SlideShare ist ein Scribd-Unternehmen logo
1 von 38
Downloaden Sie, um offline zu lesen
Automotive Security with Blockchain
Technology
A Project Report Submitted in partial fulfilment of the degree of
Master of Computer Applications
By
Anil Chaurasiya (15MCMC17)
School of Computer and Information Sciences
University of Hyderabad, Gachibowli
Hyderabad - 500046, India
MAY, 2018
CERTIFICATE
This is to certify that the Project Report entitled "Automotive Security with Blockchain
Technology" submitted by Student Anil Chaurasiya bearing Reg. No. 15MCMC17 in
partial fulfilment of the requirements for the award of Master of Computer Applications,
is a bonafide work carried out by him under my supervision and guidance.
The Project Report has not been submitted previously in part or in full to this or any
other University or Institution for the award of any degree or diploma.
Dr. N Rukma Rekha,
Assistant Professor,
School of Computer and Information Sciences,
University of Hyderabad
Dr. Arun Agarwal
Dean,
School of Computer and Information Sciences,
University of Hyderabad
DECLARATION
I, Anil Chaurasiya hereby declare that this dissertation entitled
“Automotive Security with Blockchain Technology” submitted by me
under the guidance and supervision of Dr. N Rukma Rekha is a bonafide
work. I also declare that it has not been submitted previously in part or in
full to this or any other University or Institution for the award of any degree
or diploma.
Date:
Anil Chaurasiya
Reg. No.: 15MCMC17
Signature of the Student
ACKNOWLEDGMENT
I would like to take this opportunity to express my gratitude to the people
who have been instrumental in the successful completion of this project.
First and the most , I would like to express one deep and profound thanks
to the lord almighty for being with me throughout the project and helping
me to complete the project successfully.
I feel a great pleasure to express my deep sense of gratitude to Dr. N
RUKMA REKHA, my supervisor who generously showed her continue
support and guidance, throughout my project.
I am grateful to Prof. ARUN AGARWAL, Dean of the School of
Computer and Information Science, and University of Hyderabad for
providing the facilities and extending their cooperation during course.
We would like to thank all the Faculty members of SCIS, AI lab staff and
non-teaching staff, University of Hyderabad for their cooperation.
Last but not the least, I place a deep sense of gratitude to my family
members and my friends who have been constant source of inspiration
during this project work.
Anil Chaurasiya
School of Computer and Information Sciences
University of Hyderabad
Abstract
Automotive Security with Blockchain Technology
A Blockchain is a continuously growing list of records, called blocks. In Blockchain blocks
are linked with each other and secured with cryptographic hash algorithm. Each block
contains a cryptographic hash of the previous block, timestamp and transaction data.It is the
distributed ledger which records the transaction between two parties in a very efficient
manner. For use as a distributed ledger, a blockchain is typically managed by a peer to peer
network collectively adhering to a protocol for validating new blocks.
In conventional security of smart vehicle that uses central cloud servers, results in single point
of failure. Any security breach in cloud can be safety threats for vehicle. A malfunction due to
a security breach (e.g., by installing malicious SW) could lead to serious accidents thereby
endangering the safety of the passengers and also of other road users in close proximity.
Conventional security and privacy methods used in smart vehicles tend to be ineffective due
to the following challenges: Centralization, Lack of privacy and Safety threats.
Blockchain has been shown to possess a number of salient features including security,
immutability and privacy and could thus be a useful technology to address the aforementioned
challenges. This will enable upgrading the functionality of Electronic Control Unit(ECU) or
bug fixing in installed software which is called the Wireless remote software update(WRSU).
Blockchain is managed by peer to peer network. Each node is identified uniquely using their
Public Key(PK). Communication between nodes is known as transactions. Software provider,
creates a new software version and stores it in the cloud storage provided by the OEM. Then,
the software provider generates the hash of it and creates a multi signature transaction and
forwards it to OBMs. OBMs will match the PK of OEM in their key list table. OEMs verifies
software and signs the transaction and sends back it to OBMs. OBMs verifies the signature
and broadcast to all OBMs. Every node can verify a transaction by validating the signature of
the transaction generator against their PK. Nodes use transactions for communication with
other nodes in the overlay.
Overlay transactions are broadcast and verified by Overlay Block Managers (OBMs). An
OBM verifies a transaction by validating the signature of the transaction participants with
their PK. After validating the transaction, OBM broadcast the transaction to all other OBMs.
Valid transaction will be added to pool of transactions. The component of OBMs can be smart
vehicles, OEMs, vehicle assembly lines, cloud storage, software provider, mobile devices of
user such as smartphones, laptops. The respective OBMs informs to the linked smart vehicles.
Then vehicle will download the updated software from cloud storage and verify hash value.
Contents
Acknowledgement III
Abstract IV
1. Introduction 1
1.1. Blockchain Introduction………………………………………..1
1.2. Automotive Security…………………………………………...4
1.3. Objective of the Project………………………………………...4
1.4. Organization of the project reports………...………………..…5
2. Conventional Security 6
2.1. Introduction…………………………………………………....6
2.2. Challenges in Conventional Security and Privacy Methods. ....6
2.3. Solution for the Conventional Security Methods…………. .....7
2.4. Programming Language/Cryptographic Algorithms Used ...….7
2.4.1. Python………………………………….………...…...…..7
2.4.2. Crypto Algorithms…………………………….… .…....7
2.4.2.1. Authentication………….……………….……..…8
2.4.2.2. Hash…………………………………….………...8
2.4.2.3. SHA-256………………………………...………..9
2.4.2.4. Digital Signature………………………....……….9
2.5. Scope of the Project………………………………. . ….……..9
3. Automotive Security with Blockchain 11
3.1. Introduction……………………………………………….…….…...11
3.1.1. Overlay Block Manager (OBMs)………..………….……...11
3.1.2. Overlay Networks…………………………….…….………11
3.1.3. Overlay Nodes……………………………………….……...11
3.2. Overlay Block Manager Functions…………………….…..12
3.2.1. Single Signature………………………………………....…12
3.2.2. Multi Signature…………………………………………….12
3.3. Blockchain based Overlay Architecture…………………..…14
3.3.1. Remote Software update…………………………… ....…15
4. Tests and Implementation Result 18
4.1. Introduction……………………………………..…….………..…18
4.2. Work Done on Blockchain………………..………….…………18
4.2.1. Creation of the Genesis Block……………….…..….18
4.2.2. Detailed description about a Block………....….…....20
4.3. Work done on Automotive Security……………….…..….21
4.3.1. Automotive Security Header Structure…………..….21
4.3.2. Automotive Security Transaction Structure….……...21
4.3.2.1. Single Signature Transaction………………......21
4.3.2.2. Multi Signature Transaction…………….…......22
4.3.3. Public/Private Key Generation………………….......23
4.3.4. Signature generation and Verification………............24
4.3.5. Creating the transaction.………………………..….……25
4.3.6. Software provider creating MultiSig Transaction.....26
5. Conclusion and Future Work 27
5.1. Conclusion……………………………………….….……. …....27
5.2. Future Work…………………………………..……….…… ….27
References 27
List of Figures
1.1. Structure of Blockchain……………………………….……..2
3.1. Functions of the Overlay Block Manager……………….….13
3.2. Overview of overlay network ……………………………...15
3.3. WRSU process utilizing the Blockchain Architecture……...16
3.4. Flowchart remote software update in cloud Storage………..17
4.1 Genesis Block creation……………………………………....19
4.2 Genesis Block Information…………….……….……………20
4.3. Header Structure ……………………………….….………21
4.4. Transaction Structure……………………………………..…22
4.5. Public Private Key generation……………….………….…. 23
4.6. Signature generation and verification ……………….….…..24
4.7. Creating the transaction……………………………………..25
4..8. multi Signature transaction…………………………….......26
List of Tables
1.1 Block header structure………………………………………3
1.2 Block Information…………………………………………..3
Chapter 1
Introduction
1.1 BlockChain Introduction
BlockChain
A Blockchain is an emerging technology and tt is type of distributed ledger, which
can store the data in the blocks. Each Block is logically connected to other blocks.
This technology was introduced in 2008 through BitCoin, which is a digital
cryptocurrency. Its data structures are databases that contain, text files, images, lists,
and so on. We can think of a blockchain competing most closely with a database.
Blockchain may remove the need of third parties because it can create trust between
two parties.
Block -
A block is a collection of data. A block contains two sections: Block header and list of
transactions. Block header comprises of hash of previous block, merkle root and
metadata. It also references a previous block, known as the parent block, through the
“previous block hash” field in the block header. And each piece of data is added to the
blockchain by connecting one block after another in a chronological way. The block
header structure is shown in table 1.1 .
1
Figure 1.1: Structure of Blockchain [2]
Block Header -
A block-chain contains a series of various blocks that are used to store information
related to transactions which will occur on a blockchain network. Block contains a
header which will be unique and can be identified by its block header hash. The
Bitcoin block header is 80-byte long string , and is comprises of the 4-byte long
Bitcoin version number, 32-byte previous block hash, 32-byte long merkle root, 4-
byte long timestamp of the block, 4-byte long difficulty of the target block and 4-byte
long nonce which will be used by miner of the block. The various fields of block
header are shown in table 1.1.
The block information contains information about height of the block, total number of
transactions are performed in the table, the time stamp, hash value of the block and
previous block hash value. Also information about the minor of the block, difficulty
level, size of the block in bits, nonce and the block reward will be present. Block
information of a block is shown in Table 1.2.
2
Field Description
Version A version number to track software/protocol upgrades
Previous Block
Hash
A reference to the hash of the previous (parent) block in the chain
Merkle root A hash of the root of the merkle tree of this block’s transactions
Timestamp The approximate creation time of this block (seconds from Unix
Epoch)
Difficulty The Proof-of-Work algorithm difficulty target for this block
Nonce A counter used for the Proof-of-Work algorithm
Table 1.1 : Block Header structure [4]
Block Information:
Property Description
Height Height of the block from the Genesis block.
Transactions Total numbers of transactions performed in this block.
Timestamp A timestamp is the time at which block is created in the blockchain.
Hash It shows the current hash value of the block.
Parent Hash It shows the previous block hash value.
Mined by The miner who mined this block in the blockchain.
Difficulty A network-wide setting that controls how much computation is required
to produce a proof of work.
Size It shows the size of blocks in bits.
Nonce A counter used for the Proof-of-Work algorithm
Block Reward A block reward refers to the new bitcoin that are awarded by the
blockchain network to eligible cryptocurrency miners for each block they
mine successfully.
Table 1.2 :Block Information [4]
3
Mining -
Mining is process through which new block creation has to be done. For creating
new block minor has to solve the proof of work , which is a mathematical puzzle hard
to solve and easy to verify.The peer node which solves the proof of work puzzle is
called as Miner.After creating a successful block miner gets some incentives as a
reward.
1.2 Automotive Security
The increasingly interconnected nature of a vehicle’s control modules means there is
no safety without security. Security features must include not just physical access and
protection of confidential information, but also critical safety systems. Designers
must anticipate every form of attack to prevent access to embedded systems and data.
At the same time, the industry at large must develop standards, specifications and
guidelines for vehicle security that enable interoperability. This potentially exposes
smart vehicles to a range of security and privacy threats such as location tracking or
remote hijacking of the vehicle. Ali Dorri and all argue that BlockChain (BC), a
disruptive technology that has found many applications from cryptocurrencies to
smart contracts, is a potential solution to these challenges. Ali Dorri and all propose a
BC-based architecture to protect the privacy of the users and to increase the security
of the vehicular ecosystem. Wireless remote software updates and other emerging
services such as dynamic vehicle insurance fees, are used to illustrate the efficacy of
the proposed security architecture.
1.3 Objective of the project
The aim of this project is to implement a secure system for smart vehicle. It provides
a very secure way to download software from cloud storage to vehicle and establish a
secure way to communication between other overlay nodes using the BlockChain
technology.
4
1.4 Organization of the project reports
The remaining chapter of report is structured into following chapters:
Chapter – 2: Chapter 2 covers the overview of the Automotive security and its
solution. Limitations of the existing system.
Chapter – 3: Consists working analysis of the Automotive security with
blockchain technology. Proposed system for automotive security. And describes about
the working model of the wireless remote software update process utilizing the BC
architecture.
Chapter – 4: Deals with the Testing and implementation. Summary of the overall
system.
Chapter – 5: Gives the Conclusion and scope for the future work.
5
Chapter 2
Automotive Security
2.1. Introduction
In this section we will discuss about Automotive Security with Blockchain
Technology and describes about blockchain will be helpful over conventional security
and privacy methods used in smart vehicles.
2.2. Conventional Security and Privacy methods :-
Two Ethical hackers Miller and Valasek presented a sophisticated attack on smart
vehicle using wireless interface in which vehicles were connected through the
wireless vehicle interface(WVI) [2] . In which they were able to control the core
function of the smart vehicle and exchanges the privacy data from the vehicle. It
opens the new security challenges for smart vehicles.
In these methods security and privacy methods used in smart vehicles became
ineffective due to following reasons:
1) Centralization: Current smart vehicles architecture is dependent on the centralized
