SlideShare une entreprise Scribd logo
1  sur  19
BlockChain: A Distributed Solution to
Automative Security and Privacy
Presented By :
Anil Chaurasiya
MCA 6th
Semester
Index
● Threats to Smart Vehicles
● Solution
● How BlockChain can secure the Smart Vehicles
● Lightweight Scalable Blockchain (LSB)
● Blocked based Architecture
● Application
● Security and Privacy Analysis
Threats to Smart Vehicles
●
The high degree of connectivity makes it particular challenging to secure smart
vehicles .Malicious entities can compromise a vehicle, which not only
endangers the security of the vehicle but also the safety of the passengers.
●
Conventional security and privacy methods used in smart vehicles tend to be
ineffective due to the following challenges
– Centralization
– Lack of pirvacy
– Safety Threats
Solution
●
BlockChain(BC) is a distributed database that maintains a
growing list of blocks that are chained to each other.
●
BC has been shown to possess a number of salient features
including security, immutability and privacy and could thus be a
useful technology to address the aforementioned challenges.
●
BC is managed distributedly by a peer to peer network. Each
node is identified using a Public Key (PK).
Solution
●
We proposed an optimized BC instantiation for the Internet of Things (IoT) called
Lightweight Scalable Blockchain (LSB).
●
The main contribution of BC is to present a decentralized privacy-preserving and secure
BC-based architecture for the smart vehicle ecosystem.
●
We base our design on LSB due to its low overheads.
●
Nodes in the overlay are clustered and only the Cluster Heads (CHs) are
responsible for managing the BC and performing its core functions.
Solution
●
To protect user privacy,each vehicle is equipped with an in-vehicle storage to
store privacy sensitive data, e.g. location traces.
●
The vehicle owner defines which data is provided to third parties in trade for
beneficial services and which data should be stored in the in-vehicle storage.
Consequently, the owner has finer control over the exchanged data.
●
All transactions in the network are encrypted using asymmetric encryption.
Nodes are authenticated using their PKs.
Lightweight Scalable Blockchain (LSB)
●
Conventional BC instantiations suffers from high overhead and low scalability and throughput.
●
Conventional BCs have limited throughput, e.g. Bitcoin throughput is restricted to seven transactions per
second due to the complexity of the consensus algorithm.
●
LSB is optimized for the IoT and large-scale low resource networks.
●
LSB replaces the demand for solving a computational puzzle with a scheduled block generation process,
thus eliminating the significant processing overhead of conventional Bcs.
●
LSB uses a distributed trust algorithm to decrease the processing time associated with validating blocks.
Lightweight Scalable Blockchain (LSB)
Two types of transactions based on the number of signatures
that must be validated:
●
1) Single signature: “T_ID || P_T_ID || PK || Sig”
●
2) Multisig: “T_ID || P_T_ID || PK.1 || Sig.1 || PK.2 || Sig.2”
BlockChain-Based Architecture
● A public BC is managed by the overlay nodes which can be
smart vehicles, OEMs, vehicle assembly lines, SW providers,
cloud storage providers, and mobile devices of users such as
smartphones, laptops, or tablets.
Application
● Remote Software Updates
– RSU demands a distributed security method while maintaining the
vehicle owner’s privacy.
BC advantages compared to conventional
methods
● WRSU
Conventional Methods
– Centaralized - non scalable
– Partial participation
– Lack of privacy:
– Only OEM can verify communications or history of update downloads.
Advantages introduced by BC
– Distributed data exchange and security provides scalability
– End-to-end: involving SP, OEMs, vehicles, service centers, assembly lines, etc.
– Ensure privacy of the user (also for diagnostics)
– Update history as well as authenticity of the SW can be publicly verified
●
BC advantages compared to conventional
methods
● Insurance
Conventional Methods
– Current systems are often insecure, which endangers the vehicle’s integrity
– Users lack control over the exchanged data
– Privacy-sensitive data must be continuously sent to the insurance company for receiving services
Advantages introduced by BC
– Secure, distributed, and privacy-preserving data exchange
– Users control the exchanged data
– Privacy-sensitive data is shared on demand (e.g., accident happened) instead of a continuous data
exchange. Authenticity of data stored in the vehicle can be publicly confirmed
BC advantages compared to conventional
methods
● Car-sharing services
Conventional Methods
– Central payment and accounting
– Users can be tracked by their identity
– Central authorization
Advantages introduced by BC
– Private and distributed security, payments and accounting
– Users use changeable identities
– Distributed authorization
Security and Privacy Analysis
Privacy:
● The privacy of the proposed method is inherited from the BC
where each node uses a unique PK to communicate with other
overlay nodes. This prevents malicious nodes from tracking an
overlay node.
● Each vehicle is equipped with an in-vehicle storage to store
privacy sensitive data. The vehicle owner can reveal data in the
in-vehicle storage to the service providers in situations where this
data is required (e.g. accidentclaim).
Security and Privacy Analysis
Security :
● Each transaction in BC contains the hash of the data which ensures
integrity.
● All transactions are encrypted using asymmetric encryption
methods which provide confidentiality.
● OBMs maintain a key list that provides access control for cluster
members in a way that only transactions for which the embedded
PKs match with the key list in the OBM can be forwarded to a
cluster member.
Security and Privacy Analysis
● Distributing a false update by claiming to be the OEM or SW
update provider
● Changing a software binary in the cloud
● Distributed Denial of Service(DDoS) attack
Thank You!

