RP 5
RP 5
ABSTRACT Incorporation of connected vehicle (CV) data into real-time traffic management systems
presents a host of new challenges resulting from the current lack of data integrity and data privacy in traffic
networks. Over the past few years, blockchain technologies have been inspiring extensive innovations in
the transportation field. However, due to the transparency property, sensitive data stored on the blockchain
would be accessible to anyone, resulting in a lack of privacy. In this paper, we propose a decentralized
and location-aware architecture to address the data integrity along with the privacy-preserving issues in
blockchain-based traffic management systems. Our proposed architecture integrates with permissioned and
modular blockchain network and non-interactive zero-knowledge range proof (ZKRP) protocol. We develop
the prototype system on the Hyperledger Fabric platform and Hyperledger Ursa cryptographic library. The
performance results show that our approach is effective and feasible for real-time traffic management while
preserving the data privacy requirements.
INDEX TERMS Blockchain, connected vehicle, data integrity, data privacy, traffic management, vehicular
network, zero-knowledge range proof.
sense that no one later will be able to argue that this value was proposed by Boudot in 2000 [14] and followed by the
corresponds to a different secret. In other words, given the work accomplished by Schoenmakers in his presentations
impossibility to change the hidden secret, we say that the [15] and [16]. The main difference is that ZKRP works with
prover commits to that secret. A commitment scheme has the numeric intervals instead of generic sets used in ZKSM,
following two properties: which makes ZKRP a special case of ZKSM. ZKRP allows
1) Binding. Given a commitment y, it is hard to compute the blockchain network to validate that a secret number is
a different pair of secret δ and random number γ whose within a known range without disclosing the secret number.
commitment is also y. This property guarantees that For example, in the context of payment systems, it is possible
there is no ambiguity in the commitment scheme. Thus, to validate that a payment-amount is positive without disclos-
after y is published, it is hard to open it to a different ing the amount, which is done by Monero [17]. Moreover,
value. ING Bank described how to implement ZKRP protocol in
2) Hiding. It is hard to compute any information about the Ethereum [18]. Therefore, ZKRP can be applied to many
secret δ given the commitment y. kinds of decentralized applications that have numeric inter-
Formally, a commitment scheme is defined by algorithms vals along with other requirements, such as e-voting systems
Commit and Open as follows: [19], [20] and e-auction systems [21], [22].
1) Given secret δ and random value γ , Commit(δ, γ )
III. ARCHITECTURE OF THE GATEWAY
computes a commitment y as the output that hides the
In this section, we describe the proposed gateway architec-
actual information δ such that it is hard to compute
ture in two subsections. In Subsection A, we describe the
secret δ 0 and random value γ 0 that satisfies Commit(δ 0 ,
detailed steps for gateway design with the proposed ZKRP
γ 0 ) = Commit(δ, γ ). In particular, it is hard to invert
protocol. In Subsection B, we explain the workflow of gate-
function Commit to find δ or γ .
way. By referring to Fig. 2, we first describe the following
2) Given the commitment y, secret δ and random value
components which take part in the proposed architecture:
γ , Open(y, δ, γ ) returns true if and only if y =
• I-SIG: Intelligent Traffic Signal System. It takes arrival
Commit(δ, γ ).
vehicle information as input and generates optimal
Commitment schemes are used in zero-knowledge proofs.
signal plans at intersections. I-SIG system has been
Specifically, we propose to extend the Pedersen commit-
deployed in New York City, City of Tampa, and State
ment [8]. Given group Zp of prime order p, elements g and h,
of Wyoming since 2016 [23].
and random value γ , the commitment for secret δ is computed
• Gateway: The gateways act as verifiers for validating
as follows:
traversing vehicles and consist of RSUs at state bound-
y = Commit(δ, γ ) = gδ hγ . (1) aries.
• Traversing Vehicle: The traversing vehicle is the com-
Our architecture brings a novel design approach to facil- the proof is valid. Scheme Version 1 describes an interactive
itate inter-network operations while preserving data privacy. ZKP in the context of gateway.
