the connected vehicle security. Analytically tractable results for decision-making parameters enable to predict the moment for safety operations and to deliver the optimal combination of the number of reserved nodes with the acceptance probability of backup nodes to protect a connected car. This research helps for whom considers the enhanced secure IoV architecture with the BGG within a decentralized network.

1. Introduction

A connected car transfers data to others based on vehicle-to-vehicle (V2V) communication technologies and it typically means that cars are equipped for Internet access usually with wireless local area networks (WLANs). Cars have been evolved to support enhanced driving aids for full autonomous driving by using the artificial intelligence (AI) and its maneuvers [1]. The Internet of Vehicles (IoV) is a superset of a connected car which contains sensors, GPS, entertainment systems, brakes and throttles. The IoV is a moving network which is made up of IoT enabled cars through the usage of modern electronics and the integrated information to maintain traffic flow. Cars have evolved from mechanical transportation to the smart vehicles with varieties of communication and sensing capabilities. The IoV has developed over time from the conventional vehicular networks that connect the smart vehicles to the smart city with the development of Internet of Things (IoT) [2]. The IoV is designed to perform more effective fleet management and accident avoidance [3,4]. An ad-hoc network is applied to connect IoT components as nodes in a connected car [4]. Adapting the Blockchain technologies into IoV networks brings huge attentions from researchers and developers because of decentralization, anonymity, and trust characteristics [5,6,7]. Additionally, data sharing among vehicles is critical to improve driving safety and to enhance vehicular services in IoV networks. The studies in the security and the tractability of data sharing indicate that utilizing consensus schemes are as hard as establishing Blockchain enabled IoV (BIoV) [6]. Some other studies have proposed a decentralized trust management system for vehicle data credibility assessment using Blockchain with joint Proof-of-Work (PoW) and Proof-of-Stake (PoS) consensus schemes [7,8,9]. Vehicle manufacturers Volkswagen and Ford have filed the patents that enable secure inter-vehicle communication through Blockchain technologies [10,11]. In the view point of the IoT securities, several studies are dealing with similar topics regarding the Blockchain based IoT securities [6,12,13,14]. Most studies are surveys [12] but none of them are mathematically approached for developing a network architecture for a Blockchain based IoT [13,14].
The Enhanced BIoV (EBIoV) network, which has been conceptually introduced on public [15], is reloaded in this paper. The EBIoV is an IoV network architecture based on the Edge computing [16,17] with enabling the Blockchain Governance Game (BGG) [18,19] for improving network securities [15]. Although a public Blockchain is designed for empowering their decentralization [20], current public Blockchain based services including cybercurrencies are not fully safe from attacks especially based on the mining computation [18]. Hence, a private Blockchain which is a permission-based Blockchain [20] has been proposed for business or government usage [21,22]. Many peoples are interested in a private Blockchain technology even in a consortium Blockchain technology [20] but they are not comfortable with a level of control compared to the offered control level in a public decentralized network. More importantly, the control levels in a Blockchain network should be balanced to retain the strengths of a decentralized network to avoid all security matters what atypical centralized network contains [18]. By adapting the BGG, we do not need to concern about the computation power for mining (i.e., generating ledgers) without losing the strength from fully decentralized networks. A conventional BIoV model could be applied to trace the provenance of spare parts back through every step of the supply chain to its original manufacture date and location [15,23]. Car manufacturers concern that service centers and garages are knowingly fitting counterfeit spare parts to their vehicles of customers. Counterfeit parts shall damage a brand reputation when the parts become causes of accidents. Identifying genuinity of car parts by using the EBIoV has been studied and the network within car components shall be considered as an Edge network [16,17,24].
The Fog computing pushes information to the neighborhood area network amount of community knowledge at an IoT gateway and it could be combined with the Blockchain technology for enhancing security matters [17]. In the EBIoV network architecture, diagnosis equipment in car service centers is in a Fog network and the database in a headquarter (HQ) is positioned the level of the cloud network (see Figure 1). This paper provides the mathematical functional of the EBIoV network architecture for enhancing security particularly from counterfeits of car parts. The EBIoV security regarding counterfeits of car parts has already been studied [15] and this research is focused on avoiding conventional IoV attack in a decentralized network. The BGG is the game model that an attacker and a defender compete each other by building blocks in private and public chains as a sequence of stages to generate ledgers [18,19]. The historical strategies and the probabilistic stage transitions can be observed by both an attacker and a defender. Hence, the interaction between an attacker and a defender can be modeled as a stochastic game [18,19,25]. This joint functional between two players of the predicted time of the first observed threshold to cross the half of the total nodes along with values of each component upon this time. The defender (a car company) could take a preliminary action (i.e., request to add honest nodes as a safety mode) for protecting the Blockchain in a vehicle.
This paper is organized as follows: Section 2 presents the Enhanced BIoV (EBIoV) network and it describes how to construct EBIoV architecture by using the BGG model which is a stochastic game between an attacker and a defender. Once a dishonest blocks are generated, the model predicts how many blocks will be generated and finds the moment when more than the half of nodes are covered by an attacker. The framework for setting up the mixed strategic game is provided in Section 3. The optimal values of an EBIoV network for the memoryless case are analytically calculated in Section 4. The memoryless property implies that a defender does not spend additional resources to store past information. Lastly, Section 5 provides the conclusion of the paper.

