skip to main content
research-article
Free Access
Just Accepted

A Trusted Paradigm of Data Management for Blockchain-Enabled Internet of Vehicles in Smart Cities

Authors Info & Claims
Online AM:24 November 2022Publication History
Skip Editorial Notes Section

Editorial Notes

EXPRESSION OF CONCERN: ACM is issuing a formal Expression of Concern for all papers published in the TOSN Special Issue on Green Communications and Sensor Networks with Machine Intelligence for Smart Cities while a thorough investigation takes place with regards to the integrity of the peer review process. ACM strongly suggests that papers in this special issue not be cited in the literature until ACM's investigation has concluded and final decisions have been made regarding the integrity of the peer review process.

Skip Abstract Section

Abstract

Internet of Vehicles(IoV) enables vehicles to generate and share messages to improve transportation safety and efficiency, especially in a smart city scenario where modern communication technology is utilized. The current IoV, however, faces three main issues: (1) existing frameworks fail to build a complete data management system, (2) received messages in an untrusted environment are challenging to assess for credibility, and (3) the centralized ways to store data are causing severe security and efficiency problems. Blockchain-enabled IoV (BIoV) provides an opportunity for addressing these issues. This paper proposes a trusted paradigm of data management based on a vehicle–road–cloud architecture. A few-shot learning model, Wasserstein Generative Adversarial Network (WGAN) with Synthetic Minority Oversampling Technique (SMOTE) sampling is designed to evaluate whether the uploading message is malicious. This paper also proposes the novel group-weighted-decay Practical Byzantine Fault Tolerance (PBFT) consensus algorithm, an improved version of PBFT to store data, and provides a comprehensive review of its viability and data management procedures. By employing the joint gwd-PBFT and Proof of Trust (PoT) consensus, the method mitigates the issue of excessive incentives. According to simulation results, the system's overall efficiency can be increased while retaining security and availability.