Contenu connexe

Similaire à Smart Vehicle

Automotive security with Blockchain Technology
Automotive security with Blockchain TechnologyAutomotive security with Blockchain Technology
Automotive security with Blockchain TechnologyAnil Chaurasiya
 
Blockchain Advances & its Applications.pptx
Blockchain Advances & its Applications.pptxBlockchain Advances & its Applications.pptx
Blockchain Advances & its Applications.pptxMohamedMansour421585
 
Decentralized Car Hailing Application
Decentralized Car Hailing ApplicationDecentralized Car Hailing Application
Decentralized Car Hailing ApplicationIRJET Journal
 
Towards a Post-Modern Hash Chain Future
Towards a Post-Modern Hash Chain FutureTowards a Post-Modern Hash Chain Future
Towards a Post-Modern Hash Chain FutureCasey Kuhlman
 
Blockchain-based multiple AAA system in edge computing for IoT networks
Blockchain-based multiple AAA system in edge computing for IoT networksBlockchain-based multiple AAA system in edge computing for IoT networks
Blockchain-based multiple AAA system in edge computing for IoT networksNam Yong Kim
 
Blockchain for Power Utilities: A View on Capabilities and Adoption
Blockchain for Power Utilities: A View on Capabilities and AdoptionBlockchain for Power Utilities: A View on Capabilities and Adoption
Blockchain for Power Utilities: A View on Capabilities and AdoptionCognizant
 
T-mining presentation at BlockChain Vlaanderen
T-mining presentation at BlockChain VlaanderenT-mining presentation at BlockChain Vlaanderen
T-mining presentation at BlockChain VlaanderenNico Wauters
 
A decentralized consensus application using blockchain ecosystem
A decentralized consensus application using blockchain ecosystem  A decentralized consensus application using blockchain ecosystem
A decentralized consensus application using blockchain ecosystem IJECEIAES
 
IRJET- Transaction based Block Chain Cryptocurrency
IRJET-  	  Transaction based Block Chain CryptocurrencyIRJET-  	  Transaction based Block Chain Cryptocurrency
IRJET- Transaction based Block Chain CryptocurrencyIRJET Journal
 
A secure cloud computing based framework for big information management syste...
A secure cloud computing based framework for big information management syste...A secure cloud computing based framework for big information management syste...
A secure cloud computing based framework for big information management syste...Pawan Arya
 
Brisk and secure ad hoc vehicular communication
Brisk and secure ad hoc vehicular communicationBrisk and secure ad hoc vehicular communication
Brisk and secure ad hoc vehicular communicationeSAT Publishing House
 
Brisk and secure ad hoc vehicular communication
Brisk and secure ad hoc vehicular communicationBrisk and secure ad hoc vehicular communication
Brisk and secure ad hoc vehicular communicationeSAT Journals
 
