You are currently viewing a new version of our website. To view the old version click .
Applied Sciences
  • Article
  • Open Access

15 December 2021

SBTMS: Scalable Blockchain Trust Management System for VANET

,
and
1
Institute of Reliable Embedded Systems and Communication Electronics (ivESK), Offenburg University of Applied Sciences, 77652 Offenburg, Germany
2
Department of Electrical and Computer Engineering, University of Kashan, Kashan 8731753153, Iran
*
Authors to whom correspondence should be addressed.
This article belongs to the Special Issue IoT-Enhancing the Industrial World

Abstract

With many advances in sensor technology and the Internet of Things, Vehicle Ad Hoc Network (VANET) is becoming a new generation. VANET’s current technical challenges are deploying decentralized architecture and protecting privacy. Because Blockchain features are decentralized, distributed, mass storage, and non-manipulation features, this paper designs a new decentralized architecture using Blockchain technology called Blockchain-based VANET. Blockchain-based VANET can effectively resolve centralized problems and mutual distrust between VANET units. To achieve this, it is needed to provide scalability on the blockchain to run for VANET. In this system, our focus is on the reliability of incoming messages on the network. Vehicles check the validity of the received messages using the proposed Bayesian formula for trust management system and some information saved in the Blockchain. Then, based on the validation result, the vehicle computes a rate for each message type and message source vehicle. Vehicles upload the computed rates to Roadside Units (RSUs) in order to calculate the net reliability value. Finally, RSUs using a sharding consensus mechanism generate blocks, including the net reliability value as a transaction. In this system, all RSUs collaboratively maintain the latest updated Blockchain. Our experimental results show that the proposed system is effective, scalable and dependable in data gathering, computing, organization, and retrieval of trust values in VANET.

1. Introduction

Vehicular ad hoc network (VANET) is one of the most significant current discussion in the intelligent transport [1]. VANET provides a platform for vehicles to share road-related messages with other peers. This ability has greatly improved the management of urban traffic and road accidents. The point is event messages that dramatically increase in this network. Moreover, due to the numerous and diversity of vehicles in this network, vehicles are unable to fully trust each other. As a consequence, a trust management system and a method to coordinate the vehicle’s interactions efficiently are required. The primary option, for the defined purpose, is a centralized system. In this kind of trust management system, all messages are stored and processed in a central server. Centralized systems can carry risks such as bottlenecks caused by increased layers of approvals and slower decision-making and single-point of failure. This challenge faces the system with efficiency and communication between node’s problems. On the other hand, decentralized system is one of the most well-known approaches to overcome centralized issues. In decentralized systems, every node makes its own decision. One also should not overlook the fact that the final behavior of the system is an aggregation of the individual node’s decisions. With this in mind, Blockchain is a one of the solutions to solve above problems. However, regarding the decentralized approach, it is a practicable tool for VANET. Blockchain enables distributed nodes to cooperate with each other and maintain a consist and tamper-proof ledger. Furthermore, there is no requires trusted third party (TTP) to establish trust, the Blockchain technology can be seen as a feasible distributed platform. It is a distributed peer-to-peer (P2P) system for communicating and transferring transactions between nodes without TTP. Some Blockchain technology applications include digital currencies [2], health insurance system  [3], health care system [4], Internet of things [5], social networks [6], intelligent contracts [7], voting system [8], authentication [9], notary [10], data storage [11], energy supply [12], supply chain management [13] and protection of intellectual property[14]. In all of these applications, Blockchain tries to eliminate the focus on a single entity. This has great potential for implementing centralized systems in a distributed way without the mentioned problems. A combination of Blockchain and IoT technology can greatly improve the field of security, reliability, storage of data, and immutability. However, due to the mining process, most of the Blockchain technologies have some shortcomings such as low transaction throughput and poor scalability [15]. In VANET the number of vehicles and their exchanged messages increase continuously, therefore the scalability is another important issue. Sharding as a consensus algorithm can make Blockchain’s ledger more efficient, scalable, and sustainable by dividing large amounts of data into chunks. In this paper, a sharding consensus algorithm is employed to provide scalability. Sharding algorithm distributed mining tasks into committees, each of the committees processes a set of transactions [16]. Based on the distributed nature of Blockchain, trust management can be applied in distributed way among road side units (RSU), which can forbear the centralized issues. Moreover, Blockchain enables RSUs to work simultaneously together and patronize a consistent database. The main contribution of this paper can be summarized as follows:
1
We propose a scalable and tamper-proof distributed trust management system for VANET. In this system, RSUs response to vehicle’s queries and calculate the trust by employing sharding consensus algorithm in several committees.
2
We propose a new Bayesian Inference-based validation procedure for vehicles to neutralize the effect of deceptive messages.
3
We simulate the proposed model to show that the proposed scalable Blockchain trust management system is efficient in VANET environment.
The rest of this paper is organized as follows. Section 2 introduces Blockchain, while the literature reviews are explained in Section 3. In Section 4, we propose our Blockchain-based VANET system in details. Performance evaluation and further discussion about the proposed system is given in Section 5. Finally, Section 6 concludes this paper.

