2019
DOI: 10.1109/mitp.2019.2912142
|View full text |Cite
|
Sign up to set email alerts
|

Realization of Blockchain in Named Data Networking-Based Internet-of-Vehicles

Abstract: The theme topic or column/department name goes after the colon. Realization of Blockchain in Named Data Networking-based Internet-of-Vehicles The revolution of Internet-of-vehicles (IoV) has stimulated a substantial response from academia, research and industry due to its massive potential to improve overall transportation. Current IoV faces huge challenges due to its reliance on the IP-based network architecture. Therefore, Named Data Networking (NDN) is proposed as a promising architecture to solve issues po… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 30 publications
(20 citation statements)
references
References 14 publications
0
20
0
Order By: Relevance
“…The ability of vehicles to securely communicate among themselves is a key factor for a successful vehicular system. The objective of research works in the communication and network axis [ [157], [158], [376]- [378], [383]- [411], [453], [468]- [471] was to enhance existing or suggest new communication protocols in vehicular networks, such as VANETs [374], [375], [390], [394], IoT based networks [385], IoV [157], [387], [389], [391], [472], [473], UAVs [388], SDN [157], [158], [412], for better security, privacy, trust, reliability, authentication, anonymity, access control, and security against attacks. The contributions were from two major IoV layers: communication and security layers.…”
Section: E Communication and Networkmentioning
confidence: 99%
“…The ability of vehicles to securely communicate among themselves is a key factor for a successful vehicular system. The objective of research works in the communication and network axis [ [157], [158], [376]- [378], [383]- [411], [453], [468]- [471] was to enhance existing or suggest new communication protocols in vehicular networks, such as VANETs [374], [375], [390], [394], IoT based networks [385], IoV [157], [387], [389], [391], [472], [473], UAVs [388], SDN [157], [158], [412], for better security, privacy, trust, reliability, authentication, anonymity, access control, and security against attacks. The contributions were from two major IoV layers: communication and security layers.…”
Section: E Communication and Networkmentioning
confidence: 99%
“…[72] Incorporates Mobile Edge Computing (MEC) nodes for providing computing resources and to act as managers of local P2P trading system. [63] Edge servers analyse transactions and contribute to partial block creation Edge computing [131] Vehicular edge computing network [53] NDN solves issues posed by IP-based networks [159] Amalgamation of blokchain and NDN helps in achieving integrity and accountability in the network. Named Data Networking (NDN) [18] NDN facilitates content centric data sharing for IoV.…”
Section: Cloud Computingmentioning
confidence: 99%
“…There is a lot of recent interest in this technology since it is especially applicable for IoV. They have been used in studies like [18], [53], [159] for achieving high integrity and accountability in a vehicular network.…”
Section: Ccn/ndn/icnmentioning
confidence: 99%
“…To verify the authenticity of the public key, one can retrieve the secret key chain using the key name. In principle, this method avoids the generation of false messages, but in the application of IoV, there are still some challenges [12]: (1) as a centralized service centre, the root key may be subject to attacks and tampering, which can lead to a single point of failure. Especially in the case of crossdomain key verification, since each domain is relatively independent, it is difficult for each domain to verify the authenticity of the keys issued by the other domains without a trust anchor; (2) since verification needs to traverse the secret key chain, the process of retrieval and verification requires considerable additional overhead, which cannot meet the low-delay requirements of IoV.…”
Section: Introductionmentioning
confidence: 99%