Professional Documents
Culture Documents
net/publication/339999202
CITATIONS READS
24 903
3 authors:
Francine Krief
Laboratoire Bordelais de Recherche en Informatique
197 PUBLICATIONS 824 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Léo Mendiboure on 18 March 2020.
Abstract
The vehicular networks are evolving towards a new paradigm, the Internet
of Vehicles (IoV). With Internet of Vehicles, vehicles should be able to com-
municate with each other and with other devices using heterogeneous access
technologies. To enable the advent of Internet of Vehicles, security, privacy,
cooperation and trust establishment in vehicular networks should be consid-
ered. Blockchain (BC), a popular distributed ledger technology, could be a
way to overcome these challenges and to improve the vehicular communica-
tion architecture. That is why the integration of this technology within the
vehicular networks is currently under study. The aim of this survey is to
provide directions for future work in the area of Blockchain-based vehicular
networks. To do so, existing research works based on this technology and
aiming to overcome some vehicular challenges (security, privacy, cooperation,
trust) are presented and compared in terms of scheme, Blockchain solution
and limitations. Moreover, different requirements (storage, latency, compu-
tation, etc.) related to the deployment of Blockchain-based applications in
vehicular networks are identified and analysed. Finally, different challenges
related to the integration of the Blockchain technology within the vehicu-
lar networks and the future of the vehicular networks (Artificial Intelligence,
edge computing, etc.) are discussed.
Keywords: Internet of Vehicles, Blockchain, Security, Privacy, Trust,
Incentive
∗
Corresponding author
Email address: leo.mendiboure@labri.fr (Leo Mendiboure)
2
Things). Thus, the vehicular networks are just a part of the content of these
papers and are not discussed in detail. That is why these papers could be
useful to understand the benefits of the use of the BC technology in vehicular
environments but not to understand how this technology could be applied in
this environment and what are the main challenges related to this integration.
Similarly, in [12], the authors focus on trust establishment in Social IoV, a
subgroup of IoV and different solutions are presented: BC, edge computing,
etc. Thus, BC solutions are not specifically analysed. Moreover, the security,
privacy preservation and cooperation issues are not discussed. That is why,
compared with the existing survey papers, our work present several new
aspects. The main contributions of this paper are:
2. Background
In this section are introduced the main concepts needed to better under-
stand the issues covered by this survey. The background information focuses
on the IoV architecture and applications, on one hand, and BC technologies
and benefits on the other hand.
3
Figure 1: Different types of vehicular communications
4
Figure 2: Presentation of the Blockchain technology
munication architecture could lead to other issues [3], [7]. Finally, vehicles
cooperation to enable an efficient data transmission or resource sharing is still
an open issue and efficient incentive mechanisms are required ([8]). Thus,
the definition of new mechanisms ensuring security, privacy and trust for
vehicular networks in a scalable and reliable way is essential. Similarly, the
definition of incentive mechanisms must be considered.
2.2. Blockchain
Currently, BC is one of the most studied distributed ledger technologies.
It is built upon a Peer-to-Peer (P2P) network. This network is used to main-
tain a consistent database among all members, the BC ledger, as shown in
Fig. 2. In BC is stored an ordered list of chained blocks containing trans-
actions (Txs) (currency, data, certificate, etc.). Records of all the exchanges
between the different BC members are kept in this distributed ledger. All
the network members have the same copy of BC and therefore modifying BC
cannot be accomplished without the agreement of most network members
(51%). Therefore, BC aims to provide a transparent, secured and scalable
environment.
BC is popular because it has been the first approach enabling different
nodes to exchange data and cryptocurrencies without a trusted central au-
thority. Resolving the Byzantine general problem, or double spending prob-
lem, BC enables members to exchange cryptocurrencies without a financial
5
institution. The agreement of the networks members is called the consen-
sus process. The first consensus algorithm was the Proof-of-Work (PoW)
algorithm developed by the Bitcoin developers ([15]). Nevertheless, this al-
gorithm presents different limitations (energy efficiency, 51% attack [16], etc.)
and other algorithms have been developed: Proof-of-Stake (PoS), Delegated
Proof-of-Stake (DPoS), Proof-of-Elaspsed-Time (PoET), Proof-of-Authority
(POA), etc.
Even if BC was firstly designed to enable the exchange of cryptocurren-
cies, it has evolved and different uses of this technology are possible today.
The automatic and immutable smart contracts are one of the main evolution
of BC. Smart contracts are software, BC applications, enabling two parties
to negotiate the terms of an agreement, to verify fulfillment and to execute
the agreed terms without a third party [7]. Thus, smart contracts, computer
codes stored in the blockchain, could be used to deploy many types of services
in a distributed, scalable and secured environment: security services (Public
Key Infrastructure, data protection, etc.), advertisement services (ads remu-
neration, etc.) or infotainment services (multimedia applications, resources
sharing, etc.).
Moreover, to meet users’ needs, different types of BC have been devel-
oped: public BC and private or consortium BC. The public BC is a public
distributed ledger: everyone can join the network, analyse transactions, ex-
changes currencies and interact with smart contracts. To ensure a higher
level of security, the private or consortium BC are handled by companies
or group of companies: the administrators decide who can join the network
and the transactions are viewed only by BC users or authorized sub-group of
users. In a public BC, the nodes participating in the consensus process can
be remunerated and therefore money is the main motivation of these nodes
called miners. With a private BC, all participants have a same goal, ensuring
the security of their network and their information, and, therefore, security
is their main motivation.
6
central entity and could be an efficient way to provide scalable security
solutions;
• Availability: as BC is decentralized, there is not a single point of failure.
