ArticlePDF Available

Futuristic Blockchain Based Scalable and Cost-Effective 5G Vehicular Network Architecture


Abstract and Figures

In the present era, smart and efficient vehicular network architectures are necessary due to fast technological advancements in vehicles. Many problems arise in these complex networks, which can be handled using blockchain and the Internet of Things (IoT). We proposed a comprehensive blockchain based 5G vehicular network architecture , which is cost-effective, scalable, secure, and handles various vehicular network issues in a smart city. The proposed architecture consists of all essential components like reputation system, incentive mechanism, and priority based techniques to handle different limitations in the literature. Simulations results for different scenarios depict the high execution cost of a single controller node, minor node, and ordinary node as 106305, 85864, and 65491 gas values and transaction cost as 130521, 109824, and 89195 gas values. The results depict the effectiveness of the proposed architecture in terms of scalability, time and cost-effectiveness.
Content may be subject to copyright.
Futuristic Blockchain Based Scalable and Cost-Effective 5G
Vehicular Network Architecture
Usama Arshad
COMSATS University Islamabad
Islamabad, Pakistan
Munam Ali Shah
COMSATS University Islamabad
Islamabad, Pakistan
Nadeem Javaid
COMSATS University Islamabad
Islamabad, Pakistan
In the present era, smart and efficient vehicular network architectures
are necessary due to fast technological advancements in vehicles.
Many problems arise in these complex networks, which can be han-
dled using blockchain and the Internet of Things (IoT). We proposed
a comprehensive blockchain based 5G vehicular network architec-
ture, which is cost-effective, scalable, secure, and handles various
vehicular network issues in a smart city. The proposed architecture
consists of all essential components like reputation system, incentive
mechanism, and priority based techniques to handle different limi-
tations in the literature. Simulations results for different scenarios
depict the high execution cost of a single controller node, minor
node, and ordinary node as 106305, 85864, and 65491 gas values
and transaction cost as 130521, 109824, and 89195 gas values. The
results depict the effectiveness of the proposed architecture in terms
of scalability, time and cost-effectiveness.
Blockchain, IoT, Vehicular Network, EVs, 5G, Scalability, Net-
works, Malicious nodes, ITS, Vehicular Network Architecture.
PVLDB Reference Format:
Usama Arshad, Munam Ali Shah, and Nadeem Javaid. Futuristic Blockchain
Based Scalable and Cost-Effective 5G Vehicular Network Architecture.
PVLDB, 14(1): XXX-XXX, 2020.
In the present era, most of the population lives in urban areas to lead
an easy life away from rural life’s hardships. The technology in the
present era is making lives easier, and with each passing day, we
witness a new change in our cities and daily lives [
]. People are
moving towards cities, especially smart cities. As these cities offer
high quality of life, so in the future, all cities in the world will be
made smart. As the population is growing rapidly, we need such
smart cities that are sustainable on their own. Smart cities provide a
sense of security and ease; however, many problems also arise in a
smart city like handling a huge population and their data, privacy,
security, scalability, and adaptability. Smart cities are a collection of
different smart networks working with each other or separately in
the city. These networks provide daily services to fulfill the needs
of the population. From smart grids for low energy consumption to
14, No. 1 ISSN 2150-8097.
secure vehicular networks, technology is progressing rapidly, and the
world is changing faster than we can imagine. This change is only
possible thanks to the advancements in technologies like Artificial
Intelligence (AI) and blockchain. Many other fields that help revo-
lutionize the world are also changing at a great pace [
]. As these
fields grow and change, many discoveries and inventions happen
that make our lives easier and faster. To overcome the problems in
smart cities and smart networks, various models are proposed by
researchers. Traditional vehicular networks are unable to provide
security and are certainly unable to handle smart vehicles. We need
smart networks to handle smart devices. In smart vehicular networks,
technologies like the Global Positioning System (GPS) are used.
These technologies help to locate vehicles.
However, now with electric vehicles, different kinds of onboard
resources like sensors, storage devices, radars, cameras, Event Data
Recorders (EDR) etc., are used to perform different actions [
]. All
of these devices collect big data to perform their actions, and they
have to share limited data in the network to increase the throughput
and work effectively [
]. Using all these resources, devices and net-
works become aware of the environment and conditions. This helps
in increasing their overall effectiveness and performance [
]. In the
present era, the human population is highly dependent upon smart
devices. As smart devices make our lives easier, many problems
arise due to these smart devices. The main issues that arise from
these smart devices include lack of security, and privacy [
], [
Data is considered expensive in this era, and people want to protect
it because data in the wrong hands can be dangerous. In smart net-
works, different nodes work together and share data. However, as all
network nodes are strangers to each other, it creates an environment
with a lack of trust. Different vehicles share valuable data in the
vehicular network like traffic conditions in an area.
Moreover, these vehicular networks have limited devices to store
and share data. It is impossible to store this data on these small
devices. This problem is solved by using Road Side Units (RSU)
]. These RSUs save all the data collected by vehicles and pro-
vide limited amount of data when required. Sharing resources with
other nodes in a network is also a problem. Due to this, some nodes
may act selfishly in the network. Trust management can be done
by sharing required resources as needed. Different techniques are
proposed for this purpose [
]. Apart from simple trust management,
many incentive mechanisms are proposed based on data sharing and
storage management [
]. Other incentive mechanisms are proposed
based on data stored by nodes to promote data storage in nodes.
Incentive mechanisms are used to decrease or eliminate the selfish-
ness of nodes in the networks. Nodes need to communicate faster
in a network to work effectively. In [
], [
], the authors proposed
techniques for providing safe computing services to the lightweight
clients on the blockchain. The models provide a partially connected
and fully connected blockchain concepts. Privacy, security, and a
trustless environment are achieved using blockchain. Robustness
and flexibility are also needed in networks as nodes may be far
away from each other. This leads to nodes’ failure, and to avoid
these failures, many new techniques are proposed using trust factors.
The trust factor is an amazing concept to solve many problems in
the network. Each node is rated positive or negative after every ac-
tion in the network. Apart from different blockchain based models,
multi-blockchain models are also proposed over time. In [
], the
authors proposed a blockchain based model with two blockchains.
One blockchain is used to detect fraud users and the other is used
to check integrity. Convolutional Neural Networks (CNN) are also
used to authenticate nodes. However, this kind of model is limited
in terms of scalability and with increasing size, these models do
not remain cost-effective. This reputation system helps to eradicate
the selfishness of nodes and improve the overall performance of
the network. Hence, many issues can be solved by using different
techniques and methods.
1.1 Blockchain
Blockchain is the best technology for the present age. It is a decen-
tralized and distributed ledger. Due to this distributed approach, it
is also called a distributed ledger technology. Blockchain is an old
concept, but it became popular in 2008 when Bitcoin came in front
of people and revolutionized the concept of currency worldwide. It is
a distributed and decentralized currency, which had no single owner
like other currencies. With time, people realized that blockchain
technology could be used for many different applications. In simple
words, we can take blockchain as a google doc that is shared with
a group of people. This document is not copied by all the people
but only shared by all at the same time. The next big thing that
blockchain has is cryptographic hashing. After the blockchain came
to the surface in 2008, many new technologies like holochain also
emerged following the same concepts. Just like any other technol-
ogy, blockchain also consists of many components. Each component
is getting updated with time. Blockchain eradicated the need for
third-party in all kinds of transactions and provided a high level of
security and privacy that was not possible before.
Figure 1: Blockchain Structure
The three main components of blockchain are block, miners, and
nodes. The transaction data is stored in blockchain. The number of
blocks in blockchain is not fixed, and each block consists of three
main things, nonce, data, and hash. A nonce is a whole number
that is changed every time data is changed. Hash is joined with this
nonce, which helps to secure blockchain. Whenever a new block
is added, it is done by the process of mining. Mining is the pro-
cess in which miners solve a complex mathematical problem to
find the nonce, and this nonce provides a hash, which is accepted.
This process needs high computational power, making it difficult for
hackers to hack the blockchain. The first block in any blockchain
is called genesis block, and as the number of nodes increases in a
blockchain, it becomes more and more secure due to its distributed
nature. Nodes in blockchain join to form a network, and for every
update in blockchain, the majority of nodes approve the actions.
This process is called the consensus mechanism, and with time,
researchers have proposed many new consensus mechanisms for
different techniques and uses of blockchain technology. Some of
the most used consensus mechanisms include Proof of Work (PoW),
Proof of Authority (PoA), and Proof of Concept (PoC). Smart con-
tracts and tokens are used with blockchain technology to achieve
transactions without any kind of involvement of third parties.
1.2 Blockchain based Vehicular Network
Blockchain based networks are the new future due to the distributed
approach of blockchain technology. Intelligent Traffic System (ITS)
is becoming better with the use of the latest technologies. These
networks have to handle the latest auto-driving vehicles, which
are smart and consist of the latest technologies. Blockchain based
vehicular network architectures are the best to handle these smart
vehicles. Much research is done on vehicular networks and different
components of blockchain based networks.
Blockchain based vehicular network architecture consists of dif-
ferent components, and each of these components solves a particular
problem in such networks. With these technologically advanced ve-
hicles, we need smart networks to handle big data and smart tasks
like fast information sharing. Many problems arise in these complex
networks, like scalability, cost-effectiveness, adaptability, nodes’
selfishness, malicious nodes, security, and privacy, which can be
handled using blockchain and the Internet of Things (IoT).
Figure 2: Main Components of Vehicular Network Architecture
Many vehicular network architectures are proposed in the lit-
erature, and each component of this architecture is also proposed
separately to handle a particular problem. The main components of
vehicular network architecture are given below:
Incentive Mechanism
Reputation System
Base Technology
Encryption Techniques
Structure of Nodes
Each component is necessary to perform a particular task and the
number of components can increase or decrease according to the
1.3 Scalability vs Cost
With technological advancements, infrastructure is getting more
costly, thus, increasing the deployment and execution cost. More-
over, scalability is not achievable without sacrificing execution cost,
according to the literature review. Scalability is achieved with the de-
ployment of costly infrastructure. Scalability and cost-effectiveness
are inversely proportional in vehicular network architectures pro-
posed in the literature. Figure 3 clearly depicts the relation between
scalability and cost-effectiveness.
