Next Article in Journal
Modeling Techno-Economic Wood Procurement from Renewable Forests for the Sustainable Energy Supply of a CHP Plant
Previous Article in Journal
A Review on Pharmaceuticals and Personal Care Products Residues in the Aquatic Environment and Possibilities for Their Remediation
Previous Article in Special Issue
Toward Sustainable Model Services for Deep Learning: A Sub-Network-Based Solution Integrating Blockchain with IPFS and a Use Case in Intelligent Transportation
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Application of Sustainable Blockchain Technology in the Internet of Vehicles: Innovation in Traffic Sign Detection Systems

1
School of Electronic Information, Shanghai Dianji University, Shanghai 201306, China
2
Department of Mathematics and Computer Science, Sul Ross State University, Alpine, TX 79830, USA
3
School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan 411201, China
*
Author to whom correspondence should be addressed.
Sustainability 2024, 16(1), 171; https://doi.org/10.3390/su16010171
Submission received: 13 November 2023 / Revised: 15 December 2023 / Accepted: 19 December 2023 / Published: 23 December 2023
(This article belongs to the Special Issue Sustainable Blockchain and Computer Systems)

Abstract

:
With the rapid development of the Internet of Vehicles (IoV), traffic sign detection plays an indispensable role in advancing autonomous driving and intelligent transportation. However, current road traffic sign detection technologies face challenges in terms of information privacy protection, model accuracy verification, and result sharing. To enhance system sustainability, this paper introduces blockchain technology. The decentralized, tamper-proof, and consensus-based features of blockchain ensure data privacy and security among vehicles while facilitating trustworthy validation of traffic sign detection algorithms and result sharing. Storing model training data on distributed nodes reduces the system computational resources, thereby lowering energy consumption and improving system stability, enhancing the sustainability of the model. This paper introduces an enhanced GGS-YOLO model, optimized based on YOLOv5. The model strengthens the feature extraction capability of the original network by introducing a coordinate attention mechanism and incorporates a BiFPN feature fusion network to enhance detection accuracy. Additionally, the newly designed GGS convolutional module not only improves accuracy but also makes the model more lightweight. The model achieves an enhanced detection accuracy rate of 85.6%, with a reduced parameter count of 0.34 × 10 7 . In a bid to broaden its application scope, we integrate the model with blockchain technology for traffic sign detection in the IoV. This method demonstrates outstanding performance in traffic sign detection tasks within the IoV, confirming its feasibility and sustainability in practical applications.

