Cryptocurrencies and Blockchain Technology Applications 2020
DOI: 10.1002/9781119621201.ch5
|View full text |Cite
|
Sign up to set email alerts
|

Integrating Blockchain With Cacc for Trust and Platoon Management

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 27 publications
0
3
0
Order By: Relevance
“…Ref. [ 85 ] utilized the blockchain at the roadside unit (RSU) and the platoon level to elect a trustworthy leader. Based on the reputation score, each vehicle voted for other vehicles consequently, a vehicle with the highest votes elected as a leader.…”
Section: Cooperative Driving—a Comprehensive Analysis Of the Research Literaturementioning
confidence: 99%
“…Ref. [ 85 ] utilized the blockchain at the roadside unit (RSU) and the platoon level to elect a trustworthy leader. Based on the reputation score, each vehicle voted for other vehicles consequently, a vehicle with the highest votes elected as a leader.…”
Section: Cooperative Driving—a Comprehensive Analysis Of the Research Literaturementioning
confidence: 99%
“…To protect the sensitive information stored in a given truck's platoon records, we provide programmable access control policies that define what entities can access the on-chain data, and the policies are enforced by our blockchain network. The proposed access control policies are based on the Hyperledger Fabric's access control lists (ACLs) 6 , which can manage access to resources by associating a policy. ACL is similar to the XACML [40] that defines a fine-grained, attribute-based access control policy language.…”
Section: Blockchain Network With Access Control Policymentioning
confidence: 99%
“…The security of the platooning systems, which protects them from attacks and unauthorized access to proprietary information about a specific vehicle or fleet specifications, under mixed fleet scenarios has not been studied thus far, though awareness of such aspects has gained increasing attention 4 [5], [6]. To ensure the security of the system, it is crucial to be able to verify a given vehicle's identity information prior to granting it access to join a platoon, ensuring the platoon's integrity and guarding against potential spoofing attacks.…”
Section: Introductionmentioning
confidence: 99%