2023
DOI: 10.3390/electronics12030677
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight-BIoV: Blockchain Distributed Ledger Technology (BDLT) for Internet of Vehicles (IoVs)

Abstract: The vast enhancement in the development of the Internet of Vehicles (IoV) is due to the impact of the distributed emerging technology and topology of the industrial IoV. It has created a new paradigm, such as the security-related resource constraints of Industry 5.0. A new revolution and dimension in the IoV popup raise various critical challenges in the existing information preservation, especially in node transactions and communication, transmission, trust and privacy, and security-protection-related problem… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
30
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 52 publications
(30 citation statements)
references
References 34 publications
0
30
0
Order By: Relevance
“…(2021). As well as Lightweight-BIoV: Blockchain Distributed Ledger Technology (BDLT) for Internet of Vehicles (IoVs) is discussed in Laghari et al. (2023).…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…(2021). As well as Lightweight-BIoV: Blockchain Distributed Ledger Technology (BDLT) for Internet of Vehicles (IoVs) is discussed in Laghari et al. (2023).…”
Section: Resultsmentioning
confidence: 99%
“…A Blockchain saw tooth-enabled modular architecture for protected, secure and trusted execution, service delivery and acknowledgment with immutable ledger storage and security and peer-to-peer (P2P) network on-chain and offchain inter-communication for vehicular activities is provided in Laghari et al (2021). As well as Lightweight-BIoV: Blockchain Distributed Ledger Technology (BDLT) for Internet of Vehicles (IoVs) is discussed in Laghari et al (2023).…”
Section: Resultsmentioning
confidence: 99%
“…Once a client interacts with it, it can easily dispatch attacks and control the signals going to and from the client to the cloud. 15,60,61 Security concern is continuously there when there are numerous systems included. Since fog computing is based on remote innovation, there's a tremendous concern concerning arranged security.…”
Section: Security Threats In Fog Servermentioning
confidence: 99%
“…A malicious fog hub may be a fog device that seems to be legal and persuades the end user to use it. Once a client interacts with it, it can easily dispatch attacks and control the signals going to and from the client to the cloud 15,60,61 . Security concern is continuously there when there are numerous systems included.…”
Section: Security Challenges Faced By the Entities In Fogmentioning
confidence: 99%
“…As a prevalent computing technology paradigm, the Internet of Things (IoT) is widely utilized in various fields, including smart healthcare [1], smart grids [2], and smart cities [3,4]. However, with the rapid increase in IoT applications, they are confronted with numerous security and privacy challenges.…”
Section: Introductionmentioning
confidence: 99%