InitVerse Blockchain - 5 minutes to understand the blockchain.pdf
InitVerse Blockchain - 5 minutes to understand the blockchain.pdfInitVerse Blockchain - 5 minutes to understand the blockchain.pdf
InitVerse Blockchain - 5 minutes to understand the blockchain.pdfInitVerse Blockchain
 
Integrity for join queries in the cloud
Integrity for join queries in the cloudIntegrity for join queries in the cloud
Integrity for join queries in the cloudPapitha Velumani
 
Attribute Based Secure Information Recovery Retrieval System for Decentralize...
Attribute Based Secure Information Recovery Retrieval System for Decentralize...Attribute Based Secure Information Recovery Retrieval System for Decentralize...
Attribute Based Secure Information Recovery Retrieval System for Decentralize...IRJET Journal
 
Quantum1Net The Platform
Quantum1Net The PlatformQuantum1Net The Platform
Quantum1Net The PlatformQuantum1Net
 
Quantum1Net The Platform
Quantum1Net The PlatformQuantum1Net The Platform
Quantum1Net The PlatformQuantum1Net
 
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum BlockchainIRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum BlockchainIRJET Journal
 
Blockchain As An Enabler_16 July 2016_David Lee_Final
Blockchain As An Enabler_16 July 2016_David Lee_FinalBlockchain As An Enabler_16 July 2016_David Lee_Final
Blockchain As An Enabler_16 July 2016_David Lee_FinalDavid Lee Kuo Chuen 李国权
 

Similaire à Smart Vehicle (20)

Automotive security with Blockchain Technology
Automotive security with Blockchain TechnologyAutomotive security with Blockchain Technology
Automotive security with Blockchain Technology
 
Blockchain Advances & its Applications.pptx
Blockchain Advances & its Applications.pptxBlockchain Advances & its Applications.pptx
Blockchain Advances & its Applications.pptx
 
Blockchain
BlockchainBlockchain
Blockchain
 
Decentralized Car Hailing Application
Decentralized Car Hailing ApplicationDecentralized Car Hailing Application
Decentralized Car Hailing Application
 
Towards a Post-Modern Hash Chain Future
Towards a Post-Modern Hash Chain FutureTowards a Post-Modern Hash Chain Future
Towards a Post-Modern Hash Chain Future
 
Blockchain-based multiple AAA system in edge computing for IoT networks
Blockchain-based multiple AAA system in edge computing for IoT networksBlockchain-based multiple AAA system in edge computing for IoT networks
Blockchain-based multiple AAA system in edge computing for IoT networks
 
Blockchain for Power Utilities: A View on Capabilities and Adoption
Blockchain for Power Utilities: A View on Capabilities and AdoptionBlockchain for Power Utilities: A View on Capabilities and Adoption
Blockchain for Power Utilities: A View on Capabilities and Adoption
 
T-mining presentation at BlockChain Vlaanderen
T-mining presentation at BlockChain VlaanderenT-mining presentation at BlockChain Vlaanderen
T-mining presentation at BlockChain Vlaanderen
 
A decentralized consensus application using blockchain ecosystem
A decentralized consensus application using blockchain ecosystem  A decentralized consensus application using blockchain ecosystem
A decentralized consensus application using blockchain ecosystem
 
IRJET- Transaction based Block Chain Cryptocurrency
IRJET-  	  Transaction based Block Chain CryptocurrencyIRJET-  	  Transaction based Block Chain Cryptocurrency
IRJET- Transaction based Block Chain Cryptocurrency
 
A secure cloud computing based framework for big information management syste...
A secure cloud computing based framework for big information management syste...A secure cloud computing based framework for big information management syste...
A secure cloud computing based framework for big information management syste...
 