We use the scenario depicted in Fig. 2 to illustrate an instance
when a vehicle traverses cross the boundary of two states Scheme Version 1 Interactive ZKP
over a physical vehicular network and switches between two 1) The traversing CV wants to prove to the gateway that
blockchain networks. The ZKRP protocol will preserves the it comes from the location δ: compute the commitment
privacy and integrity of CVs traversing across states or locali- based on the discrete logarithm [24] of y = gδ to the
ties. Within the communication range of a gateway, a travers- base g.
ing connected vehicle acts as a prover to prove its vehicular 2) The traversing CV picks a random v ∈ Zp , computes
information to the gateway, a verifier, with a ZKRP-based t = gv and sends t to the gateway.
encrypted message. Therefore, it can pass the boundary and 3) The gateway picks a random c ∈ Zp , and send it back
switch to a different blockchain network without revealing as a challenge message to the traversing CV.
any sensitive information. 4) The traversing CV computes r = v − cδ and returns r
For intra-network, we design and develop blockchain- to the gateway.
based vehicular networks on Hyperledger Fabric platform. 5) The gateway checks whether gr yc ≡ t. This holds
Each blockchain network maintains a regional (e.g., because gr yc = gv−cδ gδc = gv = t.
statewide) distributed ledger for recording and sharing vehic-
ular data as input for traffic management systems. After regis-
tration, connected vehicles can broadcast their vehicular data
2) NON-INTERACTIVE ZERO-KNOWLEDGE PROOF
to blockchain network by submitting transaction requests.
Interactive ZKP is not suitable for the gateway since it would
Transactions will be validated by Hyperledger Fabric peers
increase the communication overhead for verification and
and recorded permanently on the ledger.
cannot meet the gateway’s real-time operation requirements.
Fiat-Shamir heuristic [25] is a generic technique that con-
A. GATEWAY DESIGN WITH ZKRP SCHEME
verts interactive ZKP schemes into non-interactive proto-
As shown in Fig. 3, we introduce gateways that are deployed
cols. It allows replacing the interactive step 3) in Scheme Ver-
on the boundaries between blockchain-based vehicular net-
sion 1 with a non-interactive random oracle function. In prac-
works for seamlessly switching from one blockchain network
tice, we can use a cryptographic hash function [26] instead.
into another. To preserve the privacy of the traveling vehicle,
The non-interactive ZKP is shown in Scheme Version 2 [27].
we describe how to construct the ZKRP protocol step by
step for the gateway module. The traversing vehicle acts as
Scheme Version 2 Non-Interactive ZKP
a prover to prove its vehicular information (e.g., location) to 1) The traversing CV wants to prove that it comes from
a gateway, acting as a verifier, in a ZKRP-based encrypted the location δ: compute the commitment based on the
message. As a result, the vehicle passes the boundary and discrete logarithm of y = gδ to the base g.
switch the blockchain network without revealing any sensi- 2) The traversing CV picks a random v ∈ Zp , computes
tive information to the other parties. t = gv .
3) The traversing CV computes c = H (g, y, t), where H
is a cryptographic hash function [26].
4) The traversing CV computes r = v − cδ. The resulting
proof is the pair (t, r). As r is an exponent of g, it is
calculated modulo q − 1.
5) The gateway checks whether gr yc ≡ t.
Scheme Version 3 Non-Interactive ZKRP for Interval [0, ul ) B. WORKFLOW OF THE GATEWAY
1) The traversing CV wants to prove that it comes from The workflow of the proposed gateway that resides between
the location δ: compute the commitment based on the two adjacent blockchain-based traffic management systems
discrete logarithm of y = gδ to the base g and δ ∈ is depicted in Fig. 5. In the beginning, a CV riding over the
[0, ul ). area covered by blockchain network #1 provides vehicular
2) The traversing CV picks a random vj ∈ Zp for every data to the corresponding traffic management systems (e.g.,
j ∈ Zl , and computes tj = gvj . I-SIG). When the CV (a prover) wants to cross the boundary
3) The traversing CV computes c = H (g, y, t), where H into another vehicular network, it first encrypts its vehicular
is a cryptographic hash function [26]. information using the proposed ZKRP protocol and then
4) The traversing CV computes rj = vj − cδ for every broadcasts a proof request to a crossing gateway (a verifier).
j ∈ Zl . The resulting proof is the pair (tj , rj ). As rj is an Then, the gateway validates the ZKRP encrypted information.
exponent of g, it is calculated modulo q − 1. If the ZKRP encrypted information can be verified, the gate-
5) The gateway checks whether grj yc ≡ tj for every j ∈ Zl . way confirms the request with the traversing CV and switches
the vehicle into blockchain network #2. After switching the
network, the CV starts sharing vehicular data directly with
blockchain network #2.