2. Basic Concepts

An Overview on the Blockchain Concepts

Blockchain is defined as a distributed and consensus-based ledger that all successful transactions are stored in a list of blocks. In Blockchain network, communications are P2P [17]. In this technology, asymmetric cryptography and a consensus algorithm are used to authenticate the entities and to ensure the integrity of the Blockchain [18]. Blockchain structure is a back-linked record of transaction blocks, each block can be recognized by a hash value on the header of a block. The header contains index, previous hash, number of transactions, timestamp, nonce, and Merkel tree. The block body contains transactions that miners place in a block. Blockchain structure has been shown in Figure 1.
Figure 1. Blockchain structure.
The key contribution of the Blockchain mechanism is consensus algorithm. The consensus algorithm has been designed to achieve reliability in a network that includes unreliable nodes [19]. The consensus algorithm within the Blockchain network ensures that all network agents have the same copy ledger. Confirmation of transactions and aggregation in Blockchain is accomplished through consensus protocols. Consensus protocols can be divided into two categories: proof-based algorithms and Byzantine algorithms [20]. Examples of proof options include proof of work, stocks proof, proof of capacity, proof of space, proof of elapsed time, proof of burning, proof of activity, proof of power, and proof of equity are examples of proof-based algorithms. Sharding algorithm and Byzantine algorithms include the tolerance of applied Byzantine error and Byzantine consensus.

4. The Proposed Scalable Blockchain Trust Management System (SBTMS)

This study aims to provide a tamper-proof, scalable, and trustable system for VANET. Figure 2 shows the VANET architecture that denotes normal workflow from observing an event until sending the message to RSU. In the proposed architecture (Figure 3), that hereafter is referred to as SBTMS, for the trust management each vehicle by observing an event or any kind of problem on their route, sends a message about the event to others. The vehicle that give the message, calculates message reliability between 0 and 1, then sends it to the RSU. Throughout this study, it is assumed that vehicles cooperate in sending and receiving the event messages. RSUs receive the message reliability from vehicles and calculate net reliability ( O S ) for a given message type and a sender. The net reliability, as a transaction, adds to the Blockchain based on the sharding consensus algorithm. The Blockchain maintains the integrity of the network.
Figure 2. VANET architecture.
Figure 3. The proposed architecture: merging VANET with Blockchain.
Each received message should be validated by the receiver. As illustrated in Figure 3, the message validation in SBTMS including four main steps: (1) Calculating event confidence score and sending it to RSU. (2) Calculating the net reliability by RSUs for a given type of message and sender vehicle. (3) Forming committees by RSUs. (4) Running a consensus algorithm to add the transactions to Blockchain. In the following, we will discuss these steps. For ease of reference, Table 1 summarizes the model parameters and notations.
Table 1. Summary of parameters and notations.

