Skip to main content
PLOS One logoLink to PLOS One
. 2022 Jun 3;17(6):e0267914. doi: 10.1371/journal.pone.0267914

STEB: A secure service trading ecosystem based on blockchain

Wei Liu 1,2, Wenlong Feng 1,*, Mengxing Huang 1,*, Yun Xu 3, Xiandong Zheng 1
Editor: Pandi Vijayakumar4
PMCID: PMC9165903  PMID: 35657907

Abstract

A service can be an intangible commodity in which no physical goods are transferred from the seller to the buyer. However, traditional trading platforms have many limitations in trading services due to dishonest buyers and brokers. In this paper, we propose a service trading ecosystem based on blockchain, named STEB, which combines blockchain, smart contract, encryption, and digital authentication techniques for service trading. In addition, a dual-chain architecture, which contains two types of blockchains, namely TraChain and SerChain, and a hierarchical encryption scheme of the data on the chain, are proposed to ensure the integrity of transaction data and fine-grained privacy protection of users. Furthermore, we describe a new set of smart contracts to ensure safe transactions for the entire service trading. Security analysis and simulation results confirm that the proposed STEB can achieve more efficient contract execution and enhance service transaction privacy.

1 Introduction

Technological progress and the accelerated growth of globalization have triggered consumer demand, leading to the rapid expansion of the complexity of the trade network. Service transaction [1] is the basic characteristic of modern service industry. Service-oriented, that is, physical, hardware, and software assets are transformed into abstract virtual services, in which users establish on-demand interactions, binding resources and operations. People can not only buy traditional real goods online, but also buy virtual services. For example, a service consumer chooses a service provider, hires it to handle the application for an invention patent, and pays the fee after the application is successful. Virtual services can be traded as commodities. With the rapid growth and widespread adoption of online services, our world has accumulated a lot of resources. Resources are created, discovered, linked, analyzed, and synthesized by billions of users distributed on the Internet, thereby generating new great value. Online service transactions break and eliminate the time and space limitations of traditional transactions, making it possible at anytime, at anywhere, and with anybody.

However, one of the major challenges faced by service transaction is the lack of trust among sellers and buyers. Most of the existing trust schemes require a trusted third party to handle the transaction process. Blockchain technology, a decentralized public ledger to record transactions, has recently attracted much interest in the general public. In 2008, Nakamoto [2] proposed a distributed ledger named blockchain originated from Bitcoin. With the rise of digital currencies such as Bitcoin, blockchain has become a new technology that is decentralized, secure, credible, non-tamperable, and traceable. The consensus mechanism [3] is used to complete the verification and confirmation of the transaction in a short time. Asymmetric encryption and chain structure [4] are used for encryption and decryption and to prevent tampering with the data in the block. Blockchain has now developed into a trustworthy decentralized platform, and has been widely used in the fields of finance, supply chain, data sharing [5], energy, healthcare [6, 7], vehicular ad hoc networks [8, 9], intellectual property protection [1012], the Internet of Things [13], and other fields [14].

In our previous study [15], we established an optimization of PBFT algorithm bsed on improved C4.5. On the basis of the previous research, we will continue to invest in the blockchain method to help the development of service transactions. We propose STEB, a decentralized service transaction system, implemented through consensus algorithms, encryption algorithms, and smart contracts on the blockchain. We aim to create a distributed, credible and secure trading environment for multi-party participants in service transactions. The main contributions of this paper can be summarized as follows:

  1. We propose a novelty secure blockchain-based service trading ecosystem, named STEB, and a new set of smart contracts, to enforce consensus among multi-participants safely without trusted third parties.

  2. We carefully design a dual-chain structure to be executed by smart contracts, different access rights are granted to data on the dual-chain to ensure both transaction data integrity and security.

  3. We represent a hierarchical encryption scheme of the data on the chain to achieve fine-grained privacy protection of users.

We verify the feasibility of the proposed STEB by implementing it on the Hyperledger Fabric network. Furthermore, the standard tool Hyperledger Caliper is used to illustrate the effectiveness and robustness of the proposed solution.

