{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T08:59:01Z","timestamp":1771232341214,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":27,"publisher":"Springer Singapore","isbn-type":[{"value":"9789811513008","type":"print"},{"value":"9789811513015","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-15-1301-5_21","type":"book-chapter","created":{"date-parts":[[2019,11,5]],"date-time":"2019-11-05T05:18:45Z","timestamp":1572931125000},"page":"253-267","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A Consortium Blockchain-Based Model for Data Sharing in Internet of Vehicles"],"prefix":"10.1007","author":[{"given":"Qifan","family":"Wang","sequence":"first","affiliation":[]},{"given":"Lei","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Zhe","family":"Tang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9875-4182","authenticated-orcid":false,"given":"Guojun","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,5]]},"reference":[{"issue":"5","key":"21_CR1","doi-asserted-by":"publisher","first-page":"3701","DOI":"10.1109\/JIOT.2017.2690902","volume":"5","author":"J Contreras-Castillo","year":"2017","unstructured":"Contreras-Castillo, J., Zeadally, S., Guerrero-Iba\u00f1ez, J.A.: Internet of vehicles: architecture, protocols, and security. IEEE Internet Things J. 5(5), 3701\u20133709 (2017)","journal-title":"IEEE Internet Things J."},{"key":"21_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1007\/978-3-319-72389-1_4","volume-title":"Security, Privacy, and Anonymity in Computation, Communication, and Storage","author":"Q Wang","year":"2017","unstructured":"Wang, Q., Duan, G., Luo, E., Wang, G.: Research on internet of vehicles\u2019 privacy protection based on tamper-proof with ciphertext. In: Wang, G., Atiquzzaman, M., Yan, Z., Choo, K.-K.R. (eds.) SpaCCS 2017. LNCS, vol. 10656, pp. 42\u201355. Springer, Cham (2017). \n                    https:\/\/doi.org\/10.1007\/978-3-319-72389-1_4"},{"key":"21_CR3","doi-asserted-by":"publisher","first-page":"13565","DOI":"10.1109\/ACCESS.2018.2812176","volume":"6","author":"X Huang","year":"2018","unstructured":"Huang, X., Xu, C., Wang, P., Liu, H.: LNSC: a security model for electric vehicle and charging pile management based on blockchain ecosystem. IEEE Access 6, 13565\u201313574 (2018)","journal-title":"IEEE Access"},{"issue":"8","key":"21_CR4","doi-asserted-by":"publisher","first-page":"2627","DOI":"10.1109\/TITS.2017.2764095","volume":"19","author":"J Kang","year":"2017","unstructured":"Kang, J., Yu, R., Huang, X., Zhang, Y.: Privacy-preserved pseudonym scheme for fog computing supported internet of vehicles. IEEE Trans. Intell. Transp. Syst. 19(8), 2627\u20132637 (2017)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"21_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/978-3-319-72389-1_8","volume-title":"Security, Privacy, and Anonymity in Computation, Communication, and Storage","author":"Y Li","year":"2017","unstructured":"Li, Y., Qi, F., Tang, Z.: Traceable and complete fine-grained revocable multi-authority attribute-based encryption scheme in social network. In: Wang, G., Atiquzzaman, M., Yan, Z., Choo, K.-K.R. (eds.) SpaCCS 2017. LNCS, vol. 10656, pp. 87\u201392. Springer, Cham (2017). \n                    https:\/\/doi.org\/10.1007\/978-3-319-72389-1_8"},{"issue":"4","key":"21_CR6","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1007\/s11235-010-9400-5","volume":"50","author":"S Zeadally","year":"2012","unstructured":"Zeadally, S., Hunt, R., Chen, Y.S., Irwin, A., Hassan, A.: Vehicular ad hoc networks (VANETS): status, results, and challenges. Telecommun. Syst. 50(4), 217\u2013241 (2012)","journal-title":"Telecommun. Syst."