Therefore, the system security and availability is enhanced;
• Cryptocurrency: many BC ledgers provide cryptocurrency exchanges’
services. It could be an efficient way to develop efficient, secured and
automated (smart contracts) incentive mechanisms improving the ve-
hicles cooperation;
• Transparency: all the nodes involved in a BC are able to access to BC
content;
• Immutability: data stored in the BC ledger cannot be modified. There-
fore, BC provides a simple and efficient way to store secured data;
• Anonymity (pseudonymity): with BC, each user is linked with a pseudony-
mous address. This pseudonymity could be a way to deploy efficient
privacy services.
• Exchanges automation: with smart contract, the exchanges between
devices and vehicles can be automated. Thus, data exchange or re-
source sharing services could be automatically deployed without human
intervention.
Because of these different features, the idea of BC-based solutions (se-
curity, privacy, trust, incentive) for vehicular network has been developed
in different research papers. The existing BC technologies are presented in
the next Subsection. Then, the state-of-the-art solutions are presented and
compared in terms of the adopted BC technology: Ethereum, Bictoin, Hy-
perledger, etc.
7
Table 1: Comparison of different BC technologies applied to vehicular networks
Hyperledger
Characteristic Bitcoin Ethereum
Fabric
Type Public Public/Private Private
Permissionless/
Permission Permissionless Permissioned
Permissioned
pBFT
Consensus PoW Pow; PoS
Pluggable
Capacity
7 15 3500
(transac./sec.)
Currency Bitcoin ETH -
Smart contracts Golang Solidity Golang
Blockchain
No Yes Yes
platform
Currency
Low volumes Higher Volumes No
exchange
Public data
No Low volumes High volumes
exchange
Private data
No Low volumes High volumes
exchange
Bitcoin [15] is the oldest BC technology, developed since 2008. This tech-
nology is designed to enable cryptocurrency exchanges in a public tamper-
resistant distributed ledger. Using Bitcoin it is also possible to design smart
contracts in order to automate the exchanges of cryptocurrencies under cer-
tain conditions. Nevertheless, the capacity of this technology is low (7 trans-
actions per second) and the underlying consensus algorithm (PoW) implies a
high computational complexity. Thus, this technology would only be useful
for low volumes of transactions of cryptocurrencies in vehicular networks.
Ethereum [17] is another public BC technology enabling cryptocurrency
exchanges and smart contracts’ definition with a higher capacity (15 trans-
actions per second). Moreover, Ethereum can also be used as a blockchain
platform to store and transmit data in a public (permissionless) or private
(permissioned) BC network. Finally, Ethereum aims to provide different con-
sensus algorithms, Pow, but also PoS, improving the performances and lim-
8
iting the computational complexity. Thus, for applications requiring higher
volumes of transactions and environments with limited computational capa-
bilities, Ethereum could be a more efficient solution than Bitcoin. Neverthe-
less, the capacity of the Ethereum and Bitcoin BCs is really low compared to
traditional systems such as VISA (2000 transactions per second on average).
Hyperledger Fabric [18], a third BC technology, aims to provide a more
efficient system enabling an important number of transactions per second
(3500). This BC technology provides a private BC ledger and is based on a
pluggable consensus layer. Thus, different algorithms can be implemented:
practical Byzantine Fault Tolerance (pBFT), PoW, PoS, etc. Moreover, Hy-
perledger Fabric provides simple access control mechanisms. Thus, this tech-
nology could be used for different types of services generating high data
volumes and for security and privacy-preserving services requiring access
control. However, contrary to Bitcoin and Ethereum, Hyperledger Fabric
is not natively designed to exchange cryptocurrencies. Moreover, a private
ledger cannot be used to make public transactions and to design incentive
mechanisms.
To go further and to provide efficient BC-based solutions, adapted to the
vehicular environment (density, mobility, limited computational and storage
capabilities), it could be interesting to consider other BC technologies in
future works ([11]): IOTA, Byteball, etc.
1
R3 Website: https://www.r3.com/
2
Hyperledger Website: https://www.hyperledger.org/
3
XAIN Website: https://www.xain.io/
4
Car eWallet Website: https://car-ewallet.de/
9
• Manufacturing: inventory management, ownership issues, product trace-
ability and quality-inspection records, all these processes could be im-
proved using the BC transparency.
10
Figure 3: Blockchain-based applications in IoV
11
Table 2: Comparison of the existing incentive mechanisms
Application Services Approach Limits BC techno. BC nodes
Incentive Time locking Evaluation
VDTN [8, 20] Bitcoin Cloud/RSUs
(credit-based) Multi-signatures Security
Incentive Implementation
VCC [21] Utility function Bitcoin Vehicles
(credit-based) Security
Intersection
Incentive Feasability
management Trust index Own Vehicles
(reput.-based) Benefits
[22, 23]
Incentive Consensus Keys
Crowdsourcing (credit-based) protocol management
Own Cloud/RSUs
[24] Privacy Threshold ring Overhead
preservation signature Cost
12
benefits: low cost, trust, decentralization and pseudonymity. In VDTNs,
a vehicle will be rewarded if it transports data from a Base Station (BS)
A to a BS B. However in a normal Bitcoin transaction, money is directly
taken from the sender (BS A) and transmitted to the recipient (vehicle).
Thus, even if the vehicle does not forward data to BS B, it would receive
money. To deal with that, the authors of these papers define a solution
based on time-locked conditions and multi-signatures. With this solution, a
vehicle will be paid only if data is correctly forwarded and if both sender and
recipient BSs sign the transaction enabling the vehicle to receive its reward.
On the contrary, if the vehicle does not transmit data in a given period of
time (the time-lock), the emitting BS will be able to get its money back.
