SlideShare a Scribd company logo
1 of 2
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 63
Survey on Peer to Peer Car Sharing System Using Blockchain
Pankaj Desai1, Mahesh KoltePatil2, Tanmay Dandile3, Shivam Shingare4, Prof. K.S Hangargi5
1Pankaj Desai, Student of Computer Engineering at P.K Technical Campus, Pune
2Mahesh KoltePatil, Student of Computer Engineering at P.K Technical Campus, Pune
3Tanmay Dandile, Student of Computer Engineering Student P.K Technical Campus, Pune
4Shivam Shingare, Student of Computer Engineering at P.K Technical Campus, Pune
5Prof. K.S Hangargi, Dept Computer Engineering, P.K Technical Campus, Pune
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract – By giving people access to shared vehicles and
limiting the use of private automobiles, car-sharing programs
can help with a number of urban challenges. People may now
utilize a shared automobile by performingbasicoperations on
their mobile devices thanks to the growth of the Internet of
Things. The car-sharingprogram, however, hassecurity issues.
Sensitive data is communicated for car-sharing via a public
channel, including the user's identification, position data, and
access code. As a result, an attacker may be able to obtain this
data for improper reasons, making the development of a
secure authentication protocol crucial.
Key Words: Car Sharing, automobiles, authentication,
blockchain .
1. INTRODUCTION
In order to deal with urban transportation issues including
road congestion and fuel combustion pollution, car-sharing
programs were created. Carsharing is a substitute for
owning a vehicle that enables people to increase their
mobility without having to pay forupkeepandstorage.Peer-
to-peer (P2P) carsharingisa cutting-edgeshared-usevehicle
concept in which individuals in the neighborhood have
access to privately owned vehicles. P2P start-ups are a part
of a group of internet businesses that have promoted the
development of "collaborative consumption" and the
"sharing economy" ideas. P2P vehicle sharing is one of
several shared-use mobility services that are concentrated
on sharing transportation resources, and the sharing
economy is emerging as a more significant force in society..
The P2P service model isa systemwhereautomobileowners
turn their own vehicles into shared carsandrentthemout to
other customers.
In a conventional car-sharing system, a centralised
service server can store and manage user data as well as
service data. A centralisedserver,however,isvulnerabletoa
malevolent attacker's single point of failure. For instance, if
the service server is hacked and all the sharing records are
wiped, the user won't be able to access the earlier data
matching to the information about the used cars when
anything goes missing from the cars. Additionally, iftheuser
engaged in fraudulent activity during car-sharing, or if the
sharing records are altered. Finding the user's proof of a
crime from these recordings is challenging. Additionally, if
the information that has been saved has been compromised,
it poses a major risk to user privacy.
1.1 Literature Survey
System analysis is a thorough assessment of the system's
many systems, as well as their interactions both inside and
outside the system. Why are there so many faults in the
present system is the crucial query here. What actions need
to be performed to fix the issue? The analysis starts when a
user or administrator launches a software survey on the live
system. The information is gatheredthroughavarietyoffiles,
decision-making processes, and analysis-related activities
carried out by the present system. Example Data Stream The
method makes extensive use of drawings and other media.
Training, expertise, and common sense are needed to obtain
the crucial data needed to create a system.
The way in which the problem is discovered, thoroughly
read, and properly executed by choosing a solution, is
essentially what determinestheeffectivenessofthesystem.A
good analytical model should provide a framework for
solving the problem in addition to methods for
understanding it. As a consequence, further information
should be looked into throughgatheringsystem-relateddata.
The needs of the proposed system should then be carefully
assessed. There are four sections in the system analysis.
1. Initial analysis and system layout.
2. Performing systematic analysis with the use of analytical
