Abstract

Proof of Pseudonym: Blockchain-Based Privacy Preserving Protocol for Intelligent Transport System

Highlights

  • LOCKCHAIN (BC) is implemented in a distributed manner with tamper-proof and tamper-resistant digital records

  • Road Side Unit (RSU) can be protected from attacks and from a single point of failure if decentralized; we introduce the blockchain over RSUs

  • We describe the working of Proof of Pseudonym in Algorithm 6 where in step 1, the client CI P wants to handshake with the server, Ser

Read more

Summary

Introduction

LOCKCHAIN (BC) is implemented in a distributed manner with tamper-proof and tamper-resistant digital records. Blockchain does not require any central authority i.e. banks, government or companies [1]. They enable users’ communities to record their transactions within the shared ledger. The blockchain does not allow a change in the record once it is published. One authority is responsible for making changes to the records. M. Raya et al focused on the privacy protection of the vehicle/user that it is necessary as the malicious vehicle may take advantage of the genuine identity of the vehicle/user. Pseudonyms can be used to protect the vehicle from malicious attacks [14]. In ITS, identity and location privacy is both required in order to prevent wrong use by malevolent

Methods
Results
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.