{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T16:14:07Z","timestamp":1774541647684,"version":"3.50.1"},"reference-count":139,"publisher":"MDPI AG","issue":"23","license":[{"start":{"date-parts":[[2021,11,27]],"date-time":"2021-11-27T00:00:00Z","timestamp":1637971200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Internet of Vehicles (IoV) has emerged as an advancement over the traditional Vehicular Ad-hoc Networks (VANETs) towards achieving a more efficient intelligent transportation system that is capable of providing various intelligent services and supporting different applications for the drivers and passengers on roads. In order for the IoV and VANETs environments to be able to offer such beneficial road services, huge amounts of data are generated and exchanged among the different communicated entities in these vehicular networks wirelessly via open channels, which could attract the adversaries and threaten the network with several possible types of security attacks. In this survey, we target the authentication part of the security system while highlighting the efficiency of blockchains in the IoV and VANETs environments. First, a detailed background on IoV and blockchain is provided, followed by a wide range of security requirements, challenges, and possible attacks in vehicular networks. Then, a more focused review is provided on the recent blockchain-based authentication schemes in IoV and VANETs with a detailed comparative study in terms of techniques used, network models, evaluation tools, and attacks counteracted. Lastly, some future challenges for IoV security are discussed that are necessary to be addressed in the upcoming research.<\/jats:p>","DOI":"10.3390\/s21237927","type":"journal-article","created":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T01:45:02Z","timestamp":1638323102000},"page":"7927","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":64,"title":["Blockchain-Based Authentication in Internet of Vehicles: A Survey"],"prefix":"10.3390","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2287-3801","authenticated-orcid":false,"given":"Sohail","family":"Abbas","sequence":"first","affiliation":[{"name":"Department of Computer Science, College of Computing and Informatics, University of Sharjah, Sharjah 27272, United Arab Emirates"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Manar Abu","family":"Talib","sequence":"additional","affiliation":[{"name":"Department of Computer Science, College of Computing and Informatics, University of Sharjah, Sharjah 27272, United Arab Emirates"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5405-7190","authenticated-orcid":false,"given":"Afaf","family":"Ahmed","sequence":"additional","affiliation":[{"name":"College of Engineering, Al Ain University, Al Ain 64141, United Arab Emirates"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6220-0225","authenticated-orcid":false,"given":"Faheem","family":"Khan","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Gachon University, Seongnam-si 13120, Korea"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8788-2717","authenticated-orcid":false,"given":"Shabir","family":"Ahmad","sequence":"additional","affiliation":[{"name":"Department of IT Convergence Engineering, Gachon University, Seongnam-si 13120, Korea"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Do-Hyeun","family":"Kim","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Jeju National University, Jeju 63243, Korea"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"1968","published-online":{"date-parts":[[2021,11,27]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"148163","DOI":"10.1109\/ACCESS.2019.2946468","article-title":"DeepCrash: A deep learning-based Internet of vehicles system for head-on and single-vehicle accident detection with emergency notification","volume":"7","author":"Chang","year":"2019","journal-title":"IEEE Access"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Dandala, T.T., Krishnamurthy, V., and Alwan, R. (2017, January 10\u201311). Internet of Vehicles (IoV) for traffic management. Proceedings of the 2017 International Conference on Computer, Communication and Signal Processing (ICCCSP), Chennai, India.","DOI":"10.1109\/ICCCSP.2017.7944096"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Vijayaraghavan, V., and Leevinson, J.R. (2020). Intelligent traffic management systems for next generation IoV in smart city scenario. Connected Vehicles in the Internet of Things, Springer.","DOI":"10.1007\/978-3-030-36167-9_6"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Khan, Z., Koubaa, A., and Farman, H. (2020). Smart route: Internet-of-vehicles (iov)-based congestion detection and avoidance (iov-based cda) using rerouting planning. Appl. Sci., 10.","DOI":"10.3390\/app10134541"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"6473","DOI":"10.1109\/ACCESS.2018.2887076","article-title":"Deployment of IoV for smart cities: Applications, architecture, and challenges","volume":"7","author":"Ang","year":"2018","journal-title":"IEEE Access"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Hamid, U.Z.A., Zamzuri, H., and Limbu, D.K. (2019). Internet of vehicle (IoV) applications in expediting the implementation of smart highway of autonomous vehicle: A survey. Performability in Internet of Things, Springer.","DOI":"10.1007\/978-3-319-93557-7_9"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"3511","DOI":"10.1109\/TITS.2020.2973878","article-title":"Link optimization in software defined IoV driven autonomous transportation system","volume":"22","author":"Sodhro","year":"2020","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1109\/JIOT.2018.2875750","article-title":"Deployment and dimensioning of fog computing-based internet of vehicle infrastructure for autonomous driving","volume":"6","author":"Yu","year":"2018","journal-title":"IEEE Internet Things J."