Figure 3: Scalability Vs Cost
1.4 5G and deployment issues
5G is the latest technology, and like all technological advancements,
5G infrastructure is costly. Moreover, 5G technology has a high
frequency of waves that can not be penetrated through walls easily
and needs a lot more infrastructure than 4G. 5G deployment itself
faces many issues, and much work is done to handle all its issues
separately. Some main deployment issues are shown in Figure 4.
Figure 4: 5G Deployment Issues
1.5 Background of 5G issues
As electric vehicles replace normal vehicles in a smart city, we also
need advanced smart networks to handle these smart vehicles. Many
technological advancements like blockchain, the Internet of Things
(IoT) and latest communication technologies like 5G play an impor-
tant role in providing solutions to the modern problems. The authors
in [
] described the different present and future trends for the 5G
network. The authors described in detail the costly infrastructure
of 5G and the deployment trends around the world. The conducted
survey clearly depicts that most of the developed world will deploy
5G by 2022. However, an underdeveloped world like Asia may take
up to 2025 to deploy 5G. The main goal of the 5G technology is to
Table 1: List of Abbreviations
Abbreviation Explanation
ADVs Auto Driving Vehicles
AI Artificial Intelligence
CNN Convolutional Neural Network
EDR Event Data Recorders
EVs Electric Vehicles
GPS Global Positioning System
IoT Internet of Things
ITS Intelligent Traffic System
LoS Line-of-Sight
MIMO Multi-Input Multi-Output
NLoS Non-Line-of-Sight
PoA Proof of Authority
PoE Proof of Event
PoW Proof of Work
RSU Road Side Unit
VNA Vehicular Network Authority
PoC Proof of Concept
VANET Vehicular Ad-hoc Network
MANET Mobile Ad-hoc Network
ISP Internet Service Provider
C-CHAIN Controller Blockchain
O-Chain Ordinary Blockchain
R-Chain Repairing Blockchain
Med-Chain Medical Blockchain
AES Advanced Encryption Standard
DES Data Encryption Standard
achieve high data rates of 100 Mbps to 1 Gbps for everyone around
the world anytime, anywhere. However, the deployment of such tech-
nology is not easy. To achieve these data rates, different technologies
like small cell networks [
], Massive Multi-Input Multi-Output
(MIMO) [
], and millimeter wave [
] are used. When we look
at an example of 5G deployments, like Samsung’s prototype model
], we can see that their prototype is providing a data rate up to 1
Gbps. However, this model is also facing the issue of distance. The
model is operating at a frequency of 27.925 GHz at a distance of
1.7 kilometers. However, this 1.7 kilometers connectivity is only in
the Line-of-Sight (LoS) transmission. When it comes to Non-Line-
of-Sight (NLoS) transmissions, it only operates over the range of
200m. 5G network started with the technology of millimeter wave.
However, as 5G has high frequency and short wavelengths when
transmitted over milliliter wave technology, link distance is reduced.
After the millimeter wave, the trend of small cells started [
]. Small
cells provide the availability of networks in short ranges, with the ca-
pability to switch between different small cells. In different proposed
models, small cells are used with already available infrastructures to
provide cost-effective 5G infrastructure. Apart from cost-effective
infrastructure, much work is being done to improve connectivity
and coverage of the 5G network. The authors in [
] described the
thorough analysis of coverage for 5G networks based on small cell
networks. A multi-directional path loss model is proposed to handle
the coverage of 5G small cell networks.
Table 2: Proposed Solutions in Literature.
Proposed Model Experimentation Problem Addressed Contribution Limitation
Proposed model to pro-
vide safe security ser-
vices on blockchain. [
Etherium environment is
Malicious services pro-
vided by edge servers to
Privacy, security, and a
trustless environment
are achieved using
Latency in large net-
Proposed blockchain
based user access strate-
gies for D2D networks.
A CNN is used for the
prediction of fake users.
Detection of fraud users.
User access based on
consensus mechanism
is proposed using
It is limited in terms of
A detailed survey on
5G deployment is carried
out and future trends are
discussed. [14]
Data is collected from
46 different chief tech-
nology officers.
The hype about the 5G
network. No graphical
representation depicts
different scenarios.
Collected all data from
around the globe to show
the trends and develop-
ment of 5G networks.
The survey is limited in
terms of data collected as
it is collected from only
46 chief technology offi-
cers. New proposed tech-
niques can change the
shown trends.
A multi-directional path
loss model is proposed
to handle the coverage of
5G small cell networks.
Simulations show the im-
provement of path loss
and coverage issues.
Short distance coverage
and handoff issue of 5G
small cell networks.
Solved the issue of path
loss in 5G small cell net-
works. Handled issues of
coverage and handoff.
Path loss is handled
while network coverage
still has a short distance.
Proposed techniques for
cost optimization, cover-
age, and handoff analy-
sis. [16]
Different scenarios are
represented with stats
and calculations. The hy-
pothesis is used to pro-
duce results.
Coverage, handoff, cost
optimization in heteroge-
neous 5G networks.
Different technologies
joined together in 5G
heterogeneous networks
to provide coverage and
performance to handoff.
LoS and NLoS scenarios
are also discussed.
A different hypothesis is
used to produce results.
Results may not be the
same in actual scenarios.
Proposed and reviewed
techniques to handle is-
sues related to interfer-
ence management in 5G
networks. [17]
Visual representation of
different scenarios and
review of the research
Interference manage-
ment in 5G networks.
Proposed coordinated
scheduling, multi-
point scheduling, and
inter-cell interference
coordination to handle
the issues related to in-
terference management.
Solutions may be limited
in terms of scalability.
The proposed technique
of using the present in-
frastructure for 5G net-
works. [24]
Different simulations
represent the scenarios
of 5G networks.
Costly 5G infrastructure.
The proposed technique
of using light poles as 5G
infrastructure to reduce
the cost of infrastructure
Investments may not be
available for proposed
Proposed blockchain
based trust mechanism
to detect malicious
nodes in the network.
Windows 10 operating
system with a specifica-
tion of Core i7 and 16
GB ram is used. Python
is used for implementa-
Detection of malicious
nodes in the vehicular
blockchain technol-
ogy in intelligent
vehicles. Branch-based
blockchain for vehicular
A decentralized ap-
proach may not be
feasible for a trust
Proposed blockchain
based Healthcare system,
which handles storage of
patients’ data. [34]
The model can be imple-
mented in a Remix or
Ethereum environment.
Patient driven interop-
erability and institution-
based interoperability.
Institution-based and
patient-based interoper-
ability is discussed.
Privacy leakage through
unique ids.
Blockchain based net-
work coded distributed
storage technology is
proposed with less com-
plexity. [42]
The model is analyzed
based on storage, consen-
sus speed, etc.
Low storage and high
complexity problems in
the blockchain.
Provided blockchain
based method to store
more data on nodes with
less complexity.
The model can be easily
compromised as data is
stored in fewer nodes.
The authors in [
] discussed the 5G heterogeneous networks.
The cost optimization, coverage, and handoff analysis are discussed
in detail. Different technologies are joined together in 5G hetero-
geneous networks to provide coverage and performance to handoff.
LoS and NLoS scenarios are also discussed in detail. Many other
issues like inter-cell and intra-cell interference occur in small cell
5G networks. The authors in [
] proposed different enabling tech-
niques that include coordinated scheduling, multipoint scheduling,
and inter-cell interference coordination to handle the issues related to
interference management in 5G deployment of small cell networks.
The authors in [
] chronologically described different interference
issues in 5G networks and how they are solved using different tech-
niques. The authors in [
] also proposed a technique to use the
already available infrastructure instead of deploying a new costly
infrastructure. The authors proposed the technique of using light
poles to cover more areas in densely populated areas. However, this
technique also needs investments to cover the deployment costs.
So far, the main issues incurred in the existing research include the
high-cost infrastructures, short-range connectivity, interferences, and
Figure 5: Old Proposed Blockchain based Vehicular Network
The main contribution of this research work is to achieve a high
level of scalability in a blockchain based vehicular network archi-
tecture without sacrificing cost-effectiveness. This comprehensively
proposed vehicular network architecture contributes to the literature
that will act as a generic base research work for future in-depth
research on all of its different components. The proposed model
achieves better access management of nodes with priority based
access management techniques to save the extra cost. The proposed
model contributes to saving the vehicular network from unneces-
sary complexities, which consume more power, storage and increase
the total execution cost. Different components are joined together
to handle some of the known issues in blockchain based vehicular
network architectures like selfishness of nodes, security, privacy
and failure of nodes in one complete structure keeping in mind the
cost-effectiveness and adaptability with future technologies.
The blockchain and IoT industry are developing rapidly and making
our lives easier. Computer servers are used widely to store data and
provide services as needed [
]. These services may be malicious
and can cause damage to devices or the network. Authentication
of services is also a problem faced in networks. Different kinds of
consensus mechanisms are used in blockchain based networks to
work efficiently. Many mechanisms are already provided to handle
smart devices in networks. However, most of such mechanisms need
high computational power and heavy resources. IoT devices are
becoming normal, and it is important to create efficient mechanisms
to handle such devices. The main goal is to effectively handle devices
with less computational power and low resources without reducing
network efficiency. A consortium blockchain is normally used with
IoT devices, and the Proof of Authority (PoA) consensus mechanism
is used for the effective working of networks. Edge service providers
provide services, which may not be secure for the users. To handle
this issue, Blockchain based models are used [26].
Similarly, consensus mechanisms like PoA are used with different
types of blockchain. Apart from this, the new concept of off-chain
is proposed in which services can be authenticated and identified
easily. Huge networks also face latency. Blockchain based networks
solve many such issues related to privacy, security, and identification.
Many reputation systems are also proposed to handle nodes in the
network. Moreover, blockchain based models also work effectively
with IoT devices because of their peer-to-peer connection. Two
devices in a network, directly connect with each other without any
involvement of a third party. Another problem in traditional networks
is access control of devices. Many proposed models handle access
control in the network using different algorithms [27].
When we look at traditional models, they always have a third party
between two entities. Blockchain based models remove most of these
traditional problems. In blockchain models, all devices share data
in a trust-less environment. Peer-to-peer connection in these models
ensures direct communication. Hence, models are most secured
and privacy based. The authors in [
] proposed a model on the
blockchain which provides an incentive mechanism to nodes on the
basis of data stored by them. Location and privacy leakage of users
is a big problem, and users are reluctant to share information. The
authors in [
] proposed a technique of blockchain based incentive
mechanism. The authors in [
] proposed rating system and the
concept of trust points to handle the malicious behavior of nodes.