This solution using multi-signatures and time-locking enables to deal with
conditional rewarding using the Bitcoin BC, overcoming the limits of this
technology. Moreover, this approach could be extended to other scenarios
such as carpooling, products delivery, etc. Finally, in this system, vehicles
are only considered as BC clients and the BC ledger management should not
be a problem. Nevertheless, this paper only presents the functioning of the
solution and an evaluation would be necessary. In addition, according to the
authors, pseudonymity could be a way to provide partial anonymity but it
cannot be considered as a real solution [25]. Finally, the relevance of the
choice of the Bitcoin BC to automate exchanges, as smart contracts are still
not fully supported by this technology [26], could be discussed.
Cooperation in Vehicular Cloud Computing (VCC) is another important
issue. Indeed, VCC aims to use the available computational and storage ca-
pabilities of the vehicles to store and download content, complementing the
existing cloud computing systems. Nonetheless, this system is based on the
cooperation of the vehicles. That is why, to encourage them to cooperate,
a credit based incentive approach for V2V cooperation in VCC is defined
in [21]. In the proposed solution, nearby vehicles are grouped into clusters
collecting and processing data for Intelligent Transportation System (ITS)
services. A cluster head is elected using a routing protocol and transmits the
data received from the other vehicles of the cluster to a conventional cloud
service. Each vehicle of this cluster transmitting data is rewarded according
to a utility function taking into account the quantity of data transmitted, the
commission rate and the elapsed time. Thus, the authors of this paper also
aim to design a conditional rewarding mechanism. However, the implemen-
tation of this system over the Bitcoin BC is not described and transactions
scripts must be defined [8, 20]. Moreover, in this approach, the vehicles are
13
considered as BC nodes and the deployment of the Bitcoin BC in this en-
vironment could be complex. Finally, the data transmitted by a vehicle in
not controlled and not correlated with the data transmitted by the other
vehicles. Thus, a vehicle could easily transmit useless data to be rewarded.
The authors of [22, 23] focus on two main issues: trust establishment
and incentive mechanism. Their objective is to define a framework enabling
secured communications in the vehicular environment without a central au-
thority. The authors present a new BC ledger. This BC ledger should allow
each vehicle to generate a unique identifier called Bit Trust. Moreover, to en-
sure security, BC is used to store the communication’s history of each vehicle.
To get a reward and to improve its Bit Trust, a vehicle should contribute to
the proper functioning of the vehicular networks. For example, if a vehicle is
involved in the management of an intersection, computing the crossing order
of this intersection, it will get a reward, increasing its Trust Bit. However,
questions still arise. Indeed the authors of this paper aim to design a dis-
tributed system to deal with trust management in vehicular networks. This
is an ambitious objective and the approach described in this paper, based on
hashes and public/private keys management is similar to existing BC tech-
nologies. Moreover, the system guaranteeing the security of the exchanges
using this BC technology is not fully presented. Thus, the feasibility of this
solution should be evaluated.
14
Figure 4: Implementation of the Blockchain technology in vehicular networks
tain area, it will provide a reward for any information transmitted by vehicles
located in this area. The proposed system is composed of three main parts:
announcement protocol, privacy-preservation and incentive mechanism. To
deal with information verification, the authors consider that designing a new
BC ledger is required. However, in contrast with the previous papers, differ-
ent points are considered in this solution: setup, transactions management
and consensus protocol. Thus, this approach might be a deployable solution.
Nevertheless, as noticed by the authors, the key management and coin bal-
ance system could be improved. Moreover, the implementation and the cost
of this system could be discussed.
3.1.3. Discussion
As the BC technology was firstly designed to enable cryptocurrencies’
exchanges, it is an interesting way to deploy incentive mechanisms in the
vehicular environment. Indeed, the cooperation between vehicles, sharing
information or computational, storage and communication resources is essen-
tial. Different use cases including VDTN ([8, 20]), cooperation in VCC ([21]),
intersections management ([22, 23]) and crowdsourcing ([24]) have already
been addressed. Some of these papers aim to deploy and improve existing BC
ledgers thanks to different mechanisms based on time-locking, signatures and
utility functions management ([8, 20, 21]) while some others aim to define
new BC ledgers and new consensus protocols dealing with the constraints of
15
the vehicular environment ([22, 23, 24]). Nevertheless, many of these propo-
sitions are only at the proposal stage and the evaluation of their relevance is
not yet possible. In addition, in [21], vehicles are considered as BC nodes, as
shown in Fig. 4. The feasibility of deploying existing BC ledgers (Bitcoin) in
such an unstable environment should be evaluated. Similarly, the interesting
use cases for BC-based incentive mechanisms should be defined. Indeed, for
some safety applications, ultra low latency (around 10ms) is necessary [27]
and BC could be an inadequate solution. Improving the performances of the
BC technology to deal with these performances will be an important chal-
lenge. Finally, the idea of decentralized cloud systems and BC-based cloud
systems using the available storage and computational resources of the users
is a hot topic. For example, in device-to-device networks, the authors of [28]
proposed to define a BC-based fair computational resources sharing system
using incentive mechanisms. Considering the important storage and compu-
tational capabilities of the vehicles and the important number of vehicles, as
well as the emergence of different paradigms such as Vehicular Cloud Com-
puting or Vehicular Fog Computing, it would be interesting to develop such
systems in the vehicular environment.
16
higher the trust level of this node will be. Thus, using these credit scores, it
is possible to identify trusted and non trusted users.