FIGURE 11. Running time of Ursa ZKRP vs. the number of secrets. 1) VEHICULAR DATA ATTACK
Conventional traffic management systems can be attacked
of secrets from 2 to 25 , 210 ,
and 215 231 ,
and the results by tampering their centralized database [1]. Our proposed
showed that both proof generating time and verifying time are system can reject tampering existing vehicular data due to the
constant regardless of the secret range, and the time remains immutable feature of blockchain which ensures data integrity
around 98 ms and 97 ms, respectively. The default length of by recording data on a distributed ledger. Once the infor-
the secret instance is 5 digit (ZIP Code). We then changed mation of an arriving vehicle is recorded on the distributed
the length of secrets from 1 to 3, 5, 7 and 9 digits, and the ledger, it does not allow any participant to tamper it. If there is
results showed that both proof generating time and verifying any attempt to tamper the ledger, our system will immediately
time are also constant regardless of the secret length, and the reject this action.
time remains around 98 ms and 97 ms, respectively, for each
secret. 2) GATEWAY SPOOFING ATTACK
Our ZKRP scheme can offer constant proof generating A gateway spoofing attack happens when an attacker belong-
and verifying time because the commitment of a secret ing to one blockchain network N () spoofs the gateway that it
is computed by a hash function [26] in Scheme Ver- belongs to another blockchain network N (δ). In this scenario,
sion 4 (Section III-A). In the experiments, we invoke validating vehicular information and switching networks
new_proof_builder and new_proof_verifier become challenging tasks if the attacker successfully injects
functions from the Ursa library, which utilize a HashMap false login status among multiple blockchain networks. For
to compute and verify the commitment. As a result, proof instance, if the attacker intends to spoof that it is coming from
generating and verifying time are independent from the the Montana State network, but it is actually coming from the
size of secret values. This allows our ZKRP scheme to Colorado State network (e.g., ZIP Code 80612). The Gateway
have more flexibility for verifying different numerical secret Validation module is resistant to gateway spoofing attacks by
values (e.g., ID number, credit card number, etc,.) with- incorporating the ZKRP protocol, which is shown in Fig. 12.
out sacrificing security and efficiency. We then increase
the number of secrets from 1 to 2, 3, 4 and 5 for each 3) EAVESDROPPING ATTACK
client, and measure the running time of the proof generat- Our proposed gateway mechanism can protect the system
ing and verifying phases. Because each secret is processed from eavesdropping attacks. In such attacks, the malicious
sequentially, both proof generating and verifying running attacker intercepts the message between the data sender and
time showed a linear growth with the increasing number data receiver in order to recover the secret information or gain
of secrets in Fig. 11. Given our scenario where the secrets access to the sensitive information. In the worst case, if the
are independent, in theory, multiple secrets can be proved in message has been accessed by the attacker, it cannot reveal the
parallel to achieve constant time. However, the linear growth actual information since the vehicular information is ZKRP-
in running time cannot be avoided in this work because the encrypted. As a result, no sensitive information is disclosed
current Hyperledger Ursa does not have parallel computing if the eavesdropping attack happens.
capability.
