SlideShare ist ein Scribd-Unternehmen logo
1 von 19
BlockChain: A Distributed Solution to
Automative Security and Privacy
Presented By :
Anil Chaurasiya
MCA 6th
Semester
Index
● Threats to Smart Vehicles
● Solution
● How BlockChain can secure the Smart Vehicles
● Lightweight Scalable Blockchain (LSB)
● Blocked based Architecture
● Application
● Security and Privacy Analysis
Threats to Smart Vehicles
●
The high degree of connectivity makes it particular challenging to secure smart
vehicles .Malicious entities can compromise a vehicle, which not only
endangers the security of the vehicle but also the safety of the passengers.
●
Conventional security and privacy methods used in smart vehicles tend to be
ineffective due to the following challenges
– Centralization
– Lack of pirvacy
– Safety Threats
Solution
●
BlockChain(BC) is a distributed database that maintains a
growing list of blocks that are chained to each other.
●
BC has been shown to possess a number of salient features
including security, immutability and privacy and could thus be a
useful technology to address the aforementioned challenges.
●
BC is managed distributedly by a peer to peer network. Each
node is identified using a Public Key (PK).
Solution
●
We proposed an optimized BC instantiation for the Internet of Things (IoT) called
Lightweight Scalable Blockchain (LSB).
●
The main contribution of BC is to present a decentralized privacy-preserving and secure
BC-based architecture for the smart vehicle ecosystem.
●
We base our design on LSB due to its low overheads.
●
Nodes in the overlay are clustered and only the Cluster Heads (CHs) are
responsible for managing the BC and performing its core functions.
Solution
●
To protect user privacy,each vehicle is equipped with an in-vehicle storage to
store privacy sensitive data, e.g. location traces.
●
The vehicle owner defines which data is provided to third parties in trade for
beneficial services and which data should be stored in the in-vehicle storage.
Consequently, the owner has finer control over the exchanged data.
●
All transactions in the network are encrypted using asymmetric encryption.
Nodes are authenticated using their PKs.
Lightweight Scalable Blockchain (LSB)
●
Conventional BC instantiations suffers from high overhead and low scalability and throughput.
●
Conventional BCs have limited throughput, e.g. Bitcoin throughput is restricted to seven transactions per
second due to the complexity of the consensus algorithm.
●
LSB is optimized for the IoT and large-scale low resource networks.
●
LSB replaces the demand for solving a computational puzzle with a scheduled block generation process,
thus eliminating the significant processing overhead of conventional Bcs.
●
LSB uses a distributed trust algorithm to decrease the processing time associated with validating blocks.
Lightweight Scalable Blockchain (LSB)
Two types of transactions based on the number of signatures
that must be validated:
●
1) Single signature: “T_ID || P_T_ID || PK || Sig”
●
2) Multisig: “T_ID || P_T_ID || PK.1 || Sig.1 || PK.2 || Sig.2”
BlockChain-Based Architecture
● A public BC is managed by the overlay nodes which can be
smart vehicles, OEMs, vehicle assembly lines, SW providers,
cloud storage providers, and mobile devices of users such as
smartphones, laptops, or tablets.
Application
● Remote Software Updates
– RSU demands a distributed security method while maintaining the
vehicle owner’s privacy.
BC advantages compared to conventional
methods
● WRSU
Conventional Methods
– Centaralized - non scalable
– Partial participation
– Lack of privacy:
– Only OEM can verify communications or history of update downloads.
Advantages introduced by BC
– Distributed data exchange and security provides scalability
– End-to-end: involving SP, OEMs, vehicles, service centers, assembly lines, etc.
– Ensure privacy of the user (also for diagnostics)
– Update history as well as authenticity of the SW can be publicly verified
●
BC advantages compared to conventional
methods
● Insurance
Conventional Methods
– Current systems are often insecure, which endangers the vehicle’s integrity
– Users lack control over the exchanged data
– Privacy-sensitive data must be continuously sent to the insurance company for receiving services
Advantages introduced by BC
– Secure, distributed, and privacy-preserving data exchange
– Users control the exchanged data
– Privacy-sensitive data is shared on demand (e.g., accident happened) instead of a continuous data
exchange. Authenticity of data stored in the vehicle can be publicly confirmed
BC advantages compared to conventional
methods
● Car-sharing services
Conventional Methods
– Central payment and accounting
– Users can be tracked by their identity
– Central authorization
Advantages introduced by BC
– Private and distributed security, payments and accounting
– Users use changeable identities
– Distributed authorization
Security and Privacy Analysis
Privacy:
● The privacy of the proposed method is inherited from the BC
where each node uses a unique PK to communicate with other
overlay nodes. This prevents malicious nodes from tracking an
overlay node.
● Each vehicle is equipped with an in-vehicle storage to store
privacy sensitive data. The vehicle owner can reveal data in the
in-vehicle storage to the service providers in situations where this
data is required (e.g. accidentclaim).
Security and Privacy Analysis
Security :
● Each transaction in BC contains the hash of the data which ensures
integrity.
● All transactions are encrypted using asymmetric encryption
methods which provide confidentiality.
● OBMs maintain a key list that provides access control for cluster
members in a way that only transactions for which the embedded
PKs match with the key list in the OBM can be forwarded to a
cluster member.
Security and Privacy Analysis
● Distributing a false update by claiming to be the OEM or SW
update provider
● Changing a software binary in the cloud
● Distributed Denial of Service(DDoS) attack
Thank You!

