Advertisement

HACIT2: A Privacy Preserving, Region Based and Blockchain Application for Dynamic Navigation and Forensics in VANET

  • Decoster KevinEmail author
  • Billard David
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 258)

Abstract

The current architecture for VANET related services relies on a Client-Server approach and leads to numerous drawbacks. Among them, data privacy concerns and service availability are of prime importance. Indeed, user data collected and stored in servers by providers may be used by third-party services. Particularly for navigation, users submit their GPS position in order to obtain road traffic information and alternative paths. These services treat user privacy for their own purpose (commercial or not) (Beresford and Stajano, 2004) even if GPRD (European Parliament, 2014) is now enforced in Europe. We propose an innovative approach using blockchain technology to avoid the use of third parties services, which enable dynamic navigation rerouting within a fixed geographic zone while ensuring user anonymity. Furthermore, the approach will allow for legal authority to enable forensic analysis of the ledger without unnecessary violation of the user anonymity and privacy.

Keywords

VANET Raspberry Pi Android Navigation Hyperledger Fabric Privacy Blockchain Forensics 

References

  1. Androulaki, E., Karame, G.O., Roeschlin, M., Scherer, T., Capkun, S.: Evaluating user privacy in bitcoin. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 34–51. Springer, Heidelberg (2013).  https://doi.org/10.1007/978-3-642-39884-1_4CrossRefGoogle Scholar
  2. Apache Fondation: Commons Math Java library (2017). http://commons.apache.org/proper/commons-math/userguide/ml.html
  3. Au, M.H., Susilo, W., Mu, Y.: Constant-size dynamic k-TAA. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol. 4116, pp. 111–125. Springer, Heidelberg (2006).  https://doi.org/10.1007/11832072_8CrossRefGoogle Scholar
  4. Beresford, A.R., Stajano, F.: Mix zones: user privacy in location-aware services. In: Proceedings of the Second IEEE Annual Conference on 2004 Pervasive Computing and Communications Workshops, pp. 127–131. IEEE (2004)Google Scholar
  5. Dijkstra, E.W.: A note on two problems in connexion with graphs. Numer. Math. 1(1), 269–271 (1959)MathSciNetCrossRefGoogle Scholar
  6. Ester, M., Kriegel, H.-P., Sander, J., Xu, X., et al.: A density-based algorithm for discovering clusters in large spatial databases with noise. In: KDD, vol. 96, pp. 226–231 (1996)Google Scholar
  7. European Parliament: European Parliament legislative resolution of 12 March 2014 on the General Data Protection Regulation. Technical report (COM(2012) 0011 C7–0025/2012 2012/0011(COD)) (2014)Google Scholar
  8. Graphhopper dev: Graphhopper Java Librairy (2017). https://www.graphhopper.com/
  9. IBM: IBM Blockchain Platform (2017). https://ibm-blockchain.github.io/develop/. Accessed 21 Apr 2018
  10. Krajzewicz, D., Erdmann, J., Behrisch, M., Bieker, L.: Recent development and applications of SUMO - simulation of urban mobility. Int. J. Adv. Syst. Meas. 5(3&4), 128–138 (2012)Google Scholar
  11. Leiding, B., Memarmoshrefi, P., Hogrefe, D.: Self-managed and blockchain-based vehicular ad-hoc networks. In: Proceedings of the 2016 ACM International Joint Conference onPervasive and Ubiquitous Computing, pp. 137–140. ACM (2016)Google Scholar
  12. Linux Foundation, T.: HyperLedger Fabric docs (2016). https://hyperledger-fabric.readthedocs.io/en/release/. Accessed 21 Nov 2017
  13. Newson, P. Krumm, J.: Hidden markov map matching through noise and sparseness. In: Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, pp. 336–343. ACM (2009)Google Scholar
  14. OpenStreetMap contributors: Planet dump (2017). https://planet.osm.org. https://www.openstreetmap.org
  15. OSMAnd dev: OSMAND (2017). https://osmand.net/
  16. Raya, M., Hubaux, J.-P.: Securing vehicular ad hoc networks. J. Comput. Secur. 15(1), 39–68 (2007)CrossRefGoogle Scholar
  17. Shah, D., et al.: Gossip algorithms. Found. Trends® Networking 3(1), 1–125 (2009)CrossRefGoogle Scholar
  18. Upton, E., Halfacree, G.: Raspberry Pi User Guide. Wiley, Hoboken (2014)Google Scholar
  19. Wang, L., Liu, G., Sun, L.: A secure and privacy-preserving navigation scheme using spatial crowdsourcing in fog-based vanets. Sensors 17(4), 668 (2017)CrossRefGoogle Scholar
  20. Wood, G.: Ethereum: a secure decentralised generalised transaction ledger. Ethereum Proj. Yellow Pap. 151, 1–32 (2014)Google Scholar

Copyright information

© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2019

Authors and Affiliations

  1. 1.University of Applied Sciences Western Switzerland in Geneva - HES-SOGenevaSwitzerland

Personalised recommendations