A Secure Blockchain Enabled V2V Communication System Using Smart Contracts
A Secure Blockchain Enabled V2V Communication System Using Smart Contracts
A Secure Blockchain Enabled V2V Communication System Using Smart Contracts
Authorized licensed use limited to: Government of Egypt - SPCESR - (EKB). Downloaded on March 17,2024 at 20:52:59 UTC from IEEE Xplore. Restrictions apply.
4652 IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, VOL. 24, NO. 4, APRIL 2023
Authorized licensed use limited to: Government of Egypt - SPCESR - (EKB). Downloaded on March 17,2024 at 20:52:59 UTC from IEEE Xplore. Restrictions apply.
DAS et al.: SECURE BLOCKCHAIN ENABLED V2V COMMUNICATION SYSTEM USING SMART CONTRACTS 4653
TABLE II
C OMPARATIVE A NALYSIS OF E XISTING W ORKS W ITH THE P ROPOSED W ORK
provide high-speed mobility and an intricate channel formation Point (IV-TP) scheme to encourage vehicles for trusted com-
for the V2V communication network. Kim and Peeta [22] munication. Patel et al. [28] suggested a blockchain-based
presented the V2V-based Advanced Traveler Information Sys- application named VehicleChain that is dependable and cost-
tem (ATIS) network modeling framework. This model has effective for sharing data in V2V and Vehicle-to-Infrastructure
three layers the physical layer, the data flow layer, and (V2I) communication modes. This method can secure data
the communication layer. The proposed approach also offers from any cyber-physical attacks. Malik et al. [29] established
responsive modeling capabilities to explain the evolution of a blockchain-based retraction and authentication framework
information. Hu and Luo [4] presented the fundamental ideas to overcome two types of cost: communication and compu-
for safe communication. And, then they provided secure tational in V2V communications by eliminating third parties
communication mechanisms, including information authenti- from the system using Road Side Units (RSUs) for vehicle
cation, information encryption, and security against infiltra- identification. Table III represents the differentiation of pro-
tion. Kamal et al. [25] proposed wireless-based fingerprint posed work with IoT [23] and Artificial Intelligence (AI)-
generation methods to authenticate vehicles in real time. based IoT [24] works based on various characteristics.
The proposed scheme has been developed using blockchain
technology to enhance the complexity and delays of the net-
IV. P ROPOSED S YSTEM
work. Jabbar et al. [26] developed a blockchain-enabled real-
time application for secure and easy communications between In this paper, a secure Blockchain-enabled V2V Communi-
vehicles and connected entities in the V2X communication cation System (BVCS) is proposed to enable secure commu-
system. They have also developed a Decentralized Application nication between vehicles by sharing the correct information.
(Dapp) contract. Singh et al. [27] suggested and developed a Fig. 1 shows the system model of the proposed method, which
method for communication between vehicles using blockchain. consists of the two-layer model. On the top layer, blockchain
They offered an incentive-based Intelligent Vehicle-Trust nodes are present, and vehicles are attending on the ground
Authorized licensed use limited to: Government of Egypt - SPCESR - (EKB). Downloaded on March 17,2024 at 20:52:59 UTC from IEEE Xplore. Restrictions apply.
4654 IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, VOL. 24, NO. 4, APRIL 2023
TABLE III
C OMPARISON OF AI AND I OT-BASED A PPROACHES W ITH O UR W ORK
A. Initial Stage
In the BVCS, various entities are introduced: user, vehicle,
blockchain node, and smart contract. The interaction between
these entities is shown in Fig. 2, in which each of them has
an important role. A user provides the required credentials
while buying a vehicle. An authorized node is responsible for
collecting the user credentials. An authenticated blockchain
node verifies the user data and then provides the vehicle’s data,
such as vehicle number, engine number, and chassis number.
Given data will be stored in the blockchain data pool by the
corresponding node. The user can verify the data through the
user application to ensure that the correct data is stored or
not. After user confirmation, the minor node puts the data
in the blockchain. In such a way, the appropriate data will be
stored in the blockchain. The authentication of the user will be
performed by the smart contracts automatically. A blockchain
node deploys smart contracts to the blockchain. The vehicle
of the corresponding user can access the data after being
authenticated by the smart contracts. Each transmitted data
in V2V communication will be verified automatically using
smart contracts and stored on the blockchain.
