Please use this identifier to cite or link to this item: https://hdl.handle.net/10356/143616
Title: Toward secure blockchain-enabled Internet of Vehicles : optimizing consensus management using reputation and contract theory
Authors: Kang, Jiawen
Xiong, Zehui
Niyato, Dusit
Ye, Dongdong
Kim, Dong In
Zhao, Jun
Keywords: Engineering::Computer science and engineering
Issue Date: 2019
Source: Kang, J., Xiong, Z., Niyato, D., Ye, D., Kim, D. I., & Zhao, J. (2019). Toward secure blockchain-enabled Internet of Vehicles : optimizing consensus management using reputation and contract theory. IEEE Transactions on Vehicular Technology, 68(3), 2906-2920. doi:10.1109/TVT.2019.2894944
Journal: IEEE Transactions on Vehicular Technology
Abstract: In the Internet of Vehicles (IoV), data sharing among vehicles is critical for improving driving safety and enhancing vehicular services. To ensure security and traceability of data sharing, existing studies utilize efficient delegated proof-of-stake consensus scheme as hard security solutions to establish blockchain-enabled IoV (BIoV). However, as the miners are selected from miner candidates by stake-based voting, defending against voting collusion between the candidates and compromised high-stake vehicles becomes challenging. To address the challenge, in this paper, we propose a two-stage soft security enhancement solution: 1) miner selection and 2) block verification. In the first stage, we design a reputation-based voting scheme to ensure secure miner selection. This scheme evaluates candidates' reputation using both past interactions and recommended opinions from other vehicles. The candidates with high reputation are selected to be active miners and standby miners. In the second stage, to prevent internal collusion among active miners, a newly generated block is further verified and audited by standby miners. To incentivize the participation of the standby miners in block verification, we adopt the contract theory to model the interactions between active miners and standby miners, where block verification security and delay are taken into consideration. Numerical results based on a real-world dataset confirm the security and efficiency of our schemes for data sharing in BIoV.
URI: https://hdl.handle.net/10356/143616
ISSN: 0018-9545
DOI: 10.1109/TVT.2019.2894944
Rights: © 2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, in any current or future media, including reprinting/republishing this material for adverstising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. The published version is available at:https://doi.org/10.1109/TVT.2019.2894944
Fulltext Permission: open
Fulltext Availability: With Fulltext
Appears in Collections:SCSE Journal Articles

PublonsTM
Citations 5

66
Updated on Mar 4, 2021

Page view(s)

22
Updated on Mar 4, 2021

Download(s)

2
Updated on Mar 4, 2021

Google ScholarTM

Check

Altmetric


Plumx

Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.