2020 International Wireless Communications and Mobile Computing (IWCMC) 2020
DOI: 10.1109/iwcmc48107.2020.9148566
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of Blockchain-based Cybersecurity for Vehicular Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
18
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 21 publications
(18 citation statements)
references
References 33 publications
0
18
0
Order By: Relevance
“…Its purpose is to organize the data sent from the network layer and track the IoT and network environment carefully in real‐time for fault finding 25 . There are different techniques associated with resource planning, resource positioning, resource arrangement, and assignment 26 …”
Section: Research Selection and Analysis Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Its purpose is to organize the data sent from the network layer and track the IoT and network environment carefully in real‐time for fault finding 25 . There are different techniques associated with resource planning, resource positioning, resource arrangement, and assignment 26 …”
Section: Research Selection and Analysis Methodsmentioning
confidence: 99%
“…25 There are different techniques associated with resource planning, resource positioning, resource arrangement, and assignment. 26 According to Figure 3, we illustrate a taxonomy on the existing BaaS models that are categorized into three main classes including data layer, network layer, and resource layer models. In the data layer model, the BaaS model is applied…”
Section: Brief Description Of Baas Taxonomymentioning
confidence: 99%
“…Several researchers have separately presented engaging surveys on FL for vehicular networks [16,[18][19][20][21] and blockchain for vehicular networks [22][23][24][25][26]. However, to the best of our knowledge, this is the first time that blockchain and FL have been combined for vehicle networks.…”
Section: Comparison and Contributionmentioning
confidence: 99%
“…However, although the primary problems related to the application of Blockchain to the IoV were analyzed, the classification methodology of analyzed works was not considered. Wang et al [20] surveyed Blockchain-based cybersecurity for vehicular networks and discussed the cybersecurity threat analysis of vehicular networks; however, recent advances in fifth-generation (5G) technology, big data analytics, and machine learning were not considered. Dibaei et al [21] investigated the integration of innovative technologies (e.g., machine learning and Blockchain) to IoV for securing vehicular networks.…”
Section: A Related Work and Contributions Of This Surveymentioning
confidence: 99%
“…However, the challenges that hinder the implementation of deep learning and Blockchain in vehicular networks have not been well investigated. Wang et al [20] investigated several aspects (e.g., preserving privacy in IoV, certificate management, trust management, and Blockchain-based IoV security) of the Blockchain implementation in the IoV; however, they did discuss the open issues in detail, and recommendations for further research were not provided. Mikavica et al [22] reviewed state-of-the-art Blockchain architectures according to their primary features and objectives related to security, privacy preservation, and trust management.…”
Section: A Related Work and Contributions Of This Surveymentioning
confidence: 99%