Skip to main content
Log in

Exploiting blockchain for dependable services in zero-trust vehicular networks

  • Research Article
  • Published:
Frontiers of Computer Science Aims and scope Submit manuscript

Abstract

The sixth-generation (6G) wireless communication system is envisioned be cable of providing highly dependable services by integrating with native reliable and trustworthy functionalities. Zero-trust vehicular networks is one of the typical scenarios for 6G dependable services. Under the technical framework of vehicle-and-roadside collaboration, more and more on-board devices and roadside infrastructures will communicate for information exchange. The reliability and security of the vehicle-and-roadside collaboration will directly affect the transportation safety. Considering a zero-trust vehicular environment, to prevent malicious vehicles from uploading false or invalid information, we propose a malicious vehicle identity disclosure approach based on the Shamir secret sharing scheme. Meanwhile, a two-layer consortium blockchain architecture and smart contracts are designed to protect the identity and privacy of benign vehicles as well as the security of their private data. After that, in order to improve the efficiency of vehicle identity disclosure, we present an inspection policy based on zero-sum game theory and a roadside unit incentive mechanism jointly using contract theory and subjective logic model. We verify the performance of the entire zero-trust solution through extensive simulation experiments. On the premise of protecting the vehicle privacy, our solution is demonstrated to significantly improve the reliability and security of 6G vehicular networks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Tang F, Kawamoto Y, Kato N, Liu J. Future intelligent and secure vehicular network toward 6g: machine-learning approaches. Proceedings of the IEEE, 2020, 108(2): 292–307

    Article  Google Scholar 

  2. Han X, Tian D, Sheng Z, Duan X, Zhou J, Hao W, Long K, Chen M, Leung V C M. Reliability-aware joint optimization for cooperative vehicular communication and computing. IEEE Transactions on Intelligent Transportation Systems, 2021, 22(8): 5437–5446

    Article  Google Scholar 

  3. Zhou H, Xu W, Chen J, Wang W. Evolutionary V2X technologies toward the internet of vehicles: challenges and opportunities. Proceedings of the IEEE, 2020, 108(2): 308–323

    Article  Google Scholar 

  4. Duan X, Jiang H, Tian D, Zou T, Zhou J, Cao Y. V2I based environment perception for autonomous vehicles at intersections. China Communications, 2021, 18(7): 1–12

    Article  Google Scholar 

  5. Song J, Harn P W, Sakai K, Sun M T, Ku W S. An RFID zero-knowledge authentication protocol based on quadratic residues. IEEE Internet of Things Journal, 2022, 9(14): 12813–12824

    Article  Google Scholar 

  6. Huang X, Li P, Yu R, Wu Y, Xie K, Xie S. FedParking: A federated learning based parking space estimation with parked vehicle assisted edge computing. IEEE Transactions on Vehicular Technology, 2021, 70(9): 9355–9368

    Article  Google Scholar 

  7. Bello Y, Hussein A R, Ulema M, Koilpillai J. On sustained zero trust conceptualization security for mobile core networks in 5G and beyond. IEEE Transactions on Network and Service Management, 2022, 19(2): 1876–1889

    Article  Google Scholar 

  8. Hao M, Ye D, Yu R, Wang J, Liao J. Blockchain empowered trustworthy access scheme for 6G zero-trust vehicular networks. Journal of Electronics & Information Technology, 2022, 44(9): 3004–3013

    Google Scholar 

  9. Rasheed A A, Mahapatra R N, Hamza-Lup F G. Adaptive group-based zero knowledge proof-authentication protocol in vehicular ad hoc networks. IEEE Transactions on Intelligent Transportation Systems, 2020, 21(2): 867–881

    Article  Google Scholar 

  10. Rasheed A A, Mahapatra R N, Varol C, Narashimha K. Exploiting zero knowledge proof and blockchain towards the enforcement of anonymity, data integrity and privacy (ADIP) on IoT. IEEE Transactions on Emerging Topics in Computing, 2022, 10(3): 1476–1491