References

  1. Gerla, M., Lee, E. K., Pau, G., & Lee, U. (2014, March). Internet of vehicles: From intelligent grid to autonomous cars and vehicular clouds. In 2014 IEEE world forum on internet of things (WF-IoT) (pp. 241-246). IEEE.Google ScholarGoogle Scholar
  2. Alam, K. M., Saini, M., & El Saddik, A. (2015). Toward social internet of vehicles: Concept, architecture, and applications. IEEE access, 3, 343-357.Google ScholarGoogle Scholar
  3. Sharma, S., & Kaushik, B. (2019). A survey on internet of vehicles: Applications, security issues & solutions. Vehicular Communications, 20, 100182.Google ScholarGoogle ScholarCross RefCross Ref
  4. A Zanella, A., Bui, N., Castellani, A., Vangelista, L., & Zorzi, M. (2014). Internet of things for smart cities. IEEE Internet of Things journal, 1(1), 22-32.Google ScholarGoogle ScholarCross RefCross Ref
  5. Ang, L. M., Seng, K. P., Zungeru, A. M., & Ijemaru, G. K. (2017). Big sensor data systems for smart cities. IEEE Internet of Things Journal, 4(5), 1259-1271.Google ScholarGoogle ScholarCross RefCross Ref
  6. Bagga, P., Sutrala, A. K., Das, A. K., & Vijayakumar, P. (2021). Blockchain-based batch authentication protocol for Internet of Vehicles. Journal of Systems Architecture, 113, 101877.Google ScholarGoogle ScholarCross RefCross Ref
  7. Kaiwartya, O., Abdullah, A. H., Cao, Y., Altameem, A., Prasad, M., Lin, C. T., & Liu, X. (2016). Internet of vehicles: Motivation, layered architecture, network model, challenges, and future aspects. IEEE access, 4, 5356-5373.Google ScholarGoogle Scholar
  8. Kaiwartya, O., Cao, Y., Lloret, J., Kumar, S., Aslam, N., Kharel, R., ... & Shah, R. R. (2018). Geometry-based localization for GPS outage in vehicular cyber physical systems. IEEE Transactions on Vehicular Technology, 67(5), 3800-3812.Google ScholarGoogle ScholarCross RefCross Ref
  9. H. Moustafa and Y. Zhang, Vehicular Networks: Techniques Standards and Applications., New York, NY, USA:Auerbach, 2009.Google ScholarGoogle Scholar
  10. Xie, S., Zheng, Z., Chen, W., Wu, J., Dai, H. N., & Imran, M. (2020). Blockchain for cloud exchange: A survey. Computers & Electrical Engineering, 81, 106526.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Liu, D., Ni, J., Huang, C., Lin, X., & Shen, X. S. (2020). Secure and efficient distributed network provenance for iot: A blockchain-based approach. IEEE Internet of Things Journal, 7(8), 7564-7574.Google ScholarGoogle ScholarCross RefCross Ref
  12. Huang, P., Huang, B., Zhao, Y., Qiang, Z., & Qing, M. (2020, December). BCoV: A covergence of blockchain and IoV. In 2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C) (pp. 636-643). IEEE.Google ScholarGoogle ScholarCross RefCross Ref
  13. Wang, C., Cheng, X., Li, J., He, Y., & Xiao, K. (2021). A survey: applications of blockchain in the internet of vehicles. EURASIP Journal on wireless communications and networking, 2021(1), 1-16.Google ScholarGoogle Scholar
  14. Xu, L., Ge, M., & Wu, W. (2022). Edge server deployment scheme of blockchain in IoVs. IEEE Transactions on Reliability, 71(1), 500-509.Google ScholarGoogle ScholarCross RefCross Ref
  15. Aung, N., Kechadi, T., Dhelim, S., Zhu, T., Berini, A. D. E., & Guerbouz, T. (2022). Blockchain Application on the Internet of Vehicles (IoV). arXiv preprint arXiv:2205.03832.Google ScholarGoogle Scholar
  16. Hossain, M. M., Hasan, R., & Zawoad, S. (2017, June). Trust-IoV: A Trustworthy Forensic Investigation Framework for the Internet of Vehicles (IoV). In ICIOT (pp. 25-32).Google ScholarGoogle Scholar
  17. Gai, F., Zhang, J., Zhu, P., & Jiang, X. (2017, June). Ratee-based trust management system for internet of vehicles. In International Conference on Wireless Algorithms, Systems, and Applications (pp. 344-355). Springer, Cham.Google ScholarGoogle ScholarCross RefCross Ref
  18. Mendiboure, L., Chalouf, M. A., & Krief, F. (2018, November). Towards a blockchain-based SD-IoV for applications authentication and trust management. In International Conference on Internet of Vehicles (pp. 265-277). Springer, Cham.Google ScholarGoogle Scholar
  19. Truong, N. B., Um, T. W., Zhou, B., & Lee, G. M. (2018, May). Strengthening the blockchain-based internet of value with trust. In 2018 IEEE international conference on communications (ICC) (pp. 1-7). IEEE.Google ScholarGoogle ScholarCross RefCross Ref
  20. Chai, H., Leng, S., Zhang, K., & Mao, S. (2019). Proof-of-reputation based-consortium blockchain for trust resource sharing in internet of vehicles. IEEE Access, 7, 175744-175757.Google ScholarGoogle ScholarCross RefCross Ref
  21. Kerrache, C. A., Lagraa, N., Hussain, R., Ahmed, S. H., Benslimane, A., Calafate, C. T., ... & Vegni, A. M. (2018). TACASHI: Trust-aware communication architecture for social internet of vehicles. IEEE Internet of Things Journal, 6(4), 5870-5877.Google ScholarGoogle ScholarCross RefCross Ref
  22. Chen, W., Chen, Y., Chen, X., & Zheng, Z. (2019). Toward secure data sharing for the IoV: A quality-driven incentive mechanism with on-chain and off-chain guarantees. IEEE Internet of Things Journal, 7(3), 1625-1640.Google ScholarGoogle ScholarCross RefCross Ref
  23. Siddiqui, S. A., Mahmood, A., Sheng, Q. Z., Suzuki, H., & Ni, W. (2021). A survey of trust management in the internet of vehicles. Electronics, 10(18), 2223.Google ScholarGoogle ScholarCross RefCross Ref
  24. Cheng, L., Liu, J., Xu, G., Zhang, Z., Wang, H., Dai, H. N., ... & Wang, W. (2019). SCTSC: A semicentralized traffic signal control mode with attribute-based blockchain in IoVs. IEEE Transactions on Computational Social Systems, 6(6), 1373-1385.Google ScholarGoogle ScholarCross RefCross Ref
