Abstract
Proof of Pseudonym: Blockchain-Based Privacy Preserving Protocol for Intelligent Transport System
Highlights
LOCKCHAIN (BC) is implemented in a distributed manner with tamper-proof and tamper-resistant digital records
Road Side Unit (RSU) can be protected from attacks and from a single point of failure if decentralized; we introduce the blockchain over RSUs
We describe the working of Proof of Pseudonym in Algorithm 6 where in step 1, the client CI P wants to handshake with the server, Ser
Summary
LOCKCHAIN (BC) is implemented in a distributed manner with tamper-proof and tamper-resistant digital records. Blockchain does not require any central authority i.e. banks, government or companies [1]. They enable users’ communities to record their transactions within the shared ledger. The blockchain does not allow a change in the record once it is published. One authority is responsible for making changes to the records. M. Raya et al focused on the privacy protection of the vehicle/user that it is necessary as the malicious vehicle may take advantage of the genuine identity of the vehicle/user. Pseudonyms can be used to protect the vehicle from malicious attacks [14]. In ITS, identity and location privacy is both required in order to prevent wrong use by malevolent
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.