2. Stochastic Game for BIOV Network Security

The Blockchain Governance Game (BGG) [18,19] has been adapted the BIoV network architecture to defend against the attacks [15]. This system model consists of one attacker (i.e., the miner which intends to fork a private chain) and one defender (the miner which honestly mines on the public chain) [25]. This explicit function (Theorem BGG-1) from the BGG (Blockchain Governance Game) gives the predicted moment of one step prior to an attack [18].

2.1. Enhanced IoV Network Structure

The proposed BIoV network structure [15] is explored in detail in this section. The components in a vehicle, the equipment of a service center and a HQ database are hooked up as one Blockchain network (see Figure 2). Each smart components in a connected car could mechanically or electronically generate random values and share these values with other smart components. Tires, brakes, an engine, a transmitter in a car could be the smart components which shall be capable to communicate with other components and to construct ledgers. Connected car components beside a CPU (smart controller) generate values based on their mechanical actions and these generated values are sharing with all other components including assigned service centers and a company headquarter. Each values from car components is unique and randomly generated. And sharing these generated number is a transaction in a conventional Blockchain network. A service center has a database which contains information from cars which are served by service centers. The unique value based on a registered car database are generated and sharing with other nodes including a company headquarter.
Unlike conventional Blockchain networks, an EBIoV network does not have any reward system which requires a heavy computational power for being a miner to generate ledgers. All nodes even in a service center and a HQ have same contribution power and the equal chance to be a miner. For instance, a node of a CPU is same as nodes of other car parts although a CPU controls other car parts. The verifiable random function (VRF) which maps inputs to verifiable pseudorandom outputs is applied to select a node for generating ledgers [26,27]. The VRF has been applied to perform secret cryptographic solution to select committees to run the consensus protocol [28,29]. By applying the VRF, all nodes in the EBIoV network shall have the equal chance to become a miner who generates ledgers without requiring heavy computational powers. The mechanism for protecting an EBIoV network is exactly same as the mechanism of the BGG. The governance in a Blockchain network is followed by the decision making parameters which include the prior time before catching more than half of total nodes by an attacker. Any action shall not be taken until one step prior to the time when it passes the first passage time. It still has the chance that all nodes are governed by an attacker although an attacker catches less than the half of nodes.

