4.8 Article

A Blockchain-SDN-Enabled Internet of Vehicles Environment for Fog Computing and 5G Networks

期刊

IEEE INTERNET OF THINGS JOURNAL
卷 7, 期 5, 页码 4278-4291

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2019.2956241

关键词

Blockchain; fifth generation (5G); fog computing; Internet of Things (IoT); Internet of Vehicles (IoV); software-defined networks (SDNs); trust; vehicular ad hoc network (VANET)

资金

  1. National Key Research and Development Project [2017YFB0802900]
  2. Program of International Science and Technology Cooperation and Exchange of Sichuan Province [2017HH0028, 2018HH0102, 2019YFH0014]
  3. Sichuan Science and Technology Program [2017CC0071]
  4. Natural Science Foundation of China [61572115]
  5. CCF-Tencent Open Research Fund WeBank Special Funding
  6. Research on Key Technologies of Energy Internet Mobile and Interconnection Security

向作者/读者索取更多资源

The goal of intelligent transport systems (ITSs) is to enhance the network performance of vehicular ad hoc networks (VANETs). Even though it presents new opportunities to the Internet of Vehicles (IoV) environment, there are some security concerns including the need to establish trust among the connected peers. The fifth-generation (5G) communication system, which provides reliable and low-latency communication services, is seen as the technology to cater for the challenges in VANETs. The incorporation of software-defined networks (SDNs) also ensures an effective network management. However, there should be monitoring and reporting services provided in the IoV. Blockchain, which has decentralization, transparency, and immutability as some of its properties, is designed to ensure trust in networking platforms. In that regard, this article analyzes the combination of blockchain and SDN for the effective operation of the VANET systems in 5G and fog computing paradigms. With managerial responsibilities shared between the blockchain and the SDN, it helps to relieve the pressure off the controller due to the ubiquitous processing that occurs. A trust-based model that curbs malicious activities in the network is also presented. The simulation results substantially guarantee an efficient network performance, while also ensuring that there is trust among the entities.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.8
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据