This content is not included in
your SAE MOBILUS subscription, or you are not logged in.
Applying Blockchain to Vehicle Cybersecurity: Nuance to the Standard Application
Technical Paper
2022-01-0368
ISSN: 0148-7191, e-ISSN: 2688-3627
Annotation ability available
Sector:
Language:
English
Abstract
Bitcoin and other digital currencies utilize blockchain. Blockchain, in summary, is a collection of blocks. Within each block is a collection of transactions. Each computer (node) has the same list of blocks and transactions, which they can see as the blocks are filled with the transactions. While this is the traditional application experienced, there are other applications relevant to cybersecurity. As part of the blockchain technology, the nodes are responsible for decision-making. The blockchain technology may be used for this function in these systems. In adjusting the data flow, this is an option to increase the cybersecurity for a complete system. This addition to the cybersecurity system provides a clear benefit.
Recommended Content
Authors
Citation
Parker, C., "Applying Blockchain to Vehicle Cybersecurity: Nuance to the Standard Application," SAE Technical Paper 2022-01-0368, 2022, https://doi.org/10.4271/2022-01-0368.Also In
References
- Mendiboure , L. , Chalouf , M.A. , and Krief , F. Survey on Blockchain-Based Application in Vehicles Computers & Electrical Engineering 84 2020 https://doi.org/10.10/16/j.compeleceng.2020.106646
- Nelson , D. https://www.coindesk.com/Thailand-blockchain-court-of-justice
- Delong , J. https://www.reporter.am/a-malaysian-company-is-developing-a-blockchain-based-app-for-charities/
- Wright , T. https://cointelegraph.com/news/blockchain-voting-hailed-a-success-at-michigan-democrat-convention
- Faridi , O. https://www.crowdfundinsider.com/2020/09/166348-mobile-banking-app-offered-by-south-koreas-shinhan-bank-now-uses-blockchain-based-decentralized-id-authentication/
- Zhang , H. , Deng , E. , Zhu , H. , and Cao , Z. Smart Contract for Secure Billing in Ride-Hailing Services via Blockchain Peer-to-Peer Networking and Applications 12 5 2019 1346 1357 https://doi.org/10.1007/s12083-018-0694-5
- Lee , B. and Lee , J. Blockchain-Based Secure Firmware Update for Embedded Devices in an Internet of Things Environment The Journal of Supercomputing 73 2016 1152 1167
- Rathee , G. , Sharma , A. , Iqbal , R. , Aloqaily , M. et al. A Blockchain Framework for Securing Connected and Autonomous Vehicles Sensors 19 14 2019 https://www.doi.org/10.3390/s19143165
- Orcutt , M. https://www.technologyreview.com/2019/02/19/239592/once-hailed-as-unhackable-blockchains-are-now-getting-hacked/amp/
- Seifreid , K. https://cloudsecurityalliance.org/blog/2020/10/26/blockchain-attack-vulnerabilities-and-weaknesses/
- Amiet , N. Blockchain Vulnerabilities in Practice Digital Threats: Research and Practice 2 2 2021 Article 8 https://doi.org/10.1145/3407230 https://dl.acm.org/doi/fullHtm/10.1145/3407230
- Quentson , A. https://cch.com/4-lines-defence-51-attack/
- Thompson , P. https://coingeek.com/ethereum-classic-implements-51-attack-defense/