2.2. BGG Model for Enhanced BIoV Network

To apply the BGG model into the BIoV network structure, the antagonistic game of two players (called “A” and “H”) are introduced to describe the Blockchain network in a connected car as a defender and an attacker. Both players compete to build the blocks either for honest or false nodes. Let ( Ω , F Ω , P ) be probability space F A , F H , F τ F Ω be independent σ -subalgebras. Suppose:
A : = k 0 X k ε s k , s 0 = 0 < s 1 < s 2 < , a . s .
H : = j 0 Y j ε t j , t 0 = 0 < t 1 < t 2 < , a . s .
are F A -measurable and F H -measurable marked Poisson processes ( ε w is a point mass at w) with respective intensities λ a and λ h . These two values are related with the computing performance for generating blocks for attackers and honest nodes in the blockchain network. They will represent the actions of player A (an attacker) and H (a defender). Player A builds the blocks with fake information and sustain respective build the blocks of magnitudes X 1 , X 2 , formalized by the process. Similarly, player H generates the blocks with authorized information with the blocks of magnitudes Y 1 , Y 2 , Both players compete each other to build their blocks (either genuine or fake). The processes A and H are specified by their transforms
E g A s = e λ a s g 1 , E z H t = e λ h t z 1 .
The game is observed at random times in accordance with the point process and it is equivalent with the duration of the PoW (Proof-of-Work) completion in a Blockchain based network:
T : = i 0 ε τ i , τ 0 > 0 ) , τ 1 , ,
which is assumed to be delayed renewal process. The observation process could be formalized as
A τ H τ : = k 0 X k , Y k ε τ k ,
and it is with position dependent marking and with X k and Y k being dependent with the notation
Δ k : = τ k τ k 1 , k = 0 , 1 , , τ 1 = 0 ,
and
γ g , z = E g X k · z Y k , g 1 , z 1 .
By using the double expectation,
γ g , z = δ λ A 1 g + λ H 1 z ,
γ 0 g , z = δ 0 λ A 1 g + λ H 1 z ,
where
δ θ = E e θ Δ 1 , δ 0 θ = E e θ τ 0 ,
are the magical transform of increments Δ 1 , Δ 2 , . This game contains a stochastic process A τ H τ which describes the evolution of a conflict between players A and H known to an observation process T = τ 0 , τ 1 , . The process ends when on the k-th observation epoch τ k , the collateral building blocks to player H (or A) exceeds more than the half of the total nodes M in the regular operation or player A exceeds more than M 2 + B nodes under the safety mode. To further formalize the game, the exit indexes [18] are as follows:
ν : = inf k : A k = A 0 + X 1 + + X k M 2 + B ,
μ : = inf j : H j = H 0 + Y 1 + + Y j M 2
where B is the number of the reserved honest nodes from a headquarter (HQ) which is depends on the availability from the HQ. Since, an attacker is win at time τ ν , otherwise an honest node generates the correct blocks to share with others nodes. We are targeting the confined game in the view point of player A. The joint functional of the BIoV network model is as follows:
Φ ζ ; M 2 + B , M 2 = E E ζ ν · g 0 A ν 1 · g 1 A ν · z 0 H ν 1 · z 1 H ν 1 ν < μ | B ,
ζ 1 , g 0 1 , g 1 1 , z 0 1 , z 1 1 ,
where M indicates the total number of nodes (or ledgers) in the BIoV network for each car (see Figure 2). The BGG-1 Theorem [18] establishes an explicit formula Φ ξ , M 2 + B , M 2 and the functional (13) satisfies following expression:
Φ ζ ; M 2 + B , M 2 = D u , v M 2 + B , M 2 Γ 0 1 Γ 0 + ξ · γ 0 1 ξ γ Γ 1 Γ
γ : = γ g 0 g 1 u , z 0 z 1 v , γ 0 : = γ 0 g 0 g 1 u , z 0 z 1 v ,
Γ : = γ g 1 u , z 1 v , Γ 0 : = γ 0 g 1 u , z 1 v ,
Γ 1 : = γ g 1 , z 1 v , Γ 0 1 : = γ 0 g 1 , z 1 v .
Additionally, the operator D ( x , y ) ( m , n ) in (14) is defined as follows [18]:
D x , y m , n = 1 m ! · n ! lim x , y 0 m n x m y n 1 1 x 1 y , m , n 0 , 0 , otherwise , | | x | | < 1 , | | y | | < 1 ,
then we can find
g m , n = D x , y m , n D m , n g m , n ,
where
D m , n g m , n x , y : = 1 x 1 y m 0 n 0 g m , n x m y n , | | x | | < 1 , | | y | | < 1 .
It is noted that both operators D , D are originated from the first exceed theory [30,31]. We can find the PGFs (probability generating functions) of the exit index ν from (14):
E ζ ν = E Φ ζ ; M 2 + B , M 2 | B | g 0 , g 1 , z 0 , z 1 1

