You are currently viewing a new version of our website. To view the old version click .
Sensors
  • Article
  • Open Access

19 April 2023

FlexiChain 3.0: Distributed Ledger Technology-Based Intelligent Transportation for Vehicular Digital Asset Exchange in Smart Cities

,
and
1
Department of Computer Science and Engineering, University of North Texas, Denton, TX 76203, USA
2
Department of Electrical Engineering, University of North Texas, Denton, TX 76203, USA
*
Author to whom correspondence should be addressed.
This article belongs to the Special Issue Advanced Sensing Technology in Intelligent Transportation Systems

Abstract

Due to the enormous amounts of data being generated between users, Intelligent Transportation Systems (ITS) are complex Cyber-Physical Systems that necessitate a reliable and safe infrastructure. Internet of Vehicles (IoV) is the term that describes the interconnection for every single node, device, sensor, and actuator that are Internet enabled, whether attached or unattached to vehicles. A single smart vehicle will generate a huge amount of data. Concurrently, it needs an instant response to avoid accidents since vehicles are fast-moving objects. In this work, we explore Distributed Ledger Technology (DLT) and collect data about consensus algorithms and their applicability to be used in the IoV as the backbone of ITS. Multiple distributed ledger networks are currently in operation. Some are used in finance or supply chains, and others are used for general decentralized applications. Despite the secure and decentralized nature of the blockchain, each of these networks has trade-offs and compromises. Based on the analysis of consensus algorithms, a conclusion has been made to design one that fits the requirements of ITS-IOV. FlexiChain 3.0 is proposed in this work to serve as a Layer0 network for different stakeholders in the IoV. A time analysis has been conducted and shows a capacity of 2.3 transactions per second, which is an acceptable speed to be used in IoV. Moreover, a security analysis was conducted as well and shows high security and high independence of the node number in terms of security level per the number of participants.

