2019 IEEE 2nd 5G World Forum (5GWF) 2019
DOI: 10.1109/5gwf.2019.8911664
|View full text |Cite
|
Sign up to set email alerts
|

Blockchain-Based Internet of Vehicles (IoV): An Efficient Secure Ad Hoc Vehicular Networking Architecture

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
14
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 50 publications
(14 citation statements)
references
References 13 publications
0
14
0
Order By: Relevance
“…As regards works related to the Blockchain-based data management axis [105], [159], [323]- [354], [360], all contributions reside in both the IoV processing layer and IoV security layer to offer novel traffic services and/or secure the transferred data, thus avoiding the security attack of vehicular systems. Fundamental works propose the use of smart frameworks for generating, storing, and sharing data over existing network elements, including vehicles, users, infrastructure nodes, and sensors, over a consortium or private Blockchain [324], [328], [334], [340], [341], [344], [345], [358], [359]. As a primordial service for improving road safety, especially with the introduction of self-driving cars, a control application for accidents that aided in analyzing and verifying the cause of accidents was suggested in [324].…”
Section: Data Managementmentioning
confidence: 99%
See 1 more Smart Citation
“…As regards works related to the Blockchain-based data management axis [105], [159], [323]- [354], [360], all contributions reside in both the IoV processing layer and IoV security layer to offer novel traffic services and/or secure the transferred data, thus avoiding the security attack of vehicular systems. Fundamental works propose the use of smart frameworks for generating, storing, and sharing data over existing network elements, including vehicles, users, infrastructure nodes, and sensors, over a consortium or private Blockchain [324], [328], [334], [340], [341], [344], [345], [358], [359]. As a primordial service for improving road safety, especially with the introduction of self-driving cars, a control application for accidents that aided in analyzing and verifying the cause of accidents was suggested in [324].…”
Section: Data Managementmentioning
confidence: 99%
“…A privacy scheme was then implemented to prove the correctness of collected and stored events as well as the registry of driver information. In [334], a distributed solution for intelligent vehicular transactions was modeled and studied to overcome the limitations of traditional data management solutions based on a centralized approach. In [344], an enhanced version of the Diffie-Hellman algorithm was proposed to improve trust on the applied verification mechanism in a consortium Blockchain-based network.…”
Section: Data Managementmentioning
confidence: 99%
“…Previous works utilize blockchain-based mechanisms (e.g. [41]) to address the data privacy issues. However, there is still a huge gap before striking a balance between sensitive data utility and privacy in the context of IoV.…”
Section: Takeaways From Brook Dataset and Example Studiesmentioning
confidence: 99%
“…In particular, video data collected by cameras, such as traffic accident information and road condition information, need to be transmitted to other nodes through mobile video communication technology. However, in the process of communication between the nodes in the VANETs, security and privacy are the main concerns [1], including the security protection issues (such as integrity and correctness) of the VANETs data in transmission process, the security issues (such as non-tampering) of VANETs data stored in the data center, the access control issues (such as identity verification), and privacy protection issues.…”
Section: Introductionmentioning
confidence: 99%
“…At present, there have been many studies on using blockchain in the VANETs environment, mainly including the architecture [1][2][3][4], authentication mechanism [5][6][7], privacy protection [8][9][10], trust management [11][12][13], certificate management [14,15], and data sharing [16][17][18].…”
Section: Introductionmentioning
confidence: 99%