Computer Science ›› 2020, Vol. 47 ›› Issue (2): 213-220.doi: 10.11896/jsjkx.190600001

• Computer Network • Previous Articles     Next Articles

Survey on Application of Blockchain in VANET

ZHOU Chang1,LU Hui-mei1,XIANG Yong2,WU Jing-bang1   

  1. (School of Computer Science & Technology,Beijing Institute of Technology,Beijing 100081,China)1;
    (Department of Computer Science and Technology,Tsinghua University,Beijing 100084,China)2
  • Received:2019-06-03 Online:2020-02-15 Published:2020-03-18
  • About author:ZHOU Chang,born in 1985,Ph.D Postgraduate.Her main research interest is computer network;XIANG Yong,born in 1967,Ph.D,Associate Professor,is Member of China Computer Federation.His main research interests include operating system and computer network.

Abstract: The Vehicular Ad Hoc Network (VANET) is a kind of mobile ad hoc network (MANET) that supports vehicle to vehicle (V2V) and vehicle to infrastructure (V2I) communications,which is one of the core technology in Intelligent Transport System (ITS).Distributed data storage,point-to-point transmission,consensus mechanism and encryption algorithm of blockchain can warrant the security and reliability of VANET.However,the strong consistency and chain structure of blockchain can not match the two main characteristics of VANET,i.e.the rapid mobility of vehicle nodes and network instability.This research focus on the technical aspects of blockchain such as node,storage,cross-chain and consensus under the conditions of high mobility of vehicle nodes and volatility of network,and analyzes the existing problems and proposes solutions.We also prospect the future applications and research of blockchain in VANET which can be provided as a reference and basis.

Key words: Blockchain, VANET, Mobility, Volatility, Cross-chain

CLC Number: 