1. Introduction

Every day, the number of vehicles on the road is increasing, which causes traffic congestion and delays in the transit process for emergency vehicles, such as ambulances, fire trucks and police cars [1]. Transportation solutions that were formerly acceptable have become insufficient in addressing the enormous growth in the number of vehicles over the last two decades despite significant improvements in infrastructure [2]. ITS integration is more important than ever. ITS is meant to aid in the construction of “smart roads” by decreasing the incidence of traffic jams and increasing the effectiveness of relieving them. Insight into traffic conditions and availability is provided to users. As a result, travel is safer and more pleasant, and less time is spent traveling to and from daily destinations. The IoV is a novel concept that evolved from the idea of Vehicular Ad hoc Networks (VANETs) as a result of recent advances in computing and communication technology [3,4]. For ITS to function, the IoV must first be established. The United States Department of Transportation (DOT) [5] claims that the IoV can help reduce accidents involving sober drivers. Cars can communicate with each other in order to track other cars’ movements and whereabouts [6]. The term IoV is used to describe a system in which vehicles are linked together and can share and receive information from one another and from other devices. This paves the way for the instantaneous dissemination of data regarding traffic conditions, road hazards, and other elements that might significantly affect travelers’ safety and productivity.
With the IoV in place, it is predicted that 79% of such collisions can be prevented through improved coordination and dialogue between vehicles [2]. Bicycles, pedestrians, and roadside infrastructures are all linked together, reducing environmental pollution, accident rates, and traffic jams [7,8,9] by exchanging messages about traffic conditions and information on safety and accidents with a worldwide traffic control system that improves convenience, comfort, and safety. Thus, improvements in public transportation and pedestrian traffic are also possible. Because of Global Positioning Systems (GPS) technology, it is now possible to know where other vehicles are in situations such as blind spots, stoppages on the highway but concealed from view, around a blind corner, or blocked by other vehicles. A vehicle’s ability to anticipate and respond to changing driving conditions can provide immediate warning to its owners [10]. When it comes to preventing car accidents, the primary purpose of Vehicle-to-Vehicle (V2V) communication technology is to help drivers be aware of their surroundings and increase safety at a reasonable cost.
Traditional means of interoperability in the IoV have included cellular networks, satellite communications, and Dedicated Short-Range Communication (DSRC). While these approaches have shown promise, they are not without drawbacks, including security risks and transmission inefficiencies. For example, a smart vehicle is one that can sense its surroundings and operate independently without human intervention [11]. A smart-featured automobile relies on sensors and actuators, complicated algorithms, machine learning systems, and powerful processors. Sensors in various components of the vehicle are used to construct and maintain a map of the vehicle’s surroundings. Radar sensors keep an eye out for other vehicles that may be approaching from behind. Traffic lights, road signs, other vehicles, and pedestrians are all detected by video cameras. To determine distances, road boundaries, and lane markers, Lidar sensors bounce light pulses off the car’s surroundings [12]. When parking, ultrasonic sensors in the wheels pick up on obstacles such as curbs and other vehicles. The car’s actuators, which control the car’s acceleration, braking, and steering, receive orders from sophisticated software, which interprets the sensory data and maps a route. Predictive modeling and object identification assist the software with navigating traffic regulations and avoiding obstructions [13]. All these data are generated from one smart entity, which will create a challenge. Challenges exist to scalability such as scalability in data, scalability in throughput, scalability in power, and scalability in time response.
Smart vehicles are a trending research area for many companies, labs, and researchers due to their anticipated benefits to the quality of life [14]. This type of driving relies partially on machines and is ruled by algorithms and embedded standards and regulation codes which give drivers more tools to enhance their experience. Security and real-time operations are an important factor in such applications, where the impact of any failure will influence lives. Each vehicle will be full of sensors to read the environment and act accordingly. The integration of multiple technologies will burden the central authorities regarding security threats [15]. Depending on the above, several questions come to mind, such as: How to create secure communication? How to avoid latency? How to reduce centralization? How to reduce power consumption? How to encourage nodes to act honestly? Such a large, complex CPS has many obstacles to overcome for full deployment such as interference conditions, traffic regulations, and complex V2V communications.
The introduction of the blockchain DLTs, which have altered numerous aspects of our lives, has been one of the most revolutionary developments of the past few decades [16,17]. These innovative methods of data storage and transaction processing have the potential to affect a broad range of industries, including banking, supply chain management, government, healthcare, and ITS [18].
DLT is a group of mechanisms and protocols governed by the consensus mechanism of participants through direct communication in an untrusted environment [19]. DLT has been proposed to resolve many issues of the current centralized paradigm of intelligent transportation and to provide a secure environment for its operations [20,21]. ITS-VANETs need to acquire the characteristics of DLT such as decentralization, immutability, transparency, security, efficiency, and programmability in order to satisfy its requirements as a Complex Cyber-Physical System (CCPS) [22]. Other examples include real-time interaction, scalable architecture, automated operation, low power consumption and security. Increased trust, transparency, and security are just some of the ways in which DLT could change the face of ITS [23]. Certain conditions must be met before DLT-based ITS operations can be put into place. Already existing ledger structures and consensus algorithms need trade-offs in which some times security and privacy are strong but scalability is weak or scalability is high but security is low.
Scalability: The volume of data related to transportation operations is expected to expand, and the system must be able to process a high volume of transactions and nodes. This is not the case in all DLTs. Some lack scalability such as Bitcoin. The paradigm is a fit for electronic cash systems but will cause an issue in term of scalability and hardware requirements if applied to ITS. Blockchain-Based Secure Data Exchange (BDESF) ITS is a secure and tamper-proof framework for data exchange and storage. It also prevents replay, Man-in-the-Middle (MiTM) weaknesses, impersonation, data leakage, and unwanted data updating with authentication and privacy measures. BDESF-ITS integrates smoothly with existing transportation systems. BDESF-ITS is a strong security mechanism for DLT applications to transportation security and privacy [24]. However, Practical Byzantine Fault Tolerance (PBFT) is suggested to be used in such a framework which will burden the network with the redundancy. Power consuming protocols are part of the scalability problem and need a pre-existing level of trust to be initiated. In addition, this protocol has a lower degree of decentralization which will change the nature of ITS-VANETs. Another example is interoperability: when it comes to transportation, the DLT system should be compatible with a wide range of systems, technologies, and platforms to ensure that data are shared effectively among all parties involved. With the absence of Layer 0 in the crypto-networks and due to the importance of interoperability to an ITS system, the choice of a certain ledger should be based on the requirement of ITS.
Security and Privacy: Data integrity and confidentiality must always be maintained by the system to prevent any unwanted changes or disclosures to private information. Strong encryption, access restriction, and other privacy-protecting measures fall under this category. For example, Ethereum provides strong cryptography and a medium latency which is acceptable. However, with the growth of VANETs, the network will encounter some throughput and routing issues due to time adjustment (used in Bitcoin) and the huge amount of operations which take place in Ethereum to reach agreement. In [25], a Blockchain-based Conditional Privacy-Preserving Authentication (BCPPA) protocol employs key derivation and blockchain technology to enhance VANET authentication and privacy. BCPPA utilizes Ethereum smart contracts to secure vehicle communication over VANET. The costly Elliptic Curve Digital Signature Algorithm (ECDSA) can be replaced with a modified version or another Public Key Infrastructure (PKI)-based signature with bulk verification to increase efficiency. Using blockchain technology, the BCPPA protocol provides conditional privacy-preserving authentication and decentralized, tamper-proof VANET communication. Even though smart contracts are hosted in a secure blockchain, limiting the process of securing the communication to a programmable transaction will centralize the process in addition to the centralization level of Ethereum.
Latency: Traffic management, navigation, and V2V communication are just a few examples of real-time ITS applications that require low latency. Transactions and data exchange on the DLT system must be rapid. The nature of ITS-VANETs is direct and rapid communication. When using a DLT-based framework, the latency must be taken into account. In [26], the primary contribution of this work is to propose a secure 5G-ITS through the use of blockchain technology to evaluate trust against potential attacks. To accomplish hierarchical trust evaluations and protect the privacy of users, federated deep learning is used to evaluate the trust of ITS users and task distributers. In order to guarantee the efficacy and accuracy of trust evaluation, hierarchical incentive mechanisms are also designed to implement reasonable and fair rewards and punishments. Hyperledger is used to implement frameworks and is well known for its power consuming and high resource usage. The nature of DLT-based IoV is decentralization while ensuring fairness and decentralization. In [27], a Public, Special, and Supreme framework is presented. The “Public” blockchain server is responsible for service-related data transmission, verification, and storage. It is a shared blockchain server with limited storage capacity. Once the public blockchain’s memory is complete, it will replace its own data within the blockchain. Similarly to the public blockchain server, the “Special” blockchain server displays dynamic features. Specifically, the “Supreme” blockchain server is used to store all network-participating vehicle information. Each data transmission detail of the intelligent vehicle is securely preserved and processed in the supreme blockchain. The nature of the required operation for DLT usage is not satisfied, since the three servers reduce the decentralization and increase the vulnerability toward Single-Point Failure (SPF).
Consensus Mechanism: Security, decentralization, and performance are all factors that should be considered while deciding on a consensus process. It also needs to be secure against attacks such as Sybil and 51% of attacks as well as energy efficient. Consensus is the core of any DLT. Most of the challenges faced are based on the consensus algorithm. In [22], a blockchain-enabled vehicular crowd-sensing technology secures 5G Internet of Vehicles user privacy and data safety by securing real-time traffic data. A deep reinforcement learning (DRL) algorithm selects the best active miners and transactions to optimize blockchain security and latency. A two-sided matching-based approach allocates non-orthogonal multiple access sub-channels to reduce uploading delay for all users. This technology safeguards vehicular crowd-sensing data collecting and user privacy. The consensus algorithm proposed in this work is PBFT, which is known for its high tolerance and security but has overhead computational requirements. Reference [28] proposes the Ethereum-based VNB (VANETs with a Blockchain). The VNB simulates a vehicle on-board unit (OBU), scanning adjacent vehicles, authenticating them, and communicating with blockchain accounts. The VNB correctly distinguished different vehicle types in simulations. Despite its limitations, the proposed VNB offers a promising security and trust architecture for autonomous vehicular networks and ITS in smart cities in the near future. Proof of Work (PoW) and Proof of Stake (PoS) are both used as consensus algorithms. PoW is utilized for its ease and security in determining the correct nonce, while PoS is utilized for its energy efficiency and decentralization prevention. Nonetheless, PoS is susceptible to double-spend attacks. PoW is known for its high security but needs resource-rich nodes, and thus, it is not suitable for IoV operations. PoS is known for its security and operations efficiency, but it is vulnerable to centralization and routing problems.
Other conditions and criteria such as data quality: Information saved and transmitted through the system must be as accurate and trustworthy as possible by excluding any potentially misleading data.
Governance: The many participants in the DLT-based ITS ecosystem need a well-defined governance framework that specifies their specific responsibilities and how they will make decisions.
Legal and Regulatory Compliance: The system must follow all data protection, privacy, and cybersecurity legislation, both domestically and internationally.
Incentive Mechanisms: Suitable incentive mechanisms, such as token-based rewards for users and service providers, should be built into the DLT-based ITS to encourage widespread adoption and active involvement.
User Experience: The system needs to be simple and straightforward so that those who really utilize the DLT-based ITS services can get about with ease. By meeting these requirements, a DLT-based ITS can contribute to the development of a more productive, secure, and transparent transportation ecosystem, which will benefit users, operators, and regulators. In this paper, we compare multiple blockchain and non-blockchain consensus algorithms and their applicability to serve ITS applications based on the requirement [29]. We propose FlexiChain 3.0 Technology as a platform to host ITS digital assets collections and exchange in V2V, Vehicle-to-Machine (V2M), and Vehicle-to-Human (V2H) transactions. In addition, a detailed security analysis for certain types of attacks between the proposed work and related works is presented.
Figure 1 illustrates the layered structure of employing DLT in intelligent transportation in applications such as auto vehicle driving data training, V2X communication, vehicles’ history, and autonomous vehicles.
Figure 1. High-Level Depiction of DLT-Based ITS.
The rest of the paper is organized as follows: Section 2 summarizes the novel contributions of this paper. Section 3 presents background information and previous related works. Section 4 presents the proposed system. Section 5 provides experimental results. Finally, Section 6 concludes the paper and presents directions for future research.