ITS uses ad-hoc networks to communicate in a vehicular network,
Table 3: The motivation of proposed research.
Proposed Model Experimentation Problem Addressed Contribution Limitation
Blockchain based trust
management system is
proposed. [40]
Python and Go-language
Privacy preserving was
not achieved in vehicular
Trust management is
achieved without expos-
ing vehicles to other
Complex model limited
in terms of speed and
Proposed that use of al-
ready present Infrastruc-
ture can help to save in-
frastructure development
cost. [41]
Different data from dif-
ferent scenarios are plot-
ted on a graph to show
the difference between
old models and the pro-
posed model.
High cost of infras-
tructure for future and
present technologies like
Complete research work
to decrease the 5G in-
frastructure cost using al-
ready present infrastruc-
Limited scenarios are
discussed with con-
trolled variables. Our
work is motivated by the
proposed work.
Proposed blockchain
based distributed
vehicular network archi-
tecture and performance
analysis. [44]
MATLAB tool is used
for simulations.
Security, scalability, big
data storage, privacy.
Proposed blockchain
based vehicular network
architecture with five
Network traffic scenarios
between vehicles is not
covered, and the reliabil-
ity of channels in any cel-
lular network can also
create issues.
Blockchain based vehic-
ular network architecture
and trust management
system is proposed. [45]
Ethereum and Remix
are used to represent
node activities and per-
No general vehicular net-
work architecture, which
can handle most of the
known issues.
Complete vehicular net-
work architecture and so-
lution to its possible lim-
Execution time and cost
increases with increasing
Blockchain based trust
management system is
proposed. [47]
Simulations are done on
No proper blockchain
based decentralized trust
management was pro-
Trust management sys-
tem, which is decentral-
ized using blockchain.
No broad scope of work
and system is limited in
terms of scalability.
Table 4: Comparison with Other Models.
Ref No. Blockchain
Privacy Security Scalability Adaptability Cost-
[45] ✓✓✓
[47] ✓ ✓ ✓
[40] ✓✓✓
[41] ✓✓✓
Our Proposed
which are not secure for data transmission. The protocols used in ITS
are mostly not up to date, and work is being done to provide better
security mechanisms. The authors in [
] proposed a consensus
mechanism based on Proof of Event (PoE) rather than PoW or PoA
concepts to handle the sharing of traffic data and its authenticity.
The authors in [
] proposed IoT e-business model. The traditional
model and the IoT e-business model are discussed and compared in
detail. Smart property [
] and paid data are used as commodities in
the proposed model. Moreover, it is explained how different nodes
are interacting in the network. Table 2, clearly describes different
proposed techniques and models for blockchain based networks,
especially blockchain based vehicular networks. It also describes
different deployment issues of 5G and work done by different authors
with possible limitations. Our proposed model handles limitations in
old models.
The authors in [
] proposed a blockchain based Healthcare sys-
tem, which handles data storage of patients’ data. Patient-driven
interoperability and institution-based interoperability is an issue for
a long time. Institution-based and patient-based interoperability is
discussed in detail with possible solutions. Privacy leakage through
unique ids can be a problem for patients [35].
Much work is done by researchers on privacy-preserving and
priority-based techniques. The use of vehicular ad-hoc networks
has brought a revolution to achieve traffic safety. The authors in
] proposed an authentication scheme that is weight-based. They
used weights to control the malicious vehicles in the network and
gave priority to the vehicles on the basis of the weight assigned
to them. To secure the communication between the vehicles, they
used a conditional privacy-preserving scheme. Their proposed model
decreases the total costs using the SDN and priority approach. In
] authors discussed different challenges related to privacy and
security in 5G enabled vehicular networks. The research mainly
focused on the infrastructure and case study to ensure the privacy
and security challenges. A 5G enabled infrastructure is proposed
for vehicular networks. However, this model lacks a solution to
some of the known issues like scalability and adaptability. Finding
charging stations and security connecting with others is a challenge
with electric vehicles, and many infrastructures are proposed in the
literature to ensure security and privacy for electric vehicles. The
authors in [
] proposed a secure framework for electric vehicles,
which is privacy-preserving. Cryptography is used to ensure security
and privacy. The model performs well in terms of communication
costs and satisfaction ratio. The performance of the model is also
compared with recently published research. The authors in [
discussed in detail about the security, privacy, and trust management
in blockchain based solutions. They have surveyed different recently
published researches to review and classify different issues and
solutions proposed.
The authors in [
] proposed detailed scenarios and discussed
5G network and infrastructure scenarios in detail. They proposed
that instead of developing the new 5G infrastructure, we should use
already developed infrastructures. Due to high infrastructure costs,
different models are proposed to use the existing infrastructure for
5G instead of creating new infrastructures from scratch. The authors
in [
] proposed techniques to handle issues like low storage and
high complexity. The high complexity problem of data storage in the
blockchain is addressed. Provided blockchain based method to store
more data on nodes with less complexity. However, the model can
be easily compromised, as data is stored in fewer nodes. The authors
in [
] show how data can be secured on fog or cloud computing
with the proposed framework and how it can be saved from different
attacks. The authors in [
] proposed blockchain based distributed
vehicular network architecture and performance analysis. Problems
like security, scalability, big data storage, and privacy in a vehicular
network are discussed in detail. Management of big data in vehicular
networks while providing privacy, adaptability, and security is also
discussed. However, traffic between vehicles is not covered, and the
non-reliability of channels in any cellular network also create issues.
In our recent work [
], we proposed a blockchain based vehic-
ular network architecture that was scalable, robust, and adaptable
by using vehicular network architecture similar to proposed in [
with a rating system similar to proposed in [
] to handle malicious
nodes. However, after achieving scalability, vehicular network archi-
tecture lost its cost-effectiveness and executive effectiveness. Figure
5 clearly describes our recent blockchain based vehicular network
architecture. The goal is to achieve a high level of scalability without
sacrificing execution efficiency and cost-effectiveness. Moreover,
after the inclusion of 5G, many features may change in vehicular net-
works [
]. However, our proposed system will work perfectly in a
5G based environment. Due to the high frequency of the 5G network
and shorter range, we need more infrastructure to build, which in-
creases the total cost of vehicular networks. Our model provides the
best solution in this case for scalability and performance. We solved
the limitations of our recent work with the new proposed model and
the system’s modifications. Simulations and results clearly describe
the effectiveness of modified vehicular network architecture. Pas-
senger’s health care is also explained in detail and how passengers’
safety and health can be insured in a smart city. Node failure and
malicious nodes are handled more effectively with the proposed
incentive mechanism. Table 3 describes different blockchain based
proposed models with possible limitations.
Blockchain based vehicular network architectures have been pro-
posed in [
], [
], which provide scalability, robustness and can
handle malicious nodes. However, using blockchain in this type of
network scenario imposes a high computational cost and is time-
consuming. Moreover, due to the costly infrastructure of the latest
technologies like 5G [
], and deployment issues [
], [
], a cost-
effective and scalable vehicular network architecture is needed. The
decentralized mechanism used for achieving privacy and security
adds to the computational cost. Thus, making the systems less ef-
ficient [
]. There is a need to improve the existing architectures
in terms of high computational cost and low efficiency. Table 4 de-
picts the availability of technology and features in different existing
proposed approaches and our proposed approach.
We proposed a scalable blockchain based 5G vehicular network
architecture in a smart city and a solution to possible limitations in
blockchain based networks in a smart city necessary for the vehicular
network to work effectively. The main limitations handled by our
proposed model include privacy, security and scalability without
sacrificing efficiency, cost, node failure, health emergencies, and
selfishness of nodes. Our proposed vehicular network architecture
consists of three kinds of nodes and one Vehicular Network Authority
(VNA). The kinds of nodes are as follows:
Ordinary nodes
Controller nodes
Minor nodes
Ordinary nodes
.Ordinary nodes are vehicles with less computa-
tional and execution power. These nodes request data and services
from controller nodes. Due to less storage these nodes cannot store
big data. Hence, they request only a limited amount of necessary
data from the controller nodes.
Controller nodes
.Controller nodes are fixed nodes and are known
as Road Side Units (RSUs). These nodes have high computational
and execution power. Controller nodes store huge amount of data on
them and provide services to other nodes.
Minor nodes
.Minor nodes are vehicles with good computational
and execution power. They act as a bridge between controller nodes
and ordinary nodes if nodes are far away from each other. Nodes
are registered as minor nodes in the network based on their storage,
execution, and computational power.
Vehicular Network Authority (VNA)
.A vehicular network au-
thority also exists in the proposed model. The authority registers all
nodes and handles any failure that occurs in the network. On registra-
tion, vehicles are granted the status of minor node or ordinary node
depending on their computational and execution resources. VNA
can add or remove any node from the vehicular network based on
its reputation in the network. VNA acts as a controller of the whole
vehicular network. VNA also handles the incentive provisioning
mechanism based on the node’s reputation. VNA has full control
over the network and can make changes as needed in the network.
In case of emergency or node failure, VNA contacts the respective
services or en-route the vehicle to the closest services available. It is
assumed that the VNA can never be compromised. Figure 6 clearly
represents the flow of our proposed model.
Figure 6: Flowchart Diagram of Proposed Model.
4.1 Proposed 5G Vehicular Network Architecture
on Blockchain (5G-BLOCKVN)
We proposed a 5G vehicular network architecture based on the
blockchain, which is scalable and adaptable. Apart from 5G, this
architecture can work perfectly with any communication technol-
ogy of the future without sacrificing cost and execution effective-
ness. Three main nodes work together in the model under the su-
pervision of VNA. The vehicular network architecture consists of
two blockchains. One blockchain is for controller nodes, which is
called C-Chain. These nodes have to handle big data and without
blockchain if these nodes are destroyed or damaged somehow, the
data will be lost and the network will not work effectively.