    Article  Google Scholar 

  11. Lu J, Aliaosha Y, Liu X, Dou J, Jiang H. Research on distributed energy metering data collection and security mechanism based on blockchain technology. Electrical Measurement & Instrumentation, 2021, 58(6): 13–20

    Google Scholar 

  12. Wang T, Guo J, Ming T, Yang X. Application of block chain technology in life cycle asset management. Electrical Measurement & Instrumentation, 2021, 58(6): 21–25

    Google Scholar 

  13. Lin W, Zhang X, Cui Q, Zhang Z. Blockchain based unified authentication with zero-knowledge proof in heterogeneous MEC. In: Proceedings of 2021 IEEE International Conference on Communications Workshops (ICC Workshops). 2021, 1–6

  14. Feng X, Shi Q, Xie Q, Wang L. P2BA: A privacy-preserving protocol with batch authentication against semi-trusted RSUs in vehicular ad hoc networks. IEEE Transactions on Information Forensics and Security, 2021, 16: 3888–3899

    Article  Google Scholar 

  15. Xia Z, Zeng L, Gu K, Li X, Jia W. Conditional identity privacy-preserving authentication scheme based on cooperation of multiple fog servers under fog computing-based IoVs. ACM Transactions on Internet Technology, 2022, 22(4): 107

    Article  Google Scholar 

  16. Hao M, Ye D, Wang S, Tan B, Yu R. URLLC resource slicing and scheduling for trustworthy 6G vehicular services: A federated reinforcement learning approach. Physical Communication, 2021, 49: 101470

    Article  Google Scholar 

  17. Rose S W, Borchert O, Mitchell S, Connelly S. Zero trust architecture. Gaithersburg: National Institute of Standards and Technology, 2020

    Book  Google Scholar 

  18. Teerakanok S, Uehara T, Inomata A. Migrating to zero trust architecture: reviews and challenges. Security and Communication Networks, 2021, 2021: 9947347

    Article  Google Scholar 

  19. Shah S W, Syed N F, Shaghaghi A, Anwar A, Baig Z, Doss R. LCDA: Lightweight continuous device-todevice authentication for a zero trust architecture (ZTA). Computers & Security, 2021, 108: 102351

    Article  Google Scholar 

  20. Liu Y, Hao X, Ren W, Xiong R, Zhu T, Choo K K R, Min G. A blockchain-based decentralized, fair and authenticated information sharing scheme in zero trust internet-of-things. IEEE Transactions on Computers, 2023, 72(2): 501–512

    Article  Google Scholar 

  21. Shamir A. How to share a secret. Communications of the ACM, 1979, 22(11): 612–613

    Article  MathSciNet  MATH  Google Scholar 

  22. Von Stengel B. Recursive inspection games. Mathematics of Operations Research, 2016, 41(3): 935–952

    Article  MathSciNet  MATH  Google Scholar 

  23. Huang C, Wang W, Liu D, Lu R, Shen X. Blockchain-assisted personalized car insurance with privacy preservation and fraud resistance. IEEE Transactions on Vehicular Technology, 2022, doi: https://doi.org/10.1109/TVT.2022.3215811

  24. Kang J, Xiong Z, Niyato D, Ye D, Kim D I, Zhao J. Toward secure blockchain-enabled internet of vehicles: optimizing consensus management using reputation and contract theory. IEEE Transactions on Vehicular Technology, 2019, 68(3): 2906–2920

    Article  Google Scholar 

  25. Huang X, Yu R, Ye D, Shu L, Xie S. Efficient workload allocation and user-centric utility maximization for task scheduling in collaborative vehicular edge computing. IEEE Transactions on Vehicular Technology, 2021, 70(4): 3773–3787

    Article  Google Scholar 

  26. Liang J, Qin Z, Xiao S, Ou L, Lin X. Efficient and secure decision tree classification for cloud-assisted online diagnosis services. IEEE Transactions on Dependable and Secure Computing, 2021, 18(4): 1632–1644

