V-track: Blockchain-enabled IoT system for reliable vehicle location verification

Mritunjay Shall Peelam , Kunjan Shah , Vinay Chamola

›› 2026, Vol. 12 ›› Issue (1) : 119 -133.

PDF
›› 2026, Vol. 12 ›› Issue (1) :119 -133. DOI: 10.1016/j.dcan.2024.08.004
Special issue on cyber-physical systems for intelligent transportation and smart cities
research-article

V-track: Blockchain-enabled IoT system for reliable vehicle location verification

Author information +
History +
PDF

Abstract

Location-Based Services (LBS) have greatly improved efficiency and functionality in various domains, but privacy and security concerns remain due to the centralized nature of many existing systems. To address these issues, this paper introduces the V-Track system, a decentralized architecture using blockchain technology for reliable vehicle location verification. By integrating GPS devices (SparkFun GPS NEO-M9), IoT-enabled sensors, and a Cosmos blockchain-based ledger (network of interconnected blockchains), V-Track aims to solve centralized LBS problems. Through rigorous simulation experiments, this paper evaluates the performance and security of the V-Track system and demonstrates its potential to provide reliable location verification while preserving user privacy. This paper makes significant contributions by presenting V-Track as a decentralized solution to centralized LBS privacy and security problems, enhancing reliability and trustworthiness through blockchain integration, improving tracking mechanisms with GPS devices and IoT sensors for improved accuracy, and providing a privacy-preserving alternative to centralized LBS through its decentralized design and use of blockchain technology. These advancements hold promise for applications across multiple sectors, including logistics, supply chain management, urban planning, and emerging fields such as autonomous vehicles and augmented reality.

Keywords

GPS / IoT / Blockchain / Proof-of-location / GPS spoofing

Cite this article

Download citation ▾
Mritunjay Shall Peelam, Kunjan Shah, Vinay Chamola. V-track: Blockchain-enabled IoT system for reliable vehicle location verification. , 2026, 12(1): 119-133 DOI:10.1016/j.dcan.2024.08.004

登录浏览全文

4963

注册一个新账户 忘记密码

CRediT authorship contribution statement

Mritunjay Shall Peelam: Writing-review & editing, Writing-orig-inal draft. Kunjan Shah: Writing-review & editing. Vinay Chamola: Supervision.

Declaration of competing interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

References

[1]

H. Shen, J. Zhou, Z. Cao, X. Dong, K.K.R. Choo, Blockchain-based lightweight cer-tificate authority for efficient privacy-preserving location-based service in vehicular social networks, IEEE Int. Things J. 7 (7) (2020) 6610-6622.

[2]

Y. Song, Y. Fu, F.R. Yu, L. Zhou, Blockchain-enabled Internet of vehicles with coop-erative positioning: a deep neural network approach, IEEE Int. Things J. 7 (4) (2020) 3485-3498.

[3]

W. Wu, E. Liu, X. Gong, R. Wang,Blockchain based zero-knowledge proof of location in iot, in: ICC 2020-2020 IEEE International Conference on Communications (ICC), IEEE, 2020, pp. 1-7.

[4]

G. Brambilla,Peer-to-peer location-based services based on blockchain and web tech-nologies, PhD Thesis, 2017, p. 127, http://dspace-unipr.cineca.it/bitstream/1889/3418/7/TesiDottorato.pdf. (Accessed 30 April 2024).

[5]

P. Weerapanpisit, S. Trilles, J. Huerta, M. Painho, A decentralized location-based reputation management system in the iot using blockchain, IEEE Int. Things J. 9 (16) (2022) 15100-15115.

[6]

H. Liu, H. Huang, Y. Zhou, Q. Chen, Improvement of blockchain-based multi-layer location data sharing scheme for Internet of things, Comput. Commun. 201 (2023) 131-142.

[7]

C. Sanders, Y. Wang, Localizing spoofing attacks on vehicular GPS using vehicle-to-vehicle communications, IEEE Trans. Veh. Technol. 69 (12) (2020) 15656-15667.