1. Introduction

Blockchain is a decentralized ledger technology employed to securely record and share all network transactions, bolstering data integrity [1]. Each node maintains the same ledger, ensuring that all operations are visible to all nodes, providing a secure data-sharing mechanism. However, this technology requires high computing costs and power consumption. According to relevant data, Bitcoin consumed 0.55% of global electricity in 2020 [2], while the monthly storage cost of Ethereum blockchain is approximately USD 20 million [3]. Therefore, ensuring the sustainability of blockchain is crucial for the long-term operation of such systems. In the domain of autonomous driving, the timely detection of traffic signs is of utmost importance. It helps vehicles comply with road rules, improves traffic safety, and reduces the risk of accidents. At the same time, autonomous driving systems must possess the capability to promptly identify and interpret road signs for precise decision making and route planning. The real-time monitoring and analysis of traffic flow, coupled with measures to optimize vehicle movement and reduce congestion and greenhouse gas emissions, are crucial for the advancement of autonomous driving technology. Accurate detection of traffic signs is a key foundation for achieving this goal. Additionally, the detection and analysis of traffic signs contribute to acquiring road traffic information, supporting traffic management, and monitoring and optimizing urban traffic congestion. The distributed storage provided by blockchain also contributes to enhancing the sustainability of such systems. In this context, achieving sustainability involves optimizing the energy efficiency of blockchain in the IoV and considering the overall environmental impact. This ensures that the benefits of this technology align with long-term ecological considerations.
In industrial settings, the traffic sign detection model designed in this study exhibits various potential advantages. Firstly, with real-time monitoring in traffic management, we can effectively ensure driver compliance with regulations, significantly reducing the potential risk of traffic accidents. This enhances overall safety in industrial facilities, minimizing the risks of personnel injuries and equipment damage. In the realm of industrial park surveillance, the application of this model enables efficient detection of signs within industrial areas, ensuring the safe movement of equipment and transport vehicles in complex environments. This positively impacts the prevention of accidents among pieces of equipment, optimizes transport routes, and enhances overall industrial productivity. Through the safety monitoring of vehicles and equipment, we can preemptively prevent potential workplace accidents, thereby reducing costs associated with maintenance and replacement and increasing the reliability and lifespan of equipment. Regarding process efficiency, the application of an intelligent parking system allows industrial facilities to utilize parking space more effectively, mitigating congestion and providing real-time parking information. This not only improves efficiency in the management of vehicles and equipment but also contributes to reducing wait time in operations, comprehensively enhancing overall workflow efficiency.
The blockchain-based real-time traffic sign detection described in this article faces multiple challenges, and achieving sustainability further adds to the complexity. Factors such as weather conditions, time, and changes in lighting can impact the appearance of traffic signs, thereby increasing the difficulty of detection. These challenges necessitate detection algorithms with high adaptability, capable of reliably identifying traffic signs under various environmental conditions. Additionally, vehicles, pedestrians, or other obstacles on the road may obstruct the signs or even render them completely invisible, posing challenges to the accuracy and robustness of detection algorithms. High energy consumption is a significant concern in blockchain technology. To mitigate the energy demand, optimizing data storage and transmission processes can reduce overall computational costs and energy consumption, thereby enhancing the sustainability of such systems. Overall, achieving sustainability in blockchain-based real-time traffic sign detection requires the comprehensive consideration of algorithm flexibility, perception capabilities, and energy efficiency optimization in blockchain technology. This ensures that the system operates robustly in different environments while keeping resource consumption within acceptable limits. The contributions of this paper are as follows:
  • To achieve the effective integration of blockchain and object detection models, we propose an innovative architecture designed to optimize data storage and transmission processes, ensuring sustainable resource utilization throughout the system’s long-term operation. This contributes to reducing the overall energy consumption of the system, aligning it more closely with the principles of environmentally sustainable development;
  • The YOLOv5 model is enhanced with the incorporation of a coordinate attention mechanism to improve its feature extraction capabilities. Additionally, the integration of BiFPN further bolsters the model’s effectiveness in fusing multi-scale features;
  • We introduce the GGS module in conjunction with GSconv to replace the original CBS module, resulting in a more lightweight model.
The rest of this paper is organized as follows: The second section reviews relevant literature and existing work, providing a theoretical foundation for the study. The third section details the overall structural framework of this study and the content of the GGS-YOLO model. The fourth section presents the experimental results and analyzes the performance of the improved model. Finally, the fifth section summarizes the main research of this paper and points out the shortcomings of the study.

2. Related Work

In this chapter, we divide the literature into two main research directions. The first type of research focuses on the application and exploration of object detection technology in the field of traffic sign detection. The second type of research focuses on blockchain research in data exchange and data protection in the IoV.