  • TP393
[1]GOUDARZI F,ASGARI H,Al-RAWESHIDY H S,et al.Traffic-Aware VANET Routing for City Environments-A Protocol Based on Ant Colony Optimization[J].IEEE Systems Journal,2019,13(1):571-581.
[2]ZHANG K,NI J B,YANG K,et al.Security and Privacy in Smart City Applications:Challenges and Solutions[J].IEEE Communications Magazine,2017,55(1):122-129.
[3]HAN M,HUA L,WANG L M,et al.Efficient communication protocol of group negotiation in VANET[J].Journal on Communications,2018,2018(1):34-45.
[4]LU Z,QU G,LIU Z.A Survey on Recent Advances in Vehicular Network Security,Trust,and Privacy[J].IEEE Transactions on Intelligent Transportation Systems,2019,20(2):760-776.
[5]EMARA K.Safety-aware Location Privacy in VANET:Evaluation and Comparison[J].IEEE Transactions on Vehicular Technology,2017,66(12):10718-10731.
[6]YUAN Y,WANG F Y.Blockchain:The State of the Art and Future Trends[J].Acta Automatica Sinica,2016,42(4):481-494.
[7]SEAN R,MICHAEL C,MERIEL H,et al.Securing vehicle to vehicle data sharing using blockchain through visible light and acoustic side-channels[J].arXiv:1704.02553,2017.
[8]LI L,LIU J Q,CHENG L C,et al.CreditCoin:A Privacy-Preserving Blockchain-Based Incentive Announcement Network for Communications of Smart Vehicles[J].IEEE Transactions on Intelligent Transportation Systems,2018,19(7):2204-2220.
[9]LIU H,ZHANG Y,YANG T.Blockchain-Enabled Security in Electric Vehicles Cloud and Edge Computing[J].IEEE Network,2018,32(3):78-83.
[10]LIU C,ZHANG G,GUO W,et al.Kalman Prediction-Based Neighbor Discovery and Its Effect on Routing Protocol in Vehicular Ad Hoc Networks[J].IEEE Transactions on Intelligent Transportation Systems,2020,21(1):159-169.
[11]PAPER E W.Ethereum:A Next-Generation Smart Contract and Decentralized Application Platform[EB/OL].https://github.com/ethereum/wiki/wiki/White-Paper.
[12]HOOFF J V D,KAASHOEK M F,ZELDOVICH N,et al.VerSum:Verifiable Computations over Large Public Logs[C]∥Computer and Communications Security.2014:1304-1316.
[13]TSAI W T,BLOWER R,ZHU Y,et al.A System View of Financial Blockchains[C]∥2016 IEEE Symposium on Service-Oriented System Engineering (SOSE).IEEE,2016.
[14]RICHARD D,GARETH O,BENJAMIN A.A Temporal Blockchain:A Formal Analysis[C]∥International Conference on Collaboration Technologies and Systems (CTS).Orlando,FL,2016:430-437.
[15]NAKAMOTO S.Bitcoin:A peer-to-peer electronic cash system[EB/OL].http://bitcoin.org/bitcoin.pdf.
[16]ZHANG J,GAO W Z,ZHANG Y C,et al.Blockchain Based Intelligent Distributed Electrical Energy Systems:Needs,Concepts,Approaches and Vision[J].Acta Automatica Sinica,2017,43(9):1544-1554.
[17]ADAM B,MATT C,LUKE D,et al.Enabling Blockchain Innovations with Pegged Sidechains[EB/OL].http://www.blockstream.com/sid-echains.pdf.
[18]WOOD D G.POLKADOT:Vision for a Heterogeneous Multi-chain Framework[EB/OL].https://github.com/w3f/polkadot-whitepaper/raw/master/PolkaDotPaper.pdf.
[19]RICHARD G E,MARTINE B,SAMUEL P,et al.VANET security surveys[J].Computer Communications,2014,44:1-13.
[20]LI G Y,BOUKHATEM L,WU J.Adaptive Quality-of-Service-Based Routing for Vehicular Ad Hoc Networks With Ant Colony Optimization[J].IEEE Transactions on Vehicular Technology,2017,66(4):3249-3264.
[21]YU H,ZHANG Z Y,LIU J W.Research on Scaling Technology of Bitcoin Blockchain[J].Journal of Computer Research and Development,2017,54(10):2390-2403.
[22]CUNHA F,VILLAS L,BOUKERCHE A,et al.Data communication in VANETs:Protocols,applications and challenges[J].Ad Hoc Networks,2016,44:90-103.
[23]TIZIRI O,MAWLOUD O,FATIHA H,et al.Secure and dis-tributed certification system architecture for safety message authentication in VANET[J].Telecommunication Systems,2017,64(4):679-694.
[24]ABIR M,TAREK M,BECHIR A,et al.A survey and comparative study of QoS aware broadcasting techniques in VANET[J].Telecommunication Systems,2017,66(2):1-29.
[25]BUTERIN V.Chain Interoperability[EB/OL].https://static1.squarespace.com/static/55f73743e4b051cfcc0b02cf/t/5886800ecd0f68de303349b1/1485209617040/Chain+Interoperability.pdf.
