skip to main content
10.1145/3571306.3571434acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicdcnConference Proceedingsconference-collections
research-article

TreeChain: A High Throughput and Efficient Search based Secure Application for Internet of Vehicles

Published:04 January 2023Publication History

ABSTRACT

The Internet of Vehicles (IoV) rapidly expands due to lower bandwidth, enhanced security, and privacy for high-quality information sharing with minimal latency. To properly execute all these services, IoV must first overcome several challenges created by the centralized architecture, notably those related to throughput and data storage. We offer TreeChain, a high throughput and efficient information-searching technique based on a novel balance tree structure that also addresses the most extended chain sequence problem. Following that, TreeChain compares security strength in terms of several types of security attacks to other state-of-the-art methodologies, as well as performance results in terms of throughput and data storage. According to the results, TreeChain outperforms state-of-the-art solutions in terms of security and performance.

References

  1. [1] R. Li, T. Song, B. Mei, H. Li, X. Cheng and L. Sum, “Blockchain For Large-Scale Internet of Things Data Storage and Protection,” IEEE Transactions on Service Computing, IEEE 2018, pp.762-771.Google ScholarGoogle Scholar
  2. [2] A. Dorri, S. Kanhere, R. Jurdak, and P. Gauravaram “LSB: A Lightweight Scalable Blockchain for IoT Security and Privacy,” Journal of Parallel and Distributed Computing, 134, 2019, pp.180–197.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. [3] L. Li, J. Liu, L. Cheng, S. Qiu, W. Wang, X. Zhanng, and Z. Zhang “CreditCoin: A Privacy-Preserving Blockchain-based Incentive Announcement Network for Communications of Smart Vehicles,” IEEE Transactions on Intelligent Transportation Systems, IEEE 2018, pp.2204-2220.Google ScholarGoogle ScholarCross RefCross Ref
  4. [4] X. Zhang, and X. Chen “Data Security Sharing and Storage Based on a Consortium Blockchain in a Vehicular Ad-hoc Network,” IEEE Access 2019, pp.2169-3536.Google ScholarGoogle Scholar
  5. [5] C. Chen, J. Wu, H. Lin and W. Chen “A Secure and Efficient Blockchain-Based DataTrading Approach for Internet of Vehicles,” IEEE Transactions on Vehicular Technology, IEEE 2019.Google ScholarGoogle ScholarCross RefCross Ref
  6. [6] M. Kamal, G. Srtivastava, and M. Tariq "Blockchain-Based Lightweight and Secured V2V Communication in the Internet of Vehicles," IEEE Transactions on Intelligent Transportation Systems, IEEE 2020.Google ScholarGoogle Scholar
  7. [7] T. Jiang, H. Fang, and H. Wang "Blockchain-based internet of vehicles: Distributed network architecture and performance analysis," IEEE Internet of Things Journal, IEEE 2018, pp.4640-4649.Google ScholarGoogle Scholar
  8. [8] F. Jameel, M. Javed, Z. Awais, S. Zeadally and R. Jntti "Efficient Mining Cluster Selection for Blockchain-based Cellular V2X Communications," IEEE Transactions on Intelligent Transportation Systems, IEEE 2020.Google ScholarGoogle Scholar
  9. [9] C. Lin, D. He, X. Huang, N. Kumar and R. Choo "BCPPA: A Blockchain-Based Conditional Privacy-Preserving Authentication Protocol for Vehicular Ad Hoc Networks," IEEE Transactions on Intelligent Transportation Systems, IEEE 2020.Google ScholarGoogle Scholar
  10. [10] J. Li, H. Lu, and M. Guizani, "ACPN: A Novel Authentication Framework with Conditional Privacy Preservation and Non-Repudiation for VANETs," IEEE Transactions on Parallel and Distributed Systems, IEEE 2014, pp.938-948.Google ScholarGoogle Scholar
  11. [11] C. Sun, J. Liu, X. Xu, and J. Ma, ”A Privacy-Preserving Mutual Authentication Resisting DoS Attacks in VANETs,” IEEE Access 2017, pp.24012-24022.Google ScholarGoogle ScholarCross RefCross Ref
  12. [12] M. Hammi, B. Hammi, P. Bellot, Bubbles of trust: A Decentralized Blockchain based Authentication System for IoT,. Computer Security, 78, 2018, pp.126-142Google ScholarGoogle ScholarCross RefCross Ref
  13. [13] X. Wang, P. Zeng, N. patterson, F. Jiang and R. Doss "An improved authentication scheme for internet of vehicles based on Blockchain technology," IEEE Access, 2019, pp.45061-45072.Google ScholarGoogle ScholarCross RefCross Ref
  14. [14] B. Chen, D. He, N. Kumar, H. Wang and K. Raymond, "A Blockchain-Based Proxy Re-Encryption with Equality Test for Vehicular Communication Systems," IEEE Transactions on Network Science and Engineering, IEEE 2020.Google ScholarGoogle Scholar

Index Terms

  1. TreeChain: A High Throughput and Efficient Search based Secure Application for Internet of Vehicles

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          ICDCN '23: Proceedings of the 24th International Conference on Distributed Computing and Networking
          January 2023
          461 pages
          ISBN:9781450397964
          DOI:10.1145/3571306

          Copyright © 2023 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 4 January 2023

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed limited
        • Article Metrics

          • Downloads (Last 12 months)25
          • Downloads (Last 6 weeks)1

          Other Metrics

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format .

        View HTML Format