tools.
3. A study of the possibilities.
4. Examine the expenses and advantages.
2. PROPOSED SYSTEM
The proposed protocol will protect users from man-in-the-
middle,replay,offlinepasswordguessing,impersonation,and
stolen mobile device threats. By doing a loose security
analysis, the suggested protocol offers reciprocal
authentication, anonymity, and secrecy. Comparisons were
made between the proposed protocol's performance and
similar systems. The suggested protocol may be used in the
blockchain-based car-sharing system and is effective. The
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 64
protocol will eventually be tested and applied to a genuine
car-sharing system using a simulation. The suggested car-
sharing system authentication technique was built on the
blockchain and consists of five entities: the trust authority,
stations, owners, vehicles, and users.
Chart -1: Flowchart
Advantages:
Blockchain provides a high degree of security due to
independent verification procedures that occur across all
participating computers on a blockchain network. In
situations involving digital currencies, this verification is
used to validate transaction blocks prior to theirinclusionin
the chain.
1. Fast, Secure, and Efficient Transactions
2. Transparent and Accurate Pricing Model.
3. Less work is required thanks to online reservation
tools.
4. Traveling is simplified.
5. Strengthened Security and Privacy Standards.
3. Future Work
Although blockchainmaybe usedindependently,its
effectiveness is expected to be better when combined with
other technologies like the Internet of Things, artificial
intelligence, and big data. Better answers for location-based
automobile services might result from this. Future
extensions of the study include I an analysis of the
application's performance and cost. Since blockchain
technology is a trust-free system that enables consumers to
trust data, it is also important to examine the technology
from the standpoint of data processing. Althoughblockchain
technology generally improves data quality, it is crucial to
understandthedata processingcapabilities whenconnecting
the blockchain with a larger software system. iii) Examine
the data processing workloads across various blockchain
architectures.
4. CONCLUSIONS
As a solution to the mobility issues in metropolitan
areas, car-sharing programmes have garnered a lot of
interest. However, the centralised system structure and
communication over a public channel of the conventional
car-sharing system expose it to various security issues. In
order to provide a decentralised sharing service for
authorised users, this article presented a safe decentralised
model of a car-sharing system as well as a secure
authentication technique. Blockchain was utilised to offer a
decentralised car-sharing service and guarantee the
accuracy of service information.Inorderto ensuretheuser's
privacy, a pseudonym was also used in the car-sharing
system. As a result, even if the adversary accesses the stored
data, they are unable to determine the user's true identity.
The suggested protocol may enable safe mutual
authentication between the user, station, and owner,
according to BAN logic analysis, which was used to
demonstrate this. Additionally, the suggested protocol's
security against replay and man-in-the-middle attacks was
shown using the AVISPA simulation.
ACKNOWLEDGEMENT
Up until now, we have put forth a tremendous amount of
work to support this endeavour. Whatever thecase,itwould
not have been possible without the thoughtful support and
cooperation of several people and organisations. We could
want to let them know how appreciative we are to each of
them. We are excited to provide this research on "Peer to
Peer Car Sharing System Using Blockchain." We would
like to thank Mrs. K.S. Hangargi, who served as our guide,
for her invaluable advice in helping us analyse our project.
We also like to express our gratitudetothe Prof.S.R.Bhujbal
HOD of Computer Engineering for providing the required
resources.
REFERENCES
[1] A. Dorri, M. Steger, S. S. Kanhere, and R. Jurdak,,
“BlockChain: A distributed solution to automotive
security and privacy,’’ IEEE Commun. Mag., vol. 55, no.
12, pp. 119–125, Dec. 2017.
[2] D.Puthal, “The blockchain as a decentralized security
framework,” IEEE Consum. Electron. Mag., vol. 7.
[3] P.W. Wadhwani and P. Saha, “Car sharing marketsizeby
model”.

