2020
DOI: 10.3390/electronics9010074
|View full text |Cite
|
Sign up to set email alerts
|

Distributed Blockchain-Based Message Authentication Scheme for Connected Vehicles

Abstract: Vehicular ad-hoc networks (VANETs) have several security issues such as privacy preservation, secure authentication, and system reliability. In the VANET, a vehicle communicates with other vehicles or infrastructures using broadcasting messages. These messages contain not only normal traffic information, but also identification information of sender. In general, the identification information remains encrypted to ensure privacy. However, the conventional centralized system can decrypt the identification inform… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
21
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 43 publications
(21 citation statements)
references
References 20 publications
0
21
0
Order By: Relevance
“…With regard to anonymisation, there is more controversy: the works in [31,32,[47][48][49] claim that total anonymity of the identities participating in the blockchain is not achieved and, on the other hand, the works in [9,40,41,[43][44][45][46]50,51] claim that it is. This issue raises concerns as different publications offer different approaches.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…With regard to anonymisation, there is more controversy: the works in [31,32,[47][48][49] claim that total anonymity of the identities participating in the blockchain is not achieved and, on the other hand, the works in [9,40,41,[43][44][45][46]50,51] claim that it is. This issue raises concerns as different publications offer different approaches.…”
Section: Discussionmentioning
confidence: 99%
“…As can be seen in Figure 3 , there is a relationship between the terms privacy and anonymity in several of the studies analysed, finding that some only address privacy-related mechanisms [ 8 , 26 ] and that focuses solely on privacy, not on anonymity, addressing consensus mechanisms as a way of ensuring the privacy of transactions or through the elimination of central servers. We note that most studies selected for data extraction address both privacy and anonymity in conjunction and find an intrinsic relationship between the two terms [ 7 , 9 , 23 , 24 , 25 , 31 , 32 , 33 , 34 , 35 , 36 , 37 , 38 , 39 , 40 , 41 , 42 , 43 , 44 , 45 , 46 , 47 , 48 , 49 , 50 , 51 ].…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Also, there are weaknesses points of SHA-1, suggesting that it need several years to break it. There are other new applications protect against the matters by using another SHA, like SHA-2, or new techniques like random defragmentation [20][21][22][23]. To produce new applications, use Hash functions, there is strong competition for developing SHA-2 to produce SHA-3 in 2012 [24,25].…”
Section: Cryptographic Encryption Algorithmsmentioning
confidence: 99%
“…In such scenarios tracing down the culprit is also difficult [7]. There are various security and privacy challenges [8][9][10] with the traditional authentication systems and a highly secure authentication system is required [11]. The limitations of the traditional frameworks can be overcome by using biometrics, which is based on biometric traits of a human [12,13].…”
Section: Introductionmentioning
confidence: 99%