Keywords

1 Introduction – Future Vehicles

The development in the transportation and automobile industry has been massive in the recent years. It has acquired new standards with the help of global enhancements and technological growth. This mainly covers concepts such as autonomous vehicles, smart cars, hybrid vehicles, vehicular networks, etc. Computer vision, image processing, sensors, and network-based algorithms are the major arenas that have contributed for such developments [1].

  1. a)

    Hybrid Intelligent Vehicles and Connected Vehicles

    Connected Automated Vehicles (CAV) are the ones that are instrumented with techniques like vehicle-to-vehicle or vehicle-to-internet networks [2]. They mainly consist of sensory networks to detecting trajectories and objects along with the feature of establishing interconnections with other vehicles. This is extremely useful for traffic forecast, predicting motion in surrounding environment, and to increase the accuracy of such information obtained [3, 4]. This is the foundational logic of cyber physical systems which utilize physical apparent parameters for controls through interaction and forecasting strategies. The supervision and control of CAV’s are done at numerous junctions, freeways, service roads, interjunctions, etc. This definitely helps in improving the efficiency, performance, etc. while also reducing the pollution and fuel consumption [5].

  2. b)

    Autonomous Vehicles

    A step further from the conventional vehicles leads to Autonomous Vehicles (Avs) and is capable of manoeuvring and navigating roads in driverless conditions. This mainly helps in reducing the possibility of human errors, decreases accidents, etc. Many companies and organizations, including tech giants, have invested on AVs so as to reduce the stress and tension caused by driving. However, there’s also a sceptical notion about the possibility of such AVs completely losing control on road and causing mishaps [7].

  3. c)

    Autonomous Intelligent Vehicles (AIV)

    Autonomous intelligent vehicles which are intelligent and automated and take action instantly over the road network to avoid any type of accidents or improve the transportation journey. These types of vehicles use Machine Learning, Deep learning, etc., techniques to improve its communication. In near future, AIV will use few emerging technologies like blockchain, edge computing, digital twin, etc., to improve its basic features. Few objectives, scope, etc., of Autonomous Intelligent Vehicles can be discussed in [27]. The possibility of developing a vehicle which is completely automated is highly likely provided it has access to information such the current environment, the route to take, and driving decisions. Robocars or robotaxis are smart vehicles that make use of a combination of sensors, processors, etc. to depict control and supervision over the driving abilities. Vehicles that are integrated with such innovative technologies also have certain unique points of interest. The ultimate aim of such vehicles is to limit accidents and energy consumption while reducing discharges. The key factors that influence such vehicles decisions include:

Perception

  1. a)

    Motion Preparation - (direction) steering, pace

  2. b)

    Navigating

  3. c)

    Behaviour – study of lanes, overtaking

The points mentioned above are targets for real-world users of autonomous vehicles. Now, possible uses of Future Vehicles in near future are (also refer Fig. 1):

  • e-healthcare

    Smart and autonomous vehicles are particularly useful in the health sector. In cases of accidents and emergencies, such vehicles can reduce latencies and reach the desired destination with ease in case of unavailability of drivers. Many a times, people affected by accidents are exposed to further critical conditions because of the lack of sufficient care and health support at the right time. Ambulance getting delayed due to heavy traffic, lack of coordination among drivers and hospitals, etc. also contribute to the above-mentioned cause. The fact the smart vehicles can predict traffic, road scenarios, and engage in interconnection networks, are highly efficient to ensure a safe and sound health support being recruited to the patients within very less time. The mini versions of CAV robots are also utilized for hospital sectors to deliver surgical and medical equipment which are required for surgeries, operations, etc. [8].

  • Supply chain

    The process of supply chain is pretty lengthy which starts with extraction and retrieval of raw materials all the way to delivering the products to consumers. The initial stages very often include the transportation of resources such as iron, metal, wood, etc. along with commuting the final goods. This aspect is extremely crucial in supply chains and it’s highly important to ensure that the goods are delivered to the customers at the right time, specifically in the food industry. Delays and latencies can often lead to spoilage of food and its wastage. The presence of different sensors in CAVs can make sure that the quality of food is maintained by controlling the ambient temperature and adjusting it as required [9]. This would also motivate consumers to order such products in reduced quantities which in turn decreases the stocks in inventory, benefiting both the employers and customers.

Fig. 1.
figure 1

Smart applications in current scenarios

  • The detailed description about progress/evolution of connected vehicles (2000 onwards) can be found in [26].

1.1 Blockchain/Distributed Ledger Technology

The infamous decentralized and distributed ledger technology [25, 28, 30] called Blockchain is being heavily used across various application aspects, which is immutable and is used for storing information in block like structures which are encrypted. The possibility of using Blockchain in various disciplines is highly probable in the near future. There are a number of parameters that make Blockchain systems unique and distinctive. Few of the pertinent characteristics are as follows:

  • Private, Public, and Permission Blockchain

  • Centralization and Decentralization

  • Persistency

  • Validity

  • Anonymity and Identity

  • Immutability

Other application of blockchain in this current smart era can be found in [14, 29]. Apart from this, the main advantages of Blockchain are as follows:

  • Enhanced transparency and flexibility of shipment procedures

  • Development in reliability and loyalty with recorded logs of transactions

  • Increased levels of precision and accuracy to combat with IoT

  • Users can integrate this to enhance business using IoT applications

With the help of Blockchain technology, it is possible to generate high levels of security and satisfactory levels of trust pertaining to the data stored in the distributed and centralized database.