[8]

M.L. Psiaki, T.E. Humphreys, GNSS spoofing and detection, Proc. IEEE 104 (6) (2016) 1258-1270.

[9]

T. Humphreys, Statement on the Vulnerability of Civil Unmanned Aerial Vehicles and Other Systems to Civil Gps Spoofing, University of Texas at Austin, July 18, 2012, pp. 1-16.

[10]

K. Bala, R. Upadhyay, S.R. Anwar, G. Shrimal, A blockchain-enabled, trust and loca-tion dependent-privacy preserving system in vanet, Meas. Sens. 30 (2023) 100892.

[11]

B. Luo, X. Li, J. Weng, J. Guo, J. Ma, Blockchain enabled trust-based location privacy protection scheme in vanet, IEEE Trans. Veh. Technol. 69 (2) (2019) 2034-2048.

[12]

D.H. Won, J. Ahn, E. Lee, M. Heo, S. Sung, Y.J. Lee, Gnss carrier phase anomaly detection and validation for precise land vehicle positioning, IEEE Trans. Instrum. Meas. 64 (9) (2015) 2389-2398.

[13]

Q.C. Sun, J.C. Xia, J. Foster, T. Falkmer, H. Lee,Pursuing precise vehicle movement trajectory in urban residential area using multi-gnss rtk tracking, Transp. Res. Proc. 25 (2017) 2356-2372.

[14]

C. Ounoughi, S.B. Yahia, Data fusion for its: a systematic literature review, Inf. Fusion 89 ( 2023) 267-291.

[15]

T. Tithi, B. Deka, R.M. Gerdes, C. Winstead, M. Li, K. Heaslip, Analysis of friendly jamming for secure location verification of vehicles for intelligent highways, IEEE Trans. Veh. Technol. 67 (8) (2018) 7437-7449.

[16]

E.I. Essa, et al., Secure global positioning system for vehicle to vehicle (v2v) com-munication, Turk. J. Comput. Math. Educ. 12 (9) (2021) 1697-1707.

[17]

S. Nam, D. Lee, J. Lee, S. Park, Cnvps: cooperative neighboring vehicle posi-tioning system based on vehicle-to-vehicle communication, IEEE Access 7 (2019) 16847-16857.

[18]

U. Ihsan, Z. Wang, R. Malaney, A. Dempster, S. Yan, Artificial intelligence and lo-cation verification in vehicular networks, in: 2019 IEEE Global Communications Conference (GLOBECOM), IEEE, 2019, pp. 1-6.

[19]

Z. Yang, K. Yang, L. Lei, K. Zheng, V.C. Leung, Blockchain-based decentralized trust management in vehicular networks, IEEE Int. Things J. 6 (2) (2018) 1495-1505.

[20]

A. Henninger, A. Mashatan, Distributed interoperable records: the key to better sup-ply chain management, Computers 10 (7) (2021) 1-89.

[21]

M. Swan, Blockchain: Blueprint for a New Economy, O’Reilly Media, Inc., 2015.

[22]

R. Gupta, S. Tanwar, F. Al-Turjman, P. Italiya, A. Nauman, S.W. Kim, Smart con-tract privacy protection using ai in cyber-physical systems: tools, techniques and challenges, IEEE Access 8 (2020) 24746-24772.

[23]

M.U. Hassan, M.H. Rehmani, J. Chen, Privacy preservation in blockchain based iot systems: integration issues, prospects, challenges, and future research directions, Fu-ture Gener. Comput. Syst. 97 (2019) 512-529.

[24]

M. Florian, F. Pieper, I. Baumgart, Establishing location-privacy in decentralized long-distance geocast services, Ad Hoc Netw. 37 (2016) 110-121.

[25]

S. Zou, J. Xi, H. Wang, G. Xu, CrowdBLPS: a blockchain-based location-privacy-preserving mobile crowdsensing system, IEEE Trans. Ind. Inform. 16 (6) (2020) 4206-4218.

[26]

B. Li, R. Liang, D. Zhu, W. Chen, Q. Lin, Blockchain-based trust management model for location privacy preserving in VANET, IEEE Trans. Intell. Transp. Syst. 22 (6) (2021) 3765-3775.