Moreover, ordinary nodes and minor nodes cannot handle big
data. Hence we cannot use the same blockchain with them. Minor
nodes and ordinary nodes can request the services or data from
controller nodes as needed. They have a separate blockchain termed
as O-Chain to store temporary data needed at the time. O-Chain
saves the data necessary for the services at a particular time and
takes its data from C-Chain as needed. The minor nodes are the most
important nodes in the model. As 5G requires a huge infrastructure
to work effectively, which is costly. Hence, we introduced minor
nodes for scalability. Ordinary nodes request controller nodes for
the services, however, if they are out of range they will request from
minor nodes and minor nodes will act as a bridge between controller
nodes and ordinary nodes. Minor nodes can also request services
from controller nodes as needed or from other minor nodes when no
controller node is available in the range. This solves the problem of
scalability, however, more number of minor nodes requesting each
other can increase the overall cost and efficiency will be decreased
as time will be increased to handle and response all requests of the
network. To maintain efficiency, all nodes must perform their tasks
efficiently in the network, which can be achieved by using incentive
mechanism and reputation system. Figure 7 clearly describes our
proposed model.
Figure 7: Proposed 5G Vehicular Network Architecture on
Blockchain (5G-BLOCKVN)
4.2 Reputation System for 5G-BLOCKVN
In a vehicular network, all nodes communicate with each other and
it is important for all them to act properly in the network. To avoid
malicious behaviour of nodes, we proposed a reputation system for
nodes. Unlike other complex reputation systems that lack speed and
accuracy, we proposed the simplest system with either a positive
or negative rating. Minor nodes act as the bridge between all the
nodes in the network hence they can show malicious behaviour in
the network. To increase the scalability they must work best in the
network. To make sure these nodes work perfectly reputation system
is necessary.
Figure 8: Reputation System for 5G-BLOCKVN
All nodes have their own profiles which can be seen before com-
munication. Hence vehicles can request services from nodes which
have good profiles. Whenever two vehicles communicate with each
other, both rate each other either positively or negatively after com-
munication. If the rating is positive, 1 is added to the profile and
if the rating is negative, 1 is subtracted from the profile. Whenever
a profile hits 0, the vehicle is removed from the network by VNA
after checking the history of the profile. The history of the profile
is checked to make sure that the profile is hitting 0 due to rapid
negative ratings from other vehicles. In this way, the efficiency of
the whole network is increased. Figure 8 represents our proposed
reputation system.
4.3 Incentive Mechanism for 5G-BLOCKVN
Minor nodes have better storage, execution, and computational
power than ordinary nodes. Hence, they may act selfishly in the
network to save their resources. To control this selfishness of nodes,
an incentive mechanism is proposed. As we already have a reputation
system, we will use the data from the reputation system to reward or
penalize nodes instead of a complex incentive mechanism. VNA will
reward the controller nodes with good behavior on monthly or yearly
and penalize on selfish behavior, respectively. Figure 9 describes the
proposed incentive mechanism in detail.
Figure 9: Incentive Mechanism for 5G-BLOCKVN
4.4 Priority Based Technique for 5G-BLOCKVN
Scalability can be achieved achieved on the expense of cost-effectiveness.
Nodes look for the closest node in range to communicate. This means
too many minor nodes are involved in the network and each will
have an executional cost and time delay. To handle this issue, we
proposed priority based connections. Figure 10 describes the old and
new proposed approach. This priority of nodes can be shown by two
main cases:
(1) CASE 1: Priority Based Ordinary Node Communication
(2) CASE 2: Priority Based Minor Node Communication
Figure 11 clearly shows both the cases in detail.
4.4.1 Priority Based Ordinary Node Communication. In the
case of an ordinary node, it should always look for the closest con-
troller node in the network. However, if controller node is not avail-
able in the range then it must look for the most away minor node in
4.4.2 Priority Based Minor Node Communication. In the case
of minor node, it should always look for the closest controller node
in the network. However, if controller node is not available in the
range then it must look for the most away minor node in range.
Figure 10: Priority based Technique for 5G-BLOCKVN
Figure 11: Priority based Technique for 5G-BLOCKVN (Two
4.5 Privacy-Preserving and Security
Vehicles should only be identified by VNA and in case of reputation,
the vehicle’s privacy should be preserved. To tackle the problem of
privacy leakage, instead of using some complex system, we simply
used unique ids for ordinary nodes and minor nodes. This unique id
consists of two parts: the first part consists of fixed unique numbers
only known by VNA while the other part consists of randomly gener-
ated numbers. This randomly generated part changes automatically
rapidly after an interval of time. This technique changes the id of
every vehicle in the network continuously, which preserves privacy
while keeping nodes known to VNA. When it comes to security, a
high level of security can be achieved for communication using the
latest encryption techniques.
4.6 Node Failure and Passenger Healthcare
Node failure is the biggest issue in vehicular networks and this
could be dangerous for the entire vehicular network. Due to the
decentralized blockchain, no data is lost even if any node fails in
any way. The basic failure of a node may include sensor failure or
device failure. In such a case, VNA will automatically contact the
closest repairing firm and share the location and repairing history of
the vehicle with the firm. Repairing history is stored on a repairing
blockchain called R-Chain. In case of any medical emergency in the
vehicle, vehicles are automatic en-route to closest health services.
Medical blockchain, called a Med-Chain, holds the data of patients,
which can be accessed by the doctors only if patients allow them
the access. Figure 12 clearly represents node failure and passengers’
Figure 12: Node Failure and Passenger Healthcare Manage-
4.7 5G Cost-Effective Infrastructure for
Controller nodes are the main source points of the 5G network as part
of the infrastructure. Using NLoS, we can achieve the range up to
1.7km, and LoS can reach a range from 200m to 1000m. However, as
we have significantly fewer stationary controller nodes we used more
minor nodes for connections. Minor nodes in our model have high
computational and execution power. VNA makes any node minor
node based on its onboard resources. These minor nodes can act as
5G network MIFI-HotSpots until we can use technology like 5G
small cell networks and MIMO on vehicles. This approach enables
the nodes to become dynamic and mobile 5G source points, which
will increase the overall range of the 5G network. The incentive
mechanism motivates the nodes to act as a minor node. The cost
of 5G source point integration is handled 50% by VNA while the
other 50% by the minor node owner which can be adjusted with
given incentives. This approach helps to reduce the overall cost
of the infrastructure and to increase the overall range of the 5G
network. Using already present infrastructure for 5G deployment is
a promising technique to achieve cost-effectiveness in any scenario.
4.8 Proposed Algorithm
5G network has a higher frequency than 4G and traditional networks.
Hence, due to high frequency and shorter wavelength, it has a lower
range. In different scenarios, 5G may have a different range values
from 200m to 1000m. However, the reliable range value will always
be 70% of the total range.
Unlike 4G, 5G needs a lot more costly infrastructure because of its
high-frequency waves that can only travel to low ranges. As higher
frequency waves have shorter wavelengths and more bandwidth, this
means that 5G has a shorter range but it can carry much more data.
Algorithm 1: CASE 1: Priority Based Ordinary Node
Input: Service requested
Output: Service received
if 𝐶𝑜𝑛𝑡𝑟𝑜𝑙𝑙𝑒𝑟𝑁𝑜𝑑𝑒 =𝑃𝑟𝑒𝑠 𝑒𝑛𝑡 then
OrdinaryNode connects ControllerNode ;
else if 𝐶𝑜𝑛𝑡𝑟 𝑜𝑙𝑙 𝑒𝑟 𝑁 𝑜𝑑𝑒 =𝑁𝑜 𝑡𝑃 𝑟𝑒𝑠𝑒𝑛𝑡 && 𝑀 𝑖𝑛𝑜𝑟 𝑁 𝑜𝑑𝑒 =
𝑃𝑟 𝑒𝑠𝑒𝑛𝑡 then
if 𝑅𝑎𝑛𝑔𝑒 >700 then
OrdinaryNode connects MinorNode;
else if 𝑅𝑎𝑛𝑔𝑒 <700 then
Algorithm 2: CASE 2: Priority Based Minor Node Com-
Input: Service requested
Output: Service received
if 𝐶𝑜𝑛𝑡𝑟𝑜𝑙𝑙𝑒𝑟𝑁𝑜𝑑𝑒 =𝑃𝑟𝑒𝑠 𝑒𝑛𝑡 then
MinorNode connects ControllerNode;
else if 𝐶𝑜𝑛𝑡𝑟 𝑜𝑙𝑙 𝑒𝑟 𝑁 𝑜𝑑𝑒 =𝑁𝑜 𝑡𝑃 𝑟𝑒𝑠𝑒𝑛𝑡 && 𝑀 𝑖𝑛𝑜𝑟 𝑁 𝑜𝑑𝑒 =
𝑃𝑟 𝑒𝑠𝑒𝑛𝑡 then
if 𝑅𝑎𝑛𝑔𝑒 >700 then
MinorNode connects MinorNode;
else if 𝑅𝑎𝑛𝑔𝑒 <700 then
Algorithms 1 and 2 represent case 1 and case 2 for the proposed
priority based communication approach for nodes.
For example:
In the current proposed algorithms, the range value is 1000m. Hence,
we used 700m. 5G provides a signal range of average 1000m in
which the minimum range in literature is around 200m and 1.7km is
the maximum range. Los provides more coverage than NLos as 5G
waves are non-penetrable waves.
Smart contracts of the proposed system are deployed on the operat-
ing system, Windows 10 Pro. The device used for simulation and
experimentation has a core i5 processor of 7th generation, 8GB Ram,
and 4GB shared graphics. The implementation is done using solid-
ity language on tools including Remix and Ganache. Remix also
provides fake accounts for experimentation and with each account
provides 100 fake ether as balance. Ethereum platform is used which
provides public blockchain with Proof of Work (PoW) consensus
mechanism. Smart contracts are deployed and tested on the Remix to
represent different tasks of vehicular networks. Metamask is used as
a wallet. Sumo and Omnet++ are used with veins and inet modules to
simulate a demo network to check the effectiveness of the proposed
priority based approach. Python and Google Colaboratory are used
for graphical representations.
Scalability is achieved without sacrificing cost-effectiveness. Cost-
effectiveness is achieved at different phases in the proposed model,
which include reducing the cost at the deployment of nodes and
reduction of the total cost while increasing scalability. Moreover,
scalability is shown with respect to increasing cost. Cost is shown in
the form of transaction cost and execution cost. With the increasing
development of blockchain platforms and new versions of solidity
language, execution cost decreases. Transaction cost depends on
the number of variables and features used, which may vary in dif-
ferent implementation scenarios. Total time is also decreased for a
single transaction as the total number of nodes needed for a single
transaction are decreased.
Figure 13: Transaction Cost for Deployment of Nodes with re-
spect to Scalability.