2.1. Overview of Traffic Sign Detection Methods

Currently, traffic sign detection methods can be primarily categorized into two groups: traditional methods and deep learning-based methods. Traditional methods typically rely on features like color and shape for detection. Liu and his team classified traditional methods, including various methods such as color and shape [4]. Yang and his team proposed a probabilistic model based on the Ohta color space to detect traffic signs by drawing color probability maps [5]. Zaklouta et al. [6] used the Hough transform to detect the shape of signs. While shape detection methods are resilient to the effects of natural lighting conditions, they exhibit limited capability in addressing issues such as sign aging and deformation, making them prone to false positives and false negatives. Although traditional methods perform reasonably well in daily detection, their performance in complex environments is not ideal.
In the realm of deep learning methods, convolutional neural networks (CNNs) are prevalent technologies extensively employed in computer vision. These methods are typically categorized into one-stage and two-stage detection approaches. In two-stage detection methods, candidate regions are first generated and then classified and positioned. Girshick et al. [7] proposed R-CNN, which is considered the pioneering work in the field of two-stage detection methods. This method first extracts candidate regions and then uses CNN and SVM classifiers for classification. Although this method achieves good results in classifying target areas, it wastes a lot of storage and computing resources due to the repeated selection of candidate boxes. On this basis, Zhang et al. [8] proposed a cascade R-CNN, which obtains multi-scale information using feature pyramids and uses product-weighted operations to refine traffic sign features, thus enhancing detection accuracy and robustness. Wang et al. [9] improved Faster R-CNN using the Res2net network backbone and proposed a resampling post-processing scheme, resulting in improved detection performance for small targets. In addition, Redmon et al. [10] proposed the YOLO target detection algorithm, which eliminates the need to generate candidate regions and instead directly performs classification and localization, leading to higher detection speed. The SSD algorithm is also one of the one-stage methods [11]. Wang J. et al. [12] presented an enhanced approach built upon the YOLOv5s network. This method incorporates the AF-FPN feature pyramid network and an automatic learning data enhancement strategy to improve multi-scale recognition and model robustness. Despite improvements, there are still issues with model complexity and insufficient detection accuracy. Chen et al. [13] proposed a strategy of adding receptive field cross modules and attention mechanisms to the backbone network for YOLOv4 and YOLOv5 to improve the detection of occluded targets. However, this leads to a reduction in frame rate, impacting real-time performance.
In summary, one-stage methods have notably enhanced detection speed compared with two-stage methods, making them suitable for a wide range of applications. In addition, in the field of traffic sign recognition, researchers continue to explore new methods and technologies. For example, Zhang et al. [14] considered the unique characteristics of traffic signs and put forward a traffic sign detection algorithm that relies on deep convolutional networks. To enhance detection speed and accuracy, they optimized the network by either adding or removing convolutional layers in suitable regions. After data set verification, it was proved that this improved detection algorithm is more effective. Lin et al. [15] proposed a traffic sign detection method using a lightweight multi-scale feature fusion network, which speeds up object detection by simplifying the model. Additionally, it enhances generalization and recognition accuracy through multi-scale feature fusion. Xiong et al. [16] introduced a traffic sign detection approach built on a CNN, employing a region proposal network (RPN) to identify traffic signs, resulting in an enhancement in the model’s detection accuracy. However, the model size of this method is larger and may be affected by resource limitations. Khan et al. [17] focused on solving the problem of darker areas in complex environments and proposed an intelligent traffic sign recognition system with a lighting pre-processing function to enhance light in the darker areas of the image using brightness enhancement technology. Their approach yielded satisfactory results when tested on the GTSDB dataset. Jaramillo-Alcazar et al. [18] proposed a traffic optimization system that combines blockchain and computer vision technologies to improve urban transportation efficiency, safety, and sustainability. Simulating urban environments and applying these technologies demonstrated the system’s effectiveness in reducing congestion and enhancing traffic flow.