4.1. Step 1: Calculating Confidence Score and Message Reliability

A vehicle, by observing a given event, independently broadcasts the massage to the neighbor vehicles. This message is 5-tuple ( v s ,   L L ,   e ,   m ,   t ), where V s indicates identification of sender vehicle, L L shows event location including longitude and latitude, e indicates event type of message, m is message’s ID, and t represents time stamp. The message reliability is calculated for a given message type and message sender, and is based on two effective cases: (1) the distance between message sender and event location (i.e., event confidence score) and (2) the level of reliability of the message sender for the given message type. The message that sent by the nearest vehicles to the event is more reliable than those sent by further vehicles. Therefore, the receiver can calculate a confidence score C s based on the distance for the event e using Equation (1).
c s = 1 1 + e s g d s 1
Here, C s is confidence score for the event that has been sent by V s , d s is distance between the sender message and the event location ( L L ). If V s does not send a message, then C s the value is equal to 0.
Due to the mobility of vehicles in the VANET, several vehicles may observe an event in the network. Thus, a vehicle may receive the same messages from different senders. Consequently, the receiver calculates several confidence scores for these same messages based on the distance of its sender and the event location. Vector C = c 1 , c 2 , … shows the confidence scores. After that, each vehicle requests the net reliability level for message sender V s from the nearest RSU. The RSU sends the net reliability level O s to the requester. Therefore, the requester can calculate message reliability given by net reliability on a given type of message and confidence score of the message type (i.e., P ( m | O , C ) ) as follows:
P m | O , C = P m | C × P C | m , O P m | C × P C | m , O + P m ¯ | C × P C | m ¯ , O
where P ( m C ) , P ( C m , O ), P ( C m , O ) are given by Equations (3)–(5).
P m | C = P m × s = 1 N P c s | m P m × s = 1 N P c s | m + P m ¯ × s = 1 N P c s | m ¯
P C | m , O = s = 1 N P c s | m , O
P c s | m , O = P c s | O
In Equation (5), c s is independent of message type m, so we have
P c s | O = P c s × P O | c s P c s × P O | c s + P c s ¯ × P O | c s
In Equation (6), it is assumed that P ( c s ) follows the normal distribution. Furthermore, P = ( c s ¯ ) is equal to 1 P ( c s ) . In this Equation, P ( O | c s ) and P ( o c s ) are given by Equations (7) and (8).
P O | c s = s = 1 N P o s | c s = s = 1 N o s
P O | c s ¯ = s = 1 N P o s | c s = s = 1 N 1 o s
P ( m ¯ C ) in Equation (2) is calculated using by Equation (9).
P m ¯ | C = P m ¯ × s = 1 N P c s | m ¯ P m ¯ × s = 1 N P c s | m ¯ + P m × s = 1 N P c s | m
where P ( m ) , P ( c s m ) and P ( c s m ¯ ) are equal to 1 p ( m ) , c s , and 1 c s , respectively. Furthermore, P ( C m ¯ , O ) is given by
P C | m ¯ , O = P C | O = s = 1 N P c s | O
Finally, the receiver vehicle sends the calculated reliability to the nearest RSU as ( v r , v s , m , P ( m | O , C ) ) , where V r is the receiver’s ID, V s is the sender’s ID, m is the message’s ID, and P ( m | O , C ) is the calculated reliability level by V r for the message m. Algorithm 1 summarizes undertaken activities by each vehicle.
Algorithm 1:Vehicle’s activities.
 Input  :Event
Output:Rate value
while vehicle (running)do
Applsci 11 11947 i001
end (

4.2. Step 2: Calculating Net Reliability

An RSU may receive different message reliability values generated by different vehicles. Each RSU should calculate net reliability based on the all received reliability values. In many studies, when an exact description of a phenomenon is lacking, researchers use an S-curve (sigmoid function) to approximate the phenomenon’s behavior [42,43,44]. Net reliability in our problem has such behavior. When the sum of received reliability values are low, net reliability will be near to zero. By increasing the sum, net reliability raises and approaches to its maximum level. In this study, net reliability is given by Equation (11).
o u , s , m = 1 1 + e k 1 N P m | O , C x 0
where k is steepness, x 0 is the inflection point of the S-curve, and N indicates the number of received reliability values about a given type of the message by a given sender vehicle. Maximum value of O ( u , s , m ) is equal to one.

4.3. Step 3: Formation of Committees by RSUs

After calculating the net reliability by RSUs, they should cooperate with each other to add the net reliability as a transaction to the Blockchain. Let assume a network of N RSUs participate in adding block to the Blockchain. To prevent collusion, RSUs employ self-generated transient identity rather than a permanent identity or a public key infrastructure [45]. To provide a transient identity, RSU must find a Proof-of-work (PoW) solution. RSU’s Committees will then compose corresponding to the same generated identities. For finding PoW, each RSU must generate a random string (i.e., EpochRandomness) and find a nonce that satisfies the following inequality:
O = H E p o c h R a n d o m n e s s I P P K n o n c e < 2 γ D
where O will be RSU’s transient identity, D is a predefined value on the network, IP is RSU address, and PK is RSU’s public key. The value of D determines the network’s difficulty and can be set corresponding to the number of RSUs. EpochRandomness is generated to ensure that the PoW is not precomputed and consequently malicious RSUs cannot take over authority of the committees. Number of committees is given by N = 2 s z , where N is the total number of RSUs in the network, z is the maximum size of the committees, and 2 s is the number of committees. Based on the sharding algorithm and the last bit of its identifier, each RSU is assigned to a random committee. For more information, refer to [45], which provides a detailed discussion on sharding protocol.

