{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T12:04:31Z","timestamp":1770725071801,"version":"3.49.0"},"reference-count":12,"publisher":"Wiley","license":[{"start":{"date-parts":[[2020,9,7]],"date-time":"2020-09-07T00:00:00Z","timestamp":1599436800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Key R&D Program of China","award":["2018YFB1402704"],"award-info":[{"award-number":["2018YFB1402704"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Wireless Communications and Mobile Computing"],"published-print":{"date-parts":[[2020,9,7]]},"abstract":"<jats:p>With the development of wireless local area networks and intelligent transportation technologies, the Internet of Vehicles is considered to be an effective method to alleviate the severe situation of the current transportation system. The vehicles in the Internet of Vehicles system build the Vehicular Ad Hoc Networks through wireless communication technology and dynamically provide different services through the real-time driving information broadcast by the vehicles. Vehicle drivers can control the distance, planning the driving route, between vehicles according to the current traffic environment, which improves the overall safety and efficiency of the traffic system. Due to the particularity of the Internet of Vehicles system service, vehicles need to broadcast their location information frequently. Attackers can collect and analyze vehicle broadcast information to steal privacy and even directionally track the owner through the driving trajectory, bringing serious security risks. This paper proposes a blockchain-based privacy protection system for the Internet of Vehicles. The system combines the blockchain with the Internet of Vehicles system to design a safe and efficient two-way authentication and key agreement algorithm through encryption and signature algorithm, which also solves the central dependency problem of the traditional Internet of Vehicles system.<\/jats:p>","DOI":"10.1155\/2020\/8870438","type":"journal-article","created":{"date-parts":[[2020,9,7]],"date-time":"2020-09-07T23:32:01Z","timestamp":1599521521000},"page":"1-10","source":"Crossref","is-referenced-by-count":24,"title":["Blockchain-Based Internet of Vehicles Privacy Protection System"],"prefix":"10.1155","volume":"2020","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1673-6840","authenticated-orcid":true,"given":"Tianhong","family":"Su","sequence":"first","affiliation":[{"name":"Information Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3945-0706","authenticated-orcid":true,"given":"Sujie","family":"Shao","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, China"}]},{"given":"Shaoyong","family":"Guo","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, China"}]},{"given":"Min","family":"Lei","sequence":"additional","affiliation":[{"name":"Information Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1504\/IJAIP.2019.096957"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.08.020"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70278-0_31"},{"key":"4","year":"2006"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.01.026"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.5121\/ijcnc.2014.6105"},{"key":"7","year":"2017"},{"issue":"5","key":"8","first-page":"80","volume":"43","year":"2019","journal-title":"Journal of Beijing Jiaotong University"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/access.2018.2861430"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2836144"},{"key":"13","year":"2019"},{"issue":"1","key":"15","first-page":"27","volume":"42","year":"2020","journal-title":"Automotive Engineering"}],"container-title":["Wireless Communications and Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2020\/8870438.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2020\/8870438.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2020\/8870438.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,7]],"date-time":"2020-09-07T23:32:07Z","timestamp":1599521527000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/wcmc\/2020\/8870438\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,7]]},"references-count":12,"alternative-id":["8870438","8870438"],"URL":"https:\/\/doi.org\/10.1155\/2020\/8870438","relation":{},"ISSN":["1530-8669","1530-8677"],"issn-type":[{"value":"1530-8669","type":"print"},{"value":"1530-8677","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,9,7]]}}}