B. Registration Stage
An identification key is essential for identifying a vehicle
and the vehicle’s user. Thus, a unique Id (UI) is introduced
Fig. 1. System model of the BVCS. to identify a vehicle and the vehicle’s user. A UI should
be unique and is only accessible by the application only.
layer. Two layers are connected using the network connection The UI is a hash value generated by smart contracts using
mode of C-V2X. More than one node can be chosen as an the user blockchain account address. The blockchain account
authenticated node. The authenticated node(s) are responsible address is needed to identify the particular vehicle and the user.
for controlling the blockchain application, deploying smart A UI uniquely can specify a vehicle number and a user license
contracts, and vehicle registration. It assumes that registered number with the vehicle chassis number, the engine number,
vehicles can only take part in the blockchain network. Each and the user information. UI will be generated by applying
vehicle should have a tamper-proof device for storing commu- the SHA-512 hash generation function [30]. It is an efficient
nication data securely. In addition, vehicles are equipped with algorithm to guarantee data integrity as it always returns the
a C-V2X-supported onboard unit called Connectivity Control identical output for the corresponding assigned input value.
Unit (CCU). Only authenticated vehicles are allowed to inter- It is also a modern cryptographic hash generation function and
act with each other. The Authentication of users and vehicles is considered highly secure [31]. Thus, a UI always contains
is an automated process and is done by using smart contracts the same hash value, and it will be unique. The UI generation
automatically. The BVCS can help to obtain an authentication- process is shown in “equation (1),”. In the BVCS scheme,
based information-sharing mechanism. The proposed system the user can obtain multiple UIs for using more than one
is divided into four stages: the initial stage, the registration vehicle. The user can get a UI after login into the application.
stage, the authentication stage, and the communication stage. Therefore, the UI will be saved to the blockchain for future
Authorized licensed use limited to: Government of Egypt - SPCESR - (EKB). Downloaded on March 17,2024 at 20:52:59 UTC from IEEE Xplore. Restrictions apply.
DAS et al.: SECURE BLOCKCHAIN ENABLED V2V COMMUNICATION SYSTEM USING SMART CONTRACTS 4655
Authorized licensed use limited to: Government of Egypt - SPCESR - (EKB). Downloaded on March 17,2024 at 20:52:59 UTC from IEEE Xplore. Restrictions apply.
4656 IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, VOL. 24, NO. 4, APRIL 2023
Fig. 4. Sequential diagram of the interaction between two vehicles and smart
contracts for establishing secure communication.
Algorithm 3 Communication Establishment Between V x
and V y
D. Communication Stage
Input: U I x, U I y
Output: S K x, S K y After the completion of the user and vehicle authentication,
1 After the successful authentication of U x and U y; the vehicle can share information. For V2V communication,
2 The application creates S K x and S K y;
vehicles use their secret key created using SHA-512 because
3 if (U I x is valid) then
of its faster execution. They store their key in their tamper-
4 S K x is stored in the vehicle device of Vx; proof device. They can communicate securely with each other
using their secret key. The secret key will be generated using
5 V x sends S K x to V y;
smart contracts, as shown in “equation (3),”.
6 V y sends back it to smart contracts;
7 if (S K x is true) then // smart contract checks S K x S K x = H (U I x RT x V N x T ) (3)
with the stored S K x in the blockchain;
8 V x is validated; V2V Communication: Secure V2V communication between
9 V y ensures that V x is authenticated; vehicles is proposed for the intelligent transport system to
achieve efficient and secure communication using blockchain
10 end
and more high-speed and secure communication technol-
11 end
ogy like C-V2X. Here, vehicles should be validated before
12 if (U I y is valid) then // this instruction will be executed
establishing communication with other vehicles. C-V2X is
while the instruction of line no. 3 will be executed;
a platform that integrates with the LTE-V2X PC5 interface
13 S K y is stored in the vehicle device of Vy;
for short-range and network-less V2V communications. The
14 V y sends it to V x;
communication process between V x and Vy is presented in
15 V x sends back it to smart contracts; “Algorithm (3)”. However, user and vehicle authentication of
16 if (SKy is true) then // smart contract checks S K y V x and V y is required before establishing secure communi-
with the stored S K y in the blockchain;
cation. So, secure communication will be established between
17 V y is validated;
V x and V y. Fig. 4 shows the sequential interaction between
18 V x ensures that V y is authenticated; two vehicles and smart contracts for establishing secure
19 Now, secure communication is established between communication. Smart contracts verify users and vehicles to
V x and V y; achieve the trustworthiness of the communication system.
20 end However, the communication data should be verified by smart
21 end
contracts, and then data will be shared between V x and V y.