V. RELATED WORK
E. DISCUSSION ON POTENTIAL ATTACKS A. BLOCKCHAIN RESEARCH IN TRANSPORTATION
In this subsection, we discuss the robustness of the proposed In recent years, investigating the blockchain paradigm in
blockchain and ZKP inspired architecture for traffic manage- the general transportation field has attracted a great deal of
ment against potential attacks. attention [36]–[39]. Two main applications of the blockchain
technology to the transportation industry are freight tracking on the Google Maps APIs, and the Gateway Validation mod-
and supply chain management. For instance, IBM has been ule on the Hyperledger Ursa cryptographic library. For the
working with Walmart to develop an efficient blockchain- blockchain network, we measure the benchmarks including
based tracking system for the food supply chain [40], which transaction latency, throughput and success rate using the
involves the transportation of merchants. In such a sce- Hyperledger Caliper benchmark tool. For the ZKRP scheme,
nario, the blockchain technology helps to reduce tracking we measure the proof generating and verifying time under
time for goods from weeks to seconds. Blockchain technol- different settings. The results demonstrate that our proposed
ogy is also a candidate solution in forensic investigation. system is effective and feasible for decentralized traffic
Hossain et al. [41] proposed FIF-IoT, which is a forensic management.
investigation framework using a public blockchain to find
facts in criminal incidents in IoT-based systems. Besides, Guo REFERENCES
et al. [42] proposed a blockchain-inspired ‘‘proof of event’’ [1] Q. A. Chen, Y. Yin, Y. Feng, Z. M. Mao, and H. X. Liu, ‘‘Exposing con-
mechanism for accident event recording in CV networks. gestion attack on emerging connected vehicle based traffic signal control,’’
in Proc. Netw. Distrib. Syst. Secur. Symp., 2018, pp. 1–15.
A decentralized trust management system for vehicular net-
[2] J. Blum and A. Eskandarian, ‘‘The threat of intelligent collisions,’’ IT Prof.,
works was proposed in [43]. In this paper, vehicles are able to vol. 6, no. 1, pp. 24–29, Jan. 2004.
query the trust values of neighbors and then assess the credi- [3] Wikipedia Contributors. (2020). General Data Protection Regula-
bilities of received messages using blockchain technologies. tion. [Online]. Available: https://en.wikipedia.org/wiki/General_Data_
Protection_Regulation
[4] Wikipedia Contributors. (2020). California Consumer Privacy Act.
B. SPOOFING ATTACKS IN VEHICULAR NETWORKS [Online]. Available: https://en.wikipedia.org/wiki/California_Consumer_
Vehicular networks are vulnerable to cyberattacks. Privacy_Act
[5] Hyperledger Fabric. Accessed: Dec. 1, 2019. [Online]. Available:
Amoozadeh et al. [44] presented the spoofing effects of secu- https://www.hyperledger.org/projects/fabric
rity attacks on the communication channel as well as sensor [6] E. Androulaki, S. Cocco, and C. Ferris, Private and Confidential
tampering. Dominic et al. [45] proposed a risk assessment Transactions With Hyperledger Fabric. IBM Developer, Armonk, NY,
USA, 2018. [Online]. Available: https://developer.ibm.com/tutorials/cl-
framework for CV applications consisting of an automated
blockchain-private-confidential-transactions-hyperledger-fabric-zero-
driving reference architecture and threat model. In a recent knowledge-proof
study, Chen et al. [1] showed that the I-SIG system is vul- [7] Hyperledger Ursa. Accessed: Dec. 3, 2019. [Online]. Available:
nerable at the signal control algorithm level. Due to limited https://www.hyperledger.org/projects/ursa
[8] T. P. Pedersen, ‘‘Non-interactive and information-theoretic secure verifi-
computation power, the signal controller cannot handle data able secret sharing,’’ in Proc. Annu. Int. Cryptol. Conf. Berlin, Germany:
validation in real-time processing requirement, 5-7 seconds. Springer, 1991, pp. 129–140.
They conducted their V2I attacking strategy by spoofing [9] S. Goldwasser, S. Micali, and C. Rackoff, ‘‘The knowledge complexity of
interactive proof systems,’’ SIAM J. Comput., vol. 18, no. 1, pp. 186–208,
arrival vehicular information, which caused congestion at Feb. 1989.
intersections. [10] Wikipedia Contributors. (2020). Zero-Knowledge Proof. [Online]. Avail-
able: https://en.wikipedia.org/wiki/Zero-knowledge_proof
C. ZERO-KNOWLEDGE PROOF FOR BLOCKCHAIN [11] J. Camenisch and R. Chaabouni, ‘‘Efficient protocols for set membership
and range proofs,’’ in Proc. Int. Conf. Theory Appl. Cryptol. Inf. Secur.
