SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 63
Survey on Peer to Peer Car Sharing System Using Blockchain
Pankaj Desai1, Mahesh KoltePatil2, Tanmay Dandile3, Shivam Shingare4, Prof. K.S Hangargi5
1Pankaj Desai, Student of Computer Engineering at P.K Technical Campus, Pune
2Mahesh KoltePatil, Student of Computer Engineering at P.K Technical Campus, Pune
3Tanmay Dandile, Student of Computer Engineering Student P.K Technical Campus, Pune
4Shivam Shingare, Student of Computer Engineering at P.K Technical Campus, Pune
5Prof. K.S Hangargi, Dept Computer Engineering, P.K Technical Campus, Pune
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract – By giving people access to shared vehicles and
limiting the use of private automobiles, car-sharing programs
can help with a number of urban challenges. People may now
utilize a shared automobile by performingbasicoperations on
their mobile devices thanks to the growth of the Internet of
Things. The car-sharingprogram, however, hassecurity issues.
Sensitive data is communicated for car-sharing via a public
channel, including the user's identification, position data, and
access code. As a result, an attacker may be able to obtain this
data for improper reasons, making the development of a
secure authentication protocol crucial.
Key Words: Car Sharing, automobiles, authentication,
blockchain .
1. INTRODUCTION
In order to deal with urban transportation issues including
road congestion and fuel combustion pollution, car-sharing
programs were created. Carsharing is a substitute for
owning a vehicle that enables people to increase their
mobility without having to pay forupkeepandstorage.Peer-
to-peer (P2P) carsharingisa cutting-edgeshared-usevehicle
concept in which individuals in the neighborhood have
access to privately owned vehicles. P2P start-ups are a part
of a group of internet businesses that have promoted the
development of "collaborative consumption" and the
"sharing economy" ideas. P2P vehicle sharing is one of
several shared-use mobility services that are concentrated
on sharing transportation resources, and the sharing
economy is emerging as a more significant force in society..
The P2P service model isa systemwhereautomobileowners
turn their own vehicles into shared carsandrentthemout to
other customers.
In a conventional car-sharing system, a centralised
service server can store and manage user data as well as
service data. A centralisedserver,however,isvulnerabletoa
malevolent attacker's single point of failure. For instance, if
the service server is hacked and all the sharing records are
wiped, the user won't be able to access the earlier data
matching to the information about the used cars when
anything goes missing from the cars. Additionally, iftheuser
engaged in fraudulent activity during car-sharing, or if the
sharing records are altered. Finding the user's proof of a
crime from these recordings is challenging. Additionally, if
the information that has been saved has been compromised,
it poses a major risk to user privacy.
1.1 Literature Survey
System analysis is a thorough assessment of the system's
many systems, as well as their interactions both inside and
outside the system. Why are there so many faults in the
present system is the crucial query here. What actions need
to be performed to fix the issue? The analysis starts when a
user or administrator launches a software survey on the live
system. The information is gatheredthroughavarietyoffiles,
decision-making processes, and analysis-related activities
carried out by the present system. Example Data Stream The
method makes extensive use of drawings and other media.
Training, expertise, and common sense are needed to obtain
the crucial data needed to create a system.
The way in which the problem is discovered, thoroughly
read, and properly executed by choosing a solution, is
essentially what determinestheeffectivenessofthesystem.A
good analytical model should provide a framework for
solving the problem in addition to methods for
understanding it. As a consequence, further information
should be looked into throughgatheringsystem-relateddata.
The needs of the proposed system should then be carefully
assessed. There are four sections in the system analysis.
1. Initial analysis and system layout.
2. Performing systematic analysis with the use of analytical
tools.