To provide efficient road safety services, the vehicular networks are based
on the idea of messages broadcasting. When a vehicle detects an abnormal
situation (traffic jam, obstacle, collision, etc.), it transmits this information
to the surrounding vehicles. However, this system is facing different kind of
attacks, including, message spoofing and ballot stuffing attacks. To deal with
that, the authors of [29, 30] proposed a BC-based system to improve trust in
the vehicular environment. When a vehicle receives a message from surround-
ing vehicles, a Bayesian Inference Model is used to assess the credibility of
this message (depending on the messages received from other vehicles). Then
this information is transmitted to the nearby Road Side Unit (RSU). All the
RSUs form a BC network analysing the credibility of the messages trans-
mitted by each vehicle during a certain period of time. Depending on that,
they increase or decrease the trust index of each vehicle. As this system is
decentralized and requires a global consensus, malicious RSUs will not be
able to modify the trust index of a given vehicle without the approval of
the majority of the RSUs. Thanks to that, a vehicle will be able to know
the trust index of the surrounding vehicles and to determine which are the
trusted vehicles. Thus, the system described in this paper should provide an
efficient way to manage ratings and trust values. However, the security level
of the BC-based solution raises questions. Indeed, the BC ledger should be
modified by the RSUs, uploading the new trust index of the vehicles. There
does not seem to be any mechanism to ensure that the uploaded data is valid.
Thus, the consensus protocol of this solution should be improved to provide
a secured solution. Moreover, each vehicle is supposed to request the trust
index of the surrounding vehicles to the nearby RSU, in a dense environment
and highly mobile environment, the scalability of such a system should be
evaluated and other approaches should be considered if needed.
In [31], a mechanism enabling the evaluation of nodes’ and messages’
trustworthiness in the vehicular environment is also described. To enable
that, the idea of Proof of Location is presented: the location of a given
vehicle is certified by the nearby RSU controlling the identity of this vehicle.
When a vehicle transmits a message to other vehicles, using the BC ledger,
these vehicles will consider this message only if they are located in the same
area as the sender vehicle (Proof of Location). Depending on the timestamp
of the packet, these vehicles will validate the content of the message if it
corresponds to the current road conditions. According to that, the trust
17
Table 3: Comparison of the existing trust establishment mechanisms
Application Services Approach Limits BC techno. BC nodes
Messages Inference Scalability
Trust
broacasting model Own RSUs
(nodes)
[29, 30] Consensus Security
Proof of
Exchanges Scalability
Trust location
trustworthiness Own Vehicles
(nodes) Multilayered
[31] Interactions
BC
Proof of
Exchanges Security
Trust event
control Own RSUs
(messages) Multilayered
[32] Scalability
BC
Data provider
Trust selection Latency
Exchanges
(nodes) Reputation RSUs
control Own
scheme Vehicles
[33]
Authentication Key Implementation
Management
Trust Reputation Information
Platooning
(nodes) scheme control
control Own Vehicles
Data Local Information
[34]
availability BC dissemination
Trust BC-based Security
Messages
(nodes) distribution
distribution Own Vehicles
Data Local Latency
[35]
availability BC Scalability
Content Permissioned
Centric Trust BC Scalability RSUs
Hyperledger
Networks (nodes) Messages Security Vehicles
[36] Verification
SDN Trust AI based Interactions
applications (applications) analysis
Ethereum RSUs
control Access Credentials Scalability
[7] control management Latency
Trust Proof of Scalability
Exchanges
(nodes) presence Security
control Own RSUs
Privacy Certificates Centralised
[37]
preservation management system
18
level of the message will be incremented or decremented. The trust level
of a vehicle corresponds to the average trust level of the different messages
transmitted by this vehicle. With this system, the authors aim to provide
local BCs controlling the behavior of the nodes located within a given area.
This approach present different benefits. First of all, the Proof of Location
could be an efficient way to improve the security of the system. Nevertheless,
the implementation of a BC-based system enabling to share this information
only with surrounding vehicles could be complicated. The scalability of such
a system should be evaluated. Moreover, the proposed solution is based on a
multilayered BC ledger: local BC and global BC. The interactions between
these different BCs and the security of these interactions should be discussed.
The authors of [32] also aim to provide a solution ensuring trust in ve-
hicular communications to enhance road safety. Focusing on message trust-
worthiness, they defined a new consensus algorithm called Proof-of-Event
(PoE). This PoE consensus is a two-pass threshold-based event validation
mechanism. First of all, each RSU collects the CAMs (Cooperative Aware-
ness Messages) from the surrounding vehicles and evaluates the trust level
of the received messages. Then, it transfers this message to the surrounding
vehicles in order to verify the information. If this information is validated
by a majority of vehicles, the CAM message is considered to be trusted. To
accelerate data dissemination, the authors of [32] also propose a two-phase
consecutive transaction in BC. Thanks to that, a given information is trans-
mitted to the surrounding RSUs located within the same region, improving
and simplifying data dissemination process. To demonstrate the benefits of
this approach, the authors compared the PoE with existing consensus algo-
rithms (PoA, PoW) and also measured the security of the system in terms of
false event success rate. The PoE and the Proof of Location [31] are similar
ideas. However, in this paper [32], the RSUs manage the message verification
and message distribution. Thus, a malicious RSU could disturb the network
functioning. Thus, the security of the proposed PoE mechanism should be
discussed. For its part, the multilayered BC could improve and accelerate
the message dissemination. However, the scalability of such a system, storing
all the events noticed by the vehicles could be an important challenge.
With these different approaches ([31, 29, 30, 32]), RSUs have a major
role as they control data. In [33] is introduced a vehicle-centric system.
Indeed, in the proposed architecture, the RSUs will only be used as BC nodes
storing data and the vehicles will be responsible of trust establishment and
trust management. In addition, to define a secured data sharing environment
19
based on a distributed consensus protocols, the authors describe a reputation
management mechanism. This mechanism is based on the idea of subjective
logic. Each vehicle will be able to determine whether or not a neighbor
vehicle can be trusted. The vehicles’ opinion is based on three main factors:
interaction frequency, event timeliness and trajectory similarities. Using this
subjective logic and global recommended opinions stored in the BC ledger,
each vehicle can determine which neighbor vehicle provides trustworthy data.
