2019
DOI: 10.3844/jcssp.2019.249.257
|View full text |Cite
|
Sign up to set email alerts
|

Security Mechanism for Vehicle Identification and Transaction Authentication in the Internet of Vehicle (IoV) Scenario: A Blockchain Based Model

Abstract: Internet of Vehicle (IoV) is now changing the landscape of Transportation System-paving the way of the so called Intelligent Transport System as it is being powered by the plethora of converging smart sensors and technologies. However, beyond its potential, this technology is still in a ground zero level considering the many facets of issues and concerns that needs to be addressed prior to its full implementation. One of the never ending and unresolved issues is on the area of Security and Privacy. In fact, se… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 16 publications
0
3
0
Order By: Relevance
“…Blockchain from a software engineering perspective enables the development of a new distributed and decentralized system software architecture, where a sensitive transaction or confidential transaction agreements may be made with untrusted individuals across the chain (Muhamad et al, 2020). In addition, Blockchain is a distributed system that operates without the use of a central authority or third-party intermediaries (Labrador and Hou, 2019).…”
Section: Block Chain Technologiesmentioning
confidence: 99%
“…Blockchain from a software engineering perspective enables the development of a new distributed and decentralized system software architecture, where a sensitive transaction or confidential transaction agreements may be made with untrusted individuals across the chain (Muhamad et al, 2020). In addition, Blockchain is a distributed system that operates without the use of a central authority or third-party intermediaries (Labrador and Hou, 2019).…”
Section: Block Chain Technologiesmentioning
confidence: 99%
“…Physical and data link layers security issues are considered as the lowest-level security issues [3]. Some of these issues includes: (1) jamming adversaries-an intentional disruption on wireless devices communication or transmission, (2) insecure initialization-a security issues that causes generatation and transmission of unverified or unathenticated data, (3) low-level sybil and spoofing attacks-an attack in a wireless networks where a node may operate in a fake identities, (4) insecure physical interface-factors associated to serious threats to proper functions of IoT devices, and (5) sleep deprivation attack-an attack that causes the sensor node to be always in active state which results to the depletion of battery [4]- [6].…”
Section: Related Studiesmentioning
confidence: 99%
“…In particular, the study of [16] proposes Blockchain mechanism for IoT security. The study emphasizes that blockchain is more effective when used at the lower layer of the communication model as well as at the application layer.…”
Section: Related Studiesmentioning
confidence: 99%