2020 Global Internet of Things Summit (GIoTS) 2020
DOI: 10.1109/giots49054.2020.9119623
|View full text |Cite
|
Sign up to set email alerts
|

Towards a Blockchain-based Identity and Trust Management Framework for the IoV Ecosystem

Abstract: The past decade has seen a huge growth not only in the Internet of Things (IoT) but also in the Internet of Vehicles (IoV) from both academia and industry. Autonomous Vehicles (AVs) combine a variety of sensors, IoT devices, control units, gateways, etc. Therefore, the software of the different sensors and IoT devices needs to be updated to the latest version by the Software Vendors. This paper proposes a blockchain-based identity and trust management framework for the IoV ecosystem, that aims to provide secur… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(14 citation statements)
references
References 11 publications
0
14
0
Order By: Relevance
“…Trust is an important concern in the IoV with numerous mentions in the literature (e.g. [31], [39], [46], [47]). Ondemand services will likely see unprecedented usage in the IoV.…”
Section: B Trust In the Iovmentioning
confidence: 99%
See 1 more Smart Citation
“…Trust is an important concern in the IoV with numerous mentions in the literature (e.g. [31], [39], [46], [47]). Ondemand services will likely see unprecedented usage in the IoV.…”
Section: B Trust In the Iovmentioning
confidence: 99%
“…On top of these, devices such as vehicles, sensors, gateways and control units will need to be updated constantly. Toward secure software updates, [47] propose a blockchain-based identity and trust management framework.…”
Section: Establishing Trustmentioning
confidence: 99%
“…The personality definition is extended to things in the IoT's particular circumstance. Personality is regarded as an endpoint that allows concerned things to openly and effectively access endpoints [6]. Clients can use and change information through the well-known proof cycle, which also allows for customization of administrations and communications [7].…”
Section: Recognizationmentioning
confidence: 99%
“…• Possession of something:The client provides biometric data, which includes specific physical and social properties such as speech, advanced picture of the face, retina, unique mark, and so on. Despite the fact that biometric data is new and intended to be unaltered, there is a risk associated with its intentional or unintentional use (taken, duplicated, or misrepresented) [6]. • Something that is well known: The client provides confidential information (for example, username/secret key, designs, and graphical images).…”
Section: Authenticationmentioning
confidence: 99%
See 1 more Smart Citation