Dorri, A., Steger, M., Kanhere, S., and Jurdak, R. (2017).
Blockchain: A distributed solution to automotive se-
curity and privacy. volume 55, pages 119–125.
Du, L., Chen, L., Hou, X., and Chen, Y. (2019). Coop-
erative vehicle localization base on extended kalman
filter in intelligent transportation system. In 2019
28th Wireless and Optical Communications Confer-
ence (WOCC), pages 1–5.
Falco, G. and Siegel, J. E. (2020). Assuring automotive
data and software integrity employing distributed hash
tables and blockchain.
Firoozi, R., Nazari, S., Guanetti, J., O’Gorman, R., and
Borrelli, F. (2019). Safe adaptive cruise control with
road grade preview and V2V communication. In 2019
American Control Conference (ACC), pages 4448–
4453.
Florea, B. C. and Taralunga, D. D. (2020). Blockchain
iot for smart electric vehicles battery management.
12(10):3984.
Garc
´
ıa Ortiz, J. C., Silvestre-Blanes, J., Sempere-Paya, V.,
and Tortajada, R. P. (2020). Feasability of bluetooth
5.0 connectionless communications for i2v applica-
tions. In 2020 25th IEEE International Conference
on Emerging Technologies and Factory Automation
(ETFA), pages 1119–1122.
Hsin-Te, W., Li, W.-S., Tung-Shih, S., and Hsiehz, W.-S.
(2010). A novel rsu-based message authentication
scheme for vanet. In 2010 Fifth International Con-
ference on Systems and Networks Communications,
pages 111–116.
Hubaux, J. P., Capkun, S., and Luo, J. (2004). The security
and privacy of smart vehicles. volume 2, pages 49–55.
Huybrechts, T., Vanommeslaeghe, Y., Blontrock, D., Barel,
G. V., and Hellinckx, P. (2017). Automatic reverse
engineering of CAN bus data using machine learn-
ing techniques. pages 751–761. Springer International
Publishing.
InnoMaker (2021). Usb2can.
IOTA (2021a). Hornet: Hornet.
IOTA (2021b). Iota homepage.
IOTA-Community (2021). Python iota workshop.
iotaledger (2021). One-click tangle.
Javed, M. U., Rehman, M., Javaid, N., Aldegheishem, A.,
Alrajeh, N., and Tahir, M. (2020). Blockchain-based
secure data storage for distributed vehicular networks.
10(6):2011.
Lindsay, J. (2018). Smart contracts for incentivizing sensor
based mobile smart city applications. In 2018 IEEE
International Smart Cities Conference (ISC2), pages
1–4.
M., C. and Lee, J. (2011). Ppas: A privacy preservation au-
thentication scheme for vehicle-to-infrastructure com-
munication networks. In 2011 International Confer-
ence on Consumer Electronics, Communications and
Networks (CECNet), pages 1509–1512.
Mazloom, S., Rezaeirad, M., Hunter, A., and McCoy, D.
(2016). A security analysis of an in-vehicle infotain-
ment and app platform. In 10th USENIX Workshop on
Offensive Technologies (WOOT 16).
Mekliche, K. and Moussaoui, S. (2013). Location-based
privacy-preserving detection of sybil attacks. In 2013
11th International Symposium on Programming and
Systems (ISPS), pages 187–192.
Miller, C. and Valasek, C. (2013). Adventures in automotive
networks and control units. 21(260-264):15–31.
Miller, C. and Valasek, C. (2014). A survey of remote auto-
motive attack surfaces. 2014:94.
MIller, C. and Valasek, C. (2015). Remote exploitation of
an unaltered passenger vehicle.
Montes, J. M., Ramirez, C. E., Gutierrez, M. C., and Larios,
V. M. (2019). Smart contracts for supply chain appli-
cable to smart cities daily operations. In 2019 IEEE
International Smart Cities Conference (ISC2), pages
565–570.
Rahtore, H., Mohamed, A., and Guizani, M. (2020). A
survery of blockchain enabled cyber-physical sys-
tems. volume 20.
Security, U. (2020). Upstream security’s 2020 global auto-
motive cybersecurity report.
T. W. Chim, S. M. Yiu, L. C. K. H. and Li, V. O. K. (2009).
Security and privacy issues for inter-vehicle commu-
nications in vanets. In 2009 6th IEEE Annual Com-
munications Society Conference on Sensor, Mesh and
Ad Hoc Communications and Networks Workshops,
pages 1–3.
Tracey, D. and Sreenan, C. (2019). Using a dht in a peer to
peer architecture for the internet of things. In 2019
IEEE 5th World Forum on Internet of Things (WF-
IoT), pages 560–565.
Tyagi, A. K. and Sreenath, N. (2015). Location privacy
preserving techniques for location based services over
road networks. In 2015 International Conference
on Communications and Signal Processing (ICCSP),
pages 1319–1326.
Wang, J., Ma, F., Yang, Y., Nie, J., ksun Guvenc, B., and
Guvenc, L. Adaptive event-triggered platoon control
under unreliable communication links.
Wen, Q., Chen, A., and Lin, Z. (2020). Plug-n-pwnded:
Comprehensive vulnerability analysis of obd-ii don-
gles as a new over-the-air attack surface in automotive
iot. In 29th USENIX Security Symposium (USENIX
Security 20), pages 949–965.
Xu, R., Nikouei, S. Y., Chen, Y., Blasch, E., and Aved,
A. (2019). Blendmas: A blockchain-enabled decen-
tralized microservices architecture for smart public
safety. In 2019 IEEE International Conference on
Blockchain (Blockchain), pages 564–571.
Zhu, K. and Zhang, L. (2020). Security analysis of LTE-
V2X and a platooning case study. In IEEE INFOCOM
2020 - IEEE Conference on Computer Communica-
tions Workshops (INFOCOM WKSHPS), pages 532–
537.
TEEm: A Tangle-based Elastic Emulator for Storing Connected Vehicle Data in a Distributed Ledger Technology
241