Weitere ähnliche Inhalte

Was ist angesagt?

Optimization technique genetic algorithm
Optimization technique genetic algorithmOptimization technique genetic algorithm
Optimization technique genetic algorithmUday Wankar
 
Vehicle accident detection system (VAD)
Vehicle accident detection system (VAD)Vehicle accident detection system (VAD)
Vehicle accident detection system (VAD)Study Hub
 
Genetic programming
Genetic programmingGenetic programming
Genetic programmingMeghna Singh
 
Automatic railway track crack detector
Automatic railway track crack detectorAutomatic railway track crack detector
Automatic railway track crack detectorAJEET VERMA
 
My Final Year B.Tech Research Project
My Final Year B.Tech Research ProjectMy Final Year B.Tech Research Project
My Final Year B.Tech Research ProjectEeshan Srivastava
 
Liquor detection through Automatic Motor locking system ppt
Liquor detection through Automatic Motor locking system pptLiquor detection through Automatic Motor locking system ppt
Liquor detection through Automatic Motor locking system pptPankaj Singh
 
3 layered advanced atm security
3 layered advanced atm security3 layered advanced atm security
3 layered advanced atm securityeSAT Journals
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPTsravya raju
 
Case Study of Embedded Systems
Case Study of Embedded SystemsCase Study of Embedded Systems
Case Study of Embedded Systemsanand hd
 
Internet of Vehicles (IoV)
Internet of Vehicles (IoV)Internet of Vehicles (IoV)
Internet of Vehicles (IoV)jangezkhan
 
IoT based smart grid FYP for students
IoT based smart grid FYP for studentsIoT based smart grid FYP for students
IoT based smart grid FYP for studentsMuhammadRohanSaeed
 
Wireless Body Area Networks for healthcare (Wban)
Wireless Body Area Networks  for healthcare (Wban)Wireless Body Area Networks  for healthcare (Wban)
Wireless Body Area Networks for healthcare (Wban)no0orcom
 
ACCIDENT DETECTION USING MOBILE PHONE.pptx
ACCIDENT DETECTION USING MOBILE  PHONE.pptxACCIDENT DETECTION USING MOBILE  PHONE.pptx
ACCIDENT DETECTION USING MOBILE PHONE.pptxAjay575757
 
Chapter 8 Embedded Hardware Design and Development (second portion)
Chapter 8 Embedded Hardware Design and Development (second portion)Chapter 8 Embedded Hardware Design and Development (second portion)
Chapter 8 Embedded Hardware Design and Development (second portion)Moe Moe Myint
 

Was ist angesagt? (20)

Optimization technique genetic algorithm
Optimization technique genetic algorithmOptimization technique genetic algorithm
Optimization technique genetic algorithm
 
Vehicle accident detection system (VAD)
Vehicle accident detection system (VAD)Vehicle accident detection system (VAD)
Vehicle accident detection system (VAD)
 
Genetic programming
Genetic programmingGenetic programming
Genetic programming
 
Cruise control devices
Cruise control devicesCruise control devices
Cruise control devices
 
