Blockchain based optimized data storage with secure communication for Internet of Vehicles considering active, passive, and double spending attacks

Adamu Sani Yahaya, Nadeem Javaid, Sherali Zeadally, Hassan Farooq

Research output: Contribution to journalArticlepeer-review

5 Scopus citations

Abstract

In the study, we propose a double blockchain based vehicular system for optimizing data storage and securing communication in Internet of Vehicles (IoV) networks. We propose an incentive mechanism and a reputation system to reduce the selfish and distrustful behavior of IoV nodes. Moreover, we propose an encryption technique to protect the proposed system from passive and active attacks. The proposed technique is a hybrid of Rivest Shamir Adleman and Advanced Encryption Standard-256 (AES-256+RSA). We use this hybrid approach to efficiently and secretly share the users' secret keys. To address the issues of high resource consumption and communication delay, we propose a cache memory technique for miner and controller nodes. In addition, we propose an authentication mechanism to remove malicious nodes from the system. The simulation results depict that our system provides security, scalability, optimized data storage, node's trustworthiness, and transparent data sharing.

Original languageEnglish
Article number100502
JournalVehicular Communications
Volume37
DOIs
StatePublished - Oct 2022

Bibliographical note

Funding Information:
Sherali Zeadally was supported by a Fulbright U.S. scholar grant award administered by the U.S. Department of State Bureau of Educational and Cultural Affairs , and through its cooperating agency the Institute of International Education (“IIE”).

Publisher Copyright:
© 2022 Elsevier Inc.

Keywords

  • Blockchain
  • Double spending attack
  • IoT
  • IoVs
  • WSN

ASJC Scopus subject areas

  • Automotive Engineering
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Blockchain based optimized data storage with secure communication for Internet of Vehicles considering active, passive, and double spending attacks'. Together they form a unique fingerprint.

Cite this