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Gupta, N., Prakash, A., and Tripathi, R. (2021). Internet of Vehicles and Its Applications in Autonomous Driving, Springer.","DOI":"10.1007\/978-3-030-46335-9"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"10997","DOI":"10.1109\/ACCESS.2020.2964029","article-title":"A new vehicular fog computing architecture for cooperative sensing of autonomous driving","volume":"8","author":"Du","year":"2020","journal-title":"IEEE Access"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Raja, G., Dhanasekaran, P., Anbalagan, S., Ganapathisubramaniyan, A., and Bashir, A.K. (2020, January 6\u20139). SDN-enabled traffic alert system for IoV in smart cities. Proceedings of the IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Toronto, ON, Canada.","DOI":"10.1109\/INFOCOMWKSHPS50562.2020.9162888"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Nouh, R., Singh, M., and Singh, D. (2021). SafeDrive: Hybrid recommendation system architecture for early safety predication using Internet of Vehicles. Sensors, 21.","DOI":"10.3390\/s21113893"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"7232","DOI":"10.1109\/TITS.2020.3004655","article-title":"Driver behavior monitoring and warning with dangerous driving detection based on the internet of vehicles","volume":"22","author":"Chen","year":"2020","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"2441","DOI":"10.1109\/JIOT.2018.2847249","article-title":"Secure and privacy-aware incentives-based witness service in social Internet of Vehicles clouds","volume":"5","author":"Hussain","year":"2018","journal-title":"IEEE Internet Things J."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"2794","DOI":"10.1109\/COMST.2019.2899617","article-title":"A survey of blockchain technology applied to smart cities: Research issues and challenges","volume":"21","author":"Xie","year":"2019","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Biswas, K., and Muthukkumarasamy, V. (2016, January 12\u201314). Securing smart cities using blockchain technology. Proceedings of the IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC\/SmartCity\/DSS), Sydney, NSW, Australia.","DOI":"10.1109\/HPCC-SmartCity-DSS.2016.0198"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Ibba, S., Pinna, A., Seu, M., and Pani, F.E. (2017, January 22\u201326). CitySense: Blockchain-oriented smart cities. Proceedings of the XP2017 Scientific Workshops, Cologne, Germany.","DOI":"10.1145\/3120459.3120472"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1109\/JIOT.2020.2993601","article-title":"Blockchain for future smart grid: A comprehensive survey","volume":"8","author":"Mollah","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"1612","DOI":"10.1109\/TSMC.2019.2916565","article-title":"Energy crowdsourcing and peer-to-peer energy trading in blockchain-enabled smart grids","volume":"49","author":"Wang","year":"2019","journal-title":"IEEE Trans. Syst. Man Cybern. Syst."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"1285","DOI":"10.1109\/TEM.2019.2922936","article-title":"DeepCoin: A novel deep learning and blockchain-based energy exchange framework for smart grids","volume":"67","author":"Ferrag","year":"2019","journal-title":"IEEE Trans. Eng. Manag."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"3338","DOI":"10.1109\/JIOT.2020.2967119","article-title":"Sliding window blockchain architecture for internet of things","volume":"7","author":"Koshy","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"512","DOI":"10.1016\/j.future.2019.02.060","article-title":"Privacy preservation in blockchain based IoT systems: Integration issues, prospects, challenges, and future research directions","volume":"97","author":"Hassan","year":"2019","journal-title":"Futur. Gener. Comput. Syst."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Rathore, H., Mohamed, A., and Guizani, M. (2020). A survey of blockchain enabled cyber-physical systems. Sensors, 20.","DOI":"10.3390\/s20010282"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1016\/j.mfglet.2019.05.003","article-title":"A blockchain enabled Cyber-Physical System architecture for Industry 4.0 manufacturing systems","volume":"20","author":"Lee","year":"2019","journal-title":"Manuf. Lett."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"1098","DOI":"10.1109\/JIOT.2019.2951007","article-title":"Blockchain-based trustworthy edge caching scheme for mobile cyber-physical system","volume":"7","author":"Xu","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"353","DOI":"10.1007\/978-981-15-0187-6_41","article-title":"An overview of blockchain-based swarm robotics system","volume":"572","author":"Du","year":"2020","journal-title":"Artif. Intell. China"},{"key":"ref_27","unstructured":"Ferrer, E.C. (2018, January 13\u201314). The blockchain: A new framework for robotic swarm systems. Proceedings of the Future Technologies Conference, Vancouver, BC, Canada."