Journal
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
Volume 68, Issue 3, Pages 2906-2920Publisher
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TVT.2019.2894944
Keywords
Internet of Vehicles; blockchain; reputation management; delegated proof-of-stake; contract theory; security
Categories
Funding
- WASP/NTU [M4082187 (4080)]
- Singapore MOE [2017-T1-002-007 RG122/17]
- MOE [MOE2014-T2-2-015 ARC4/15, NRF2015-NRF-ISF001-2277]
- EMA Energy Resilience [NRF2017EWT-EP003-041]
- National Research Foundation of Korea (NRF) - Korean Government [2017R1A2B2003953, 2014R1A5A1011478]
- National Research Foundation of Korea [2017R1A2B2003953, 2014R1A5A1011478] Funding Source: Korea Institute of Science & Technology Information (KISTI), National Science & Technology Information Service (NTIS)
Ask authors/readers for more resources
In the Internet of Vehicles (IoV), data sharing among vehicles is critical for improving driving safety and enhancing vehicular services. To ensure security and traceability of data sharing, existing studies utilize efficient delegated proof-of-stake consensus scheme as hard security solutions to establish blockchain-enabled IoV (BIoV). However, as the miners are selected from miner candidates by stake-based voting, defending against voting collusion between the candidates and compromised high-stake vehicles becomes challenging. To address the challenge, in this paper, we propose a two-stage soft security enhancement solution: 1) miner selection and 2) block verification. In the first stage, we design a reputation-based voting scheme to ensure secure miner selection. This scheme evaluates candidates' reputation using both past interactions and recommended opinions from other vehicles. The candidates with high reputation are selected to be active miners and standby miners. In the second stage, to prevent internal collusion among active miners, a newly generated block is further verified and audited by standby miners. To incentivize the participation of the standby miners in block verification, we adopt the contract theory to model the interactions between active miners and standby miners, where block verification security and delay are taken into consideration. Numerical results based on a real-world dataset confirm the security and efficiency of our schemes for data sharing in BIoV.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available