6.1 Scalability and Cost-effectiveness
As scalability is increased we need more infrastructure for the net-
works. As this infrastructure is costly we are using three kinds of
nodes in our proposed architecture. Graphical representation 13 and
14 clearly describe the deployment cost in terms of execution and
transaction cost for different nodes in the blockchain network with
respect to scalability. With an increasing number of nodes, we can
see the increasing cost for deployment. For deployment, the execu-
tion cost for a single controller node is 106305, for a single minor
node, 85864, and for a single ordinary node is 65491. Transaction
cost for a single controller node is 130521, for a single minor node,
109824, and for a single ordinary node is 89195. Transaction costs
may vary with different features according to the implementation
scenario. As graphical representation 14 and 13 clearly shows that
the cost of controller nodes is much higher than minor nodes, while
Figure 14: Execution Cost for Deployment of Nodes with re-
spect to Scalability.
Figure 15: Execution Cost of Minor Nodes with respect to Scal-
the cost of minor nodes is higher than ordinary nodes. Therefore
in our proposed model we reduced the deployment of controller
nodes to a minimum and used low-cost minor nodes and ordinary
nodes. This reduction of controller nodes drastically reduces the
deployment costs.
6.2 Minor Nodes or Forwarding Nodes
Minor nodes or forwarding nodes are the main nodes after the con-
troller nodes and the total cost of each transaction depends on the
number of minor nodes involved in the transaction. As each minor
node has its own transaction and execution cost. As the scalability
increases more and more minor nodes are involved in the transaction
thus increasing the total cost. In huge networks, this will cause costly
transactions. Graphical representation 15 and 16 show the increase
of transaction and execution cost with respect to scalability. As the
Figure 16: Transaction Cost of Minor Nodes with respect to
Figure 17: Decrease in Transaction Cost with respect to Nodes.
number of nodes is increasing for a single transaction, the total cost
also increases.
6.3 Time
The number of nodes plays an important role in any transaction and
when scalability is achieved, more nodes are involved in transactions.
Hence the total time of any transaction is directly proportional to
the number of nodes used. Graphical representation 19 shows how
time is increasing for a single transaction with an increasing number
of nodes. If a single transaction takes, 1 sec for a single transaction
between two nodes, 10 nodes will take 9 sec for a single transaction.
Graphical representation 20 shows how time is decreased by
decreasing the number of nodes in each transaction.
Figure 18: Decrease in Execution Cost with respect to Nodes.
Figure 19: Time Required for Transaction with respect to
6.4 Time and Cost-effectiveness due to Priority
based Techniques
As the number of nodes in a single transaction increase, the total time
and cost also increases. Proposed priority based approach promises
less number of nodes involved in each transaction, thus decreasing
the, Time, total execution cost and transaction cost for each transac-
tion. The graphical representation shows the difference between cost
and time, before and after the use of the proposed approach. The
decrease in the number of nodes after the proposed priority based
approach is directly responsible for the decrease in overall costs and
time which is shown by graphical representations 17 and 18.
6.5 Comparison between old and new nodes
For different scenarios, number of nodes may vary however in each
case total number of nodes involved in the transaction decrease. To
Figure 20: New Time for Transaction with respect to New Num-
ber of Nodes.
get an accurate number of nodes in the simulation we repeated the
simulation and took the average number of nodes required for a
complete transaction with respect to scalability. Due to this decrease
in the total number of nodes in each transaction, the whole proposed
model becomes scalable and cost-effective at the same time.
Figure 21: Comparison of Minor Nodes after Priority based Ap-
proach with respect to Scalability.
Graphical representation 21 shows the comparison of the number
of minor nodes involved in each complete transaction before and
after the proposed priority based approach. This decrease in total
time affects the total cost and makes each transaction less costly,
unlike the old model where cost was increasing with scalability.
This provides us with a cost-effective model that can be scalable
by increasing the number of nodes. The proposed priority based
approach promises less number of nodes involved in each transaction,
thus decreasing the time, total execution cost, and transaction cost
for each transaction.
A comprehensive blockchain based vehicular network architecture is
proposed in this research work. Our proposed architecture consists
of different components, which are essential for a blockchain based
vehicular network architecture. Each component in the proposed
model is there to solve a particular problem keeping in mind the
adaptability, cost-effectiveness, and scalability. The proposed model
handles issues like scalability, high execution and transaction cost,
adaptability, robustness, security, and privacy. We included an incen-
tive mechanism in our proposed model to handle the selfishness of
nodes and a reputation system to handle the maliciousness of nodes.
Instead of using the same costly controller nodes, we used three dif-
ferent types of nodes, thus decreasing the total deployment cost, and
using priority access techniques we made sure that fewer nodes are
used for each transaction thus decreasing the total transaction time,
execution, and transaction cost. Two different blockchains, O-Chain
and C-Chain, are used to ensure privacy and security. VNA is used
to control the whole vehicular network and it is assumed that VNA
cannot be compromised in any way. Node failure and passengers’
healthcare scenarios are also discussed in detail. 5G implementation
scenario is also discussed for blockchain based vehicular network
architecture with a robust and cost-effective approach.
Graphical representations clearly describe the increasing deploy-
ment cost, execution cost, transaction cost, and time with an increas-
ing number of nodes and the deployment cost differences between
different types of nodes. Simulations results clearly depict the effec-
tiveness of the proposed architecture in terms of scalability, time,
and cost-effectiveness. We concluded that the proposed architecture
effectively handles different issues of blockchain based vehicular net-
works. With the execution cost of a single controller node as 106305,
minor node as 85864, ordinary node as 65491, and transaction cost of
a single controller node as 130521, minor node as 109824, ordinary
node 89195 gas values respectively the total execution and transac-
tion cost is decreased making the model cost-effective. Due to the
distributed nature of blockchain technology, VNA handles the incen-
tive mechanism and various tasks, thus, ensuring cost-effectiveness.
Use of existing infrastructure, a priority based approach and decrease
in all kinds of costs at each level of the proposed model a high level
of cost-effectiveness is ensured.
In the future, we will handle the 5G deployment issues in a vehicular
network architecture related to handoff, interference, and coverage
in detail. It is assumed that VNA can not be compromised hence
we will discuss different scenarios related to VNA in detail. The
use of already present infrastructures in vehicular network architec-
tures promises a cost-effective solution both for 5G technology and
vehicular network architectures in a smart city.
The authors wish to thank the anonymous reviewers for their valuable
H. Kumar, M. K. Singh, M. P. Gupta, and J. Madaan, “Moving towards smart cities:
Solutions that lead to the Smart City Transformation Framework,Technol. Forecast.
Soc. Change, vol. 153, p. 119281, Apr. 2020, doi: 10.1016/j.techfore.2018.04.024.
K. Salah, M. H. U. Rehman, N. Nizamuddin, and A. Al-Fuqaha, “Blockchain for
AI: Review and open research challenges,IEEE Access, vol. 7, pp. 10127–10149,
2019, doi: 10.1109/ACCESS.2018.2890507.
B. Fleming, “Smarter and safer vehicles [Automotive Electronics],IEEE Vehicular
Technology Magazine, vol. 7, no. 2. pp. 4–9, 2012, doi: 10.1109/MVT.2012.2190223.
H. Mousannif, I. Khalil, and S. Olariu, “Cooperation as a Service in VANET:
Implementation and Simulation Results,” Mob. Inf. Syst., vol. 8, no. 2, pp. 153–172,
2012, doi: 10.1155/2012/853853.
K. Zhang, J. Ni, K. Yang, X. Liang, J. Ren, and X. S. Shen, “Security and Privacy
in Smart City Applications: Challenges and Solutions,” IEEE Commun. Mag., vol. 55,
no. 1, pp. 122–129, Jan. 2017, doi: 10.1109/MCOM.2017.1600267CM.
H. Khelifi, S. Luo, B. Nour, H. Moungla, and S. Hassan Ahmed, “Reputation-
Based Blockchain for Secure NDN Caching in Vehicular Networks,” Dec. 2018, doi:
H. Khelifi, S. Luo, B. Nour, H. Moungla, S. H. Ahmed, and M. Guizani, “A
blockchain-based architecture for secure vehicular Named Data Networks,” Comput.
Electr. Eng., vol. 86, p. 106715, Sep. 2020, doi: 10.1016/j.compeleceng.2020.106715.
T. Roosta, M. Meingast, and S. Sastry, “Distributed reputation system for tracking
applications in sensor networks,” 2006, doi: 10.1109/MOBIQW.2006.361781.
X. Huang, R. Yu, J. Kang, and Y. Zhang, “Distributed reputation management for
secure and efficient vehicular edge computing and networks,IEEE Access, vol. 5, pp.
25408–25420, Nov. 2017, doi: 10.1109/ACCESS.2017.2769878.
M. Singh and S. Kim, “Intelligent Vehicle-Trust Point: Reward based Intelli-
gent Vehicle Communication using Blockchain,” Jul. 2017, Accessed: Oct. 18, 2020.
[Online]. Available:
Y. Xu, G. Wang, J. Yang, J. Ren, Y. Zhang, and C. Zhang, “Towards Secure Net-
work Computing Services for Lightweight Clients Using Blockchain,” Wirel. Commun.
Mob. Comput., vol. 2018, 2018, doi: 10.1155/2018/2051693.
K. Kaur, S. Garg, G. Kaddoum, F. Gagnon, and S. H. Ahmed, “Blockchain-based
lightweight authentication mechanism for vehicular fog infrastructure,” May 2019,
doi: 10.1109/ICCW.2019.8757184.
D. Lin and Y. Tang, “Blockchain consensus based user access strategies in D2D
networks for data-intensive applications,” IEEE Access, vol. 6, pp. 72683–72690,
2018, doi: 10.1109/ACCESS.2018.2881953.
F. Grijpink, T. Härlin, H. Lung, and A. Ménard, “Cutting through the 5G hype: Sur-
vey shows telcos’ nuanced views,” 2019. Accessed: Oct. 18, 2020. [Online]. Available: /media/McKinsey/Industries/Telecommunications/Our
Insights/Cutting through the 5G hype Survey shows telcos nuanced views/Cutting
through the 5G hype-web-final.ashx.