With this system, all the data is exchanged through the BC ledger, ensuring
a higher level of security than previous solutions [32]. Moreover, each vehicle
can select trusted data providers using the BC ledger and the reputation
scheme. However, the scalability and the latency of such a system should
be evaluated. In addition, to provide an implementable solution, a realistic
implementation of the reputation scheme system should be designed.
The authors of [34] go even further and describe a system aiming to pro-
vide security in vehicular networks in the absence of RSUs. To do so, the
BC ledger is stored inside the vehicles and updated thanks to the exchanges
between the vehicles. To demonstrate the benefits of this approach, a pla-
tooning use case is presented. The vehicles in this platoon will form a BC
network. The behavior of each vehicle will be analysed and stored in this BC
ledger. Thanks to that the trust index of each vehicles will be increased or
decreased depending on its actions. Nevertheless, even if this system is at-
tractive and could be a way to establish trust within the vehicles of a platoon
without any external help, there are still questions. Indeed, contrary to the
previous solutions, RSUs are not considered in this solution to manage global
information. Thus, with this approach, managing global trust index could
be complex. Similarly, inter-platoons exchanges or platoon reconfiguration
should also be considered. Moreover, the reputation management scheme is
not as developed as those described in [31, 29, 30, 32].
In [35], a similar system is described. Indeed, the authors also aim to
provide security and trust in a decentralized vehicular environment without
RSUs. The authors mainly focus on the idea of a BC-based message distribu-
tion and describe BC-based format of different kind of emergency messages:
emergency brake, line changing, intersection movement and collision warn-
ing. Storing these messages in the BC ledger, and analysing these messages,
the authors also aim to manage the trust level of the different vehicles. With
this solution all the messages should be exchanged through the BC ledger.
This could improve security but the proposed solution should face the same
challenges as those described in [34]: system scalability, global BC update
20
and latency. Moreover, vehicles could easily be integrated to the BC ledger
using a simple key management mechanism. A malicious vehicle could easily
disturb the network, modifying and transmitting wrong data.
In Content Centric Networks, estimating the reliability of the source is
also an important challenge. In [36], the authors try to demonstrate the ben-
efits of permissioned BC to improve trust in vehicular environments. Indeed,
with permissioned BC it could be possible to securely control the behavior of
the different nodes and to improve scalability. In this system all the messages
exchanged between the vehicles are send to the BC ledger. Then, this infor-
mation is controlled by the surrounding vehicles. If this information is valid,
a trusted validator adds the transaction to BC ledger. Compared to the PoE
[32] and Proof of Location [32], the approach described in this paper presents
different limitations. Indeed, the position of the sender is not verified and the
message is transmitted to all the vehicles, not only the surrounding vehicles.
Thus, this approach could present different limitations in terms of security,
scalability and energy consumption. However, permisioned BC, as described
in this paper, could be an efficient way to deal with local and efficient mes-
sage transmission. Thus, it could be an efficient way to implement realistic
BC solutions for vehicular networks.
In virtualized environment, such as Software Defined-IoV (SD-IoV, [38]),
it will also be important to control the behavior of the applications. Indeed,
in a SDN environment, applications are able to request resources to SDN
controllers, modifying the behavior of the data plane (reserving resources or
modifying communication path). With SD-IoV, these applications will be
able to request resources to different controllers, potentially, heterogeneous
controllers. Thus, defining an environment enabling heterogeneous SDN con-
trollers to control the behavior of SDN applications is an important point.
That is why, the authors of [7] defined a mechanism enabling the trust es-
tablishment between the SDN applications and the SDN controllers. To do
so, they introduced the ideas of Application-Trust Index, and Application
Identity. In this system, BC acts as a Public Key Infrastructure (PKI) au-
thenticating and certifying the SDN applications exchanging with the SDN
controllers. All the requests sent by the SDN applications are stored in
BC and the resources used by these applications are frequently controlled.
Thanks to that, when a SDN controller detects an abnormal behavior, this
information will be shared with the other SDN controllers and the concerned
application will not be able to send other requests to the different controllers.
Nevertheless, with this solution, SDN controllers are considered as trusted
21
nodes. Thus, malicious nodes could easily disturb the entire network and
modify the Application Trust Index. Moreover, Artificial Intelligence tech-
niques are supposed to be used to evaluate the behavior of the SDN applica-
tions. The interactions between this AI-based behavior evaluation and the
BC ledger should be discussed.
3.2.3. Discussion
BC aims to enable untrusted nodes to securely exchange data. Trust
management for vehicles is a really important question. Indeed, independent
vehicles will be able to share data and broadcast messages to the surround-
ing vehicles. Controlling these messages and verifying the relevance of these
22
pieces of information is important to guarantee the road safety and to prevent
malicious behaviors. That is why different authors have already proposed
systems enabling to control the messages’ trustworthiness ([32]) or the mes-
sages’ trustworthiness and the vehicles’ trustworthiness ([29, 30, 31, 36, 33])
while preserving the users’ privacy ([37]). For most of these works, RSUs
are used to manage trust and to store BC ledger thanks to their important
storage and computational capabilities and their stable location. However,
the idea of fully decentralized systems working in the absence of RSUs have
been described in [34, 35]. With these systems, vehicles will act as BC nodes
storing and updating their own BC ledger. Even if this solution seems to be
a promising way to enable trust establishment in vehicular networks, there
are different challenges remaining: scalability, BC ledger updates, etc. Thus,
determining whether or not vehicles could be used to manage global trust
systems, without external devices such as RSUs, is an interesting question.