1.2 Organisation of This Work

Note that in this work, Future Vehicles or Vehicles of Tomorrow or Autonomous vehicles, etc., terms have been used interchangeably (all terms have the similar meaning).

2 Role of Internet of Things in Future Vehicles

IoT is all about the interconnection of devices and gadgets that operate via the internet and is often used in the transportation sector. Intelligent transportation systems basically include a smarter and intelligent way of controlling the automobile sector in fields of traffic and signal management, accident control, road safety, etc. The growing number of vehicles have posed sufficient number of challenges to the people and government from the viewpoint of increasing fuel consumption, pollution and traffic jams. Just like how IoT was easily compatible with various other industries, its integration with the automobile industry would lead to rapid advancements and developments. With the help of IoT, a number of features such ass connectivity, cloud services, smart sensors, etc. could be added which in turn betters the performance and quality control. This powerful combination would lead to an organic interaction between people, roads, and vehicles and can provide a great solution to traffic issues and pollution [10].

3 Motivation

IoT allows for a quicker and safer exposure for pedestrians and drivers because they get sufficient information on road condition, traffic details, performance of vehicles, and energy consumption. However, with increasing usages of IoT for modernizing the vehicular sector, there’s an increase in malicious attacks and data breaches. The umbrella term of Internet of Vehicles (IoV), often termed as the future of vehicles, is consolidated with V2V networks and various sensors for information and data gathering. In case of an event where any one of the components fail, it can result in the failure of the whole system [11]. This is a huge vulnerability and when considered along with the lack of succinct privacy techniques to preserve data securely is addressed with the help of Blockchain technology. Protection and preserving privacy of databases and devices in IoT and related applications is one of the areas that is incorporated with this technology [12]. This paper discusses the possible strategies and uses of safe and secure decentralized blockchain environment. We also discuss the challenges in current vehicles and how smart and secure hybrid vehicles can help to solve these issues.

4 Issues, Constraints, Challenges with Current Vehicles

In the Vehicular Adhoc network VANET context [23,24,25,26] or current vehicles, we can distinguish several problems/issues:

  • Key agreement vs. key transport: Because VANET groups are scattered, key agreement is the most common method for establishing a new key. Each approach requires that all players broadcast numerous rounds of information in succession. While this method can be terminated in one round, it places most of the computational burden on the group leader, which is also a single point of failure, key transport involves allowing a group leader, either chosen by the specific application or chosen at random, to create and broadcast a group key to all members.

  • Join/Leave operations: Group membership is subject to rapid change in VANETs. As a result, the effective administration of new members’ join and exit procedures is an additional problem in safe group management. Existing keys may be transferred to a new member using simple methods such as key transport, but new keys must be computed and redistributed whenever a member leaves the system. A portion of keys may need to be re-computed for both actions in protocols based on key trees; although this adds complexity, it spreads the computation work better than simple key transfer. Because most VANET cars will have comparable degrees of security, the development of secure groups will simply help reduce security overhead, rather than establishing distinct levels of security across VANET members. This is critical to remember. The usage of secure groups, like digital signatures, secures the network from outsiders, not insiders as stated, just like digital signatures. This means that although it is still essential to renew or transfer current keys when new members join, the group key should not be updated automatically when a member quits.

  • Definition of group memberships: The VANET mobility concept, as previously indicated, is very dynamic. Even while some cars may travel close to one other for many kilometres at a time, others may rapidly overtake them or join the self-formed groups they have created. Group boundaries are exceedingly difficult to establish in these situations. Some members of the platoon may be unaware of a new vehicle joining from behind if the platoon is dispersed across multiple wireless hops. It will be time- and message-consuming and inefficient to perform group rekeying based on tree recomputation and rebalancing or key agreement. Keys might be transferred from the new member's next-door neighbour as a straightforward solution in this instance. But if a group's borders aren't clearly defined, cars that aren't part of the group may be caught up in a critical establishing effort. Additionally, even though these cars lack the group key, they are still required to receive safety warnings, necessitating the continual use of broadcasts with digital signatures. Group borders may be preloaded into vehicles in order to reduce the issue of changing group boundaries. Groups may be constructed based on cell membership, for example, by dividing highways into geographic cells.

  • Others: Many attacks like Denial of Service, Distributed Denial of Service (DDoS), Man in Middle Attacks, timing attacks, transition attacks, etc., are mitigate over VANET/current vehicles in Today’s scenarios.

5 Proposed System Model – Securing Future Vehicles

To proceed further for proposed work, first we need to explain the problem raised in the recent decade with vehicles or autonomous vehicles.

Problem Definition:

One of the various crucial aspects is the leakage of a user’s personal data [24,25,26,27,28]. Similarly, preserving the privacy of consumers and building their trust with respect to the service provider can be very tedious in the modern era.