authority , where vehicles can be identified , authorised , authenticated and connected
with a cloud server. This model would not be scaled when large number of vehicles
when they are connected. The biggest thing will be cloud server will remain a
bottleneck problem for large number of vehicles. Any single point failure can disrupt
the entire network.
2) Lack of privacy: The current existing communication architecture do not consider
the consumers privacy. Central authorities are sharing the information of the vehicles
without owner’s permission or summarized data to the requester .
6
3) Safety Threats: A smart vehicle has numerous autonomous deriving functions. A
malfunction security due to breach could lead to serious accident which only not
endangers the the safety of passenger.
2.3. Solution for the Conventional Security Methods
Blockchain is distributed database technology which may be helpful in providing
solution to remove the needs of the central authority in Smart Vehicle.
2.4 Programming Language/Crypto Algorithms used:
2.4.1. Python
Python is a high-level, interpreted, interactive and object-oriented scripting language.
Python has many features that make it very popular like:
• Easy to learn
• Easy to read
• Easy to maintain
• A broad standard library
• Interactive Mode
• Portable
2.4.2. Crypto Algorithms
Cryptographic algorithms are essentially mathematical computations designed to
perform encryption and decryption of a message. The two main categories of
algorithms are symmetric and asymmetric.
7
Symmetric cryptography algorithms use the same key for encryption and decryption.
The key must therefore be kept secret by all entities that use the key for secure
communications.
Asymmetric cryptography uses a public key to authenticate data received from the
owner of the private key. This digital signature scheme relies on the sender generating
a unique signature that is formed from some combination of the message and the
sender’s private key, transmitting both the message and the signature to the recipient.
The signature is often formed by generating a “checksum” of the entire message and
then by encrypting only the checksum with the private key. The receiver of the
message and signature can then perform the same checksum operation on the message
and compare it with the checksum that was decrypted from the signature using the
public key. If they do not match, then the data was either corrupted during
transmission or the sender is not the expected entity.
2.4.2.1. Authentication
Cryptographic authentication is the process of verifying the identity of the sender of
the data. In an embedded application, authentication can be used to verify the source
of data transmitted on external interfaces between different control units. It can also
be used to verify the trustworthiness of a software.
2.4.2.2. Hash
A cryptographic hash function is a function from some sort of input data. In
particular, a hash function takes arbitrarily sized inputs to a fixed size output. It
"shrinks" the input space to a predefined output range.
8
2.4.2.3. SHA-256
SHA-256 stands for Secure Hash Algorithm – 256 bit and is a type of hash function.
SHA-256 is a one-way function that converts a text of any length into a string of 256
bits. A hash function is a type of mathematical function which turns data into a
fingerprint of that data called a hash. It’s like a formula or algorithm which takes the
input data and turns it into an output of a fixed length, which represents the
fingerprint of the data.
The input data can literally be any data, whether it’s the entire Encyclopedia
Britannica, or just the number ‘1’. A hash function will give the same hash for the
same input always no matter when, where and how you run the algorithm. Equally
interestingly, if even one character in the input text or data is changed, the output hash
will change. Also, a hash function is a one-way function, thus it is impossible to
generate back the input data from its hash. So, you can go from the input data to the
hash but not from the hash to the input data.
2.4.2.4. Digital Signature
A digital signature is a mathematical technique used to validate the authenticity and
integrity of a message, software or digital document.
2.5. Scope of the project
This software can be used by any vehicle manufacturing company which needs a
cloud based infrastructure for their members. The software is designed to provide
ease to manufacturer as well as vehicle owner’s. Any user(member of overlay
network) has permission to to communicate with the other overlay nodes. Each node
9
has their own public private key. This software system provides security to the smart
vehicles.
10
Chapter 3
Working Process
This system will work on Blockchain Based Overlay Architecture.
3.1. Introduction:
In this chapter we will discuss about the wireless remote software update process is
utilizing the blockchain architecture.
3.1.1. Overlay Block Manager (OBM):
Nodes in the overlay are clustered and only the Cluster Heads (CHs) are responsible
for managing the Blockchain and performing its core functions. These nodes are thus
known as Overlay Block Managers (OBMs). Transactions are broadcast to and
verified by the OBMs, thus eliminating the need for a central broker.
3.1.2. Overlay Networks:
Smart vehicles, OEMs (i.e. car manufacturers) and other service providers jointly
form an overlay network where nodes can communicate with each other.
3.1.3. Overlay Nodes:
Overlay nodes can be smart vehicles, OEMs, vehicle assembly lines, software
providers (SP), cloud storage providers, and mobile devices of users such as
smartphones, laptops, or tablets.
11
3.2. Overlay Block Manager Functions:
Node use transactions to communicate to communicate with other overlay nodes.
There are two types of transactions which are based on number of signatures that
must be validated.
3.2.1. Single Signature:
It requires one signature which will be generated by transaction generator. It is
considered as a valid signature. The structure of the transaction is :
T_ID || P_T_ID || PK || Sign
Here, T_ID is transaction id, P_T_ID previous transaction id , PK is Public Key of
transaction generator, Sign is the signature of the generator.
3.2.2. Multi Signature:
In multi signature transactions are require two signatures, 1st
signature will belongs to
transaction generator and second signature will belongs to the recipient of the
transaction to be considered valid. Structure of the multi signature is as follows:
T_ID || P_T_ID || PK1 || Sign1 || PK2 || Sign2
Here, T_ID is transaction id, P_T_ID previous transaction id , PK1 is Public Key of
transaction generator, Sign1 is the signature of the generator and PK2 is the public
key of the recipient of the transaction, Sign2 is the signature of the recipient.
12
Figure 3.1: Functions of the overlay block manager [2]
3.3. Blockchain Based Overlay Architecture
The main part of architecture is overlay. Network overlay network Blockchain is
managed by overlay nodes. Nodes can be smart vehicle, OEMs (i.e. car manufacturer),
Overlay Block Manager (OBM), assembly lines, service center, smart devices, cloud
storage , software providers and smart home.
13
In overlay network, vehicle will be equipped with wireless vehicle interface(WVI).
WVI connects the vehicle to the overlay network . Local storage(in-vehicle) is used
to store the privacy sensitive data and to protect privacy of the consumers. Vehicles
will generate single signature transaction on a fixed time of the interval which would
be contained. The signed hash of the software binary data which is stored the in-
vehicle storage. This transaction will be send to the OBM connected with it.
Transaction will be stored to the Blockchain. Backup storage will be available at
home. As, vehicle storage has limited capacity , vehicle periodically sends data from
in-vehicle storage to the backup storage. In this case hash of the backup storage will
be stored in the blockchain.
Overlay transactions are broadcast and verified by the OBMs. OBMs will be
validating the signature of the transaction using the participants Public Key(PK).
Each node in the blockchain is identified by the unique changeable PK.Vehicle must
have knowledge about the OEMs PK, so it can trust on request sent by the OEMs.
This will work on distributed database networks in which nodes will be connected
through overlay networks. An overview of the overlay Network is shown in figure
3.2.
14
Figure 3.2 : An Overview of overlay network [2]
3.3.1 Remote software Update:
A process in which fixing a bug of electronic control units of (ECUs) of a vehicle or
upgrading the functionality in the installed software on Electronic control unit (ECU)
is known as wireless remote software update (WRSU). It can be utilized during the
vehicle development and assembly as well as maintenance of the vehicle in service
center or remotely from home.
Upgrading/Updating the software process is based on the given architecture is
sketched in figure 3.3. :
15
Figure 3.3: WRSU process utilizing the Blockchain architecture [2]
Step – 1. Software provider creates new software version and stores it in the cloud
storage provided by the OEM (i.e. car manufacturer).
Step – 2 Software provider creates the multi signature transaction and populates its
Public key in PK.1 field and signed hash of the software binary stored in the cloud
storage will be added in the sign.1 field. Then the OEMs public key will be added in
the PK.2 field and sends the transaction to the Overlay Block Manager (OBM).
Hence, generated transaction is multisig, so it needs to signed by the recipient node.
Step – 3 In this step, OBM broadcast the multisig transaction to all OBMs. OBMs
contains the key list of the other nodes in their network.
Step – 4 When the PK of the recipient is matched in OBMs Key list, it transfers the
multisig transaction to recipient node. Hence, The new software binary is uploaded in
the cloud will be verified by the other nodes in the network and after verification
recipient node signs in Sign.2 field.
16
Step – 5 After signing, recipient forwards it to the connected OBM and OBM
broadcast to all other OBMs in the overlay. Hence it is a multi signature transaction
and it needs to be verified by the other nodes.
Step – 6 In this step, OBMs notifies about new update to its cluster members.
Step – 7 After receiving transaction from OBM, vehicle verifies it by ensuring PK.2
field in the transaction and compare with PK of its OEM. If key matched then, the
vehicle downloads the software.
The overall functionality of the Automotive security application is shown in abobe
figure 3.4.
Figure 3.4 Flowchart remote software update in cloud Storage
17
Chapter 4
Test and Implementation Result
4.1 Introduction
This chapter deals with the testing of system on previous data i.e. computing the hash
of stored file, generating the multisignature transaction, verification of the uploaded
files in the cloud storage and adding the blocks in the existing blockchain.
4.2Work Done on Blockchain:
4.2.1 Creation of the genesis block: In this section, first block of the
blockchain is created and calculated the hash of the block. First block in block is also
known as genesis block. For calculating the hash value of block we are using SHA-
256 hash algorithm.
18
Figure 4.1. Genesis block creation
19
4.2.2 Detailed Description about a Block: In this section we are showing
the complete information about the block which will contain hash, properties number
of transaction in the block, height of the block, timestamp, merkle_root,
previous_block, difficulty, bits, size, version, nonce etc.
Figure 4.2. Genesis Block Information
20
4.3 Work Done in Automotive Security
4.3.1 Automotive Security Header Structure
Automotive security block header section will contain the hash of the
current block and the hash of the previous block which ensures the
immutability of the block and blockchain.
Figure 4.3. Header Structure
4.3.2 Automotive security Transaction Structure
The transaction of the Automotive security will be two types :
4.3.2.1. Single Signature Transaction:
As I discussed it earlier in the chapter 3. This signature will be generated by vehicle
which will be considered as the valid. In single signature transaction fields are:
P_T_ID, T_ID, PK, and Sign.
21
4.3.2.2. Multi Signature Transaction:
In Multi signature transaction (MT), two parties will be involve. Software provider
will create the MT, and sends it to recipient party, after signing the recipient, recipient
will sends it back to OBMs. OBMs will verify the the signature of the both parties
and broadcast it to all OBMs. Multi signature transaction fields are :
T_ID || P_T_ID || PK1 || Sign1 || PK2 || Sign2
Figure 4.4. Transaction Structure [2]
22
4.3.3 Public/Private Key generation
In this we are creating the public private key for encryption decryption of the
transaction using the RSA algorithm.
Figure 4.5. Public Private key generation
23
4.3.4 Signature generation and verification:
In this step, we are calculating the hash of software binary stored in the cloud storage
and encrypt the hash value with transactions generators private key and store in the
sign.1 field. Forward this multisig transaction to OBM with signature generator
Public Key (PK), using which recipient can verify the signature of the transaction
generator. If the both hash values, i.e. hash calculated by recipient and hash value
encrypted from signature match, signature is verified.
Figure 4.6. Signature generation and verification
24
4.3.5 Creating the transaction:
In this section, we are creating the the transaction and storing the transaction in the
pool of valid transactions. After reaching at transaction limit 5 new block will be
generated and newly created block will be added to the existing blockchain and
OBMs will broadcast the new block in the overlay network.
Figure 4.7. Creating the transaction
25
4.3.6 Software Provider Creating multiSig transaction
In this step, Software provider uploaded new software version and creates multiSig
transaction and forwards it to OBM.
Figure 4.8. Software Provider Creating multiSig transaction
26
Chapter 5
Conclusion and Future Work
5.1 Conclusion
The project is aimed to implement transaction in blocks and verification of the blocks.
And implementation of an application of the Automotive Security with Blockchain
Technology.
5.2 Future Work
The main component of future work will be to implement Lightweight scalable
BlockChain(LSB) which will be further reducing the high (packet and processing)
overhead and low scalability and throughput. Another application modules that will
be implemented are: Insurance and Car Sharing Services.
1) Insurance
2) Car Sharing Services
27
References
1) Satoshi Nakamoto “Bitcoin: A Peer-to-Peer Electronic Cash System” 2008.
2) Ali Dorri,Marco Steger, Salil Kanhere, and Raja Jurdak “Blockchain: A
Distributed Solution to Automotive Security and Privacy” 13 December, 2017
3) https://www.nxp.com/docs/en/white-paper/AUTOSECURITYWP
4) Mastering Bitcoin by Andreas M. Antonopoulos Second Edition
28