2.2. Blockchain Technology Application Research in the IoV

In today’s era of data expansion, data privacy protection has become particularly important. In terms of data storage, some researchers have proposed innovative methods. Wang et al. [19] introduced a decentralized storage system and a data-sharing framework based on blockchain and fine-grained access control. However, these methods have not yet fully addressed the issue of user privacy protection. Although blockchain has advantages in data protection, traditional blockchain models may face security issues and risks of private data leakage during public processing. To address the issue of safeguarding data privacy, Zhang et al. [20] proposed an identity-based scheme that aims to enhance data privacy in non-transaction scenarios and implement privacy-preserving encryption methods. In addition, Xu et al. [21] suggested employing homomorphic encryption technology to enhance the data structure of blocks, thereby achieving the encryption of block data. These methods represent continuous exploration and innovation efforts in data privacy protection. Research in this field continues to advance, ranging from on-chain data hashing to off-chain-encrypted on-chain storage.
Ensuring the integrity of data sharing and preventing data leakage are the focuses of current research. In terms of data sharing, researchers combine different blockchain types to achieve data sharing. Liang et al. [22] proposed an industrial IoT transmission technology based on fabric blockchain, using a blockchain-based dynamic secret sharing mechanism and optimizing data storage and transmission, which improves the security and safety of industrial IoT data transmission, as well as reliability, while improving transmission efficiency. In data dissemination, blockchain usually involves multiple parties, so data privacy is of particular concern. Si et al. [23] proposed a blockchain-based lightweight information-sharing security framework for the Internet of Things which is based on blockchain technology. They utilized and enhanced partial blind signature algorithms to secure and control data. Cai et al. [24] proposed an information security guarantee mechanism based on blockchain technology, which can search for trusted private keywords. Using a searchable encryption method, encrypted data can be searched for effectively and safely. For certain wireless frequency interference attacks [25], Shen et al. [26] put forward a support vector machine training model that effectively safeguards the privacy of IoT data through the application of Paillier encryption technology. Magsi et al. [27] proposed a system for detecting and preventing content-poisoning attacks, combining a threshold-based content-caching mechanism with blockchain technology to address content-poisoning attacks (CPAs) in Vehicular Named Data Networks. To prevent data leakage, Gao and his team introduced novel technologies aimed at safeguarding sensitive information [28]. They leveraged kleptography algorithms to modify the blockchain signature algorithm and transaction filtering mechanism, thereby establishing a secure communication channel within a public blockchain system and enhancing data transmission concealment. These studies exemplify ongoing innovation in the realm of data privacy protection, ensuring the security and integrity of data.
The Internet of Things (IoT) [29] and the IoV are closely interconnected. The IoV can be viewed as a specific application of the IoT in the transportation sector. It integrates Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) communication, utilizing technologies such as in-vehicle sensors, V2V communication, and V2I communication to establish an intelligent transportation system. This system enhances traffic management efficiency and strengthens functions such as vehicle safety, intelligent traffic management, remote monitoring, and management. However, the widespread adoption of in-vehicle sensors has led to a decrease in data communication efficiency [30]. To address this issue, Xu et al. [31] proposed the Adaptive Computation Offloading Method (ACOM), designed specifically for 5G-connected vehicle networks. This method aims to optimize task offloading latency and resource utilization in edge computing systems. It generates viable solutions with a multi-objective evolutionary algorithm and obtains the optimal offloading scheme through utility evaluation. In terms of security and privacy protection in vehicular networks, Ren discussed the applications of the IoT and blockchain technology in intelligent transportation systems [32]. These include monitoring traffic, locating emergencies, managing public transportation, and implementing credit token mechanisms to record system changes. Prashar [33] proposed a model combining the IoT and hash graph technology to improve road safety by creating an effective communication network among vehicles. Ghimire [34] introduced a blockchain-empowered federated learning framework, providing a secure, privacy-preserving, and verifiable solution for collaborative learning in vehicular networks to enhance the security of intelligent transportation systems. Chen et al. [35] addressed security, privacy, and efficiency issues in data transactions within vehicular networks, proposing a data transaction framework and an iterative bidirectional auction mechanism based on a consortium blockchain. In terms of data sharing, Joshi introduced a data transfer architecture using blockchain within a cluster-based Vehicular Ad Hoc Network (VANET) [36]. It employs a raindrop optimization algorithm for clustering to protect the privacy and security of vehicular self-organizing networks. Kang et al. [37] proposed the development of a secure point-to-point data-sharing system for vehicle data using consortium blockchain technology to ensure secure, efficient storage and the sharing of data in the edge network of the vehicular IoT.
The combination of blockchain and the IoV has also been extensively studied. Kang et al. [37] applied alliance blockchain and smart contracts to Road-Side Units (RSUs) for data storage and sharing and used pseudonyms for anonymous operations to provide user privacy protection. Alfadhli et al. [38] proposed a lightweight multifactor authentication scheme that preserves privacy and combines PUF and multifactor authentication to support V2V interaction without sharing sensitive privacy data with RSUs. In the dynamic vehicle scenario, Chai et al. [39] introduced a hierarchical weighted update federated learning [40] algorithm to facilitate knowledge sharing. Various chains are tasked with recording diverse environmental data to enable the federated learning process, thereby facilitating knowledge sharing. Xiao et al. [41] introduced a combined cluster and blockchain scheme for the secure transmission of real-time information. They devised a distributed consensus mechanism built on the Byzantine fault-tolerance algorithm to guarantee the security of vehicle information communication. Cui et al. [42] presented a secure V2V data-sharing scheme that relies on consortium blockchain technology. In this scheme, vehicles generate ratings for data providers, and trusted agencies periodically broadcast blacklists to enhance data security. These studies reflect an ongoing exploration of the integration of blockchain and the IoV, with the aim of enhancing the efficiency and security of data sharing and privacy protection. Lu et al. [43] proposed an innovative hybrid blockchain architecture that incorporates an asynchronous federated learning approach. The aim is to enhance the security, reliability, and efficiency of data sharing in the vehicular networking domain by employing deep reinforcement learning for node selection. On the other hand, Tan and their team [44] introduced a vehicle platform based on digital twins. This platform utilizes a consortium blockchain and a proof-of-stake consensus algorithm, along with an inventive incentive mechanism, to facilitate resource sharing among vehicles within urban areas. This approach contributes to the overall utility of vehicular networking. The integration of these two approaches holds the potential to provide a comprehensive, secure, and efficient solution for the field of vehicular networking.