2. Novel Contributions

In this section, the paper’s unique contributions are discussed, and the proposed work is highlighted. Data accuracy, instant responses, security, consistency, fault tolerance and privacy are all required for such an ITS-V2X system. The accuracy of any ITS relies on the huge data accumulation and training through an Artificial Intelligence (AI) agent which requires correct information and integrity to produce a useful feedback and directions. Security and privacy are required to keep the operations running smoothly with no fails or undesired events to keep peoples’ and nodes’ identities secured and private. Consistency is required to ensure that the operations are always on and will not encounter any issues even during an attack such as Distributed Denial of Service (DDoS). Low latency is a need, since all operations in ITS require the lowest time to execute. In addition, power consumption is a critical factor which should be minimized for sustainable and reliable operations.

2.1. Problem Addressed

With the advancement of technology, vehicles act as a driving computer system recording routes, status, identities, and data, and they also give feedback to users. Due to this huge amount of data generated from vehicles, a secure platform is desirable. In addition, secure channels and fast communication are also required. Due to the amount of data involved, this can be a challenge. Moreover, data training, data exchange, central authority and speed all are challenges to the current paradigm. DLTs are suitable to resolve ITS challenges but must satisfy the desirable requirements for the application. For example, using the blockchain (Bitcoin) paradigm will not benefit ITS due to its operation that by design has been targeting an electronic cash system. As another example, the blockchain (Ethereum) paradigm is a very efficient distributed super computer but the operation is suitable to web applications and financial applications where a few seconds of latency will not harm, whereas one second of latency might cause huge safety and security issues in ITS.

2.2. Solutions Proposed

An exploration of the feasibility for DLT-based CPS, such as ITS, is justified since the technology provides a secure platform that could make it practical and effective. An analysis of prior technologies and their consensus algorithms is presented to analyze the need of having a customized or application-based designed DLT to satisfy ITS conditions. FlexiChain 3.0 is an upgraded version from our previous work [30] for ITS data collection and trade-based ITS proposed to introduce the feasibility of operating a V2V network over FlexiChain technology [17,20,30].

2.3. Significance of the Solution

  • The suitability of several technologies to ITS is analyzed.
  • The need of an application-based DLT is introduced.
  • Propose a DLT that could satisfy ITS requirements without trade-offs.
  • A novel technology framework, FlexiChain 3.0, is presented as a solution.
  • The novel DLT is designed specifically for ITS as CCPS.
In Table 1, a comparison is given between our previous versions of FlexiChain and the current work. In [30], the work is representing FlexiChain 1.0, which is combining our work with the novel MultiChain Proof of Rapid Authentication [17]. A novel block structure has been proposed with an enrollment process that creates the Accessible Secure Identification List proposed in [20]. In the next version, FlexiChain 2.0, an upgrade was presented on how to generate the file using a combined ledger of NodeChain, and how the file is created and updated, making NodeChain as Layer0 and all other blockchains as Layer1. Moving to the next version, since the proposed work is about a designed distributed ledger for Cyber-Physical Systems, FlexiChain 2.0 has been upgraded and modified to fit ITS applications as a complex CPS using a distributed offline vault (NodeChain), which is a manufacturer’s predefined trust and which provides a public permissioned ledger. The rest of the table is covering other differences and similarities.
Table 1. Comparative Perspective between FlexiChain Versions.

4. Proposed FlexiChain 3.0: DLT-Based V2V

DLT has been proposed as a solution to multiple challenges in various applications. In this section, the DLT will be proposed as a solution to fulfill the requirements of ITS-IoV. DLT has secured operations due to its architecture and distributed form since it relies on the nodes and not a central authority. In addition, securing assets and eliminating malicious behavior is proved through some established distributed ledger networks that have been operating for several years. Nodes are independent in distributed networks, but different methods are used to track the updated state of a ledger or a digital asset. The ledger is distributed, which means each node has its own copy which reduces security threats if this technology used in ITS.
In this paper, it is assumed that trusted manufacturers are producing Trusted Modules which in this case will contain vehicle keys. These entry keys are linked to each other and are contained in a NodeChain-Assisted Distributed Offline Vault that unifies and secures the vehicles’ identities [20]. Surface Zones are represented in this work as a blockchain for each zone, and all blockchains are strongly linked through FlexiChain, which represents Layer0 for all blockchains.
FlexiChain 3.0 Technology could provide a solid ledger for ITS due to its multiple features that have been designed to target this type of application using multiple blockchains as multiple areas that cars drive through. Each car can operate in every zone due to the flexibility of Layer0 which provides to the network one-time registration. Nodes in this application represent cars, stations, towers, trucks, etc.
FlexiChain 3.0 is a Layer0 ledger that uses BlockDAG structure to build its ledger. It uses Proof of Rapid Authentication (PoRa) as its consensus algorithm that relies on trusted module authentication and lightweight computation. FlexiChain 3.0 uses NodeChain for its authentication process from which the network security independence increases. NodeChain is an integrated ledger initiated with the network and used to mirror nodes and secure their manufacturers’ specification and an agreement reached among stakeholders to add a device to create its correspondent Trusted ID (TUID) which is used in the operations of Layer0 that is represented here as zones.

4.1. FlexiChain 3.0 Layer0 (Zones)

In this section, the zones component of the FlexiChain-based proposed framework of Peer-to-Peer (P2P) communication system is explained and illustrated in Figure 4. In this framework, the area of the proposed application is divided into zones each of which has its own blockchain and is connected with Layer0 FlexiChain. Each blockchain has a block type and is defined to all vehicles entry keys (trusted modules).
Figure 4. Zones and Their Corresponding FlexiChain Ledger.

4.2. Block Types (Digital Assets Collected and Exchanged)

This section shows the contents of each block. All zones have the same block structure, but they are labeled differently to append to the location specified. The block contains the header which is the hash value of all comprised data. The source TUID is included to be authenticated. The data are collected from the car or its environment. The distance from the genesis block is based on the location chosen. Minimal distance is used to obtain the shortest way to genesis if block reduction is needed. Lastly, the chain of narration is used to list all nodes that have confirmed this block to present block authenticity within the FlexiChain. Block content and types are presented in Figure 5.
Figure 5. Block Content of Each Zone and its Labels.

4.3. Node Types (V2V Participant Authority Levels)

There are three types of nodes:
  • The Backup Node (BN) is the network’s “cloud”, or original node. In NodeChain [20], the first block represents the virtual existence of a backup node.
  • Vehicles or fixed stations are classified as edge nodes, and they are full nodes and have a full ledger.
  • CPS and IoT nodes or subscriber nodes are used for data collection and transmission. Since this technology is aiming for restricted nodes, a node that is both IoT and CPS could qualify based on the requirements. These represents sensors and actuators in the proposed framework.