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"102364","DOI":"10.1016\/j.scs.2020.102364","article-title":"Convergence of blockchain and artificial intelligence in IoT network for the sustainable smart city","volume":"63","author":"Singh","year":"2020","journal-title":"Sustain. Cities Soc."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Chen, X., Ji, J., Luo, C., Liao, W., and Li, P. (2018, January 10\u201313). When machine learning meets blockchain: A decentralized, privacy-preserving and secure design. Proceedings of the 2018 IEEE International Conference on Big Data (Big Data), Seattle, WA, USA.","DOI":"10.1109\/BigData.2018.8622598"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/MWC.001.1900108","article-title":"Distributed security architecture based on blockchain for connected health: Architecture, challenges, and approaches","volume":"26","author":"Wang","year":"2019","journal-title":"IEEE Wirel. Commun."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Ramani, V., Kumar, T., Bracken, A., Liyanage, M., and Ylianttila, M. (2018, January 9\u201313). Secure and efficient data accessibility in blockchain based healthcare systems. Proceedings of the 2018 IEEE Global Communications Conference (GLOBECOM), Abu Dhabi, United Arab Emirates.","DOI":"10.1109\/GLOCOM.2018.8647221"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"942","DOI":"10.1109\/TCSS.2018.2865526","article-title":"Blockchain-powered parallel healthcare systems based on the ACP approach","volume":"5","author":"Wang","year":"2018","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"4660","DOI":"10.1109\/JIOT.2018.2875542","article-title":"Blockchain for secure and efficient data sharing in vehicular edge computing and networks","volume":"6","author":"Kang","year":"2018","journal-title":"IEEE Internet Things J."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"8085","DOI":"10.1007\/s11042-019-08284-8","article-title":"Blockchain-based multimedia sharing in vehicular social networks with privacy protection","volume":"79","author":"Shi","year":"2020","journal-title":"Multimed. Tools Appl."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"3661","DOI":"10.1109\/TII.2019.2897364","article-title":"Computing resource trading for edge-cloud-assisted Internet of Things","volume":"15","author":"Li","year":"2019","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Qiao, G., Leng, S., Chai, H., Asadi, A., and Zhang, Y. (2019, January 20\u201324). Blockchain empowered resource trading in mobile edge computing and networks. Proceedings of the ICC 2019\u20142019 IEEE International Conference on Communications (ICC), Shanghai, China.","DOI":"10.1109\/ICC.2019.8761664"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"175744","DOI":"10.1109\/ACCESS.2019.2956955","article-title":"Proof-of-reputation based-consortium blockchain for trust resource sharing in internet of vehicles","volume":"7","author":"Chai","year":"2019","journal-title":"IEEE Access"},{"key":"ref_38","unstructured":"Wang, S., Huang, X., Yu, R., Zhang, Y., and Hossain, E. (2019). Permissioned blockchain for efficient and secure resource sharing in vehicular edge computing. arXiv."},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Al Amiri, W., Baza, M., Banawan, K., Mahmoud, M., Alasmary, W., and Akkaya, K. (2019, January 17\u201319). Privacy-preserving smart parking system using blockchain and private information retrieval. Proceedings of the 2019 International Conference on Smart Applications, Communications and Networking (SmartNets), Sharm El Sheikh, Egypt.","DOI":"10.1109\/SmartNets48225.2019.9069783"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"4122","DOI":"10.1109\/TII.2019.2954213","article-title":"Smart-contract-based economical platooning in blockchain-enabled urban internet of vehicles","volume":"16","author":"Chen","year":"2019","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"4573","DOI":"10.1109\/JIOT.2018.2868076","article-title":"Efficient and privacy-preserving carpooling using blockchain-assisted vehicular fog computing","volume":"6","author":"Li","year":"2018","journal-title":"IEEE Internet Things J."},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Li, M., Zhu, L., and Lin, X. (2019, January 23\u201325). CoRide: A privacy-preserving collaborative-ride hailing service using blockchain-assisted vehicular fog computing. Proceedings of the International Conference on Security and Privacy in Communication Systems, Orlando, VA, USA.","DOI":"10.1007\/978-3-030-37231-6_24"},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"1550147719870653","DOI":"10.1177\/1550147719870653","article-title":"Intelligent design and implementation of blockchain and Internet of things\u2013based traffic system","volume":"15","author":"Ren","year":"2019","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"1373","DOI":"10.1109\/TCSS.2019.2904633","article-title":"SCTSC: A semicentralized traffic signal control mode with attribute-based blockchain in IoVs","volume":"6","author":"Cheng","year":"2019","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"153349","DOI":"10.1109\/ACCESS.2019.2946978","article-title":"Digital forensics architecture for evidence collection and provenance preservation in iaas cloud environment using sdn and blockchain technology","volume":"7","author":"Pourvahab","year":"2019","journal-title":"IEEE Access"},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/MCOM.2018.1800137","article-title":"Block4forensic: An integrated lightweight blockchain framework for forensics applications of connected vehicles","volume":"56","author":"Cebe","year":"2018","journal-title":"IEEE Commun. Mag."