3. Method

This section emphasizes the innovative application of the GGS-YOLO model in the IoV. The model achieves precise detection of traffic signs and ensures the real-time recording of relevant data on the blockchain, introducing unprecedented innovation not only in achieving efficient traffic management but also in enhancing data security and tamper resistance. This unique combination makes traffic sign detection data, secured by the blockchain, highly efficient and trustworthy evidence in court proceedings when traffic accidents occur. Through an in-depth exploration of both blockchain architecture and the GGS-YOLO model, we gain a more comprehensive understanding of this innovative approach, providing new insights and a solid foundation for the reliable development of intelligent urban traffic systems.

3.1. System Architecture

In terms of ensuring the sustainability of a system where the outputs of a target detection model are stored in a distributed blockchain network, we place particular emphasis on several key aspects. Firstly, by adopting smart contracts, we not only ensure the transparency and tamper resistance of the target detection results but also establish a reliable traceability and verification mechanism, promoting a high level of data integrity throughout the long-term operation of the system. Secondly, with the introduction of decentralized storage mechanisms, we not only disperse the storage of large-scale data generated by the model across different nodes in the blockchain network, thereby enhancing the system’s scalability, but also reduce the risk associated with a single node. This enhances the overall stability and reliability of the system, making it more sustainable over time. In terms of data transmission, by leveraging the distributed nature of blockchain, we decompose the transmission process into multiple steps. With smart contract verification, we not only reduce the complexity of data transmission and improve its security but also alleviate the burden on a single node, thereby further enhancing the efficiency of the entire system. The comprehensive improvements and integration of these strategies contribute to ensuring that the system maintains a high level of sustainability throughout its long-term operation.
The system’s overall architecture is depicted in Figure 1, encompassing three key components: data providers, data receivers, and blockchain. Notably, data providers and data receivers share equal roles, serving as both providers and collectors.
(1)
The term data providers mainly refers to vehicles with data collection functions. Vehicles identify the corresponding traffic sign data using YOLOv5 and then encrypt the collected data and upload them to the blockchain network;
(2)
Blockchain network refers to a public blockchain platform where data providers or data receivers can conduct data transactions after registering their information. The main part of the blockchain network, the smart contract, consists of four parts: the subject node, the object node, the credit node, and the exchange node. The role of the subject and object nodes is to store the identity information of the provider and receiver and to verify the correctness of the signatures of both parties in the data exchange. The role of the credit node is to evaluate the credit of both parties in the transaction and determine whether the two parties can conduct data exchange. The exchange node is responsible for access requests of the entire control system;
(3)
The data receiver is the user of the data, responsible for decrypting the received encrypted data and utilizing the provider’s data to perform real-time processing on traffic signal signs.
In the design and implementation of blockchain systems, employing formal methods is a crucial strategy to ensure their high reliability and security [45]. Given the decentralized nature of blockchain and its applications in critical domains, any security vulnerabilities in the system could lead to severe consequences. Formal methods strengthen the overall security architecture of blockchain systems by providing strict adherence to system specifications and the ability to defend the system against various security threats. Additionally, this approach enhances system transparency and credibility, offering users and participants additional security assurances.
Within this framework, the formal verification of smart contracts becomes particularly essential [46]. Since smart contracts are immutable once deployed and often handle a significant volume of transactions and assets, ensuring their accuracy and intended functionality before deployment is paramount. Through the application of mathematical proof methods, smart contract code can undergo rigorous verification, ensuring the correctness and security of its logic. This formal verification process adds a layer of reliability and security to smart contracts, helping prevent potential vulnerabilities and attacks, thereby maintaining the stable operation of the entire blockchain system.