},{"key":"21_CR7","doi-asserted-by":"crossref","unstructured":"Varshney, N., Roy, T., Chaudhary, N.: Security protocol for VANET by using digital certification to provide security with low bandwidth. In: 2014 International Conference on Communication and Signal Processing, pp. 768\u2013772. IEEE (2014)","DOI":"10.1109\/ICCSP.2014.6949947"},{"issue":"7","key":"21_CR8","doi-asserted-by":"publisher","first-page":"2204","DOI":"10.1109\/TITS.2017.2777990","volume":"19","author":"L Li","year":"2018","unstructured":"Li, L., et al.: CreditCoin: a privacy-preserving blockchain-based incentive announcement network for communications of smart vehicles. IEEE Trans. Intell. Transp. Syst. 19(7), 2204\u20132220 (2018)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"21_CR9","doi-asserted-by":"publisher","first-page":"58241","DOI":"10.1109\/ACCESS.2018.2890736","volume":"7","author":"X Zhang","year":"2019","unstructured":"Zhang, X., Chen, X.: Data security sharing and storage based on a consortium blockchain in a vehicular adhoc network. IEEE Access 7, 58241\u201358254 (2019)","journal-title":"IEEE Access"},{"key":"21_CR10","unstructured":"Castro, M., Liskov, B., et al.: Practical byzantine fault tolerance. In: OSDI, vol. 99, pp. 173\u2013186 (1999)"},{"issue":"7","key":"21_CR11","first-page":"2148","volume":"39","author":"J Gan","year":"2019","unstructured":"Gan, J., Li, Q., Chen, Z., Zhang, C.: Improvement of blockchain practical Byzantine fault tolerance consensus algorithm. J. Comput. Appl. 39(7), 2148\u20132155 (2019)","journal-title":"J. Comput. Appl."},{"key":"21_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/978-3-319-63688-7_12","volume-title":"Advances in Cryptology \u2013 CRYPTO 2017","author":"A Kiayias","year":"2017","unstructured":"Kiayias, A., Russell, A., David, B., Oliynykov, R.: Ouroboros: a provably secure proof-of-stake blockchain protocol. In: Katz, J., Shacham, H. (eds.) CRYPTO 2017. LNCS, vol. 10401, pp. 357\u2013388. Springer, Cham (2017). \n                    https:\/\/doi.org\/10.1007\/978-3-319-63688-7_12"},{"key":"21_CR13","doi-asserted-by":"crossref","unstructured":"Lin, J., Li, M., Yang, D., Xue, G., Tang, J.: Sybil-proof incentive mechanisms for crowdsensing. In: IEEE INFOCOM 2017-IEEE Conference on Computer Communications, pp. 1\u20139. IEEE (2017)","DOI":"10.1109\/INFOCOM.2017.8057175"},{"key":"21_CR14","doi-asserted-by":"crossref","unstructured":"Huang, W., Li, P., Zhang, T.: RSUs placement based on vehicular social mobility in VANETs. In: 2018 13th IEEE Conference on Industrial Electronics and Applications (ICIEA), pp. 1255\u20131260. IEEE (2018)","DOI":"10.1109\/ICIEA.2018.8397902"},{"key":"21_CR15","doi-asserted-by":"crossref","unstructured":"Bresson, E., Chevassut, O., Pointcheval, D., Quisquater, J.J.: Provably authenticated group Diffie-Hellman key exchange. In: Proceedings of the 8th ACM Conference on Computer and Communications Security, pp. 255\u2013264. ACM (2001)","DOI":"10.1145\/502014.502018"},{"issue":"2","key":"21_CR16","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/s00145-001-0017-4","volume":"15","author":"AM Johnston","year":"2002","unstructured":"Johnston, A.M., Gemmell, P.S.: Authenticated key exchange provably secure against the man-in-the-middle attack. J. Cryptol. 15(2), 139\u2013148 (2002)","journal-title":"J. Cryptol."},{"key":"21_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1007\/978-3-540-28628-8_14","volume-title":"Advances in Cryptology \u2013 CRYPTO 2004","author":"R Gennaro","year":"2004","unstructured":"Gennaro, R.: Multi-trapdoor commitments and their applications to proofs of knowledge secure under concurrent man-in-the-middle attacks. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 220\u2013236. Springer, Heidelberg (2004). \n                    https:\/\/doi.org\/10.1007\/978-3-540-28628-8_14"},{"issue":"7","key":"21_CR18","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/MCOM.2018.1700401","volume":"56","author":"Z Guan","year":"2018","unstructured":"Guan, Z., et al.: Privacy-preserving and efficient aggregation based on blockchain for power grid communications in smart communities. IEEE Commun. Mag. 56(7), 82\u201388 (2018)","journal-title":"IEEE Commun. Mag."