[27]

L. Lao, X. Dai, B. Xiao, S. Guo,G-PBFT: a location-based and scalable consensus pro-tocol for IoT-blockchain applications,in:Proceedings-2020 IEEE 34th International Parallel and Distributed Processing Symposium, IPDPS 2020, 2020, pp. 664-673.

[28]

F. Victor, S. Zickau, Geofences on the blockchain: enabling decentralized location-based services, in: IEEE International Conference on Data Mining Workshops, ICDMW 2018-Novem, 2019, pp. 97-104.

[29]

Z. Yang, R. Wang, D. Wu, B. Yang, P. Zhang, Blockchain-enabled trust management model for the Internet of vehicles, IEEE Int. Things J. 10 (14) (2021) 12044-12054.

[30]

B. Luo, X. Li, J. Weng, J. Guo, J. Ma, Blockchain enabled trust-based location privacy protection scheme in VANET, IEEE Trans. Veh. Technol. 69 (2) (2020) 2034-2048.

[31]

B. Chaudhary, K. Singh, A blockchain enabled location-privacy preserving scheme for vehicular ad-hoc networks, Peer-to-Peer Netw. Appl. 14 (5) (2021) 3198-3212.

[32]

H. Wang, C. Wang, Z. Shen, K. Liu, P. Liu, D. Lin, A MADM location privacy protec-tion method based on blockchain, IEEE Access 9 (2021) 27802-27812.

[33]

Y. Xudong, G. Ling, L. Yan, Z. Hairong, G. Quanli, Z. Jie, W. Hai, A blockchain-based location privacy-preserving scheme in location-based service, Mob. Inf. Syst. 2022 (1) (2022) 1931451.

[34]

W. Wang, Y. Yang, Z. Yin, K. Dev, X. Zhou, X. Li, N.M.F. Qureshi, C. Su, BSIF: blockchain-based secure, interactive, and fair mobile crowdsensing, IEEE J. Sel. Ar-eas Commun. 40 (12) (2022) 3452-3469.

[35]

B. Li, R. Liang, D. Zhu, W. Chen, Q. Lin, Blockchain-based trust management model for location privacy preserving in vanet, IEEE Trans. Intell. Transp. Syst. 22 (6) (2020) 3765-3775.

[36]

M.R. Nosouhi, S. Yu, W. Zhou, M. Grobler, H. Keshtiar, Blockchain for secure location verification, J. Parallel Distrib. Comput. (2020) 40-51.

[37]

P. Asuquo, H. Cruickshank, J. Morley, C.P. Ogah, A. Lei, W. Hathal, S. Bao, Z. Sun, Security and privacy in location-based services for vehicular and mobile commu-nications: an overview, challenges, and countermeasures, IEEE Int. Things J. 5 (6) (2018) 4778-4802.

[38]

V.A. Memos, K.E. Psannis, Y. Ishibashi, B.-G. Kim, B.B. Gupta, An efficient algorithm for media-based surveillance system (eamsus) in iot smart city framework, Future Gener. Comput. Syst. 83 (2018) 619-628.

[39]

Z. Wang, L. Zhang, X. Ding, K.K.R. Choo, H. Jin, A dynamic-efficient structure for secure and verifiable location-based skyline queries, IEEE Trans. Inf. Forensics Secur. 18 (2023) 920-935.

[40]

B.B. Gupta, M. Quamara, An overview of Internet of things (iot): architectural aspects, challenges, and protocols, Concurr. Comput., Pract. Exp. 32 (21) (2020) e4946.

[41]

Z. Li, Q. Pei, I. Markwood, Y. Liu, M. Pan, H. Li, Location privacy violation via gps-agnostic smart phone car tracking, IEEE Trans. Veh. Technol. 67 (6) (2018) 5042-5053.

[42]

D. Kosmanos, A. Pappas, L. Maglaras, S. Moschoyiannis, F.J. Aparicio-Navarro, A. Argyriou, H. Janicke, A novel intrusion detection system against spoofing attacks in connected electric vehicles, Array 5 (2020) 100013.