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2017\/6562953","article-title":"Authentication protocols for internet of things: A comprehensive survey","volume":"2017","author":"Ferrag","year":"2017","journal-title":"Secur. Commun. Netw."},{"key":"ref_48","first-page":"19","article-title":"A survey on authentication schemes in VANETs for secured communication","volume":"9","author":"Manvi","year":"2017","journal-title":"Veh. Commun."},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"El-Hajj, M., Fadlallah, A., Chamoun, M., and Serhrouchni, A. (2019). A survey of internet of things (IoT) authentication schemes. Sensors, 19.","DOI":"10.3390\/s19051141"},{"key":"ref_50","first-page":"45","article-title":"Authentication and privacy schemes for vehicular ad hoc networks (VANETs): A survey","volume":"16","author":"Ali","year":"2019","journal-title":"Veh. Commun."},{"key":"ref_51","first-page":"100247","article-title":"Secure authentication and privacy-preserving techniques in Vehicular Ad-hoc NETworks (VANETs)","volume":"25","author":"Manivannan","year":"2020","journal-title":"Veh. Commun."},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"54314","DOI":"10.1109\/ACCESS.2020.2981397","article-title":"Authentication protocols in internet of vehicles: Taxonomy, analysis, and challenges","volume":"8","author":"Bagga","year":"2020","journal-title":"IEEE Access"},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Kumar, S., Velliangiri, S., Karthikeyan, P., Kumari, S., Kumar, S., and Khan, M.K. (2021). A survey on the blockchain techniques for the Internet of Vehicles security. Trans. Emerg. Telecommun. Technol., e4317.","DOI":"10.1002\/ett.4317"},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s13638-021-01958-8","article-title":"A survey: Applications of blockchain in the Internet of Vehicles","volume":"2021","author":"Wang","year":"2021","journal-title":"Eurasip J. Wirel. Commun. Netw."},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"106646","DOI":"10.1016\/j.compeleceng.2020.106646","article-title":"Survey on blockchain-based applications in internet of vehicles","volume":"84","author":"Mendiboure","year":"2020","journal-title":"Comput. Electr. Eng."},{"key":"ref_56","first-page":"3701","article-title":"Internet of vehicles: Architecture, protocols, and security","volume":"5","author":"Zeadally","year":"2017","journal-title":"IEEE Internet Things J."},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"5356","DOI":"10.1109\/ACCESS.2016.2603219","article-title":"Internet of vehicles: Motivation, layered architecture, network model, challenges, and future aspects","volume":"4","author":"Kaiwartya","year":"2016","journal-title":"IEEE Access"},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1109\/MCOMSTD.001.1900053","article-title":"Survey on the internet of vehicles: Network architectures and applications","volume":"4","author":"Ji","year":"2020","journal-title":"IEEE Commun. Stand. Mag."},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1007\/s00521-018-3743-3","article-title":"Mutual authentication for vehicular network in complex and uncertain driving","volume":"32","author":"Xu","year":"2020","journal-title":"Neural Comput. Applic."},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s41650-017-0018-6","article-title":"Architecture and key technologies for Internet of Vehicles: A survey","volume":"2","author":"Yang","year":"2017","journal-title":"J. Commun. Inf. Netw."},{"key":"ref_61","doi-asserted-by":"crossref","unstructured":"Alouache, L., Nguyen, N., Aliouat, M., and Chelouah, R. (2018, January 23\u201326). Toward a hybrid SDN architecture for V2V communication in IoV environment. Proceedings of the 2018 Fifth International Conference on Software Defined Systems (SDS), Barcelona, Spain.","DOI":"10.1109\/SDS.2018.8370428"},{"key":"ref_62","first-page":"4","article-title":"A seven-layered model architecture for Internet of Vehicles","volume":"1","author":"Zeadally","year":"2017","journal-title":"J. Inf. Telecommun."},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"15679","DOI":"10.1109\/ACCESS.2018.2815989","article-title":"Fog based intelligent transportation big data analytics in the internet of vehicles environment: Motivations, architecture, challenges, and critical issues","volume":"6","author":"Darwish","year":"2018","journal-title":"IEEE Access"},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1016\/j.jnca.2019.06.018","article-title":"Blockchain for smart communities: Applications, challenges and opportunities","volume":"144","author":"Aggarwal","year":"2019","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_65","doi-asserted-by":"crossref","first-page":"148550","DOI":"10.1109\/ACCESS.2019.2946983","article-title":"SoK of used cryptography in blockchain","volume":"7","author":"Raikwar","year":"2019","journal-title":"IEEE Access"},{"key":"ref_66","doi-asserted-by":"crossref","first-page":"32077","DOI":"10.1088\/1742-6596\/1168\/3\/032077","article-title":"Research on the application of cryptography on the blockchain","volume":"1168","author":"Zhai","year":"2019","journal-title":"J. Phys. Conf. Ser."