3. A study of the possibilities.
4. Examine the expenses and advantages.
2. PROPOSED SYSTEM
The proposed protocol will protect users from man-in-the-
middle,replay,offlinepasswordguessing,impersonation,and
stolen mobile device threats. By doing a loose security
analysis, the suggested protocol offers reciprocal
authentication, anonymity, and secrecy. Comparisons were
made between the proposed protocol's performance and
similar systems. The suggested protocol may be used in the
blockchain-based car-sharing system and is effective. The
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 64
protocol will eventually be tested and applied to a genuine
car-sharing system using a simulation. The suggested car-
sharing system authentication technique was built on the
blockchain and consists of five entities: the trust authority,
stations, owners, vehicles, and users.
Chart -1: Flowchart
Advantages:
Blockchain provides a high degree of security due to
independent verification procedures that occur across all
participating computers on a blockchain network. In
situations involving digital currencies, this verification is
used to validate transaction blocks prior to theirinclusionin
the chain.
1. Fast, Secure, and Efficient Transactions
2. Transparent and Accurate Pricing Model.
3. Less work is required thanks to online reservation
tools.
4. Traveling is simplified.
5. Strengthened Security and Privacy Standards.
3. Future Work
Although blockchainmaybe usedindependently,its
effectiveness is expected to be better when combined with
other technologies like the Internet of Things, artificial
intelligence, and big data. Better answers for location-based
automobile services might result from this. Future
extensions of the study include I an analysis of the
application's performance and cost. Since blockchain
technology is a trust-free system that enables consumers to
trust data, it is also important to examine the technology
from the standpoint of data processing. Althoughblockchain
technology generally improves data quality, it is crucial to
understandthedata processingcapabilities whenconnecting
the blockchain with a larger software system. iii) Examine
the data processing workloads across various blockchain
architectures.
4. CONCLUSIONS
As a solution to the mobility issues in metropolitan
areas, car-sharing programmes have garnered a lot of
interest. However, the centralised system structure and
communication over a public channel of the conventional
car-sharing system expose it to various security issues. In
order to provide a decentralised sharing service for
authorised users, this article presented a safe decentralised
model of a car-sharing system as well as a secure
authentication technique. Blockchain was utilised to offer a
decentralised car-sharing service and guarantee the
accuracy of service information.Inorderto ensuretheuser's
privacy, a pseudonym was also used in the car-sharing
system. As a result, even if the adversary accesses the stored
data, they are unable to determine the user's true identity.
The suggested protocol may enable safe mutual
authentication between the user, station, and owner,
according to BAN logic analysis, which was used to
demonstrate this. Additionally, the suggested protocol's
security against replay and man-in-the-middle attacks was
shown using the AVISPA simulation.
ACKNOWLEDGEMENT
Up until now, we have put forth a tremendous amount of
work to support this endeavour. Whatever thecase,itwould
not have been possible without the thoughtful support and
cooperation of several people and organisations. We could
want to let them know how appreciative we are to each of
them. We are excited to provide this research on "Peer to
Peer Car Sharing System Using Blockchain." We would
like to thank Mrs. K.S. Hangargi, who served as our guide,
for her invaluable advice in helping us analyse our project.
We also like to express our gratitudetothe Prof.S.R.Bhujbal
HOD of Computer Engineering for providing the required
resources.
REFERENCES
[1] A. Dorri, M. Steger, S. S. Kanhere, and R. Jurdak,,
“BlockChain: A distributed solution to automotive
security and privacy,’’ IEEE Commun. Mag., vol. 55, no.
12, pp. 119–125, Dec. 2017.
[2] D.Puthal, “The blockchain as a decentralized security
framework,” IEEE Consum. Electron. Mag., vol. 7.
[3] P.W. Wadhwani and P. Saha, “Car sharing marketsizeby
model”.