3. Strategies in Blockchain Governance Game

Let us consider a two-person mixed strategy game which is played by player H as a defender and player A as an attacker. Player H, who is mostly a car company in an EBIoV network, has two strategies at the observation moment when one step prior to complete for generating alternative chains with fake information. Basically, player H has the following strategies (i.e., operation modes): (1) Regular−regular operations which implicates that the BIoV network in a connected car are running as usual, and (2) Safety−the network is running under the safety mode for avoiding attacks by adding honest nodes from a HQ. Alternatively, player A (an attacker) might succeed to catch the blocks or fail to catch the honest nodes. Therefore, the response of player A would be either “Not Burst” or “Burst.” Let us assume that the cost for reserving additional honest nodes is c b where b is a set of the factors that related with the reserved nodes from a HQ and these related factors could be one or multiple values.
The headquarter of a car company reserves a certain portion of nodes for protecting the BIoV network integrity. If an attacker succeeds to generate alternative blocks within car parts, the network in a car is burst and the whole car value V is lost. It still has a chance to burst a car network although a defender (or a car company) adds honest nodes before catching blocks of an attacker. In this case, the lost cost includes not only a full car value but also a cost for additional reserved honest nodes. The normal form of a game is as follows:
. Players : N = A , H , . Strategy sets : s a = NotBurst , Burst , s h = Regular , Safety
Based on the above conditions, the general cost matrix at τ ν 1 when is the prior time just before bursting could be composed as shown in Table 1 where q s h is the probability of bursting a blockchain network (i.e., an attacker wins a game) and it depends on a strategic choice of player H:
q s h = E 1 A ν M 2 , s h = Regular , E E 1 A ν M 2 + B | B , s h = Safety .
It is noted that the cost for reserved nodes (i.e., the cost of “Safety” operation strategy by player H) should be smaller than the whole cost of the other strategy. Additionally, the number of reserved honest nodes from the HQ is random and this variable B shall have a certain probability distribution. Let us consider the number of reserved honest nodes has the binomial distribution with the success probability ρ and the number of trial n. The PGF of the binomial distribution is as follows:
σ n = E b B = ρ b 1 ρ n .
The optimal number of reserved nodes n * which supported by the HQ depends on the cost function and the optimal value ρ * is the acceptance rate when the reserved honest nodes are requested to a HQ. The best combination n * , ρ * could be found as follows:
n * , ρ * = inf n , ρ 0 : S Reg q 0 S Safe n , ρ ,
where, at the moment τ ν 1 ,
S Reg q 0 = V · q 0 ,
S Safe n , ρ = c n , ρ 1 q η 1 + c n , ρ + V q n , ρ 1 ,
q 0 = E 1 A ν N 2 ,
q n , ρ 1 = E E 1 A ν N 2 + B | B .
We would like to design the BGG adapted BIoV network that is capable to take the safety operation at the decision making moment τ ν 1 . The governance of the Blockchain network is driven by the BGG decision making parameters. It is noted that no safety actions are required until the time τ ν 1 . Additionally, it still has the chance that all nodes are governed by an attacker if the attacker catches more than the half of nodes at τ ν 1 (i.e., A ν 1 M 2 ). If the attacker catches less than half of all nodes at τ ν 1 (i.e., A ν 1 < M 2 ), then the defender could run the safety mode to avoid the burst at τ ν . The total cost for developing the enhanced BIoV network is as follows:
S q 0 ; n , ρ Total = E S Safe n , ρ · 1 A ν 1 < M 2 + S Reg q 0 · 1 A ν 1 M 2 = c n , ρ 1 q n , ρ 1 + c n , ρ + n ρ q n , ρ 1 p A 1 + B · q 0 1 p A 1
where
p A 1 = P A ν 1 < M 2 = k = 0 M 2 P A ν 1 = k .