},{"key":"ref_67","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1016\/j.icte.2019.08.001","article-title":"Analysis of the main consensus protocols of blockchain","volume":"6","author":"Zhang","year":"2020","journal-title":"ICT Express"},{"key":"ref_68","doi-asserted-by":"crossref","unstructured":"Zheng, Z., Xie, S., Dai, H., Chen, X., and Wang, H. (2017, January 25\u201330). An overview of blockchain technology: Architecture, consensus, and future trends. Proceedings of the 2017 IEEE 6th International Congress on Big Data, BigData Congress 2017, Honolulu, HI, USA.","DOI":"10.1109\/BigDataCongress.2017.85"},{"key":"ref_69","doi-asserted-by":"crossref","first-page":"88700","DOI":"10.1109\/ACCESS.2020.2992467","article-title":"A tutorial and future research for building a blockchain-based secure communication scheme for internet of intelligent things","volume":"8","author":"Wazid","year":"2020","journal-title":"IEEE Access"},{"key":"ref_70","doi-asserted-by":"crossref","first-page":"4157","DOI":"10.1109\/JIOT.2020.3028368","article-title":"Blockchain for the internet of vehicles towards intelligent transportation systems: A survey","volume":"8","author":"Mollah","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref_71","first-page":"32","article-title":"Blockchain characteristics and consensus in modern business processes","volume":"13","author":"Viriyasitavat","year":"2019","journal-title":"J. Ind. Inf. Integr."},{"key":"ref_72","unstructured":"Begicheva, A., and Kofman, A. (2018). Fair proof of stake. Tech. Rep., 1\u201313."},{"key":"ref_73","doi-asserted-by":"crossref","unstructured":"Kumar, M.A., Radhesyam, V., and Srinivasarao, B. (2019, January 10\u201311). Front-End IoT application for the bitcoin based on proof of elapsed time (PoET). Proceedings of the 3rd International Conference on Inventive Systems and Control, ICISC 2019, Coimbatore, India.","DOI":"10.1109\/ICISC44355.2019.9036391"},{"key":"ref_74","doi-asserted-by":"crossref","first-page":"515","DOI":"10.1016\/j.future.2019.02.059","article-title":"Fork-free hybrid consensus with flexible Proof-of-Activity","volume":"96","author":"Liu","year":"2019","journal-title":"Futur. Gener. Comput. Syst."},{"key":"ref_75","unstructured":"NEM, T. (2021, June 18). Nem Technical Reference. Available online: https\/\/nem.io\/wpcontent\/themes\/nem\/files\/NEM_techRef.pdf."},{"key":"ref_76","first-page":"171","article-title":"A game-theoretic approach to storage offloading in PoC-based mobile blockchain mining","volume":"1","author":"Jiang","year":"2020","journal-title":"Proc. Int. Symp. Mob. Ad Hoc Netw. Comput."},{"key":"ref_77","doi-asserted-by":"crossref","unstructured":"Karantias, K., Kiayias, A., and Zindros, D. (2020). Proof-of-Burn BT\u2014Financial Cryptography and Data Security, Springer.","DOI":"10.1007\/978-3-030-51280-4_28"},{"key":"ref_78","doi-asserted-by":"crossref","unstructured":"Li, K., Li, H., Hou, H., Li, K., and Chen, Y. (2017, January 18\u201320). Proof of vote: A high-performance consensus protocol based on vote mechanism & consortium blockchain. Proceedings of the IEEE 19th Intl Conference on High Performance Computing and Communications, HPCC 2017, IEEE 15th Intl Conference on Smart City, SmartCity 2017 and IEEE 3rd Intl Conference on Data Science and Systems, DSS, Bangkok, Thailand.","DOI":"10.1109\/HPCC-SmartCity-DSS.2017.61"},{"key":"ref_79","doi-asserted-by":"crossref","first-page":"14743","DOI":"10.1007\/s10586-018-2387-5","article-title":"Analysis of blockchain technology: Pros, cons and SWOT","volume":"22","author":"Niranjanamurthy","year":"2019","journal-title":"Clust. Comput."},{"key":"ref_80","doi-asserted-by":"crossref","unstructured":"Vuji\u010di\u0107, D., Jagodi\u0107, D., and Ran\u0111i\u0107, S. (2018, January 21\u201323). Blockchain technology, bitcoin, and Ethereum: A brief overview. Proceedings of the 2018 17th International Symposium Infoteh-Jahorina (Infoteh), East Sarajevo, Bosnia and Herzegovina.","DOI":"10.1109\/INFOTEH.2018.8345547"},{"key":"ref_81","doi-asserted-by":"crossref","unstructured":"Lee, X.T., Khan, A., Sen Gupta, S., Ong, Y.H., and Liu, X. (2020, January 20\u201324). Measurements, analyses, and insights on the entire ethereum blockchain network. Proceedings of the Web Conference 2020, New York, NY, USA.","DOI":"10.1145\/3366423.3380103"},{"key":"ref_82","unstructured":"Cachin, C. (2016, January 25). Architecture of the hyperledger blockchain fabric. Proceedings of the Workshop on Distributed Cryptocurrencies and Consensus Ledgers, Chicago, IL, USA."},{"key":"ref_83","doi-asserted-by":"crossref","unstructured":"Benji, M., and Sindhu, M. (2019). A study on the Corda and Ripple blockchain platforms. Advances in Big Data and Cloud Computing, Springer.","DOI":"10.1007\/978-981-13-1882-5_16"},{"key":"ref_84","doi-asserted-by":"crossref","first-page":"A19","DOI":"10.2308\/ciia-52540","article-title":"How will blockchain technology impact auditing and accounting: Permissionless versus permissioned blockchain","volume":"13","author":"Liu","year":"2019","journal-title":"Curr. Issues Audit."