Automatic railway track crack detector
Automatic railway track crack detectorAutomatic railway track crack detector
Automatic railway track crack detector
 
My Final Year B.Tech Research Project
My Final Year B.Tech Research ProjectMy Final Year B.Tech Research Project
My Final Year B.Tech Research Project
 
Liquor detection through Automatic Motor locking system ppt
Liquor detection through Automatic Motor locking system pptLiquor detection through Automatic Motor locking system ppt
Liquor detection through Automatic Motor locking system ppt
 
Cs8601 3
Cs8601 3Cs8601 3
Cs8601 3
 
Embedded Systems Projects Ideas
Embedded Systems Projects IdeasEmbedded Systems Projects Ideas
Embedded Systems Projects Ideas
 
Octave
OctaveOctave
Octave
 
3 layered advanced atm security
3 layered advanced atm security3 layered advanced atm security
3 layered advanced atm security
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPT
 
Case Study of Embedded Systems
Case Study of Embedded SystemsCase Study of Embedded Systems
Case Study of Embedded Systems
 
SMART Vehicle Secure PPT
SMART Vehicle Secure PPTSMART Vehicle Secure PPT
SMART Vehicle Secure PPT
 
Internet of Vehicles (IoV)
Internet of Vehicles (IoV)Internet of Vehicles (IoV)
Internet of Vehicles (IoV)
 
IoT based smart grid FYP for students
IoT based smart grid FYP for studentsIoT based smart grid FYP for students
IoT based smart grid FYP for students
 
Gprs architecture ppt
Gprs architecture pptGprs architecture ppt
Gprs architecture ppt
 
Wireless Body Area Networks for healthcare (Wban)
Wireless Body Area Networks  for healthcare (Wban)Wireless Body Area Networks  for healthcare (Wban)
Wireless Body Area Networks for healthcare (Wban)
 
ACCIDENT DETECTION USING MOBILE PHONE.pptx
ACCIDENT DETECTION USING MOBILE  PHONE.pptxACCIDENT DETECTION USING MOBILE  PHONE.pptx
ACCIDENT DETECTION USING MOBILE PHONE.pptx
 
Chapter 8 Embedded Hardware Design and Development (second portion)
Chapter 8 Embedded Hardware Design and Development (second portion)Chapter 8 Embedded Hardware Design and Development (second portion)
Chapter 8 Embedded Hardware Design and Development (second portion)
 

Ähnlich wie Smart Vehicle

Automotive security with Blockchain Technology
Automotive security with Blockchain TechnologyAutomotive security with Blockchain Technology
Automotive security with Blockchain TechnologyAnil Chaurasiya
 
Blockchain Advances & its Applications.pptx
Blockchain Advances & its Applications.pptxBlockchain Advances & its Applications.pptx
Blockchain Advances & its Applications.pptxMohamedMansour421585
 
Decentralized Car Hailing Application
Decentralized Car Hailing ApplicationDecentralized Car Hailing Application
Decentralized Car Hailing ApplicationIRJET Journal
 
Towards a Post-Modern Hash Chain Future
Towards a Post-Modern Hash Chain FutureTowards a Post-Modern Hash Chain Future
Towards a Post-Modern Hash Chain FutureCasey Kuhlman
 
Blockchain-based multiple AAA system in edge computing for IoT networks
Blockchain-based multiple AAA system in edge computing for IoT networksBlockchain-based multiple AAA system in edge computing for IoT networks
Blockchain-based multiple AAA system in edge computing for IoT networksNam Yong Kim
 
Blockchain for Power Utilities: A View on Capabilities and Adoption
Blockchain for Power Utilities: A View on Capabilities and AdoptionBlockchain for Power Utilities: A View on Capabilities and Adoption
Blockchain for Power Utilities: A View on Capabilities and AdoptionCognizant
 
T-mining presentation at BlockChain Vlaanderen
T-mining presentation at BlockChain VlaanderenT-mining presentation at BlockChain Vlaanderen
T-mining presentation at BlockChain VlaanderenNico Wauters
 
A decentralized consensus application using blockchain ecosystem
A decentralized consensus application using blockchain ecosystem  A decentralized consensus application using blockchain ecosystem
A decentralized consensus application using blockchain ecosystem IJECEIAES
 