B. Mafakheri, T. Subramanya, L. Goratti, and R. Riggio, “Blockchain-based
Infrastructure Sharing in 5G Small Cell Networks,” in 14th International Conference
on Network and Service Management, CNSM 2018 and Workshops, 1st International
Workshop on High-Precision Networks Operations and Control, HiPNet 2018 and 1st
Workshop on Segment Routing and Service Function Chaining, SR+SFC 2018, 2018,
pp. 313–317.
I. Khan, M. Singh, and D. Singh, “Compressive sensing-based sparsity adaptive
channel estimation for 5G massive MIMO systems,Appl. Sci., vol. 8, no. 5, p. 754,
May 2018, doi: 10.3390/app8050754.
J. Zhang, X. Ge, Q. Li, M. Guizani, and Y. Zhang, “5G Millimeter-Wave Antenna
Array: Design and Challenges,” IEEE Wirel. Commun., vol. 24, no. 2, pp. 106–112,
Apr. 2017, doi: 10.1109/MWC.2016.1400374RP.
W. Roh et al., “Millimeter-wave beamforming as an enabling technology for 5G
cellular communications: Theoretical feasibility and prototype results,” IEEE Commun.
Mag., vol. 52, no. 2, pp. 106–113, 2014, doi: 10.1109/MCOM.2014.6736750.
Y. Zhong, X. Ge, H. H. Yang, T. Han, and Q. Li, “Traffic matching in 5g ultra-
dense networks,” IEEE Commun. Mag., vol. 56, no. 8, pp. 100–105, Aug. 2018, doi:
J. Chen, X. Ge, and Q. Ni, “Coverage and handoff analysis of 5g fractal small cell
networks,” IEEE Trans. Wirel. Commun., vol. 18, no. 2, pp. 1263–1276, Feb. 2019,
doi: 10.1109/TWC.2018.2890662.
M. A. Ouamri, M. E. Ote¸steanu, A. Isar, and M. Azni, “Coverage, Handoff and
cost optimization for 5G Heterogeneous Network,” Phys. Commun., vol. 39, p. 101037,
Apr. 2020, doi: 10.1016/j.phycom.2020.101037.
F. Qamar, M. H. D. N. Hindia, K. Dimyati, K. A. Noordin, and I. S. Amiri,
“Interference management issues for the future 5G network: a review,” Telecommun.
Syst. , vol. 71, no. 4, pp. 627–643, 2019, doi: 10.1007/s11235-019-00578-4.
S. S. Sarma and R. Hazra, “Interference Mitigation Methods for D2D Communi-
cation in 5G Network,” in Advances in Intelligent Systems and Computing, 2020, vol.
1040, pp. 521–530, doi: 10.1007/978-981-15-1451-7_54.
J. Benseny, J. Walia, H. Hämmäinen, and J. Salmelin, “City strategies for a
5G small cell network on light poles,” In 2019 CTTE-FITCE: Smart Cities &
Information and Communication Technology (CTTE-FITCE) doi: 10.1109/CTTE-
Y. Kryvenchuk, O. Vovk, A. Chushak-Holoborodko, V. Khavalko, and R. Danel,
“Research of servers and protocols as means of accumulation, processing and opera-
tional transmission of measured information,” in Advances in Intelligent Systems and
Computing, Sep. 2020, vol. 1080 AISC, pp. 920–934, doi: 10.1007/978-3-030-33695-
S. Tuli, R. Mahmud, S. Tuli, and R. Buyya, “FogBus: A Blockchain-based Light-
weight Framework for Edge and Fog Computing,Journal of Systems and Software,
vol. 154. Elsevier Inc., pp. 22–36, Aug. 01, 2019, doi: 10.1016/j.jss.2019.04.050.
O. Novo, “Scalable access management in IoT using blockchain: A performance
evaluation,IEEE Internet Things J., vol. 6, no. 3, pp. 4694–4701, Jun. 2019, doi:
Y. Ren, Y. Liu, S. Ji, A. K. Sangaiah, and J. Wang, “Incentive Mechanism of Data
Storage Based on Blockchain for Wireless Sensor Networks,Mob. Inf. Syst., vol.
2018, 2018, doi: 10.1155/2018/6874158.
B. Jia, T. Zhou, W. Li, Z. Liu, and J. Zhang, “A blockchain-based location privacy
protection incentive mechanism in crowd sensing networks,Sensors (Switzerland),
vol. 18, no. 11, p. 3894, Nov. 2018, doi: 10.3390/s18113894.
M. Singh and S. Kim, “Branch based blockchain technology in intel-
ligent vehicle,” Comput. Networks, vol. 145, pp. 219–231, Nov. 2018, doi:
Y. T. Yang, L. Der Chou, C. W. Tseng, F. H. Tseng, and C. C. Liu, “Blockchain-
Based Traffic Event Validation and Trust Verification for VANETs,” IEEE Access, vol.
7, pp. 30868–30877, 2019, doi: 10.1109/ACCESS.2019.2903202.
Y. Zhang and J. Wen, “The IoT electric business model: Using blockchain technol-
ogy for the internet of things,” Peer-to-Peer Netw. Appl., vol. 10, no. 4, pp. 983–994,
Jul. 2017, doi: 10.1007/s12083-016-0456-1.
Z. Zheng et al., “An overview on smart contracts: Challenges, advances and
platforms,” Futur. Gener. Comput. Syst., vol. 105, pp. 475–491, Apr. 2020, doi:
W. J. Gordon and C. Catalini, “Blockchain Technology for Healthcare: Facili-
tating the Transition to Patient-Driven Interoperability,” Computational and Struc-
tural Biotechnology Journal, vol. 16. Elsevier B.V., pp. 224–230, Jan. 01, 2018, doi:
H. Kurdi, S. Alsalamah, A. Alatawi, S. Alfaraj, L. Altoaimy, and S. H. Ahmed,
“Healthybroker: A trustworthy blockchain-based multi-cloud broker for patient-
centered ehealth services,” Electron., vol. 8, no. 6, p. 602, May 2019, doi: 10.3390/elec-
H. Zhong, Y. Geng, J. Cui, Y. Xu, and L. Liu, “A weight-based conditional privacy-
preserving authentication scheme in software-defined vehicular network,” vol. 9, p.
54, 2020, doi: 10.1186/s13677-020-00198-3.
C. Lai, R. Lu, D. Zheng, and X. S. Shen, “Security and privacy challenges in
5g-enabled vehicular networks,” IEEE Netw., vol. 34, no. 2, pp. 37–45, Mar. 2020,
doi: 10.1109/MNET.001.1900220.
G. Kumar et al., “A Privacy-Preserving Secure Framework for Electric Vehicles in
IoT Using Matching Market and Signcryption,” IEEE Trans. Veh. Technol., vol. 69,
no. 7, pp. 7707–7722, Jul. 2020, doi: 10.1109/TVT.2020.2989817.
B. Mikavica and A. Kosti´
c, “Blockchain-based solutions for secu-
rity, privacy, and trust management in vehicular networks: a survey, J. Supercomput.,
doi: 10.1007/s11227-021-03659-x.
X. Liu, H. Huang, F. Xiao, and Z. Ma, “A Blockchain-Based Trust Manage-
ment with Conditional Privacy-Preserving Announcement Scheme for VANETs,”
IEEE Internet Things J., vol. 7, no. 5, pp. 4101–4112, May 2020, doi:
M. N. Patwary, S. Junaid Nawaz, M. A. Rahman, S. K. Sharma, M. M. Rashid, and
S. J. Barnes, “The Potential Short- And Long-Term Disruptions and Transformative
Impacts of 5G and beyond Wireless Networks: Lessons Learnt from the Development
of a 5G Testbed Environment,” IEEE Access, vol. 8, pp. 11352–11379, 2020, doi:
M. Dai, S. Zhang, H. Wang, and S. Jin, “A Low Storage Room Requirement Frame-
work for Distributed Ledger in Blockchain,” IEEE Access, vol. 6, pp. 22970–22975,
Mar. 2018, doi: 10.1109/ACCESS.2018.2814624.
K. Gu, N. Wu, B. Yin, and W. Jia, “Secure Data Query Framework for Cloud and
Fog Computing,” IEEE Trans. Netw. Serv. Manag., vol. 17, no. 1, pp. 332–345, Mar.
2020, doi: 10.1109/TNSM.2019.2941869.
T. Jiang, H. Fang, and H. Wang, “Blockchain-based internet of vehicles: Dis-
tributed network architecture and performance analysis,” IEEE Internet Things J., vol.
6, no. 3, pp. 4640–4649, Jun. 2019, doi: 10.1109/JIOT.2018.2874398.
U. Arshad, S. Javaid, S. Ahmed, B. Seemab, and N. Javaid, “A Futuristic
Blockchain based Vehicular Network Architecture and Trust Management System,” In
2019 International Conference on Advances in the Emerging Computing Technologies
(AECT) pp. 1–6, doi: 10.1109/aect47998.2020.9194160.
P. K. Sharma, S. Y. Moon, and J. H. Park, “Block-VN: A distributed blockchain
based vehicular network architecture in smart city,J. Inf. Process. Syst., vol. 13, no.
1, pp. 184–195, 2017, doi: 10.3745/JIPS.03.0065.
Z. Yang, K. Yang, L. Lei, K. Zheng, and V. C. M. Leung, “Blockchain-based
decentralized trust management in vehicular networks,” IEEE Internet Things J., vol.
6, no. 2, pp. 1495–1505, Apr. 2019, doi: 10.1109/JIOT.2018.2836144.
M. A. Rahman, M. S. Hossain, M. M. Rashid, S. Barnes, and E. Hassanain,
“IoEV-Chain: A 5G-Based Secure Inter-Connected Mobility Framework for the In-
ternet of Electric Vehicles,” IEEE Netw., vol. 34, no. 5, pp. 190–197, Sep. 2020, doi:
... With the rapid development of the Internet of Things, technology and the increasing number of the Internet of vehicles, the traditional Vehicular Ad-Hoc Network (VANET) is gradually integrated into the Internet of Vehicles (IoV). The Internet of Vehicles is a new model that combines vehicle organization networks and vehicle remote information processing to connect vehicles, people, and things [1]. Moreover, it is a very important area in Intelligent Transportation Systems (ITSs) as it covers technologies and applications such as intelligent transportation, cloud computing, vehicle information services, logistics and transportation services [2,3], modern wireless technologies, Internet access and communication. ...