Zero-knowledge proof enables one party to prove the knowl- Berlin, Germany: Springer, 2008, pp. 234–252.
edge to another party without conveying any information [12] I. B. Damgård, ‘‘Practical and provably secure release of a secret and
about the knowledge. Zcash implements the zero-knowledge exchange of signatures,’’ J. Cryptol., vol. 8, no. 4, pp. 201–222, Sep. 1995.
[13] E. Fujisaki and T. Okamoto, ‘‘Statistical zero knowledge protocols to prove
succinct non-interactive arguments of knowledge (ZK- modular polynomial relations,’’ in Proc. Annu. Int. Cryptol. Conf. Berlin,
SNARK) to protect the transaction privacy in cryptocurrency Germany: Springer, 1997, pp. 16–30.
network [46]. Koens et al. [18] proposed an efficient zero- [14] F. Boudot, ‘‘Efficient proofs that a committed number lies in an interval,’’
in Proc. Int. Conf. Theory Appl. Cryptograph. Techn. Berlin, Germany:
knowledge range proof in Ethereum without the interactive Springer, 2000, pp. 431–444.
communications between participants. In addition, Bullet- [15] B. Schoenmakers, ‘‘Some efficient zeroknowledge proof techniques,’’ in
proofs are proposed for efficient range proofs on commit- Proc. Workshop Cryptograph. Protocols, 2001.
[16] B. Schoenmakers, ‘‘Interval proofs revisited,’’ in Proc. Int. Workshop
ted values, which are short non-interactive zero-knowledge
Frontiers Electron. Elections, 2005.
proofs without a trusted setup process [47]. [17] K. Li, R. Yang, M. H. Au, and Q. Xu, ‘‘Practical range proof for cryptocur-
rency Monero with provable security,’’ in Proc. Int. Conf. Inf. Commun.
VI. CONCLUSION Secur. Springer, 2017, pp. 255–262.
[18] T. Koens, C. Ramaekers, and C. Van Wijk, Efficient Zero-Knowledge
In this paper, we propose a decentralized and location-aware Range Proofs in Ethereum, ING, blockchain@ ing.com, Amsterdam, The
traffic management system to protect data integrity and pri- Netherlands, 2018.
vacy in a scenario of multiple blockchain-based connected [19] P. McCorry, S. F. Shahandashti, and F. Hao, ‘‘A smart contract for board-
room voting with maximum voter privacy,’’ in Proc. Int. Conf. Financial
vehicular networks. Our system innovatively incorporates Cryptogr. Data Secur. Cham, Switzerland: Springer, 2017, pp. 357–375.
zero-knowledge range proof into a gateway mechanism [20] I. Damgård, M. Jurik, and J. B. Nielsen, ‘‘A generalization of Paillier’s
to verify connected vehicles traversing between adjacent public-key system with applications to electronic voting,’’ Int. J. Inf. Secur.,
blockchain networks without revealing any sensitive infor- vol. 9, no. 6, pp. 371–385, 2010.
[21] I. Miers, C. Garman, M. Green, and A. D. Rubin, ‘‘Zerocoin: Anonymous
mation. We develop the Blockchain Network module on the distributed E-Cash from bitcoin,’’ in Proc. IEEE Symp. Secur. Privacy,
Hyperledger Fabric platform, the Reverse Geocoding module May 2013, pp. 397–411.
[22] M. O. Rabin, Y. Mansour, S. Muthukrishnan, and M. Yung, ‘‘Strictly- [46] E. B. Sasson, A. Chiesa, C. Garman, M. Green, I. Miers, E. Tromer, and
black-box zero-knowledge and efficient validation of financial transac- M. Virza, ‘‘Zerocash: Decentralized anonymous payments from bitcoin,’’
tions,’’ in Proc. Int. Colloq. Automata, Lang., Program. Berlin, Germany: in Proc. IEEE Symp. Secur. Privacy, May 2014, pp. 459–474.
Springer, 2012, pp. 738–749. [47] B. Bunz, J. Bootle, D. Boneh, A. Poelstra, P. Wuille, and G. Maxwell,
[23] CV Pilot Deployment Program. Accessed: Nov. 7, 2019. [Online]. Avail- ‘‘Bulletproofs: Short proofs for confidential transactions and more,’’ in
able: https://www.its.dot.gov/pilots Proc. IEEE Symp. Secur. Privacy (SP), May 2018, pp. 315–334.
[24] J. Camenisch and M. Stadler, ‘‘Proof systems for general statements
about discrete logarithms,’’ Dept. Comput. Sci., ETH Zurich, Zurich,
Switzerland, Tech. Rep. 260, 1997.
[25] A. Fiat and A. Shamir, ‘‘How to prove yourself: Practical solutions to
identification and signature problems,’’ in Proc. Conf. Theory Appl. Cryp- WANXIN LI (Graduate Student Member, IEEE)
tograph. Techn. Berlin, Germany: Springer, 1986, pp. 186–194. received the B.Sc. degree in computer science
[26] M. Bellare and P. Rogaway, ‘‘Random oracles are practical: A paradigm for from Chongqing University, Chongqing, China,
designing efficient protocols,’’ in Proc. 1st ACM Conf. Comput. Commun. in 2015, and the M.Sc. degree in computer sci-
Secur., 1993, pp. 62–73.
ence from the University of Delaware, USA,
[27] Wikipedia Contributors. (2020). Fiat–Shamir Heuristic. [Online]. Avail-
in 2017, where he is currently pursuing the Ph.D.
able: https://en.wikipedia.org/wiki/Fiat-Shamir_heuristic
[28] E. Morais, C. van Wijk, and T. Koens, ‘‘Zero knowledge set membership,’’
degree. His research interests include the area
ING Bank, Amsterdam, The Netherlands, Tech. Rep., 2018. of blockchain, intelligent transportation systems
[29] R. Chaabouni. (2007). Efficient Protocols for Set Membership and Range (ITS), connected and autonomous vehicles, and
Proofs. supervisors: Dr. Jan Camenisch (IBM ZRL), Prof. Abhi She- the Internet of Things (IoT).
lat (IBM ZRL, Univ. Virginia), Prof. Serge Vaudenay (EPFL LASEC)
Asiacrypt 2008 publication:. [Online]. Available: http://infoscience.
epfl.ch/record/128718 and http://infoscience.epfl.ch/record/113794
[30] JSFiddle Editor. Accessed: Feb. 6, 2020. [Online]. Available:
https://jsfiddle.net HAO GUO (Member, IEEE) received the B.S.
[31] Google Maps Geocoding API. Accessed: Feb. 6, 2020. [Online]. Available: degree from Northwest University, Xi’an, China,
https://developers.google.com/maps/documentation/geocoding/start in 2012, the M.S. degree from the Illinois Institute
[32] H. Caliper. (2019). Hyperledger Caliper Architecture. Accessed: of Technology, Chicago, USA, in 2014, and the
Oct. Oct. 3, 2019. [Online]. Available: https://hyperledger.github.io/ Ph.D. degree from the University of Delaware,
caliper/docs/2_Architecture.html Newark, USA, in 2020, all in computer science.
[33] Hyperledger Composer. Accessed: Dec. 1, 2019. [Online]. Available: His research interests include blockchain and dis-
https://www.hyperledger.org/projects/composer tributed ledger technology, data privacy and secu-
[34] S. Kumar, M. A. Qadeer, and A. Gupta, ‘‘Location based services using rity, cybersecurity, cryptography technology, and
Android (LBSOID),’’ in Proc. IEEE Int. Conf. Internet Multimedia Ser- the Internet of Things (IoT). He is a member
vices Archit. Appl. (IMSAA), Dec. 2009, pp. 1–5. of ACM.
[35] M. Koning, P. Korenhof, G. Alpár, and J.-H. Hoepman, ‘‘The ABC of ABC:
An analysis of attribute-based credentials in the light of data protection, pri-
vacy and identity,’’ Radboud Univ. Nijmegen, Nijmegen, The Netherlands,
Tech. Rep., 2014.