IRJET- Transaction based Block Chain Cryptocurrency
IRJET-  	  Transaction based Block Chain CryptocurrencyIRJET-  	  Transaction based Block Chain Cryptocurrency
IRJET- Transaction based Block Chain CryptocurrencyIRJET Journal
 
A secure cloud computing based framework for big information management syste...
A secure cloud computing based framework for big information management syste...A secure cloud computing based framework for big information management syste...
A secure cloud computing based framework for big information management syste...Pawan Arya
 
Brisk and secure ad hoc vehicular communication
Brisk and secure ad hoc vehicular communicationBrisk and secure ad hoc vehicular communication
Brisk and secure ad hoc vehicular communicationeSAT Journals
 
Brisk and secure ad hoc vehicular communication
Brisk and secure ad hoc vehicular communicationBrisk and secure ad hoc vehicular communication
Brisk and secure ad hoc vehicular communicationeSAT Publishing House
 
InitVerse Blockchain - 5 minutes to understand the blockchain.pdf
InitVerse Blockchain - 5 minutes to understand the blockchain.pdfInitVerse Blockchain - 5 minutes to understand the blockchain.pdf
InitVerse Blockchain - 5 minutes to understand the blockchain.pdfInitVerse Blockchain
 
Integrity for join queries in the cloud
Integrity for join queries in the cloudIntegrity for join queries in the cloud
Integrity for join queries in the cloudPapitha Velumani
 
Attribute Based Secure Information Recovery Retrieval System for Decentralize...
Attribute Based Secure Information Recovery Retrieval System for Decentralize...Attribute Based Secure Information Recovery Retrieval System for Decentralize...
Attribute Based Secure Information Recovery Retrieval System for Decentralize...IRJET Journal
 
Quantum1Net The Platform
Quantum1Net The PlatformQuantum1Net The Platform
Quantum1Net The PlatformQuantum1Net
 
Quantum1Net The Platform
Quantum1Net The PlatformQuantum1Net The Platform
Quantum1Net The PlatformQuantum1Net
 
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum BlockchainIRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum BlockchainIRJET Journal
 
Blockchain As An Enabler_16 July 2016_David Lee_Final
Blockchain As An Enabler_16 July 2016_David Lee_FinalBlockchain As An Enabler_16 July 2016_David Lee_Final
Blockchain As An Enabler_16 July 2016_David Lee_FinalDavid Lee Kuo Chuen 李国权
 

Ähnlich wie Smart Vehicle (20)

Automotive security with Blockchain Technology
Automotive security with Blockchain TechnologyAutomotive security with Blockchain Technology
Automotive security with Blockchain Technology
 
Blockchain Advances & its Applications.pptx
Blockchain Advances & its Applications.pptxBlockchain Advances & its Applications.pptx
Blockchain Advances & its Applications.pptx
 
Blockchain
BlockchainBlockchain
Blockchain
 
Decentralized Car Hailing Application
Decentralized Car Hailing ApplicationDecentralized Car Hailing Application
Decentralized Car Hailing Application
 
Towards a Post-Modern Hash Chain Future
Towards a Post-Modern Hash Chain FutureTowards a Post-Modern Hash Chain Future
Towards a Post-Modern Hash Chain Future
 
Blockchain-based multiple AAA system in edge computing for IoT networks
Blockchain-based multiple AAA system in edge computing for IoT networksBlockchain-based multiple AAA system in edge computing for IoT networks
Blockchain-based multiple AAA system in edge computing for IoT networks
 
Blockchain for Power Utilities: A View on Capabilities and Adoption
Blockchain for Power Utilities: A View on Capabilities and AdoptionBlockchain for Power Utilities: A View on Capabilities and Adoption
Blockchain for Power Utilities: A View on Capabilities and Adoption
 
T-mining presentation at BlockChain Vlaanderen
T-mining presentation at BlockChain VlaanderenT-mining presentation at BlockChain Vlaanderen
T-mining presentation at BlockChain Vlaanderen
 
A decentralized consensus application using blockchain ecosystem
A decentralized consensus application using blockchain ecosystem  A decentralized consensus application using blockchain ecosystem
A decentralized consensus application using blockchain ecosystem
 
IRJET- Transaction based Block Chain Cryptocurrency
IRJET-  	  Transaction based Block Chain CryptocurrencyIRJET-  	  Transaction based Block Chain Cryptocurrency
IRJET- Transaction based Block Chain Cryptocurrency
 
A secure cloud computing based framework for big information management syste...
A secure cloud computing based framework for big information management syste...A secure cloud computing based framework for big information management syste...
A secure cloud computing based framework for big information management syste...
 
