Skip to main content

Blockchain-Based Cyberthreat Mitigation Systems for Smart Vehicles and Industrial Automation

  • Chapter
  • First Online:
Multimedia Technologies in the Internet of Things Environment

Part of the book series: Studies in Big Data ((SBD,volume 79))

Abstract

The smart vehicle interaction grid is susceptible to cyberthreats, which are hard to crack employing outdated centralized security methodologies. Blockchain is an absolute P2P circulated record having cryptographically protected information. Blockchain demonstrates effective use cases in economic purposes, smart communication, etc. It expands to every industry comprising protected IoT devices. The exceptional characteristic of blockchain is that its distributed, unalterable, inspect database that safeguards transactions by keeping secrecy. In this paper, we anticipate the situation of the smart vehicle interaction grid and deliver considering approaches for assembling a blockchain-oriented system among smart vehicles. The paper discusses various use cases of blockchain in smart vehicles and ongoing advancement from motorized industries in addition to educational organizations. Blockchain in smart vehicles functions as a public distributed ledger which is capable of recording dealings between two groups. Though, the acceptance and execution of blockchain technologies in numerous organizations and facilities is a difficult job. The goal of this paper is to classify the obstacles for the effective execution of blockchain technologies in the companies.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Hasan, M. G. M. M., Datta, A., & Rahman, M. A. (2018). Poster abstract: Chained of things: A secure and dependable design of autonomous vehicle services. In 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI). https://doi.org/10.1109/iotdi.2018.00048.

  2. Zhao, N., & Wu, H. (2019). Blockchain combined with smart contract to keep safety energy trading for autonomous vehicles. In 2019 IEEE 89th Vehicular Technology Conference (VTC2019-Spring). https://doi.org/10.1109/vtcspring.2019.8746337.

  3. Biswas, B., & Gupta, R. (2019). Analysis of barriers to implement blockchain in industry and service sectors. Computers & Industrial Engineering, 136, 225–241. https://doi.org/10.1016/j.cie.2019.07.005.

    Article  Google Scholar 

  4. Axon, L., Goldsmith, M., & Creese, S. (2018). Privacy requirements in cybersecurity applications of blockchain. Advances in Computers Blockchain Technology: Platforms, Tools and Use Cases, pp. 229–278. https://doi.org/10.1016/bs.adcom.2018.03.004.

  5. Jin, P. J., Zhang, G., Walton, C. M., Jiang, X., & Singh, A. (2013). Analyzing the impact of false-accident cyber attacks on traffic flow stability in connected vehicle environment. In 2013 International Conference on Connected Vehicles and Expo (ICCVE). https://doi.org/10.1109/iccve.2013.6799866.

  6. Nawa, K., Chandrasiri, N. P., Yanagihara, T., Komori, T., & Oguchi, K. (2012). Cyber physical system for vehicle application. In 2012 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems (CYBER). https://doi.org/10.1109/cyber.2012.6392540.

  7. Singh, A., & Singh, M. (2018). An empirical study on automotive cyber attacks. In 2018 IEEE 4th World Forum on Internet of Things (WF-IoT). https://doi.org/10.1109/wf-iot.2018.8355124.

  8. Kaur, R., Singh, T. P., & Khajuria, V. (2018). Security issues in vehicular ad-hoc network (VANET). In 2018 2nd International Conference on Trends in Electronics and Informatics (ICOEI). https://doi.org/10.1109/icoei.2018.8553852.

  9. Chaqfeh, M., Mohamed, N., Jawhar, I., & Wu, J. (2016). Vehicular cloud data collection for intelligent transportation systems. In 2016 3rd Smart Cloud Networks & Systems (SCNS). https://doi.org/10.1109/scns.2016.7870555.

  10. Ashtankar, P. P., & Dorle, S. S. (2015). Application based design strategies and simulation of wireless adhoc communication network using intelligent transportation system. In 2015 International Conference on Energy Systems and Applications. https://doi.org/10.1109/icesa.2015.7503450.

  11. Kim, S. (2018). Blockchain for a trust network among intelligent vehicles. Advances in Computers Blockchain Technology: Platforms, Tools and Use Cases, pp. 43–68.https://doi.org/10.1016/bs.adcom.2018.03.010.

  12. Miller, J. (2008). Vehicle-to-vehicle-to-infrastructure (V2V2I) intelligent transportation system architecture. In 2008 IEEE Intelligent Vehicles Symposium. https://doi.org/10.1109/ivs.2008.4621301.

  13. Mallikarjuna, G. C. P., Hajare, R., Mala, C. S., Rakshith, K. R., Nadig, A. R., & Prtathana, P. (2017). Design and implementation of real time wireless system for vehicle safety and vehicle to vehicle communication. In 2017 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT). https://doi.org/10.1109/iceeccot.2017.8284527.

  14. Maglaras, L., Al-Bayatti, A., He, Y., Wagner, I., & Janicke, H. (2016). Social internet of vehicles for smart cities. Journal of Sensor and Actuator Networks, 5(1), 3https://doi.org/10.3390/jsan5010003.

  15. Duong, M.-T., Do, T.-D., & Le, M.-H. (2018). Navigating self-driving vehicles using convolutional neural network. In 2018 4th International Conference on Green Technology and Sustainable Development (GTSD). https://doi.org/10.1109/gtsd.2018.8595533.