Thus, encrypted [31] data will be shared for achieving data
security. V x encrypts data with S K x and sends the encrypted
data for decryption to V y. In such a way, V y also encrypts
validation of the vehicle is failed, it means unauthorized data with S K y and sends the encrypted data for decryption
access is detected. Finally, an unauthorized accesses detection to V x. The encryption method of a secret key is not like
message will be delivered to the user and the concerned symmetric encryption. But in our proposed work, a session-
authority. wise secret key is used to establish secure communication and
Authorized licensed use limited to: Government of Egypt - SPCESR - (EKB). Downloaded on March 17,2024 at 20:52:59 UTC from IEEE Xplore. Restrictions apply.
DAS et al.: SECURE BLOCKCHAIN ENABLED V2V COMMUNICATION SYSTEM USING SMART CONTRACTS 4657
V. T ESTING R ESULTS
In the BVCS, three algorithms are developed to Fig. 10. The user is authenticated successfully.
authenticate the user and vehicle and establish secure com-
munication. These algorithms are implemented using smart
contracts. The code is written in solidity language through a
web-based platform named Ethereum Remix IDE (v0.24.1)
[32]. Smart contract codes can implement and run on the Fig. 11. The user cannot be authenticated by providing the wrong token.
Ethereum Virtual Machine (EVM). The solidity compiler ver-
sion is 0.8.7, and the EVM version is assigned to the compiler
default. JavaScript VM (v4.2.0) environment is selected for
deploying and executing codes. The input data (BAC: 0x5. Fig. 12. UI is created successfully for the user.
38Da6a701c568545dCfcB03FcB875f56beddC4, UL: BP2134,
VE: ABCD123, VC: 3456MH4, VN: IN0009U, and UT: the user calls the GenerateRandomToken () function to get the
ABCD1234) is chosen randomly for only testing purposes. RT recording in Fig. 9. Now, the user has both token UT and
The output data will be created using those input values RT to authenticate himself. The user provides these tokens and
through the smart contract. The UI, RT, and SK are gen- is authenticated successfully using the VerifyUser() function
erated using “equations (1), (2), and (3),” respectively. The shown in Fig. 10. If any of these provided tokens is wrong,
smart contract executes these parameters using the keccak256 as shown in Fig. 11, authentication will be rejected.
cryptographic hash function [33] as it is used in Ethereum.
Fig. 5 shows that the smart contract’s code is compiled,
B. Vehicle Authentication
run, and executed successfully from account address “0x5.
38Da6a701c568545dCfcB03FcB875f56beddC4”. This addr- The smart contract generates a UI for the user using the
ess is considered a user BAC. All implemented scenar- UIgenerator() function shown in Fig. 12. The UI will be stored
ios are tested using this address. Herein, the user stores in the vehicle device for communication purposes. Before
his credentials and vehicle-related data from this address. establishing V2V communication, the smart contract verifies
Fig. 6 shows that the user stores required data using that the UI is associated with an authenticated user. So, the
the SetData () function, similar to a registration sce- vehicle is validated using the VerifyVehicle() function shown
nario. Fig. 7 shows that the user or vehicle of BAC: in Fig. 13. Fig. 14 shows that the vehicle is not authenticated
“0xCA35b7d915458EF540aDe6068dFe2F44E8fa733c” is not for giving false data, and unauthorized access is detected.
registered.
C. Secure Communication Establishment
A. User Authentication Therefore, the vehicle will be eligible to establish V2V
After logging in to the application, the user has to a UT communication. Each vehicle has the SK using GenerateS-
using the SetUserToken() function shown in Fig. 8. Therefore, ecretKey() function shown, in Fig. 15. The vehicle can
Authorized licensed use limited to: Government of Egypt - SPCESR - (EKB). Downloaded on March 17,2024 at 20:52:59 UTC from IEEE Xplore. Restrictions apply.
4658 IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, VOL. 24, NO. 4, APRIL 2023
TABLE V
P ERFORMANCE C OMPARISON OF THE BVCS
W ITH O THER E XISTING M ETHODS
Authorized licensed use limited to: Government of Egypt - SPCESR - (EKB). Downloaded on March 17,2024 at 20:52:59 UTC from IEEE Xplore. Restrictions apply.
DAS et al.: SECURE BLOCKCHAIN ENABLED V2V COMMUNICATION SYSTEM USING SMART CONTRACTS 4659
Authorized licensed use limited to: Government of Egypt - SPCESR - (EKB). Downloaded on March 17,2024 at 20:52:59 UTC from IEEE Xplore. Restrictions apply.