More Related Content

PDF
Blockchain Based Car Rental App
PDF
INCREASING THE TRUST AND SECURITY BETWEEN AUTOMOTIVE ACTORS USING A BLOCKCHAI...
PDF
Decentralized Ridesharing System Using Blockchain
PDF
International Journal of Advance Robotics & Expert Systems (JARES)
PDF
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONS
PDF
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications
ODP
Smart Vehicle
PDF
Connections Summit - Security & Blockchain Track
Blockchain Based Car Rental App
INCREASING THE TRUST AND SECURITY BETWEEN AUTOMOTIVE ACTORS USING A BLOCKCHAI...
Decentralized Ridesharing System Using Blockchain
International Journal of Advance Robotics & Expert Systems (JARES)
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONS
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications
Smart Vehicle
Connections Summit - Security & Blockchain Track

Similar to Survey on Peer to Peer Car Sharing System Using Blockchain (20)

PPTX
Vehicular adhoc network for communication
PDF
CAR SOCIAL NETWORK CONTACT A DRIVER THROUGH LICENSE PLATE.pdf
PDF
Automotive security with Blockchain Technology (Project Report)
PPTX
CONNECTED CARS & DATA ANALYTICS USING BLOCKCHAIN
PDF
IRJET- Digitalized Vehicle Identification and Paperless Drivers
PDF
Decentralized Car Hailing Application
PDF
IRJET- Signrecrypting Proxy Re-Signature in Secure Vanet
PDF
January 2021 - Top 10 Read Articles in Network Security & Its Applications
PDF
SHAREDWHEELS
PDF
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
PDF
Privacy preserving ride sharing scheme for autonomous vehicles in big data er...
PDF
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
PDF
Blockchain Technology using System Requirement Specification and IoT Devices
PDF
March 2021: Top 10 Read Articles in Network Security and Its Applications
PDF
Brisk and secure ad hoc vehicular communication
PDF
Brisk and secure ad hoc vehicular communication
PDF
P2P File Sharing Web App
PDF
October 2020 - Top Read Articles in Network Security & Its Applications
PDF
A Survey Paper on Ride-Sharing Application
PDF
RELIABLE SOFTWARE FRAMEWORK FOR VEHICULAR SAFETY APPLICATIONS ON CLOUD
Vehicular adhoc network for communication
CAR SOCIAL NETWORK CONTACT A DRIVER THROUGH LICENSE PLATE.pdf
Automotive security with Blockchain Technology (Project Report)
CONNECTED CARS & DATA ANALYTICS USING BLOCKCHAIN
IRJET- Digitalized Vehicle Identification and Paperless Drivers
Decentralized Car Hailing Application
IRJET- Signrecrypting Proxy Re-Signature in Secure Vanet
January 2021 - Top 10 Read Articles in Network Security & Its Applications
SHAREDWHEELS
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
Privacy preserving ride sharing scheme for autonomous vehicles in big data er...
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
Blockchain Technology using System Requirement Specification and IoT Devices
March 2021: Top 10 Read Articles in Network Security and Its Applications
Brisk and secure ad hoc vehicular communication
Brisk and secure ad hoc vehicular communication
P2P File Sharing Web App
October 2020 - Top Read Articles in Network Security & Its Applications
A Survey Paper on Ride-Sharing Application
RELIABLE SOFTWARE FRAMEWORK FOR VEHICULAR SAFETY APPLICATIONS ON CLOUD
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Ad

Recently uploaded (20)

PPT
Project quality management in manufacturing
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PDF
composite construction of structures.pdf
PPTX
additive manufacturing of ss316l using mig welding
PPTX
bas. eng. economics group 4 presentation 1.pptx
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PPTX
Internet of Things (IOT) - A guide to understanding
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPT
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
PPTX
Construction Project Organization Group 2.pptx
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPTX
Geodesy 1.pptx...............................................
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PDF
PPT on Performance Review to get promotions
PPTX
Welding lecture in detail for understanding
Project quality management in manufacturing
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
R24 SURVEYING LAB MANUAL for civil enggi
composite construction of structures.pdf
additive manufacturing of ss316l using mig welding
bas. eng. economics group 4 presentation 1.pptx
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
Internet of Things (IOT) - A guide to understanding
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
Construction Project Organization Group 2.pptx
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Geodesy 1.pptx...............................................
Foundation to blockchain - A guide to Blockchain Tech
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPT on Performance Review to get promotions
Welding lecture in detail for understanding

