A survey on the blockchain techniques for the Internet of Vehicles security

被引:34
作者
Kumar, Sathish [1 ]
Velliangiri, Sarveshwaran [2 ]
Karthikeyan, Periyasami [3 ]
Kumari, Saru [4 ]
Kumar, Sachin [5 ]
Khan, Muhammad Khurram [6 ]
机构
[1] Cleveland State Univ, Dept Elect Engn & Comp Sci, Cleveland, OH 44115 USA
[2] BV Raju Inst Technol, Dept Comp Sci & Engn, Medak, India
[3] Jain Deemed Univ, Sch Comp Sci & IT, Bengaluru, India
[4] Chaudhary Charan Singh Univ, Dept Math, Meerut, Uttar Pradesh, India
[5] Ajay Kumar Garg Engn Coll, Dept Comp Sci & Engn, Ghaziabad, India
[6] King Saud Univ, Ctr Excellence Informat Assurance CoEIA, Riyadh, Saudi Arabia
关键词
INTRUSION DETECTION; KEY MANAGEMENT; SYSTEM; AUTHENTICATION; FRAMEWORK; PRIVACY; ENERGY; MECHANISM; CONSENSUS; DELIVERY;
D O I
10.1002/ett.4317
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Recently, The Internet of Vehicles (IoV) concept is becoming very popular due to sharing of the data between vehicles and the infrastructure. The sharing of data is very important for enhancing vehicular services, but at the same time makes IoV vulnerable for security and privacy issues. The smart and interconnected vehicles produce sophisticated services for transport authorities, car manufacturers, vehicle owners, and other service providers. IoV are very vulnerable to malicious attacks due to its self-organizing nature and the open source nature of its implementations. This exposes the smart and interconnected vehicles to a variety of privacy and security threats, such as a remote hijacking or location tracking of vehicles. Thus, the security for IoV environment is critical. Blockchain technology has been recently used for cybersecurity due to the robustness and integrity preserving nature of its design. This review article provides a detailed survey of existing work in the literature to secure IoV through blockchain techniques such as security, privacy, reputation, distributed, decentralized, data sharing, authentication, and trust-based approaches. The paper presents the detailed discussion and analysis of these blockchain techniques to secure IoV. In addition, we present the gaps and research challenges identified from the existing research works. This provides work directions for future research in blockchain techniques to secure IoV.
引用
收藏
页数:23
相关论文
共 128 条
[1]  
Abdmeziem Mohammed Riyadh, 2015, 2015 IEEE International Conferences on Computer and Information Technology
[2]  
Ubiquitous Computing and Communications
[3]  
Dependable, Autonomic and Secure Computing
[4]   A Decentralized Batch-based Group Key Management Protocol for Mobile Internet of Things (DBGK) [J].
Abdmeziem, Mohammed Riyadh ;
Tandjaoui, Djamel ;
Romdhani, Imed .
CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, 2015, :1110-1118
[5]   Decentralized Mechanism for Hiring the Smart Autonomous Vehicles Using Blockchain [J].
Abubaker, Zain ;
Gurmani, Muhammad Usman ;
Sultana, Tanzeela ;
Rizwan, Shahzad ;
Azeem, Muhammad ;
Iftikhar, Muhammad Zohaib ;
Javaid, Nadeem .
ADVANCES ON BROAD-BAND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS, 2020, 97 :733-746
[6]  
Al Omar Abdullah, 2017, Security, Privacy and Anonymity in Computation, Communication and Storage, SpaCCS 2017: International Workshops. Proceedings: LNCS 10658, P534, DOI 10.1007/978-3-319-72395-2_49
[7]   Mobile ad hoc network security - a taxonomy [J].
Alampalayam, S ;
Kumar, A ;
Srinivasan, S .
7TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, 2005, :839-844
[8]   An adaptive and predictive security model for mobile ad hoc networks [J].
Alampalayam, S ;
Kumar, A .
WIRELESS PERSONAL COMMUNICATIONS, 2004, 29 (3-4) :263-281
[9]  
Alampalayam S., 2007, COMPUTERS THEIR APPL, P260
[10]   Multivariate Fuzzy Analysis for Mobile Ad hoc Network Threat Detection [J].
Alampalayam, Sathish Kumar ;
Natsheh, Essam F. .
INTERNATIONAL JOURNAL OF BUSINESS DATA COMMUNICATIONS AND NETWORKING, 2008, 4 (03) :1-30