3.2. Blockchain Network Construction

3.2.1. Node Data Collection

Figure 2 shows the process of node A collecting the “Stop” flag and node D collecting the “No whistle sign” flag. The details of these two data collection processes are updated immediately in the blockchain’s public ledger. The public ledger records all the collected information, regardless of whether a node participates in these information collection processes. This information is visible to all subsequent blockchains. Due to the immutability of the blockchain, the transmission of such information is more secure.
By creating a blockchain containing multiple car nodes, an efficient approach can be established to enable these cars to rapidly perform traffic sign recognition, particularly when one of the cars has been trained using the YOLOv5 algorithm. Assuming 100 cars have not undergone any training, leveraging blockchain technology allows these cars to connect to a shared public ledger, eliminating the cumbersome task of individually training each car. Through blockchain-enabled collective learning, each car can leverage the experience of others, facilitating a form of collaborative learning. This not only enables all cars to learn the positions of traffic signs from the experience of a single car but also avoids redundant efforts, thereby enhancing overall system efficiency. This collective learning approach not only enables cars to adapt to traffic environments more quickly but also facilitates intelligent recognition and adherence to traffic signs within a short time frame. Furthermore, by establishing a distributed learning model on the blockchain, computational resources can be shared across the entire network, achieving sustainability in terms of saving computational resources. This shared computational resource model helps avoid the need for each car to independently perform extensive computations, reducing the overall system’s demand for computational resources and aligning with the principles of sustainable development. Through the application of blockchain technology, an efficient, collaborative, and sustainable system for traffic sign recognition can be realized, providing an innovative solution for the future development of autonomous and self-learning vehicles. Figure 3 illustrates car A updating the “stop” sign in the ledger, exemplifying how shared blockchain data can be used for mutual improvement and knowledge sharing among vehicles in the network.
Figure 4 shows that when any car ledger is updated, the same update is also reflected in other ledgers of the blockchain, which also relatively reflects the shareability of the blockchain. Therefore, as long as one car node receives traffic sign information, any number of car nodes can be updated. This approach can save significant computational resources and distribute acquired data across various nodes to enhance data availability and performance. This is related to sustainability because it ensures that data remain accessible in the face of failures, disasters, or other challenges. With data redundancy, backups, load balancing, and compliance management, this distributed storage system can improve data sustained availability and security, contributing to the principles of sustainability.

3.2.2. Data Sharing

Figure 5 shows the complete process of data sharing. In the access permission request stage, the provider first sends a request to the exchange node, which retrieves the information based on the information of the subject and object nodes, and then returns the result of the request. If the request is successful, the information is passed to the credit node to conduct credit evaluation on both parties, and the result of the request are returned after waiting for the result of the assessment result. Once access permission is approved, the provider can exchange data with the receiver, and all data exchange messages are encrypted using the public keys of both parties to ensure message confidentiality. All interactions are implemented using smart contracts, and nodes interact with contracts and other nodes by sending transactions. All access history and results are stored on the blockchain, and even if some nodes are damaged or compromised, the data-sharing system can still operate reliably.
In this study, the application of smart contracts significantly enhances the efficiency and security of sharing traffic sign detection data in the connected vehicle environment. For instance, when a vehicle detects a newly placed parking sign with its advanced sensor system, this information is instantly recorded on and uploaded to the blockchain, facilitated by the automated execution of smart contracts. Once the traffic sign data are verified and added to the blockchain, they are immediately accessible to all authorized vehicles within the network. This mechanism not only accelerates data transmission but also substantially improves reliability and security due to the immutability of the blockchain, contrasting with traditional centralized data-sharing mechanisms that rely on single servers or databases, posing risks of data transfer delays, security vulnerabilities, and even data loss. Importantly, smart contracts provide a transparent and traceable data-sharing environment. Every transaction, including the upload and download of traffic sign data, is recorded on the blockchain. This not only promotes data transparency but also facilitates future audits and issue resolution. For example, if an error in traffic sign detection leads to an accident, the relevant data can be traced to determine the root cause. Additionally, compared with traditional data-sharing methods, smart contracts significantly reduce operational and maintenance costs. Automated data validation and transmission reduce the need for manual intervention while lowering the risks associated with data processing errors. Therefore, by leveraging smart contracts to achieve the efficient sharing of traffic sign detection data in connected vehicles, our approach not only enhances the speed and security of data processing but also elevates the overall reliability and transparency of the entire traffic system.

