{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T20:07:16Z","timestamp":1760731636879,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,30]],"date-time":"2024-07-30T00:00:00Z","timestamp":1722297600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100006374","name":"Science Foundation Ireland","doi-asserted-by":"publisher","award":["23\/PSF\/12107"],"award-info":[{"award-number":["23\/PSF\/12107"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7,30]]},"DOI":"10.1145\/3664476.3670457","type":"proceedings-article","created":{"date-parts":[[2024,7,25]],"date-time":"2024-07-25T12:35:50Z","timestamp":1721910950000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Chain Links on Wheels: A Security Scheme for IoV Connectivity through Blockchain Integration"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1804-8670","authenticated-orcid":false,"given":"Ibtisam","family":"Ehsan","sequence":"first","affiliation":[{"name":"University of Chinese Academy of Sciences, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6643-6558","authenticated-orcid":false,"given":"Muhammad Irfan","family":"Khalid","sequence":"additional","affiliation":[{"name":"Department of Information Technology, University of Sialkot, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6546-6408","authenticated-orcid":false,"given":"Markus","family":"Helfert","sequence":"additional","affiliation":[{"name":"ADAPT Centre, Innovation Value Institute, Maynooth University, Ireland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2034-1403","authenticated-orcid":false,"given":"Mansoor","family":"Ahmed","sequence":"additional","affiliation":[{"name":"ADAPT Centre, Innovation Value Institute, Maynooth University, Ireland"}]}],"member":"320","published-online":{"date-parts":[[2024,7,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICBDS58040.2023.10346554"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCMA.2019.00028"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/5580179"},{"key":"e_1_3_2_1_4_1","first-page":"420","article-title":"BlockChain with IoT, an emergent routing scheme for smart agriculture","volume":"11","author":"Awan Sabir\u00a0Hussain","year":"2020","unstructured":"Sabir\u00a0Hussain Awan, Sheeraz Ahmed, Asif Nawaz, Sozan Sulaiman, Khalid Zaman, M\u00a0Yousaf Ali, Zeeshan Najam, and Sohail Imran. 2020. BlockChain with IoT, an emergent routing scheme for smart agriculture. Int. J. Adv. Comput. Sci. Appl 11, 4 (2020), 420\u2013429.","journal-title":"Int. J. Adv. Comput. Sci. Appl"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMNWC52512.2021.9688397"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTCEE54422.2021.9708555"},{"volume-title":"An Optimized Decentralized Trust Approach for Securing IoV Stream Data: A Smart Contract-Driven Framework. In 2023 3rd International Conference on Pervasive Computing and Social Networking (ICPCSN)","author":"Balasubramani S","key":"e_1_3_2_1_7_1","unstructured":"S Balasubramani, Pamidi\u00a0Trinesh Kumar, and Nukala\u00a0Rohith Ganesh. 2023. An Optimized Decentralized Trust Approach for Securing IoV Stream Data: A Smart Contract-Driven Framework. In 2023 3rd International Conference on Pervasive Computing and Social Networking (ICPCSN). IEEE, 928\u2013934."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASET56582.2023.10180814"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/PDGC50313.2020.9315804"},{"key":"e_1_3_2_1_10_1","volume-title":"Understanding Fusion of Internet of Vehicles with Blockchain: IoV and Blockchain. In 2022 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS). IEEE, 237\u2013242","author":"Faridi Arman\u00a0Rasool","year":"2022","unstructured":"Arman\u00a0Rasool Faridi, Rahul Singh, and Faraz Masood. 2022. Understanding Fusion of Internet of Vehicles with Blockchain: IoV and Blockchain. In 2022 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS). IEEE, 237\u2013242."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2023.3268222"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/IOTM.0001.1900109"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/DTPI59677.2023.10365435"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICRAIE51050.2020.9358355"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csbj.2023.11.038"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2021.08.011"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/QRS-C51114.2020.00108"},{"key":"e_1_3_2_1_18_1","volume-title":"BSDCE-IoV: blockchain-based secure data collection and exchange scheme for IoV in 5G environment","author":"Karim M","year":"2023","unstructured":"Sulaiman\u00a0M Karim, Adib Habbal, Shehzad\u00a0Ashraf Chaudhry, and Azeem Irshad. 2023. BSDCE-IoV: blockchain-based secure data collection and exchange scheme for IoV in 5G environment. IEEE Access (2023)."},{"key":"e_1_3_2_1_19_1","volume-title":"BSDCE-IoV: blockchain-based secure data collection and exchange scheme for IoV in 5G environment","author":"Karim M","year":"2023","unstructured":"Sulaiman\u00a0M Karim, Adib Habbal, Shehzad\u00a0Ashraf Chaudhry, and Azeem Irshad. 