{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T01:34:36Z","timestamp":1777685676528,"version":"3.51.4"},"reference-count":11,"publisher":"SAGE Publications","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["HIS"],"published-print":{"date-parts":[[2021,2,5]]},"abstract":"<jats:p>The Internet of Things (smart things) is used in many sectors and applications due to recent technological advances. One of such application is in the transportation system, which is of primary use for the users to move from one place to another place. The smart devices which were embedded in vehicles are useful for the passengers to solve his\/her query, wherein future vehicles will be fully automated to the advanced stage, i.e. future cars with driverless feature. These autonomous cars will help people a lot to reduce their time and increases their productivity in their respective (associated) business. In today\u2019s generation and in the near future, privacy preserving and trust will be a major concern among users and autonomous vehicles and hence, this paper will be able to provide clarity for the same. Many attempts in previous decade have provided many efficient mechanisms, but they all work only with vehicles along with a driver. However, these mechanisms are not valid and useful for future vehicles. In this paper, we will use deep learning techniques for building trust using recommender systems and Blockchain technology for privacy preserving. We also maintain a certain level of trust via maintaining the highest level of privacy among users living in a particular environment. In this research, we developed a framework that could offer maximum trust or reliable communication to users over the road network. With this, we also preserve privacy of users during traveling, i.e., without revealing identity of respective users from Trusted Third Parties or even Location Based Service in reaching a destination. Thus, Deep Learning based Blockchain Solution (DLBS) is illustrated for providing an efficient recommendation system.<\/jats:p>","DOI":"10.3233\/his-200289","type":"journal-article","created":{"date-parts":[[2020,12,8]],"date-time":"2020-12-08T14:00:54Z","timestamp":1607436054000},"page":"223-236","source":"Crossref","is-referenced-by-count":8,"title":["Deep learning based Blockchain solution for preserving privacy in future vehicles"],"prefix":"10.1177","volume":"16","author":[{"given":"Varsha","family":"R","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, Vellore Institute of Technology, Chennai, Tamilnadu, India"}]},{"given":"Meghna Manoj","family":"Nair","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Vellore Institute of Technology, Chennai, Tamilnadu, India"}]},{"given":"Siddharth M.","family":"Nair","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Vellore Institute of Technology, Chennai, Tamilnadu, India"}]},{"given":"Amit Kumar","family":"Tyagi","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Vellore Institute of Technology, Chennai, Tamilnadu, India"},{"name":"Research Division of Advanced Data Science, Vellore Institute of Technology, Chennai, Tamilnadu, India"}]}],"member":"179","reference":[{"key":"10.3233\/HIS-200289_ref4","unstructured":"K. Sanzgiri, B. Dahill, B.N. Levine, C. Shields and E.M. Royer, A secure routing protocol for ad hoc networks, in: IEEE International Conference on Network Protocols, Nov, 2002."},{"key":"10.3233\/HIS-200289_ref5","doi-asserted-by":"crossref","unstructured":"J. Bonneau, A. Miler, J. Clark, A. Narayanan, J. Kroll and E. Felten, SoK: Research Perspectives and Challenges for Bitcoin Cryptocurrencies, in: IEEE Symposium on Security and Privacy, July 2015.","DOI":"10.1109\/SP.2015.14"},{"key":"10.3233\/HIS-200289_ref7","doi-asserted-by":"crossref","unstructured":"B. Wu, J. Chen, J. Wu and M. Cardei, A survey of attacks and countermeasures in Mobile Ad hoc Networks, in: Springer Wireless Network Security, 2007, pp. 103\u2013135.","DOI":"10.1007\/978-0-387-33112-6_5"},{"key":"10.3233\/HIS-200289_ref10","doi-asserted-by":"crossref","unstructured":"F. Dotzer, Privacy Issues in Vehicular Ad Hoc Networks, in: International Workshop on Privacy Enhancing Technologies, 2005.","DOI":"10.1007\/11767831_13"},{"key":"10.3233\/HIS-200289_ref13","doi-asserted-by":"crossref","unstructured":"H.A. Karami and X. Liu, A predictive location model for location-based services, in: The Proceedings of the 11\ud835\udc61\u210e ACM International Symposium on Advances in Geographic Information Systems, Nov. 2003, pp. 126\u2013133.","DOI":"10.1145\/956676.956693"},{"key":"10.3233\/HIS-200289_ref15","doi-asserted-by":"crossref","unstructured":"X. Sun, X. Lin and P. Ho, Secure Vehicular Communications Based on Group Signature and ID-Based Signature Scheme, in: 2007 IEEE International Conference on Communications, Glasgow, 2007, pp. 1539\u20131545.","DOI":"10.1109\/ICC.2007.258"},{"key":"10.3233\/HIS-200289_ref16","unstructured":"L. Seitz, J. Pierson and L. Brunie, Key Management for Encrypted Data Storage in Distributed Systems, in: Second IEEE International Security in Storage Workshop, Washington, DC, USA, 2003, pp. 20\u201320."},{"key":"10.3233\/HIS-200289_ref20","unstructured":"S. K., A. Thangavelu and K. Rameshbabu, A Middleware Architectural framework for Vehicular Safety over VANET (In VANET), in: 2009 First International Conference on Networks & Communications, Chennai, 2009, pp. 277\u2013282."},{"issue":"4","key":"10.3233\/HIS-200289_ref21","doi-asserted-by":"crossref","first-page":"1","DOI":"10.9734\/BJMCS\/2015\/16995","article-title":"A comparative study on privacy preserving techniques for location based services","volume":"10","author":"Tyagi","year":"2015","journal-title":"British Journal of Mathematics and Computer Science (ISSN: 2231-0851)"},{"issue":"12","key":"10.3233\/HIS-200289_ref22","first-page":"189","article-title":"Preserving location privacy in location based services against sybil attacks","volume":"9","author":"Tyagi","year":"2015","journal-title":"International Journal of Security and Its Applications (ISSN: 1738\u20139976 (Print), ISSN: 2207\u20139629 (Online))"},{"key":"10.3233\/HIS-200289_ref23","unstructured":"A.K. Tyagi, M.M. Nair, S. Niladhuri and A. Abraham, Security, privacy research issues in various computing platforms: a survey and the road ahead, Journal of Information Assurance & Security 15(Issue 1) (2020), p1\u201316. 16p."}],"container-title":["International Journal of Hybrid Intelligent Systems"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/HIS-200289","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T08:52:50Z","timestamp":1777452770000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/HIS-200289"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,5]]},"references-count":11,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.3233\/his-200289","relation":{},"ISSN":["1448-5869","1875-8819"],"issn-type":[{"value":"1448-5869","type":"print"},{"value":"1875-8819","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,2,5]]}}}