[26]THOMAS E S S.A Protocol for Interledger Payments[EB/ OL].https://interledger.org/interledger.pdf.
[27]JOHNNY D,ANDREW P,JONATHAN W,et al.Strong Federations:An Interoperable Blockchain Solution to Centralized Third Party Risks[EB/OL].https://www.blockstream.com/strong-federations.pdf.
[28]ELEMENTS.The Periodic Table of Elements[EB/OL]. https://www.elementsproject.org/elements/.
[29]BTC Relay.BTC Relay’s documentation[EB/OL].http://btc-relay.readthedocs.io/en/latest/index.html.
[30]JOSEPH P,THADDEUS D.The Bitcoin Lightning Network:Scalable Off-Chain Instant Payments[EB/OL].https://lightning.network/lightning-network-paper.pdf.
[31]RAIDEN Network.Raiden Network 0.3.0 Documentation.
[EB/OL].http://raiden-network.readthedocs.io/en/stable/.
[32]WANCHAIN.Building Super Financial Markets for the New Digital Economy[EB/OL].https://www.wanchain.org/files/Wanchain-Whitepaper-EN-version.pdf.
[33]FOUNDATION F.FUSION Whitepaper:An Inclusive Cryptofinance Platform Based on Blockchain[EB/OL].https://docs.wixstatic.com/ugd/76b9ac_6919c49798d84a65bfb2e421cefbfbd3.pdf.
[34]FACTOM.Factom Business Processes Secured by Immutable Audit Trails on the Blockchain[EB/OL].https://github.com/FactomProject/FactomDocs/blob/master/Factom_Whitepaper.pdf.
[35]ALI M,NELSON J C,SHEA R,et al.Blockstack:a Global naming and storage system secured by blockchains[C]∥Usenix Annual Technical Conference.2016:181-194.
[36]CAO Z,KONG J J,LEE U,et al.Proof-of-relevance:Filtering false data via authentic consensus in Vehicle Ad-hoc Networks[C]∥IEEE INFOCOM Workshops 2008.Phoenix,AZ,2008:1-6.
[37]GRAY J,LAMPORT L.Consensus on Transaction Commit[J].ACM Transactions on Database Systems,2004,31(1):133-160.
[38]LAMPORT L.Fast Paxos[J].Distributed Computing,2006,19(2):79-103.
[39]LAMPORT L.Byzantizing Paxos by Refinement[M]∥Distributed Computing.Berlin:Springer,2011:211-224.
[40]SUNNY K,SCOTT N.PPCoin:Peer-to-Peer Crypto-Currency with Proof-of-Stake[EB/OL].https://peercoin.net/assets/paper/peercoin-paper.pdf.
[41]BITSHARES.Delegated Proof of Stake[EB/OL].https://bitshares.org/technology/delegated-proof-of-stake-consensus/.
[42]BENTOV I,LEE C,MIZRAHI A,et al.Proof of Activity:Extending Bitcoin’s Proof of Work via Proof of Stake[J].Measurement and Modeling of Computer Systems,2014,42(3):34-37.
[43]LAMPORT L,SHOSTAK R E,PEASE M C,et al.The Byzantine Generals Problem[J].ACM Transactions on Programming Languages and Systems,1982,4(3):382-401.
[44]NEO.A Byzantine Fault Tolerance Algorithm for Blockchain.
[EB/OL].http://docs.neo.org/enus/basic/consensus/whitepaper.html.
[45]ZHU J Y,HUANG C H,FAN X,et al.RSU deployment planning based on approximation algorithm in urban VANET[J].Journal on Communications,2018,39(1):78-89.
[46]KIM D,VELASCO Y,WANG W,et al.A New Comprehensive RSU Installation Strategy for Cost-Efficient VANET Deployment[J].IEEE Transactions on Vehicular Technology,2017,66(5):4200-4211.
[47]ZHANG B,JIA X,YANG K,et al.Design of Analytical Model and Algorithm for Optimal Roadside AP Placement in VANETs[J].IEEE Transactions on Vehicular Technology,2016,65(9):7708-7718.
[48]SAINI M,ALELAIWI A,SADDIK A E.How Close are We to Realizing a Pragmatic VANET Solution? A Meta-Survey[J].Acm Computing Surveys,2015,48(2):1-40.
[49]CHEN M,WEN Y,YUE S,et al.A progressive transmission strategy for GIS vector data under the precondition of pixel losslessness[J].Arabian Journal of Geosciences,2015,8(6):3461-3475.
[50]DUFILIE A S,GRINSTEIN G G.Feathered Tiles with Uniform Payload Size for Progressive Transmission of Vector Data[C]∥Web and Wireless Geographical Information Systems.2014:19-35.
[51]ABDOU W,DARITES B,MBAREK N,et al.An autonomic message dissemination protocol for Vehicular Ad hoc Networks:a density and priority levels aware approach[J].Wireless Networks,2015,21(3):1001-1014.
[52]EYAL I,GENCER A E,SIRER E G,et al.Bitcoin-NG:a scalable blockchain protocol[C]∥Proceedings of the 13th Usenix Conference on Networked Systems Design and Implementation.2016:45-59.