Brisk and secure ad hoc vehicular communication
Brisk and secure ad hoc vehicular communicationBrisk and secure ad hoc vehicular communication
Brisk and secure ad hoc vehicular communication
 
Brisk and secure ad hoc vehicular communication
Brisk and secure ad hoc vehicular communicationBrisk and secure ad hoc vehicular communication
Brisk and secure ad hoc vehicular communication
 
InitVerse Blockchain - 5 minutes to understand the blockchain.pdf
InitVerse Blockchain - 5 minutes to understand the blockchain.pdfInitVerse Blockchain - 5 minutes to understand the blockchain.pdf
InitVerse Blockchain - 5 minutes to understand the blockchain.pdf
 
Integrity for join queries in the cloud
Integrity for join queries in the cloudIntegrity for join queries in the cloud
Integrity for join queries in the cloud
 
Attribute Based Secure Information Recovery Retrieval System for Decentralize...
Attribute Based Secure Information Recovery Retrieval System for Decentralize...Attribute Based Secure Information Recovery Retrieval System for Decentralize...
Attribute Based Secure Information Recovery Retrieval System for Decentralize...
 
Quantum1Net The Platform
Quantum1Net The PlatformQuantum1Net The Platform
Quantum1Net The Platform
 
Quantum1Net The Platform
Quantum1Net The PlatformQuantum1Net The Platform
Quantum1Net The Platform
 
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum BlockchainIRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
 
Blockchain As An Enabler_16 July 2016_David Lee_Final
Blockchain As An Enabler_16 July 2016_David Lee_FinalBlockchain As An Enabler_16 July 2016_David Lee_Final
Blockchain As An Enabler_16 July 2016_David Lee_Final
 

Plus de Anil Chaurasiya

Automotive security with Blockchain Technology (Project Report)
Automotive security with Blockchain Technology (Project Report)Automotive security with Blockchain Technology (Project Report)
Automotive security with Blockchain Technology (Project Report)Anil Chaurasiya
 
National payment system architecture
National payment system architectureNational payment system architecture
National payment system architectureAnil Chaurasiya
 
Mobile banking & payment
Mobile banking & paymentMobile banking & payment
Mobile banking & paymentAnil Chaurasiya
 
Management information system
Management information systemManagement information system
Management information systemAnil Chaurasiya
 
Internet banking ARCHITECTURE AND IMPLEMENTATION
Internet banking  ARCHITECTURE AND IMPLEMENTATIONInternet banking  ARCHITECTURE AND IMPLEMENTATION
Internet banking ARCHITECTURE AND IMPLEMENTATIONAnil Chaurasiya
 
Impact of technology on banking operations
Impact of technology on banking operationsImpact of technology on banking operations
Impact of technology on banking operationsAnil Chaurasiya
 
Evolution of banking technology
Evolution of banking technologyEvolution of banking technology
Evolution of banking technologyAnil Chaurasiya
 
Electronic cards credit and debit
Electronic cards credit and debitElectronic cards credit and debit
Electronic cards credit and debitAnil Chaurasiya
 
Electronic Delivery channels integration
Electronic Delivery channels integrationElectronic Delivery channels integration
Electronic Delivery channels integrationAnil Chaurasiya
 
DATA CENTER AND BUSINESS COMMUNITY
DATA CENTER AND BUSINESS COMMUNITYDATA CENTER AND BUSINESS COMMUNITY
DATA CENTER AND BUSINESS COMMUNITYAnil Chaurasiya
 
Cbs concepts and opportunities
Cbs concepts and opportunitiesCbs concepts and opportunities
Cbs concepts and opportunitiesAnil Chaurasiya
 
CENTRALIZED challenges implementation and MANAGEMENT issues
CENTRALIZED challenges implementation and MANAGEMENT issuesCENTRALIZED challenges implementation and MANAGEMENT issues
CENTRALIZED challenges implementation and MANAGEMENT issuesAnil Chaurasiya
 
Atm technology and operations
Atm technology and operationsAtm technology and operations
Atm technology and operationsAnil Chaurasiya
 
Asset liability management
Asset liability managementAsset liability management
Asset liability managementAnil Chaurasiya
 
Banking Technology (End Term Exam) nov-2015
Banking Technology (End Term Exam) nov-2015Banking Technology (End Term Exam) nov-2015
Banking Technology (End Term Exam) nov-2015Anil Chaurasiya
 