Weitere ähnliche Inhalte

Was ist angesagt?

IRJET- Block Chain based Banking Application
IRJET- Block Chain based Banking ApplicationIRJET- Block Chain based Banking Application
IRJET- Block Chain based Banking ApplicationIRJET Journal
 
How to Create Blockchain Products by Slice.Market CTO
How to Create Blockchain Products by Slice.Market CTOHow to Create Blockchain Products by Slice.Market CTO
How to Create Blockchain Products by Slice.Market CTOProduct School
 
Metamorphosing Indian Blockchain Ecosystem
Metamorphosing Indian Blockchain EcosystemMetamorphosing Indian Blockchain Ecosystem
Metamorphosing Indian Blockchain EcosystemDr. Amarjeet Singh
 
7 Industries Influencing Blockchain Testing
7 Industries Influencing Blockchain Testing7 Industries Influencing Blockchain Testing
7 Industries Influencing Blockchain TestingCygnet Infotech
 
Introduction to Blockchain and Smart Contracts
Introduction to Blockchain and Smart ContractsIntroduction to Blockchain and Smart Contracts
Introduction to Blockchain and Smart ContractsTechracers
 
Alexander Shulgin, founder & CEO, Gruppa Kompaniy Familia - What do we mine n...
Alexander Shulgin, founder & CEO, Gruppa Kompaniy Familia - What do we mine n...Alexander Shulgin, founder & CEO, Gruppa Kompaniy Familia - What do we mine n...
Alexander Shulgin, founder & CEO, Gruppa Kompaniy Familia - What do we mine n...Techsylvania
 
Blockchain workshop 101
Blockchain workshop 101Blockchain workshop 101
Blockchain workshop 101Karthikeyan VK
 
What is smart contract and how does it work
What is smart contract and how does it work What is smart contract and how does it work
What is smart contract and how does it work Global Tech Council
 
Blockchain in Banking - Application in Conventional and Islamic Banking
Blockchain in Banking - Application in Conventional and Islamic BankingBlockchain in Banking - Application in Conventional and Islamic Banking
Blockchain in Banking - Application in Conventional and Islamic BankingCris TRAN
 
Block chain technology
Block chain technologyBlock chain technology
Block chain technologyRinshi Singh
 
Application to Quickly and Safely Store and Recover Credit Card’s Information...
Application to Quickly and Safely Store and Recover Credit Card’s Information...Application to Quickly and Safely Store and Recover Credit Card’s Information...
Application to Quickly and Safely Store and Recover Credit Card’s Information...IRJET Journal
 
Top 10 Reasons to Learn Blockchain | Blockchain Training | Blockchain Tutoria...
Top 10 Reasons to Learn Blockchain | Blockchain Training | Blockchain Tutoria...Top 10 Reasons to Learn Blockchain | Blockchain Training | Blockchain Tutoria...
Top 10 Reasons to Learn Blockchain | Blockchain Training | Blockchain Tutoria...Edureka!
 
Estate Exchange - Real-Estate Blockchain Slide (git)
Estate Exchange - Real-Estate Blockchain Slide (git)Estate Exchange - Real-Estate Blockchain Slide (git)
Estate Exchange - Real-Estate Blockchain Slide (git)James Neo
 
IRJET-Overview of Blockchain Technology in Government/Public Sectors
IRJET-Overview of Blockchain Technology in Government/Public SectorsIRJET-Overview of Blockchain Technology in Government/Public Sectors
IRJET-Overview of Blockchain Technology in Government/Public SectorsIRJET Journal
 
Blockchain Application Design and Development, and the Case of Programmable M...
Blockchain Application Design and Development, and the Case of Programmable M...Blockchain Application Design and Development, and the Case of Programmable M...
Blockchain Application Design and Development, and the Case of Programmable M...Ingo Weber
 
Blockchain Technology: Adoption Challenges, Platform and Applications
Blockchain Technology: Adoption Challenges, Platform and ApplicationsBlockchain Technology: Adoption Challenges, Platform and Applications
Blockchain Technology: Adoption Challenges, Platform and ApplicationsSanjeev Verma, PhD
 
Deja vu Security - Blockchain Security Summit - Adam Cecchetti
Deja vu Security - Blockchain Security Summit - Adam CecchettiDeja vu Security - Blockchain Security Summit - Adam Cecchetti
Deja vu Security - Blockchain Security Summit - Adam CecchettiScott Strang
 

Was ist angesagt? (20)

IRJET- Block Chain based Banking Application
IRJET- Block Chain based Banking ApplicationIRJET- Block Chain based Banking Application
IRJET- Block Chain based Banking Application
 
How to Create Blockchain Products by Slice.Market CTO
How to Create Blockchain Products by Slice.Market CTOHow to Create Blockchain Products by Slice.Market CTO
How to Create Blockchain Products by Slice.Market CTO
 
Metamorphosing Indian Blockchain Ecosystem
Metamorphosing Indian Blockchain EcosystemMetamorphosing Indian Blockchain Ecosystem
Metamorphosing Indian Blockchain Ecosystem
 
7 Industries Influencing Blockchain Testing
7 Industries Influencing Blockchain Testing7 Industries Influencing Blockchain Testing
7 Industries Influencing Blockchain Testing
 
Introduction to Blockchain and Smart Contracts
Introduction to Blockchain and Smart ContractsIntroduction to Blockchain and Smart Contracts
Introduction to Blockchain and Smart Contracts
 
Alexander Shulgin, founder & CEO, Gruppa Kompaniy Familia - What do we mine n...
Alexander Shulgin, founder & CEO, Gruppa Kompaniy Familia - What do we mine n...Alexander Shulgin, founder & CEO, Gruppa Kompaniy Familia - What do we mine n...
Alexander Shulgin, founder & CEO, Gruppa Kompaniy Familia - What do we mine n...
 
Blockchain workshop 101
Blockchain workshop 101Blockchain workshop 101
Blockchain workshop 101
 
Boodskap overview
Boodskap overview Boodskap overview
Boodskap overview
 
What is smart contract and how does it work
What is smart contract and how does it work What is smart contract and how does it work
What is smart contract and how does it work
 
Blockchain in Banking - Application in Conventional and Islamic Banking
Blockchain in Banking - Application in Conventional and Islamic BankingBlockchain in Banking - Application in Conventional and Islamic Banking
Blockchain in Banking - Application in Conventional and Islamic Banking
 
Block chain technology
Block chain technologyBlock chain technology
Block chain technology
 
Application to Quickly and Safely Store and Recover Credit Card’s Information...
Application to Quickly and Safely Store and Recover Credit Card’s Information...Application to Quickly and Safely Store and Recover Credit Card’s Information...
Application to Quickly and Safely Store and Recover Credit Card’s Information...
 
Top 10 Reasons to Learn Blockchain | Blockchain Training | Blockchain Tutoria...
Top 10 Reasons to Learn Blockchain | Blockchain Training | Blockchain Tutoria...Top 10 Reasons to Learn Blockchain | Blockchain Training | Blockchain Tutoria...
Top 10 Reasons to Learn Blockchain | Blockchain Training | Blockchain Tutoria...
 
Ethereum Smart Contracts 101 with Cryptizens.io
Ethereum Smart Contracts 101 with Cryptizens.ioEthereum Smart Contracts 101 with Cryptizens.io
Ethereum Smart Contracts 101 with Cryptizens.io
 
Estate Exchange - Real-Estate Blockchain Slide (git)
Estate Exchange - Real-Estate Blockchain Slide (git)Estate Exchange - Real-Estate Blockchain Slide (git)
Estate Exchange - Real-Estate Blockchain Slide (git)
 
IRJET-Overview of Blockchain Technology in Government/Public Sectors
IRJET-Overview of Blockchain Technology in Government/Public SectorsIRJET-Overview of Blockchain Technology in Government/Public Sectors
IRJET-Overview of Blockchain Technology in Government/Public Sectors
 
Blockchain Application Design and Development, and the Case of Programmable M...
Blockchain Application Design and Development, and the Case of Programmable M...Blockchain Application Design and Development, and the Case of Programmable M...
Blockchain Application Design and Development, and the Case of Programmable M...
 
Blockchain Technology: Adoption Challenges, Platform and Applications
Blockchain Technology: Adoption Challenges, Platform and ApplicationsBlockchain Technology: Adoption Challenges, Platform and Applications
Blockchain Technology: Adoption Challenges, Platform and Applications
 
Deja vu Security - Blockchain Security Summit - Adam Cecchetti
Deja vu Security - Blockchain Security Summit - Adam CecchettiDeja vu Security - Blockchain Security Summit - Adam Cecchetti
Deja vu Security - Blockchain Security Summit - Adam Cecchetti
 
Block chain
Block chainBlock chain
Block chain
 

Ähnlich wie Automotive security with Blockchain Technology (Project Report)

Creating An E-Commerce web application using Blockchain
Creating An E-Commerce web application using BlockchainCreating An E-Commerce web application using Blockchain
Creating An E-Commerce web application using BlockchainIRJET Journal
 
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum BlockchainIRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum BlockchainIRJET Journal
 
DECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORK
DECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORKDECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORK
DECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORKIRJET Journal
 
IRJET- Secure Online Voting Systems using Block of Chunks
IRJET-  	  Secure Online Voting Systems using Block of ChunksIRJET-  	  Secure Online Voting Systems using Block of Chunks
IRJET- Secure Online Voting Systems using Block of ChunksIRJET Journal
 
Decentralized Car Hailing Application
Decentralized Car Hailing ApplicationDecentralized Car Hailing Application
Decentralized Car Hailing ApplicationIRJET Journal
 
Adoption Blockchain Smart Contracts in Developing Information Systems.pdf
Adoption Blockchain Smart Contracts in Developing Information Systems.pdfAdoption Blockchain Smart Contracts in Developing Information Systems.pdf
Adoption Blockchain Smart Contracts in Developing Information Systems.pdfMahdi_Fahmideh
 
IRJET- Survey on Blockchain based Digital Certificate System
IRJET- Survey on Blockchain based Digital Certificate SystemIRJET- Survey on Blockchain based Digital Certificate System
IRJET- Survey on Blockchain based Digital Certificate SystemIRJET Journal
 
Blockchain-based Security Mechanisms for Internet of Medical Things (IOMT)
Blockchain-based Security Mechanisms for Internet of Medical Things (IOMT)Blockchain-based Security Mechanisms for Internet of Medical Things (IOMT)
Blockchain-based Security Mechanisms for Internet of Medical Things (IOMT)IJCNCJournal
 
BLOCKCHAIN-BASED SECURITY MECHANISMS FOR INTERNET OF MEDICAL THINGS (IOMT)
BLOCKCHAIN-BASED SECURITY MECHANISMS FOR INTERNET OF MEDICAL THINGS (IOMT)BLOCKCHAIN-BASED SECURITY MECHANISMS FOR INTERNET OF MEDICAL THINGS (IOMT)
BLOCKCHAIN-BASED SECURITY MECHANISMS FOR INTERNET OF MEDICAL THINGS (IOMT)IJCNCJournal
 
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review
IRJET-  	  Blockchain Technology in Cloud Computing : A Systematic ReviewIRJET-  	  Blockchain Technology in Cloud Computing : A Systematic Review
IRJET- Blockchain Technology in Cloud Computing : A Systematic ReviewIRJET Journal
 
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAINAN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAINIRJET Journal
 
Blockchain for AI: Review and Open. Research Challenges K. SALAH, M. H. REHMA...
Blockchain for AI: Review and Open. Research Challenges K. SALAH, M. H. REHMA...Blockchain for AI: Review and Open. Research Challenges K. SALAH, M. H. REHMA...
Blockchain for AI: Review and Open. Research Challenges K. SALAH, M. H. REHMA...eraser Juan José Calderón
 
Rui zhang and rui xue, georgia tech
Rui zhang and rui xue, georgia techRui zhang and rui xue, georgia tech
Rui zhang and rui xue, georgia techIT Strategy Group
 
A Technological Perspective of Blockchain Security
A Technological Perspective of Blockchain SecurityA Technological Perspective of Blockchain Security
A Technological Perspective of Blockchain SecurityRagaviRaghavan
 
Implementing Blockchain based Architecture for Securing Electronic Health Rec...
Implementing Blockchain based Architecture for Securing Electronic Health Rec...Implementing Blockchain based Architecture for Securing Electronic Health Rec...
Implementing Blockchain based Architecture for Securing Electronic Health Rec...IRJET Journal
 
Real-life Application of a Decentralized System
Real-life Application of a Decentralized SystemReal-life Application of a Decentralized System
Real-life Application of a Decentralized SystemIRJET Journal
 

Ähnlich wie Automotive security with Blockchain Technology (Project Report) (20)

Creating An E-Commerce web application using Blockchain
Creating An E-Commerce web application using BlockchainCreating An E-Commerce web application using Blockchain
Creating An E-Commerce web application using Blockchain
 
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum BlockchainIRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
 
Block chain technology
Block chain technologyBlock chain technology
Block chain technology
 
DECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORK
DECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORKDECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORK
DECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORK
 
IRJET- Secure Online Voting Systems using Block of Chunks
IRJET-  	  Secure Online Voting Systems using Block of ChunksIRJET-  	  Secure Online Voting Systems using Block of Chunks
IRJET- Secure Online Voting Systems using Block of Chunks
 
Decentralized Car Hailing Application
Decentralized Car Hailing ApplicationDecentralized Car Hailing Application
Decentralized Car Hailing Application
 
Adoption Blockchain Smart Contracts in Developing Information Systems.pdf
Adoption Blockchain Smart Contracts in Developing Information Systems.pdfAdoption Blockchain Smart Contracts in Developing Information Systems.pdf
Adoption Blockchain Smart Contracts in Developing Information Systems.pdf
 
IRJET- Survey on Blockchain based Digital Certificate System
IRJET- Survey on Blockchain based Digital Certificate SystemIRJET- Survey on Blockchain based Digital Certificate System
IRJET- Survey on Blockchain based Digital Certificate System
 
Blockchain-based Security Mechanisms for Internet of Medical Things (IOMT)
Blockchain-based Security Mechanisms for Internet of Medical Things (IOMT)Blockchain-based Security Mechanisms for Internet of Medical Things (IOMT)
Blockchain-based Security Mechanisms for Internet of Medical Things (IOMT)
 
BLOCKCHAIN-BASED SECURITY MECHANISMS FOR INTERNET OF MEDICAL THINGS (IOMT)
BLOCKCHAIN-BASED SECURITY MECHANISMS FOR INTERNET OF MEDICAL THINGS (IOMT)BLOCKCHAIN-BASED SECURITY MECHANISMS FOR INTERNET OF MEDICAL THINGS (IOMT)
BLOCKCHAIN-BASED SECURITY MECHANISMS FOR INTERNET OF MEDICAL THINGS (IOMT)
 
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review
IRJET-  	  Blockchain Technology in Cloud Computing : A Systematic ReviewIRJET-  	  Blockchain Technology in Cloud Computing : A Systematic Review
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review
 
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAINAN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
 
Blockchain for AI: Review and Open. Research Challenges K. SALAH, M. H. REHMA...
Blockchain for AI: Review and Open. Research Challenges K. SALAH, M. H. REHMA...Blockchain for AI: Review and Open. Research Challenges K. SALAH, M. H. REHMA...
Blockchain for AI: Review and Open. Research Challenges K. SALAH, M. H. REHMA...
 
Rui zhang and rui xue, georgia tech
Rui zhang and rui xue, georgia techRui zhang and rui xue, georgia tech
Rui zhang and rui xue, georgia tech
 
A Technological Perspective of Blockchain Security
A Technological Perspective of Blockchain SecurityA Technological Perspective of Blockchain Security
A Technological Perspective of Blockchain Security
 
Blockchain technology
Blockchain technologyBlockchain technology
Blockchain technology
 
Implementing Blockchain based Architecture for Securing Electronic Health Rec...
Implementing Blockchain based Architecture for Securing Electronic Health Rec...Implementing Blockchain based Architecture for Securing Electronic Health Rec...
Implementing Blockchain based Architecture for Securing Electronic Health Rec...
 
Blockchain spreads
Blockchain spreadsBlockchain spreads
Blockchain spreads
 
Real-life Application of a Decentralized System
Real-life Application of a Decentralized SystemReal-life Application of a Decentralized System
Real-life Application of a Decentralized System
 
PATIENT DRIVEN ELECTRONIC HEALTH RECORD USING BLOCK CHAIN
PATIENT DRIVEN ELECTRONIC HEALTH RECORD  USING BLOCK CHAINPATIENT DRIVEN ELECTRONIC HEALTH RECORD  USING BLOCK CHAIN
PATIENT DRIVEN ELECTRONIC HEALTH RECORD USING BLOCK CHAIN
 

Mehr von Anil Chaurasiya

National payment system architecture
National payment system architectureNational payment system architecture
National payment system architectureAnil Chaurasiya
 
Mobile banking & payment
Mobile banking & paymentMobile banking & payment
Mobile banking & paymentAnil Chaurasiya
 
Management information system
Management information systemManagement information system
Management information systemAnil Chaurasiya
 
Internet banking ARCHITECTURE AND IMPLEMENTATION
Internet banking  ARCHITECTURE AND IMPLEMENTATIONInternet banking  ARCHITECTURE AND IMPLEMENTATION
Internet banking ARCHITECTURE AND IMPLEMENTATIONAnil Chaurasiya
 
Impact of technology on banking operations
Impact of technology on banking operationsImpact of technology on banking operations
Impact of technology on banking operationsAnil Chaurasiya
 
Evolution of banking technology
Evolution of banking technologyEvolution of banking technology
Evolution of banking technologyAnil Chaurasiya
 
Electronic cards credit and debit
Electronic cards credit and debitElectronic cards credit and debit
Electronic cards credit and debitAnil Chaurasiya
 
Electronic Delivery channels integration
Electronic Delivery channels integrationElectronic Delivery channels integration
Electronic Delivery channels integrationAnil Chaurasiya
 
DATA CENTER AND BUSINESS COMMUNITY
DATA CENTER AND BUSINESS COMMUNITYDATA CENTER AND BUSINESS COMMUNITY
DATA CENTER AND BUSINESS COMMUNITYAnil Chaurasiya
 
Cbs concepts and opportunities
Cbs concepts and opportunitiesCbs concepts and opportunities
Cbs concepts and opportunitiesAnil Chaurasiya
 
CENTRALIZED challenges implementation and MANAGEMENT issues
CENTRALIZED challenges implementation and MANAGEMENT issuesCENTRALIZED challenges implementation and MANAGEMENT issues
CENTRALIZED challenges implementation and MANAGEMENT issuesAnil Chaurasiya
 
Atm technology and operations
Atm technology and operationsAtm technology and operations
Atm technology and operationsAnil Chaurasiya
 
Asset liability management
Asset liability managementAsset liability management
Asset liability managementAnil Chaurasiya
 
Banking Technology (End Term Exam) nov-2015
Banking Technology (End Term Exam) nov-2015Banking Technology (End Term Exam) nov-2015
Banking Technology (End Term Exam) nov-2015Anil Chaurasiya
 

Mehr von Anil Chaurasiya (20)

Digital marketing
Digital marketingDigital marketing
Digital marketing
 
Smart Vehicle
Smart VehicleSmart Vehicle
Smart Vehicle
 
Blockchain
BlockchainBlockchain
Blockchain
 
National payment system architecture
National payment system architectureNational payment system architecture
National payment system architecture
 
Mobile banking & payment
Mobile banking & paymentMobile banking & payment
Mobile banking & payment
 
Management information system
Management information systemManagement information system
Management information system
 
Internet banking ARCHITECTURE AND IMPLEMENTATION
Internet banking  ARCHITECTURE AND IMPLEMENTATIONInternet banking  ARCHITECTURE AND IMPLEMENTATION
Internet banking ARCHITECTURE AND IMPLEMENTATION
 
Impact of technology on banking operations
Impact of technology on banking operationsImpact of technology on banking operations
Impact of technology on banking operations
 
Forex management
Forex managementForex management
Forex management
 
Evolution of banking technology
Evolution of banking technologyEvolution of banking technology
Evolution of banking technology
 
Electronic cards credit and debit
Electronic cards credit and debitElectronic cards credit and debit
Electronic cards credit and debit
 
Electronic Delivery channels integration
Electronic Delivery channels integrationElectronic Delivery channels integration
Electronic Delivery channels integration
 
DATA CENTER AND BUSINESS COMMUNITY
DATA CENTER AND BUSINESS COMMUNITYDATA CENTER AND BUSINESS COMMUNITY
DATA CENTER AND BUSINESS COMMUNITY
 
Credit appraisal SYSTEM
Credit appraisal SYSTEMCredit appraisal SYSTEM
Credit appraisal SYSTEM
 
Cbs concepts and opportunities
Cbs concepts and opportunitiesCbs concepts and opportunities
Cbs concepts and opportunities
 
CENTRALIZED challenges implementation and MANAGEMENT issues
CENTRALIZED challenges implementation and MANAGEMENT issuesCENTRALIZED challenges implementation and MANAGEMENT issues
CENTRALIZED challenges implementation and MANAGEMENT issues
 
Atm technology and operations
Atm technology and operationsAtm technology and operations
Atm technology and operations
 
Atm switch
Atm switchAtm switch
Atm switch
 
Asset liability management
Asset liability managementAsset liability management
Asset liability management
 
Banking Technology (End Term Exam) nov-2015
Banking Technology (End Term Exam) nov-2015Banking Technology (End Term Exam) nov-2015
Banking Technology (End Term Exam) nov-2015
 

Kürzlich hochgeladen

Centering equity and the community in Transportation by Richard Ezike
Centering equity and the community in Transportation by Richard EzikeCentering equity and the community in Transportation by Richard Ezike
Centering equity and the community in Transportation by Richard EzikeForth
 
Study on Financing of zero-emission trucks and their infrastructure
Study on Financing of zero-emission trucks and their infrastructureStudy on Financing of zero-emission trucks and their infrastructure
Study on Financing of zero-emission trucks and their infrastructureEuropeanCleanTruckin
 
Design and Fund Equitable Electric Transportation For Communities by Jasmine ...
Design and Fund Equitable Electric Transportation For Communities by Jasmine ...Design and Fund Equitable Electric Transportation For Communities by Jasmine ...
Design and Fund Equitable Electric Transportation For Communities by Jasmine ...Forth
 
Building a Future Where Everyone Can Ride and Drive Electric by Linda Bailey
Building a Future Where Everyone Can Ride and Drive Electric by Linda BaileyBuilding a Future Where Everyone Can Ride and Drive Electric by Linda Bailey
Building a Future Where Everyone Can Ride and Drive Electric by Linda BaileyForth
 
Program Design by Prateek Suri and Shakaya Cooper
Program Design by Prateek Suri and Shakaya CooperProgram Design by Prateek Suri and Shakaya Cooper
Program Design by Prateek Suri and Shakaya CooperForth
 
Transportation Electrification Funding Strategy.pptx
Transportation Electrification Funding Strategy.pptxTransportation Electrification Funding Strategy.pptx
Transportation Electrification Funding Strategy.pptxForth
 
USDA’s EV Charging Infrastructure Solutions by Chris McLean
USDA’s EV Charging Infrastructure Solutionsby Chris McLeanUSDA’s EV Charging Infrastructure Solutionsby Chris McLean
USDA’s EV Charging Infrastructure Solutions by Chris McLeanForth
 
Centering Equity Presentation by Brenna Rivett
Centering Equity Presentation by Brenna RivettCentering Equity Presentation by Brenna Rivett
Centering Equity Presentation by Brenna RivettForth
 
Lakshitha maduranga CV - for data entry clerck
Lakshitha maduranga CV - for data entry clerckLakshitha maduranga CV - for data entry clerck
Lakshitha maduranga CV - for data entry clerckLakshanMadhushanka3
 
Centering Equity and Community in Transportation by Benito Perez
Centering Equity and Community in Transportation by Benito PerezCentering Equity and Community in Transportation by Benito Perez
Centering Equity and Community in Transportation by Benito PerezForth
 
Equity Lab: Inked with Intent by The Greenlining Institute
Equity Lab: Inked with Intent by The Greenlining InstituteEquity Lab: Inked with Intent by The Greenlining Institute
Equity Lab: Inked with Intent by The Greenlining InstituteForth
 
Commercial Extractor fan repair services
Commercial Extractor fan repair servicesCommercial Extractor fan repair services
Commercial Extractor fan repair servicesmb1294198
 