2 System model

As shown in Fig 1, STEB is a secure blockchain used for contract deployment, demand matching, consensus, and contract execution. Its main function is to ensure service transactions are carried out in a safe and reliable manner.

Fig 1. The structure of a typical system model.

Fig 1

2.1 Nodes

A user can be a Service Requester (SR), a Service Provider (SP), or both. SP is a service provider, registering for services, providing services for SR, and profiting from selling services.

2.1.1 SR node

Each one SRi is an end user who can access one or more services from the SP via STEB. A SRi uese one or more service request contracts, analyzes SP and its services, matches eligible services, and obtains data analysis results. When he receives feedback from STEB, he purchases services according to individual requirements. SR nodes only can read the information on SerChain, which are defined below.

2.1.2 SP node

Each one SPj should be authorized by STEB. The SPj can be human (e.g., individual software developer) or organization (e.g., company, research institute, or inspection organization). A SPj configures to register one or more services on the STEB. When the service is certified, SPj offers the services for sale. All SPj nodes form a consortium, and participate in consensus. The behavior of all SP nodes is restricted by the rules of the consortium. Authorized SP nodes can read the information on TraChain and SerChain, which is defined below, and generate transactions to chains.

2.2 Blockchain

There are two chains in STEB.

2.2.1 TraChain

It is a consortium blockchain. All SPs have to be authorized via STEB and form a consortium. Only SP nodes authorized by consortium can generate services as goods. SP joins TraChain to register services, provide services, read transactions, send transactions, and mine at any time. TraChain consists of a series of SPs, their service data, and their transaction records, and grows over time. Each block contains the hash of the previous block and services as goods generated by SPs.

2.2.2 SerChain

It is a consortium blockchain, which is used to publish transactions data. However, anyone can read the information on SerChain. SerChain consists of a series of service transactions blocks and grows over time. Each block contains the hash of the previous block and transactions generated by users.

2.3 Smart contracts

In the proposed system, three smart contracts, which are presented as Service Information Contract (SIC), SR Requirement Contract (SRC), and Service trading Management Contract (SMC) respectively, are used to manage services and transactions between users.

2.3.1 SIC

The main function of the smart contract SIC is to store and manage service information, which is used to register SP users and their services in the system. To achieve this function, SIC maintains a query table. This table registers the information required to find and execute all SPs and their services. It also stores the SR’s comments of the service after each service transaction is completed, and the transaction execution information (name, attributes, etc.). The query module helps potential buyers match suitable services and appropriate sellers based on the contract information in the SIC.

2.3.2 SRC

The main function of the smart contract SRC in the system is to receive and broadcast SR service demands. Whenever the SR requires any service, it will send a request to the system. The system receives SR demands and broadcasts them to SP nodes, which enables SP to know SR requirements. Every time SR generates a request, it deploys an SRC in response to the request. When the SR sends a service request to the system, the SRC is executed.

2.3.3 SMC

The main function of the smart contract SMC in the system is to manage service trading. SMC records SP’s service specifications, price, and trading states, and it also provides a query module for SR to check their service trading statement based on the contract information through trade ID.

3 Secure service trading ecosystem based on blockchain

3.1 Overview of STEB

In this section, we will give an overview of the framework. The overall interaction process of the proposed system is presented, which is shown in Fig 2. It contains three important smart contracts mentioned above, a dual-chain architecture, and the interaction process is divided into five stages, namely: initialization phase, requirement matching phase, service delivery phase, trade phase, and consensus phase.

Fig 2. The overall interaction process of the system.

Fig 2

3.2 Interaction process

Our main idea is to simulate SRi, SPj, with three smart contracts, and an appropriate consensus mechanism to complete online service transactions effectively and safely. There are five phases as follows.

3.2.1 Initialization phase

In this stage, participants register on STEB and generate their own parameters, such as public-private key pairs. The SP registers service information for sale. Without loss of generality, we assume that there are a total of n SRs.