4.4. Step 4: Consensus Process on Transactions

As mentioned in step one, calculated message reliability by the vehicles are sent to the nearest RSUs. Each RSU in a specific time calculates the net reliability and then broadcasts it as a transaction on the network of RSUs. Then, according to Step 3, RSUs generate a transient identity, and after that RSUs should attempt to find out transient identities of other RSUs in their committee by sharing or exchanging information with each other, and to compose a fully-connected overlay network for each committee in the RSUs’s network. Next, in each committee, RSUs run Practical Byzantine Fault Tolerance (PBFT) protocol [46] to concur on a set (or shard) of transactions. Figure 4 shows the PBFT protocol in a committee to add a transaction in a shard.In PBFT consensus process. In the pre-prepare phase, a RSU sends a transaction to the committee members for validating. In the preparation phase, each of the committee’s RSU verifies the transaction validity and sends the result to the others. In commit phase, each RSU that receives more than 2 z 3 of the prepare message, sends the commit message to the others. Finally, by receiving 2 z 3 a commit message by the others, the transaction is validated and added to the set (or shard).
Figure 4. PBFT consensus process.
The consensus shard in each committee, signed by at least z 2 + 1 RSUs, is sent to the final committee, which is composed based on a given s-bit final committee identifier, to create a new block in the Blockchain. The final committee receives the consensus shards provided by the committees and computes a cryptographic digest. To do so, RSUs in final committee run again a PBFT and send shards to the network. Figure 5 presents the process of sharding protocol in our model.
Figure 5. Sharding protocol in SBTMS.

5. Results

In this section, it is described how to simulate the proposed system in details. It is simulated the system with 20 RSUs, 10–3000 vehicles, and 3 events: accident, traffic, and road destruction. RSUs after computing net reliability run sharding protocol. It is assumed committees of size 4, and the number of RSU in each committee for consensus is 3. Each RSU in the system receives transactions that are corresponding to the committee that it belongs to. In the simulation, has been assumed that each committee confirms all transaction with net reliability greater than a threshold ( 70 % ). Another simulation’s specifications are shown in Table 2.
Table 2. Table of symbols.
Python language is used to simulate this infrastructure. The asynchronous simulation environment simulates network interactions between the vehicle and the blockchain. RSUs are stationary, and each vehicle is moving randomly and is moving in a two-dimensional environment. Events also occur randomly in the simulation environment.

5.1. Security Analysis

In the proposed system, it is assumed that some vehicles and RSUs may be malicious or attacked. Therefore, the system should be able to tolerate these abnormalities. In accordance with the work in [33], malicious vehicles may send fake messages to others, which can lead to disturbance. In the proposed system, trust is calculated based on the Bayesian inference on the reputation of the vehicles and RSUs. Therefore, sending fake messages cannot disturb the system. Another scenario is that vehicles send fake message reliability to RSU, but due to Bayesian inference in RSU, this case cannot cause disturbance.
Trust to RSUs is the most important issue in this kind of VANET. All agents (i.e., RSUs and vehicles) in the network are selfish. This means that they are intending to maximize their own payoffs. Ignoring this concept can result in failing mechanisms. For example, a recent study by Yang et al. [33] ignored the RSU’s selfishness. They have assumed each RSU mines a block to add to the Blockchain, with a network’s difficulty determined by itself. The network’s difficulty is calculated based on the received messages. However, due to the rationality (or hacking), a RSU can set a low network’s difficulty in order to faster mining and getting more payoffs. In our proposed system, committees use a public random string epochRandomness to make certain that the members randomly (not precomputed) compose the committee.