Nosfdsfsdfasdfasdfasdfsadf asdfasdfasdfasdf
Nosfdsfsdfasdfasdfasdfsadf asdfasdfasdfasdfNosfdsfsdfasdfasdfasdfsadf asdfasdfasdfasdf
Nosfdsfsdfasdfasdfasdfsadf asdfasdfasdfasdfJulia Kaye
 
Environmental and Climate Justice Programby Karen Campblin
Environmental and Climate Justice Programby Karen CampblinEnvironmental and Climate Justice Programby Karen Campblin
Environmental and Climate Justice Programby Karen CampblinForth
 
Building a Budget by Jeff Allen and Josh Rodriguez
Building a Budget by Jeff Allen and Josh RodriguezBuilding a Budget by Jeff Allen and Josh Rodriguez
Building a Budget by Jeff Allen and Josh RodriguezForth
 

Kürzlich hochgeladen (17)

Centering equity and the community in Transportation by Richard Ezike
Centering equity and the community in Transportation by Richard EzikeCentering equity and the community in Transportation by Richard Ezike
Centering equity and the community in Transportation by Richard Ezike
 
Study on Financing of zero-emission trucks and their infrastructure
Study on Financing of zero-emission trucks and their infrastructureStudy on Financing of zero-emission trucks and their infrastructure
Study on Financing of zero-emission trucks and their infrastructure
 
Design and Fund Equitable Electric Transportation For Communities by Jasmine ...
Design and Fund Equitable Electric Transportation For Communities by Jasmine ...Design and Fund Equitable Electric Transportation For Communities by Jasmine ...
Design and Fund Equitable Electric Transportation For Communities by Jasmine ...
 
Building a Future Where Everyone Can Ride and Drive Electric by Linda Bailey
Building a Future Where Everyone Can Ride and Drive Electric by Linda BaileyBuilding a Future Where Everyone Can Ride and Drive Electric by Linda Bailey
Building a Future Where Everyone Can Ride and Drive Electric by Linda Bailey
 
Program Design by Prateek Suri and Shakaya Cooper
Program Design by Prateek Suri and Shakaya CooperProgram Design by Prateek Suri and Shakaya Cooper
Program Design by Prateek Suri and Shakaya Cooper
 
Transportation Electrification Funding Strategy.pptx
Transportation Electrification Funding Strategy.pptxTransportation Electrification Funding Strategy.pptx
Transportation Electrification Funding Strategy.pptx
 
EVAT - Future Mobility Transformation in Thailand
EVAT - Future Mobility Transformation in ThailandEVAT - Future Mobility Transformation in Thailand
EVAT - Future Mobility Transformation in Thailand
 
USDA’s EV Charging Infrastructure Solutions by Chris McLean
USDA’s EV Charging Infrastructure Solutionsby Chris McLeanUSDA’s EV Charging Infrastructure Solutionsby Chris McLean
USDA’s EV Charging Infrastructure Solutions by Chris McLean
 
Centering Equity Presentation by Brenna Rivett
Centering Equity Presentation by Brenna RivettCentering Equity Presentation by Brenna Rivett
Centering Equity Presentation by Brenna Rivett
 
Lakshitha maduranga CV - for data entry clerck
Lakshitha maduranga CV - for data entry clerckLakshitha maduranga CV - for data entry clerck
Lakshitha maduranga CV - for data entry clerck
 
Centering Equity and Community in Transportation by Benito Perez
Centering Equity and Community in Transportation by Benito PerezCentering Equity and Community in Transportation by Benito Perez
Centering Equity and Community in Transportation by Benito Perez
 
Equity Lab: Inked with Intent by The Greenlining Institute
Equity Lab: Inked with Intent by The Greenlining InstituteEquity Lab: Inked with Intent by The Greenlining Institute
Equity Lab: Inked with Intent by The Greenlining Institute
 
Commercial Extractor fan repair services
Commercial Extractor fan repair servicesCommercial Extractor fan repair services
Commercial Extractor fan repair services
 
Nosfdsfsdfasdfasdfasdfsadf asdfasdfasdfasdf
Nosfdsfsdfasdfasdfasdfsadf asdfasdfasdfasdfNosfdsfsdfasdfasdfasdfsadf asdfasdfasdfasdf
Nosfdsfsdfasdfasdfasdfsadf asdfasdfasdfasdf
 
Environmental and Climate Justice Programby Karen Campblin
Environmental and Climate Justice Programby Karen CampblinEnvironmental and Climate Justice Programby Karen Campblin
Environmental and Climate Justice Programby Karen Campblin
 
Building a Budget by Jeff Allen and Josh Rodriguez
Building a Budget by Jeff Allen and Josh RodriguezBuilding a Budget by Jeff Allen and Josh Rodriguez
Building a Budget by Jeff Allen and Josh Rodriguez
 
Reinventing the Car - as I reported it in 1985!
Reinventing the Car - as I reported it in 1985!Reinventing the Car - as I reported it in 1985!
Reinventing the Car - as I reported it in 1985!
 

Automotive security with Blockchain Technology (Project Report)

