Survey on Peer to Peer Car Sharing System Using Blockchain

Page 1

International Research Journal of Engineering and Technology (IRJET)

e-ISSN: 2395-0056

Volume: 09 Issue: 12 | Dec 2022

p-ISSN: 2395-0072

www.irjet.net

Survey on Peer to Peer Car Sharing System Using Blockchain Pankaj Desai1, Mahesh KoltePatil2, Tanmay Dandile3, Shivam Shingare4, Prof. K.S Hangargi5 1Pankaj

Desai, Student of Computer Engineering at P.K Technical Campus, Pune KoltePatil, Student of Computer Engineering at P.K Technical Campus, Pune 3Tanmay Dandile, Student of Computer Engineering Student P.K Technical Campus, Pune 4Shivam Shingare, Student of Computer Engineering at P.K Technical Campus, Pune 5Prof. K.S Hangargi, Dept Computer Engineering, P.K Technical Campus, Pune ---------------------------------------------------------------------***--------------------------------------------------------------------crime from these recordings is challenging. Additionally, if Abstract – By giving people access to shared vehicles and 2Mahesh

the information that has been saved has been compromised, it poses a major risk to user privacy.

limiting the use of private automobiles, car-sharing programs can help with a number of urban challenges. People may now utilize a shared automobile by performing basic operations on their mobile devices thanks to the growth of the Internet of Things. The car-sharing program, however, has security issues. Sensitive data is communicated for car-sharing via a public channel, including the user's identification, position data, and access code. As a result, an attacker may be able to obtain this data for improper reasons, making the development of a secure authentication protocol crucial.

1.1 Literature Survey System analysis is a thorough assessment of the system's many systems, as well as their interactions both inside and outside the system. Why are there so many faults in the present system is the crucial query here. What actions need to be performed to fix the issue? The analysis starts when a user or administrator launches a software survey on the live system. The information is gathered through a variety of files, decision-making processes, and analysis-related activities carried out by the present system. Example Data Stream The method makes extensive use of drawings and other media. Training, expertise, and common sense are needed to obtain the crucial data needed to create a system.

Key Words: Car Sharing, automobiles, authentication, blockchain .

1. INTRODUCTION In order to deal with urban transportation issues including road congestion and fuel combustion pollution, car-sharing programs were created. Carsharing is a substitute for owning a vehicle that enables people to increase their mobility without having to pay for upkeep and storage. Peerto-peer (P2P) carsharing is a cutting-edge shared-use vehicle concept in which individuals in the neighborhood have access to privately owned vehicles. P2P start-ups are a part of a group of internet businesses that have promoted the development of "collaborative consumption" and the "sharing economy" ideas. P2P vehicle sharing is one of several shared-use mobility services that are concentrated on sharing transportation resources, and the sharing economy is emerging as a more significant force in society..

The way in which the problem is discovered, thoroughly read, and properly executed by choosing a solution, is essentially what determines the effectiveness of the system. A good analytical model should provide a framework for solving the problem in addition to methods for understanding it. As a consequence, further information should be looked into through gathering system-related data. The needs of the proposed system should then be carefully assessed. There are four sections in the system analysis. 1. Initial analysis and system layout. 2. Performing systematic analysis with the use of analytical tools.

The P2P service model is a system where automobile owners turn their own vehicles into shared cars and rent them out to other customers.

3. A study of the possibilities. 4. Examine the expenses and advantages.

In a conventional car-sharing system, a centralised service server can store and manage user data as well as service data. A centralised server, however, is vulnerable to a malevolent attacker's single point of failure. For instance, if the service server is hacked and all the sharing records are wiped, the user won't be able to access the earlier data matching to the information about the used cars when anything goes missing from the cars. Additionally, if the user engaged in fraudulent activity during car-sharing, or if the sharing records are altered. Finding the user's proof of a

© 2022, IRJET

|

Impact Factor value: 7.529

2. PROPOSED SYSTEM The proposed protocol will protect users from man-in-themiddle, replay, offline password guessing, impersonation, and stolen mobile device threats. By doing a loose security analysis, the suggested protocol offers reciprocal authentication, anonymity, and secrecy. Comparisons were made between the proposed protocol's performance and similar systems. The suggested protocol may be used in the blockchain-based car-sharing system and is effective. The

|

ISO 9001:2008 Certified Journal

|

Page 63


Turn static files into dynamic content formats.

Create a flipbook