2022
DOI: 10.3390/wevj13070111
|View full text |Cite
|
Sign up to set email alerts
|

Design of a Data Security Access Control Algorithm for the Electric Vehicle Internet of Vehicles Based on Blockchain Technology

Abstract: The data transmission in the vehicle network is easily interfered with by the outside world, which makes the security of data access difficult to provide in order to meet the actual needs. Therefore, a data security access control algorithm for an electric vehicle network based on blockchain technology is proposed. Using the double-chain architecture of analliance chain-private chain in a blockchain, the distributed database of data communication for vehicle networking is constructed. In the process of vehicle… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 22 publications
0
2
0
Order By: Relevance
“…Vehicle Access Control (VAC) [14], as previously mentioned, boosts both user-friendliness and system security (Possibly resulting in reduced insurance costs). Card readers (such as AWID scheme employed by leading carsharing firms in the U.S.) and interfaces to the car's door lock circuitry are the bare minimum hardware parts needed for smartcard-based vehicle access management.…”
Section: On-board Vehicle Electronics Concern Vehicle Access Controlmentioning
confidence: 99%
“…Vehicle Access Control (VAC) [14], as previously mentioned, boosts both user-friendliness and system security (Possibly resulting in reduced insurance costs). Card readers (such as AWID scheme employed by leading carsharing firms in the U.S.) and interfaces to the car's door lock circuitry are the bare minimum hardware parts needed for smartcard-based vehicle access management.…”
Section: On-board Vehicle Electronics Concern Vehicle Access Controlmentioning
confidence: 99%
“…Therefore, a V2X system should have a range of functions such as encryption and decryption, signature production and certification, authentication, and data privacy checking [116]. Data security is of great importance, as illegal tampering with traffic management data and vehicle operation data will directly threaten the lives of drivers and other traffic participants [117]. Therefore, vehicle manufacturers should set up stringent data standards, focus on enhancing the privacy management level of data, and tightly control the disclosure of sensitive data.…”
Section: Empowering Technology Developmentmentioning
confidence: 99%