  • 1. Automotive Security with Blockchain Technology A Project Report Submitted in partial fulfilment of the degree of Master of Computer Applications By Anil Chaurasiya (15MCMC17) School of Computer and Information Sciences University of Hyderabad, Gachibowli Hyderabad - 500046, India MAY, 2018
  • 2. CERTIFICATE This is to certify that the Project Report entitled "Automotive Security with Blockchain Technology" submitted by Student Anil Chaurasiya bearing Reg. No. 15MCMC17 in partial fulfilment of the requirements for the award of Master of Computer Applications, is a bonafide work carried out by him under my supervision and guidance. The Project Report has not been submitted previously in part or in full to this or any other University or Institution for the award of any degree or diploma. Dr. N Rukma Rekha, Assistant Professor, School of Computer and Information Sciences, University of Hyderabad Dr. Arun Agarwal Dean, School of Computer and Information Sciences, University of Hyderabad
  • 3. DECLARATION I, Anil Chaurasiya hereby declare that this dissertation entitled “Automotive Security with Blockchain Technology” submitted by me under the guidance and supervision of Dr. N Rukma Rekha is a bonafide work. I also declare that it has not been submitted previously in part or in full to this or any other University or Institution for the award of any degree or diploma. Date: Anil Chaurasiya Reg. No.: 15MCMC17 Signature of the Student
  • 4. ACKNOWLEDGMENT I would like to take this opportunity to express my gratitude to the people who have been instrumental in the successful completion of this project. First and the most , I would like to express one deep and profound thanks to the lord almighty for being with me throughout the project and helping me to complete the project successfully. I feel a great pleasure to express my deep sense of gratitude to Dr. N RUKMA REKHA, my supervisor who generously showed her continue support and guidance, throughout my project. I am grateful to Prof. ARUN AGARWAL, Dean of the School of Computer and Information Science, and University of Hyderabad for providing the facilities and extending their cooperation during course. We would like to thank all the Faculty members of SCIS, AI lab staff and non-teaching staff, University of Hyderabad for their cooperation. Last but not the least, I place a deep sense of gratitude to my family members and my friends who have been constant source of inspiration during this project work. Anil Chaurasiya School of Computer and Information Sciences University of Hyderabad
  • 5. Abstract Automotive Security with Blockchain Technology A Blockchain is a continuously growing list of records, called blocks. In Blockchain blocks are linked with each other and secured with cryptographic hash algorithm. Each block contains a cryptographic hash of the previous block, timestamp and transaction data.It is the distributed ledger which records the transaction between two parties in a very efficient manner. For use as a distributed ledger, a blockchain is typically managed by a peer to peer network collectively adhering to a protocol for validating new blocks. In conventional security of smart vehicle that uses central cloud servers, results in single point of failure. Any security breach in cloud can be safety threats for vehicle. A malfunction due to a security breach (e.g., by installing malicious SW) could lead to serious accidents thereby endangering the safety of the passengers and also of other road users in close proximity. Conventional security and privacy methods used in smart vehicles tend to be ineffective due to the following challenges: Centralization, Lack of privacy and Safety threats. Blockchain has been shown to possess a number of salient features including security, immutability and privacy and could thus be a useful technology to address the aforementioned challenges. This will enable upgrading the functionality of Electronic Control Unit(ECU) or bug fixing in installed software which is called the Wireless remote software update(WRSU). Blockchain is managed by peer to peer network. Each node is identified uniquely using their Public Key(PK). Communication between nodes is known as transactions. Software provider, creates a new software version and stores it in the cloud storage provided by the OEM. Then, the software provider generates the hash of it and creates a multi signature transaction and forwards it to OBMs. OBMs will match the PK of OEM in their key list table. OEMs verifies software and signs the transaction and sends back it to OBMs. OBMs verifies the signature and broadcast to all OBMs. Every node can verify a transaction by validating the signature of the transaction generator against their PK. Nodes use transactions for communication with other nodes in the overlay. Overlay transactions are broadcast and verified by Overlay Block Managers (OBMs). An
  • 6. OBM verifies a transaction by validating the signature of the transaction participants with their PK. After validating the transaction, OBM broadcast the transaction to all other OBMs. Valid transaction will be added to pool of transactions. The component of OBMs can be smart vehicles, OEMs, vehicle assembly lines, cloud storage, software provider, mobile devices of user such as smartphones, laptops. The respective OBMs informs to the linked smart vehicles. Then vehicle will download the updated software from cloud storage and verify hash value.
  • 7. Contents Acknowledgement III Abstract IV 1. Introduction 1 1.1. Blockchain Introduction………………………………………..1 1.2. Automotive Security…………………………………………...4 1.3. Objective of the Project………………………………………...4 1.4. Organization of the project reports………...………………..…5 2. Conventional Security 6 2.1. Introduction…………………………………………………....6 2.2. Challenges in Conventional Security and Privacy Methods. ....6 2.3. Solution for the Conventional Security Methods…………. .....7 2.4. Programming Language/Cryptographic Algorithms Used ...….7 2.4.1. Python………………………………….………...…...…..7 2.4.2. Crypto Algorithms…………………………….… .…....7 2.4.2.1. Authentication………….……………….……..…8 2.4.2.2. Hash…………………………………….………...8 2.4.2.3. SHA-256………………………………...………..9 2.4.2.4. Digital Signature………………………....……….9 2.5. Scope of the Project………………………………. . ….……..9 3. Automotive Security with Blockchain 11 3.1. Introduction……………………………………………….…….…...11 3.1.1. Overlay Block Manager (OBMs)………..………….……...11
  • 8. 3.1.2. Overlay Networks…………………………….…….………11 3.1.3. Overlay Nodes……………………………………….……...11 3.2. Overlay Block Manager Functions…………………….…..12 3.2.1. Single Signature………………………………………....…12 3.2.2. Multi Signature…………………………………………….12 3.3. Blockchain based Overlay Architecture…………………..…14 3.3.1. Remote Software update…………………………… ....…15 4. Tests and Implementation Result 18 4.1. Introduction……………………………………..…….………..…18 4.2. Work Done on Blockchain………………..………….…………18 4.2.1. Creation of the Genesis Block……………….…..….18 4.2.2. Detailed description about a Block………....….…....20 4.3. Work done on Automotive Security……………….…..….21 4.3.1. Automotive Security Header Structure…………..….21 4.3.2. Automotive Security Transaction Structure….……...21 4.3.2.1. Single Signature Transaction………………......21 4.3.2.2. Multi Signature Transaction…………….…......22 4.3.3. Public/Private Key Generation………………….......23 4.3.4. Signature generation and Verification………............24 4.3.5. Creating the transaction.………………………..….……25 4.3.6. Software provider creating MultiSig Transaction.....26 5. Conclusion and Future Work 27 5.1. Conclusion……………………………………….….……. …....27 5.2. Future Work…………………………………..……….…… ….27 References 27
  • 9. List of Figures 1.1. Structure of Blockchain……………………………….……..2 3.1. Functions of the Overlay Block Manager……………….….13 3.2. Overview of overlay network ……………………………...15 3.3. WRSU process utilizing the Blockchain Architecture……...16 3.4. Flowchart remote software update in cloud Storage………..17 4.1 Genesis Block creation……………………………………....19 4.2 Genesis Block Information…………….……….……………20 4.3. Header Structure ……………………………….….………21 4.4. Transaction Structure……………………………………..…22 4.5. Public Private Key generation……………….………….…. 23 4.6. Signature generation and verification ……………….….…..24 4.7. Creating the transaction……………………………………..25 4..8. multi Signature transaction…………………………….......26
  • 10. List of Tables 1.1 Block header structure………………………………………3 1.2 Block Information…………………………………………..3
  • 11. Chapter 1 Introduction 1.1 BlockChain Introduction BlockChain A Blockchain is an emerging technology and tt is type of distributed ledger, which can store the data in the blocks. Each Block is logically connected to other blocks. This technology was introduced in 2008 through BitCoin, which is a digital cryptocurrency. Its data structures are databases that contain, text files, images, lists, and so on. We can think of a blockchain competing most closely with a database. Blockchain may remove the need of third parties because it can create trust between two parties. Block - A block is a collection of data. A block contains two sections: Block header and list of transactions. Block header comprises of hash of previous block, merkle root and metadata. It also references a previous block, known as the parent block, through the “previous block hash” field in the block header. And each piece of data is added to the blockchain by connecting one block after another in a chronological way. The block header structure is shown in table 1.1 . 1
  • 12. Figure 1.1: Structure of Blockchain [2] Block Header - A block-chain contains a series of various blocks that are used to store information related to transactions which will occur on a blockchain network. Block contains a header which will be unique and can be identified by its block header hash. The Bitcoin block header is 80-byte long string , and is comprises of the 4-byte long Bitcoin version number, 32-byte previous block hash, 32-byte long merkle root, 4- byte long timestamp of the block, 4-byte long difficulty of the target block and 4-byte long nonce which will be used by miner of the block. The various fields of block header are shown in table 1.1. The block information contains information about height of the block, total number of transactions are performed in the table, the time stamp, hash value of the block and previous block hash value. Also information about the minor of the block, difficulty level, size of the block in bits, nonce and the block reward will be present. Block information of a block is shown in Table 1.2. 2
  • 13. Field Description Version A version number to track software/protocol upgrades Previous Block Hash A reference to the hash of the previous (parent) block in the chain Merkle root A hash of the root of the merkle tree of this block’s transactions Timestamp The approximate creation time of this block (seconds from Unix Epoch) Difficulty The Proof-of-Work algorithm difficulty target for this block Nonce A counter used for the Proof-of-Work algorithm Table 1.1 : Block Header structure [4] Block Information: Property Description Height Height of the block from the Genesis block. Transactions Total numbers of transactions performed in this block. Timestamp A timestamp is the time at which block is created in the blockchain. Hash It shows the current hash value of the block. Parent Hash It shows the previous block hash value. Mined by The miner who mined this block in the blockchain. Difficulty A network-wide setting that controls how much computation is required to produce a proof of work. Size It shows the size of blocks in bits. Nonce A counter used for the Proof-of-Work algorithm Block Reward A block reward refers to the new bitcoin that are awarded by the blockchain network to eligible cryptocurrency miners for each block they mine successfully. Table 1.2 :Block Information [4] 3
  • 14. Mining - Mining is process through which new block creation has to be done. For creating new block minor has to solve the proof of work , which is a mathematical puzzle hard to solve and easy to verify.The peer node which solves the proof of work puzzle is called as Miner.After creating a successful block miner gets some incentives as a reward. 1.2 Automotive Security The increasingly interconnected nature of a vehicle’s control modules means there is no safety without security. Security features must include not just physical access and protection of confidential information, but also critical safety systems. Designers must anticipate every form of attack to prevent access to embedded systems and data. At the same time, the industry at large must develop standards, specifications and guidelines for vehicle security that enable interoperability. This potentially exposes smart vehicles to a range of security and privacy threats such as location tracking or remote hijacking of the vehicle. Ali Dorri and all argue that BlockChain (BC), a disruptive technology that has found many applications from cryptocurrencies to smart contracts, is a potential solution to these challenges. Ali Dorri and all propose a BC-based architecture to protect the privacy of the users and to increase the security of the vehicular ecosystem. Wireless remote software updates and other emerging services such as dynamic vehicle insurance fees, are used to illustrate the efficacy of the proposed security architecture. 1.3 Objective of the project The aim of this project is to implement a secure system for smart vehicle. It provides a very secure way to download software from cloud storage to vehicle and establish a secure way to communication between other overlay nodes using the BlockChain technology. 4
  • 15. 1.4 Organization of the project reports The remaining chapter of report is structured into following chapters: Chapter – 2: Chapter 2 covers the overview of the Automotive security and its solution. Limitations of the existing system. Chapter – 3: Consists working analysis of the Automotive security with blockchain technology. Proposed system for automotive security. And describes about the working model of the wireless remote software update process utilizing the BC architecture. Chapter – 4: Deals with the Testing and implementation. Summary of the overall system. Chapter – 5: Gives the Conclusion and scope for the future work. 5
  • 16. Chapter 2 Automotive Security 2.1. Introduction In this section we will discuss about Automotive Security with Blockchain Technology and describes about blockchain will be helpful over conventional security and privacy methods used in smart vehicles. 2.2. Conventional Security and Privacy methods :- Two Ethical hackers Miller and Valasek presented a sophisticated attack on smart vehicle using wireless interface in which vehicles were connected through the wireless vehicle interface(WVI) [2] . In which they were able to control the core function of the smart vehicle and exchanges the privacy data from the vehicle. It opens the new security challenges for smart vehicles. In these methods security and privacy methods used in smart vehicles became ineffective due to following reasons: 1) Centralization: Current smart vehicles architecture is dependent on the centralized authority , where vehicles can be identified , authorised , authenticated and connected with a cloud server. This model would not be scaled when large number of vehicles when they are connected. The biggest thing will be cloud server will remain a bottleneck problem for large number of vehicles. Any single point failure can disrupt the entire network. 2) Lack of privacy: The current existing communication architecture do not consider the consumers privacy. Central authorities are sharing the information of the vehicles without owner’s permission or summarized data to the requester . 6