5.2. Message Reliability and Net Reliability Analysis

In the proposed system, by increasing number of the exchanged messages, message reliability increases. Figure 6 indicates message reliability for three types of the events over time in the simulated environment for a given vehicle.
Figure 6. Changes of message reliability over time. (a) Event 1 (i.e., Accident); (b) Event 2 (i.e., Traffic); (c) Event 3 (i.e., Road Destruction).
As illustrated in Figure 6, by forwarding messages, their reliability increase. However, may exist several vehicles that do not forward event messages, hence the convergence speed of the message reliability reduce or fix (see Figure 6c Epoch 3000–17,000). Furthermore, if vehicles send fake messages, the message reliability can decrease (see Figure 6b Epoch 13,000).
Like as message reliability, the net reliability calculated by RSUs converges. This convergence has been shown in Figure 7 for three event messages originated from given vehicles. As shown in this figure, the net reliability increases over time.
Figure 7. Event OS value evaluation. (a) Event 1 (i.e., Accident); (b) Event 2 (i.e., Traffic); (c) Event 3 (i.e., Road Destruction).
In the above simulations, it is assumed that the event rates of accident, traffic, and road destruction are 2 5 , 2 5 , and 1 5 , respectively. In this subsection, it is shown the effect of event rates on message reliability and net reliability and their convergences. The event rates P ( m ) had been employed in Equations (2) and (3). As shown in Figure 8 by increasing the event rate, net reliability for a message originated from a given vehicle is reduced.
Figure 8. Message reliability values for different event rates. (a) Accident event; (b) Traffic event; (c) Road destruction event.
Another criterion that may have a significant effect on the message and net reliability, and also on the performance of the system, is the radius that a vehicle is able to send or receive a message. As illustrated in Figure 9, increasing the vehicle’s radius increases the message and net reliability. Growing the radius increases the number of vehicles that receive or send a given message, thus message and net reliability increase.
Figure 9. Message and net reliability values for different vehicle’s radius. (a) Message Reliability; (b) Net Reliability.
Number of vehicles is another determinant parameter. As the number of vehicles increases, a specific event message may be sent over and over again, which results in increasing message and net reliability. Furthermore, in this situation, fake messages have less impact on the reliability. Figure 10 shows reliability changes over different number of vehicles.
Figure 10. Net reliability with respect to the number of vehicles.
Number of blocks in the Blockchain and required time to mine a new block are important factors in the performance of the system. These factors depend on the number of times the messages are forwarded in the network. Figure 11 indicates the effect of number of messages in the network on number of blocks in the Blockchain and required time to mine.
Figure 11. The effect of number of forwarded messages in the network on the number of blocks in the Blockchain and the required time to mine. (a) Required time to mine; (b) Number of blocks in the Blockchain.
The sharding consensus algorithm in the proposed system scales up the performance nearly linearly with the computational power of RSUs. It provides promising scalability in the simulation. To assess accuracy and precision of the proposed system, it is considered as a classification system in which any vehicle can classify the received message into two classes, correct and incorrect. In this way, it is defined: True positive (TP): If a received correct message is classified as a correct message by a vehicle; True negative (TN): If a received incorrect message is classified as an incorrect message by a vehicle; False positive (FP): If a received incorrect message is classified as a correct message by a vehicle; False negative (FN): If a received correct message is classified as an incorrect message by a vehicle. Therefore, precision and accuracy of the system are given by
P r e c i s i o n = T P T p + F P
A c c u r a c y = T P + T N T p + F P + T N + F N
Figure 12 shows the accuracy and precision for different event rate and number of generated blocks. As shown, by increasing number of generated block in the system, the accuracy and precision increase.
Figure 12. Accuracy and precision of the proposed system for different event rates and number of generated blocks. (a) Model accuracy; (b) Model precision.

5.3. Comparison to Proposed Model Computing Time

To prove the optionality of the proposed model, the comparison result of computation times of the proposed model with the computational time of the vehicular network based on PoW is mentioned. The results can be seen in Figure 13 and Figure 14.
Figure 13. Comparison generation block time between Sharding and POW.
Figure 14. Comparison vehicles calculation time between Sharding and POW.
Figure 13 compares generation block time in Sharding algorithm with POW as the most well-known consensus algorithm. As shown in this figure, by increasing number of vehicles, the required time to mine a new block in the proposed system, in contrast with POW, increases near linearly.
Figure 14 shows the calculation time for vehicles. It is clear from the diagram that the vehicle calculation time is less in our proposed model. As a result, it shows the success of this method compared to previous methods.

6. Comparison

As mentioned in [37], Barttholomy et al. have used tangle technology to improve the safety and efficiency of cars in the VANET. They introduced and analyzed tangle as a solution to the Blockchain problems in the VANET. Tangle technology uses the coordinator to manage the blockchain. However, as the coordinator is not distributed, it represents a single-point-of-failure. However, in this paper, the sharding algorithm is used, which is fully distributed. In [38], Kang et al. proposed a Blockchain-based structure for VANET that miners are selected based on their cooperation in this system. The concept of this work is based on POS blockchain. However, POS still has a sclability problem, which prevents vehicle transactions from being mined in near real time by the RSUs. However, with the proposed method, it is possible to add extra nodes to the network without having to worry about the delay in publishing blocks. Another study by Yang et al. [33] proposed a distributed trust management system for vehicle network based on Blockchain technology. The PoW algorithm was used for mining, which has a scalability problem. In addition, not all transactions are accessible to all RSUs, which means that there is a possibility of creating a fake transactions and blocks in order to receive a blockchain reward. In this paper, we proposed to broadcast transactions and using committees to solve this issue.

