2022
DOI: 10.3390/s22208083
|View full text |Cite
|
Sign up to set email alerts
|

VBlock: A Blockchain-Based Tamper-Proofing Data Protection Model for Internet of Vehicle Networks

Abstract: The rapid advancement of the Internet of Vehicles (IoV) has led to a massive growth in data received from IoV networks. The cloud storage has been a timely service that provides a vast range of data storage for IoV networks. However, existing data storage and access models used to manage and protect data in IoV networks have proven to be insufficient. They are centralized and usually accompanied by a lack of trust, transparency, security, immutability, and provenance. In this paper, we propose VBlock, a blockc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 11 publications
(9 citation statements)
references
References 40 publications
0
9
0
Order By: Relevance
“…The investigation on traditional security models and their drawbacks in smart networks provides the reader with insight into the present paradigms and strategies implemented in order to protect networked context, as well as the issues and inadequacies encountered while studying smart networks. The following sub section is focused on the typical approaches used in network security environment such as firewalls, IDSs, antivirus, and security, encryption and tried to define whether these merits the need for smart networks [19]. It explains why traditional security measures are not effective on smart networksscalability problems, invisibility of IoT devices, inability to capture never-before-seen attacks, and putting all of the work into a single, defined edge.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The investigation on traditional security models and their drawbacks in smart networks provides the reader with insight into the present paradigms and strategies implemented in order to protect networked context, as well as the issues and inadequacies encountered while studying smart networks. The following sub section is focused on the typical approaches used in network security environment such as firewalls, IDSs, antivirus, and security, encryption and tried to define whether these merits the need for smart networks [19]. It explains why traditional security measures are not effective on smart networksscalability problems, invisibility of IoT devices, inability to capture never-before-seen attacks, and putting all of the work into a single, defined edge.…”
Section: Literature Reviewmentioning
confidence: 99%
“…If this information needs to be retained for non-sequential reasons (i.e., regulations), this data can be offloaded from the network's nodes to edgecomputing resources for long-term storage [56]. This offloading must be balanced with reducing security, tamper-proofing, and data provenance, as the attributes suffer when offloading [57].…”
Section: Pruningmentioning
confidence: 99%
“…In a permissionless platform, nodes can join networks without permission, but reading/writing ledger activities require additional privacy and control. These platforms are Bitcoin and Ethereum [6].…”
Section: Introductionmentioning
confidence: 99%