4660 IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, VOL. 24, NO. 4, APRIL 2023
[13] A. Ruddle et al., “Deliverable D2. 3: Security requirements for automo- Debashis Das received the B.Tech. degree in com-
tive on-board networks based on dark-side scenarios,” in E-Safety Vehicle puter science and engineering from the Government
Intrusion Protected Applications. Karlsruhe, Germany: Fraunhofer ISI, College of Engineering and Leather Technology in
2009. 2015, the M.Tech. degree in computer science and
[14] S. Nakamoto. Bitcoin: A Peer-to-Peer Electronic Cash System. Accessed: engineering from Kalyani Government Engineering
Dec. 6, 2022. [Online]. Available: https://bitcoin.org/bitcoin.pdf College in 2018, and the Ph.D. degree from Kalyani
[15] Z. Zheng, S. Xie, H. Dai, X. Chen, and H. Wang, “An overview University. He is currently working as a University
of blockchain technology: Architecture, consensus, and future trends,” Research Scholar with Kalyani University. Currently,
in Proc. IEEE Int. Congr. Big Data (BigData Congr.), Jun. 2017, he is working on blockchain technology for ITS
pp. 557–564, doi: 10.1109/BigDataCongress.2017.85. and its applications. His research interests include
[16] S. Wang, L. Ouyang, Y. Yuan, X. Ni, X. Han, and F.-Y. Wang, the Internet of Vehicles (IoV), distributed comput-
“Blockchain-enabled smart contracts: Architecture, applications, and ing, cyber-physical systems, intelligent transportation systems (ITS), and
future trends,” IEEE Trans. Syst., Man, Cybern. Syst., vol. 49, no. 11, blockchain technology.
pp. 2266–2277, Nov. 2019, doi: 10.1109/TSMC.2019.2895123.
[17] D. Das, S. Banerjee, U. Ghosh, U. Biswas, and A. K. Bashir, “A decen-
tralized vehicle anti-theft system using blockchain and smart contracts,”
Peer Peer Netw. Appl., vol. 14, no. 5, pp. 2775–2788, Sep. 2021, doi:
10.1007/s12083-021-01097-3. Sourav Banerjee (Senior Member, IEEE) received
[18] J. Liu and Z. Liu, “A survey on security verification of blockchain the Ph.D. degree from the University of Kalyani in
smart contracts,” IEEE Access, vol. 7, pp. 77894–77904, 2019, doi: 2018. He is currently an Assistant Professor with the
10.1109/ACCESS.2019.2921624. Department of Computer Science and Engineering,
[19] Endorphin. Ethereum Virtual Machine (EVM). Accessed: Dec. 6, 2022. Kalyani Government Engineering College, Kalyani,
[Online]. Available: https://ethereum.org/en/developers/docs/evm/ West Bengal, India. He has authored numerous
[20] M. G. Solomon. Ethereum Smart Contracts: Tips for Handling Data
reputed journal articles, book chapters, and interna-
in Solidity. Ethereum for Dummies. Accessed: Dec. 6, 2022. [Online].
tional conferences. His research interests include big
Available: https://www.dummies.com/personal-finance/ethereum-smart-
data, cloud computing, cloud robotics, distributed
contracts-tips-for-handling-data-in-solidity/
computing, mobile communications, and the IoT.
[21] Minimalism. Introduction to Smart Contracts. Accessed: Dec. 6, 2022.
He is a Senior Member of ACM, IAE, and the MIR
[Online]. Available: https://ethereum.org/en/developers/docs/smart-
Laboratories. He is a SIG Member of the MIR Laboratory, USA. He is an
contracts/
[22] Y. H. Kim and S. Peeta, “Graph-based modeling of information flow Editorial Board Member of Wireless Communication Technology.
evolution and propagation under V2 V communications-based advanced
traveler information systems,” Comput.-Aided Civil Infrastruct. Eng.,
vol. 31, no. 7, pp. 499–514, Jul. 2016, doi: 10.1111/mice.12188.
[23] D. N. Chowdhury, N. Agarwal, A. B. Laha, and A. Mukherjee,
“A vehicle-to-vehicle communication system using IoT approach,” in Pushpita Chatterjee (Senior Member, IEEE)
Proc. 2nd Int. Conf. Electron., Commun. Aerosp. Technol. (ICECA), received the Ph.D. degree from IIT Kharagpur, India.