3.1. Memoryless BGG Observation Process for EBIoV Networks

It is assumed that the observation process has the memoryless properties. This might be a special condition but very practical for actual implementation of a Blockchain Governance Game [18]. It implies that a defender does not spend additional cost for storing past information. After building a cost function of a BGG network, we could find explicit solutions of q 0 , p A 1 and the moment of decision making after finding the closed form (PGF) of the first exceed index ν , each probability (generating function) of the number of blocks at the moment τ ν i . e . , E g 1 A ν and τ ν 1 i . e . , E g 0 A ν 1 . The functional D is defined on the space of all analytic functions at 0. Recalling from (7)–(10), we have:
γ g , z = δ λ a 1 g + λ h 1 z = γ a g · γ h z ,
γ a g = δ λ a 1 g , γ h z = δ λ h 1 z ,
and
γ 0 g , z = δ 0 λ a 1 g + λ h 1 z = γ a 0 g · γ h 0 z ,
γ a 0 g = E g A 0 = δ 0 λ a 1 g ,
γ h 0 z = E z H 0 = δ 0 λ h 1 z ,
from (15)–(17),
γ = γ a · γ h : = γ a g 0 g 1 u γ h z 0 z 1 v ,
γ 0 = γ a 0 · γ h 0 : = γ a 0 g 0 g 1 u γ h 0 z 0 z 1 v ,
Γ : = γ a g 1 u γ h z 1 v , Γ 0 : = γ a 0 g 1 u γ h 0 z 1 v ,
Γ 1 : = γ a g 1 γ h z 1 v , Γ 0 1 : = γ a 0 g 1 γ h 0 z 1 v .
The exit index (aka, the first exceed level index) is the most important factor to be fully analyzed because the decision making parameters including the marginal mean of τ ν 1 , A ν and A ν 1 could be calculated easily once the exit index is explicitly determined from (18) and (37)–(40):
E ζ ν : = L 1 + L 2 L 3
where
L 1 = D u , v M 2 + B , M 2 γ h 0 v γ a 0 u γ h 0 v ,
L 2 = D u , v M 2 + B , M 2 ζ · γ a 0 u γ h 0 v γ h v 1 ζ γ a u γ h v ,
L 3 = D u , v M 2 + B , M 2 ζ · γ a 0 u γ h 0 v γ a u γ h v 1 ζ γ a u γ h v .
Since the observation process has the memoryless properties, the inter-arrival time for observation is exponentially distributed and the functionals (37)–(40) could be reconstructed as follows:
γ a 0 u = β a 0 1 α a 0 · u , γ a u = β a 1 α a · u , γ h 0 v = β h 0 1 α h 0 · v , γ h v = β h 1 α h · v ,
β a 0 = 1 1 + δ 0 ˜ λ a , α a 0 = δ 0 ˜ · λ a 1 + δ 0 ˜ · λ a , β a = 1 1 + δ ˜ · λ a , α a = δ 0 ˜ · λ a 1 + δ ˜ · λ a ,
β h 0 = 1 1 + δ 0 ˜ · λ h , α h 0 = δ 0 ˜ · λ h 1 + δ 0 ˜ · λ h , β h = 1 1 + δ ˜ · λ h , α h = δ 0 ˜ · λ h 1 + δ ˜ · λ h ,
where
δ 0 ˜ = E τ 0 , δ ˜ = E Δ k .
From (42),
L 1 = D u , v M 2 + B , M 2 γ h 0 v D u , v M 2 + B , M 2 γ a 0 u γ h 0 v = β h 0 1 α h 0 M 2 + 1 1 α h 0 1 β A 0 1 α a 0 M 2 + B + 1 1 α a 0
and, from (43),
L 2 = D u , v M 2 + B , M 2 ζ · γ a 0 u γ a 0 v γ h v 1 ζ γ a u γ h v = n 0 ζ n + 1 β a 0 · β a n · j = 0 M 2 + B α a j ψ n 1 a j · β h 0 · β h n + 1 · k = 0 M 2 α h k ψ n h k
and, from (44),
L 3 = ζ β a 0 β h 0 β a β h n 0 ζ β a β h n Ξ n a M 2 + B · Ξ n h M 2 = n 0 ζ n + 1 β a 0 · β a n + 1 · j = 0 M 2 + B α a j ψ n a j · β h 0 · β h n + 1 · k = 0 M 2 α h k ψ n h k
where
Ξ n a m = j = 0 m α a j ψ n a j , Ξ n h m = k = 0 m α h k ψ n h k ,
ψ n a j = i = 0 j n + i i α a 0 α a i , ψ n h k = i = 0 k n + i i α h 0 α h i .
From (49)–(53), the PGF of the exit index ν satisfies the following formula from the lemma in the BGG [18]:
E ζ ν = β h 0 1 α h 0 M 2 + 1 1 α h 0 1 β A 0 · E 1 α a 0 M 2 + B + 1 1 α a 0 + n 0 ζ n + 1 β a 0 β h 0 β h β a β h n Ξ n h M 2 · E Ξ n 1 a M 2 + B Ξ n a M 2 + B β a
and
E ν = β a 0 β h 0 β h n 1 n β a β h n Ξ n 1 h M 2 E Ξ n 2 a M 2 + B Ξ n 1 a M 2 + B β a
where
Ξ 1 a m = 0 , Ξ 2 a m = 0 , Ξ 1 h m = 0 .

3.2. Marginal Means of EBIoV Decision Making Parameters

In the EBIoV network, conventional decision making parameters are ν , τ ν 1 , A ν and A ν 1 . Although all decision making parameters could be fully analyzed, using a marginal mean of each parameter is occasionally more efficient than finding the explicit PGFs of parameters. The marginal means of EBIoV decision making parameters could be found as follows:
E ν = ζ E Φ ζ ; M 2 + B , M 2 | B | ζ , g 0 , g 1 , z 0 , z 1 ) 1 ,
E τ ν 1 = E τ 0 + E Δ 1 E ν 1 ,
E A ν = E A 0 + E [ ν 1 ] E X k ,
E A ν 1 = E A 0 + E [ ν 2 ] E X k .
Recalling from (23), the probability of bursting a Blockchain network (i.e., an attacker wins a game) under the memoryless properties becomes a Poisson compound process:
q s h = k > M 2 E 1 A ν = k , s h = Regular ,
or
q s h = E k > M 2 + B E 1 A ν = k | B , s h = Safety ,
where
E 1 A ν = k = E λ a τ ν k ! · e λ a τ ν .