  16. Soni, S., & Bhushan, B. (2019). A comprehensive survey on blockchain: Working, security analysis, privacy threats and potential applications. In: 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT). https://doi.org/10.1109/icicict46008.2019.8993210.

  17. Perkins, C. E. (2008) Ad hoc networking; addison-wesley professional. Boston, MA, USA: Addison-Wesley.

    Google Scholar 

  18. Caballero-Gil, P., Caballero-Gil, C., & Molina-Gil, J. (2013). How to build vehicular ad-hoc networks on smartphones. Journal of Systems Architecture, 59(10), 996–1004. https://doi.org/10.1016/j.sysarc.2013.08.015.

    Article  Google Scholar 

  19. Wang, M., Shan, H., Lu, R., Zhang, R., Shen, X., & Bai, F. (2015). Real-Time Path planning based on hybrid-VANET-enhanced transportation system. IEEE Transactions on Vehicular Technology, 64(5), 1664–1678. https://doi.org/10.1109/tvt.2014.2335201.

    Article  Google Scholar 

  20. Tornell, S. M., Patra, S., Calafate, C. T., Cano, J.-C., & Manzoni, P. (2015). GRCBox: Extending smartphone connectivity in vehicular networks. International Journal of Distributed Sensor Networks, 11(3), 478064. https://doi.org/10.1155/2015/478064.

    Article  Google Scholar 

  21. Maglaras, L. A., Basaras, P., & Katsaros, D. (2013). Exploiting vehicular communications for reducing CO2 emissions in urban environments. In 2013 International Conference on Connected Vehicles and Expo (ICCVE). https://doi.org/10.1109/iccve.2013.6799765.

  22. Yan, G., Wen, D., Olariu, S., & Weigle, M. C. (2013). Security challenges in vehicular cloud computing. IEEE Transactions on Intelligent Transportation Systems, 14(1), 284–294. https://doi.org/10.1109/tits.2012.2211870.

    Article  Google Scholar 

  23. Ji, S., Chen, T., & Zhong, S. (2015). Wormhole attack detection algorithms in wireless network coding systems. IEEE Transactions on Mobile Computing, 14(3), 660–674. https://doi.org/10.1109/tmc.2014.2324572.

    Article  Google Scholar 

  24. Malik, A., Gautam, S., Abidin, S., & Bhushan, B. (2019). Blockchain technology-future of IoT: Including structure, limitations and various possible attacks. In 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT). https://doi.org/10.1109/icicict46008.2019.8993144.

  25. Arora, D., Gautham, S., Gupta, H., & Bhushan, B. (2019). Blockchain-based security solutions to preserve data privacy and integrity. In 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS). https://doi.org/10.1109/icccis48478.2019.8974503.

  26. Singh, M., Kim, S. (2017). Safety Requirement Specifications for Connected Vehicles. https://www.arXiv:1707.08715.com.

  27. Bhushan, B., & Sahoo, G. (2020). Requirements, protocols, and security challenges in wireless sensor networks: An industrial perspective. Handbook of Computer Networks and Cyber Security, pp. 683–713.https://doi.org/10.1007/978-3-030-22277-2_27.

  28. Polyzos, G. C., & Fotiou, N. (2017). Blockchain-assisted information distribution for the internet of things. In 2017 IEEE International Conference on Information Reuse and Integration (IRI). https://doi.org/10.1109/iri.2017.83.

  29. Sharma, T., Satija, S., & Bhushan, B. (2019). Unifying blockchain and IoT: Security requirements, challenges, applications and future trends. In 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS). https://doi.org/10.1109/icccis48478.2019.8974552.

  30. Saini, H., Bhushan, B., Arora, A., & Kaur, A. (2019). Security vulnerabilities in Information communication technology: Blockchain to the rescue (A survey on Blockchain Technology). In 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT). https://doi.org/10.1109/icicict46008.2019.8993229.

  31. Sharma, P. K., Moon, S. Y., & Park, J. H. (2017). Block-VN: A distributed blockchain based vehicular network architecture in smart city. Journal Information Processing System, 13(1), 184–195.

    Google Scholar 

  32. Beer, C., & Weber, B. (2014). Bitcoin—The promise and limits of private innovation inmonetary and payment systems. MONETARY Policy & the Economy, 4, 53–66.

    Google Scholar 

  33. Zyskind, G., Nathan, O., & Sandy P. A (2015). Decentralizing privacy: Using blockchain to protect personal data. In 2015 IEEE Security and Privacy Workshops. https://doi.org/10.1109/spw.2015.27.

  34. Gervais, A., Ritzdorf, H., Karame, G. O., & Capkun, S. (2015). Tampering with the delivery of blocks and transactions in bitcoin. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications SecurityCCS15. https://doi.org/10.1145/2810103.2813655.

  35. Karame, G. (2016). On the security and scalability of bitcoins blockchain. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications SecurityCCS16. https://doi.org/10.1145/2976749.2976756.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bharat Bhushan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Madaan, G., Bhushan, B., Kumar, R. (2021). Blockchain-Based Cyberthreat Mitigation Systems for Smart Vehicles and Industrial Automation. In: Kumar, R., Sharma, R., Pattnaik, P.K. (eds) Multimedia Technologies in the Internet of Things Environment. Studies in Big Data, vol 79. Springer, Singapore. https://doi.org/10.1007/978-981-15-7965-3_2

Download citation

Publish with us

Policies and ethics