},{"key":"ref_85","doi-asserted-by":"crossref","unstructured":"Tripathi, G., Ahad, M.A., and Sathiyanarayanan, M. (2019, January 12\u201314). The Role of Blockchain in Internet of Vehicles (IoV): Issues, challenges and opportunities. Proceedings of the 2019 International Conference on contemporary Computing and Informatics (IC3I), Singapore.","DOI":"10.1109\/IC3I46837.2019.9055613"},{"key":"ref_86","doi-asserted-by":"crossref","first-page":"1676","DOI":"10.1109\/COMST.2018.2886932","article-title":"Applications of blockchains in the internet of things: A comprehensive survey","volume":"21","author":"Ali","year":"2019","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_87","first-page":"7","article-title":"VANet security challenges and solutions: A survey","volume":"7","author":"Hasrouny","year":"2017","journal-title":"Veh. Commun."},{"key":"ref_88","doi-asserted-by":"crossref","first-page":"1777","DOI":"10.1109\/TITS.2020.2994972","article-title":"Internet of vehicles: Key technologies, network model, solutions and challenges with future aspects","volume":"22","author":"Qureshi","year":"2021","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_89","first-page":"100182","article-title":"A survey on internet of vehicles: Applications, security issues & solutions","volume":"20","author":"Sharma","year":"2019","journal-title":"Veh. Commun."},{"key":"ref_90","first-page":"5409","article-title":"A survey on security and privacy issues in IoV","volume":"10","author":"Garg","year":"2020","journal-title":"Int. J. Electr. Comput. Eng."},{"key":"ref_91","doi-asserted-by":"crossref","unstructured":"Abu Talib, M., Abbas, S., Nasir, Q., and Mowakeh, M.F. (2018). Systematic literature review on Internet-of-Vehicles communication security. Int. J. Distrib. Sens. Netw., 14.","DOI":"10.1177\/1550147718815054"},{"key":"ref_92","unstructured":"Abdus, S., Shadab, A., Mohammed, S., and Bokhari, M.U. (2018, January 14\u201316). Internet of Vehicles (IoV) requirements, attacks and countermeasures. Proceedings of the 5 International Conference on \"Computing for Sustainable Global Development\", New Delhi, India."},{"key":"ref_93","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1007\/s12243-016-0551-6","article-title":"Attacks and countermeasures in the internet of vehicles","volume":"72","author":"Sun","year":"2017","journal-title":"Ann. Telecommun."},{"key":"ref_94","doi-asserted-by":"crossref","unstructured":"Sun, Y., Wu, L., Wu, S., Li, S., Zhang, T., Zhang, L., Xu, J., and Xiong, Y. (2015, January 22\u201323). Security and privacy in the internet of vehicles. Proceedings of the 2015 International Conference on Identification, Information, and Knowledge in the Internet of Things (IIKI), Beijing, China.","DOI":"10.1109\/IIKI.2015.33"},{"key":"ref_95","doi-asserted-by":"crossref","first-page":"2985","DOI":"10.1109\/TITS.2015.2439292","article-title":"A security and privacy review of VANETs","volume":"16","author":"Qu","year":"2015","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_96","doi-asserted-by":"crossref","first-page":"7204","DOI":"10.1016\/j.ijhydene.2015.03.132","article-title":"Energy management and fault tolerant control strategies for fuel cell\/ultra-capacitor hybrid electric vehicles to enhance autonomy, efficiency and life time of the fuel cell system","volume":"40","author":"Aouzellag","year":"2015","journal-title":"Int. J. Hydrogen Energy"},{"key":"ref_97","doi-asserted-by":"crossref","unstructured":"Wu, W., Yang, Z., and Li, K. (2016). Internet of Vehicles and applications. Internet of Things, Elsevier.","DOI":"10.1016\/B978-0-12-805395-9.00016-2"},{"key":"ref_98","doi-asserted-by":"crossref","first-page":"21266","DOI":"10.1109\/ACCESS.2019.2894183","article-title":"Intrusion detection systems for intra-vehicle networks: A review","volume":"7","author":"Maple","year":"2019","journal-title":"IEEE Access"},{"key":"ref_99","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1016\/j.adhoc.2017.03.006","article-title":"A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV","volume":"61","author":"Sakiz","year":"2017","journal-title":"Ad Hoc Netw."},{"key":"ref_100","unstructured":"Hao, Y., Tang, J., and Cheng, Y. (2011, January 5\u20139). Cooperative Sybil attack detection for position based applications in privacy preserved VANETs. Proceedings of the 2011 IEEE Global Telecommunications Conference-GLOBECOM 2011, Houston, TX, USA."},{"key":"ref_101","first-page":"1","article-title":"A DTSA (detection technique against a sybil attack) protocol using SKC (session key based certificate) on VANET","volume":"7","author":"Lee","year":"2013","journal-title":"Int. J. Secur. Its Appl."