Plus de Anil Chaurasiya (20)

Automotive security with Blockchain Technology (Project Report)
Automotive security with Blockchain Technology (Project Report)Automotive security with Blockchain Technology (Project Report)
Automotive security with Blockchain Technology (Project Report)
 
Digital marketing
Digital marketingDigital marketing
Digital marketing
 
Blockchain
BlockchainBlockchain
Blockchain
 
National payment system architecture
National payment system architectureNational payment system architecture
National payment system architecture
 
Mobile banking & payment
Mobile banking & paymentMobile banking & payment
Mobile banking & payment
 
Management information system
Management information systemManagement information system
Management information system
 
Internet banking ARCHITECTURE AND IMPLEMENTATION
Internet banking  ARCHITECTURE AND IMPLEMENTATIONInternet banking  ARCHITECTURE AND IMPLEMENTATION
Internet banking ARCHITECTURE AND IMPLEMENTATION
 
Impact of technology on banking operations
Impact of technology on banking operationsImpact of technology on banking operations
Impact of technology on banking operations
 
Forex management
Forex managementForex management
Forex management
 
Evolution of banking technology
Evolution of banking technologyEvolution of banking technology
Evolution of banking technology
 
Electronic cards credit and debit
Electronic cards credit and debitElectronic cards credit and debit
Electronic cards credit and debit
 
Electronic Delivery channels integration
Electronic Delivery channels integrationElectronic Delivery channels integration
Electronic Delivery channels integration
 
DATA CENTER AND BUSINESS COMMUNITY
DATA CENTER AND BUSINESS COMMUNITYDATA CENTER AND BUSINESS COMMUNITY
DATA CENTER AND BUSINESS COMMUNITY
 
Credit appraisal SYSTEM
Credit appraisal SYSTEMCredit appraisal SYSTEM
Credit appraisal SYSTEM
 
Cbs concepts and opportunities
Cbs concepts and opportunitiesCbs concepts and opportunities
Cbs concepts and opportunities
 
CENTRALIZED challenges implementation and MANAGEMENT issues
CENTRALIZED challenges implementation and MANAGEMENT issuesCENTRALIZED challenges implementation and MANAGEMENT issues
CENTRALIZED challenges implementation and MANAGEMENT issues
 
Atm technology and operations
Atm technology and operationsAtm technology and operations
Atm technology and operations
 
Atm switch
Atm switchAtm switch
Atm switch
 
Asset liability management
Asset liability managementAsset liability management
Asset liability management
 
Banking Technology (End Term Exam) nov-2015
Banking Technology (End Term Exam) nov-2015Banking Technology (End Term Exam) nov-2015
Banking Technology (End Term Exam) nov-2015
 

Dernier

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 

Dernier (20)