7. Conclusions

In this study, we propose a scalable trust management system based on Blockchain for VANET. In this system, vehicles can report the events to their neighbors, assess the message reliability received from neighbors, query the net reliability from the nearest RSU, and calculate trust on the RSUs. Net reliability values are calculated by RSUs and validating by RSUs committees. Each net reliability value, after approving by the committee, is added to the Blockchain. In the proposed system, all RSUs collaboratively maintain the latest updated Blockchain. Simulating demonstrated that malicious agents cannot disturb normal system behavior. Experimental results indicate the effectiveness and performance of proposed system in different situations. Further studies, such as a reward and punishment method for malicious agents, can be applied to the proposed system as future work. We believe that the proposed system can be applied for decentralized trust management in the other applications. For future work, we plan to use Q-Learning to smarten vehicle behavior in the proposed model based on rewards and punishments.

Author Contributions

Conceptualization, F.G.G. and J.S.S.; methodology, F.G.G.; software, F.G.G.; validation, F.G.G., J.S.S. and A.S.; investigation, F.G.G.; writing—original draft preparation, F.G.G.; writing—review and editing, J.S.S. and A.S.; visualization, F.G.G.; supervision, J.S.S. and A.S. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

Not Applicable, the study does not report any data.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Sikora, A. Privacy and Trust Management in Safety-Related Car2X Communication. In Managing Trust in Cyberspace; Chapman and Hall/CRC: Boca Raton, FL, USA, 2013; pp. 284–304. [Google Scholar]
  2. Rocha, H.; Ducasse, S. Preliminary steps towards modeling blockchain oriented software. In Proceedings of the 2018 IEEE/ACM 1st International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB), Gothenburg, Sweden, 27 May–3 June 2018; pp. 52–57. [Google Scholar]
  3. Raikwar, M.; Mazumdar, S.; Ruj, S.; Gupta, S.S.; Chattopadhyay, A.; Lam, K.Y. A blockchain framework for insurance processes. In Proceedings of the 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS), Paris, France, 26–28 February 2018; pp. 1–4. [Google Scholar]
  4. Mettler, M. Blockchain technology in healthcare: The revolution starts here. In Proceedings of the 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom), Munich, Germany, 14–16 September 2016; pp. 1–3. [Google Scholar]
  5. Huh, S.; Cho, S.; Kim, S. Managing IoT devices using blockchain platform. In Proceedings of the 2017 19th International Conference on Advanced Communication Technology (ICACT), Yeongchang, Korea, 19–22 February 2017; pp. 464–467. [Google Scholar]
  6. Chen, Y.; Li, Q.; Wang, H. Towards trusted social networks with blockchain technology. arXiv 2018, arXiv:1801.02796. [Google Scholar]
  7. Wright, C.; Serguieva, A. Sustainable blockchain-enabled services: Smart contracts. In Proceedings of the 2017 IEEE International Conference on Big Data (Big Data), Boston, MA, USA, 11–14 December 2017; pp. 4255–4264. [Google Scholar]
  8. Moura, T.; Gomes, A. Blockchain voting and its effects on election transparency and voter confidence. In Proceedings of the 18th Annual International Conference on Digital Government Research, Staten Island, NY, USA, 7–9 June 2017; pp. 574–575. [Google Scholar]
  9. Jacobovitz, O. Blockchain for Identity Management, The Lynne and William Frankel Center for Computer Science Department of Computer Science; Ben-Gurion University: Beer Sheva, Israel, 2016. [Google Scholar]
  10. Szalachowski, P. Blockchain-based tls notary service. arXiv 2018, arXiv:1804.00875. [Google Scholar]
  11. Shafagh, H.; Burkhalter, L.; Hithnawi, A.; Duquennoy, S. Towards blockchain-based auditable storage and sharing of IoT data. In Proceedings of the 2017 on Cloud Computing Security Workshop, Dallas, TX, USA, 3 November 2017; pp. 45–50. [Google Scholar]