4. The EBIoV Optimization Practice

This section deals with the BIoV network security optimization practice in a connected car. The strategy for protecting the EBIoV network is supporting additional nodes to give the less chance that an attacker catches blocks with false control requests. The example in this paper is targeting a connected car which consists 16 IoV components in a BIoV network (15 nodes from car parts and 1 node from a service center) and the estimated car value is around 50,000 USD (see Table 2).
It is noted that the values on Table 2 are artificially made up for demonstration purposes only. Since the BGG adapted IoV network (EBIoV) has been analytically solved, finding optimal values of a cost function and calculating a probability distribution of a model are straight forward. However, software implementation by using a programming language is still required for solving a LP (Linear Programming) problem. Based on the above conditions, a LP model could be described as follows from (25) and (28):
Objective : G = m i n S n , ρ Total
Subject to : n c n , ρ V · q 0 c n , ρ ;
From (28), the total cost S n , ρ T o t a l is as follows:
S n , ρ T o t a l = c n , ρ 1 q n , ρ 1 + c n , ρ + V q n , ρ 1 p A 1 + V q 0 · 1 p A 1
where
p A 1 = P A ν 1 < M 2 P A ν < M 2 λ a δ ˜ = k = 0 M 2 λ a δ ˜ λ a δ 0 ˜ + E ν 1 δ ˜ k k ! · e λ a δ 0 ˜ + E ν 1 δ ˜ ,
q 0 1 k = 0 M 2 λ a δ 0 ˜ + E ν 1 δ ˜ k k ! · e λ a δ 0 ˜ + E ν 1 δ ˜ ,
q n , ρ 1 = j = 0 n k M 2 + B + j λ a δ 0 ˜ + E ν 1 δ ˜ k ! · e λ a δ ˜ + E ν 1 δ ˜ P j ,
P j = n j ρ j 1 ρ n j .
The total cost S n , ρ Total could be minimized by the given parameter set n , ρ and the parameter set n * , ρ * is the optimal combination of an acceptance rate and the number of total backup nodes which are supported from the HQ. The below illustration in Figure 3 is the conventional graph that shows the optimal result of the BGG based BIoV (EBIoV) network based on the given initial conditions in Table 2.
It is noted that the total cost for reserving backup nodes should be more than the car value when an EBIoV network is burst. Hence, the limitation of the success probability for adding nodes is as follows:
V · q 0 c n , ρ · B M 1 1 ,
where B M is the maximum available reserved nodes per a connected car. According to this demonstration (based on Table 2), the optimal cost is 1700 USD (per a car) when the defender reserves 4 additional nodes per each car with the 82.6% acceptance rate for managing the risk from attackers (i.e., n * = 4 , ρ * = 0.826 ). The moment of requesting the additional nodes will be the time τ ν 1 when is one step prior to the moment when an attacker catches more than the half of whole blocks.

5. Conclusions

This paper establishes the enhanced Blockchain based IoV network architecture by bringing a theoretical model in stochastic modeling. The Enhanced Blockchain enabled Internet of Vehicles (EBIoV) is an advanced secure IoT network architecture for protecting a connected car from attackers. This new architecture has been designed for a decentralized network by adapting the Blockchain Governance Game (BGG) to improve the connected car security. The BGG is a mathematically proven game model to develop optimal defense strategies to protect systems from attackers. The practical case in the paper demonstrates how an EBIoV network could be implemented for connected car securities. The EBIoV network is the first research that applies a BGG model into the IoV security domain. The BGG model shall be extended to various Blockchain based cybersecurity areas including IoT security and secured decentralized service network design.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

There are no available data to be stated.

Acknowledgments

Special thanks to the Guest Editor, Nicu Bizon, who guides the author to submit the proper topic of the journal and also thankful to the referees whose comments are very constructive.

Conflicts of Interest

The author declares no conflict of interest.