More Related Content

Similar to Survey on Peer to Peer Car Sharing System Using Blockchain

How to leverage blockchain for making machine learning models more accessible
How to leverage blockchain for making machine learning models more accessible How to leverage blockchain for making machine learning models more accessible
How to leverage blockchain for making machine learning models more accessible Blockchain Council
 
Final year IEEE 2016-2017 PROJECTS TITLES (IEEE 2016 papers) For ME,M.Tech,BE...
Final year IEEE 2016-2017 PROJECTS TITLES (IEEE 2016 papers) For ME,M.Tech,BE...Final year IEEE 2016-2017 PROJECTS TITLES (IEEE 2016 papers) For ME,M.Tech,BE...
Final year IEEE 2016-2017 PROJECTS TITLES (IEEE 2016 papers) For ME,M.Tech,BE...S3 Infotech IEEE Projects
 
Women's Maltreatment Redressal System based on Machine Learning Techniques
Women's Maltreatment Redressal System based on Machine Learning TechniquesWomen's Maltreatment Redressal System based on Machine Learning Techniques
Women's Maltreatment Redressal System based on Machine Learning TechniquesIRJET Journal
 
Trust Based Packet Filtering.pptx
Trust Based Packet Filtering.pptxTrust Based Packet Filtering.pptx
Trust Based Packet Filtering.pptxPoojaG86
 
Third Party Public Auditing Scheme for Security in Cloud Storage
Third Party Public Auditing Scheme for Security in Cloud StorageThird Party Public Auditing Scheme for Security in Cloud Storage
Third Party Public Auditing Scheme for Security in Cloud Storageijtsrd
 
State of the Art in Cloud Security
State of the Art in Cloud SecurityState of the Art in Cloud Security
State of the Art in Cloud Securityijsrd.com
 
Secure and Transparent Insurance Application using Blockchain Technology
Secure and Transparent Insurance Application using Blockchain TechnologySecure and Transparent Insurance Application using Blockchain Technology
Secure and Transparent Insurance Application using Blockchain TechnologyIRJET Journal
 
Top 8 Trends in Performance Engineering
Top 8 Trends in Performance EngineeringTop 8 Trends in Performance Engineering
Top 8 Trends in Performance EngineeringConvetit
 
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud ComputingIRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud ComputingIRJET Journal
 
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesCentralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesEditor IJMTER
 
IRJET- Effctive In-House Voting and Implementation using Block-Chain Veri...
IRJET-  	  Effctive In-House Voting and Implementation using Block-Chain Veri...IRJET-  	  Effctive In-House Voting and Implementation using Block-Chain Veri...
IRJET- Effctive In-House Voting and Implementation using Block-Chain Veri...IRJET Journal
 
IRJET- Blockchain based Data Sharing Framework
IRJET- Blockchain based Data Sharing FrameworkIRJET- Blockchain based Data Sharing Framework
IRJET- Blockchain based Data Sharing FrameworkIRJET Journal
 
Iaetsd future polling system using cloud computing in support with smart clie...
Iaetsd future polling system using cloud computing in support with smart clie...Iaetsd future polling system using cloud computing in support with smart clie...
Iaetsd future polling system using cloud computing in support with smart clie...Iaetsd Iaetsd
 
Decentralized Car Hailing Application
Decentralized Car Hailing ApplicationDecentralized Car Hailing Application
Decentralized Car Hailing ApplicationIRJET Journal
 
Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds IRJET Journal
 
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-PaymentsSurvey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-PaymentsIRJET Journal
 
IRJET- Noisy Content Detection on Web Data using Machine Learning
IRJET- Noisy Content Detection on Web Data using Machine LearningIRJET- Noisy Content Detection on Web Data using Machine Learning
IRJET- Noisy Content Detection on Web Data using Machine LearningIRJET Journal
 
Blockchain Technology: Its Impact on the Consumer-Centric Model in Digital Ma...
Blockchain Technology: Its Impact on the Consumer-Centric Model in Digital Ma...Blockchain Technology: Its Impact on the Consumer-Centric Model in Digital Ma...
Blockchain Technology: Its Impact on the Consumer-Centric Model in Digital Ma...IRJET Journal
 