To enable trust establishment, the behavior of the vehicles must be con-
trolled. Therefore, different consensus algorithms have already been designed
for vehicular networks, enabling to check whether or not the information
shared by a vehicle is correct. Scalability for these systems is a really im-
portant point and the idea of multilayered BC with local and global data
exchanges have already been proposed. Thanks to these systems, surround-
ing vehicles should be able to control the behavior of an emitting vehicle
and more distant vehicles should only receive valid data. To do so, the ideas
of Proof of Event and Proof of Location have been introduced [31, 32]. As
described in [36], permissioned BC could be a way to implement such sys-
tems and this point should be tackled. Moreover, the performances of these
multilayered BC should be assessed to evaluate their relevance. Thereafter,
in these systems, RSUs are considered as trusted nodes. However, to ensure
the security of the communications, the behavior of these RSUs should also
be controlled by the BC network. Finally, as shown in [22, 23], trust estab-
lishment and incentive mechanisms are correlated and designing BC-based
systems enabling trust establishment while providing incentive mechanisms
could be an efficient way to improve data dissemination.
23
application must be accessible at any time (availability) and the messages
should not have been modified by a malicious node (integrity). Moreover,
a source should not be able to deny the authenticity of its signature (non
repudiation) and a non-authorized node should not be able to read a pri-
vate content (access control). Protecting the users’ privacy is also impor-
tant. The BC technology could provide these different services. Indeed, with
BC, a node must be identified to send messages (authentication), data can
be encrypted (confidentiality) and data immutability is ensured (integrity).
Moreover thanks to the decentralized architecture, data availability is guar-
anteed (availability) and access control mechanisms (confidentiality) as well
as privacy preserving mechanisms (privacy) can be defined. That is why dif-
ferent solutions based on the BC technology have already been proposed to
improve security and privacy in vehicular networks.
3.3.1. Authentication
Authentication is an important challenge in vehicular environments. In-
deed, enabling a quick authentication between fast moving vehicles is a com-
plex task requiring the design of new solutions. To authenticate users and
certify their identity, PKIs are a very common solution. Nevertheless, the
deployment of PKIs for vehicular networks would be expensive. Moreover,
centralized PKIs are suffering from different limitations ([39]): single point
of failure, privacy, trust, etc. That is why different BC-based PKIs have been
designed for the vehicular environments.
24
well as the required storage capabilities. This approach also aims to reduce
the verification overhead. Indeed, to simplify the authentication process, a
simple lookup function is used rather than a cryptography signature verifi-
cation. Nevertheless, the level of security provided by such a system should
be evaluated.
The Security Credential Management System (SCMS, [42]) is a special-
ized PKI system designed to secure the vehicular communications. To enable
the accountability of this system, improve transparency and reduce the need
for mutual trust, the authors of [43] proposed a BC-based SCMS using RSUs,
vehicles and Misbehaviour Authorities as BC nodes. This system is based
on a hierarchical consensus mechanism. Certified vehicles, forming a clus-
ter and a local BC network, must agree on pieces of information to send
to the nearby RSU. These pieces of information correspond to an abnormal
behaviour detected by these vehicles. Then, sub-groups of RSUs and Mis-
behaviour Authorities will validate this data and share it with the global
BC network. Thanks to that, the revocations lists can be globally managed.
Nevertheless, it is only a proposal paper and, to implement it, many points
should be considered, including, cluster formation and cluster management.
Moreover, the RSUs are supposed to upload data to the global BC and a
malicious RSU could share wrong data. Security should also be discussed.
The authors of [44] focus on key management in heterogeneous vehic-
ular communication systems managed by different security managers. In
traditional systems, central managers are used to enable key transfer be-
tween these security managers. Nevertheless, this system present different
limitations: central managers interoperability, single point of failure attacks,
transfer delay and computational complexity. That is why a distributed key
management enabling key transfer between different service managers using
BC technology is described in [44]. The proposed solution is based on two
main components. The first one corresponds to the key transfer handshake
scheme based on the BC ledger. The second one is the transaction collection
time, a metric enabling to optimize block generation and delays depending
on the key distribution. This solution is interesting as a handshake scheme is
proposed in a BC environment. Moreover, improving the transaction collec-
tion time could reduce the delays implied by the BC approach. Nevertheless
the performances of the proposed system in terms of computational time and
overhead in a realistic environment should be discussed. Finally, trust estab-
lishment between the different security managers in a decentralized system
should be considered.
25
Discussion. To design secured communications and to enable trust estab-
lishment, authentication is an important point. To deal with the limitations
of the traditional PKI infrastructures, different BC-based solutions have al-
ready been proposed [40, 41, 43]. As described in [40], the BC technology
could be a way to prevent against attacks on Certification Authorities and
to recude communication exchanges between Certification Authorities and
network devices (RSUs, vehicles). Going further, [41, 43] introduce multi-
layered BC to improve the performances of the existing systems: verification
overhead and accountability. BC could also be an efficient way to design new
handshake protocols [44] and solutions based on this idea could be explored.
Indeed, rather than improving existing Certification Authorities, BC could
be a way to design new authentication and certification protocols.
Existing access control mechanisms. The vehicles will produce huge volumes
of data. However, for a given application only part of this data will be
relevant. Accessing these fragments of data in a fast and efficient way is
an important challenge. That is why the authors of [45, 46] proposed a
Blockchain-Based Vehicular Data Management. In this architecture, the
RSUs are BC nodes, storing data produced by the vehicles and ensuring the
accessibility of these information for multiple applications. In this system the
applications can request some pieces of information from a given RSU. The
global system is able to balance the load between the different RSUs, limiting
packet loss rate. Moreover, a simple access control is defined by the authors.
Each BC block contains a policy header containing a list of applications
which are allowed to access to the content of this block. Thanks to that
the applications permissions can be controlled (read/write). Even if the
idea of designing efficient BC-based access control mechanism is attractive,
important questions are not tackled in these papers. A mechanism enabling
to authenticate the applications and to define their permissions should be
designed to provide a secured system. Moreover, the proposed solution, based
26
on a load balancing algorithm could suffer from Denial-of-Service attacks.