... where, 1 B represents the V2R (Vehicle to Road Side Unit) communication channel bandwidth, Q represents the transmitting power between vehicles on the channel and RSU, 1 w represents the channel gain of moving vehicles on the channel to RSU, and 0 N represents the white noise power. ...
Full-text available
To reduce computing delay and energy consumption in the Vehicular networks, the total cost of task offloading, namely delay and energy consumption, is studied. A task offloading model combining local vehicle computing, MEC (Mobile Edge Computing) server computing, and cloud computing is proposed. The model not only considers the priority relationship of tasks, but also considers the delay and energy consumption of the system. A computational offloading decision method IBES based on an improved bald eagle search optimization algorithm is designed, which introduces Tent chaotic mapping, Levy Flight mechanism and Adaptive weights into the bald eagle search optimization algorithm to increase initial population diversity, enhance local search and global convergence. The simulation results show that the total cost of IBES is 33.07% and 22.73% lower than that of PSO and BES, respectively.
... It also ensures privacy of the network nodes [35], [36]. Due to its benefits, blockchain is widely used in many fields like energy [37] - [42], cloud computing [43], Wireless Sensor Network (WSN) [44], [45], Vehicular Ad-hoc Network (VANET) [46] - [50], ...
... 50 shows the size comparison of the rating data and its corresponding hash values.It should be noted that the size of hash does not increase with the increase in data size. The increase shown in the figure is due to the accumulated size of hash values. ...
Full-text available
This thesis examines the use of blockchain technology with the Electric Vehicles (EVs) to tackle different issues related to the existing systems like privacy, security, lack of trust, etc., and to promote transparency, data immutability and tamper proof nature. Moreover, in this study, a new and improved charging strategy, termed as Mobile vehicle-to-Vehicle (M2V) charging strategy, is used to charge the EVs. It is further compared with conventional Vehicle-to-Vehicle (V2V) and Grid-to-Vehicle (G2V) charging strategies to prove its efficacy. In the proposed work, the charging of vehicles is done in a Peer-to-Peer (P2P) manner to remove the intermediary parties and deal with the issues related to them. Moreover, to store the data related to traffic, roads and weather conditions, a Transport System Information Unit (TSIU) is used, which helps in reducing road congestion and minimizing road side accidents. In TSIU, InterPlanetary File System (IPFS) is utilized to store the data in a secured manner. Furthermore, mathematical formulation of the total charging cost, the shortest distance between EVs and charging entities, and the time taken to traverse the shortest distance and to charge the vehicles is done using real time data of EVs. The phenomena of range anxiety and coordination at the crossroads are also dealt with in the study. Moving ahead, edge service providers are introduced to ensure efficient service provisioning. These nodes ensure smooth communication with EVs for successful service provisioning. A caching system is also introduced at the edge nodes to store frequently used services. The power flow and the related energy losses for G2V, V2V and M2V charging strategies are also discussed in this work. In addition, an incentive provisioning mechanism is proposed on the basis of timely delivery of credible messages, which further promotes users’ participation. Furthermore, a hybrid blockchain based vehicular announcement scheme is proposed through which secure and reliable announcement dissemination is realized. In addition, IOTA Tangle is used, which ensures decentralization of the system. The real identities of the vehicles are hidden using the pseudo identities generated through an Elliptic Curve Cryptography (ECC) based pseudonym update mechanism. Moreover, the lightweight trustworthiness verification of vehicles is performed using a Cuckoo Filter (CF). It also prevents revealing the reputation values given to the vehicles upon information dissemination. To reduce the delays caused due to inefficient digital signature verification, transactions are verified in the form of batches. Furthermore, a blockchain based revocation transparency enabled data-oriented trust model is proposed. Password Authenticated Key Exchange by Juggling (J-PAKE) scheme is used in the proposed model to enable mutual authentication. To prevent collusion attacks, message credibility check is performed using Real-time Message Content Validation (RMCV) scheme. Furthermore, K-anonymity algorithm is used to anonymize the reputation data and prevent privacy leakage by restricting the identification of the predictable patterns present in the reputation data. To enable revocation transparency, a Proof of Revocation (PoR) is designed for the revoked vehicles. The vehicle records are stored in IPFS. To enhance the chances of correct information dissemination, incentives are provided to the vehicles using a reputation based incentive mechanism. To check the robustness of the proposed model, attacker models are designed and tested against different attacks including selfish mining attack, double spending attack, etc. To prove the efficiency of the proposed work, extensive simulations are performed. The simulation results prove that the proposed study achieves high success in making EVs energy efficient, secure and robust. Furthermore, the security analysis of the smart contracts used in the proposed work is performed using Oyente, which exhibits the secure nature of the proposed work.
... A secure distributed message-passing framework was proposed to rate the message source credibility utilizing blockchain technology [38]. A futuristic blockchain that consists of all main components like a priority, reputation system, and incentive mechanism for cost-effective and scalable 5G vehicular network architecture [39]. • Machine Learning: By using entropy and machine learning frameworks, a novel classification approach was introduced to detect protocol misbehavior [40]. ...
Full-text available
Innovative framework on Vehicles in Network Simulation (VEINS) for Vehicular Ad-hoc Network (VANET) that use security aspect is mainly limited and dispersed. In order to offer valuable visions for technical settings and researchers, the study looked into the trends and gaps that were currently present. As a result, this systematic literature review was carried out to develop a comprehensive taxonomy of the research landscape. A thorough study was done for papers about (a) VANET, (b) VEINS, and (C) security aspects. This research used three databases, namely IEEE Xplore, ScienceDirect, and Scopus. These databases included in-depth research focused on VANET based on the VEINS framework. Then, on the basis of the security aspect, filtering was accomplished. The first class includes threats and vulnerabilities that evaluate the effects of threats and vulnerabilities on VANETs by using the VEINS framework and suggest ways to mitigate or lessen their effects. The second category includes articles on the solution technology that uses blockchain, machine learning, and Software-Defined Networking (SDN) techniques in VEINS-based VANET applications. The third class comprises the requirements that satisfy privacy, authentication, trust management, reliability, and revocation of the VANET security-based VEINS framework. Finally, this paper reviews the architecture and bidirectional coupling of the VEINS framework. INDEX TERMS Vehicular Ad-hoc Network, SLR VEINS, VANET Security, OMNeT++, VEINS Framework .
... -It increases the security and general privacy of any data (Hassan et al., 2020). -Compared to traditional cloud storage, blockchain-based storage is cost-effective and efficient (Arshad et al., 2021). ...
Full-text available
UN1TY look up that, with increased security from encryption and cheaper from decentralizing cloud storage, the blockchain is transforming this business around the world. All industries have storage requirements not only to process but also to compute huge amounts of data. Blockchain-based storage is emerging as a better alternative to traditional cloud storage systems. This study shed lights on public blockchain network in secured file storage and prospects. The study conducted a secondary data analysis based on different academic and public databases and this qualitative study helps to identify some recent cases of using public blockchain network, impacts, and prospects.
... Due to the host/address-centric, connection-oriented communication mechanism primarily built for reliable wired networks, the Internet paradigm (i.e., TCP/IP) is inefficient for VANET data dissemination [28]. Arshad et al. [29] has developed a full block chain-based 5G vehicular network architecture that is cost-effective, scalable, and secure and addresses various vehicular network concerns in smart cities. All necessary components, such as a reputation system, an incentive mechanism, and priority-based strategies, are included in the proposed design. ...
Full-text available
Healthcare application is one of the most promising developments to provide on-time demand services to the end users, vehicles, and other Road Side Units (RSUs) in the urban environment. In recent years, several application interfaces have been developed to connect, communicate, and share the required services from one source to another. However, the urban environment holds a complex entity of both homogenous and heterogeneous devices to which the communication/sensing range between the devices leads to connectivity breakage, lack of needed service in time, and other environmental constraints. Also, security plays a vital role in allowing everyone in the urban area to access/request services according to their needs. Again, this leads to a massive breakthrough in providing reliable service to authentic users or a catastrophic failure of service denial involving unauthorized user access. This paper proposes a novel topological architecture, Secure Authentication Relay-based Urban Network (S-ARUN), designed for healthcare and other smart city applications for registered transportation stakeholders. The registered stakeholders hold a built-in data security framework with three subsystems connected to the S-ARUN topology: (1) authentication subsystem: the stakeholder must identify themselves to the source responder as part of the authentication subsystem before transmitting the actual data service request; (2) connectivity subsystem: to periodically check the connection state of stakeholders as they travel along with the road pattern; and (3) service subsystem: each source responder will keep a separate queue for collecting data service requests, processing them quickly, and sending the results to the appropriate stakeholder. The Kerberos authentication method is used in working with S-ARUN's model to connect the stakeholders securely and legitimately. The performance of the proposed S-ARUN is assessed, and the performance metric toward key generation and other data security-related metrics is tested with existing schemes.
... -It increases the security and general privacy of any data (Hassan et al., 2020). -Compared to traditional cloud storage, blockchain-based storage is cost-effective and efficient (Arshad et al., 2021). ...
With increased security from encryption, and cheaper from decentralizing cloud storage, the blockchain is transforming this business around the world. All industries have storage requirements not only to process but also to compute huge amounts of data. Blockchain-based storage is emerging as a better alternative to traditional cloud storage systems. This study shed lights on public blockchain network in secured file storage and prospects. The study conducted a secondary data analysis based on different academic and public databases and this qualitative study helps to identify some recent cases of using public blockchain network, impacts, and prospects.
The 5th generation 5G technology, also known as the 2020 telecommunications system, represents the next exciting phase of the evolution of telecommunications, with the recent successful distribution on nearly every continent. 5G is believed to bring multiple advancements such as greater transmission speeds, ultra-low latency, higher network capacity, etc. These advancements will directly support the industry-5.0 and Internet of Things (IoT) in the coming future. Today, IoT is one of the fastest-growing technologies because of its ability to deliver multiple applications across various devices. The emergence of 5G networks will be a major force for IoT development. Subsequently, Edge computing as an extension of cloud computing has emerged as a promising technology to empower 5G and IoT services due to its close vicinity to IoT Devices. However, specific challenging issues plague the integration of 5G, IoT, and Edge Computing, among which security is one of the biggest concerns. Recently, blockchain has been provided as a foundational and decentralized distributed ledger technology that can be used for solving the challenges of IoT, 5G, and Edge Computing integration. This paper proposes a trusted blockchain system for edge-based 5G networks that eliminates the limitations of integrating the Edge Computing, IoT, and 5G networks. The proposed blockchain system can efficiently identify the edge devices, authenticate the devices, and assign the addresses to the edge devices on a demand basis. Further, the proposed work also provides the secure communication among the edge devices that can protect from DDOS and Side-channel attacks.