A STUDY ON PEER TO PEER NETWORK IN CURRENT NETWORKING
A STUDY ON PEER TO PEER NETWORK IN CURRENT NETWORKING A STUDY ON PEER TO PEER NETWORK IN CURRENT NETWORKING
A STUDY ON PEER TO PEER NETWORK IN CURRENT NETWORKING IAEME Publication
 

Similar to Survey on Peer to Peer Car Sharing System Using Blockchain (20)

How to leverage blockchain for making machine learning models more accessible
How to leverage blockchain for making machine learning models more accessible How to leverage blockchain for making machine learning models more accessible
How to leverage blockchain for making machine learning models more accessible
 
Final year IEEE 2016-2017 PROJECTS TITLES (IEEE 2016 papers) For ME,M.Tech,BE...
Final year IEEE 2016-2017 PROJECTS TITLES (IEEE 2016 papers) For ME,M.Tech,BE...Final year IEEE 2016-2017 PROJECTS TITLES (IEEE 2016 papers) For ME,M.Tech,BE...
Final year IEEE 2016-2017 PROJECTS TITLES (IEEE 2016 papers) For ME,M.Tech,BE...
 
Women's Maltreatment Redressal System based on Machine Learning Techniques
Women's Maltreatment Redressal System based on Machine Learning TechniquesWomen's Maltreatment Redressal System based on Machine Learning Techniques
Women's Maltreatment Redressal System based on Machine Learning Techniques
 
Trust Based Packet Filtering.pptx
Trust Based Packet Filtering.pptxTrust Based Packet Filtering.pptx
Trust Based Packet Filtering.pptx
 
Third Party Public Auditing Scheme for Security in Cloud Storage
Third Party Public Auditing Scheme for Security in Cloud StorageThird Party Public Auditing Scheme for Security in Cloud Storage
Third Party Public Auditing Scheme for Security in Cloud Storage
 
State of the Art in Cloud Security
State of the Art in Cloud SecurityState of the Art in Cloud Security
State of the Art in Cloud Security
 
Secure and Transparent Insurance Application using Blockchain Technology
Secure and Transparent Insurance Application using Blockchain TechnologySecure and Transparent Insurance Application using Blockchain Technology
Secure and Transparent Insurance Application using Blockchain Technology
 
Top 8 Trends in Performance Engineering
Top 8 Trends in Performance EngineeringTop 8 Trends in Performance Engineering
Top 8 Trends in Performance Engineering
 
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud ComputingIRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
 
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesCentralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data Services
 
IRJET- Effctive In-House Voting and Implementation using Block-Chain Veri...
IRJET-  	  Effctive In-House Voting and Implementation using Block-Chain Veri...IRJET-  	  Effctive In-House Voting and Implementation using Block-Chain Veri...
IRJET- Effctive In-House Voting and Implementation using Block-Chain Veri...
 
IRJET- Blockchain based Data Sharing Framework
IRJET- Blockchain based Data Sharing FrameworkIRJET- Blockchain based Data Sharing Framework
IRJET- Blockchain based Data Sharing Framework
 
Iaetsd future polling system using cloud computing in support with smart clie...
Iaetsd future polling system using cloud computing in support with smart clie...Iaetsd future polling system using cloud computing in support with smart clie...
Iaetsd future polling system using cloud computing in support with smart clie...
 
Decentralized Car Hailing Application
Decentralized Car Hailing ApplicationDecentralized Car Hailing Application
Decentralized Car Hailing Application
 
Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds
 
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-PaymentsSurvey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
 
IRJET- Noisy Content Detection on Web Data using Machine Learning
IRJET- Noisy Content Detection on Web Data using Machine LearningIRJET- Noisy Content Detection on Web Data using Machine Learning
IRJET- Noisy Content Detection on Web Data using Machine Learning
 
Blockchain Technology: Its Impact on the Consumer-Centric Model in Digital Ma...
Blockchain Technology: Its Impact on the Consumer-Centric Model in Digital Ma...Blockchain Technology: Its Impact on the Consumer-Centric Model in Digital Ma...
Blockchain Technology: Its Impact on the Consumer-Centric Model in Digital Ma...
 