3.3.3. Availability
Availability is one of the native benefits of a BC ledger. Indeed, as BC
is based on a peer-to-peer network, the single point of failure situation is
prevented and therefore, data availability is ensured. However in the vehic-
ular environment, a reliable and constant communication cannot be guar-
anteed. Indeed, vehicles will not be connected to RSUs at any time and
non-connected scenarios should be considered. That is why, the authors of
[34, 35] have proposed solutions based only on V2V communications to es-
tablish trust. Nevertheless, in such systems, scalability, latency and data
dissemination should be considered. Moreover, the communication resources
required by such systems should be improved in order to design realistic sys-
tems. Thus, even if availability is inherent in BC-based systems, availability
in vehicular environments is an important challenge.
27
are stored in a BC ledger, the system will not be able to remove/modify this
content and these incorrect pieces of information will be indefinitely stored
and accessible in BC ledger. Thus, this question could be discussed. Fur-
thermore, while BC technology could ensure the integrity of the data stored
within BC ledger, the relevance and the correctness of the data uploaded to
BC ledger cannot be guaranteed. That is why, to improve the trust level
of the system and to ensure the correctness of the uploaded data, it could
be interesting to design solutions combining BC technology with solutions
guaranteeing the access control and integrity to secure-sensitive computa-
tion tasks such as data analysis. For example, the Intel Software Guard
Extensions (SGX) could be an interesting approach [50] and it could be a
way to complete the existing BC-based trust management systems.
3.3.5. Privacy
To avoid tracking attacks, protecting the users’ privacy is another im-
portant concern. As shown in Section 3.1.2, Section 3.2.2, different privacy-
preserving mechanisms have already been designed to improve incentive mech-
anisms [25, 24] and trust establishment mechanisms [37]. Nevertheless, privacy-
preservation could be useful for many other applications.
28
nism. Contrary to the other solutions, with this system the user protects his
privacy by himself. Thanks to a distributed reauthentication phase, the user
of a vehicle can modify its pseudonym at any time. However the reliability
of such a system is consequently uncertain and the non-traceability must
be demonstrated. The approach described in this paper also introduces a
distributed model. Indeed, to improve scalability, regions are defined. Each
region, corresponding to a set of Vehicular Fog Datacenter, is managed by
a single Service Manager maintaining the BC ledger. Nevertheless, despite
the benefits of such a system, defining relevant service managers and guar-
anteeing the reliability and the trustworthiness of these managers could be
difficult. Thus, the feasability of this approach should be evaluated.
Similarly, the authors of [46] proposed a three step process enabling to au-
thenticate and ensure the privacy of a user exchanging with a service provider.
To do so, a Registration Service is used. When a vehicle aims to request ser-
vices from the service provider, this Registration Service generates a session
pseudonym enabling this user to exchange with the service provider while
protecting his privacy. In this system, the BC ledger is used to store the list
of authorized pseudonyms as well as their permissions and can be accessed by
the service providers, accelerating the authentication process. Moreover, this
solution, providing a new pseudonym for each new connection could provide
a higher level of privacy than the approach described in [53]. Nevertheless,
in this approach, a centralized Registration Service is used to manage the
registration phase and to generate the pseudonym of the vehicles, limiting
the benefits of the BC approach.
29
Table 4: Comparison of the existing security and privacy preserving mechanisms
Application Services Approach Limits BC techno. BC nodes
Point of
Authentication Shared
failure Latency Own RSUs
(vehicles) ledger
[40]
Verification Lookup
Security
overhead Authentication function
Own RSUs
reduction (vehicles) Multiple
Scalability
[41] BC ledgers
Local
Clusters
PKI revocation
Authentication formation
accountability management Own RSUs
(vehicles)
[43] Multilayered
Security
BC
Handshake
Trust
Keys scheme
Authentication Overhead Cloud
management Transaction Own
(vehicles) Computation RSUs
[44] collection
time
time
BC-based
Data Access permission Security
management control management Own RSUs
[45, 46] (applications) Load Scalability
balancing
Anonymous
Private authentication Centralization
Privacy
carpooling scheme Own RSUs
preservation
[51] Anonymous Trust
localisation
Quick Users
Reliability
anonymous Privacy re-authentication RSUs
Own
authentication preservation Nodes Cloud
Complexity
[53] selection
Private BC-based
Centralization
services Privacy authentication RSUs
Own
access preservation Sessions Cloud
Scalability
[46] pseudonyms
related to the trustworthiness of the Certification nodes and this point should
be considered.
30
ficiency and are presented in Section 4. However, for all other challenges,
solutions have already been proposed by the authors of the papers presented
above:
31
Cloud Computing could be a way to increase the amount of storage
space, simplifying the deployment and the management of BC ledgers.
32
4. Open issues and future directions
As shown in Section 3, different BC-based applications have already been
designed and could improve the vehicular networks in terms of security, pri-
vacy, cooperation and trust establishment. Some requirements of the BC-
based applications have already been considered as shown in Section 3.4:
throughput, computational and storage capabilities as well as latency. How-
ever, to enable the integration of the BC technology within the vehicular
networks different points should still be considered. Moreover, due to the
evolution of the vehicular networks, future directions could be imagined.
33
frameworks and lightweight BC-based ledgers are currently being designed
[58, 59]. Designing a lightweight BC solution is a necessary step to enable
the advent of this technology. That is why improving existing approaches
[58, 59] and designing new solutions is essential.