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

Smart Vehicle

  • 1. BlockChain: A Distributed Solution to Automative Security and Privacy Presented By : Anil Chaurasiya MCA 6th Semester
  • 2. Index ● Threats to Smart Vehicles ● Solution ● How BlockChain can secure the Smart Vehicles ● Lightweight Scalable Blockchain (LSB) ● Blocked based Architecture ● Application ● Security and Privacy Analysis
  • 3. Threats to Smart Vehicles ● The high degree of connectivity makes it particular challenging to secure smart vehicles .Malicious entities can compromise a vehicle, which not only endangers the security of the vehicle but also the safety of the passengers. ● Conventional security and privacy methods used in smart vehicles tend to be ineffective due to the following challenges – Centralization – Lack of pirvacy – Safety Threats
  • 4. Solution ● BlockChain(BC) is a distributed database that maintains a growing list of blocks that are chained to each other. ● BC has been shown to possess a number of salient features including security, immutability and privacy and could thus be a useful technology to address the aforementioned challenges. ● BC is managed distributedly by a peer to peer network. Each node is identified using a Public Key (PK).
  • 5. Solution ● We proposed an optimized BC instantiation for the Internet of Things (IoT) called Lightweight Scalable Blockchain (LSB). ● The main contribution of BC is to present a decentralized privacy-preserving and secure BC-based architecture for the smart vehicle ecosystem. ● We base our design on LSB due to its low overheads. ● Nodes in the overlay are clustered and only the Cluster Heads (CHs) are responsible for managing the BC and performing its core functions.
  • 6. Solution ● To protect user privacy,each vehicle is equipped with an in-vehicle storage to store privacy sensitive data, e.g. location traces. ● The vehicle owner defines which data is provided to third parties in trade for beneficial services and which data should be stored in the in-vehicle storage. Consequently, the owner has finer control over the exchanged data. ● All transactions in the network are encrypted using asymmetric encryption. Nodes are authenticated using their PKs.
  • 7. Lightweight Scalable Blockchain (LSB) ● Conventional BC instantiations suffers from high overhead and low scalability and throughput. ● Conventional BCs have limited throughput, e.g. Bitcoin throughput is restricted to seven transactions per second due to the complexity of the consensus algorithm. ● LSB is optimized for the IoT and large-scale low resource networks. ● LSB replaces the demand for solving a computational puzzle with a scheduled block generation process, thus eliminating the significant processing overhead of conventional Bcs. ● LSB uses a distributed trust algorithm to decrease the processing time associated with validating blocks.
  • 8. Lightweight Scalable Blockchain (LSB) Two types of transactions based on the number of signatures that must be validated: ● 1) Single signature: “T_ID || P_T_ID || PK || Sig” ● 2) Multisig: “T_ID || P_T_ID || PK.1 || Sig.1 || PK.2 || Sig.2”
  • 9. BlockChain-Based Architecture ● A public BC is managed by the overlay nodes which can be smart vehicles, OEMs, vehicle assembly lines, SW providers, cloud storage providers, and mobile devices of users such as smartphones, laptops, or tablets.
  • 10.
  • 11. Application ● Remote Software Updates – RSU demands a distributed security method while maintaining the vehicle owner’s privacy.
  • 12.
  • 13. BC advantages compared to conventional methods ● WRSU Conventional Methods – Centaralized - non scalable – Partial participation – Lack of privacy: – Only OEM can verify communications or history of update downloads. Advantages introduced by BC – Distributed data exchange and security provides scalability – End-to-end: involving SP, OEMs, vehicles, service centers, assembly lines, etc. – Ensure privacy of the user (also for diagnostics) – Update history as well as authenticity of the SW can be publicly verified ●
  • 14. BC advantages compared to conventional methods ● Insurance Conventional Methods – Current systems are often insecure, which endangers the vehicle’s integrity – Users lack control over the exchanged data – Privacy-sensitive data must be continuously sent to the insurance company for receiving services Advantages introduced by BC – Secure, distributed, and privacy-preserving data exchange – Users control the exchanged data – Privacy-sensitive data is shared on demand (e.g., accident happened) instead of a continuous data exchange. Authenticity of data stored in the vehicle can be publicly confirmed
  • 15. BC advantages compared to conventional methods ● Car-sharing services Conventional Methods – Central payment and accounting – Users can be tracked by their identity – Central authorization Advantages introduced by BC – Private and distributed security, payments and accounting – Users use changeable identities – Distributed authorization
  • 16. Security and Privacy Analysis Privacy: ● The privacy of the proposed method is inherited from the BC where each node uses a unique PK to communicate with other overlay nodes. This prevents malicious nodes from tracking an overlay node. ● Each vehicle is equipped with an in-vehicle storage to store privacy sensitive data. The vehicle owner can reveal data in the in-vehicle storage to the service providers in situations where this data is required (e.g. accidentclaim).
  • 17. Security and Privacy Analysis Security : ● Each transaction in BC contains the hash of the data which ensures integrity. ● All transactions are encrypted using asymmetric encryption methods which provide confidentiality. ● OBMs maintain a key list that provides access control for cluster members in a way that only transactions for which the embedded PKs match with the key list in the OBM can be forwarded to a cluster member.
  • 18. Security and Privacy Analysis ● Distributing a false update by claiming to be the OEM or SW update provider ● Changing a software binary in the cloud ● Distributed Denial of Service(DDoS) attack