[43]

D. Mendes, N. Ivaki, H. Madeira, Effects of gps spoofing on unmanned aerial vehicles, in: 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC), IEEE, 2018, pp. 155-160.

[44]

S. Semanjski, I. Semanjski, W. De Wilde, A. Muls, Use of supervised machine learn-ing for gnss signal spoofing detection with validation on real-world meaconing and spoofing data—part I, Sensors 20 (4) (2020) 1-1171.

[45]

J. Kwon, E. Buchman, Cosmos whitepaper, A Netw. Distrib. Ledgers 27 (2019) 1-32.

[46]

H. Gilbert, H. Handschuh, Security analysis of sha-256 and sisters, in: Selected Areas in Cryptography: 10th Annual International Workshop, SAC 2003, Ottawa, Canada, August 14-15, 2003. Revised Papers 10, Springer, 2004, pp. 175-193.

[47]

E.D. Kaplan, C. Hegarty, Understanding GPS/GNSS: Principles and Applications, Artech House, 2017.

[48]

C.W. Zhao, J. Jegatheesan, S.C. Loon, Exploring iot application using raspberry pi, Int. J. Comput. Netw. Appl. 2 (1) (2015) 27-34.

[49]

E.W. Patton, M. Tissenbaum, F. Harunani, Mit app inventor: objectives, design and development, in: Computational Thinking Education, 2019, pp. 31-49.

[50]

S. Wallo, A. Posey, P. Wehling, A. Van Gerpen, J. Flaten, Pterodactyl: a versatile flight computer for stratospheric ballooning,in: Academic High Altitude Conference, vol. 2022, Iowa State University Digital Press, 2023.

[51]

A.S. Huang, L. Rudolph, Bluetooth Essentials for Programmers, Cambridge Univer-sity Press, 2007.

[52]

K. Sairam, N. Gunasekaran, S.R. Redd, Bluetooth in wireless communication, IEEE Commun. Mag. 40 (6) (2002) 90-96.

[53]

S. Santi, T. De Koninck, G. Daneels, F. Lemic, J. Famaey,Location-based vertical han-dovers in wi-fi networks with ieee 802.11 ah, IEEE Access 9 (2021) 54389-54400.

[54]

M. Maksimović, V. Vujović, N. Davidović, V. Milošević, B. Perišić, Raspberry pi as Internet of things hardware: performances and constraints, Des. Issues 3 (8) (2014) 1-6.

[55]

H. Yoshida, A. Biryukov, Analysis of a sha-256 variant, in: International Workshop on Selected Areas in Cryptography, Springer, 2005, pp. 245-260.

[56]

O. Gazi, A.Ç. Arlı, O. Gazi, A.Ç. Arlı, Serial peripheral interface, in: State Machines Using VHDL: FPGA Implementation of Serial Communication and Display Protocols, 2021, pp. 143-192.

[57]

S. Katzenbeisser, F. Petitcolas, Information Hiding, Artech House, 2016.

[58]

T.A. Syed, A. Alzahrani, S. Jan, M.S. Siddiqui, A. Nadeem, T. Alghamdi, A compar-ative analysis of blockchain architecture and its applications: problems and recom-mendations, IEEE Access 7 (2019) 176838-176869.

[59]

A. Sharma, M. Peelam, B. Chauasia, V. Chamola,Qiotchain: quantum iot-blockchain fusion for advanced data protection in industry 4.0, IET Blockchain 00 (2023) 1-11.

[60]

L. Chi, X. Zhu, Hashing techniques: a survey and taxonomy, ACM Comput. Surv. 50 (1) (2017) 1-36.

[61]

I.B. Damgård, Collision free hash functions and public key signature schemes, in: Workshop on the Theory and Application of Cryptographic Techniques, Springer, 1987, pp. 203-216.

[62]

Appchains-cosmos: the Internet of blockchains, https://cosmos.network/appchains/. (Accessed 13 March 2024).

PDF

10

Accesses

0

Citation

Detail

Sections
Recommended

/