2022
DOI: 10.3390/s22145361
|View full text |Cite
|
Sign up to set email alerts
|

On a Blockchain-Based Security Scheme for Defense against Malicious Nodes in Vehicular Ad-Hoc Networks

Abstract: Vehicular ad-hoc networks (VANETs) aim to provide a comfortable driving experience. Sharing messages in VANETs can help with traffic management, congestion mitigation, and driving safety. However, forged or false messages may undermine the efficiency of VANETs. In this paper, we propose a security scheme based on blockchain technology, where two types of blockchain are constructed based on roadside units (RSUs) and Certificate Authorities (CAs), respectively. The proposed security scheme has multifold goals to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 34 publications
0
3
0
Order By: Relevance
“…). In this study [73], the authors propose a security system based on blockchain technology for communication security in VANET. Te proposed system constructs two types of blockchains in VANET: BCIR (Blockchain for identifcation on RSU) and BCCA (Blockchain for certifcation on CA), where the BCIR blockchain is connected to the RSU, which evaluates the reliability of the message, and the BCCA in the CA, which determines whether a node is legitimate or not.…”
Section: Bcsm (Blockchain-based Security Methodsmentioning
confidence: 99%
“…). In this study [73], the authors propose a security system based on blockchain technology for communication security in VANET. Te proposed system constructs two types of blockchains in VANET: BCIR (Blockchain for identifcation on RSU) and BCCA (Blockchain for certifcation on CA), where the BCIR blockchain is connected to the RSU, which evaluates the reliability of the message, and the BCCA in the CA, which determines whether a node is legitimate or not.…”
Section: Bcsm (Blockchain-based Security Methodsmentioning
confidence: 99%
“…Their scheme sorts out the KGC escrow problem and uses time and pseudo-identity to validate communicating vehicles while excluding bilinear pairings. Liu et al [ 16 ] presented a scheme for defense against malicious nodes in VANET based on blockchain. They constructed two types of blockchains that can identify malicious nodes and forged messages through reputation, time and distance.Ma et al [ 17 ] presented a blockchain-based secure, privacy-preserving, and decentralized IoV architecture.…”
Section: Related Workmentioning
confidence: 99%
“…This technique allows users to share information among nodes in the network that do not trust each other [ 12 ]. The attractive features of blockchain, such as transparency, privacy, and accountability [ 25 ], make it reliable for a variety of applications related to secure communication [ 9 , 26 ], smart contracts [ 27 ], healthcare [ 28 , 29 , 30 ], supply chain management [ 31 , 32 ], industries [ 33 ], and other financial services. Blockchain technology came to the mainstream with its most prominent application, namely the cryptocurrency Bitcoin [ 34 , 35 , 36 ].…”
Section: Introductionmentioning
confidence: 99%