A STUDY ON PEER TO PEER NETWORK IN CURRENT NETWORKING
A STUDY ON PEER TO PEER NETWORK IN CURRENT NETWORKING A STUDY ON PEER TO PEER NETWORK IN CURRENT NETWORKING
A STUDY ON PEER TO PEER NETWORK IN CURRENT NETWORKING
 
Ijciet 08 02_003
Ijciet 08 02_003Ijciet 08 02_003
Ijciet 08 02_003
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 

Recently uploaded (20)

chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 

Survey on Peer to Peer Car Sharing System Using Blockchain

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 63 Survey on Peer to Peer Car Sharing System Using Blockchain Pankaj Desai1, Mahesh KoltePatil2, Tanmay Dandile3, Shivam Shingare4, Prof. K.S Hangargi5 1Pankaj Desai, Student of Computer Engineering at P.K Technical Campus, Pune 2Mahesh KoltePatil, Student of Computer Engineering at P.K Technical Campus, Pune 3Tanmay Dandile, Student of Computer Engineering Student P.K Technical Campus, Pune 4Shivam Shingare, Student of Computer Engineering at P.K Technical Campus, Pune 5Prof. K.S Hangargi, Dept Computer Engineering, P.K Technical Campus, Pune ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract – By giving people access to shared vehicles and limiting the use of private automobiles, car-sharing programs can help with a number of urban challenges. People may now utilize a shared automobile by performingbasicoperations on their mobile devices thanks to the growth of the Internet of Things. The car-sharingprogram, however, hassecurity issues. Sensitive data is communicated for car-sharing via a public channel, including the user's identification, position data, and access code. As a result, an attacker may be able to obtain this data for improper reasons, making the development of a secure authentication protocol crucial. Key Words: Car Sharing, automobiles, authentication, blockchain . 1. INTRODUCTION In order to deal with urban transportation issues including road congestion and fuel combustion pollution, car-sharing programs were created. Carsharing is a substitute for owning a vehicle that enables people to increase their mobility without having to pay forupkeepandstorage.Peer- to-peer (P2P) carsharingisa cutting-edgeshared-usevehicle concept in which individuals in the neighborhood have access to privately owned vehicles. P2P start-ups are a part of a group of internet businesses that have promoted the development of "collaborative consumption" and the "sharing economy" ideas. P2P vehicle sharing is one of several shared-use mobility services that are concentrated on sharing transportation resources, and the sharing economy is emerging as a more significant force in society.. The P2P service model isa systemwhereautomobileowners turn their own vehicles into shared carsandrentthemout to other customers. In a conventional car-sharing system, a centralised service server can store and manage user data as well as service data. A centralisedserver,however,isvulnerabletoa malevolent attacker's single point of failure. For instance, if the service server is hacked and all the sharing records are wiped, the user won't be able to access the earlier data matching to the information about the used cars when anything goes missing from the cars. Additionally, iftheuser engaged in fraudulent activity during car-sharing, or if the sharing records are altered. Finding the user's proof of a crime from these recordings is challenging. Additionally, if the information that has been saved has been compromised, it poses a major risk to user privacy. 1.1 Literature Survey System analysis is a thorough assessment of the system's many systems, as well as their interactions both inside and outside the system. Why are there so many faults in the present system is the crucial query here. What actions need to be performed to fix the issue? The analysis starts when a user or administrator launches a software survey on the live system. The information is gatheredthroughavarietyoffiles, decision-making processes, and analysis-related activities carried out by the present system. Example Data Stream The method makes extensive use of drawings and other media. Training, expertise, and common sense are needed to obtain the crucial data needed to create a system. The way in which the problem is discovered, thoroughly read, and properly executed by choosing a solution, is essentially what determinestheeffectivenessofthesystem.A good analytical model should provide a framework for solving the problem in addition to methods for understanding it. As a consequence, further information should be looked into throughgatheringsystem-relateddata. The needs of the proposed system should then be carefully assessed. There are four sections in the system analysis. 