2023. BSDCE-IoV: blockchain-based secure data collection and exchange scheme for IoV in 5G environment. IEEE Access (2023)."},{"key":"e_1_3_2_1_20_1","volume-title":"Electronics and Mobile Communication Conference (IEMCON)(pp. 335-340)","author":"Kim Mark","year":"2018","unstructured":"Mark Kim, Brian Hilton, Zach Burks, and Jordan Reyes. 2018. Integrating blockchain, smart contract-tokens, and IoT to design a food traceability solution. In 2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)(pp. 335-340). IEEE. https:\/\/doi. org\/10.1109\/IEMCON (2018)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/CETIC4.2018.8531042"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/CETIC4.2018.8531042"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/Blockchain53845.2021.00018"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2022-Spring54318.2022.9860946"},{"key":"e_1_3_2_1_25_1","volume-title":"CPAHP: Conditional privacy-preserving authentication scheme with hierarchical pseudonym for 5G-enabled IoV","author":"Liu Jingwei","year":"2023","unstructured":"Jingwei Liu, Chuntian Peng, Rong Sun, Lei Liu, Ning Zhang, Schahram Dustdar, and Victor\u00a0CM Leung. 2023. CPAHP: Conditional privacy-preserving authentication scheme with hierarchical pseudonym for 5G-enabled IoV. IEEE Transactions on Vehicular Technology (2023)."},{"key":"e_1_3_2_1_26_1","volume-title":"CPAHP: Conditional privacy-preserving authentication scheme with hierarchical pseudonym for 5G-enabled IoV","author":"Liu Jingwei","year":"2023","unstructured":"Jingwei Liu, Chuntian Peng, Rong Sun, Lei Liu, Ning Zhang, Schahram Dustdar, and Victor\u00a0CM Leung. 2023. CPAHP: Conditional privacy-preserving authentication scheme with hierarchical pseudonym for 5G-enabled IoV. IEEE Transactions on Vehicular Technology (2023)."},{"key":"e_1_3_2_1_27_1","volume-title":"IoV Edge Data Integrity Audit Method Based on Blockchain. In 2023 International Conference on Blockchain Technology and Information Security (ICBCTIS). IEEE, 180\u2013186","author":"Qi Hui","year":"2023","unstructured":"Hui Qi, Hang Li, Wangdong Yu, and Chunbo Wang. 2023. IoV Edge Data Integrity Audit Method Based on Blockchain. In 2023 International Conference on Blockchain Technology and Information Security (ICBCTIS). IEEE, 180\u2013186."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS50562.2020.9162866"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.06.019"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SYSOSE.2018.8428720"},{"volume-title":"Towards a blockchain-based identity and trust management framework for the IoV ecosystem. In 2020 Global Internet of Things Summit (GIoTS)","author":"Theodouli Anastasia","key":"e_1_3_2_1_31_1","unstructured":"Anastasia Theodouli, Konstantinos Moschou, Konstantinos Votis, Dimitrios Tzovaras, Jan Lauinger, and Sebastian Steinhorst. 2020. Towards a blockchain-based identity and trust management framework for the IoV ecosystem. In 2020 Global Internet of Things Summit (GIoTS). IEEE, 1\u20136."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2022.3163960"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/Blockchain.2019.00030"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICECAI58670.2023.10176406"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2022.3142776"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2022.3142776"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2022.09.004"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2020.102355"},{"volume-title":"Electronic Information Engineering and Intelligent Control Technology (CEI)","author":"Zhao Yang","key":"e_1_3_2_1_39_1","unstructured":"Yang Zhao and Kai Du. 2022. An Application of the IoVs Information Sharing Scheme Based on Blockchain Technology. In 2022 2nd International Conference on Computer Science, Electronic Information Engineering and Intelligent Control Technology (CEI). IEEE, 617\u2013620."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2021.3078797"}],"event":{"name":"ARES 2024: The 19th International Conference on Availability, Reliability and Security","acronym":"ARES 2024","location":"Vienna Austria"},"container-title":["Proceedings of the 19th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664476.3670457","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3664476.3670457","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T16:52:08Z","timestamp":1755881528000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664476.3670457"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,30]]},"references-count":40,"alternative-id":["10.1145\/3664476.3670457","10.1145\/3664476"],"URL":"https:\/\/doi.org\/10.1145\/3664476.3670457","relation":{},"subject":[],"published":{"date-parts":[[2024,7,30]]},"assertion":[{"value":"2024-07-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}