2021
DOI: 10.1109/tits.2020.3006176
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Mining Cluster Selection for Blockchain-Based Cellular V2X Communications

Abstract: Cellular vehicle-to-everything (V2X) communication is expected to herald the age of autonomous vehicles in the coming years. With the integration of blockchain in such networks, information of all granularity levels, from complete blocks to individual transactions, would be accessible to vehicles at any time. Specifically, the blockchain technology is expected to improve the security, immutability, and decentralization of cellular V2X communication through smart contract and distributed ledgers. Although block… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
8
1
1

Relationship

3
7

Authors

Journals

citations
Cited by 34 publications
(15 citation statements)
references
References 38 publications
0
15
0
Order By: Relevance
“…In addition to the above research, mining offloading is also discussed in blockchain-based vehicle-to-everything (V2X) networks [167]. Besides, machine learning-based optimal auction models have been discussed.…”
Section: A Mining Task Offloadingmentioning
confidence: 99%
“…In addition to the above research, mining offloading is also discussed in blockchain-based vehicle-to-everything (V2X) networks [167]. Besides, machine learning-based optimal auction models have been discussed.…”
Section: A Mining Task Offloadingmentioning
confidence: 99%
“…Hence, attacks on these applications can cause safety concerns to humans. Blockchain is an efficient technique that can ensure secure data communications due to its distributed record-keeping and proof-of-work mechanism [148,149].…”
Section: Blockchain-enabled Securitymentioning
confidence: 99%
“…Though many of the factors that cause such flaws and potential areas of improvement are well known, methods that outline how solutions can be implemented may not be as clear. Some examples of well studied problems in CAV technology are ensuring the abilities to both maintain and secure certain data, like physical and geographic location of vehicles [27][28][29][30], allow sufficient operation space for vehicles and control traffic flow [31][32][33][34], allowing and securing communication between vehicles and each other as well as other network-connected devices [35][36][37][38][39], providing collision warning and evasion techniques [40][41][42][43][44], providing security against attacks from malicious entities and faulty software or hardware [45][46][47][48][49], and offering safe and reliable availability of updates when needed [50]. The possibilities that are opened by CAV technology are too vast to be ignored, with broad applications to various fields to improve operation and user convenience.…”
Section: Blockchain and Transportationmentioning
confidence: 99%