SR={SR1,SR2,,SRn} (1)

Specifically, each SRi generates a ECDSA key pair:

(PKsri,SKsri) (2)

Its address Addri is computed by hashing its public key PKsri. We assume there are a total of m SPs:

SP={SP1,SP2,,SPm} (3)

Each SPj generates a ECDSA key pair:

(PKspj,SKspj) (4)

Its address Addrj is computed by hashing its public key PKspj. The SPj register one or more services:

S={S1,S2,,Sk} (5)

For a new SPj, it should be authorized. For a new service Sr, it should be certified. The relation between SPj and Sr can be represented by m × k matrix P which is represented as

P=[SP1S1SP1S2SP1SkSP2S1SP2S2SP2SkSPmS1SPmS2SPmSk] (6)

All Stateid are currently in the states of SRInitState and SPInitState, respectively.

3.2.2 Requirement matching phase

In this section, SR needs to find an appropriate service and its service provider through STEB. We define this process as the requirements matching phase. Algorithm 1 shows more detailed steps as follows. At this step, the smart contract SDC requires SR to send their requirements to it. Specifically, each SRi computes the hash value:

Hi=H(SRi||Addri||sid) (7)

For each SRi satisfies the basic condition, it needs to match the correct service and choose the most suitable SP who provides the service. We design the matching function H to calculate the matching value, then sort the calculation results in descending order, and return the recommendation list for the SR to choose. We assume a matching function H as:

H(SPjSr)=j=1mf(Sr)*wj-p (8)

where, f(Sr) represents the value of Sr, and wj is the weight, p is the punishment factor.

Algorithm 1 Requirement matching phase

1: require SRInitState, SPInitState, ServiceInitState

2: SRi request service

3: for r = 1 to k do

4:  S[r] = match(SRi, Sr)

5: end for

6: S[k] result in descending order

7: for j = 1 to m do

8:  Calculate H(SPjSk)

9:  if H(SPjSk)> = 0 then

10:   List[j] = H(SPjSk)

11:  else

12:   List[j] = 0

13:  end if

14: end for

15: Sort List in a descending order

16: return List

3.2.3 Service delivery phase

In this section, the SP delivers service to the SR’s business. The completion of the transaction is negotiated by both parties. When requirement matching is finished, the SR chooses the suitable service from the List. Then the selected SP delivers the specified service to SR. The service delivery process is negotiated by SP and SR. It can be done online or offline. After that, SR checks whether the service delivery satisfies their requirements. The process of service delivery phase is shown in Fig 3.

Fig 3. Service delivery phase.

Fig 3

3.2.4 Trade phase

In this phase, the smart contract automatically executes the transaction. Grant the user the evaluation authority of the service. If there is no dispute, transfer the deposit of the corresponding user to the provider. The smart contract requires the SR to pay the service to SP. If the SR rejects to pay, SP will get its payments as soon as time is reached.

3.2.5 Consensus phase

Since blockchain is a P2P network, each node may receive different transactions at a certain time. The consensus mechanism needs to determine when and which node to add new blocks to the blockchain for the transactions it receives. Since STEB is a consortium blockchain, we used the PBFT as the consensus of the blockchain. The PBFT model provides a Byzantine fault-tolerant algorithm that is resistant to malicious attacks and software errors caused by faulty and malicious nodes. In this paper, only authorized SP nodes participate in the consensus, and the set of SP nodes constitutes the consensus group. Nodes in the consensus group are sequentially ordered, the one node is selected as the primary (so-called leader node), and the others considered as secondary (so-called backup nodes). Every round of PBFT has three phases: pre-prepare phase, prepare phase, and commit phase, as shown in Fig 4.

Fig 4. Flowchart of PBFT algorithm.

Fig 4

3.3 Dual-chain architecture and hierarchical encryption

There are two chains in STEB, namely TraChain and SerChain. TraChain and SerChain have different permissions, allowing different levels of sensitivity to view user privacy data. This paper adopts hierarchical encryption method to protect the security of transactions and the privacy of users. Divide data into two parts: privacy data and public data:

  • Private data Datapri

    Including the user’s personal private information, transaction account address, and other private information.

