Blockchain-Based Collaborative Certificate Revocation Systems Using Clustering

Archive ouverte : Article de revue

Didouh, Ahmed | Labiod, Houda | El Hillali, Yassin | Rivenq, Atika

Edité par HAL CCSD ; IEEE

International audience. Despite the decisive contribution of intelligent transport systems in road safety, they also open new vulnerabilities to cyber-attacks, particularly vehicle position-linked attacks. For that reason, centralized systems are becoming increasingly vulnerable to the growth of the connected-vehicle fleets as it becomes more challenging to revoke certificates in real-time. We have proposed a new method that integrates a decentralized, collaborative system to meet these challenges. This method efficiently allows Blockchain integration for vehicular network’s cyber security by dynamically creating communities to revoke malicious vehicles in real-time. This article presents analytical models of the system of real-time revoking certificates and examines our solution’s impact on two important types of attacks in V2X communications, Sybil and the faking position attacks. Our experiments using real V2X hardware demonstrated the feasibility and benefits of real-time revocation via vehicle communities. The results were obtained from consensus implementation in a vehicular network comprising three communicating vehicles and a single roadside unit. In parallel, simulations showed feasibility in large-scale communications. As a result, the exposure and detection times of our solution meet real-time requirements.

Consulter en ligne

Suggestions

Du même auteur

Novel Centralized Pseudonym Changing Scheme for Location Privacy in V2X Communication | Didouh, Ahmed

Novel Centralized Pseudonym Changing Scheme for Location Privacy in V2X Com...

Archive ouverte: Article de revue

Didouh, Ahmed | 2022-02

International audience. Vehicular ad hoc networks allow vehicles to share their information for the safety and efficiency of traffic purposes. However, information sharing can threaten the driver’s privacy as it inc...

Channel state information-based cryptographic key generation for intelligent transportation systems | Ribouh, Soheyb

Channel state information-based cryptographic key generation for intelligen...

Archive ouverte: Article de revue

Ribouh, Soheyb | 2021-12

International audience. Due to the sensitivity of the information exchanged in Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I) communication, generating secret keys is critical to secure these communica...

False Data Injection Attack Against Cyber-Physical Systems Protected by a Watermark | Guibene, Khalil

False Data Injection Attack Against Cyber-Physical Systems Protected by a W...

Archive ouverte: Communication dans un congrès

Guibene, Khalil | 2022

International audience

Du même sujet

Channel state information-based cryptographic key generation for intelligent transportation systems | Ribouh, Soheyb

Channel state information-based cryptographic key generation for intelligen...

Archive ouverte: Article de revue

Ribouh, Soheyb | 2021-12

International audience. Due to the sensitivity of the information exchanged in Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I) communication, generating secret keys is critical to secure these communica...

Exploring Data Fusion for Multi-Object Detection for Intelligent Transportation Systems using Deep Learning. Exploration de la fusion de données pour la détection d’objets multiples dans les systèmes de transport intelligents à l’aide de l’apprentissage profond | Mimouna, Amira

Exploring Data Fusion for Multi-Object Detection for Intelligent Transporta...

Archive ouverte: Thèse

Mimouna, Amira | 2021-05-25

Building reliable environment perception systems is a crucial task for autonomous driving, especially in dense traffic areas. Researching in this field is evolving increasingly. However, we are at the beginning of a research pathw...

Le siècle de la voiture intelligente / Claude Laurgeau | Laurgeau, Claude. Auteur

Le siècle de la voiture intelligente / Claude Laurgeau

Livre | Laurgeau, Claude. Auteur | 2009

Lorsque au début du 20e siècle, on a remplacé progressivement les voitures hippomobiles par des voitures automobiles, on a remplacé les chevaux par des moteurs à explosion, le mors et les rênes par des cardans et un volant, le fou...

Breaking (and Fixing) Channel-based Cryptographic Key Generation: A Machine Learning Approach | Alouani, Ihsen

Breaking (and Fixing) Channel-based Cryptographic Key Generation: A Machine...

Archive ouverte: Communication dans un congrès

Alouani, Ihsen | 2022-08-31

International audience. Several systems and application domains are under-going disruptive transformations due to the recent breakthroughs in computing paradigms such us Machine Learning and commu-nication technolog...

LSTM-based system for multiple obstacle detection using ultra-wide band radar | Mimouna, Amira

LSTM-based system for multiple obstacle detection using ultra-wide band rad...

Archive ouverte: Communication dans un congrès

Mimouna, Amira | 2021-02-04

International audience. Autonomous vehicles present a promising opportunity in the future of transportation systems by providing road safety. As significant progress has been made in the automatic environment percep...

RIVER PROJECT, AN INNOVATIVE WAY TO REDUCE POLLUTION ON RIVERBOATS | Abdel, Aitouche

RIVER PROJECT, AN INNOVATIVE WAY TO REDUCE POLLUTION ON RIVERBOATS

Archive ouverte: Communication dans un congrès

Abdel, Aitouche | 2023-01-19

International audience. Considering the EU environmental standards for non-road mobile machinery (NRMM), reducing pollutant emissions from inland waterway vessels is becoming increasingly important. The RIVER resear...

Chargement des enrichissements...