34
4.5. Designing new services
As explained in [63], using BC technology, the vehicle economy could be
enabled. Thanks to this technology, devices will be able to automatically ex-
change services and data. Moreover, without any financial institution, each
user will be able to manage its data, and to share this data as well as re-
sources (storage, computational, communication) in exchange of a financial
contribution [64]. That is why different kind of services, based on BC tech-
nology, have already been designed, including, autonomous electric vehicles’
refueling ([65]), fair edge services placement in multi-vendors scenarios ([66]),
post-accident analysis ([67]), liability attribution ([68]) and forensic investi-
gation ([69]). All these services still need to be improved. Moreover, based on
this technology and this environment new services and new use cases could
be imagined.
5. Conclusions
Security (authentication, access control, etc.), users’ privacy preserva-
tion and trust establishment are important challenges for the vehicular net-
works. Blockchain, a popular distributed ledger technology, aiming to pro-
vide a secured, trustworthy and scalable environment could be an efficient
way to satisfy these needs. That is why, in this paper, we presented and
compared the existing applications of the Blockchain technology trying to
improve security, privacy and trust in vehicular environments. Moreover,
35
using a Blockchain application, cryptocurrencies, the vehicles’ cooperation
and the inter-vehicles resources sharing (computational, storage, communi-
cation) could be improved in vehicular networks. Thus, the most impor-
tant Blockchain-based incentive mechanisms are introduced in this paper.
Moreover, for each Blockchain-based application (privacy, security, trust, in-
centive), we propose different improvements. Finally, the main challenges
related to the integration of the Blockchain technology within the vehicu-
lar networks (performances evaluation, vehicular networks constraints, etc.),
current and future directions, such as new services enabled by the Blockchain
technology, are discussed.
References
[1] O. Kaiwartya, A. H. Abdullah, Y. Cao, A. Altameem, M. Prasad, C.-
T. Lin, X. Liu, Internet of vehicles: Motivation, layered architecture,
network model, challenges, and future aspects, IEEE Access 4 (2016)
5356–5373 (2016).
[2] E. E. ETSI, 302 665 v1. 1.1: Intelligent transport systems (its), commu-
nications architecture, European Standard (Telecommunications Series)
(2010).
36
[7] L. Mendiboure, M. A. Chalouf, F. Krief, Towards a blockchain-based
sd-iov for applications authentication and trust management, in: Inter-
national Conference on Internet of Vehicles, Springer, 2018, pp. 265–277
(2018).
[8] Y. Park, C. Sur, H. Kim, K.-H. Rhee, A reliable incentive scheme using
bitcoin on cooperative vehicular ad hoc networks, IT Converg. Pract 5
(2017) 34–41 (2017).
37
[17] G. Wood, et al., Ethereum: A secure decentralised generalised transac-
tion ledger, Ethereum project yellow paper 151 (2014) 1–32 (2014).
[20] Y. Park, C. Sur, K.-H. Rhee, A secure incentive scheme for vehicular
delay tolerant networks using cryptocurrency, Security and Communi-
cation Networks 2018 (2018).
38
[26] M. Bartoletti, L. Pompianu, An empirical analysis of smart contracts:
platforms, applications, and design patterns, in: International Confer-
ence on Financial Cryptography and Data Security, Springer, 2017, pp.
494–509 (2017).
[32] Y.-T. Yang, L.-D. Chou, C.-W. Tseng, F.-H. Tseng, C.-C. Liu,
Blockchain-based traffic event validation and trust verification for
vanets, IEEE Access 7 (2019) 30868–30877 (2019).
39
[35] M. Awais Hassan, U. Habiba, U. Ghani, M. Shoaib, A secure message-
passing framework for inter-vehicular communication using blockchain,
International Journal of Distributed Sensor Networks 15 (2) (2019)
1550147719829677 (2019).
40
Scalable and Resilient Infrastructures for Distributed Ledgers, ACM,
2017, p. 4 (2017).
41
[53] Y. Yao, X. Chang, J. Mišć, V. B. Mišć, L. Li, Bla: Blockchain-assisted
lightweight anonymous authentication for distributed vehicular fog ser-
vices, IEEE Internet of Things Journal (2019).
[57] I.-C. Lin, T.-C. Liao, A survey of blockchain security issues and chal-
lenges., IJ Network Security 19 (5) (2017) 653–659 (2017).
42
[63] B. Leiding, W. V. Vorobev, Enabling the vehicle economy us-
ing a blockchain-based value transaction layer protocol for ve-
hicular ad-hoc networks, URL: https://uploads-ssl. webflow.
com/5a4ea18a81f55a00010bdf45/5b69e53263e2a6076124ecbe Chorus-
Mobility-WP–v1. 0.1. pdf (2018).
43
[72] M. H. ur Rehman, I. Yaqoob, K. Salah, M. Imran, P. P. Jayaraman,
C. Perera, The role of big data analytics in industrial internet of things,
Future Generation Computer Systems 99 (2019) 247–259 (2019).
Appendix
A.1 Acronyms
ADAS Advanced Driver Assistance System.
AI Artificial Intelligence.
BC Blockchain.
BS Base Station.
CA Certificate Authority.
DoS Denial-of-Service.
44
NS Network Simulator.
P2P Peer-to-Peer.
pBFT practical Byzantine Fault Tolerance.
PKI Public Key Infrastructure.
PoA Proof-of-Authority.
PoE Proof-of-Event.
PoET Proof-of-Elapsed-Time.
PoS Proof-of-Stake.
PoW Proof-of-Work.
V2D Vehicle-to-Device.
V2I Vehicle-to-Infrastructure.
V2N Vehicle-to-Network.
V2P Vehicle-to-Pedestrian.
V2V Vehicle-to-Vehicle.
VCC Vehicular Cloud Computing.
VDTN Vehicular Delay Tolerant Network.
VFC Vehicular Fog Computing.
45