2020
DOI: 10.1109/access.2020.2980298
|View full text |Cite
|
Sign up to set email alerts
|

TrafficChain: A Blockchain-Based Secure and Privacy-Preserving Traffic Map

Abstract: Intelligent Connected Vehicles (ICVs) can provide smart, safe, and efficient transportation services and have attracted intensive attention recently. Obtaining timely and accurate traffic information is one of the most important problems in transportation systems, which would allow people to select fast routes and avoid congestions, thus saving their travel time on the road. Currently, the most popular ways to obtain traffic information is to inquire navigation agents, e.g., Apple map, and Google map. However,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
17
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 29 publications
(17 citation statements)
references
References 30 publications
0
17
0
Order By: Relevance
“…The authors also discussed a fragmented ledger that supports both hashed and non-hashed data. The authors in [147] address acquiring traffic information from centralized-based navigation agents such as Apple Maps and Google Maps, which are mostly prone to many vulnerabilities including security and privacy attacks. These attacks can jeopardize the driver's personal information and can track activities in real-time.…”
Section: Privacy and Securitymentioning
confidence: 99%
“…The authors also discussed a fragmented ledger that supports both hashed and non-hashed data. The authors in [147] address acquiring traffic information from centralized-based navigation agents such as Apple Maps and Google Maps, which are mostly prone to many vulnerabilities including security and privacy attacks. These attacks can jeopardize the driver's personal information and can track activities in real-time.…”
Section: Privacy and Securitymentioning
confidence: 99%
“…Thus, false data entry by external attackers is prevented. Internal attacks can be mitigated by employment of the Mean Around Krum method as described in [14] and [15].…”
Section: Security Analysismentioning
confidence: 99%
“…Since mobile wallets are used for executing transactions, a Proof of Authority consensus is employed to reduce computationally intensive operations. Wang et al [14] also uses a crowdsourcing mechanism to collect passing time cost of a road segment from users. Unlike the previous solution, it uses a local and global blockchain to reduce network communication overhead with computing nodes owned by individuals or edge routers functioning as miners competing via PoW.…”
Section: Related Workmentioning
confidence: 99%
“…Due to the emergence of Bitcoin [21] in 2009, Ethereum [22] in 2013, and Hyperledger Fabric [23] in 2016, blockchain technologies [21,22], providing a trusted mechanism without a CA and TTP, have received significant attention and interest in academia and the IT industry. e fundamental technology of blockchains, such as Bitcoin and Ethereum, has gained increasingly more attention and has begun to be applied to various fields, such as medical data access [24][25][26], the Internet of ings [27,28], and privacy preservation [29][30][31]. However, the high cost of certificate-based public key authentication is still problematic.…”
Section: Introductionmentioning
confidence: 99%