Fig. 2.
figure 2

Java code for creating a Blockchain

Fig. 3.
figure 3

Simulation of Blockchain after mining all the blocks

Solution:

WE used following algorithms to secure our vehicles over the road network. Which can be explained as:

  • Algorithms 1: This algorithm is used to encrypt the communicated data (over the road network) by the sender side.

  • Algorithms 2: This algorithm uses Ring signature and public key sharing among users/drivers (over the road network) to encrypted and share the data.

  • Algorithms 3: This algorithm is used to decrypt the communicated data (over the road network) by the receiver side.

  • Algorithms 4: This algorithm is used to verify signature or shared keys or validate user to access the services (provided by vehicles).

Figure 2 and Figs. 3 show the creation of Blocks, and Blockchain which are written in Java language.

6 An Open Discussion on Internet of Things (IoT) – Machine Learning Based Autonomous Vehicles (AV)

Consistent supervision of data from various interconnected Avs and AIVs along with the strategy to compute suitable routes and paths based on environmental factors is what contributed towards the success and evolution of smart vehicles. Incorporating AI with such vehicles led to various patterns which are constantly evolving and they contribute towards identifying a route that smoothen the travel experience. When the AI determines that traffic patterns (using machine learning) are changing, it can even change the course of a journey if necessary. Few other comparisons are summarized here as:

  1. a)

    Current Vehicles vs Future Vehicles

  2. b)

    Autonomous Vehicles Vs Autonomous Intelligent Vehicles

In [13, 27], details about Intelligent Vehicles, connected vehicles, Hybrid Vehicles and Autonomous Intelligent Vehicles and raised issues in it have been explained. The majority of previous research on sensory network coverage have been theoretical. Deeper analysis might concentrate on solutions that can be implemented more quickly in the real world. The following is a list of other research issues. These distributed self-organizing networks have three major challenges: high node mobility [25, 26], system scalability constraints, and a wide variety of environmental factors. Automobiles travelling at high speeds in varied situations, such as on highways, provide a unique challenge. The bulk of iterative algorithms meant to optimise channel bandwidth or predefined paths interact with these properties. VANET security and privacy must be managed [27, 28]. The user's privacy concerns may collide with the recipient's desire to know the source of the information. Virtual area networks (VANs) face unique challenges when trying to establish reliable wireless connection.

7 Related Work

As discussed in [26, 27], for a wireless network to function, several general security requirements must be taken into account. These include authenticity, scalability, privacy and anonymity; as well as cooperation, stability, and low communication delay. With respect to this may researchers/scientist have made serious attempts to secure/preserve privacy of vehicles/such transportation system in the previous decades. Which can be summarized here as:

In the case of vehicular ad-hoc networks, the authors of [15] and [16] have worked on a seven-layered secure and reliable technique that utilizes blockchain based Vehicular Adhoc Network (VANETs) system. For applications that relate to gathering vehicular data, car taxes, etc. a combination of Ethereum and blockchain related smart contracts are used. The use of the technology was further enlarged to consist of peer-based interactions and intra-vehicle communication facilities. Furthermore, the author of [17] has put forth a technique using blockchain that is capable of updating the information of the vehicle wirelessly while preserving the details of the vehicle and its users. In [18], the authors have elucidated the use of blockchain via acoustic side channels along with vision empowered light so as to preserve data during intravehicular interactions. The implementation was carried out using a public key for the blockchain, a new key for cryptographic encryption, and a leverage mechanism for both the side-channels. On the other hand, the authors of [19] proposed an idea that utilizes distributed clustering to control the energy demands of IoV which is powered through blockchain facilities. The results obtained saves around 40% of energy and 82% of the transaction numbers needed. In [20], the authors have described the concept of blockchain and have focused on the architectural aspect of the selection process involved in choosing a gas filling station for an autonomous vehicle. The author has emphasized on the different security problems and concerns which prevail due to the existence of data that is transmitted between vehicles.

In [21], the proposal of a blockchain system to validate and verify consent between entities was highlighted. They’ve given details of using a multi-agent vehicle for communication and have elucidated how the communication can be secured in such cases. Furthermore, the authors of [22] have executed blockchain systems in unmanned aerial vehicles wherein, each vehicle is considered to be an individual node and the controlling mechanism is done by blockchain. Very recently, the authors of [23] had deployed the blockchain concept in terms of transferring data pertaining to traffic jams and scenarios which are transmitted to vehicles in a tamper proof way. The data is gathered through proof-of-event consensus and warnings are initiated through two-phase transaction strategies.

In the last, many other mechanisms like swing and swap, path confusion, l-diversity, encryption-based method, mix zone, etc., have been used in previous decades to preserve the privacy of users during accessing location-based services (LBSs).

8 Conclusion

This paper elaborates on IoT based Blockchain technique which ultimately records and keeps a track of all activities and transactions of users based on their interaction and connections with other nodes/users in the network. Smart contracts are used to help record the transactions and user activities consistently and frequent updates and upgrades of these records are augmented with IoT fragments to escalate the trade invested on the same which is linked with Blockchain systems. User convenience and user efficiency are major issue in transportation sector/future vehicles.