1. Initial analysis and system layout. 2. Performing systematic analysis with the use of analytical tools. 3. A study of the possibilities. 4. Examine the expenses and advantages. 2. PROPOSED SYSTEM The proposed protocol will protect users from man-in-the- middle,replay,offlinepasswordguessing,impersonation,and stolen mobile device threats. By doing a loose security analysis, the suggested protocol offers reciprocal authentication, anonymity, and secrecy. Comparisons were made between the proposed protocol's performance and similar systems. The suggested protocol may be used in the blockchain-based car-sharing system and is effective. The
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 64 protocol will eventually be tested and applied to a genuine car-sharing system using a simulation. The suggested car- sharing system authentication technique was built on the blockchain and consists of five entities: the trust authority, stations, owners, vehicles, and users. Chart -1: Flowchart Advantages: Blockchain provides a high degree of security due to independent verification procedures that occur across all participating computers on a blockchain network. In situations involving digital currencies, this verification is used to validate transaction blocks prior to theirinclusionin the chain. 1. Fast, Secure, and Efficient Transactions 2. Transparent and Accurate Pricing Model. 3. Less work is required thanks to online reservation tools. 4. Traveling is simplified. 5. Strengthened Security and Privacy Standards. 3. Future Work Although blockchainmaybe usedindependently,its effectiveness is expected to be better when combined with other technologies like the Internet of Things, artificial intelligence, and big data. Better answers for location-based automobile services might result from this. Future extensions of the study include I an analysis of the application's performance and cost. Since blockchain technology is a trust-free system that enables consumers to trust data, it is also important to examine the technology from the standpoint of data processing. Althoughblockchain technology generally improves data quality, it is crucial to understandthedata processingcapabilities whenconnecting the blockchain with a larger software system. iii) Examine the data processing workloads across various blockchain architectures. 4. CONCLUSIONS As a solution to the mobility issues in metropolitan areas, car-sharing programmes have garnered a lot of interest. However, the centralised system structure and communication over a public channel of the conventional car-sharing system expose it to various security issues. In order to provide a decentralised sharing service for authorised users, this article presented a safe decentralised model of a car-sharing system as well as a secure authentication technique. Blockchain was utilised to offer a decentralised car-sharing service and guarantee the accuracy of service information.Inorderto ensuretheuser's privacy, a pseudonym was also used in the car-sharing system. As a result, even if the adversary accesses the stored data, they are unable to determine the user's true identity. The suggested protocol may enable safe mutual authentication between the user, station, and owner, according to BAN logic analysis, which was used to demonstrate this. Additionally, the suggested protocol's security against replay and man-in-the-middle attacks was shown using the AVISPA simulation. ACKNOWLEDGEMENT Up until now, we have put forth a tremendous amount of work to support this endeavour. Whatever thecase,itwould not have been possible without the thoughtful support and cooperation of several people and organisations. We could want to let them know how appreciative we are to each of them. We are excited to provide this research on "Peer to Peer Car Sharing System Using Blockchain." We would like to thank Mrs. K.S. Hangargi, who served as our guide, for her invaluable advice in helping us analyse our project. We also like to express our gratitudetothe Prof.S.R.Bhujbal HOD of Computer Engineering for providing the required resources. REFERENCES [1] A. Dorri, M. Steger, S. S. Kanhere, and R. Jurdak,, “BlockChain: A distributed solution to automotive security and privacy,’’ IEEE Commun. Mag., vol. 55, no. 12, pp. 119–125, Dec. 2017. [2] D.Puthal, “The blockchain as a decentralized security framework,” IEEE Consum. Electron. Mag., vol. 7. [3] P.W. Wadhwani and P. Saha, “Car sharing marketsizeby model”.