2021
DOI: 10.1109/mnet.011.2000554
|View full text |Cite
|
Sign up to set email alerts
|

Blockchain-Enabled Intelligent Vehicular Edge Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1
1
1

Relationship

1
8

Authors

Journals

citations
Cited by 27 publications
(12 citation statements)
references
References 12 publications
0
11
0
Order By: Relevance
“…A novel trust management system based on blockchain for the cooperative verification and storage of sensitive data with the help of MEC is further presented in [15]. From the MEC perspective, blockchain technology can ensure that the data shared by CVs are legitimate and that each CV has corresponding permissions to access the computing resources of MEC servers [16], [17]. Finally, from the communication point of view, blockchain can be applied for radio resource sharing, mobility management and the establishment of service level agreements (SLAs) between network operators and CVs [18], [19].…”
Section: B Blockchain-empowered V2i Solutionsmentioning
confidence: 99%
“…A novel trust management system based on blockchain for the cooperative verification and storage of sensitive data with the help of MEC is further presented in [15]. From the MEC perspective, blockchain technology can ensure that the data shared by CVs are legitimate and that each CV has corresponding permissions to access the computing resources of MEC servers [16], [17]. Finally, from the communication point of view, blockchain can be applied for radio resource sharing, mobility management and the establishment of service level agreements (SLAs) between network operators and CVs [18], [19].…”
Section: B Blockchain-empowered V2i Solutionsmentioning
confidence: 99%
“…For information that is not an emergency, the requirements can be lowered. Based on the different requirements, V2X services can be divided into several basic types [23,24].…”
Section: V2xmentioning
confidence: 99%
“…To solve these problems, the European Telecommunications Standards Institute, in 2014, proposed the use of mobile peripheral computing [3]. Cloud-based models require the transmission and storage of V2X system object data in specialized data centers, which increases the likelihood of information leakage or loss and long latency, which can lead to accidents [24]. In addition to this, the devices require additional services, such as computing and updating the user rating and network segment selection, which is a very time-consuming process; further, it becomes necessary to resort to mobile edge computing technology.…”
Section: Integration Of Mobile Edge Computing (Mec) Into the V2x Systemmentioning
confidence: 99%
“…In vehicular edge computing (VEC), many IoT devices in different places, such as roads, vehicles, drivers, and passengers, continuously generate data. These data bring enormous delay-sensitive and computation-sensitive applications, including intelligent navigation, autonomous driving, intelligent entertainment, accident warnings, augmented realitysupported gaming, AI-based pedestrian detection, and fuel scheduling [15], [16]. The data generated by these applications must be processed and stored on time, which is not in the ability of resource-limited IoT devices.…”
Section: Motivationmentioning
confidence: 99%