  • Public data Datapub

    Including basic service information, service transaction data, transaction quantity, and other publicly available information.

SerChain nodes are only allowed to view Datapub, and TraChain nodes are allowed to view Datapub and Datapri. The hierarchical encryption process is as follows:

  • The first layer of encryption
    1. Generate public-private key pair for TraChain node A:
      (PKMCA/SKMCA) (9)
    2. Encrypt Datapri with a symmetric key KeyDES1 to form a ciphertext CTextDatapri.
      DatapriKeyDES1CTextDatapri (10)
    3. Encrypt the symmetric key KeyDES1 with public key PKMCA to form a cipherkey KeyDES1-PKMCA.
      KeyDES1PKMCA(KeyDES1-PKMCA) (11)
    4. Store Ciphertext CTextDatapri and cipherkey KeyDES1-PKMCA on the blockchain.
  • The second layer of encryption
    1. Generate public-private key pair for SerChain node B:
      (PKMCB/SKMCB) (12)
    2. Encrypt CTextDatapri and Datapub with a symmetric key KeyDES2 to form ciphertext CCTextDatapri and CTextDatapub, respectively.
      CTextDatapriKeyDES2CCTextDatapri (13)
      DatapubKeyDES2CTextDatapub (14)
    3. Encrypt the symmetric key KeyDES2 with public key PKMCA and PKMCB to form a cipherkey KeyDES2-PKMCA and KeyDES2-PKMCB, respectively.
      KeyDES2PKMCA(KeyDES2-PKMCA) (15)
      KeyDES2PKMCB(KeyDES2-PKMCB) (16)
    4. Store Ciphertext CCTextDatapri, CTextDatapub, KeyDES2-PKMCA, and KeyDES2-PKMCB on the blockchain. The hierarchical decryption process is as follows:
  • The first layer of decryption
    1. SerChain node C makes an acquisition request, and adds a timestamp, the format is as follows:
      RequestC=(DataC||Timestamp) (17)
    2. Identity verification of C is performed just once, when verified, the request data CTextDataC has been reply to C.
      ReplyC=(CTextDataC||Timestamp) (18)
    3. C read KeyDES2-PKMCB from blockchain, decrypt it with the private key, hence getting the key KeyDES2. Then decrypt CTextDataC with the symmetric key KeyDES2, hence getting the data CTextDatapri and Datapub.
      (KeyDES2-PKMCB)SKMCBKeyDES2 (19)
      CTextDataCKeyDES2(Datapub,CTextDatapri) (20)
      At this moment, SerChain node C can read Datapub, but CTextDatapri is a ciphertext and cannot be read directly. If there is an TraChain node D, which has greater permission, it needs to enter second layer of decryption.
  • The second layer of decryption
    1. TraChain node D makes an acquisition request, and adds a timestamp, the format is as follows:
      RequestD=(DataD||Timestamp) (21)
    2. Identity verification of D is performed, when verified, the requested data CTextDataD has been replied to D.
      ReplyD=(CTextDataD||Timestamp) (22)
    3. After the first layer of decryption, D gets the data as follows:
      CTextDataDKeyDES2(Datapub,CTextDatapri) (23)
    4. D get KeyDES1-PKMCA from blockchain, decrypt it with the private key, hence getting the key KeyDES1. Then decrypt CTextDatapri with the symmetric key KeyDES1, hence getting the data Datapri.
      CTextDatapriKeyDES1(Datapri) (24)
      After the second layer of decryption, TraChain node D can read Datapri and Datapub both.

4 Security and performance analysis

In this section, we experiment to validate the security analysis and simulation results of STEB.

4.1 Security analysis

STEB has defense ability against many traditional security attacks through dual-blockchain and standard cryptographic primitives including asymmetric and symmetric key-based encryption. The following blockchain-related security benefits can be satisfied in the proposed consortium blockchain enabled multi-party service trading scheme.