  25. Tripathi, G., Ahad, M. A., & Sathiyanarayanan, M. (2019, December). The role of blockchain in internet of vehicles (iov): Issues, challenges and opportunities. In 2019 International Conference on contemporary Computing and Informatics (IC3I) (pp. 26-31). IEEE.Google ScholarGoogle ScholarCross RefCross Ref
  26. Devi, A., Rathee, G., & Saini, H. (2020, November). Using Optimization and Auction Approach: Security provided to Vehicle network through Blockchain Technology. In 2020 Sixth International Conference on Parallel, Distributed and Grid Computing (PDGC) (pp. 476-480). IEEE.Google ScholarGoogle ScholarCross RefCross Ref
  27. Wang, C., Cheng, X., Li, J., He, Y., & Xiao, K. (2021). A survey: applications of blockchain in the internet of vehicles. EURASIP Journal on wireless communications and networking, 2021(1), 1-16.Google ScholarGoogle Scholar
  28. Ravi, N., Verma, S., Jhanjhi, N. Z., & Talib, M. N. (2021, August). Securing VANET Using Blockchain Technology. In Journal of Physics: Conference Series (Vol. 1979, No. 1, p. 012035). IOP Publishing.Google ScholarGoogle Scholar
  29. Xu, L., Ge, M., & Wu, W. (2022). Edge server deployment scheme of blockchain in IoVs. IEEE Transactions on Reliability, 71(1), 500-509.Google ScholarGoogle ScholarCross RefCross Ref
  30. Hildebrand, B., Baza, M., Salman, T., Amsaad, F., Razaqu, A., & Alourani, A. (2022). A Comprehensive Review on Blockchains for Internet of Vehicles: Challenges and Directions. arXiv preprint arXiv:2203.10708.Google ScholarGoogle Scholar
  31. Sung, F., Yang, Y., Zhang, L., Xiang, T., Torr, P. H., & Hospedales, T. M. (2018). Learning to compare: Relation network for few-shot learning. In Proceedings of the IEEE conference on computer vision and pattern recognition (pp. 1199-1208).Google ScholarGoogle ScholarCross RefCross Ref
  32. Sun, Q., Liu, Y., Chua, T. S., & Schiele, B. (2019). Meta-transfer learning for few-shot learning. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (pp. 403-412).Google ScholarGoogle ScholarCross RefCross Ref
  33. Snell, J., Swersky, K., & Zemel, R. (2017). Prototypical networks for few-shot learning. Advances in neural information processing systems, 30.Google ScholarGoogle Scholar
  34. Oreshkin, B., Rodríguez López, P., & Lacoste, A. (2018). Tadam: Task dependent adaptive metric for improved few-shot learning. Advances in neural information processing systems, 31.Google ScholarGoogle Scholar
  35. Lee, K., Maji, S., Ravichandran, A., & Soatto, S. (2019). Meta-learning with differentiable convex optimization. In Proceedings of the IEEE/CVF conference on computer vision and pattern recognition (pp. 10657-10665).Google ScholarGoogle ScholarCross RefCross Ref
  36. Giannone, G., & Winther, O. (2022, June). SCHA-VAE: Hierarchical Context Aggregation for Few-Shot Generation. In International Conference on Machine Learning (pp. 7550-7569). PMLR.Google ScholarGoogle Scholar
  37. Mar, J., & Liu, J. (2022). Constrained Few-Shot Learning: Human-Like Low Sample Complexity Learning and Non-Episodic Text Classification. arXiv preprint arXiv:2208.08089.Google ScholarGoogle Scholar
  38. You, C., Dai, W., Staib, L., & Duncan, J. S. (2022). Bootstrapping Semi-supervised Medical Image Segmentation with Anatomical-aware Contrastive Distillation. arXiv preprint arXiv:2206.02307.Google ScholarGoogle Scholar
  39. Shao, C., & Feng, Y. (2022). Overcoming Catastrophic Forgetting beyond Continual Learning: Balanced Training for Neural Machine Translation. arXiv preprint arXiv:2203.03910.Google ScholarGoogle Scholar
  40. Boo, Y., & Choi, Y. (2022). Comparison of mortality prediction models for road traffic accidents: an ensemble technique for imbalanced data. BMC public health, 22(1), 1-10.Google ScholarGoogle Scholar
  41. Ratliff, L. J., Burden, S. A., & Sastry, S. S. (2013, October). Characterization and computation of local Nash equilibria in continuous games. In 2013 51st Annual Allerton Conference on Communication, Control, and Computing (Allerton) (pp. 917-924). IEEE.Google ScholarGoogle ScholarCross RefCross Ref
  42. Arjovsky, M., Chintala, S., & Bottou, L. (2017, July). Wasserstein generative adversarial networks. In International conference on machine learning (pp. 214-223). PMLR.Google ScholarGoogle Scholar
  43. Chawla, N. V., Bowyer, K. W., Hall, L. O., & Kegelmeyer, W. P. (2002). SMOTE: synthetic minority over-sampling technique. Journal of artificial intelligence research, 16, 321-357.Google ScholarGoogle ScholarCross RefCross Ref
  44. Lao, L., Dai, X., Xiao, B., & Guo, S. (2020, May). G-PBFT: a location-based and scalable consensus protocol for IOT-Blockchain applications. In 2020 IEEE International Parallel and Distributed Processing Symposium (IPDPS) (pp. 664-673). IEEE.Google ScholarGoogle ScholarCross RefCross Ref
  45. Wang, Y., Song, Z., & Cheng, T. (2019, December). Improvement research of PBFT consensus algorithm based on credit. In International Conference on Blockchain and Trustworthy Systems (pp. 47-59). Springer, Singapore.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in

Full Access

  • Published in

    cover image ACM Transactions on Sensor Networks
    ACM Transactions on Sensor Networks Just Accepted
    ISSN:1550-4859
    EISSN:1550-4867
    Table of Contents

    Copyright © 2022 Association for Computing Machinery.

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Online AM: 24 November 2022
    • Accepted: 4 November 2022
    • Revised: 18 October 2022
    • Received: 5 September 2022
    Published in tosn Just Accepted

    Check for updates

    Qualifiers

    • research-article

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader