2019 IEEE Wireless Communications and Networking Conference (WCNC) 2019
DOI: 10.1109/wcnc.2019.8885769
|View full text |Cite
|
Sign up to set email alerts
|

Blockchain-based Firmware Update Scheme Tailored for Autonomous Vehicles

Abstract: Recently, Autonomous Vehicles (AVs) have gained extensive attention from both academia and industry. AVs are a complex system composed of many subsystems, making them a typical target for attackers. Therefore, the firmware of the different subsystems needs to be updated to the latest version by the manufacturer to fix bugs and introduce new features, e.g., using security patches. In this paper, we propose a distributed firmware update scheme for the AVs' subsystems, leveraging blockchain and smart contract tec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
35
0
2

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3
1

Relationship

3
5

Authors

Journals

citations
Cited by 74 publications
(37 citation statements)
references
References 17 publications
0
35
0
2
Order By: Relevance
“…And then generate a signature on that distance and send it to the smart contract. The function ProofOfDistance (see lines [8][9][10][11][12][13][14][15][16] in Algorithm. 3 ) will validate the rider signature.…”
Section: Fair Payment Without Trust Between the Rider/drivermentioning
confidence: 99%
See 1 more Smart Citation
“…And then generate a signature on that distance and send it to the smart contract. The function ProofOfDistance (see lines [8][9][10][11][12][13][14][15][16] in Algorithm. 3 ) will validate the rider signature.…”
Section: Fair Payment Without Trust Between the Rider/drivermentioning
confidence: 99%
“…Note: Note that in the PAIRING, k denotes the number of points or, equivalently, the length of the input divided by 192. The variables for computing the gas cost of EXPMOD are specified in details in EIP 1981 8 . The other three operations act on the elliptic curve alt bn128.…”
Section: Etherum Baselines and Performance Metricsmentioning
confidence: 99%
“…C [1] C [2] C [3] C [4] C [5] C [6] C [7] C [8] C [9] C [10] C [11] C [12] C [13] C [14] C [15] C [16] C [17] C [18] Figure 2: Nashville city, TN, USA is divided into geographical areas (cells).…”
Section: B Private Information Retrieval (Pir)mentioning
confidence: 99%
“…In contrast to existing centralized solutions, a promising blockchain technology with advantages of decentralization, security, and trust has been utilized for different applications. A blockchain is a distributed, transparent and immutable public ledger organized as a chain of blocks and managed by a set of validators/miners [9], [10].…”
Section: Introductionmentioning
confidence: 99%
“…The downlink communication should ensure secure multicast for different applications. For example, sending firmware and configuration updates to a group of SMs in specific areas requires secure multicast [9], [10]. Also, in direct load control (DLC) demand/response programs, grid operators need to send DLC messages to a group of users, that subscribe to the same DLC demand/response plan, in order to turn off/on some specific load during peak/regular hours [11], [12].…”
Section: Introductionmentioning
confidence: 99%