},{"key":"ref_102","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1007\/s12083-016-0431-x","article-title":"A method for defensing against multi-source Sybil attacks in VANET","volume":"10","author":"Feng","year":"2017","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"ref_103","doi-asserted-by":"crossref","first-page":"1103","DOI":"10.1109\/TPDS.2011.263","article-title":"Footprint: Detecting Sybil attacks in urban vehicular networks","volume":"23","author":"Chang","year":"2012","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_104","doi-asserted-by":"crossref","unstructured":"Studer, A., Luk, M., and Perrig, A. (2007, January 17\u201321). Efficient mechanisms to provide convoy member and vehicle sequence authentication in VANETs. Proceedings of the 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops-SecureComm 2007, Nice, France.","DOI":"10.1109\/SECCOM.2007.4550363"},{"key":"ref_105","doi-asserted-by":"crossref","unstructured":"He, L., and Zhu, W.T. (2012, January 25\u201327). Mitigating DoS attacks against signature-based authentication in VANETs. Proceedings of the 2012 IEEE International Conference on Computer Science and Automation Engineering (CSAE), Zhangjiajie, China.","DOI":"10.1109\/CSAE.2012.6272951"},{"key":"ref_106","doi-asserted-by":"crossref","unstructured":"Al-Kahtani, M.S. (2012, January 12\u201314). Survey on security attacks in vehicular ad hoc networks (VANETs). Proceedings of the 2012 6th International Conference on Signal Processing and Communication Systems, Gold Coast, Australia.","DOI":"10.1109\/ICSPCS.2012.6507953"},{"key":"ref_107","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1007\/s11235-016-0222-y","article-title":"EIAS-CP: New efficient identity-based authentication scheme with conditional privacy-preserving for VANETs","volume":"65","author":"Xie","year":"2017","journal-title":"Telecommun. Syst."},{"key":"ref_108","doi-asserted-by":"crossref","unstructured":"Safi, S.M., Movaghar, A., and Mohammadizadeh, M. (2009, January 28\u201330). A novel approach for avoiding wormhole attacks in VANET. Proceedings of the 2009 Second International Workshop on Computer Science and Engineering, Qingdao, China.","DOI":"10.1109\/WCSE.2009.787"},{"key":"ref_109","doi-asserted-by":"crossref","first-page":"2182","DOI":"10.1109\/TVT.2013.2238566","article-title":"A cross-layer approach to privacy-preserving authentication in WAVE-enabled VANETs","volume":"62","author":"Biswas","year":"2013","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_110","unstructured":"Adjih, C., Raffo, D., and Muhlethaler, P. (2005, January 28). Attacks against OLSR: Distributed key management for security. Proceedings of the 2nd OLSR Interop\/Workshop, Palaiseau, France."},{"key":"ref_111","doi-asserted-by":"crossref","first-page":"45061","DOI":"10.1109\/ACCESS.2019.2909004","article-title":"An improved authentication scheme for internet of vehicles based on blockchain technology","volume":"7","author":"Wang","year":"2019","journal-title":"IEEE Access"},{"key":"ref_112","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1016\/j.jpdc.2020.11.003","article-title":"A blockchain-based Roadside Unit-assisted authentication and key agreement protocol for Internet of Vehicles","volume":"149","author":"Xu","year":"2021","journal-title":"J. Parallel Distrib. Comput."},{"key":"ref_113","doi-asserted-by":"crossref","first-page":"118541","DOI":"10.1109\/ACCESS.2019.2935149","article-title":"Delegated proof of stake with downgrade: A secure and efficient blockchain consensus algorithm with downgrade mechanism","volume":"7","author":"Yang","year":"2019","journal-title":"IEEE Access"},{"key":"ref_114","unstructured":"Blanchet, B. (2005). Proverif Automatic Cryptographic Protocol Verifier User Manual, Departement dInformatique, Ecole Normale Superieure."},{"key":"ref_115","doi-asserted-by":"crossref","unstructured":"Sharma, R., and Chakraborty, S. (2018, January 9\u201313). BlockAPP: Using blockchain for authentication and privacy preservation in IoV. Proceedings of the IEEE Globecom Workshops (GC Wkshps), Abu Dhabi, United Arab Emirates.","DOI":"10.1109\/GLOCOMW.2018.8644389"},{"key":"ref_116","first-page":"363","article-title":"Elliptic curve diffie-hellman key exchange algorithm for securing hypertext information on wide area network","volume":"4","author":"Ahirwal","year":"2013","journal-title":"Int. J. Comput. Sci. Inf. Technol."},{"key":"ref_117","doi-asserted-by":"crossref","unstructured":"Malik, N., Nanda, P., Arora, A., He, X., and Puthal, D. (2018, January 1\u20133). Blockchain based secured identity authentication and expeditious revocation framework for vehicular networks. Proceedings of the 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom\/BigDataSE, New York, NY, USA.","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00099"},{"key":"ref_118","first-page":"21","article-title":"Implementation of elliptic curve digital signature algorithm","volume":"2","author":"Khalique","year":"2010","journal-title":"Int. J. Comput. Appl."},{"key":"ref_119","doi-asserted-by":"crossref","unstructured":"Noh, J., Jeon, S., and Cho, S. (2020). Distributed blockchain-based message authentication scheme for connected vehicles. Electronics, 9.","DOI":"10.3390\/electronics9010074"},{"key":"ref_120","doi-asserted-by":"crossref","first-page":"3997","DOI":"10.1109\/TITS.2020.3002462","article-title":"Blockchain-based lightweight and secured V2V communication in the internet of vehicles","volume":"22","author":"Kamal","year":"2020","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_121","doi-asserted-by":"crossref","unstructured":"Benesty, J., Chen, J., Huang, Y., and Cohen, I. (2009). Pearson correlation coefficient. Noise Reduction in Speech Processing, Springer.","DOI":"10.1007\/978-3-642-00296-0_5"},{"key":"ref_122","doi-asserted-by":"crossref","first-page":"11815","DOI":"10.1109\/JIOT.2020.3002711","article-title":"A scalable protocol for driving trust management in internet of vehicles with blockchain","volume":"7","author":"Javaid","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_123","doi-asserted-by":"crossref","first-page":"101877","DOI":"10.1016\/j.sysarc.2020.101877","article-title":"Blockchain-based batch authentication protocol for Internet of Vehicles","volume":"113","author":"Bagga","year":"2021","journal-title":"J. Syst. Archit."