Survey on Peer to Peer Car Sharing System Using Blockchain

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 63 Survey on Peer to Peer Car Sharing System Using Blockchain Pankaj Desai1, Mahesh KoltePatil2, Tanmay Dandile3, Shivam Shingare4, Prof. K.S Hangargi5 1Pankaj Desai, Student of Computer Engineering at P.K Technical Campus, Pune 2Mahesh KoltePatil, Student of Computer Engineering at P.K Technical Campus, Pune 3Tanmay Dandile, Student of Computer Engineering Student P.K Technical Campus, Pune 4Shivam Shingare, Student of Computer Engineering at P.K Technical Campus, Pune 5Prof. K.S Hangargi, Dept Computer Engineering, P.K Technical Campus, Pune ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract – By giving people access to shared vehicles and limiting the use of private automobiles, car-sharing programs can help with a number of urban challenges. People may now utilize a shared automobile by performingbasicoperations on their mobile devices thanks to the growth of the Internet of Things. The car-sharingprogram, however, hassecurity issues. Sensitive data is communicated for car-sharing via a public channel, including the user's identification, position data, and access code. As a result, an attacker may be able to obtain this data for improper reasons, making the development of a secure authentication protocol crucial. Key Words: Car Sharing, automobiles, authentication, blockchain . 1. INTRODUCTION In order to deal with urban transportation issues including road congestion and fuel combustion pollution, car-sharing programs were created. Carsharing is a substitute for owning a vehicle that enables people to increase their mobility without having to pay forupkeepandstorage.Peer- to-peer (P2P) carsharingisa cutting-edgeshared-usevehicle concept in which individuals in the neighborhood have access to privately owned vehicles. P2P start-ups are a part of a group of internet businesses that have promoted the development of "collaborative consumption" and the "sharing economy" ideas. P2P vehicle sharing is one of several shared-use mobility services that are concentrated on sharing transportation resources, and the sharing economy is emerging as a more significant force in society.. The P2P service model isa systemwhereautomobileowners turn their own vehicles into shared carsandrentthemout to other customers. In a conventional car-sharing system, a centralised service server can store and manage user data as well as service data. A centralisedserver,however,isvulnerabletoa malevolent attacker's single point of failure. For instance, if the service server is hacked and all the sharing records are wiped, the user won't be able to access the earlier data matching to the information about the used cars when anything goes missing from the cars. Additionally, iftheuser engaged in fraudulent activity during car-sharing, or if the sharing records are altered. Finding the user's proof of a crime from these recordings is challenging. Additionally, if the information that has been saved has been compromised, it poses a major risk to user privacy. 1.1 Literature Survey System analysis is a thorough assessment of the system's many systems, as well as their interactions both inside and outside the system. Why are there so many faults in the present system is the crucial query here. What actions need to be performed to fix the issue? The analysis starts when a user or administrator launches a software survey on the live system. The information is gatheredthroughavarietyoffiles, decision-making processes, and analysis-related activities carried out by the present system. Example Data Stream The method makes extensive use of drawings and other media. Training, expertise, and common sense are needed to obtain the crucial data needed to create a system. The way in which the problem is discovered, thoroughly read, and properly executed by choosing a solution, is essentially what determinestheeffectivenessofthesystem.A good analytical model should provide a framework for solving the problem in addition to methods for understanding it. As a consequence, further information should be looked into throughgatheringsystem-relateddata. The needs of the proposed system should then be carefully assessed. There are four sections in the system analysis. 1. Initial analysis and system layout. 2. Performing systematic analysis with the use of analytical tools. 3. A study of the possibilities. 4. Examine the expenses and advantages. 2. PROPOSED SYSTEM The proposed protocol will protect users from man-in-the- middle,replay,offlinepasswordguessing,impersonation,and stolen mobile device threats. By doing a loose security analysis, the suggested protocol offers reciprocal authentication, anonymity, and secrecy. Comparisons were made between the proposed protocol's performance and similar systems. The suggested protocol may be used in the blockchain-based car-sharing system and is effective. The
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 64 protocol will eventually be tested and applied to a genuine car-sharing system using a simulation. The suggested car- sharing system authentication technique was built on the blockchain and consists of five entities: the trust authority, stations, owners, vehicles, and users. Chart -1: Flowchart Advantages: Blockchain provides a high degree of security due to independent verification procedures that occur across all participating computers on a blockchain network. In situations involving digital currencies, this verification is used to validate transaction blocks prior to theirinclusionin the chain. 1. Fast, Secure, and Efficient Transactions 2. Transparent and Accurate Pricing Model. 3. Less work is required thanks to online reservation tools. 4. Traveling is simplified. 5. Strengthened Security and Privacy Standards. 3. Future Work Although blockchainmaybe usedindependently,its effectiveness is expected to be better when combined with other technologies like the Internet of Things, artificial intelligence, and big data. Better answers for location-based automobile services might result from this. Future extensions of the study include I an analysis of the application's performance and cost. Since blockchain technology is a trust-free system that enables consumers to trust data, it is also important to examine the technology from the standpoint of data processing. Althoughblockchain technology generally improves data quality, it is crucial to understandthedata processingcapabilities whenconnecting the blockchain with a larger software system. iii) Examine the data processing workloads across various blockchain architectures. 4. CONCLUSIONS As a solution to the mobility issues in metropolitan areas, car-sharing programmes have garnered a lot of interest. However, the centralised system structure and communication over a public channel of the conventional car-sharing system expose it to various security issues. In order to provide a decentralised sharing service for authorised users, this article presented a safe decentralised model of a car-sharing system as well as a secure authentication technique. Blockchain was utilised to offer a decentralised car-sharing service and guarantee the accuracy of service information.Inorderto ensuretheuser's privacy, a pseudonym was also used in the car-sharing system. As a result, even if the adversary accesses the stored data, they are unable to determine the user's true identity. The suggested protocol may enable safe mutual authentication between the user, station, and owner, according to BAN logic analysis, which was used to demonstrate this. Additionally, the suggested protocol's security against replay and man-in-the-middle attacks was shown using the AVISPA simulation. ACKNOWLEDGEMENT Up until now, we have put forth a tremendous amount of work to support this endeavour. Whatever thecase,itwould not have been possible without the thoughtful support and cooperation of several people and organisations. We could want to let them know how appreciative we are to each of them. We are excited to provide this research on "Peer to Peer Car Sharing System Using Blockchain." We would like to thank Mrs. K.S. Hangargi, who served as our guide, for her invaluable advice in helping us analyse our project. We also like to express our gratitudetothe Prof.S.R.Bhujbal HOD of Computer Engineering for providing the required resources. REFERENCES [1] A. Dorri, M. Steger, S. S. Kanhere, and R. Jurdak,, “BlockChain: A distributed solution to automotive security and privacy,’’ IEEE Commun. Mag., vol. 55, no. 12, pp. 119–125, Dec. 2017. [2] D.Puthal, “The blockchain as a decentralized security framework,” IEEE Consum. Electron. Mag., vol. 7. [3] P.W. Wadhwani and P. Saha, “Car sharing marketsizeby model”.