    Article  Google Scholar 

  27. Bayat M, Pournaghi M, Rahimi M, Barmshoory M. NERA: a new and efficient RSU based authentication scheme for VANETs. Wireless Networks, 2020, 26(5): 3083–3098

    Article  Google Scholar 

  28. Zhang K, Mao Y, Leng S, Zhao Q, Li L, Peng X, Pan L, Maharjan S, Zhang Y. Energy-efficient offloading for mobile edge computing in 5G heterogeneous networks. IEEE Access, 2016, 4: 5896–5907

    Article  Google Scholar 

  29. Liu X, Wang W, Niyato D, Zhao N, Wang P. Evolutionary game for mining pool selection in blockchain networks. IEEE Wireless Communications Letters, 2018, 7(5): 760–763

    Article  Google Scholar 

  30. Zhou Z, Liao H, Zhao X, Ai B, Guizani M. Reliable task offloading for vehicular fog computing under information asymmetry and information uncertainty. IEEE Transactions on Vehicular Technology, 2019, 68(9): 8322–8335

    Article  Google Scholar 

Download references

Acknowledgements

The work was supported in part by the National Key R&D Program of China (No. 2020YFB1807802), and the National Natural Science Foundation of China (Grant Nos. 61971148, U22A2054).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Beihai Tan.

Additional information

Min Hao is now a PhD student of networked control systems in Guangdong University of Technology, China. His research interests mainly focus on vehicular networks, wireless communications and networking.

Beihai Tan received the PhD degree in Communication and Information System from South China University of Technology (SCUT), China, and the BS degree in Information and Computing Sciences from Taiyuan University of Technology (TUT), China in 2007 and 2002, respectively. Currently, He is an associate professor in the School of Integrated Circuits at Guangdong University of Technology (GDUT), China. Before joining in GDUT in August 2010, he was a Post-Doctor and associate research fellow in Electronic & Information Engineering at South China University of Technology (SCUT), China. His research interests include wireless networking and mobile computing.

Siming Wang is now a PhD student of networked control systems in Guangdong University of Technology, China. His research interests mainly focus on vehicular networks, wireless communications and networking.

Rong Yu received his BS degree in Communication Engineering from the Beijing University of Posts and Telecommunications, China in 2002, and PhD degree in Electronic Engineering from Tsinghua University, China in 2007. After that, he was with the School of Electronic and Information Engineering, South China University of Technology, China. In 2010, he joined the School of Automation, Guangdong University of Technology, where he is currently a professor. His research interests include wireless networking and mobile computing, such as edge computing, deep learning, blockchain, connected vehicles, smart grids, and Internet of Things.

Ryan Wen Liu received the BSc degree (Hons.) in Information and Computing Science from the Department of Mathematics, Wuhan University of Technology, China in 2009, and the PhD degree from The Chinese University of Hong Kong, China in 2015. He is currently an Associate Professor with the School of Navigation, Wuhan University of Technology, China. He was a Visiting Scholar with the Agency for Science, Technology and Research, Singapore. His research interests include machine learning, multi-source data fusion, and intelligent transportation systems.

Lisu Yu received the BE degree from the School of Information Science and Technology, Mao Yisheng Honors College, Southwest Jiaotong University, China in 2014, and the PhD degree from the Key Laboratory of Information Coding and Transmission, Southwest Jiaotong University, China in 2019. He is currently a Distinguished Associate Professor at the School of Information Engineering, Nanchang University, China. His main research interests include advanced wireless communications, coded modulation, nonorthogonal multiple access (NOMA).

Electronic supplementary material

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hao, M., Tan, B., Wang, S. et al. Exploiting blockchain for dependable services in zero-trust vehicular networks. Front. Comput. Sci. 18, 182805 (2024). https://doi.org/10.1007/s11704-023-2495-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11704-023-2495-0

Keywords

Navigation