References

  1. Rouse, M. Internet of Vehicles. 2018. Available online: https://whatis.techtarget.com/definition/Internet-of-Vehicles (accessed on 1 May 2019).
  2. Kim, S.; Shrestha, R. Internet of Vehicles, Vehicular Social Networks, and Cybersecurity. In Automotive Cyber Security; Springer: Singapore, 2020; pp. 149–181. [Google Scholar]
  3. Dandala, T.T.; Krishnamurthy, V.; Alwan, R. Internet of Vehicles (IoV) for Traffic Management. In Proceedings of the 2017 International Conference on Computer, Communication and Signal Processing (ICCCSP), Chennai, India, 10–11 January 2017; pp. 1–4. [Google Scholar]
  4. Hamid, U.Z.A.; Zamzuri, H.; Limbu, D.K. Internet of Vehicle (IoV) Applications in Expediting the Implementation of Smart Highway of Autonomous Vehicle: A Survey. In Performability in Internet of Things; Springer: Cham, Germany, 2018; pp. 137–157. [Google Scholar]
  5. Dorri, A.; Steger, M.; Kanhere, S.S.; Jurdak, R. BlockChain: A Distributed Solution to Automotive Security and Privacy. IEEE Commun. Mag. 2017, 55, 119–125. [Google Scholar] [CrossRef] [Green Version]
  6. Kang, J.; Xiong, Z.; Niyato, D.; Ye, D.; In Kim, D.; Zhao, J. Towards Secure Blockchain-enabled Internet of Vehicles: Optimizing Consensus Management Using Reputation and Contract Theory. IEEE Trans. Veh. Technol. 2019, 68, 2906–2920. [Google Scholar] [CrossRef] [Green Version]
  7. Yang, Z.; Yang, K.; Lei, L.; Zheng, K.; Leung, V.C. Blockchain-based decentralized trust management in vehicular networks. IEEE Internet Things J. 2018, 6, 1495–1505. [Google Scholar] [CrossRef]
  8. Steger, M.; Dorri, A.; Kanhere, S.S.; Römer, K.; Jurdak, R.; Karner, M. Secure Wireless Automotive Software Updates using Blockchains: A Proof of Concept. In Advanced Microsystems for Automotive Applications; Springer: Cham, Germany, 2017; pp. 137–149. [Google Scholar]
  9. Cebe, M.; Erdin, E.; Akkaya, K.; Aksu, H.; Uluagac, S. Block4forensic: An integrated lightweight blockchain framework for forensics applications of connected vehicles. IEEE Commun. Mag. 2018, 56, 50–57. [Google Scholar] [CrossRef] [Green Version]
  10. Blockchain News. Available online: https://www.ccn.com/volkswagen-seeks-patent-for-inter-vehicular-blockchain-communications-system/ (accessed on 1 May 2019).
  11. Haig, S. Ford to Use Cryptocurrency for Inter-Vehicle Communication System. 2018. Available online: https://news.bitcoin.com/ford-cryptocurrency-inter-vehicle-communication-system/ (accessed on 1 May 2019).
  12. Conoscenti, M.; Vetrò, A.; De Martin, J.C. Blockchain for the Internet of Things: A Systematic Literature Review. In Proceedings of the 13th IEEE/ACS International Conference of Computer Systems and Applications, AICCSA 2016, Agadir, Morocco, 29 November–2 December 2016. [Google Scholar]
  13. Restuccia, F. Blockchain for the Internet of Things: Present and Future. Available online: https://arxiv.org/abs/1903.07448 (accessed on 1 May 2019).
  14. Jesus, E.F.; Chicarino, V.R.L.; de Albuquerque, C.V.N.; Rocha, A.A.D.A. Survey of How to Use Blockchain to Secure Internet of Things and the Stalker Attack. Secur. Commun. Netw. 2018, 2018, 9675050. [Google Scholar] [CrossRef] [Green Version]
  15. Kim, S.-K.; Yeun, C.Y.; Damiani, E.; Al-Hammadi, Y.; Lo, N.-W. New Blockchain Adoptation For Automotive Security by Using Systematic Innovation. In Proceedings of the 2019 IEEE Transportation Electrification Conference and Expo Asia-Pacific, Jeju, Korea, 8–10 May 2019; pp. 1–4. [Google Scholar]
  16. Baker, J. Edge Computing—The New Frontier of the Web. Available online: https://hackernoon.com/edge-computing-a-beginners-guide-8976b6886481 (accessed on 1 May 2019).
  17. ERPINNEW. Fog Computing vs Edge Computing. 2017. Available online: https://erpinnews.com/fog-computing-vs-edge-computing (accessed on 1 May 2019).
  18. Kim, S.-K. Blockchain Governance Game. Comput. Ind. Eng. 2019, 136, 373–380. [Google Scholar] [CrossRef] [Green Version]
