Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
Review
. 2021 Nov 27;21(23):7927.
doi: 10.3390/s21237927.

Blockchain-Based Authentication in Internet of Vehicles: A Survey

Affiliations
Review

Blockchain-Based Authentication in Internet of Vehicles: A Survey

Sohail Abbas et al. Sensors (Basel). .

Abstract

Internet of Vehicles (IoV) has emerged as an advancement over the traditional Vehicular Ad-hoc Networks (VANETs) towards achieving a more efficient intelligent transportation system that is capable of providing various intelligent services and supporting different applications for the drivers and passengers on roads. In order for the IoV and VANETs environments to be able to offer such beneficial road services, huge amounts of data are generated and exchanged among the different communicated entities in these vehicular networks wirelessly via open channels, which could attract the adversaries and threaten the network with several possible types of security attacks. In this survey, we target the authentication part of the security system while highlighting the efficiency of blockchains in the IoV and VANETs environments. First, a detailed background on IoV and blockchain is provided, followed by a wide range of security requirements, challenges, and possible attacks in vehicular networks. Then, a more focused review is provided on the recent blockchain-based authentication schemes in IoV and VANETs with a detailed comparative study in terms of techniques used, network models, evaluation tools, and attacks counteracted. Lastly, some future challenges for IoV security are discussed that are necessary to be addressed in the upcoming research.

Keywords: Internet of Vehicles; Vehicular Ad-hoc Networks; authentication; blockchain.

PubMed Disclaimer

Conflict of interest statement

The authors declare no conflict of interest.

Figures

Figure 1
Figure 1
Communication models in IoV.
Figure 2
Figure 2
The proposed six-layers architecture of IoV.
Figure 3
Figure 3
The security requirements and challenges in IoV and VANETs platforms.

References

    1. Chang W.-J., Chen L.-B., Su K.-Y. DeepCrash: A deep learning-based Internet of vehicles system for head-on and single-vehicle accident detection with emergency notification. IEEE Access. 2019;7:148163–148175. doi: 10.1109/ACCESS.2019.2946468. - DOI
    1. Dandala T.T., Krishnamurthy V., Alwan R. Internet of Vehicles (IoV) for traffic management; Proceedings of the 2017 International Conference on Computer, Communication and Signal Processing (ICCCSP); Chennai, India. 10–11 January 2017; pp. 1–4.
    1. Vijayaraghavan V., Leevinson J.R. Connected Vehicles in the Internet of Things. Springer; Berlin/Heidelberg, Germany: 2020. Intelligent traffic management systems for next generation IoV in smart city scenario; pp. 123–141.
    1. Khan Z., Koubaa A., Farman H. Smart route: Internet-of-vehicles (iov)-based congestion detection and avoidance (iov-based cda) using rerouting planning. Appl. Sci. 2020;10:4541. doi: 10.3390/app10134541. - DOI
    1. Ang L.-M., Seng K.P., Ijemaru G.K., Zungeru A.M. Deployment of IoV for smart cities: Applications, architecture, and challenges. IEEE Access. 2018;7:6473–6492. doi: 10.1109/ACCESS.2018.2887076. - DOI

LinkOut - more resources