},{"key":"ref_124","first-page":"15824","article-title":"Blockchain-enabled certificate-based authentication for vehicle accident detection and notification in intelligent transportation systems","volume":"1748","author":"Vangala","year":"2020","journal-title":"IEEE Sens. J."},{"key":"ref_125","unstructured":"Lin, C., He, D., Huang, X., Kumar, N., and Choo, K.-K.R. (2020). BCPPA: A blockchain-based conditional privacy-preserving authentication protocol for vehicular ad hoc networks. IEEE Trans. Intell. Transp. Syst., 1\u201313."},{"key":"ref_126","doi-asserted-by":"crossref","first-page":"5836","DOI":"10.1109\/TVT.2020.2972923","article-title":"An efficient decentralized key management mechanism for VANET with blockchain","volume":"69","author":"Ma","year":"2020","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_127","doi-asserted-by":"crossref","first-page":"2792","DOI":"10.1109\/TVLSI.2019.2929420","article-title":"A blockchain-based privacy-preserving authentication scheme for VANETs","volume":"27","author":"Lu","year":"2019","journal-title":"IEEE Trans. Very Large Scale Integr. Syst."},{"key":"ref_128","doi-asserted-by":"crossref","first-page":"139703","DOI":"10.1109\/ACCESS.2019.2941507","article-title":"A blockchain-based byzantine consensus algorithm for information authentication of the internet of vehicles","volume":"7","author":"Hu","year":"2019","journal-title":"IEEE Access"},{"key":"ref_129","doi-asserted-by":"crossref","first-page":"654","DOI":"10.1016\/j.disc.2018.10.041","article-title":"The epistemic gossip problem","volume":"342","author":"Cooper","year":"2019","journal-title":"Discrete Math."},{"key":"ref_130","doi-asserted-by":"crossref","first-page":"3775","DOI":"10.1109\/JIOT.2019.2892009","article-title":"BLA: Blockchain-assisted lightweight anonymous authentication for distributed vehicular fog services","volume":"6","author":"Yao","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_131","doi-asserted-by":"crossref","unstructured":"Kaur, K., Garg, S., Kaddoum, G., Gagnon, F., and Ahmed, S.H. (2019). Blockchain-based lightweight authentication mechanism for vehicular fog infrastructure. arXiv, 1\u20136.","DOI":"10.1109\/ICCW.2019.8757184"},{"key":"ref_132","doi-asserted-by":"crossref","first-page":"4146","DOI":"10.1109\/TII.2019.2948053","article-title":"BPAS: Blockchain-assisted privacy-preserving authentication system for vehicular ad hoc networks","volume":"16","author":"Feng","year":"2020","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_133","first-page":"102802","article-title":"EASBF: An efficient authentication scheme over blockchain for fog computing-enabled internet of vehicles","volume":"59","author":"Salah","year":"2021","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_134","doi-asserted-by":"crossref","first-page":"587","DOI":"10.1007\/s10623-015-0094-2","article-title":"The random oracle model: A twenty-year retrospective","volume":"77","author":"Koblitz","year":"2015","journal-title":"Des. Codes Cryptogr."},{"key":"ref_135","doi-asserted-by":"crossref","unstructured":"Armando, A., Basin, D., Boichut, Y., Chevalier, Y., Compagna, L., Cu\u00e9llar, J., Drielsma, P.H., H\u00e9am, P.-C., Kouchnarenko, O., and Mantovani, J. (2005, January 6\u201310). The AVISPA tool for the automated validation of internet security protocols and applications. Proceedings of the International Conference on Computer Aided Verification, Edinburgh, UK.","DOI":"10.1007\/11513988_27"},{"key":"ref_136","first-page":"981","article-title":"A blockchain-based privacy-preserving authentication scheme with anonymous identity in vehicular networks","volume":"22","author":"Wang","year":"2020","journal-title":"Int. J. Netw. Secur."},{"key":"ref_137","doi-asserted-by":"crossref","first-page":"2482","DOI":"10.1109\/ACCESS.2019.2962387","article-title":"Secure authentication and key management with blockchain in VANETs","volume":"8","author":"Tan","year":"2020","journal-title":"IEEE Access"},{"key":"ref_138","unstructured":"Pei, D., Salomaa, A., and Ding, C. (1996). Chinese Remainder Theorem: Applications in Computing, Coding, Cryptography, World Scientific."},{"key":"ref_139","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Tong, F., Xu, Y., Tao, J., and Cheng, G. (December, January 18). A privacy-preserving authentication scheme for VANETs based on consortium blockchain. Proceedings of the 2020 IEEE 92nd Vehicular Technology Conference (VTC2020-Fall), Victoria, BC, Canada.","DOI":"10.1109\/VTC2020-Fall49728.2020.9348497"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/21\/23\/7927\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T07:36:50Z","timestamp":1760168210000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/21\/23\/7927"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,27]]},"references-count":139,"journal-issue":{"issue":"23","published-online":{"date-parts":[[2021,12]]}},"alternative-id":["s21237927"],"URL":"https:\/\/doi.org\/10.3390\/s21237927","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,11,27]]}}}