},{"issue":"2","key":"21_CR19","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/98.760423","volume":"6","author":"EM Royer","year":"1999","unstructured":"Royer, E.M., Toh, C.K.: A review of current routing protocols for ad hoc mobile wireless networks. IEEE Pers. Commun. 6(2), 46\u201355 (1999)","journal-title":"IEEE Pers. Commun."},{"key":"21_CR20","unstructured":"Samad, A., Alam, S., Mohammed, S., Bhukhari, M.: Internet of vehicles (IoV) requirements, attacks and countermeasures. In: Proceedings of 12th INDIACom; INDIACom-2018; 5th International Conference on \u201cComputing for Sustainable Global Development\" IEEE Conference, New Delhi (2018)"},{"key":"21_CR21","doi-asserted-by":"crossref","unstructured":"Sun, Y., et al.: Security and privacy in the internet of vehicles. In: 2015 International Conference on Identification, Information, and Knowledge in the Internet of Things (IIKI), pp. 116\u2013121. IEEE (2015)","DOI":"10.1109\/IIKI.2015.33"},{"issue":"2","key":"21_CR22","first-page":"e1324","volume":"1","author":"R Abassi","year":"2019","unstructured":"Abassi, R.: Vanet security and forensics: challenges and opportunities. Wiley Interdiscip. Rev.: Forensic Sci. 1(2), e1324 (2019)","journal-title":"Wiley Interdiscip. Rev.: Forensic Sci."},{"issue":"8","key":"21_CR23","doi-asserted-by":"publisher","first-page":"1449","DOI":"10.1109\/JSTSP.2016.2600519","volume":"10","author":"Y Zeng","year":"2016","unstructured":"Zeng, Y., Zhang, R.: Wireless information surveillance via proactive eavesdropping with spoofing relay. IEEE J. Sel. Top. Sig. Process. 10(8), 1449\u20131461 (2016)","journal-title":"IEEE J. Sel. Top. Sig. Process."},{"issue":"9","key":"21_CR24","doi-asserted-by":"publisher","first-page":"2467","DOI":"10.1109\/TITS.2016.2634623","volume":"18","author":"M Azees","year":"2017","unstructured":"Azees, M., Vijayakumar, P., Deboarh, L.J.: EAAP: efficient anonymous authentication with conditional privacy-preserving scheme for vehicular ad hoc networks. IEEE Trans. Intell. Transp. Syst. 18(9), 2467\u20132476 (2017)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"3","key":"21_CR25","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1109\/MNET.2018.1700344","volume":"32","author":"H Liu","year":"2018","unstructured":"Liu, H., Zhang, Y., Yang, T.: Blockchain-enabled security in electric vehicles cloud and edge computing. IEEE Netw. 32(3), 78\u201383 (2018)","journal-title":"IEEE Netw."},{"issue":"12","key":"21_CR26","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1109\/MCOM.2017.1700879","volume":"55","author":"A Dorri","year":"2017","unstructured":"Dorri, A., Steger, M., Kanhere, S.S., Jurdak, R.: Blockchain: a distributed solution to automotive security and privacy. IEEE Commun. Mag. 55(12), 119\u2013125 (2017)","journal-title":"IEEE Commun. Mag."},{"key":"21_CR27","doi-asserted-by":"crossref","unstructured":"Bahsoun, J.P., Guerraoui, R., Shoker, A.: Making BFT protocols really adaptive. In: 2015 IEEE International Parallel and Distributed Processing Symposium, pp. 904\u2013913. IEEE (2015)","DOI":"10.1109\/IPDPS.2015.21"}],"container-title":["Communications in Computer and Information Science","Smart City and Informatization"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-1301-5_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,5]],"date-time":"2019-11-05T05:30:58Z","timestamp":1572931858000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-1301-5_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9789811513008","9789811513015"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-1301-5_21","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"5 November 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"iSCI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Smart City and Informatization","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 November 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 November 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isci12019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.isci-conf.org\/iSCI2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}