2020
DOI: 10.1016/j.compeleceng.2020.106713
|View full text |Cite
|
Sign up to set email alerts
|

Blockchain-based asymmetric group key agreement protocol for internet of vehicles

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 15 publications
(15 citation statements)
references
References 22 publications
0
15
0
Order By: Relevance
“…However, the blockchain-based IoV security technology still faces many challenges when showing its vitality. The inefficient block generation mechanism leads to high transaction data processing latency, the massive IoV data puts pressure on the storage space of blockchain nodes and the security risks of blockchain itself, the underlying technology of different blockchains restricts the interconnection between multiple chains, the anonymity of user identity of blockchain hinders the tracking and tracing of network security events, and the antitampering feature of blockchain increases the security of IoV and the difficulty of content management, etc., all urgently need to be addressed [35,36]. Moreover, some of the relevant literature is summarized as follows; please see Table 5.…”
Section: Blockchain-based Iov Securitymentioning
confidence: 99%
“…However, the blockchain-based IoV security technology still faces many challenges when showing its vitality. The inefficient block generation mechanism leads to high transaction data processing latency, the massive IoV data puts pressure on the storage space of blockchain nodes and the security risks of blockchain itself, the underlying technology of different blockchains restricts the interconnection between multiple chains, the anonymity of user identity of blockchain hinders the tracking and tracing of network security events, and the antitampering feature of blockchain increases the security of IoV and the difficulty of content management, etc., all urgently need to be addressed [35,36]. Moreover, some of the relevant literature is summarized as follows; please see Table 5.…”
Section: Blockchain-based Iov Securitymentioning
confidence: 99%
“…However, the proposed method lacks in protecting the users against the privacy leakage issue. In [20], [21], the authors address the issue of inefficient key management in VENs. The authors in [20] develop a lightweight key agreement protocol based on bivariate polynomial.…”
Section: Related Workmentioning
confidence: 99%
“…The authors in [20] develop a lightweight key agreement protocol based on bivariate polynomial. Moreover, an asymmetric group key agreement protocol based on BC technology is proposed in [21]. However, due to the lack of an efficient storage mechanism, both of these schemes suffer from scalability issue.…”
Section: Related Workmentioning
confidence: 99%
“…This protocol ensures that any messages sent to each other between the sending member and the receiving member are undeniable, and smart terminal members can dynamically join and leave the group is allowed, while also being able to achieve forward and backward confidentiality. Scheme of GKA using blockchain technology is proposed in Zhang et al 13 This scheme uses blockchain-based anonymous identity verification technology to protect users' privacy. The scheme also uses blockchain logging technology for traceability and accountability.…”
Section: Related Workmentioning
confidence: 99%