Securing Autonomous Vehicles Using AI-Blockchain Architecture

Authors

  • Dr. Deependra Rastogi IILM University Greater Noida, Uttar Pradesh 201306, India Author

DOI:

https://doi.org/10.63345/sjaibt.v1.i2.103

Keywords:

Autonomous Vehicles, Blockchain, AI, V2X Security, Intrusion Detection, Decentralized Identifiers, Federated Learning, OTA Integrity, Trust Management

Abstract

Autonomous vehicles (AVs) promise safer and more efficient mobility but are exposed to an evolving attack surface spanning on-board sensors, in-vehicle networks, over-the-air (OTA) software updates, and vehicle-to-everything (V2X) communications. Traditional perimeter defenses and centralized public-key infrastructures (PKIs) struggle to keep pace with adversarial machine learning (ML), Sybil attacks in vehicular networks, and supply-chain compromises. This manuscript proposes an end-to-end security architecture that fuses artificial intelligence (AI) with a permissioned blockchain to deliver verifiable identity, tamper-evident telemetry, decentralized policy enforcement, and adaptive intrusion detection. The architecture binds device and model identities to decentralized identifiers (DIDs), anchors data and update artifacts to an immutable ledger, and coordinates a privacy-preserving federated-learning loop to continuously refine anomaly detectors. We describe the threat model and system components (edge validators, roadside units, OEM validators, on-vehicle guardians), define a trust and attestation workflow, and integrate AI modules for CAN-bus anomaly detection and V2X trust scoring. A simulation study using realistic traffic patterns evaluates detection efficacy, latency, and ledger throughput under benign and adversarial conditions (false-data injection, spoofing, replay, and Sybil attacks). Statistical analysis across 30 independent runs shows significant improvements in true positive rate (TPR), false positive rate (FPR), and end-to-end decision latency compared with a PKI-only baseline, while maintaining transaction throughput suitable for V2X policy events. We conclude that AI-Blockchain co-design can harden AV ecosystems by coupling adaptive detection with cryptographic accountability, and we discuss deployment considerations, limitations, and paths to certification-grade assurance.

Downloads

Download data is not yet available.

References

• International Organization for Standardization. (2018). ISO 26262:2018 Road vehicles—Functional safety (2nd ed.). Geneva, Switzerland: ISO.

• International Organization for Standardization. (2021). ISO 21434:2021 Road vehicles—Cybersecurity engineering. Geneva, Switzerland: ISO.

• IEEE Standards Association. (2016). IEEE Std 1609.2-2016—Standard for Wireless Access in Vehicular Environments (WAVE)—Security Services for Applications and Management Messages. Piscataway, NJ: IEEE.

• ETSI. (2017). ETSI TS 103 097 V1.3.1: Intelligent Transport Systems (ITS); Security; Security header and certificate formats. Sophia Antipolis, France: European Telecommunications Standards Institute.

• Whyte, W., Weimerskirch, A., Kumar, V., & Hehn, T. (2013). A security credential management system for V2V communications. Proceedings of the IEEE Vehicular Networking Conference (VNC), 1–8.

• Petit, J., & Shladover, S. E. (2015). Potential cyberattacks on automated vehicles. IEEE Transactions on Intelligent Transportation Systems, 16(2), 546–556.

• Koscher, K., Czeskis, A., Roesner, F., Patel, S., Kohno, T., Checkoway, S., … Savage, S. (2010). Experimental security analysis of a modern automobile. 2010 IEEE Symposium on Security and Privacy, 447–462.

• Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S., … Kohno, T. (2011). Comprehensive experimental analyses of automotive attack surfaces. USENIX Security Symposium, 77–92.

• Miller, C., & Valasek, C. (2015). Remote exploitation of an unaltered passenger vehicle. Black Hat USA. Las Vegas, NV.

• Kairouz, P., McMahan, H. B., Avent, B., Bellet, A., Bennis, M., Bhagoji, A. N., … Zhao, S. (2021). Advances and open problems in federated learning. Foundations and Trends® in Machine Learning, 14(1–2), 1–210.

• Bonawitz, K., Ivanov, V., Kreuter, B., Marcedone, A., McMahan, H. B., Patel, S., … Seth, K. (2017). Practical secure aggregation for privacy-preserving machine learning. Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS), 1175–1191.

• Blanchard, P., El Mhamdi, E. M., Guerraoui, R., & Stainer, J. (2017). Machine learning with adversaries: Byzantine tolerant gradient descent. Advances in Neural Information Processing Systems (NeurIPS), 119–129.

• Yin, D., Chen, Y., Ramchandran, K., & Bartlett, P. (2018). Byzantine-robust distributed learning: Towards optimal statistical rates. Proceedings of the 35th International Conference on Machine Learning (ICML), 5650–5659.

• Bagdasaryan, E., Veit, A., Hua, Y., Estrin, D., & Shmatikov, V. (2020). How to backdoor federated learning. Proceedings of the 23rd International Conference on Artificial Intelligence and Statistics (AISTATS), 2938–2948.

• Taylor, A., Leblanc, S., & Japkowicz, N. (2016). Anomaly detection in automobile control network data with long short-term memory. 2016 IEEE 16th International Conference on Data Mining Workshops (ICDMW), 194–201.

• Kang, M. J., & Kang, J. W. (2016). Intrusion detection system using deep neural network for in-vehicle network security. PLOS ONE, 11(6), e0155781.

• Yin, M., Malkhi, D., Reiter, M. K., Gueta, G., & Abraham, I. (2019). HotStuff: BFT consensus with linearity and responsiveness. Proceedings of the 2019 ACM Symposium on Principles of Distributed Computing (PODC), 347–356.

• Dorri, A., Kanhere, S. S., Jurdak, R., & Gauravaram, P. (2017). Blockchain for IoT security and privacy: The case study of a smart home. 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), 618–623.

• Krajzewicz, D., Erdmann, J., Behrisch, M., & Bieker, L. (2012). Recent development and applications of SUMO—Simulation of Urban MObility. International Journal On Advances in Systems and Measurements, 5(3–4), 128–138.

• Sommer, C., German, R., & Dressler, F. (2011). Bidirectionally coupled network and road traffic simulation for improved IVC analysis. IEEE Transactions on Mobile Computing, 10(1), 3–15.

Published

05-04-2024

Issue

Section

Original Research Articles

How to Cite

Securing Autonomous Vehicles Using AI-Blockchain Architecture. (2024). Scientific Journal of Artificial Intelligence and Blockchain Technologies, 1(2), Apr (18-28). https://doi.org/10.63345/sjaibt.v1.i2.103

Similar Articles

31-40 of 101

You may also start an advanced similarity search for this article.