4.1.1 Privacy protection

Due to the dual-chain mechanism, the price and quantity of the sales service are only submitted to STEB without private information during the service transaction process. The hierarchical data encryption scheme authorizes users to have different access rights, thereby protecting their identity privacy and account information security. Due to the encryption and authentication mechanisms, the adversary cannot open the encrypted messages by launching brute force cryptanalytic attacks.

4.1.2 Auditability

Blockchain is a distributed ledger that records all operations and initiators in the process of service transactions, and cannot be tampered with. The interaction between sellers and buyers is verified and stored in a distributed P2P manner, without the need for the only trusted third party, making the system robust and scalable. Therefore, once the service transaction is committed, the SR cannot deny the transaction it initiated, nor the SP to deny the operation it initiated. Since a digital signature is only generated by a specific signer, any information with a digital signature can be authenticated and verified whether the signer is the sender or not. All entities verify the digital signature during the communication. Without the private key of the signer, any entity cannot counterfeit the digital signatures of other entities. Denials or illegal behaviors can be audited, analyzed, tracked and traced through digital signatures.

4.1.3 Integrity

Consortium blockchains are supervised, which means that entities participating in transactions can also be supervised. If one message is modified, the receivers can discover it during verification, which guarantees the integrity. While smart contracts SIC, SRC, and SMC have been deployed on the blockchain, and cannot be changed once deployed. All information exchanged between nodes cannot be tampered with, which means that all service transaction information and certification will not be tampered with. Therefore, when a dispute occurs in service transaction, the SR cannot deny his/her behavior, nor can the SP deny his/her behavior. Thus, our scheme could provide the security of transaction information and ensures the integrity of transaction information.

4.2 Performance analysis

We implement our prototype model to the Hyperledger Fabric [16] blockchain platform to evaluate the performance. Hyperledger Fabric is a modular and extensible open-source system for deploying and operating permissioned blockchains, which has a private and permissioned network and whose modular architecture maximizes blockchain secrecy, flexibility and facilitates decision-making capabilities. Hyperledger caliper, which is a benchmark framework that supports Transaction Latency (TL), Transaction Throughput (TT), and other performance analysis, is used to evaluate the performance of the proposed blockchain-based system. All the experiments were done on CentOS 7.8, 64bit with Intel Core i7, 10750Hz and 8G RAM.

4.2.1 Transaction latency

Transaction latency measures the time for a transaction from the point that it is submitted to the point that it is committed, including the propagation time and any time due to consensus mechanisms. Its calculation formula is as follows:

TL=tcommit-tsubmit (25)

where, tcommit represents the time when the transaction is committed, tsubmit represents the time to send a transaction proposal.

The proposed scheme is deployed on a Fabric blockchain simulation platform based on Docker. It contains five peer nodes and one ordering node. The endorsement policy is Peer 0: org 1 to Peer 0: org 5, which are both required to sign the transaction to determine the validity of the transaction.

Fig 5 describes the effect of the number from 1 to 5 of orgs on the average TL. It can be observed that the average latency of “CreateAccout” and “Query” increase slightly as the number of orgs grow. This means that the increase in orgs have little effect on them. The average latency of “Deal” increases linearly with the growth of org number. The average TL of “Deal” for the defined 1 to 5 org is 0.172 seconds (s). Likewise, in the case of 5 orgs, the average TL of “Deal” is increased from 0.24 to 10.46 seconds. The increase of endorsing nodes has a linearly related effect on transaction latency.

Fig 5. Transaction latency of the number from 1 to 5 of orgs.

Fig 5

According to existing blockchain-based research, the number of concurrent transactions is defined in the range of 200 to 2000 to evaluate transaction execution. Fig 6 describes the effect of the number of concurrent transactions on the average TL in the case of 2 peer nodes and 1 ordering node. We provide the number of transactions from 200 to 2000 to the blockchain system to evaluate the results of executing the transactions in terms of “CreateAccout”, “Query” and “Deal” latency. The average “CreateAccout” TL of the executing transactions for all 200, 1000, and 2000 is 0.23, 0.24, and 0.27 seconds, respectively. The average “Query” TL of the executing transactions for 200, 1000, and 2000 are 0.01, 0.01, and 0.01 seconds(s), respectively. Whereas, the average “Deal” TL of the executing transactions for 200, 1000, and 2000 are 0.36, 0.44, and 0.51 seconds(s), respectively. It can be observed that the average latency increases slightly with the growth of transaction number. The average latency fluctuates slightly at number of 1400 due to the test environment, but generally maintains a stable growth trend.