  12. Mengelkamp, E.; Notheisen, B.; Beer, C.; Dauer, D.; Weinhardt, C. A blockchain-based smart grid: Towards sustainable local energy markets. Comput. Sci.-Res. Dev. 2018, 33, 207–214. [Google Scholar] [CrossRef]
  13. Abeyratne, S.A.; Monfared, R.P. Blockchain ready manufacturing supply chain using distributed ledger. Int. J. Res. Eng. Technol. 2016, 5, 1–10. [Google Scholar]
  14. Holland, M.; Stjepandić, J.; Nigischer, C. Intellectual property protection of 3D print supply chain with blockchain technology. In Proceedings of the 2018 IEEE International Conference on Engineering, Technology and Innovation (ICE/ITMC), Stuttgart, Germany, 17–20 June 2018; pp. 1–8. [Google Scholar]
  15. Zamani, M.; Movahedi, M.; Raykova, M. Rapidchain: Scaling blockchain via full sharding. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, Toronto, ON, Canada, 15–19 October 2018; pp. 931–948. [Google Scholar]
  16. Manshaei, M.H.; Jadliwala, M.; Maiti, A.; Fooladgar, M. A game-theoretic analysis of shard-based permissionless blockchains. IEEE Access 2018, 6, 78100–78112. [Google Scholar] [CrossRef]
  17. Yaga, D.; Mell, P.; Roby, N.; Scarfone, K. Blockchain technology overview. arXiv 2019, arXiv:1906.11078. [Google Scholar]
  18. Li, D.; Peng, W.; Deng, W.; Gai, F. A blockchain-based authentication and security mechanism for IoT. In Proceedings of the 2018 27th International Conference on Computer Communication and Networks (ICCCN), Hangzhou, China, 30 July–2 August 2018; pp. 1–6. [Google Scholar]
  19. Bamakan, S.M.H.; Motavali, A.; Bondarti, A.B. A survey of blockchain consensus algorithms performance evaluation criteria. Expert Syst. Appl. 2020, 154, 113385. [Google Scholar] [CrossRef]
  20. Sankar, L.S.; Sindhu, M.; Sethumadhavan, M. Survey of consensus protocols on blockchain applications. In Proceedings of the 2017 4th International Conference on Advanced Computing and Communication Systems (ICACCS), Coimbatore, India, 6–7 January 2017; pp. 1–5. [Google Scholar]
  21. Namal, S.; Gamaarachchi, H.; MyoungLee, G.; Um, T.W. Autonomic trust management in cloud-based and highly dynamic IoT applications. In Proceedings of the 2015 ITU Kaleidoscope: Trust in the Information Society (K-2015), Barcelona, Spain, 9–11 December 2015; pp. 1–8. [Google Scholar]
  22. Nitti, M.; Girau, R.; Atzori, L.; Iera, A.; Morabito, G. A subjective model for trustworthiness evaluation in the social internet of things. In Proceedings of the 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications-(PIMRC), Sydney, NSW, Australia, 9–12 September 2012; pp. 18–23. [Google Scholar]
  23. Minhas, U.F.; Zhang, J.; Tran, T.; Cohen, R. Towards expanded trust management for agents in vehicular ad-hoc networks. Int. J. Comput. Intell. Theory Pract. IJCITP 2010, 5, 3–15. [Google Scholar]
  24. Gerlach, M. Trust for vehicular applications. In Proceedings of the Eighth International Symposium on Autonomous Decentralized Systems (ISADS’07), Sedona, AZ, USA, 21–23 March 2007; pp. 295–304. [Google Scholar]
  25. Raya, M.; Papadimitratos, P.; Gligor, V.D.; Hubaux, J.P. On data-centric trust establishment in ephemeral ad hoc networks. In Proceedings of the IEEE INFOCOM 2008-The 27th Conference on Computer Communications, Phoenix, AZ, USA, 13–18 April 2008; pp. 1238–1246. [Google Scholar]
  26. Dotzer, F.; Fischer, L.; Magiera, P. Vars: A vehicle ad-hoc network reputation system. In Proceedings of the Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks, Taormina-Giardini Naxos, Italy, 16 June 2005; pp. 454–456. [Google Scholar]
  27. Yu, B.; Singh, M.P. An evidential model of distributed reputation management. In Proceedings of the First International Joint Conference on Autonomous Agents and Multiagent Systems: Part 1, Bologna, Italy, 15–19 July 2002; pp. 294–301. [Google Scholar]
  28. Yu, B.; Singh, M.P. A social mechanism of reputation management in electronic communities. In Proceedings of the International Workshop on Cooperative Information Agents, Boston, MA, USA, 7–9 July 2000; Springer: Berlin/Heidelberg, Germany, 2000; pp. 154–165. [Google Scholar]