Mar. 2018, pp. 915–919, doi: 10.1109/ICECA.2018.8474909. She is working with the Department of Electrical
[24] P. Goswami et al., “AI based energy efficient routing protocol for intel- Engineering and Computer Science, Howard
ligent transportation system,” IEEE Trans. Intell. Transp. Syst., vol. 23, University, Washington, DC, USA. Her research
no. 2, pp. 1670–1679, Feb. 2022, doi: 10.1109/TITS.2021.3107527. interests include machine learning, smart health,
[25] M. Kamal, G. Srivastava, and M. Tariq, “Blockchain-based lightweight wireless sensor networks, distributed and trust
and secured V2 V communication in the internet of vehicles,” IEEE computing, software-defined networking, and
Trans. Intell. Transp. Syst., vol. 22, no. 7, pp. 3997–4004, Jul. 2021, information-centric networking.
doi: 10.1109/TITS.2020.3002462.
[26] R. Jabbar, M. Kharbeche, K. Al-Khalifa, M. Krichen, and K. Barkaoui,
“Blockchain for the internet of vehicles: A decentralized IoT solution Uttam Ghosh (Senior Member, IEEE) received
for vehicles communication using ethereum,” Sensors, vol. 20, no. 14, the Ph.D. degree in electronics and electrical
2020, p. 3928, doi: 10.3390/s20143928. engineering from IIT Kharagpur, India, in 2013.
[27] M. Shing and S. Kim, “Blockchain based intelligent vehicle data He was an Assistant Professor at the Department
sharing framework,” 2017, arXiv:1708.09721, doi: 10.48550/ARXIV. of Computer Science, Vanderbilt University. He was
1708.09721. a Post-Doctoral Researcher at the University of
[28] A. Patel, N. Shah, T. Limbasiya, and D. Das, “VehicleChain: Blockchain- Illinois in Urbana–Champaign, Fordham University,
based vehicular data transmission scheme for smart city,” in Proc. IEEE and Tennessee State University. He is an Associate
Int. Conf. Syst., Man Cybern. (SMC), Oct. 2019, pp. 661–667, doi: Professor of cybersecurity with the Department of
10.1109/SMC.2019.8914391. Computer Science and Data Science, Meharry Med-
[29] N. Malik, P. Nanda, A. Arora, X. He, and D. Puthal, “Blockchain
ical College (MMC), Nashville, TN, USA. His main
based secured identity authentication and expeditious revocation frame-
research interests include cybersecurity, computer networks, wireless net-
work for vehicular networks,” in Proc. 17th IEEE Int. Conf. Trust,
works, machine learning, health informatics, and software-defined networking.
Secur. Privacy Comput. Commun./12th IEEE Int. Conf. Big Data Sci.
He is a member of Sigma Xi and ACM.
Eng. (TrustCom/BigDataSE), Aug. 2018, pp. 674–679, doi: 10.1109/
TrustCom/BigDataSE.2018.00099.
[30] A. Sengupta and M. Rathor, “Security of functionally obfuscated Utpal Biswas received the B.E., M.E., and Ph.D.
DSP core against removal attack using SHA-512 based key encryp- degrees in computer science and engineering from
tion hardware,” IEEE Access, vol. 7, pp. 4598–4610, 2019, doi: Jadavpur University, India, in 1993, 2001, and
10.1109/ACCESS.2018.2889224. 2008, respectively. He was a Faculty Member at
[31] J. Lake. (2019). Understanding Cryptography’s Role in Blockchains. the Department of Computer Science and Engi-
Accessed: Dec. 6, 2022. [Online]. Available: https://www.comparitech. neering NIT, Durgapur, India, from 1994 to 2001.
com/crypto/cryptography-blockchain/ Currently, he is working as a Professor with the
[32] Remix 0.18.0. Remix Ethereum IDE. Accessed: Dec. 6, 2022. [Online]. Department of Computer Science and Engineering,
Available: https://remix.ethereum.org/ University of Kalyani, West Bengal, India. He has
[33] H. Jameson. Which Cryptographic Hash Function Does Ethereum Use? over 130 research articles in different journals, book
Accessed: Dec. 6, 2022. [Online]. Available: https://ethereum. chapters, and conferences. His research interests
stackexchange.com/questions/550/which-cryptographic-hash-function- include optical communication, ad-hoc and mobile communication, semantic
does-ethereum-use web services, e-Governance, and cloud computing.
Authorized licensed use limited to: Government of Egypt - SPCESR - (EKB). Downloaded on March 17,2024 at 20:52:59 UTC from IEEE Xplore. Restrictions apply.