  • 17. 3) Safety Threats: A smart vehicle has numerous autonomous deriving functions. A malfunction security due to breach could lead to serious accident which only not endangers the the safety of passenger. 2.3. Solution for the Conventional Security Methods Blockchain is distributed database technology which may be helpful in providing solution to remove the needs of the central authority in Smart Vehicle. 2.4 Programming Language/Crypto Algorithms used: 2.4.1. Python Python is a high-level, interpreted, interactive and object-oriented scripting language. Python has many features that make it very popular like: • Easy to learn • Easy to read • Easy to maintain • A broad standard library • Interactive Mode • Portable 2.4.2. Crypto Algorithms Cryptographic algorithms are essentially mathematical computations designed to perform encryption and decryption of a message. The two main categories of algorithms are symmetric and asymmetric. 7
  • 18. Symmetric cryptography algorithms use the same key for encryption and decryption. The key must therefore be kept secret by all entities that use the key for secure communications. Asymmetric cryptography uses a public key to authenticate data received from the owner of the private key. This digital signature scheme relies on the sender generating a unique signature that is formed from some combination of the message and the sender’s private key, transmitting both the message and the signature to the recipient. The signature is often formed by generating a “checksum” of the entire message and then by encrypting only the checksum with the private key. The receiver of the message and signature can then perform the same checksum operation on the message and compare it with the checksum that was decrypted from the signature using the public key. If they do not match, then the data was either corrupted during transmission or the sender is not the expected entity. 2.4.2.1. Authentication Cryptographic authentication is the process of verifying the identity of the sender of the data. In an embedded application, authentication can be used to verify the source of data transmitted on external interfaces between different control units. It can also be used to verify the trustworthiness of a software. 2.4.2.2. Hash A cryptographic hash function is a function from some sort of input data. In particular, a hash function takes arbitrarily sized inputs to a fixed size output. It "shrinks" the input space to a predefined output range. 8
  • 19. 2.4.2.3. SHA-256 SHA-256 stands for Secure Hash Algorithm – 256 bit and is a type of hash function. SHA-256 is a one-way function that converts a text of any length into a string of 256 bits. A hash function is a type of mathematical function which turns data into a fingerprint of that data called a hash. It’s like a formula or algorithm which takes the input data and turns it into an output of a fixed length, which represents the fingerprint of the data. The input data can literally be any data, whether it’s the entire Encyclopedia Britannica, or just the number ‘1’. A hash function will give the same hash for the same input always no matter when, where and how you run the algorithm. Equally interestingly, if even one character in the input text or data is changed, the output hash will change. Also, a hash function is a one-way function, thus it is impossible to generate back the input data from its hash. So, you can go from the input data to the hash but not from the hash to the input data. 2.4.2.4. Digital Signature A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital document. 2.5. Scope of the project This software can be used by any vehicle manufacturing company which needs a cloud based infrastructure for their members. The software is designed to provide ease to manufacturer as well as vehicle owner’s. Any user(member of overlay network) has permission to to communicate with the other overlay nodes. Each node 9
  • 20. has their own public private key. This software system provides security to the smart vehicles. 10
  • 21. Chapter 3 Working Process This system will work on Blockchain Based Overlay Architecture. 3.1. Introduction: In this chapter we will discuss about the wireless remote software update process is utilizing the blockchain architecture. 3.1.1. Overlay Block Manager (OBM): Nodes in the overlay are clustered and only the Cluster Heads (CHs) are responsible for managing the Blockchain and performing its core functions. These nodes are thus known as Overlay Block Managers (OBMs). Transactions are broadcast to and verified by the OBMs, thus eliminating the need for a central broker. 3.1.2. Overlay Networks: Smart vehicles, OEMs (i.e. car manufacturers) and other service providers jointly form an overlay network where nodes can communicate with each other. 3.1.3. Overlay Nodes: Overlay nodes can be smart vehicles, OEMs, vehicle assembly lines, software providers (SP), cloud storage providers, and mobile devices of users such as smartphones, laptops, or tablets. 11
  • 22. 3.2. Overlay Block Manager Functions: Node use transactions to communicate to communicate with other overlay nodes. There are two types of transactions which are based on number of signatures that must be validated. 3.2.1. Single Signature: It requires one signature which will be generated by transaction generator. It is considered as a valid signature. The structure of the transaction is : T_ID || P_T_ID || PK || Sign Here, T_ID is transaction id, P_T_ID previous transaction id , PK is Public Key of transaction generator, Sign is the signature of the generator. 3.2.2. Multi Signature: In multi signature transactions are require two signatures, 1st signature will belongs to transaction generator and second signature will belongs to the recipient of the transaction to be considered valid. Structure of the multi signature is as follows: T_ID || P_T_ID || PK1 || Sign1 || PK2 || Sign2 Here, T_ID is transaction id, P_T_ID previous transaction id , PK1 is Public Key of transaction generator, Sign1 is the signature of the generator and PK2 is the public key of the recipient of the transaction, Sign2 is the signature of the recipient. 12
  • 23. Figure 3.1: Functions of the overlay block manager [2] 3.3. Blockchain Based Overlay Architecture The main part of architecture is overlay. Network overlay network Blockchain is managed by overlay nodes. Nodes can be smart vehicle, OEMs (i.e. car manufacturer), Overlay Block Manager (OBM), assembly lines, service center, smart devices, cloud storage , software providers and smart home. 13
  • 24. In overlay network, vehicle will be equipped with wireless vehicle interface(WVI). WVI connects the vehicle to the overlay network . Local storage(in-vehicle) is used to store the privacy sensitive data and to protect privacy of the consumers. Vehicles will generate single signature transaction on a fixed time of the interval which would be contained. The signed hash of the software binary data which is stored the in- vehicle storage. This transaction will be send to the OBM connected with it. Transaction will be stored to the Blockchain. Backup storage will be available at home. As, vehicle storage has limited capacity , vehicle periodically sends data from in-vehicle storage to the backup storage. In this case hash of the backup storage will be stored in the blockchain. Overlay transactions are broadcast and verified by the OBMs. OBMs will be validating the signature of the transaction using the participants Public Key(PK). Each node in the blockchain is identified by the unique changeable PK.Vehicle must have knowledge about the OEMs PK, so it can trust on request sent by the OEMs. This will work on distributed database networks in which nodes will be connected through overlay networks. An overview of the overlay Network is shown in figure 3.2. 14
  • 25. Figure 3.2 : An Overview of overlay network [2] 3.3.1 Remote software Update: A process in which fixing a bug of electronic control units of (ECUs) of a vehicle or upgrading the functionality in the installed software on Electronic control unit (ECU) is known as wireless remote software update (WRSU). It can be utilized during the vehicle development and assembly as well as maintenance of the vehicle in service center or remotely from home. Upgrading/Updating the software process is based on the given architecture is sketched in figure 3.3. : 15
  • 26. Figure 3.3: WRSU process utilizing the Blockchain architecture [2] Step – 1. Software provider creates new software version and stores it in the cloud storage provided by the OEM (i.e. car manufacturer). Step – 2 Software provider creates the multi signature transaction and populates its Public key in PK.1 field and signed hash of the software binary stored in the cloud storage will be added in the sign.1 field. Then the OEMs public key will be added in the PK.2 field and sends the transaction to the Overlay Block Manager (OBM). Hence, generated transaction is multisig, so it needs to signed by the recipient node. Step – 3 In this step, OBM broadcast the multisig transaction to all OBMs. OBMs contains the key list of the other nodes in their network. Step – 4 When the PK of the recipient is matched in OBMs Key list, it transfers the multisig transaction to recipient node. Hence, The new software binary is uploaded in the cloud will be verified by the other nodes in the network and after verification recipient node signs in Sign.2 field. 16
  • 27. Step – 5 After signing, recipient forwards it to the connected OBM and OBM broadcast to all other OBMs in the overlay. Hence it is a multi signature transaction and it needs to be verified by the other nodes. Step – 6 In this step, OBMs notifies about new update to its cluster members. Step – 7 After receiving transaction from OBM, vehicle verifies it by ensuring PK.2 field in the transaction and compare with PK of its OEM. If key matched then, the vehicle downloads the software. The overall functionality of the Automotive security application is shown in abobe figure 3.4. Figure 3.4 Flowchart remote software update in cloud Storage 17
  • 28. Chapter 4 Test and Implementation Result 4.1 Introduction This chapter deals with the testing of system on previous data i.e. computing the hash of stored file, generating the multisignature transaction, verification of the uploaded files in the cloud storage and adding the blocks in the existing blockchain. 4.2Work Done on Blockchain: 4.2.1 Creation of the genesis block: In this section, first block of the blockchain is created and calculated the hash of the block. First block in block is also known as genesis block. For calculating the hash value of block we are using SHA- 256 hash algorithm. 18
  • 29. Figure 4.1. Genesis block creation 19
  • 30. 4.2.2 Detailed Description about a Block: In this section we are showing the complete information about the block which will contain hash, properties number of transaction in the block, height of the block, timestamp, merkle_root, previous_block, difficulty, bits, size, version, nonce etc. Figure 4.2. Genesis Block Information 20
  • 31. 4.3 Work Done in Automotive Security 4.3.1 Automotive Security Header Structure Automotive security block header section will contain the hash of the current block and the hash of the previous block which ensures the immutability of the block and blockchain. Figure 4.3. Header Structure 4.3.2 Automotive security Transaction Structure The transaction of the Automotive security will be two types : 4.3.2.1. Single Signature Transaction: As I discussed it earlier in the chapter 3. This signature will be generated by vehicle which will be considered as the valid. In single signature transaction fields are: P_T_ID, T_ID, PK, and Sign. 21
  • 32. 4.3.2.2. Multi Signature Transaction: In Multi signature transaction (MT), two parties will be involve. Software provider will create the MT, and sends it to recipient party, after signing the recipient, recipient will sends it back to OBMs. OBMs will verify the the signature of the both parties and broadcast it to all OBMs. Multi signature transaction fields are : T_ID || P_T_ID || PK1 || Sign1 || PK2 || Sign2 Figure 4.4. Transaction Structure [2] 22
  • 33. 4.3.3 Public/Private Key generation In this we are creating the public private key for encryption decryption of the transaction using the RSA algorithm. Figure 4.5. Public Private key generation 23
  • 34. 4.3.4 Signature generation and verification: In this step, we are calculating the hash of software binary stored in the cloud storage and encrypt the hash value with transactions generators private key and store in the sign.1 field. Forward this multisig transaction to OBM with signature generator Public Key (PK), using which recipient can verify the signature of the transaction generator. If the both hash values, i.e. hash calculated by recipient and hash value encrypted from signature match, signature is verified. Figure 4.6. Signature generation and verification 24
  • 35. 4.3.5 Creating the transaction: In this section, we are creating the the transaction and storing the transaction in the pool of valid transactions. After reaching at transaction limit 5 new block will be generated and newly created block will be added to the existing blockchain and OBMs will broadcast the new block in the overlay network. Figure 4.7. Creating the transaction 25
  • 36. 4.3.6 Software Provider Creating multiSig transaction In this step, Software provider uploaded new software version and creates multiSig transaction and forwards it to OBM. Figure 4.8. Software Provider Creating multiSig transaction 26
  • 37. Chapter 5 Conclusion and Future Work 5.1 Conclusion The project is aimed to implement transaction in blocks and verification of the blocks. And implementation of an application of the Automotive Security with Blockchain Technology. 5.2 Future Work The main component of future work will be to implement Lightweight scalable BlockChain(LSB) which will be further reducing the high (packet and processing) overhead and low scalability and throughput. Another application modules that will be implemented are: Insurance and Car Sharing Services. 1) Insurance 2) Car Sharing Services 27
  • 38. References 1) Satoshi Nakamoto “Bitcoin: A Peer-to-Peer Electronic Cash System” 2008. 2) Ali Dorri,Marco Steger, Salil Kanhere, and Raja Jurdak “Blockchain: A Distributed Solution to Automotive Security and Privacy” 13 December, 2017 3) https://www.nxp.com/docs/en/white-paper/AUTOSECURITYWP 4) Mastering Bitcoin by Andreas M. Antonopoulos Second Edition 28