Fig 6. Transaction latency of the involved transactions from 200 to 2000.

Fig 6

4.2.2 Transaction throughput

Transaction throughput represents the rate at which valid transactions are committed by the blockchain in a defined time period. The throughput of a given blockchain is defined by transactions per second (TPS). Its calculation formula is as follows:

TT=transactionsΔt (26)

where, transactions is the number of transactions that written to the blockchain.

Similarly, in Fig 7, the effect of the number from 1 to 5 of orgs on transaction throughput are analyzed based on average performance of the proposed system. It can be observed that the average transaction throughput of “CreateAccout”, “Query” and “Deal” decrease linearly with the growth of org number. The increase of endorsing nodes has a linearly related effect on transaction throughput. When the number of endorsing nodes increases, more nodes participate in the consensus process. It takes more time to complete transaction query, commit, deal, and consensus, but the overall trend remains stable approximately.

Fig 7. Transaction throughputs of the number from 1 to 5 of orgs.

Fig 7

In Fig 8, the effect of the number of concurrent transactions on transaction throughput in the case of 2 peer nodes and 1 ordering node are analyzed based on average performance of the proposed system. The average “CreateAccout” TT of the executing transactions for 200, 1000, and 2000 are 162.9, 180.8, and 179.4 TPS, respectively. The average “Query” TL of the executing transactions for 200, 1000, and 2000 are 277.8, 283.1, and 292.3 TPS, respectively. Whereas, the average “Deal” TL of the executing transactions for 200, 1000, and 2000 are 141.6, 155.7, and 154.3 TPS, respectively. It can be observed that during the process of increasing the number of concurrent transactions from 200 to 2000, the throughput fluctuated slightly under the influence of the test environment, but the overall trend has remained stable.

Fig 8. Transaction throughputs of the involved transactions from 200 to 2000.

Fig 8

In practice, both latency and throughput factors are need to be comprehensively considered. Long-term transaction response will affect system response time and users’ experience. Small throughput will cause a large number of transactions to be queued. From Figs 5 and 7, the average latency and transaction throughput performance remain stable as the number of org increases. Similarly, from Figs 6 and 8, with the growth of transaction numbers, the TT of the proposed system is increased, but it also increased TL due to transmitting an increasing number of consensus messages. The increase curve is stable and linear, indicating the stability and efficiency of the proposed scheme.

5 Conclusion

In this paper, we propose a secure service trading ecosystem based on blockchain that provides a secure and trusted transaction environment for multi-participants. A new set of smart contracts to ensure safe transactions is described for the entire service trading. A dual-chain architecture and a hierarchical encryption scheme of the data on the chain are proposed to protect the integrity of transaction data and fine-grained privacy protection of users. Security analysis and performance evaluation on the Hyperledger Fabric blockchain platform confirms the effectiveness and feasibility, and simulation results indicate that the proposed STEB can achieve more efficient contract execution and enhance service transaction privacy.

Data Availability

All relevant data are within the manuscript.

Funding Statement

The author(s) received no specific funding for this work.