3.2.3. Distributed Storage: Robustness and Security in Connected Vehicles

Distributed storage is a method for dispersing data across multiple nodes in a network. In contrast to traditional centralized storage, its goal is to enhance the security, reliability, and censorship resistance of data. This decentralized storage employs principles of decentralized control, utilizing blockchain technology to ensure data immutability and transparency. Simultaneously, encryption techniques are applied to safeguard data confidentiality. Through data redundancy, replication, and incentive mechanisms, distributed storage systems enhance the overall robustness of the system, effectively mitigating the risks of single points of failure.
In the IoV, distributed storage demonstrates significant advantages, particularly in terms of scalability and risk reduction. Regarding scalability, the system can easily handle scenarios such as urban expansion or an increase in the number of vehicles. The use of distributed storage enables the system to adapt to such growth simply by adding more storage nodes, eliminating the need for costly infrastructure upgrades. This design enhances system flexibility and scalability, allowing it to adapt to evolving data storage requirements.
In terms of risk reduction, distributed storage systems mitigate the risk of system downtime caused by single points of failure through data replication and decentralized storage. Even if a node experiences a technical failure, other nodes can continue to provide services, ensuring the continuous availability of data. Additionally, the dispersed storage of data makes the system more resistant to tampering or centralized network attacks, thereby enhancing overall data security. This security enhancement is particularly crucial in applications such as intelligent transportation systems, which involve sensitive traffic information.

3.3. Traffic Sign Detection Model

The application of real-time traffic sign detection in the IoV and intelligent transportation systems not only enhances the intelligence and efficiency of traffic management but also positively impacts the sustainable development of cities, laying the foundation for further innovation in future intelligent transportation systems. The accuracy and speed of traffic sign detection are crucial components of the entire system.

3.3.1. YOLOv5 Model

YOLOv5 is indeed a target detection model that was open-sourced by Ultralytics in May 2020. It is the first YOLO series algorithm written using the PyTorch framework. This model is better suited for deployment in production environments, offers ease of deployment, and boasts fewer parameters. The YOLOv5 model is categorized into various versions, denoted as YOLOv5s, YOLOv5m, YOLOv5l, and YOLOv5x based on the network’s depth and width, with each variant being tailored to specific computational requirements and performance levels. Indeed, in most cases, as the computational complexity of a model increases, its detection accuracy tends to gradually improve. This paper is a modified model based on the latest 7.0 version of YOLOv5. YOLOv5s consists of an input terminal (input), backbone network (backbone), neck network (neck), and prediction network (head). Conv is the most basic part of the network, consisting of Conv2d, BatchNorm2d, and SiLU activation functions. The data are initially augmented using Mosaic data in the input stage, which serves to enhance data diversity and enhance training efficiency. The backbone network uses a simplified version of BottleneckCSP, the C3 module, which greatly reduces the number of parameters. The neck network uses the PANet network and adopts the FPN+PAN structure [47]. In contrast, the FPN structure transfers deep semantic features to shallower layers, thereby augmenting semantic information at multiple scales. The PAN structure transfers shallow positioning information to deeper layers, thereby improving positioning capabilities at multiple scales. The neck network also incorporates a fast spatial pyramid pooling (SPPF) module to facilitate the fusion of local and global features. Finally, the resulting adaptive size output is passed to the neck network. In YOLOv5, there is a challenge in balancing accuracy and inference speed, as improving model accuracy may increase the computational burden, thus negatively impacting performance. Particularly, ensuring precise detection and localization of small objects in images, especially in scenarios with occlusions or dense target presence, poses a challenging problem. Ensuring real-time performance is crucial for key applications such as autonomous driving and video surveillance, making it an urgent challenge to ensure that the model can perform rapid and efficient inference in real-time scenarios. To address these issues, researchers often refine the model architecture to strike a balance between accuracy and inference speed, involving the optimization of network structures and the introduction of attention mechanisms, among other improvements [48]. Additionally, the adoption of advanced data augmentation techniques and sample generation methods, along with optimized post-processing techniques, holds the promise of enhancing the model’s capability in detecting small targets and improving robustness, especially when facing challenges like sample imbalance and annotation issues. Strengthening research in domain adaptation and transfer learning is also crucial to ensuring model versatility, enabling adaptation to diverse datasets and environments, and ultimately enhancing performance across various application scenarios [49]. The network structure of YOLOv5 is shown in Figure 6.