  29. Azad, M.A.; Bag, S.; Parkinson, S.; Hao, F. TrustVote: Privacy-preserving node ranking in vehicular networks. IEEE Internet Things J. 2018, 6, 5878–5891. [Google Scholar] [CrossRef] [Green Version]
  30. Maskey, S.R.; Badsha, S.; Sengupta, S.; Khalil, I. ALICIA: Applied Intelligence in blockchain based VANET: Accident Validation as a Case Study. Inf. Process. Manag. 2021, 58, 102508. [Google Scholar] [CrossRef]
  31. Castaño, F.; Haber, R.E.; Mohammed, W.M.; Nejman, M.; Villalonga, A.; Lastra, J.L.M. Quality monitoring of complex manufacturing systems on the basis of model driven approach. Smart Struct. Syst. 2020, 26, 495–506. [Google Scholar]
  32. Villalonga, A.; Negri, E.; Biscardo, G.; Castano, F.; Haber, R.E.; Fumagalli, L.; Macchi, M. A decision-making framework for dynamic scheduling of cyber-physical production systems based on digital twins. Annu. Rev. Control 2021, 51, 357–373. [Google Scholar] [CrossRef]
  33. Yang, Z.; Yang, K.; Lei, L.; Zheng, K.; Leung, V.C. Blockchain-based decentralized trust management in vehicular networks. IEEE Internet Things J. 2018, 6, 1495–1505. [Google Scholar] [CrossRef]
  34. Islam, A.; Kader, M.; Shin, S.Y. NEWSTRADCOIN: A Blockchain Based Privacy Preserving Secure NEWS Trading Network. arXiv 2019, arXiv:1904.00184. [Google Scholar]
  35. Jiang, T.; Fang, H.; Wang, H. Blockchain-based internet of vehicles: Distributed network architecture and performance analysis. IEEE Internet Things J. 2018, 6, 4640–4649. [Google Scholar] [CrossRef]
  36. Kang, J.; Yu, R.; Huang, X.; Wu, M.; Maharjan, S.; Xie, S.; Zhang, Y. Blockchain for secure and efficient data sharing in vehicular edge computing and networks. IEEE Internet Things J. 2018, 6, 4660–4670. [Google Scholar] [CrossRef]
  37. Bartolomeu, P.C.; Vieira, E.; Ferreira, J. IOTA Feasibility and Perspectives for Enabling Vehicular Applications. In Proceedings of the 2018 IEEE Globecom Workshops (GC Wkshps), Abu Dhabi, United Arab Emirates, 9–13 December 2018; pp. 1–7. [Google Scholar]
  38. Kang, J.; Xiong, Z.; Niyato, D.; Ye, D.; Kim, D.I.; Zhao, J. Toward Secure Blockchain-Enabled Internet of Vehicles: Optimizing Consensus Management Using Reputation and Contract Theory. IEEE Trans. Veh. Technol. 2019, 68, 2906–2920. [Google Scholar] [CrossRef] [Green Version]
  39. Azad, M.A.; Bag, S.; Hao, F.; Salah, K. M2m-rep: Reputation system for machines in the internet of things. Comput. Secur. 2018, 79, 1–16. [Google Scholar] [CrossRef] [Green Version]
  40. Kaaniche, N.; Laurent, M. A blockchain-based data usage auditing architecture with enhanced privacy and availability. In Proceedings of the 2017 IEEE 16th International Symposium on Network Computing and Applications (NCA), Cambridge, MA, USA, 30 October–1 November 2017; pp. 1–5. [Google Scholar]
  41. Gao, F.; Zhu, L.; Shen, M.; Sharif, K.; Wan, Z.; Ren, K. A blockchain-based privacy-preserving payment mechanism for vehicle-to-grid networks. IEEE Netw. 2018, 32, 184–192. [Google Scholar] [CrossRef]
  42. Gibbs, M.N.; MacKay, D.J. Variational Gaussian process classifiers. IEEE Trans. Neural Netw. 2000, 11, 1458–1464. [Google Scholar] [PubMed] [Green Version]
  43. Bejan, A.; Lorente, S. Constructal law of design and evolution: Physics, biology, technology, and society. J. Appl. Phys. 2013, 113, 6. [Google Scholar] [CrossRef] [Green Version]
  44. Sartakhti, J.S.; Manshaei, M.H.; Basanta, D.; Sadeghi, M. Evolutionary emergence of angiogenesis in avascular tumors using a spatial public goods game. PLoS ONE 2017, 12, e0175063. [Google Scholar] [CrossRef] [PubMed]
  45. Luu, L.; Narayanan, V.; Zheng, C.; Baweja, K.; Gilbert, S.; Saxena, P. A secure sharding protocol for open blockchains. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, 24–28 October 2016; pp. 17–30. [Google Scholar]
  46. Castro, M.; Liskov, B. Practical Byzantine fault tolerance. In Proceedings of the Third Symposium on Operating Systems Design and Implementation, New Orleans, LA, USA, 1 February 1999; Volume 99, pp. 173–186. [Google Scholar]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.