Porsche running on Blockchain

Vidushi Agarwal
Aug 31, 2018 · 3 min read

Automatic driving is no more a wonder. But further innovations to the concept make mind go aww. Ever wondered what will be the end product when Machine Learning will shake hands with Blockchain ? XAIN, a research product of Oxford and Imperial College, bridges the difference between the two. It all started when XAIN won the Innovation Contest organized by World’s top automobile company Porsche. Hence, this marked the beginning of the journey for World’s first Blockchain hybrid Car.

What will be the luxuries you will be into, if ever got a chance to get a hands on the car?

  1. The data like traffic details, your speed, fuel etc will be recorded on a fully decentralized network hence making it completely transparent and trackable (in case of accidents or emergencies).The network will be peer to peer, ensuring anyone who joins the existing data structure(Blockchain) will be able to view the live stat.As described, one car will be in connect with other cars hence recording traffic situations by one will be ease to others.

Inside the vehicle, there will be computers running on XAIN processors which will map the live data(Google Maps,fuel rate), process(mine) the data and then store the data in the blocks.

2. The technology provides temporary access to person even if the owner is miles away. The owner can even allow delivery of the packages in trunks of the parked car.

This is dwelled on three primary smart contracts :

UserHistory, UserRegister and VehicleStatus

UserHistory- As mentioned above this contract records the owner’s driving history which is further available to all connected blocks(authorized drivers) to trace.

UserRegister — records the complete information of driver. And further helps for generating alerts in case of strange unauthorized access of the car.

VehicleStatus — records the state of the vehicle. Hence in the case of automatic delivery, the address gets mapped with permissions. Thus it provides special rights(cryptographic keys) to specific users. These permission die after some specific time and can also be withdrawn as per owner.

How keys are generated for grants of temporary access?

These are special highly secure and unique cryptographic keys.The access is granted in the form of permissions when the unique cryptographic keys match the requests.There are private as well as public key generated in response of requests. For the signature(response) to the permissions, private keys are used at the owner end. And at the other end, public keys are used to match the pattern for the requests.For cryptographic purposes, latest Secure Hash Algorithms SHA — 3 is used.

Can’t wait to see them running on roads !

Vidushi Agarwal

Written by

Alert! This space might change your perspective regarding Blockchain, ML or Politics.

Welcome to a place where words matter. On Medium, smart voices and original ideas take center stage - with no ads in sight. Watch
Follow all the topics you care about, and we’ll deliver the best stories for you to your homepage and inbox. Explore
Get unlimited access to the best stories on Medium — and support writers while you’re at it. Just $5/month. Upgrade