Brisk and secure ad hoc vehicular communication
Brisk and secure ad hoc vehicular communicationBrisk and secure ad hoc vehicular communication
Brisk and secure ad hoc vehicular communication
 
Brisk and secure ad hoc vehicular communication
Brisk and secure ad hoc vehicular communicationBrisk and secure ad hoc vehicular communication
Brisk and secure ad hoc vehicular communication
 
InitVerse Blockchain - 5 minutes to understand the blockchain.pdf
InitVerse Blockchain - 5 minutes to understand the blockchain.pdfInitVerse Blockchain - 5 minutes to understand the blockchain.pdf
InitVerse Blockchain - 5 minutes to understand the blockchain.pdf
 
Integrity for join queries in the cloud
Integrity for join queries in the cloudIntegrity for join queries in the cloud
Integrity for join queries in the cloud
 
Attribute Based Secure Information Recovery Retrieval System for Decentralize...
Attribute Based Secure Information Recovery Retrieval System for Decentralize...Attribute Based Secure Information Recovery Retrieval System for Decentralize...
Attribute Based Secure Information Recovery Retrieval System for Decentralize...
 
Quantum1Net The Platform
Quantum1Net The PlatformQuantum1Net The Platform
Quantum1Net The Platform
 
Quantum1Net The Platform
Quantum1Net The PlatformQuantum1Net The Platform
Quantum1Net The Platform
 
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum BlockchainIRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
 
Blockchain As An Enabler_16 July 2016_David Lee_Final
Blockchain As An Enabler_16 July 2016_David Lee_FinalBlockchain As An Enabler_16 July 2016_David Lee_Final
Blockchain As An Enabler_16 July 2016_David Lee_Final
 

Mehr von Anil Chaurasiya

Automotive security with Blockchain Technology (Project Report)
Automotive security with Blockchain Technology (Project Report)Automotive security with Blockchain Technology (Project Report)
Automotive security with Blockchain Technology (Project Report)Anil Chaurasiya
 
National payment system architecture
National payment system architectureNational payment system architecture
National payment system architectureAnil Chaurasiya
 
Mobile banking & payment
Mobile banking & paymentMobile banking & payment
Mobile banking & paymentAnil Chaurasiya
 
Management information system
Management information systemManagement information system
Management information systemAnil Chaurasiya
 
Internet banking ARCHITECTURE AND IMPLEMENTATION
Internet banking  ARCHITECTURE AND IMPLEMENTATIONInternet banking  ARCHITECTURE AND IMPLEMENTATION
Internet banking ARCHITECTURE AND IMPLEMENTATIONAnil Chaurasiya
 
Impact of technology on banking operations
Impact of technology on banking operationsImpact of technology on banking operations
Impact of technology on banking operationsAnil Chaurasiya
 
Evolution of banking technology
Evolution of banking technologyEvolution of banking technology
Evolution of banking technologyAnil Chaurasiya
 
Electronic cards credit and debit
Electronic cards credit and debitElectronic cards credit and debit
Electronic cards credit and debitAnil Chaurasiya
 
Electronic Delivery channels integration
Electronic Delivery channels integrationElectronic Delivery channels integration
Electronic Delivery channels integrationAnil Chaurasiya
 
DATA CENTER AND BUSINESS COMMUNITY
DATA CENTER AND BUSINESS COMMUNITYDATA CENTER AND BUSINESS COMMUNITY
DATA CENTER AND BUSINESS COMMUNITYAnil Chaurasiya
 
Cbs concepts and opportunities
Cbs concepts and opportunitiesCbs concepts and opportunities
Cbs concepts and opportunitiesAnil Chaurasiya
 
CENTRALIZED challenges implementation and MANAGEMENT issues
CENTRALIZED challenges implementation and MANAGEMENT issuesCENTRALIZED challenges implementation and MANAGEMENT issues
CENTRALIZED challenges implementation and MANAGEMENT issuesAnil Chaurasiya
 
Atm technology and operations
Atm technology and operationsAtm technology and operations
Atm technology and operationsAnil Chaurasiya
 