4.4. Trusted Modules (Vehicles Entry Keys)

Trusted modules in this proposed framework are the vehicles’ entry keys. The keys are manufactured with a built-in signature generator and a copy of the NodeChain which gives each car access to the NodeChain-Assisted Distributed Offline Vault for rapid authentication. The initial registration process runs through the manufacturers as the stakeholders of the network. The modules provide an extra level of security to compensate the low computation required to append a block. Once this key is inserted to the car or identifies the signal of the car, the data collected by the car sensors and actuators are collected and broadcast to the ledger.

4.5. NodeChain-Assisted Distributed Offline Vault (Vehicles Digital Unique Identity Aggregator)

NodeChain [20] is formed and built by the registration process. It has all nodes’ TUIDs, and these TUIDs are a tokenized version of the real UID that is assigned by the manufacturer and registered in the NodeChain, as shown in Figure 6. Only the vehicle’s entry keys can be accessed, and with its own signature, the real UID can be matched (Figure 7).
Figure 6. NodeChain Offline Vault.
Figure 7. NodeChain Proof of Rapid Authentication.

5. Experimental Results

5.1. Time Analysis

Setup

A total of 64 nodes of each technology have been created and run for 30 min, as detailed in Table 4. Docker containers have been used to host each node and pair with the second node.
Table 4. Setup Components.
Nodes directly send blocks to each other. FlexiChain has been implemented using Python and PostgreSQL and is running through docker containers. The network starts by running the BN. The regular nodes join after NodeChain has initialized. The initialization sequence of the network is shown in Figure 8. A performance analysis is shown in Table 5 and a real-time graph of authentication activity is shown in Figure 9.
Figure 8. The 64 FlexiChain Nodes Registered.
Table 5. FlexiChain Technology Number of Transactions/Second.
Figure 9. Nodes Containers on Docker.

5.2. Security and Privacy Analysis

FlexiChain Technology is built with CPS applications in mind; therefore, security measures are built in at both the hardware and software levels. Researchers may assess the efficacy of the technique by simulating a variety of security threats [16]. Such attacks include corrupting the exchanged data between nodes, implanting incorrect data during communication, and full malicious control over the network authority. The feasibility that each attack can take place will be calculated and compared to each other for each scenario [16]. Three scenarios are proposed: traditional central authority, blockchain technology and FlexiChain technology for the listed attacks below:
  • Attack-1: Data Corruption: For this attack, the digital assets exchanged among participants will be corrupted.
  • Attack-2 Implant Incorrect Data: For this attack, malicious activity by implanting incorrect data takes place while transacting data.
  • Attack-3: Central Authority Full Malicious Control: For this attack, maliciously expose the authority database.

5.2.1. Traditional Central Paradigm

The probability of the attacks to occur in the central paradigm ( P ( T C ) ) is given by:
P ( T C ) = P ( A ) + P ( B ) + P ( C )
P ( A ) represents attack-1 and can be performed by a successful attack over all edge nodes and represented as α κ . The probability can be calculated by
P ( A ) = 1 4 κ = 1 n α κ
P ( B 1 ) represents attack-2 and can be performed by a successful attack over the transmission channels between edge nodes and central node represented as β κ . The probability can be calculated by
P ( B 1 ) = 1 4 κ = 1 n β κ
The corresponding transmission channels are also considered in the formula which can be calculated similar to P ( B 1 ) and calculated by P ( B 2 ) .
P ( B 2 ) = 1 4 κ = 1 n β κ
P ( C ) represents attack-3 and can be performed by a successful attack over a central node represented as ρ . The probability can be calculated by
P ( C ) = 1 4 ω
From Equations (1)–(4), we obtain the total probability:
P ( T C ) = 1 4 κ = 1 n α κ + 1 4 κ = 1 n β κ + 1 4 κ = 1 n β κ + 1 4 ω
This is shown as a function of the number of nodes in Figure 10 along with the parameters of an exponential fit of the data.
Figure 10. Results for All Three Categories of Attacks in the Traditional Central-Based V2V Scenario.

5.2.2. Blockchain

The probability of the attacks to occur in the blockchain paradigm is
P ( B C ) = P ( A ) + P ( B ) + P ( C )
P ( A ) represents attack-1 and can be performed by a successful attack over all nodes α κ and acquiring nodes’ credentials represented as θ κ . The probability can be calculated by
P ( A ) = 1 4 κ = 1 n α κ × 1 4 κ = 1 n θ κ
P ( B 1 ) represents attack-2 and can be performed by a successful attack over nodes and acquiring nodes’ credentials represented as θ κ . There is n × ( n 1 ) 2 = a , which is the number of transmissions channels represented as β κ , which can be created by pairs of nodes for n nodes [16]. The probability can be calculated by
P ( B 1 ) = 1 4 κ = 1 a β κ × 1 4 κ = 1 n θ κ
The corresponding transmission channels are also considered in the formula which can be calculated similar to P ( B 1 ) and denoted as P ( B 2 ) .
P ( B 2 ) = 1 4 κ = 1 a β κ × 1 4 κ = 1 n θ κ
P ( C ) represents attack-3 and can be performed by a successful attack over all edge nodes ρ κ and acquiring nodes’ credentials represented as θ κ . There are n 2 = v , which is the number of mining nodes or validators (edges) that an attacker should control to compromise the ledger. The probability can be calculated by
P ( C ) = 1 4 κ = 1 v ρ κ × 1 4 κ = 1 n θ κ
P ( B C ) = 1 4 κ = 1 n α κ × 1 4 κ = 1 n θ κ + 1 4 κ = 1 a β κ × 1 4 κ = 1 n θ κ + 1 4 κ = 1 a β κ × 1 4 κ = 1 n θ κ + 1 4 κ = 1 v ρ κ × 1 4 κ = 1 n θ κ
This is shown as a function of the number of nodes in Figure 11 along with the parameters of an exponential fit of the data.
Figure 11. Results for Three Categories of Attacks in the Blockchain-Based Scenario.

5.2.3. FlexiChain

The probability of the attacks to occurs in the blockchain paradigm is
P ( F C ) = P ( A ) + P ( B ) + P ( C )
P ( A ) represents attack-1 and can be performed by a successful attack over all nodes α κ , acquiring nodes’ credentials represented as θ κ , acquiring trusted attached hardware credentials, and Unique Identification (UID). The probability can be calculated by
P ( A ) = 1 4 κ = 1 n α κ × 1 4 κ = 1 n θ κ × 1 4 κ = 1 n ϕ κ × 1 4 κ = 1 n Φ κ
P ( B 1 ) represents attack-2 and can be performed by a successful attack over all nodes α κ and acquiring nodes’ credentials represented as θ κ . There are n × ( n 1 ) 2 = a , which is the number of transmissions channels that can be created by pairs of nodes for n number of nodes [16]. The probability can be calculated by
P ( B 1 ) = 1 4 κ = 1 a β κ × 1 4 κ = 1 n θ κ × 1 4 κ = 1 n ϕ κ × 1 4 κ = 1 n Φ κ
The corresponding transmission channels are also considered in the formula which can be calculated similar to P ( B 1 ) and denoted as P ( B 2 ) .
P ( B 2 ) = 1 4 κ = 1 a β κ × 1 4 κ = 1 n θ κ × 1 4 κ = 1 n ϕ κ × 1 4 κ = 1 n Φ κ
P ( C ) represents attack-3 and can be performed by a successful attack over all nodes ρ κ and acquiring nodes’ credentials represented as θ κ . There are n 2 = v , which is the number of mining nodes or validators (edges) that an attacker should control to compromise the ledger. The probability can be calculated by
P ( C ) = 1 4 κ = 1 v ρ κ × 1 4 κ = 1 n θ κ × 1 4 κ = 1 n ϕ κ × 1 4 κ = 1 n Φ κ
P ( F C ) = 1 4 κ = 1 n α κ × 1 4 κ = 1 n θ κ × 1 4 κ = 1 n ϕ κ × 1 4 κ = 1 n Φ κ + 1 4 κ = 1 a β κ × 1 4 κ = 1 n θ κ × 1 4 κ = 1 n ϕ κ × 1 4 κ = 1 n Φ κ + 1 4 κ = 1 a β κ × 1 4 κ = 1 n θ κ × 1 4 κ = 1 n ϕ κ × 1 4 κ = 1 n Φ κ + 1 4 κ = 1 v ρ κ × 1 4 κ = 1 n θ κ × 1 4 κ = 1 n ϕ κ × 1 4 κ = 1 n Φ κ
This is shown as a function of the number of nodes in Figure 12 along with the parameters of an exponential fit of the data.
Figure 12. Results for Three Categories of Attacks in the FlexiChain-Based Scenario.

5.3. Comparative Analysis of FlexiChain 3.0

A comparative analysis of the three types of DLT examined in this work is given in Table 6.
Table 6. Comparison Between Central Versus Blockchain Versus FlexiChain.
A simulation has been performed over Equations (6), (12), and (18). For factors α , θ , ϕ , and Φ , values in the (0.9–1) range are assumed and will be assigned for each based on the difficulty of an attack [16]. For ω , it is assumed a value of (0–0.1) will be assigned [16]. The number of nodes chosen is 4 to 64.
It is seen from Equations (6), (12) and (18) that FlexiChain has more security layers, which would make any malicious attack very expensive. In addition, another factor is the number of nodes that play a major role in the feasibility of an attack. The more nodes required, the less vulnerable the network, Table 7. The quality of the exponential regression (in terms of the correlation coefficient R 2 ) is tabulated in Table 8.
Table 7. Comparative Analysis between Central Versus Blockchain Versus FlexiChain: This table shows the probabilities acquired from our security analysis for three categories of attacks for three scenarios.
Table 8. Quality of Regression of Attack Success Probability to P = a exp b x .
In Figure 13, in the early stages, all scenarios are at high risk. However, the more nodes that join the network, the more stable it becomes. The traditional central scenario needs a huge number of nodes to reach a stable security and for our simulation for the highest number of nodes used, it reaches 43% security vulnerability to attacks. For Blockchain-based V2V, the same factors play a role. However, the decentralization and distributed authority have reduced the risk to less than 14% at a secure stage. In FlexiChain, based on the multiple factors shown in Table 6, the security risk level has been further reduced from an earlier stage due to fairness of authority distribution, complete decentralization, and the extra security layers.
Figure 13. Chart Comparison between Central, Blockchain and FlexiChain.
However, up to some stage, the curve will run close to zero in blockchain and FlexiChain, as shown in Figure 10, Figure 11 and Figure 12. All curves follow an exponential decay that declines toward zero. However, in blockchain and FlexChain, it is obvious that the dependency is lower, since the network has more security factors, as shown in Table 6. In addition, the threat level decreases faster in FlexiChain than in blockchain due to there being more security levels. A comparative perspective with previous works is given in Table 9 and Table 10.
Table 9. A Perspective Comparative of the Proposed Consensus Algorithm with Related Works.
Table 10. Comparative Analysis between Current Consensus Algorithm with Related Works.

6. Conclusions and Future Directions

ITS, the IoV, and VANETs can be transformed by DLT. A DLT’s decentralization, transparency, security, and immutability can help stakeholders address data sharing, trust management, and privacy issues in these networked systems.
DLT can create secure data-sharing platforms, efficient payment systems, and decentralized marketplaces for vehicle digital assets and services in ITS, IoV, and VANETs. Smart contracts automate processes, improving stakeholder transactions.
Despite its promise, DLT implementation in ITS, IoV, and VANETs must address scalability, latency, energy efficiency, and privacy issues. DLT’s full potential in establishing intelligent, safe, and sustainable transportation systems in smart cities depends on further research and development in these areas and the deployment of proper consensus algorithms and blockchain platforms.
FlexiChain Technology 3.0 has been proposed as an ITS platform that could provide safe and secure operation and a scalable architecture that could match the expected operation volumes in the IoV. FlexiChain 3.0 achieved 2.3 trx/s, which is not an optimal target but adequate to serve IoV. However, these results provide motivation to optimize the implementation and reduce latency by using better mechanisms to elect a block location. Security analysis has been introduced to show that the security measures used in FlexiChain were a match to the ones used in the blockchain. The difference is that FlexiChain is BlockDAG, and its highest security is achieved early stages.
The integration between DLTs and AI will complete the missing pieces of both technologies. AI is a future target to integrate FlexiChain with Deep Reinforcement Learning models for better authority distribution and autonomous authentication.
The next mode of transportation, the Decentralized Intelligent Transportation System (DITS), is still in its infancy. Research into self-driving cars has begun at several universities and businesses, indicating that the suggested work will be needed in the not too distant future. Vehicle-to-vehicle communication is expected to speed up the development of autonomous vehicles.

Author Contributions

Conceptualization, A.A., S.P.M. and E.K.; methodology, A.A., S.P.M. and E.K.; software, A.A., S.P.M. and E.K.; validation, A.A., S.P.M. and E.K.; formal analysis, A.A., S.P.M. and E.K.; investigation, A.A., S.P.M. and E.K.; resources, A.A., S.P.M. and E.K.; data curation, A.A., S.P.M. and E.K.; writing—original draft preparation, A.A., S.P.M. and E.K.; writing—review and editing, A.A., S.P.M. and E.K.; visualization, A.A., S.P.M. and E.K.; supervision, S.P.M. and E.K.; project administration, S.P.M. and E.K. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

The data presented in this study are available on request from the corresponding author. The data are not publicly available due to ongoing research and analysis.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Mallikarjuna, G.C.P.; Hajare, R.; Mala, C.S.; Rakshith, K.R.; Nadig, A.R.; Prtathana, P. Design and implementation of real time wireless system for vehicle safety and vehicle to vehicle communication. In Proceedings of the 2017 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT), Mysuru, India, 15–16 December 2017; pp. 354–358. [Google Scholar] [CrossRef]
  2. Jabbar, R.; Dhib, E.; Said, A.B.; Krichen, M.; Fetais, N.; Zaidan, E.; Barkaoui, K. Blockchain Technology for Intelligent Transportation Systems: A Systematic Literature Review. IEEE Access 2022, 10, 20995–21031. [Google Scholar] [CrossRef]
  3. Tanwar, S.; Tyagi, S.; Budhiraja, I.; Kumar, N. Tactile Internet for Autonomous Vehicles: Latency and Reliability Analysis. IEEE Wirel. Commun. 2019, 26, 66–72. [Google Scholar] [CrossRef]
  4. Dai, Y.; Xu, D.; Maharjan, S.; Qiao, G.; Zhang, Y. Artificial Intelligence Empowered Edge Computing and Caching for Internet of Vehicles. IEEE Wirel. Commun. 2019, 26, 12–18. [Google Scholar] [CrossRef]
  5. Lamssaggad, A.; Benamar, N.; Hafid, A.S.; Msahli, M. A Survey on the Current Security Landscape of Intelligent Transportation Systems. IEEE Access 2021, 9, 9180–9208. [Google Scholar] [CrossRef]
  6. Chen, J.; Mao, G. Secure Message Dissemination in Vehicular Networks: A Topological Approach. In Proceedings of the 2018 IEEE Global Communications Conference (GLOBECOM), Abu Dhabi, United Arab Emirates, 9–13 December 2018; pp. 1–7. [Google Scholar] [CrossRef]
  7. Zheng, K.; Zheng, Q.; Chatzimisios, P.; Xiang, W.; Zhou, Y. Heterogeneous Vehicular Networking: A Survey on Architecture, Challenges, and Solutions. IEEE Commun. Surv. Tutor. 2015, 17, 2377–2396. [Google Scholar] [CrossRef]
  8. Karagiannis, G.; Altintas, O.; Ekici, E.; Heijenk, G.; Jarupan, B.; Lin, K.; Weil, T. Vehicular Networking: A Survey and Tutorial on Requirements, Architectures, Challenges, Standards and Solutions. IEEE Commun. Surv. Tutor. 2011, 13, 584–616. [Google Scholar] [CrossRef]
  9. Queiroz, A.; Oliveira, E.; Barbosa, M.; Dias, K. A Survey on Blockchain and Edge Computing applied to the Internet of Vehicles. In Proceedings of the 2020 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), New Delhi, India, 14–17 December 2020; pp. 1–6. [Google Scholar] [CrossRef]
  10. Limbasiya, T.; Das, D. Secure message transmission algorithm for Vehicle to Vehicle (V2V) communication. In Proceedings of the 2016 IEEE Region 10 Conference (TENCON), Singapore, 22–25 November 2016; pp. 2507–2512. [Google Scholar] [CrossRef]
  11. Yu, S.; Lee, J.; Park, K.; Das, A.K.; Park, Y. IoV-SMAP: Secure and Efficient Message Authentication Protocol for IoV in Smart City Environment. IEEE Access 2020, 8, 167875–167886. [Google Scholar] [CrossRef]
  12. Dutta, S. An overview on the evolution and adoption of deep learning applications used in the industry. Wiley Interdiscip. Rev. Data Min. Knowl. Discov. 2017, 8, e1257. [Google Scholar] [CrossRef]
  13. Xie, J.; Tang, H.; Huang, T.; Yu, F.R.; Xie, R.; Liu, J.; Liu, Y. A Survey of Blockchain Technology Applied to Smart Cities: Research Issues and Challenges. IEEE Commun. Surv. Tutor. 2019, 21, 2794–2830. [Google Scholar] [CrossRef]
  14. Barron, L. The Road to a Smarter Future: The Smart City, Connected Cars and Autonomous Mobility. In Proceedings of the 2021 26th International Conference on Automation and Computing (ICAC), Portsmouth, UK, 2–4 September 2021; pp. 1–6. [Google Scholar] [CrossRef]
  15. Zhang, S.; Wu, Y.; Wang, Y. An embedded Node Operating System for real-time information interaction in Vehicle-to-Vehicle communication. In Proceedings of the 2016 IEEE 19th International Conference on Intelligent Transportation Systems (ITSC), Rio de Janeiro, Brazil, 1–4 November 2016; pp. 887–892. [Google Scholar] [CrossRef]
  16. Rathore, S.; Park, J.H. A Blockchain-Based Deep Learning Approach for Cyber Security in Next Generation Industrial Cyber-Physical Systems. IEEE Trans. Ind. Inform. 2021, 17, 5522–5532. [Google Scholar] [CrossRef]
  17. Alkhodair, A.; Mohanty, S.; Kougianos, E.; Puthal, D. McPoRA: A Multi-chain Proof of Rapid Authentication for Post-Blockchain Based Security in Large Scale Complex Cyber-Physical Systems. In Proceedings of the 2020 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), Limassol, Cyprus, 6–8 July 2020; pp. 446–451. [Google Scholar] [CrossRef]
  18. Mollah, M.B.; Zhao, J.; Niyato, D.; Guan, Y.; Sun, S.; Lam, K.Y.; Koh, L. Blockchain for the Internet of Vehicles Towards Intelligent Transportation Systems: A Survey. IEEE Internet Things J. 2020, 8, 1–28. [Google Scholar] [CrossRef]
  19. Alladi, T.; Chamola, V.; Sahu, N.; Venkatesh, V.; Goyal, A.; Guizani, M. A Comprehensive Survey on the Applications of Blockchain for Securing Vehicular Networks. IEEE Commun. Surv. Tutor. 2022, 24, 1212–1239. [Google Scholar] [CrossRef]
  20. Alkhodair, A.J.; Mohanty, S.P.; Kougianos, E. ASID: Accessible Secure Unique Identification File Based Device Security in Next Generation Blockchains. In Proceedings of the 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), Sydney, Australia, 3–6 May 2021; pp. 1–2. [Google Scholar] [CrossRef]
  21. Puthal, D.; Malik, N.; Mohanty, S.P.; Kougianos, E.; Das, G. Everything You Wanted to Know About the Blockchain: Its Promise, Components, Processes, and Problems. IEEE Consum. Electron. Mag. 2018, 7, 6–14. [Google Scholar] [CrossRef]
  22. Wang, S.; Sun, S.; Wang, X.; Ning, Z.; Rodrigues, J.J.P.C. Secure Crowdsensing in 5G Internet of Vehicles: When Deep Reinforcement Learning Meets Blockchain. IEEE Consum. Electron. Mag. 2021, 10, 72–81. [Google Scholar] [CrossRef]
  23. Liu, J.; Zhang, L.; Li, C.; Bai, J.; Lv, H.; Lv, Z. Blockchain-Based Secure Communication of Intelligent Transportation Digital Twins System. IEEE Trans. Intell. Transp. Syst. 2022, 23, 22630–22640. [Google Scholar] [CrossRef]
  24. Mukathe, K.D.; Wu, D.; Ahmed, W. Secure and Efficient Blockchain-Based Certificateless Authentication Scheme for Vehicular Ad-Hoc Networks (VANETs). In Proceedings of the 2022 4th International Conference on Applied Machine Learning (ICAML), Changsha, China, 23–25 July 2022; pp. 302–307. [Google Scholar] [CrossRef]
  25. Lin, C.; He, D.; Huang, X.; Kumar, N.; Choo, K.K.R. BCPPA: A Blockchain-Based Conditional Privacy-Preserving Authentication Protocol for Vehicular Ad Hoc Networks. IEEE Trans. Intell. Transp. Syst. 2021, 22, 7408–7420. [Google Scholar] [CrossRef]
  26. Wang, X.; Garg, S.; Lin, H.; Kaddoum, G.; Hu, J.; Hassan, M.M. Heterogeneous Blockchain and AI-Driven Hierarchical Trust Evaluation for 5G-Enabled Intelligent Transportation Systems. IEEE Trans. Intell. Transp. Syst. 2023, 24, 2074–2083. [Google Scholar] [CrossRef]
  27. Singh, M. Tri-Blockchain Based Intelligent Vehicular Networks. In Proceedings of the IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Toronto, ON, Canada, 6–9 July 2020; pp. 860–864. [Google Scholar] [CrossRef]
  28. Li, X.J.; Ma, M.; Yong, Y.X. A Blockchain-Based Security Scheme for Vehicular Ad Hoc Networks in Smart Cities. In Proceedings of the TENCON 2021-2021 IEEE Region 10 Conference (TENCON), Auckland, New Zealand, 7–10 December 2021; pp. 266–271. [Google Scholar] [CrossRef]
  29. Diarra, N. Choosing a Consensus Protocol for Uses Cases in Distributed Ledger Technologies. In Proceedings of the 2019 Sixth International Conference on Software Defined Systems (SDS), Rome, Italy, 10–13 June 2019; pp. 306–309. [Google Scholar] [CrossRef]
  30. Alkhodair, A.J.; Mohanty, S.P.; Kougianos, E. FlexiChain: A Minerless Scalable Next Generation Blockchain for Rapid Data and Device Security in Large Scale Complex Cyber-Physical Systems. SN Comput. Sci. 2022, 3, 235. [Google Scholar] [CrossRef]
  31. Alkhodair, A.J.; Mohanty, S.P.; Kougianos, E. FlexiChain 2.0: NodeChain Assisting Independent Decentralized Vault for Rapid Data Authentication and Device Security in Large Scale Complex Cyber-Physical Systems. OAE J. Surveill. Secur. Saf. (JSSS) 2023. under review. [Google Scholar]
  32. Mohanty, S.P.; Choppali, U.; Kougianos, E. Everything you wanted to know about smart cities: The Internet of things is the backbone. IEEE Consum. Electron. Mag. 2016, 5, 60–70. [Google Scholar] [CrossRef]
  33. Fernández Áñez, V. Stakeholders Approach to Smart Cities: A Survey on Smart City Definitions. In International Conference on Smart Cities; Springer: Cham, Switzerland, 2016; Volume 9704, pp. 157–167. [Google Scholar] [CrossRef]
  34. Kirimtat, A.; Krejcar, O.; Kertész, A.; Tasgetiren, M. Future Trends and Current State of Smart City Concepts: A Survey. IEEE Access 2020, 8, 86448–86467. [Google Scholar] [CrossRef]
  35. Yin, C.; Xiong, Z.; Chen, H.; Wang, J.; Cooper, D.; David, B. A literature survey on smart cities. Sci. China Inf. Sci. 2015, 58, 1–18. [Google Scholar] [CrossRef]
  36. Kakarontzas, G.; Anthopoulos, L.; Chatzakou, D.; Vakali, A. A conceptual enterprise architecture framework for smart cities: A survey based approach. In Proceedings of the 2014 11th International Conference on e-Business (ICE-B), Vienna, Austria, 28–30 August 2014; pp. 47–54. [Google Scholar]
  37. Yeh, H. The effects of successful ICT-based smart city services: From citizens’ perspectives. Gov. Inf. Q. 2017, 34, 556–565. [Google Scholar] [CrossRef]
  38. An, J.; Le Gall, F.; Kim, J.; Yun, J.; Hwang, J.; Bauer, M.; Zhao, M.; Song, J. Toward Global IoT-Enabled Smart Cities Interworking Using Adaptive Semantic Adapter. IEEE Internet Things J. 2019, 6, 5753–5765. [Google Scholar] [CrossRef]
  39. Cledou, G.; Estevez, E.; Soares Barbosa, L. A taxonomy for planning and designing smart mobility services. Gov. Inf. Q. 2018, 35, 61–76. [Google Scholar] [CrossRef]
  40. Kumar, H.; Singh, M.; Gupta, M. Evaluating the competitiveness of Indian metro cities: In smart city context. Int. J. Inf. Technol. Manag. 2017, 16, 333–347. [Google Scholar] [CrossRef]
  41. Miles, A.; Zaslavsky, A.; Browne, C. IoT-based decision support system for monitoring and mitigating atmospheric pollution in smart cities. J. Decis. Syst. 2018, 27, 56–67. [Google Scholar] [CrossRef]
  42. Polenghi-Gross, I.; Sabol, S.; Ritchie, S.; Norton, M. Water storage and gravity for urban sustainability and climate readiness. J.-Am. Water Work. Assoc. 2014, 106, E539–E549. [Google Scholar] [CrossRef]
  43. Ul Hassan, M.; Rehmani, M.H.; Chen, J. Privacy preservation in blockchain based IoT systems: Integration issues, prospects, challenges, and future research directions. Future Gener. Comput. Syst. 2019, 97, 512–529. [Google Scholar] [CrossRef]
  44. Hamad, A.A.; Alkadi, I.; Aloufi, F. Renewable Energy Mix of Futuristic NEOM City. In Proceedings of the 2021 IEEE Green Technologies Conference (GreenTech), Denver, CO, USA, 7–9 April 2021; pp. 125–132. [Google Scholar] [CrossRef]
  45. Albalawi, H.; Eisa, A.; Aggoune, e.H.M. Energy Warehouse—A New Concept for NEOM Mega Project. In Proceedings of the 2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT), Amman, Jordan, 9–11 April 2019; pp. 215–221. [Google Scholar] [CrossRef]
  46. Wang, J.; Wang, W.; Wu, D.; Lei, T.; Liu, D.; Li, P.; Su, S. Research on Business Model of Internet of Vehicles Platform Based on Token Economy. In Proceedings of the 2021 2nd International Conference on Big Data Economy and Information Management (BDEIM), Sanya, China, 3–5 December 2021; pp. 120–124. [Google Scholar] [CrossRef]
  47. Sharma, S.; Agarwal, P.; Mohan, S. Security Challenges and Future Aspects of Fifth Generation Vehicular Adhoc Networking (5G-VANET) in Connected Vehicles. In Proceedings of the 2020 3rd International Conference on Intelligent Sustainable Systems (ICISS), Thoothukudi, India, 3–5 December 2020; pp. 1376–1380. [Google Scholar] [CrossRef]
  48. Ahi, A.; Singh, A.V. Role of Distributed Ledger Technology (DLT) to Enhance Resiliency in Internet of Things (IoT) Ecosystem. In Proceedings of the Amity International Conference on Artificial Intelligence (AICAI), Dubai, United Arab Emirates, 4–6 February 2019; pp. 782–786. [Google Scholar]
  49. Talukder, S.; Vaughn, R. A Template for Alternative Proof of Work for Cryptocurrencies. In Proceedings of the 2021 International Conference on Smart Generation Computing, Communication and Networking (SMART GENCON), Pune, India, 29–30 October 2021; pp. 1–6. [Google Scholar] [CrossRef]
  50. Nair, P.R.; Dorai, D.R. Evaluation of Performance and Security of Proof of Work and Proof of Stake using Blockchain. In Proceedings of the 2021 Third International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV), Tirunelveli, India, 4–6 February 2021; pp. 279–283. [Google Scholar] [CrossRef]
  51. Saad, S.M.S.; Radzi, R.Z.R.M.; Othman, S.H. Comparative Analysis of the Blockchain Consensus Algorithm Between Proof of Stake and Delegated Proof of Stake. In Proceedings of the 2021 International Conference on Data Science and Its Applications (ICoDSA), Bandung, Indonesia, 6–7 October 2021; pp. 175–180. [Google Scholar] [CrossRef]
  52. Gan, B.; Wu, Q.; Li, X.; Zhou, Y. Classification of Blockchain Consensus Mechanisms Based on PBFT Algorithm. In Proceedings of the 2021 International Conference on Computer Engineering and Application (ICCEA), Kunming, China, 25–27 June 2021; pp. 26–29. [Google Scholar] [CrossRef]
  53. Boreiri, Z.; Azad, A.N. A Novel Consensus Protocol in Blockchain Network based on Proof of Activity Protocol and Game Theory. In Proceedings of the 2022 8th International Conference on Web Research (ICWR), Tehran, Iran, 11–12 May 2022; pp. 82–87. [Google Scholar] [CrossRef]
  54. Živi, N.; Kadušić, E.; Kadušić, K. Directed Acyclic Graph as Tangle: An IoT Alternative to Blockchains. In Proceedings of the 2019 27th Telecommunications Forum (TELFOR), Belgrade, Serbia, 26–27 November 2019; pp. 1–3. [Google Scholar] [CrossRef]
  55. Baird, L.; Luykx, A. The Hashgraph Protocol: Efficient Asynchronous BFT for High-Throughput Distributed Ledgers. In Proceedings of the 2020 International Conference on Omni-layer Intelligent Systems (COINS), Barcelona, Spain, 31 August–2 September 2020; pp. 1–7. [Google Scholar] [CrossRef]
  56. Li, F.; Lam, K.Y.; Liu, X.; Wang, J.; Zhao, K.; Wang, L. Joint Pricing and Power Allocation for Multibeam Satellite Systems With Dynamic Game Model. IEEE Trans. Veh. Technol. 2018, 67, 2398–2408. [Google Scholar] [CrossRef]
  57. Li, F.; Lam, K.Y.; Chen, H.H.; Zhao, N. Spectral Efficiency Enhancement in Satellite Mobile Communications: A Game-Theoretical Approach. IEEE Wirel. Commun. 2020, 27, 200–205. [Google Scholar] [CrossRef]
  58. Kang, J.; Yu, R.; Huang, X.; Wu, M.; Maharjan, S.; Xie, S.; Zhang, Y. Blockchain for Secure and Efficient Data Sharing in Vehicular Edge Computing and Networks. IEEE Internet Things J. 2019, 6, 4660–4670. [Google Scholar] [CrossRef]
  59. Javaid, U.; Aman, M.N.; Sikdar, B. DrivMan: Driving Trust Management and Data Sharing in VANETs with Blockchain and Smart Contracts. In Proceedings of the 2019 IEEE 89th Vehicular Technology Conference (VTC2019-Spring), Kuala Lumpur, Malaysia, 28 April–1 May 2019; pp. 1–5. [Google Scholar] [CrossRef]
  60. Chen, Y.; Hao, X.; Ren, W.; Ren, Y. Traceable and Authenticated Key Negotiations via Blockchain for Vehicular Communications. Mob. Inf. Syst. 2019, 2019, 5627497. [Google Scholar] [CrossRef]
  61. Chen, C.; Wu, J.; Lin, H.; Chen, W.; Zheng, Z. A Secure and Efficient Blockchain-Based Data Trading Approach for Internet of Vehicles. IEEE Trans. Veh. Technol. 2019, 68, 9110–9121. [Google Scholar] [CrossRef]
  62. Li, Z.; Yang, Z.; Xie, S. Computing Resource Trading for Edge-Cloud-Assisted Internet of Things. IEEE Trans. Ind. Informatics 2019, 15, 3661–3669. [Google Scholar] [CrossRef]
  63. Qiao, G.; Leng, S.; Chai, H.; Asadi, A.; Zhang, Y. Blockchain Empowered Resource Trading in Mobile Edge Computing and Networks. In Proceedings of the ICC 2019-2019 IEEE International Conference on Communications (ICC), Shanghai, China, 20–24 May 2019; pp. 1–6. [Google Scholar] [CrossRef]
  64. Amiri, W.A.; Baza, M.; Banawan, K.; Mahmoud, M.; Alasmary, W.; Akkaya, K. Privacy-Preserving Smart Parking System Using Blockchain and Private Information Retrieval. In Proceedings of the 2019 International Conference on Smart Applications, Communications and Networking (SmartNets), Sharm El Sheikh, Egypt, 17–19 December 2019; pp. 1–6. [Google Scholar] [CrossRef]
  65. Zichichi, M.; Ferretti, S.; D’angelo, G. A Framework Based on Distributed Ledger Technologies for Data Management and Services in Intelligent Transportation Systems. IEEE Access 2020, 8, 100384–100402. [Google Scholar] [CrossRef]
  66. Maffiola, D.; Longari, S.; Carminati, M.; Tanelli, M.; Zanero, S. GOLIATH: A Decentralized Framework for Data Collection in Intelligent Transportation Systems. IEEE Trans. Intell. Transp. Syst. 2022, 23, 13372–13385. [Google Scholar] [CrossRef]
  67. Morganti, G.; Schiavone, E.; Bondavalli, A. Risk Assessment of Blockchain Technology. In Proceedings of the 2018 Eighth Latin-American Symposium on Dependable Computing (LADC), Foz do Iguacu, Brazil, 8–10 October 2018; pp. 87–96. [Google Scholar] [CrossRef]
  68. Guo, H.; Yu, X. A survey on blockchain technology and its security. Blockchain Res. Appl. 2022, 3, 100067. [Google Scholar] [CrossRef]
  69. Zhang, S.; Lee, J.H. Analysis of the main consensus protocols of blockchain. ICT Express 2020, 6, 93–97. [Google Scholar] [CrossRef]
  70. Parity: Fast, Light, Robust Ethereum Implementation, Parity Technologies. 12 December 2017. Available online: https://azuremarketplace.microsoft.com/en/marketplace/apps/ethcore.parity-devel-chain?tab=Overview (accessed on 14 February 2023).
  71. Wood, G. PoA Private Chains. Github. November 2015. Available online: https://github.com/poanetwork/wiki/wiki/POA-Network-Whitepaper (accessed on 12 December 2022).
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.