[53]LI C X,LI P L,ZHOU D,et al.Scaling Nakamoto Consensus to Thousands of Transactions per Second[J].arXiv:1805.03870,2018.
[54]VITALIK B.Ethereum Sharding FAQ[EB/OL].https:// github.com/ethereum/wiki/wiki/Sharding-FAQ.2019.
[55]ZAMANI M,MOVAHEDI M,RAYKOVA M.RapidChain: Scaling Blockchain via Full Sharding[C]∥2018 ACM SIGSAC Conference.ACM,2018.
[56]DORRI A,STEGER M,KANHERE S S,et al.BlockChain:A Distributed Solution to Automotive Security and Privacy[J].IEEE Communications Magazine,2017,55(12):119-125.
[57]MUHAMMAD M,SAFDAR G A.Survey on existing authentication issues for cellular-assisted V2X communication[J].Vehicular Communications,2018,12:50-65.
[1] ZHANG Yan-mei, LOU Yin-cheng. Deep Neural Network Based Ponzi Scheme Contract Detection Method [J]. Computer Science, 2021, 48(1): 273-279.
[2] SHAO Wei-hui, WANG Ning, HAN Chuan-feng, XU Wei-sheng. Integrated Emergency-Defense System Based on Blockchain [J]. Computer Science, 2021, 48(1): 287-294.
[3] LI Ying, YU Ya-xin, ZHANG Hong-yu, LI Zhen-guo. High Trusted Cloud Storage Model Based on TBchain Blockchain [J]. Computer Science, 2020, 47(9): 330-338.
[4] LIU Shuai, GAN Guo-hua, LIU Ming-xi, FANG Yong, WANG Shou-yang. Multi-subblock Incentive Consensus Mechanism Based on Topology and Distribution Mechanism [J]. Computer Science, 2020, 47(7): 268-277.
[5] LU Ge-hao, XIE Li-hong and LI Xi-yu. Comparative Research of Blockchain Consensus Algorithm [J]. Computer Science, 2020, 47(6A): 332-339.
[6] LIN Xu-dan, BAO Shi-Jian, ZHAO Li-xin and ZHAO Chen-lin. Design and Performance Analysis of Automotive Supply Chain System Based on Hyperledger Fabric [J]. Computer Science, 2020, 47(6A): 546-551.
[7] ZHANG Qi-ming, LU Jian-hua, LI Shou-zhi and XU Jian-dong. Building Innovative Enterprise Customer Service Technology Platform Based on Blockchain [J]. Computer Science, 2020, 47(6A): 639-642.
[8] HU Jin-tian, WANG Gao-cai, XU Xiao-tong. Task Migration Strategy with Energy Optimization in Mobile Edge Computing [J]. Computer Science, 2020, 47(6): 260-265.
[9] YE Shao-jie, WANG Xiao-yi, XU Cai-chao, SUN Jian-ling. BitXHub:Side-relay Chain Based Heterogeneous Blockchain Interoperable Platform [J]. Computer Science, 2020, 47(6): 294-302.
[10] XIE Ying-ying, SHI Jian, HUANG Shuo-kang, LEI Kai. Survey on Internet of Things Based on Named Data Networking Facing 5G [J]. Computer Science, 2020, 47(4): 217-225.
[11] WANG Hui, LIU Yu-xiang, CAO Shun-xiang, ZHOU Ming-ming. Medical Data Storage Mechanism Integrating Blockchain Technology [J]. Computer Science, 2020, 47(4): 285-291.
[12] FENG Tao, JIAO Ying, FANG Jun-li, TIAN Ye. Medical Health Data Security Model Based on Alliance Blockchain [J]. Computer Science, 2020, 47(4): 305-311.
[13] PAN Ji-fei,HUANG De-cai. Blockchain Dynamic Sharding Model Based on Jump Hash and Asynchronous Consensus Group [J]. Computer Science, 2020, 47(3): 273-280.
[14] LV Jian-fu,LAI Ying-xu,LIU Jing. Log Security Storage and Retrieval Based on Combination ofOn-chain and Off-chain [J]. Computer Science, 2020, 47(3): 298-303.
[15] CHEN Meng-rong,LIN Ying,LAN Wei,SHAN Jin-zhao. Improvement of DPoS Consensus Mechanism Based on Positive Incentive [J]. Computer Science, 2020, 47(2): 269-275.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75 .
[2] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[3] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[4] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[5] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99 .
[6] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105 .
[7] LIU Bo-yi, TANG Xiang-yan and CHENG Jie-ren. Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods[J]. Computer Science, 2018, 45(4): 106 -111 .
[8] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[9] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121 .
[10] WANG Zhen-chao, HOU Huan-huan and LIAN Rui. Path Optimization Scheme for Restraining Degree of Disorder in CMT[J]. Computer Science, 2018, 45(4): 122 -125 .