Asset liability management
Asset liability managementAsset liability management
Asset liability managementAnil Chaurasiya
 
Banking Technology (End Term Exam) nov-2015
Banking Technology (End Term Exam) nov-2015Banking Technology (End Term Exam) nov-2015
Banking Technology (End Term Exam) nov-2015Anil Chaurasiya
 

Mehr von Anil Chaurasiya (20)

Automotive security with Blockchain Technology (Project Report)
Automotive security with Blockchain Technology (Project Report)Automotive security with Blockchain Technology (Project Report)
Automotive security with Blockchain Technology (Project Report)
 
Digital marketing
Digital marketingDigital marketing
Digital marketing
 
Blockchain
BlockchainBlockchain
Blockchain
 
National payment system architecture
National payment system architectureNational payment system architecture
National payment system architecture
 
Mobile banking & payment
Mobile banking & paymentMobile banking & payment
Mobile banking & payment
 
Management information system
Management information systemManagement information system
Management information system
 
Internet banking ARCHITECTURE AND IMPLEMENTATION
Internet banking  ARCHITECTURE AND IMPLEMENTATIONInternet banking  ARCHITECTURE AND IMPLEMENTATION
Internet banking ARCHITECTURE AND IMPLEMENTATION
 
Impact of technology on banking operations
Impact of technology on banking operationsImpact of technology on banking operations
Impact of technology on banking operations
 
Forex management
Forex managementForex management
Forex management
 
Evolution of banking technology
Evolution of banking technologyEvolution of banking technology
Evolution of banking technology
 
Electronic cards credit and debit
Electronic cards credit and debitElectronic cards credit and debit
Electronic cards credit and debit
 
Electronic Delivery channels integration
Electronic Delivery channels integrationElectronic Delivery channels integration
Electronic Delivery channels integration
 
DATA CENTER AND BUSINESS COMMUNITY
DATA CENTER AND BUSINESS COMMUNITYDATA CENTER AND BUSINESS COMMUNITY
DATA CENTER AND BUSINESS COMMUNITY
 
Credit appraisal SYSTEM
Credit appraisal SYSTEMCredit appraisal SYSTEM
Credit appraisal SYSTEM
 
Cbs concepts and opportunities
Cbs concepts and opportunitiesCbs concepts and opportunities
Cbs concepts and opportunities
 
CENTRALIZED challenges implementation and MANAGEMENT issues
CENTRALIZED challenges implementation and MANAGEMENT issuesCENTRALIZED challenges implementation and MANAGEMENT issues
CENTRALIZED challenges implementation and MANAGEMENT issues
 
Atm technology and operations
Atm technology and operationsAtm technology and operations
Atm technology and operations
 
Atm switch
Atm switchAtm switch
Atm switch
 
Asset liability management
Asset liability managementAsset liability management
Asset liability management
 
Banking Technology (End Term Exam) nov-2015
Banking Technology (End Term Exam) nov-2015Banking Technology (End Term Exam) nov-2015
Banking Technology (End Term Exam) nov-2015
 

Kürzlich hochgeladen

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 

Kürzlich hochgeladen (20)

