TY - JOUR
T1 - Blockchain based optimized data storage with secure communication for Internet of Vehicles considering active, passive, and double spending attacks
AU - Yahaya, Adamu Sani
AU - Javaid, Nadeem
AU - Zeadally, Sherali
AU - Farooq, Hassan
N1 - Publisher Copyright:
© 2022 Elsevier Inc.
PY - 2022/10
Y1 - 2022/10
N2 - In the study, we propose a double blockchain based vehicular system for optimizing data storage and securing communication in Internet of Vehicles (IoV) networks. We propose an incentive mechanism and a reputation system to reduce the selfish and distrustful behavior of IoV nodes. Moreover, we propose an encryption technique to protect the proposed system from passive and active attacks. The proposed technique is a hybrid of Rivest Shamir Adleman and Advanced Encryption Standard-256 (AES-256+RSA). We use this hybrid approach to efficiently and secretly share the users' secret keys. To address the issues of high resource consumption and communication delay, we propose a cache memory technique for miner and controller nodes. In addition, we propose an authentication mechanism to remove malicious nodes from the system. The simulation results depict that our system provides security, scalability, optimized data storage, node's trustworthiness, and transparent data sharing.
AB - In the study, we propose a double blockchain based vehicular system for optimizing data storage and securing communication in Internet of Vehicles (IoV) networks. We propose an incentive mechanism and a reputation system to reduce the selfish and distrustful behavior of IoV nodes. Moreover, we propose an encryption technique to protect the proposed system from passive and active attacks. The proposed technique is a hybrid of Rivest Shamir Adleman and Advanced Encryption Standard-256 (AES-256+RSA). We use this hybrid approach to efficiently and secretly share the users' secret keys. To address the issues of high resource consumption and communication delay, we propose a cache memory technique for miner and controller nodes. In addition, we propose an authentication mechanism to remove malicious nodes from the system. The simulation results depict that our system provides security, scalability, optimized data storage, node's trustworthiness, and transparent data sharing.
KW - Blockchain
KW - Double spending attack
KW - IoT
KW - IoVs
KW - WSN
UR - http://www.scopus.com/inward/record.url?scp=85134292607&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85134292607&partnerID=8YFLogxK
U2 - 10.1016/j.vehcom.2022.100502
DO - 10.1016/j.vehcom.2022.100502
M3 - Article
AN - SCOPUS:85134292607
SN - 2214-2096
VL - 37
JO - Vehicular Communications
JF - Vehicular Communications
M1 - 100502
ER -