References

  • 1. Li X, Zheng Z, Dai HN. When services computing meets blockchain: Challenges and opportunities. Journal of Parallel and Distributed Computing. 2021;150:1–14. doi: 10.1016/j.jpdc.2020.12.003 [DOI] [Google Scholar]
  • 2. Nakamoto S. Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review. 2008;p.21260. [Google Scholar]
  • 3.Zheng X, Feng W. Research on practical byzantine fault tolerant consensus algorithm based on blockchain. Journal of Physics: Conference Series. vol.1802. IOP Publishing. 2021;p.032022.
  • 4. Zheng Z, Xie S, Dai HN, Chen W, Chen X, Weng J, et al. An overview on smart contracts: Challenges, advances and platforms. Future Generation Computer Systems. 2020;105:475–491. doi: 10.1016/j.future.2019.12.019 [DOI] [Google Scholar]
  • 5. Dai W, Dai C, Choo KKR, Cui C, Zou D, Jin H. SDTE: A secure blockchain-based data trading ecosystem. IEEE Transactions on Information Forensics and Security. 2019;15:725–737. doi: 10.1109/TIFS.2019.2928256 [DOI] [Google Scholar]
  • 6. Xiao Y, Xu B, Jiang W, Wu Y. The HealthChain blockchain for electronic health records: Development study. Journal of Medical Internet Research. 2021;23(1):e13556. doi: 10.2196/13556 [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 7. Azees M, Vijayakumar P, Karuppiah M, Nayyar A. An efficient anonymous authentication and confidentiality preservation schemes for secure communications in wireless body area networks. Wireless Networks. 2021;27(3):2119–2130. doi: 10.1007/s11276-021-02560-y [DOI] [Google Scholar]
  • 8. Vijayakumar P, Azees M, Kannan A, Deborah LJ. Dual authentication and key management techniques for secure data transmission in vehicular ad hoc networks. IEEE Transactions on Intelligent Transportation Systems. 2015;17(4):1015–1028. doi: 10.1109/TITS.2015.2492981 [DOI] [Google Scholar]
  • 9. Azees M, Vijayakumar P, Deboarh LJ. EAAP: Efficient anonymous authentication with conditional privacy-preserving scheme for vehicular ad hoc networks. IEEE Transactions on Intelligent Transportation Systems. 2017;18(9):2467–2476. doi: 10.1109/TITS.2016.2634623 [DOI] [Google Scholar]
  • 10.Ahamed ABS, Kanagaraj N, Azees M. EMBA: An efficient anonymous mutual and batch authentication schemes for vanets. 2018 Second International Conference on Inventive Communication and Computational Technologies(ICICCT). 2018;1320–1326.
  • 11. Vijayakumar P, Azees M, Kozlov SA, Rodrigues JJ. An anonymous batch authentication and key exchange protocols for 6G enabled VANETs. IEEE Transactions on Intelligent Transportation Systems. 2022;23(2):1630–1638. doi: 10.1109/TITS.2021.3099488 [DOI] [Google Scholar]
  • 12. Maria A, Pandi V, Lazarus JD, Karuppiah M, Christo MS. BBAAS: Blockchain-based anonymous authentication scheme for providing secure communication in VANETs. Security and Communication Networks. 2021;p.6679882. [Google Scholar]
  • 13. Hou L, Xu X, Zheng K, Wang X. An intelligent transaction migration scheme for RAFT-based private blockchain in internet of things applications. IEEE Communications Letters. 2021;25(8):2753–2757. doi: 10.1109/LCOMM.2021.3079201 [DOI] [Google Scholar]
  • 14. Wu S, Chen Y, Wang Q, Li M, Wang C, Luo X. CReam: A smart contract enabled collusion-resistant e-auction. IEEE Transactions on Information Forensics and Security. 2018;14(7):1687–1701. doi: 10.1109/TIFS.2018.2883275 [DOI] [Google Scholar]
  • 15. Zheng X, Feng W, Huang M, Feng S. Optimization of PBFT algorithm based on improved C4.5. Mathematical Problems in Engineering. 2021;p.5542078. [Google Scholar]
  • 16.Androulaki E, Barger A, Bortnikov V, Cachin C, Christidis K, De Caro A, et al. Hyperledger fabric: a distributed operating system for permissioned blockchains. Proceedings of The Thirteenth EuroSys Conference. 2018;1–15.

Associated Data

This section collects any data citations, data availability statements, or supplementary materials included in this article.

Data Availability Statement

All relevant data are within the manuscript.


Articles from PLoS ONE are provided here courtesy of PLOS

RESOURCES