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 

Smart Vehicle

  • 1. BlockChain: A Distributed Solution to Automative Security and Privacy Presented By : Anil Chaurasiya MCA 6th Semester
  • 2. Index ● Threats to Smart Vehicles ● Solution ● How BlockChain can secure the Smart Vehicles ● Lightweight Scalable Blockchain (LSB) ● Blocked based Architecture ● Application ● Security and Privacy Analysis
  • 3. Threats to Smart Vehicles ● The high degree of connectivity makes it particular challenging to secure smart vehicles .Malicious entities can compromise a vehicle, which not only endangers the security of the vehicle but also the safety of the passengers. ● Conventional security and privacy methods used in smart vehicles tend to be ineffective due to the following challenges – Centralization – Lack of pirvacy – Safety Threats
  • 4. Solution ● BlockChain(BC) is a distributed database that maintains a growing list of blocks that are chained to each other. ● BC has been shown to possess a number of salient features including security, immutability and privacy and could thus be a useful technology to address the aforementioned challenges. ● BC is managed distributedly by a peer to peer network. Each node is identified using a Public Key (PK).
  • 5. Solution ● We proposed an optimized BC instantiation for the Internet of Things (IoT) called Lightweight Scalable Blockchain (LSB). ● The main contribution of BC is to present a decentralized privacy-preserving and secure BC-based architecture for the smart vehicle ecosystem. ● We base our design on LSB due to its low overheads. ● Nodes in the overlay are clustered and only the Cluster Heads (CHs) are responsible for managing the BC and performing its core functions.
  • 6. Solution ● To protect user privacy,each vehicle is equipped with an in-vehicle storage to store privacy sensitive data, e.g. location traces. ● The vehicle owner defines which data is provided to third parties in trade for beneficial services and which data should be stored in the in-vehicle storage. Consequently, the owner has finer control over the exchanged data. ● All transactions in the network are encrypted using asymmetric encryption. Nodes are authenticated using their PKs.
  • 7. Lightweight Scalable Blockchain (LSB) ● Conventional BC instantiations suffers from high overhead and low scalability and throughput. ● Conventional BCs have limited throughput, e.g. Bitcoin throughput is restricted to seven transactions per second due to the complexity of the consensus algorithm. ● LSB is optimized for the IoT and large-scale low resource networks. ● LSB replaces the demand for solving a computational puzzle with a scheduled block generation process, thus eliminating the significant processing overhead of conventional Bcs. ● LSB uses a distributed trust algorithm to decrease the processing time associated with validating blocks.
  • 8. Lightweight Scalable Blockchain (LSB) Two types of transactions based on the number of signatures that must be validated: ● 1) Single signature: “T_ID || P_T_ID || PK || Sig” ● 2) Multisig: “T_ID || P_T_ID || PK.1 || Sig.1 || PK.2 || Sig.2”
  • 9. BlockChain-Based Architecture ● A public BC is managed by the overlay nodes which can be smart vehicles, OEMs, vehicle assembly lines, SW providers, cloud storage providers, and mobile devices of users such as smartphones, laptops, or tablets.
  • 10.
  • 11. Application ● Remote Software Updates – RSU demands a distributed security method while maintaining the vehicle owner’s privacy.
  • 12.
  • 13. BC advantages compared to conventional methods ● WRSU Conventional Methods – Centaralized - non scalable – Partial participation – Lack of privacy: – Only OEM can verify communications or history of update downloads. Advantages introduced by BC – Distributed data exchange and security provides scalability – End-to-end: involving SP, OEMs, vehicles, service centers, assembly lines, etc. – Ensure privacy of the user (also for diagnostics) – Update history as well as authenticity of the SW can be publicly verified ●
  • 14. BC advantages compared to conventional methods ● Insurance Conventional Methods – Current systems are often insecure, which endangers the vehicle’s integrity – Users lack control over the exchanged data – Privacy-sensitive data must be continuously sent to the insurance company for receiving services Advantages introduced by BC – Secure, distributed, and privacy-preserving data exchange – Users control the exchanged data – Privacy-sensitive data is shared on demand (e.g., accident happened) instead of a continuous data exchange. Authenticity of data stored in the vehicle can be publicly confirmed
  • 15. BC advantages compared to conventional methods ● Car-sharing services Conventional Methods – Central payment and accounting – Users can be tracked by their identity – Central authorization Advantages introduced by BC – Private and distributed security, payments and accounting – Users use changeable identities – Distributed authorization
  • 16. Security and Privacy Analysis Privacy: ● The privacy of the proposed method is inherited from the BC where each node uses a unique PK to communicate with other overlay nodes. This prevents malicious nodes from tracking an overlay node. ● Each vehicle is equipped with an in-vehicle storage to store privacy sensitive data. The vehicle owner can reveal data in the in-vehicle storage to the service providers in situations where this data is required (e.g. accidentclaim).
  • 17. Security and Privacy Analysis Security : ● Each transaction in BC contains the hash of the data which ensures integrity. ● All transactions are encrypted using asymmetric encryption methods which provide confidentiality. ● OBMs maintain a key list that provides access control for cluster members in a way that only transactions for which the embedded PKs match with the key list in the OBM can be forwarded to a cluster member.
  • 18. Security and Privacy Analysis ● Distributing a false update by claiming to be the OEM or SW update provider ● Changing a software binary in the cloud ● Distributed Denial of Service(DDoS) attack