Full-text available
Fifth-generation (5G) technology will play a vital role in future wireless networks. The breakthrough 5G technology will unleash a massive Internet of Everything (IoE), where billions of connected devices, people, and processes will be simultaneously served. The services provided by 5G include several use cases enabled by the enhanced mobile broadband, massive machine-type communications, and ultra-reliable low-latency communication. Fifth-generation networks potentially merge multiple networks on a single platform, providing a landscape for seamless connectivity, particularly for high-mobility devices. With their enhanced speed, 5G networks are prone to various research challenges. In this context, we provide a comprehensive survey on 5G technologies that emphasize machine learning-based solutions to cope with existing and future challenges. First, we discuss 5G network architecture and outline the key performance indicators compared to the previous and upcoming network generations. Second, we discuss next-generation wireless networks and their characteristics, applications, and use cases for fast connectivity to billions of devices. Then, we confer physical layer services, functions, and issues that decrease the signal quality. We also present studies on 5G network technologies, 5G propelling trends, and architectures that help to achieve the goals of 5G. Moreover, we discuss signaling techniques for 5G massive multiple-input and multiple-output and beam-forming techniques to enhance data rates with efficient spectrum sharing. Further, we review security and privacy concerns in 5G and standard bodies’ actionable recommendations for policy makers. Finally, we also discuss emerging challenges and future directions.
Nowadays, Wireless Sensor Networks (WSNs) are facing various challenges. Cost efficiency, low energy consumption, reliable data communication between nodes and security are the major challenges in the field of WSNs. On the other hand, blockchain is also a very hot domain in this era. Blockchain has a remedy for some challenges, which are faced by the WSNs, e.g., secure data transactions and trustworthiness, etc. By keeping in mind the security issues, we induce blockchain into the WSNs. In short, we have proposed a trust model to avoid the malicious attacks and keep the transact data using the blockchain property of immutability. Moreover, an enhanced version of Proof of Stack (PoS), i.e., the Proof of Authority (PoA) consensus mechanism is being used to add a new node in the network. Additionally, the smart contract is also written to check the working status of nodes. Simulations are performed in order to record the transaction cost and execution cost.
Full-text available
Vehicular networks are considered as one of the most pertinent research topics in intelligent transportation systems and anchors for future smart city environment due to the ability to provide road safety and precautionary measures for the drivers and passengers. Due to the characteristics of vehicular networks, security, privacy, and trust management are challenging issues. Blockchain is an emerging decentralized and distributed computing platform that facilitates recording and tracking resources without the need for the centralized trusted authority. Therefore, the potential for security improvements in vehicular networks is enormous. The paper aims to review, classify, and discuss a range of the proposed models in blockchain-based vehicular networks. We presented summary comparisons of the available models with their main features and objectives regarding security, privacy preservation, and trust management. To the best of our knowledge, this is the first paper that provides a survey on blockchain-based solutions for security services’ improvements in vehicular networks.
Full-text available
The rapid development of vehicular ad hoc networks (VANETs) has brought significant improvement to traffic safety and efficiency. However, owing to limitations associated with VANETs’ own unchanging model and traditional network structure, there are still many challenging concerns such as poor flexibility and controllability to deal with. To solve these inherent problems effectively, we propose a weight-based conditional anonymous authentication scheme by introducing the newly emerging software-defined networking (SDN) framework. Firstly, by making use of the global planning and dynamic management features of SDN, vehicles are classified into different priorities using weighted values to reduce communications redundancy, and control the participation of malicious vehicles. Then, an efficient conditional privacy-preserving scheme was developed to secure communications among vehicles. A two-step tracing approach has been designed to exclude and punish vehicles whose weights drop below the threshold. Extensive analyses indicate that our conditional privacy-preserving scheme is secure and has lower computation costs than conventional state-of-the-art authentication schemes.
Full-text available
Recent advances in 5G-based disruptive technologies have ushered in a new smart era of interconnected mobility. Hence, smart city planners around the globe are facing the challenges of leveraging these new modalities of future mobility solutions. Some key innovations toward disruptive mobility are the next generation of the Internet of electric vehicles and ultra-high-speed 5G communication paradigms. However, adding security to IoEV data remains of great concern. In this study, we offer a novel secure blockchain and off-chain-based 5G mobility framework that enables the security of IoEV data at rest, in transmission, and in the storage medium. We address the 5G security vulnerabilities in the areas of mutual authentication and authorization, remote software updates, confidentiality and integrity protection, secure provisioning of 5G services, secure storage of IoEV and personal data, and location tracking. We present our experience in building the architecture and the implementation of the framework, in addition to the system evaluation results.
Full-text available
The present world of vehicle technology is inclined to develop Electric Vehicles (EVs) with various optimized features. These vehicles need frequent charging which takes a longer time to charge up. Therefore, scheduling of vehicles in charging stations is required. esides, the information of the EVs and its location is also stored by the charging stations and therefore creates a concern of EV privacy. Various researches are going on to solve these problems; however, an efficient privacy-preserving solution is less practiced till date. In this paper, a framework for Electric Vehicle (EV) charging is discussed. The framework uses the concept of Matching Market to identify a charging station and uses the lattice-based cryptography for secure communications. The matching market considers multiple factors to provide the best allocation of charging station and cryptography ensures security and privacy preservation. The use of lattice-based cryptographic hash SWIFFT avoids heavy computation. This usage of matching market and lattice cryptography, more specifically signcryption for EV charging framework are the highlights of the solution and add-ons to the novel features. Overall, the presented framework is efficient in terms of computation and communication cost, satisfaction ratio, slot ratio, charging latency and load balancing index. The performance metrics are compared with recent developments in this field.
Full-text available
The capacity and coverage requirements for 5th generation (5G) and beyond wireless connectivity will be significantly different from the predecessor networks. To meet these requirements, the anticipated deployment cost in the United Kingdom (UK) is predicted to be between £30bn and £50bn, whereas the current annual capital expenditure (CapEX) of the mobile network operators (MNOs) is £2.5bn. This prospect has vastly impacted and has become one of the major delaying factors for building the 5G physical infrastructure, whereas other areas of 5G are progressing at their speed. Due to the expensive and complicated nature of the network infrastructure and spectrum, the second-tier operators, widely known as mobile virtual network operators (MVNO), are entirely dependent on the MNOs. In this paper, an extensive study is conducted to explore the possibilities of reducing the 5G deployment cost and developing viable business models. In this regard, the potential of infrastructure, data, and spectrum sharing is thoroughly investigated. It is established that the use of existing public infrastructure (e.g., streetlights, telephone poles, etc.) has a potential to reduce the anticipated cost by about 40% to 60%. This paper also reviews the recent Ofcom initiatives to release location-based licenses of the 5G-compatible radio spectrum. Our study suggests that simplification of infrastructure and spectrum will encourage the exponential growth of scenario-specific cellular networks (e.g., private networks, community networks, micro-operators) and will potentially disrupt the current business models of telecommunication business stakeholders – specifically MNOs and TowerCos. Furthermore, the anticipated dense device connectivity in 5G will increase the resolution of traditional and non-traditional data availability significantly. This will encourage extensive data harvesting as a business opportunity and function within small and medium-sized enterprises (SMEs) as well as large social networks. Consequently, the rise of new infrastructures and spectrum stakeholders is anticipated. This will fuel the development of a 5G data exchange ecosystem where data transactions are deemed to be high-value business commodities. The privacy and security of such data, as well as definitions of the associated revenue models and ownership, are challenging areas – and these have yet to emerge and mature fully. In this direction, this paper proposes the development of a unified data hub with layered structured privacy and security along with blockchain and encrypted off-chain based ownership/royalty tracking. Also, a data economy-oriented business model is proposed. The study found that with the potential commodification of data and data transactions along with the low-cost physical infrastructure and spectrum, the 5G network will introduce significant disruption in the Telco business ecosystem.
Full-text available
Smart contract technology is reshaping conventional industry and business processes. Being embedded in blockchains, smart contracts enable the contractual terms of an agreement to be enforced automatically without the intervention of a trusted third party. As a result, smart contracts can cut down administration and save services costs, improve the efficiency of business processes and reduce the risks. Although smart contracts are promising to drive the new wave of innovation in business processes, there are a number of challenges to be tackled. This paper presents a survey on smart contracts. We first introduce blockchains and smart contracts. We then present the challenges in smart contracts as well as recent technical advances. We also compare typical smart contract platforms and give a categorization of smart contract applications along with some representative examples.
In vehicular networks, vehicles exchange a massive amount of information aiming at improving people’s safety. Most of this information is personal or sensitive in nature, which makes security and privacy indispensable tasks. Named Data Networking is a future Internet architecture that adopts content-based security and in-network caching features to improve content delivery. However, the use of Named Data Networking on top of vehicular networks brings various challenges, especially in security and trust levels. The use of the distributed and control-less in-network caching allows malicious users to use the built-in design to launch attacks at the cache-store. Moreover, a malicious node can serve invalid or unlimited Interests to start an Interest flooding attack. In this paper, we propose a reputation-based Blockchain mechanism to secure both of Interest and Data forwarding plane, and content caching. The simulation results exhibit that our solution forwards only valid Interest and caches only trust content.
Recently, many academic institutions and standardization organizations have conducted research on vehicular communications based on LTE or 5G. As the most important standardization organization of cellular systems, the 3rd Generation Partnership Project (3GPP) has been developing the standard supporting vehicle-to-everything (V2X) services based on LTE, and has already prepared the roadmap toward 5G-based V2X services. With the emergence of new technologies and applications, such as connected autonomous vehicles, 5G-enabled vehicular networks face a variety of security and privacy challenges, which have not been fully investigated. In this article, we first present the infrastructure of 5G-enabled vehicular networks. Then the essential security and privacy aspects of V2X in LTE specified by 3GPP are introduced. After that, as a case study, we investigate the security and privacy issues of a 5G-enabled autonomous platoon, and propose several candidate solutions, including secure group setup with privacy preservation, distributed group key management, and cooperative message authentication. Finally, we discuss the security and privacy challenges in 5G-enabled vehicular networks.