[36] Y. Yuan and F.-Y. Wang, ‘‘Towards blockchain-based intelligent trans- MARK NEJAD (Member, IEEE) is currently
portation systems,’’ in Proc. IEEE 19th Int. Conf. Intell. Transp. Syst.
an Assistant Professor with the Department of
(ITSC), Nov. 2016, pp. 2663–2668.
Civil and Environmental Engineering, Univer-
[37] W. Li, M. Nejad, and R. Zhang, ‘‘A blockchain-based architecture for
sity of Delaware. He has published more than
traffic signal control systems,’’ in Proc. IEEE Int. Congr. Internet Things
(ICIOT), Jul. 2019, pp. 33–40. 30 peer-reviewed articles in venues, such as
[38] M. Baza, N. Lasla, M. M. Mahmoud, G. Srivastava, and M. Abdallah, Transportation Science, the IEEE TRANSACTIONS
‘‘B-ride: Ride sharing with privacy-preservation, trust and fair payment ON PARALLEL AND DISTRIBUTED SYSTEMS, and the
atop public blockchain,’’ IEEE Trans. Netw. Sci. Eng., early access, IEEE TRANSACTIONS ON COMPUTERS. His research
Dec. 23, 2019, doi: 10.1109/TNSE.2019.2959230. interests include connected and automated vehi-
[39] M. Baza, M. Nabil, N. Lasla, K. Fidan, M. Mahmoud, and M. Abdallah, cles, network optimization, parallel and distributed
‘‘Blockchain-based firmware update scheme tailored for autonomous vehi- computing, blockchain, and game theory. He is a member of INFORMS.
cles,’’ in Proc. IEEE Wireless Commun. Netw. Conf. (WCNC), Apr. 2019, He received several publication awards, including the 2016 Best Doc-
pp. 1–7. toral Dissertation Award of the Institute of Industrial and Systems Engi-
[40] IBM Food Trust. Accessed: Nov. 18, 2019. [Online]. Available: neers (IISE) and the 2019 CAVS Best Paper Award from the IEEE VTS.
https://www.ibm.com/blockchain/solutions/food-trust
[41] M. Hossain, Y. Karim, and R. Hasan, ‘‘FIF-IoT: A forensic investigation
framework for IoT using a public digital ledger,’’ in Proc. IEEE Int. Congr.
Internet Things (ICIOT), Jul. 2018, pp. 33–40.
[42] H. Guo, E. Meamari, and C.-C. Shen, ‘‘Blockchain-inspired event record- CHIEN-CHUNG SHEN (Member, IEEE) received
ing system for autonomous vehicles,’’ 2018, arXiv:1809.04732. [Online]. the B.S. and M.S. degrees in computer science
Available: http://arxiv.org/abs/1809.04732 from National Chiao Tung University, Taiwan,
[43] Z. Yang, K. Yang, L. Lei, K. Zheng, and V. C. M. Leung, and the Ph.D. degree in computer science from
‘‘Blockchain-based decentralized trust management in vehicular
UCLA. He was a Research Scientist with Bellcore
networks,’’ IEEE Internet Things J., vol. 6, no. 2, pp. 1495–1505,
Applied Research, working on control and man-
Apr. 2019.
agement of broadband networks. He is currently
[44] M. Amoozadeh, A. Raghuramu, C.-N. Chuah, D. Ghosal, H. M. Zhang,
J. Rowe, and K. Levitt, ‘‘Security vulnerabilities of connected vehicle a Professor with the Department of Computer and
streams and their impact on cooperative driving,’’ IEEE Commun. Mag., Information Sciences, University of Delaware. His
vol. 53, no. 6, pp. 126–132, Jun. 2015. research interests include blockchain, Wi-Fi, SDN
[45] D. Dominic, S. Chhawri, R. M. Eustice, D. Ma, and A. Weimerskirch, and NFV, ad hoc and sensor networks, dynamic spectrum management,
‘‘Risk assessment for cooperative automated driving,’’ in Proc. 2nd cybersecurity, distributed computing, and simulation. He was a recipient of
ACM Workshop Cyber-Physical Syst. Secur. Privacy (CPS-SPC), 2016, the NSF CAREER Award and a member of ACM.
pp. 47–58.