2022
DOI: 10.1049/ntw2.12036
|View full text |Cite
|
Sign up to set email alerts
|

Privacy‐preserving blockchain‐based authentication and trust management in VANETs

Abstract: Vehicular Ad Hoc Networks (VANETs) are characterized by high mobility of nodes and volatility, which make privacy, trust management, and security challenging issues in VANETs' design. In such networks, data can be exposed to a variety of attacks, the most dangerous is false information dissemination, which threatens the safety and efficiency of transportation systems. False emergency messages can be injected by inside attackers to announce fake incidents such as traffic accidents, resulting in a false informat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2022
2022
2025
2025

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 26 publications
(10 citation statements)
references
References 72 publications
0
10
0
Order By: Relevance
“…In the healthcare field, the possible participants are patients, the associated health workers, and health organizations. 30 These participants can employ this transparent medium for information delivery while incorporating authentication methods [31][32][33] to enhance the security of their communication. In recent years, there has been a development of patient-centric models, [34][35][36] which are aimed at enabling individuals to monitor and control the handling of their data through specified access policies.…”
Section: Related Workmentioning
confidence: 99%
“…In the healthcare field, the possible participants are patients, the associated health workers, and health organizations. 30 These participants can employ this transparent medium for information delivery while incorporating authentication methods [31][32][33] to enhance the security of their communication. In recent years, there has been a development of patient-centric models, [34][35][36] which are aimed at enabling individuals to monitor and control the handling of their data through specified access policies.…”
Section: Related Workmentioning
confidence: 99%
“…For both centralised and decentralised data processing, training data must be preprocessed or reconstructed to secure and protect any sensitive data, but this may reduce system accuracy. Terefore, robust privacy-preserving computation is necessary to compensate for the trade-of between system accuracy and data privacy [223,224]. Tese issues must be addressed using a fair system design.…”
Section: Trustworthy Ai In 5g-based Iot Networkmentioning
confidence: 99%
“…The trust value of a vehicular node is calculated based on direct interactions between vehicular nodes and RSUs. The value is calculated as the ratio of true event reports from a vehicle to the total number of event reports from that vehicle in a given period of time [3], [29]. If x i is the number of true messages from vehicle v i , and y i is the total number of messages it has generated up to a specific time, the trust value is calculated with (2).…”
Section: Application Of Blockchain For Handling Of Event Messages In ...mentioning
confidence: 99%