  19. Kim, S.-K. Strategic Alliance for Blockchain Governance Game. Probab. Eng. Inf. Sci. 2020, 1–17. [Google Scholar] [CrossRef]
  20. Hammoud, A.; Sami, H.; Mourad, A.; Otrok, H.; Mizouni, R.; Bentahar, J. AI, Blockchain, and Vehicular Edge Computing for Smart and Secure IoV: Challenges and Directions. IEEE Internet Things Mag. 2020, 3, 68–73. [Google Scholar] [CrossRef]
  21. Narayanan, A.; Clar, J. Bitcoin’s Academic Pedigree. Mag. Commun. ACM 2017, 60, 36–45. [Google Scholar] [CrossRef]
  22. Weiss, M.; Corsi, E. Bitfury: Blockchain for Government; HBP Case 9—818-031; Harvard University: Cambridge, MA, USA, 2018; 29p. [Google Scholar]
  23. Jones, M. Blockchain for Automotive: Spare Parts and Warranty. 2017. Available online: https://www.ibm.com/blogs/internet-of-things/iot-Blockchain-automotive-industry/ (accessed on 1 May 2019).
  24. Bonomi, F.; Milito, R. Fog Computing and its Role in the Internet of Things. In Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, Helsinki, Finland, 17 August 2012; pp. 13–16. [Google Scholar]
  25. Liu, Z.; Luong, N.C. A Survey on Applications of Game Theory in Blockchain. arXiv 2019, arXiv:1902.10865. [Google Scholar]
  26. Micali, S.; Rabin, M.; Wang, W.; Niyato, D.; Wang, P.; Liang, Y.C.; In Kim, D. Verifiable Random Functions. In Proceedings of the 40th IEEE Symposium on Foundations of Computer Science, New York, NY, USA, 17–19 October 1999; pp. 120–130. [Google Scholar]
  27. Dodis, Y.; Yampolskiy, A. A Verifiable Random Function with Short Proofs and Keys. In Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2005; Volume 3386, pp. 416–431. [Google Scholar]
  28. Gorbunov, S. Algorand Releases First Open-Source Code: Verifiable Random Function. 2018. Available online: https://medium.com/algorand/ (accessed on 1 May 2019).
  29. Zhao, W. MIT Professor’s Blockchain Protocol Nets 62 Million in New Funding. 2018. Available online: https://www.coindesk.com/mit-professors-Blockchain-protocol-nets-62-million-in-new-funding (accessed on 1 May 2019).
  30. Dshalalow, J.H. First Excess Level Process, Advances in Queueing; CRC Press: Boca Raton, FL, USA, 1995; pp. 244–261. [Google Scholar]
  31. Dshalalow, J.H.; Ke, H.-J. Layers of noncooperative games. Nonlinear Anal. 2009, 71, 283–291. [Google Scholar] [CrossRef]
Figure 1. Adapting Fog Computing in Auto Services in Blockchain [15].
Figure 1. Adapting Fog Computing in Auto Services in Blockchain [15].
Mathematics 09 00109 g001
Figure 2. Adapting BGG for the EBIoV architecture [18].
Figure 2. Adapting BGG for the EBIoV architecture [18].
Mathematics 09 00109 g002
Figure 3. Optimization Example for the EBIoV.
Figure 3. Optimization Example for the EBIoV.
Mathematics 09 00109 g003
Table 1. Cost matrix.
Table 1. Cost matrix.
NotBurst 1 q s h Burst q s h
Regular0V
Safety c b c b + V
Table 2. Initial conditions for the cost function.
Table 2. Initial conditions for the cost function.
NameValueDescription
M16 [Component]Total number of the nodes in each BIoV network
V50,000 [USD]Average value of a BIoV enabled connected car
c n , ρ = 25 · n · ρ [USD]Cost for reserving nodes to avoid attacks per each car
E A 0 2 [Blocks]Total number of blocks that changed by an attacker at τ 0 ( = 0 )
B M 32 [Nodes]Maximum number of honest nodes supported from the HQ
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Kim, S.-K. Enhanced IoV Security Network by Using Blockchain Governance Game. Mathematics 2021, 9, 109. https://doi.org/10.3390/math9020109

AMA Style

Kim S-K. Enhanced IoV Security Network by Using Blockchain Governance Game. Mathematics. 2021; 9(2):109. https://doi.org/10.3390/math9020109

Chicago/Turabian Style

Kim, Song-Kyoo (Amang). 2021. "Enhanced IoV Security Network by Using Blockchain Governance Game" Mathematics 9, no. 2: 109. https://doi.org/10.3390/math9020109

APA Style

Kim, S. -K. (2021). Enhanced IoV Security Network by Using Blockchain Governance Game. Mathematics, 9(2), 109. https://doi.org/10.3390/math9020109

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop