You are currently viewing a new version of our website. To view the old version click .
Future Internet
  • Review
  • Open Access

17 February 2021

Blockchain-Enabled Edge Intelligence for IoT: Background, Emerging Trends and Open Issues

,
and
1
Department of Electrical and Computer Engineering, The University of British Columbia, Vancouver, BC V6T 1Z4, Canada
2
College of Computer Science and Software Engineering, Shenzhen University, Shenzhen 518060, China
*
Author to whom correspondence should be addressed.
This article belongs to the Special Issue Feature Papers for Future Internet—Internet of Things Section

Abstract

Blockchain, a distributed ledger technology (DLT), refers to a list of records with consecutive time stamps. This decentralization technology has become a powerful model to establish trust among trustless entities, in a verifiable manner. Motivated by the recent advancement of multi-access edge computing (MEC) and artificial intelligence (AI), blockchain-enabled edge intelligence has become an emerging technology for the Internet of Things (IoT). We review how blockchain-enabled edge intelligence works in the IoT domain, identify the emerging trends, and suggest open issues for further research. To be specific: (1) we first offer some basic knowledge of DLT, MEC, and AI; (2) a comprehensive review of current peer-reviewed literature is given to identify emerging trends in this research area; and (3) we discuss some open issues and research gaps for future investigations. We expect that blockchain-enabled edge intelligence will become an important enabler of future IoT, providing trust and intelligence to satisfy the sophisticated needs of industries and society.

1. Introduction

Internet of Things (IoT) emerged initially in 1999 in supply chain industries in association with radio-frequency identification (RFID) [1]. The idea was to empower computers to observe, identify, and understand the world without the help of human beings. However, many IoT devices are designed to be battery operated and have a compact physical size; thus, they have very limited energy and computation resources. Such resource-constrained IoT devices are not well-equipped to perform complex processing, such as supporting artificial intelligence (AI) [2]. Although federated learning (FL) can be implemented by a group of IoT devices [3], such computational workload is still too heavy for IoT devices. To overcome this bottleneck, transmitting computational tasks to nearby servers is an attractive solution. Different from traditional cloud computing, such strategy as multi-access edge computing (MEC) delivers computation resources to the edge of the radio access network (RAN). Therefore, computational tasks have no need to travel through the core network, allowing IoT data to be processed and results consumed locally with minimal delay. This mode of computing, while minimizing latency and use of core network communication resources, has its own challenges. For example, security issues and incentives should be taken into considerations. To be specific, the transmitted data may contain private data about personal identity and financial account information. This raises the risk of privacy leakage and malicious attacks. Moreover, nearby servers or computing nodes may need incentives to process tasks for IoT devices. Furthermore, edge servers have limited computation power compared with the cloud. The computing operations also cost storage and energy resources. Therefore, a computing resource trading [4] and data sharing [5] framework or platform is needed to motivate edge servers. As a distributed ledger technology (DLT), blockchain has emerged as a potential solution for the above issues, due to its nature of data transparency, distributed operation, and reliability. It is timely to comprehensively survey the application of blockchain to enable edge intelligence in support of IoT applications.

1.1. Related Surveys

There exist several surveys on related research areas. Table 1 summarizes these surveys and compare them with this review.
Table 1. Summary of the existing surveys and tutorials with their primary focus.
ElMamy et al. [6] surveyed the usage of DLT to mitigate multiple cyber-threats in Industry 4.0. This survey classified the most important cyber-attacks into four classes, including scanning, local to remote, power of root, and denial of service. Tariq et al. [7] reviewed security issues around fog-enabled IoT. They considered blockchain as the key to address fog computing security issues. However, these works do not consider the capability of blockchain as an enabler of AI at the edge.
For AI enabled by blockchain, there exist several literature reviews. Jameel et al. [8] surveyed the application of reinforcement learning in blockchain-enabled industrial IoT networks. They pointed out that machine learning (ML) algorithms, such as Q-learning, can improve the performance of the network, in terms of block time minimization and transaction throughput enhancement. Furthermore, Liu et al. [9] gave a two-way convergence of blockchain and ML. On one hand, blockchain can endow ML with the features of security and trust. On the other hand, ML can be used as a tool to optimize blockchain networks. Kumari et al. [10] studied existing blockchain-based AI approaches for energy cloud management, to address security and privacy issues using blockchain and AI. Furthermore, Salah et al. [11] gave a comprehensive review of blockchain applications for AI. The relationship between AI and blockchain in the IoT-enabled ecosystem was discussed. However, MEC has not been considered in these works.
Additionally, MEC is a key technology of emerging fifth-generation (5G) networks. Multiple surveys on blockchain solutions in 5G networks exist, centered around security challenges in 5G systems. In addition, Tahir et al. [12] discussed blockchain applications in 5G networks. They gave a comprehensive survey on the integration of blockchain with 5G networks and beyond. In this review, the transparency, auditability, and distributed properties of blockchains were considered to address issues, such as security, resources management, and energy efficiency. The paper identified three major challenges associated with MEC, including identity authentication, privacy, and trust management. Then, it introduced some blockchain-based solutions to meet these challenges. While this survey covered a lot of topics, blockchain-enabled mobile edge intelligence was not studied thoroughly in this survey. By contrast, Nguyen et al. [13] gave a brief survey of blockchain-enabled federated approach. This ML architecture is empowered by the decentralization feature of blockchain.
Furthermore, Xiong et al. [14] studied the motivation for the integration of MEC and blockchain. Computational heavy tasks (e.g., proof of work) in the blockchain system are offloaded to MEC servers. They focused on using edge computing to enabling mobile blockchains. However, the use of blockchains to enable efficient and secure MEC was not considered. Additionally, Yang et al. [15] surveyed the collaboration of edge computing and blockchain. They claimed that blockchain could extend the capability of edge computing, in terms of reliable access and control of the network and computation resources. Different from this comprehensive survey, in the present work we focus on blockchain-enabled distributed and decentralized ML. In addition, we analyze the emerging trend and open issues in this research area.
A survey on blockchain-enabled MEC for IoT automation was presented by Sekaran et al. [16]. This review focused on the integration of blockchain with IoT. More importantly, computational loads and delays were considered and investigated. Applications of blockchain for 6G-enabled IoT were further investigated and classified in this paper. Besides, Fernandez Carames et al. [17] studied the collaboration of blockchain, IoT, and edge computing for higher education. Different from other review articles that mainly focus on academic research, it gave a detailed road map of the smart campus implementation. This could be helpful for researchers to understand how blockchain-enabled edge computing works in a realistic IoT application scenario, such as autonomous driving [21]. As for the Internet of vehicles (IoV), blockchain-enabled MEC platforms could be applied for information-exchange and trust. Moreover, Chamola et al. [18] surveyed the integration of IoT, AI, and blockchain to deal with the coronavirus disease 2019 (COVID-19) pandemic. Queiroz et al. [19] investigated blockchain solutions for different layers in edge computing, including fog layer, edge layer, static multi-layer, and dynamic multi-layer. Applicable ML algorithms were also discussed in this paper. However, this survey mainly focused on the IoV domain and did not cover other areas comprehensively. Mollah et al. [20] focused on the blockchain-enabled intelligent transportation systems (ITS). Blockchain-empowered applications, including edge computing and AI, were investigated in this article, and the challenges and opportunities of blockchain-based applications in ITS were discussed.
The literature search strategy of this paper is described as follows: We searched for literature published since 2016, first with the keywords: blockchain, MEC, and IoT, and then with the keywords: blockchain, machine learning, and IoT. We combined the two data sets and eliminated duplicates. The selections of papers from the combined dataset were based on the co-citation frequency, node centrality in the literature graph, and the impact of the publishers. We explored the summary table of CiteSpace [22], a literature mining software that groups research papers in clusters, and selected the top-ranked articles in each cluster.

1.2. Contributions and Organization

In this review, we present a comprehensive survey of blockchain-enabled edge intelligence in the IoT domain. The main contributions are listed as follows:
  • We review and analyze the literature related to blockchain-enabled edge intelligence, aiming at giving new researchers in this area some basic ideas and the big picture.
  • In this paper, we not only summarize the technical contributions of related papers but also illustrate and provide some insights on the technical trends.
  • We identify some open issues and research gaps in this research area, and discuss future research opportunities from the perspectives of the social layer, data layer, and technical layer.
The rest of this survey paper is organized as follows. In Section 2, we introduce some background about blockchain, MEC, and AI. Section 3 mines the literature to identify emerging trends. Then, we point out some research gaps and discuss some potential research questions in Section 4. Finally, we conclude this paper in Section 5.

2. Background

In this section, we provide some basic background of blockchain technology, MEC, and AI. Clarifications and comparisons are given to facilitate understanding. To be specific, we first introduce blockchain fundamentals to give readers a basic idea. We focus on the part of blockchain technology that is related to this survey and leave out the rest of the blockchain fundamentals, such as consensus algorithm details, Merkle tree, transaction architectures, and digital signatures, for brevity. Next, MEC is introduced. We focus on its definition and the integration of blockchain and MEC. Finally, blockchain-enabled AI is discussed. We aim at illustrating how this integration works in the IoT domain.

2.1. Blockchain Fundamentals

Blockchain refers to a set of records that are sequentially chained together using cryptography. Blockchains could be classified into two major types: public and permissioned chains. On the one hand, a public chain is like the Internet. Each user of this record system can find this chain and get access to it. On the other hand, a permissioned chain only allows authenticated entities to read and add to the records. Additionally, a consortium blockchain is a hybrid type between public and permissioned chain, but more like a private chain. It is permissioned and supervised by a predetermined group of entities.
The chain architecture in Figure 1 guarantees the immutability of blockchain records. Once a block exists in this chain, one cannot change anything in previous blocks. A conventional database is like a single screenshot of information, but the blockchain is like a chain of timestamped screenshots. There is a degree of freedom and continuity in time, allowing the blockchain to track the history of this record system.
Figure 1. The chain architecture of the blockchain.
Generally speaking, a blockchain uses “consensus” to add new data records (not replace them). However, traditional databases use “permission” to manage data. It has centralized administration and maintenance. In the Bitcoin system, which is the most well-known application of public blockchain, proof-of-work (PoW) is used to reach this consensus. PoW is a kind of mathematical “puzzle”. The secret of this puzzle (e.g., Nonce) is hard to find but easy to be verified. The process of finding the nonce is called “mining” [23]. The first miner who discovers the secret can add the block to the longest chain and gets a reward in the form of a Bitcoin. In this decentralized system, full duplicates of transaction records are located at different networked miners. The verification and confirmation of each transaction are processed based on the consensus algorithm. No single third entity could fully control the process in this peer-to-peer network. In contrast, a distributed system also processes transactions in different locations, but it may still be under the control of a single entity. That is the main difference between distributed and decentralized systems. To reiterate, blockchain is a decentralized system, shifting the authority of governance from a centralized third party to individual entities in this record system.
Different from the Bitcoin network, Ethereum [24] embraces the smart contract, a kind of executable scripts stored on the blockchain [25]. Instead of PoW, Ethereum uses Proof-of-stake (PoS) as its consensus mechanism. This consensus strategy chooses block validators at random, with the ones having more stakes gaining more chances to be selected. This frees blockchain nodes from meaningless and energy-consuming mining.

2.2. Integration of MEC and DLT

Several terms are used in the literature to describe the computing collaboration among the end-user, the nearby server, and the cloud. They include fog computing [26], edge computing [27], and MEC [28]. Compared with the “cloud”, the “fog” is closer to the “ground” (e.g., the IoT data source). It refers to the extended part of cloud computing, including distributed resources, wired and wireless data transmissions, and intermediate layers between edge and cloud. Edge computing, however, focuses on the task of executing using edge nodes in the RAN outside of the core network. Furthermore, mobile edge computing is a form of edge computing that includes the data caching and computation offloading strategies within the mobile network [29]. Moreover, recent interests in MEC reflect the practical situation with multi-technology RANs in edge computing [30]. It covers access points, hot spots, routers, etc., to establish an edge network. In this review, we use the acronym “MEC” to stand for multi-access edge computing, which also encompasses mobile edge computing. The relationships among fog computing, edge computing, and MEC are, thus, illustrated in Figure 2.
Figure 2. The relationships among different phrases.
In general, the integration between blockchain and MEC is mutually beneficial [15]. On one hand, blockchain introduces security, privacy, and trust to MEC [31,32]. Efficient control and incentive of cooperation among edge devices and servers are securely enabled by blockchain. On the other hand, MEC improves the scalability of blockchain in a distributed and efficient manner by delivering computing and cache resources to the blockchain-enabled IoT systems. For example, blockchain mining requires a high computational capability in the PoW process, which imposes great challenges for IoT devices. The reason why IoT devices should actively mine is that a global consensus is required for transaction validation. Different from a distributed IoT system, a blockchain-enabled IoT system decentralize the authority to each IoT device. In other words, there is no single third party that could help IoT devices make a global decision. Therefore, the PoW mechanism needs to be in place to confirm and secure the integrity and validity of transactions. Fortunately, MEC can be introduced as a solution to this issue. By offloading computational tasks to an MEC server, resource-constrained IoT devices can use PoW to reach consensus for decentralized applications.
Nguyen et al. [33] discussed the privacy leakage issue in blockchain-MEC integration. In this article, mobile users act as miners in the blockchain system. Data processing tasks and mining tasks are offloaded from users to nearby MEC servers. The privacy level of this process is modeled and formulated. Furthermore, blockchain was introduced as a strong security mechanism for MEC systems in vehicular networks [34]. In addition, Reference [35] introduced a blockchain-based trust mechanism for MEC systems. By establishing a reputation system for the edge nodes, the miner in the blockchain network was, thus, selected in a trusted manner.
Additionally, blockchain-enabled payment systems for the video streaming industry were developed with an incentive mechanism for MEC servers [36]. Furthermore, the flexibility and scalability of block size could be significantly improved by MEC. However, not every edge device could have enough cryptocurrency to buy the offloading service. Therefore, Zhang et al. [37] proposed a loan strategy for this purpose. Although the mining task could be executed on MEC servers, competition exists among IoT devices. The reason is that the resources of edge servers are still limited compared to relatively numerous IoT devices. To deal with this issue, Zhao et al. [38] solved the computation resources allocation problem in the MEC-assisted public blockchain network. Moreover, this strategy could protect the blockchain system from 51% attack [39] because the attacker with the majority stake in this system would try to preserve and secure this kind of cryptocurrency, but not to destroy it.

2.3. Blockchain-Enabled AI

Traditional AI solutions, including deep learning and reinforcement learning, require the centralized governance of data. A single learner should gather data and computing resources for learning machines and agents before the training exercise. This centralized architecture leads to several issues, such as single points of failure and personal data leakage [40]. As mentioned above, blockchain is a decentralized and distributed record system. This characteristic is very suitable for deploying AI solutions in distributed IoT systems. Moreover, collaboration and trusted data sharing among learning machines could be realized by blockchain technology. In this review, we focus on introducing smart contract-based AI, especially the federated AI solution.
In a nutshell, smart contract [25] is a powerful tool to enable distributed and decentralized ML for IoT systems. As illustrated in Figure 3, this kind of predefined and self-verified scripts, including learning algorithms and models, can be deployed at each distributed learning device in a decentralized manner. Furthermore, only learning parameters are shared and verified by blockchain transactions, while sensitive IoT data are not accessible to any third parties. This guarantees the secure sharing of the learning experience and gives the self-governance of data to each entity, which is the basic idea of blockchain-based FL. Thus, blockchain and smart contact together enable a global platform for collaborating ML in a distributed and decentralized manner.
Figure 3. Blockchain-based artificial intelligence (AI) for the Internet of Things (IoT).
Blockchain was introduced to manage the reputation of learning devices [41,42,43,44,45]. To be specific, Kang et al. [42] proposed effective incentive mechanisms for reliable FL. Consortium blockchain was further introduced by them for reputation management. Moreover, blockchain-enabled reward systems were considered in References [4,46,47,48,49,50]. Furthermore, the blockchain-enabled data integrity and sources validation could be realized by deep learning with convolutional neural networks [51], giving the trustworthiness of training data quality. Moreover, Ma et al. [52] investigated data noise and the decentralized solution for data cleaning with edge intelligence.
Lu et al. [40] gave a secure data sharing architecture for decentralized and secure learning strategies to solve the privacy issue in ML. Moreover, the computing work in the blockchain consensus process was used for FL. Furthermore, Qu et al. [46] introduced poisoning attacks in decentralized ML. Likewise, Kang et al. [42] and Ramanan and Nakayama [53] proposed reliable FL strategies by removing the centralized model aggregator in ML. Plus, Yin et al. [54] investigated a blockchain-based federated deep learning in the IoT domain. This strategy was motivated by multiparty secure computation, which was also investigated in Reference [55]. Besides, Liu et al. [56] used smart contracts in the self-defense of FL. Membership inference and poisoning attacks were, thus, prevented in this way.

4. Open Issues and Discussions

In this section, we sum up some open issues for blockchain-enabled edge intelligence. We first discuss blockchain-enabled trust in three layers, namely the social layer, data layer, and technical layer. We aim to help readers understand this research area from different perspectives but not limited to the technical domain. Next, we list and describe some challenges and research gaps in this area, including selfish learning, fork issues, and transaction rejection. Finally, we raise three research questions by discussing some unresolved issues and conflicts in this research area.

4.1. Trust Layers for Edge Intelligence

Blockchain-enabled trust could be considered in different layers for researchers and developers from different research areas. We further extend the description of blockchain trust layers [117] for blockchain-enabled edge intelligence as follows:
  • Social Layer: the layer at which task publishers (e.g., IoT devices or human users), workers (e.g., edge nodes or servers), and blockchain platforms (e.g., smart contracts, decentralized applications) could interact with each other and make transactions on resources and information. In this layer, interactions among entities could include reputation establishment [118], resources marketing [119], paid collaboration, identity management, and the regulation of training strategies.
  • Data Layer: the layer at which information records in blockchain are managed by self-governance. The recorded data could include learning model parameters, IoT data, reputation records, published tasks, transaction records, and the history of global learning models. This layer concerns with learning quality, data integrity, privacy, protection, the architecture of blockchain transactions, and the lifecycle of records.
  • Technical Layer: the layer at which strategies are implemented to realize the functions of edge intelligence. Platforms (e.g., Hyperledger Fabric) and mathematical foundations are included in this layer. Such strategies could include learning algorithms, consensus mechanisms, incentive mechanisms, zero-knowledge proofs, secure multi-party computation, contribution evaluation frameworks, optimization algorithms, etc.

4.2. Challenges and Research Gaps

Although blockchain has many advantages according to our literature review, it is not perfect for edge intelligence in IoT. To realize the blockchain-enabled edge intelligence, there are still many research gaps in this area. We list some major challenges as follows:
  • Selfish Learning: In the Bitcoin system, selfish mining [120] may cause serious security and fairness issues. Selfish miners refer to a group of miners who collude to increase their reward. Minority groups or individuals could not compete with the selfish group because of their limited computing resources. This could further lead to the centralization of mining operations. Motivated by selfish mining, selfish learning attacks are attacking blockchain-enabled edge intelligence systems, where edge nodes exchange learning experiences and get the reward according to their contributions [121]. In such attacks, edge nodes collude in an FL scenario and accumulate model contributions. In this case, the selfish group will always win and get a reward. Moreover, other normal learning nodes tend to join in this selfish group for mining rewards. Furthermore, individuals can become selfish too. A single learning node may not powerful enough to win, so it just hides, waits, and accumulates its model contribution for future rewards. This could cause delays and decrease the quality of the global learning model.
  • Fork Issues: Forks occur when the software of different mining nodes become misaligned. When edge nodes are not in agreement with the same learning model or algorithm, an alternative chain (i.e., a forked chain) emerges. Two potential conditions may cause a fork in a blockchain-enabled edge intelligence system. On one hand, the computing capability of MEC servers, which are close to the task publisher (i.e., the IoT device) geographically, is limited and relatively weak. A malicious attacker can deploy a powerful rogue MEC server close to the target task publisher. As the requirement of low-latency in edge intelligence is met with fast consensus mechanisms in blockchain systems, the mining puzzle could be very easily solved by this powerful rogue server. With malicious intentions in mind, this rogue node could start a fork to attack the global learning model. On the other hand, the global model could also fork accidentally if two learning nodes contribute the most and equally to the global learning model in the same iteration, as both model contributions are recorded at nearly the same time.
  • Transaction Rejection: Edge nodes are resource-constrained, especially for IoT devices. Although there are several research works related to incentive mechanisms for IoT devices and edge servers, transaction rejection is still an unresolved problem. Most papers take the success of blockchain transactions for granted because miners are assumed to have a strong desire to record the transaction into a block for a reward. However, blockchain nodes could always refuse to participate in mining if the predefined reward is not good enough because solving computational puzzles costs a lot of energy. As resource-constrained devices, edge nodes may not spend their energy and join in the blockchain system because they have difficulty in recharging. In such cases, transactions are always rejected, and the consensus of a global learning model is hard to realize.

4.3. Cross-Layer Research Questions

As discussed in the above section, topics and research trends are focused on different layers of blockchain-enabled trust. For example, decision-making in the social layer; security and privacy issues in the data layer; and mathematical foundation and mechanisms in the technical layer. However, there are some conflicts in the existed literature that cut across these layers. We briefly summarize them into three research questions:
  • Question 1: How to design a balanced framework for blockchain-enabled edge intelligence?
    This is a common issue that exists in most decentralized systems. The Zooko’s Triangle [122] points out that it is highly unlikely to have a decentralized system with both security and human-readability. Thus, we could further acknowledge that efficiency, security, and decentralization are three angles in the Zooko’s triangle of blockchain-enabled edge intelligence. Researchers should keep this conflict in mind when they use blockchains to enable edge intelligence. For example, either the decentralization level or security level might be sacrificed when they maximize the transaction speed in edge systems. Thus, a trade-off exists among these factors.
  • Question 2: How to establish standard criteria to verify a high-quality training model for edge intelligence?
    Deep learning models or parameters are shared and traded in decentralized ML, such as FL. However, there is no general criterion for evaluating and verifying recorded models or parameters. Each paper has its own method that may not be readily compared with that implemented in another article. Furthermore, it might not be a good idea to simply use accuracy or the loss function to verify the quality of the ML model because it could cost a lot of energy and time for training a very accurate model, which might not be preferable for energy-constrained devices in some low-latency cases.
  • Question 3: How to reduce the complexity of blockchain strategies for edge intelligence?
    Different from other devices, edge or IoT devices are resource-constrained. Blockchain strategies presented in most papers are not suitable for the blockchain-enabled edge intelligence because most proposed algorithms, such as zero-knowledge proof for privacy preservation, are too complicated for edge nodes to execute. Researchers should keep this in mind when they develop their own strategies in the scenario of blockchain-enabled edge intelligence.

5. Conclusions

In this review, we have given a thorough literature survey on blockchain-enabled edge intelligence. To help researchers and readers in understanding this area, we have first given some basic knowledge about blockchain, MEC, and AI. Furthermore, research trends and directions have been introduced by exploring literature mining. We have presented a vision of research trends, as well as the hot topics, in this area. Additionally, video streaming, tactile Internet, and digital twins (DTs) have been highlighted and introduced for their cutting-edge applications. Finally, we have discussed some open issues and research gaps, including selfish learning, fork issues, and transaction rejection.

Funding

This work was supported by Blockchain@UBC, the Natural Sciences and Engineering Research Council of Canada (CREATE Grant 528125 and Grant RGPIN-2019-06348), and the Guangdong Pearl River Talent Recruitment Program (Grant 2019ZT08X603).

Acknowledgments

We thank the editor and reviewers for their constructive comments.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Ashton, K. That ‘Internet of Things’ Things. RFID J. 2009, 22, 97–114. [Google Scholar]
  2. Deng, S.; Zhao, H.; Fang, W.; Yin, J.; Dustdar, S.; Zomaya, A.Y. Edge Intelligence: The Confluence of Edge Computing and Artificial Intelligence. IEEE Internet Thing. J. 2020, 7, 7457–7469. [Google Scholar] [CrossRef]
  3. Kim, H.; Park, J.; Bennis, M.; Kim, S. Blockchained On-Device Federated Learning. IEEE Commun. Lett. 2020, 24, 1279–1283. [Google Scholar] [CrossRef]
  4. Lin, X.; Wu, J.; Bashir, A.K.; Li, J.; Yang, W.; Piran, J. Blockchain-Based Incentive Energy-Knowledge Trading in IoT: Joint Power Transfer and AI Design. IEEE Internet Thing. J. 2020, 1–14. [Google Scholar] [CrossRef]
  5. Rivera, A.V.; Refaey, A.; Hossain, E. A Blockchain Framework for Secure Task Sharing in Multi-Access Edge Computing. IEEE Netw. 2020, 1–8. [Google Scholar] [CrossRef]
  6. ElMamy, S.B.; Mrabet, H.; Gharbi, H.; Jemai, A.; Trentesaux, D. A Survey on the Usage of Blockchain Technology for Cyber-Threats in the Context of Industry 4.0. Sustainability 2020, 12, 9179. [Google Scholar] [CrossRef]
  7. Tariq, N.; Asim, M.; Al-Obeidat, F.; Zubair Farooqi, M.; Baker, T.; Hammoudeh, M.; Ghafir, I. The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey. Sensors 2019, 19, 1788. [Google Scholar] [CrossRef]
  8. Jameel, F.; Javaid, U.; Khan, W.U.; Aman, M.N.; Pervaiz, H.; Jantti, R. Reinforcement Learning in Blockchain-Enabled IIoT Networks: A Survey of Recent Advances and Open Challenges. Sustainability 2020, 12, 5161. [Google Scholar] [CrossRef]
  9. Liu, Y.; Yu, F.R.; Li, X.; Ji, H.; Leung, V.C.M. Blockchain and Machine Learning for Communications and Networking Systems. IEEE Commun. Surv. Tutor. 2020, 22, 1392–1431. [Google Scholar] [CrossRef]
  10. Kumari, A.; Gupta, R.; Tanwar, S.; Kumar, N. Blockchain and AI amalgamation for energy cloud management: Challenges, solutions, and future directions. J. Parallel Distrib. Comput. 2020, 143, 148–166. [Google Scholar] [CrossRef]
  11. Salah, K.; Rehman, M.H.U.; Nizamuddin, N.; Al-Fuqaha, A. Blockchain for AI: Review and Open Research Challenges. IEEE Access 2019, 7, 10127–10149. [Google Scholar] [CrossRef]
  12. Tahir, M.; Habaebi, M.H.; Dabbagh, M.; Mughees, A.; Ahad, A.; Ahmed, K.I. A Review on Application of Blockchain in 5G and Beyond Networks: Taxonomy, Field-Trials, Challenges and Opportunities. IEEE Access 2020, 8, 115876–115904. [Google Scholar] [CrossRef]
  13. Nguyen, D.C.; Pathirana, P.N.; Ding, M.; Seneviratne, A. Blockchain for 5G and beyond networks: A state of the art survey. J. Netw. Comput. Appl. 2020, 166, 102693. [Google Scholar] [CrossRef]
  14. Xiong, Z.; Zhang, Y.; Niyato, D.; Wang, P.; Han, Z. When Mobile Blockchain Meets Edge Computing. IEEE Commun. Mag. 2018, 56, 33–39. [Google Scholar] [CrossRef]
  15. Yang, R.; Yu, F.R.; Si, P.; Yang, Z.; Zhang, Y. Integrated Blockchain and Edge Computing Systems: A Survey, Some Research Issues and Challenges. IEEE Commun. Surv. Tutor. 2019, 21, 1508–1532. [Google Scholar] [CrossRef]
  16. Sekaran, R.; Patan, R.; Raveendran, A.; Al-Turjman, F.; Ramachandran, M.; Mostarda, L. Survival Study on Blockchain Based 6G-Enabled Mobile Edge Computation for IoT Automation. IEEE Access 2020, 8, 143453–143463. [Google Scholar] [CrossRef]
  17. Fernández-Caramés, T.M.; Fraga-Lamas, P. Towards next generation teaching, learning, and context-aware applications for higher education: A review on blockchain, IoT, fog and edge computing enabled smart campuses and universities. Appl. Sci. 2019, 9, 4479. [Google Scholar] [CrossRef]
  18. Chamola, V.; Hassija, V.; Gupta, V.; Guizani, M. A Comprehensive Review of the COVID-19 Pandemic and the Role of IoT, Drones, AI, Blockchain, and 5G in Managing its Impact. IEEE Access 2020, 8, 90225–90265. [Google Scholar] [CrossRef]
  19. Queiroz, A.; Oliveira, E.; Barbosa, M.; Dias, K. A Survey on Blockchain and Edge Computing Applied to the Internet of Vehicles. Available online: https://arxiv.org/ftp/arxiv/papers/2011/2011.13676.pdf (accessed on 12 February 2021).
  20. Mollah, M.B.; Zhao, J.; Niyato, D.; Guan, Y.L.; Yuen, C.; Sun, S.; Lam, K.Y.; Koh, L.H. Blockchain for the Internet of Vehicles towards Intelligent Transportation Systems: A Survey. Available online: https://arxiv.org/pdf/2007.06022.pdf (accessed on 12 February 2021).
  21. Jiang, X.; Yu, F.R.; Song, T.; Ma, Z.; Song, Y.; Zhu, D. Blockchain-Enabled Cross-Domain Object Detection for Autonomous Driving: A Model Sharing Approach. IEEE Internet Thing. J. 2020, 7, 3681–3692. [Google Scholar] [CrossRef]
  22. Chen, C.; Song, M. Visualizing a field of research: A methodology of systematic scientometric reviews. PLoS ONE 2019, 14, e0223994. [Google Scholar] [CrossRef]
  23. Kiayias, A.; Koutsoupias, E.; Kyropoulou, M.; Tselekounis, Y. Blockchain Mining Games. In Proceedings of the 2016 ACM Conference on Economics and Computation, Maastricht, The Netherlands, 24–28 July 2016; pp. 365–382. [Google Scholar]
  24. Wood, G. Ethereum: A secure decentralised generalised transaction ledger. Ethereum Proj. Yellow Pap. 2014, 151, 1–32. [Google Scholar]
  25. Christidis, K.; Devetsikiotis, M. Blockchains and Smart Contracts for the Internet of Things. IEEE Access 2016, 4, 2292–2303. [Google Scholar] [CrossRef]
  26. Bonomi, F.; Milito, R.; Zhu, J.; Addepalli, S. Fog computing and its role in the internet of things. In Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, Helsinki, Finland, 17 August 2012. [Google Scholar]
  27. Satyanarayanan, M. The Emergence of Edge Computing. Computer 2017, 50, 30–39. [Google Scholar] [CrossRef]
  28. Abbas, N.; Zhang, Y.; Taherkordi, A.; Skeie, T. Mobile Edge Computing: A Survey. IEEE Internet Thing. J. 2018, 5, 450–465. [Google Scholar] [CrossRef]
  29. Mao, Y.; You, C.; Zhang, J.; Huang, K.; Letaief, K.B. A Survey on Mobile Edge Computing: The Communication Perspective. IEEE Commun. Surv. Tutor. 2017, 19, 2322–2358. [Google Scholar] [CrossRef]
  30. Porambage, P.; Okwuibe, J.; Liyanage, M.; Ylianttila, M.; Taleb, T. Survey on Multi-Access Edge Computing for Internet of Things Realization. IEEE Commun. Surv. Tutor. 2018, 20, 2961–2991. [Google Scholar] [CrossRef]
  31. Rahman, A.; Hossain, M.S.; Loukas, G.; Hassanain, E.; Rahman, S.S.; Alhamid, M.F.; Guizani, M. Blockchain-Based Mobile Edge Computing Framework for Secure Therapy Applications. IEEE Access 2018, 6, 72469–72478. [Google Scholar] [CrossRef]
  32. Guan, Z.; Lyu, H.; Li, D.; Hei, Y.; Wang, T. Blockchain: A distributed solution to UAV-enabled mobile edge computing. IET Commun. 2020, 14, 2420–2426. [Google Scholar] [CrossRef]
  33. Nguyen, D.C.; Pathirana, P.N.; Ding, M.; Seneviratne, A. Privacy-Preserved Task Offloading in Mobile Blockchain with Deep Reinforcement Learning. IEEE Trans. Netw. Serv. Manag. 2020, 17, 2536–2549. [Google Scholar] [CrossRef]
  34. Shrestha, R.; Nam, S.Y.; Bajracharya, R.; Kim, S. Evolution of V2X Communication and Integration of Blockchain for Security Enhancements. Electronics 2020, 9, 1338. [Google Scholar] [CrossRef]
  35. Xiao, L.; Ding, Y.; Jiang, D.; Huang, J.; Wang, D.; Li, J.; Vincent Poor, H. A Reinforcement Learning and Blockchain-Based Trust Mechanism for Edge Networks. IEEE Trans. Commun. 2020, 68, 5460–5470. [Google Scholar] [CrossRef]
  36. Liu, M.; Teng, Y.; Yu, F.R.; Leung, V.C.M.; Song, M. A Mobile Edge Computing (MEC)-Enabled Transcoding Framework for Blockchain-Based Video Streaming. IEEE Wirel. Commun. 2020, 27, 81–87. [Google Scholar] [CrossRef]
  37. Zhang, Z.; Hong, Z.; Chen, W.; Zheng, Z.; Chen, X. Joint Computation Offloading and Coin Loaning for Blockchain-Empowered Mobile-Edge Computing. IEEE Internet Thing. J. 2019, 6, 9934–9950. [Google Scholar] [CrossRef]
  38. Zhao, N.; Wu, H.; Chen, Y. Coalition Game-Based Computation Resource Allocation for Wireless Blockchain Networks. IEEE Internet Thing. J. 2019, 6, 8507–8518. [Google Scholar] [CrossRef]
  39. Saad, M.; Spaulding, J.; Njilla, L.; Kamhoua, C.; Shetty, S.; Nyang, D.; Mohaisen, D. Exploring the Attack Surface of Blockchain: A Comprehensive Survey. IEEE Commun. Surv. Tutor. 2020, 22, 1977–2008. [Google Scholar] [CrossRef]
  40. Lu, Y.; Huang, X.; Dai, Y.; Maharjan, S.; Zhang, Y. Blockchain and federated learning for privacy-preserved data sharing in industrial IoT. IEEE Trans. Ind. Inform. 2019, 16, 4177–4186. [Google Scholar] [CrossRef]
  41. Kang, J.; Xiong, Z.; Niyato, D.; Xie, S.; Zhang, J. Incentive Mechanism for Reliable Federated Learning: A Joint Optimization Approach to Combining Reputation and Contract Theory. IEEE Internet Thing. J. 2019, 6, 10700–10714. [Google Scholar] [CrossRef]
  42. Kang, J.; Xiong, Z.; Niyato, D.; Zou, Y.; Zhang, Y.; Guizani, M. Reliable Federated Learning for Mobile Networks. IEEE Wirel. Commun. 2020, 27, 72–80. [Google Scholar] [CrossRef]
  43. Rehman, M.H.u.; Salah, K.; Damiani, E.; Svetinovic, D. Towards Blockchain-Based Reputation-Aware Federated Learning. In Proceedings of the IEEE INFOCOM 2020—IEEE Conference on ComputerCommunications Workshops (INFOCOM WKSHPS), Toronto, ON, Canada, 6–9 July 2020; pp. 183–188. [Google Scholar]
  44. Zhao, Y.; Zhao, J.; Jiang, L.; Tan, R.; Niyato, D.; Li, Z.; Lyu, L.; Liu, Y. Privacy-Preserving Blockchain-Based Federated Learning for IoT Devices. IEEE Internet Thing. J. 2020. [Google Scholar] [CrossRef]
  45. Passerat-Palmbach, J.; Farnan, T.; McCoy, M.; Harris, J.D.; Manion, S.T.; Flannery, H.L.; Gleim, B. Blockchain-orchestrated machine learning for privacy preserving federated learning in electronic health data. In Proceedings of the 2020 IEEE International Conference on Blockchain (Blockchain 2020), Rhodes Island, Greece, 2–6 November 2020; pp. 550–555. [Google Scholar]
  46. Qu, Y.; Gao, L.; Luan, T.H.; Xiang, Y.; Yu, S.; Li, B.; Zheng, G. Decentralized Privacy Using Blockchain-Enabled Federated Learning in Fog Computing. IEEE Internet Thing. J. 2020, 7, 5171–5183. [Google Scholar] [CrossRef]
  47. Zhang, R.; Yu, F.R.; Liu, J.; Huang, T.; Liu, Y. Deep Reinforcement Learning (DRL)-Based Device-to-Device (D2D) Caching with Blockchain and Mobile Edge Computing. IEEE Trans. Wirel. Commun. 2020, 19, 6469–6485. [Google Scholar] [CrossRef]
  48. Somy, N.B.; Kannan, K.; Arya, V.; Hans, S.; Singh, A.; Lohia, P.; Mehta, S. Ownership Preserving AI Market Places Using Blockchain. In Proceedings of the 2019 IEEE International Conference on Blockchain (Blockchain 2019), Atlanta, GA, USA, 14–17 July 2019; pp. 156–165. [Google Scholar]
  49. Ouyang, L.; Yuan, Y.; Wang, F.Y. Learning Markets: An AI Collaboration Framework Based on Blockchain and Smart Contracts. IEEE Internet Thing. J. 2020. [Google Scholar] [CrossRef]
  50. Toyoda, K.; Zhao, J.; Zhang, A.N.S.; Mathiopoulos, P.T. Blockchain-Enabled Federated Learning with Mechanism Design. IEEE Access 2020, 8, 219744–219756. [Google Scholar] [CrossRef]
  51. Lugan, S.; Desbordes, P.; Brion, E.; Tormo, L.X.R.; Legay, A.; Macq, B. Secure Architectures Implementing Trusted Coalitions for Blockchained Distributed Learning (TCLearn). IEEE Access 2019, 7, 181789–181799. [Google Scholar] [CrossRef]
  52. Ma, L.; Pei, Q.; Zhou, L.; Zhu, H.; Wang, L.; Ji, Y. Federated Data Cleaning: Collaborative and Privacy-Preserving Data Cleaning for Edge Intelligence. IEEE Internet Thing. J. 2020. [Google Scholar] [CrossRef]
  53. Ramanan, P.; Nakayama, K. BAFFLE: Blockchain Based Aggregator Free Federated Learning. In Proceedings of the 2020 IEEE International Conference on Blockchain (Blockchain 2020), Rhodes Island, Greece, 2–6 November 2020; pp. 72–81. [Google Scholar]
  54. Yin, B.; Yin, H.; Wu, Y.; Jiang, Z. FDC: A Secure Federated Deep Learning Mechanism for Data Collaborations in the Internet of Things. IEEE Internet Thing. J. 2020, 7, 6348–6359. [Google Scholar] [CrossRef]
  55. Wang, Q.; Guo, Y.; Wang, X.; Ji, T.; Yu, L.; Li, P. AI at the Edge: Blockchain-Empowered Secure Multiparty Learning with Heterogeneous Models. IEEE Internet Thing. J. 2020, 7, 9600–9610. [Google Scholar] [CrossRef]
  56. Liu, Y.; Peng, J.; Kang, J.; Iliyasu, A.M.; Niyato, D.; El-Latif, A.A.A. A Secure Federated Learning Framework for 5G Networks. IEEE Wirel. Commun. 2020, 27, 24–31. [Google Scholar] [CrossRef]
  57. Zhang, K.; Zhu, Y.; Maharjan, S.; Zhang, Y. Edge Intelligence and Blockchain Empowered 5G Beyond for the Industrial Internet of Things. IEEE Netw. 2019, 33, 12–19. [Google Scholar] [CrossRef]
  58. Khan, L.U.; Yaqoob, I.; Imran, M.; Han, Z.; Hong, C.S. 6G Wireless Systems: A Vision, Architectural Elements, and Future Directions. IEEE Access 2020, 8, 147029–147044. [Google Scholar] [CrossRef]
  59. Lu, Y.; Huang, X.; Zhang, K.; Maharjan, S.; Zhang, Y. Blockchain and Federated Learning for 5G Beyond. IEEE Netw. 2020, 35, 219–225. [Google Scholar]
  60. Seng, S.; Li, X.; Luo, C.; Ji, H.; Zhang, H. A D2D-assisted MEC Computation Offloading in the Blockchain-Based Framework for UDNs. In Proceedings of the ICC 2019—2019 IEEE International Conference on Communications (ICC), Shanghai, China, 20–24 May 2019; IEEE: New York City, NY, USA, 2019. [Google Scholar]
  61. Wu, H.; Wolter, K.; Jiao, P.; Deng, Y.; Zhao, Y.; Xu, M. EEDTO: An Energy-Efficient Dynamic Task Offloading Algorithm for Blockchain-Enabled IoT-Edge-Cloud Orchestrated Computing. IEEE Internet Thing. J. 2020, 8, 2163–2176. [Google Scholar] [CrossRef]
  62. Xu, J.; Wang, S.; Bhargava, B.K.; Yang, F. A Blockchain-Enabled Trustless Crowd-Intelligence Ecosystem on Mobile Edge Computing. IEEE Trans. Ind. Inform. 2019, 15, 3538–3547. [Google Scholar] [CrossRef]
  63. Zhang, X.; Wu, W.; Yang, S.; Wang, X. Falcon: A Blockchain-Based Edge Service Migration Framework in MEC. Mob. Inf. Syst. 2020, 2020, 8820507. [Google Scholar] [CrossRef]
  64. Chuang, I.H.; Huang, S.H.; Chao, W.C.; Tsai, J.S.; Kuo, Y.H. TIDES: A Trust-Aware IoT Data Economic System with Blockchain-Enabled Multi-Access Edge Computing. IEEE Access 2020, 8, 85839–85855. [Google Scholar] [CrossRef]
  65. Feng, J.; Yu, F.R.; Pei, Q.; Du, J.; Zhu, L. Joint Optimization of Radio and Computational Resources Allocation in Blockchain-Enabled Mobile Edge Computing Systems. IEEE Trans.Wirel. Commun. 2020, 19, 4321–4334. [Google Scholar] [CrossRef]
  66. Liu, W.; Cao, B.; Zhang, L.; Peng, M.; Daneshmand, M. A Distributed Game Theoretic Approach for Blockchain-based Offloading Strategy. In Proceedings of the ICC 2020–2020 IEEE International Conference on Communications (ICC), Dublin, Ireland, 7–11 June 2020; pp. 1–6. [Google Scholar]
  67. Liu, M.; Yu, F.R.; Teng, Y.; Leung, V.C.M.; Song, M. Joint Computation Offloading and Content Caching for Wireless Blockchain Networks. In Proceedings of the IEEE Infocom 2018—IEEE Conference on Computer Communications Workshops (Infocom Wkshps), Honolulu, HI, USA, 15–19 April 2018; IEEE: New York City, NY, USA, 2018; pp. 517–522. [Google Scholar]
  68. Liu, M.; Yu, F.R.; Teng, Y.; Leung, V.C.M.; Song, M. Computation Offloading and Content Caching in Wireless Blockchain Networks with Mobile Edge Computing. IEEE Trans. Veh. Technol. 2018, 67, 11008–11021. [Google Scholar] [CrossRef]
  69. Sharma, V.; You, I.; Jayakody, D.N.K.; Reina, D.G.; Choo, K.R. Neural-Blockchain-Based Ultrareliable Caching for Edge-Enabled UAV Networks. IEEE Trans. Ind. Inform. 2019, 15, 5723–5736. [Google Scholar] [CrossRef]
  70. Cui, L.; Su, X.; Ming, Z.; Chen, Z.; Yang, S.; Zhou, Y.; Xiao, W. CREAT: Blockchain-assisted Compression Algorithm of Federated Learning for Content Caching in Edge Computing. IEEE Internet Thing. J. 2020. [Google Scholar] [CrossRef]
  71. Luo, J.; Chen, Q.; Yu, F.R.; Tang, L. Blockchain-Enabled Software-Defined Industrial Internet of Things with Deep Reinforcement Learning. IEEE Internet Thing. J. 2020, 7, 5466–5480. [Google Scholar] [CrossRef]
  72. Luo, J.; Yu, F.R.; Chen, Q.; Tang, L. Blockchain-Enabled Software-Defined Industrial Internet of Things with Deep Recurrent Q-Network. In Proceedings of the ICC 2020—2020 IEEE International Conference on Communications (ICC), Dublin, Ireland, 7–11 June 2020; pp. 1–6. [Google Scholar]
  73. Fu, X.; Yu, F.R.; Wang, J.; Qi, Q.; Liao, J. Performance Optimization for Blockchain-Enabled Distributed Network Function Virtualization Management and Orchestration. IEEE Trans. Veh. Technol. 2020, 69, 6670–6679. [Google Scholar] [CrossRef]
  74. Sharma, P.K.; Chen, M.; Park, J.H. A Software Defined Fog Node Based Distributed Blockchain Cloud Architecture for IoT. IEEE Access 2018, 6, 115–124. [Google Scholar] [CrossRef]
  75. Hasanova, H.; Baek, U.j.; Shin, M.g.; Cho, K.; Kim, M.S. A survey on blockchain cybersecurity vulnerabilities and possible countermeasures. Int. J. Netw. Manag. 2019, 29, e2060. [Google Scholar] [CrossRef]
  76. Zhang, S.; Lee, J. A Group Signature and Authentication Scheme for Blockchain-Based Mobile-Edge Computing. IEEE Internet Thing. J. 2020, 7, 4557–4565. [Google Scholar] [CrossRef]
  77. Rahman, M.A.; Hossain, M.S.; Islam, M.S.; Alrajeh, N.A.; Muhammad, G. Secure and Provenance Enhanced Internet of Health Things Framework: A Blockchain Managed Federated Learning Approach. IEEE Access 2020, 8, 205071–205087. [Google Scholar] [CrossRef]
  78. Lin, D.; Hu, S.; Gao, Y.; Tang, Y. Optimizing MEC Networks for Healthcare Applications in 5G Communications with the Authenticity of Users’ Priorities. IEEE Access 2019, 7, 88592–88600. [Google Scholar] [CrossRef]
  79. Kang, J.; Yu, R.; Huang, X.; Wu, M.; Maharjan, S.; Xie, S.; Zhang, Y. Blockchain for Secure and Efficient Data Sharing in Vehicular Edge Computing and Networks. IEEE Internet of Thing. J. 2019, 6, 4660–4670. [Google Scholar] [CrossRef]
  80. Zyskind, G.; Nathan, O.; Pentland, A. Decentralizing Privacy: Using Blockchain to Protect Personal Data. In Proceedings of the 2015 IEEE Security and Privacy Workshops, San Jose, CA, USA, 21–22 May 2015; pp. 180–184. [Google Scholar]
  81. Yang, H.; Liang, Y.; Yuan, J.; Yao, Q.; Yu, A.; Zhang, J. Distributed Blockchain-Based Trusted Multidomain Collaboration for Mobile Edge Computing in 5G and Beyond. IEEE Trans. Ind. Inform. 2020, 16, 7094–7104. [Google Scholar] [CrossRef]
  82. Arachchige, P.C.M.; Bertok, P.; Khalil, I.; Liu, D.; Camtepe, S.; Atiquzzaman, M. A Trustworthy Privacy Preserving Framework for Machine Learning in Industrial IoT Systems. IEEE Trans. Ind. Inform. 2020, 16, 6092–6102. [Google Scholar] [CrossRef]
  83. Islam, A.; Shin, S.Y. BUAV: A Blockchain Based Secure UAV-Assisted Data Acquisition Scheme in Internet of Things. J. Commun. Netw. 2019, 21, 491–502. [Google Scholar] [CrossRef]
  84. Kumar, T.; Harjula, E.; Ejaz, M.; Manzoor, A.; Porambage, P.; Ahmad, I.; Liyanage, M.; Braeken, A.; Ylianttila, M. BlockEdge: Blockchain-Edge Framework for Industrial IoT Networks. IEEE Access 2020, 8, 154166–154185. [Google Scholar] [CrossRef]
  85. Zhang, W.; Lu, Q.; Yu, Q.; Li, Z.; Liu, Y.; Lo, S.K.; Chen, S.; Xu, X.; Zhu, L. Blockchain-based Federated Learning for Device Failure Detection in Industrial IoT. IEEE Internet Thing. J. 2020. [Google Scholar] [CrossRef]
  86. Kang, J.; Yu, R.; Huang, X.; Maharjan, S.; Zhang, Y.; Hossain, E. Enabling Localized Peer-to-Peer Electricity Trading Among Plug-in Hybrid Electric Vehicles Using Consortium Blockchains. IEEE Trans. Ind. Inform. 2017, 13, 3154–3164. [Google Scholar] [CrossRef]
  87. Wang, Z.; Ogbodo, M.; Huang, H.; Qiu, C.; Hisada, M.; Abdallah, A.B. AEBIS: AI-Enabled Blockchain-Based Electric Vehicle Integration System for Power Management in Smart Grid Platform. IEEE Access 2020, 8, 226409–226421. [Google Scholar] [CrossRef]
  88. Liu, M.; Yu, F.R.; Teng, Y.; Leung, V.C.M.; Song, M. Distributed Resource Allocation in Blockchain-Based Video Streaming Systems with Mobile Edge Computing. IEEE Trans.Wirel. Commun. 2019, 18, 695–708. [Google Scholar] [CrossRef]
  89. Hu, Q.; Wang, W.; Bai, X.; Jin, S.; Jiang, T. Blockchain Enabled Federated Slicing for 5G Networks with AI Accelerated Optimization. IEEE Netw. 2020, 34, 46–52. [Google Scholar] [CrossRef]
  90. Ridhawi, I.A.; Aloqaily, M.; Boukerche, A.; Jaraweh, Y. A Blockchain-Based Decentralized Composition Solution for IoT Services. In Proceedings of the ICC 2020–2020 IEEE International Conference on Communications (ICC), Dublin, Ireland, 7–11 June 2020; pp. 1–6. [Google Scholar]
  91. Sun, W.; Liu, J.; Yue, Y.; Wang, P. Joint Resource Allocation and Incentive Design for Blockchain-Based Mobile Edge Computing. IEEE Trans. Wirel. Commun. 2020, 19, 6050–6064. [Google Scholar] [CrossRef]
  92. Połap, D.; Srivastava, G.; Jolfaei, A.; Parizi, R.M. Blockchain Technology and Neural Networks for the Internet of Medical Things. In Proceedings of the IEEE INFOCOM 2020—IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Toronto, ON, Canada, 6–9 July 2020; pp. 508–513. [Google Scholar]
  93. Gao, Y.; Wu, W.; Nan, H.; Sun, Y.; Si, P. Deep Reinforcement Learning based Task Scheduling in Mobile Blockchain for IoT Applications. In Proceedings of the ICC 2020—2020 IEEE International Conference on Communications (ICC), Dublin, Ireland, 7–11 June 2020; pp. 1–7. [Google Scholar]
  94. Feng, J.; Yu, F.R.; Pei, Q.; Chu, X.; Du, J.; Zhu, L. Cooperative Computation Offloading and Resource Allocation for Blockchain-Enabled Mobile-Edge Computing: A Deep Reinforcement Learning Approach. IEEE Internet Thing. J. 2020, 7, 6214–6228. [Google Scholar] [CrossRef]
  95. Zhuang, Z.; Wang, J.; Qi, Q.; Liao, J.; Han, Z. Adaptive and Robust Routing with Lyapunov-Based Deep RL in MEC Networks Enabled by Blockchains. IEEE Internet Thing. J. 2020. [Google Scholar] [CrossRef]
  96. Yu, S.; Chen, X.; Zhou, Z.; Gong, X.; Wu, D. When Deep Reinforcement Learning Meets Federated Learning: Intelligent Multi-Timescale Resource Management for Multi-access Edge Computing in 5G Ultra Dense Network. IEEE Internet Thing. J. 2020. [Google Scholar] [CrossRef]
  97. Jiang, X.; Yu, F.R.; Song, T.; Leung, V.C.M. Intelligent Resource Allocation for Video Analytics in Blockchain-Enabled Internet of Autonomous Vehicles with Edge Computing. IEEE Internet Thing. J. 2020. [Google Scholar] [CrossRef]
  98. Guo, F.; Yu, F.R.; Zhang, H.; Ji, H.; Liu, M.; Leung, V.C.M. Adaptive Resource Allocation in Future Wireless Networks with Blockchain and Mobile Edge Computing. IEEE Trans. Wirel. Commun. 2020, 19, 1689–1703. [Google Scholar] [CrossRef]
  99. Asheralieva, A.; Niyato, D. Distributed Dynamic Resource Management and Pricing in the IoT Systems with Blockchain-as-a-Service and UAV-Enabled Mobile Edge Computing. IEEE Internet Thing. J. 2020, 7, 1974–1993. [Google Scholar] [CrossRef]
  100. Hua, G.; Zhu, L.; Wu, J.; Shen, C.; Zhou, L.; Lin, Q. Blockchain-Based Federated Learning for Intelligent Control in Heavy Haul Railway. IEEE Access 2020, 8, 176830–176839. [Google Scholar] [CrossRef]
  101. Li, Y.; Chen, C.; Liu, N.; Huang, H.; Zheng, Z.; Yan, Q. A Blockchain-Based Decentralized Federated Learning Framework with Committee Consensus. IEEE Netw. 2020, 1–8. [Google Scholar]
  102. Qu, Y.; Pokhrel, S.R.; Garg, S.; Gao, L.; Xiang, Y. A Blockchained Federated Learning Framework for Cognitive Computing in Industry 4.0 Networks. IEEE Trans. Ind. Inform. 2020, 35, 234–241. [Google Scholar] [CrossRef]
  103. Shen, M.; Wang, H.; Zhang, B.; Zhu, L.; Xu, K.; Li, Q.; Du, X. Exploiting Unintended Property Leakage in Blockchain-Assisted Federated Learning for Intelligent Edge Computing. IEEE Internet Thing. J. 2020. [Google Scholar] [CrossRef]
  104. Souza, L.A.C.d.; Rebello, G.A.F.; Camilo, G.F.; Guimarães, L.C.B.; Duarte, O.C.M.B. DFedForest: Decentralized Federated Forest. Proceedings of 2020 IEEE International Conference on Blockchain (Blockchain 2020), Rhodes Island, Greece, 2–6 November 2020; pp. 90–97. [Google Scholar]
  105. Wu, Y.; Mendis, G.J.; Wei, J. DDLPF: A Practical Decentralized Deep Learning Paradigm for Internet of Things Applications. IEEE Internet Thing. J. 2020. [Google Scholar] [CrossRef]
  106. Liu, Y.; Yu, F.R.; Li, X.; Ji, H.; Leung, V.C.M. Resource Allocation for Video Transcoding and Delivery Based on Mobile Edge Computing and Blockchain. In Proceedings of the 2018 IEEE Global Communications Conference (GLOBECOM), Abu Dhabi, United Arab Emirates, 9–13 December 2018; pp. 1–6. [Google Scholar]
  107. Liu, Y.; Yu, F.R.; Li, X.; Ji, H.; Leung, V.C.M. Decentralized Resource Allocation for Video Transcoding and Delivery in Blockchain-Based System with Mobile Edge Computing. IEEE Trans. Veh. Technol. 2019, 68, 11169–11185. [Google Scholar] [CrossRef]
  108. Antonakoglou, K.; Xu, X.; Steinbach, E.; Mahmoodi, T.; Dohler, M. Toward Haptic Communications Over the 5G Tactile Internet. IEEE Commun. Surv. Tutor. 2018, 20, 3034–3059. [Google Scholar] [CrossRef]
  109. Gupta, R.; Thakker, U.; Tanwar, S.; Obaidat, M.S.; Hsiao, K.F. BITS: A Blockchain-driven Intelligent Scheme for Telesurgery System. In Proceedings of the 2020 International Conference on Computer, Information and Telecommunication Systems (CITS), Hangzhou, China, 5–7 October 2020; pp. 1–5. [Google Scholar]
  110. Qadri, Y.A.; Nauman, A.; Zikria, Y.B.; Vasilakos, A.V.; Kim, S.W. The Future of Healthcare Internet of Things: A Survey of Emerging Technologies. IEEE Commun. Surv. Tutor. 2020, 22, 1121–1167. [Google Scholar] [CrossRef]
  111. Hassija, V.; Chamola, V.; Gupta, V.; Chalapathi, G.S.S. A Blockchain based Framework for Secure Data Offloading in Tactile Internet Environment. In Proceedings of the 2020 International Wireless Communications and Mobile Computing (IWCMC), Limassol, Cyprus, 15–19 June 2020; pp. 1836–1841. [Google Scholar]
  112. Hassija, V.; Saxena, V.; Chamola, V. A Blockchain-based Framework for Drone-Mounted Base Stations in Tactile Internet Environment. In Proceedings of the IEEE INFOCOM 2020—IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Toronto, ON, Canada, 6–9 July 2020; pp. 261–266. [Google Scholar]
  113. Yaqoob, I.; Salah, K.; Uddin, M.; Jayaraman, R.; Omar, M.; Imran, M. Blockchain for Digital Twins: Recent Advances and Future Research Challenges. IEEE Netw. 2020, 34, 290–298. [Google Scholar] [CrossRef]
  114. Lu, Y.; Huang, X.; Zhang, K.; Maharjan, S.; Zhang, Y. Low-latency Federated Learning and Blockchain for Edge Association in Digital Twin empowered 6G Networks. IEEE Trans. Ind. Inform. 2020. [Google Scholar] [CrossRef]
  115. Lu, Y.; Huang, X.; Zhang, K.; Maharjan, S.; Zhang, Y. Communication-efficient Federated Learning and Permissioned Blockchain for Digital Twin Edge Networks. IEEE Internet Thing. J. 2020, 8, 2276–2288. [Google Scholar] [CrossRef]
  116. Yang, L.; Li, M.; Si, P.; Yang, R.; Sun, E.; Zhang, Y. Energy-Efficient Resource Allocation for Blockchain-Enabled Industrial Internet of Things with Deep Reinforcement Learning. IEEE Internet Thing. J. 2020, 8, 2318–2329. [Google Scholar] [CrossRef]
  117. Lemieux, V.L.; Hofman, D.; Batist, D.; Joo, A. Blockchain Technology for Recordkeeping. 2019. Available online: http://armaedfoundation.org/wp-content/uploads/2019/06/AIEF-Research-Paper-Blockchain-Technology-Recordkeeping.pdf (accessed on 17 February 2020).
  118. Asheralieva, A.; Niyato, D. Reputation-Based Coalition Formation for Secure Self-Organized and Scalable Sharding in IoT Blockchains with Mobile-Edge Computing. IEEE Internet Thing. J. 2020, 7, 11830–11850. [Google Scholar] [CrossRef]
  119. Fan, S.; Zhang, H.; Zeng, Y.; Cai, W. Hybrid Blockchain-Based Resource Trading System for Federated Learning in Edge Computing. IEEE Internet Thing. J. 2020, 8, 2252–2264. [Google Scholar] [CrossRef]
  120. Eyal, I.; Sirer, E.G. Majority is not enough: Bitcoin mining is vulnerable. In Proceedings of the International Conference on Financial Cryptography and Data Security, Christ Church, Barbados, 3–7 March 2014; Springer: Berlin/Heidelberg, Germany, 2014; pp. 436–454. [Google Scholar]
  121. Qiu, C.; Yao, H.; Wang, X.; Zhang, N.; Yu, F.R.; Niyato, D. AI-Chain: Blockchain Energized Edge Intelligence for Beyond 5G Networks. IEEE Netw. 2020, 34, 62–69. [Google Scholar] [CrossRef]
  122. Zooko, W.O. Names: Decentralized, Secure, Human-Meaningful: Choose Two. 2003. Available online: https://web.archive.org/web/20011020191610/http://zooko.com/distnames.html (accessed on 12 February 2021).
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.