3.3.2. Coordinate Attention Mechanism

The primary purpose of introducing attention mechanisms is to enable a model to focus more selectively on specific parts of the input data, enhancing its ability to capture and process important information. This introduction helps the model to more effectively learn the relationships within the input data, mitigating the impact of irrelevant or redundant information and thereby improving overall model performance. By selectively concentrating on specific regions relevant to the task, attention mechanisms contribute to boosting the model’s accuracy, reducing interference from irrelevant information, and simultaneously enhancing the model’s robustness and adaptability. Additionally, this mechanism aids in addressing scale-related challenges, allowing the model to handle targets of different scales more effectively. Moreover, it alleviates computational burdens to some extent, improving the efficiency of the model’s inference process.
To enhance the YOLOv5 feature extraction network’s ability to accurately capture position signals and concentrate on critical feature regions, an integrated coordinate attention module (CA) is introduced into the existing network architecture [50]. The introduction of CA significantly enhances the model’s performance in multiple aspects. Firstly, this mechanism markedly improves spatial localization accuracy, reducing the risks of false positives and false negatives. This results in more precise and reliable performance, particularly when dealing with challenges such as occlusion, deformation, and complex scenes in tasks like object detection, enhancing the model’s robustness. Secondly, the coordinate attention mechanism contributes to the fine-grained learning of features within input data by allowing deep learning models to discern subtle variations, thereby increasing the model’s sensitivity to minor changes. Lastly, by optimizing the utilization of computational resources, this mechanism improves the overall computational efficiency of the model, providing higher efficacy for practical applications. Overall, the coordinate attention mechanism proves instrumental in advancing spatial localization, bolstering robustness, and enhancing computational efficiency, thereby positively impacting various performance metrics of the model. The CA module uses one-dimensional feature encoding, modeling both channel and spatial directions to retain original spatial information and rich position information. By combining parallel information from both channel and spatial dimensions, the model enhances its focus on important features while reducing background noise interference, generating better quality feature maps and a better positioning of sensitive areas. The coordinate attention mechanism can be broken down into two fundamental components: coordinate information embedding and coordinate attention generation. These components work together to establish a lasting connection with the target. Figure 7 is a structural diagram of the coordinate attention mechanism.
The first step is coordinate information embedding. To ensure the accuracy of capturing spatial position information, we decompose the global pooling operations, as shown in Equation (1). Specifically, we split two-dimensional global pooling into two separate one-dimensional encoding processes.
Z c = 1 H × W i = 1 H j = 1 W x c i , j
Specifically, we extract information separately from both the horizontal and vertical dimensions. We employ a pair of pooling kernels with sizes (H, 1) and (1, W) to perform feature encoding in the horizontal and vertical directions for each channel of the input feature, thus obtaining perceptual features in both directions, as shown in Equations (2) and (3).
Z c h h = 1 W 0 i W X c h , i
Z c w w = 1 H 0 i H X c j , w
where the subscript c represents the channel of the feature vector, Z c h represents the information we obtain in the vertical direction, and Z c w represents the perceptual information we obtain in the horizontal direction. Here, X c represents the input of the previous layer network.
The second step involves generating coordinated attention. After gathering information from both the vertical and horizontal directions, the next step is to combine it. Then, a convolutional transformation function, denoted by F 1 , is applied to compress the channel. This process produces an attention graph (f) that captures spatial information in both the horizontal and vertical directions, and the symbol δ signifies the activation function used in the process, as shown in Equation (4).
f = δ F 1 Z h , Z w
Once the attention map is obtained, tensor f is divided into two separate tensors, f h and f w , along the spatial dimension. After a 1 × 1 convolutional transformation and the sigmoid activation function, the final region weights are obtained. The weight in the vertical direction is denoted by g h , while the weight in the horizontal direction is represented by g w , as shown in Equations (5) and (6). The adjusted attention map is expressed as y c , with σ signifying the sigmoid function and F h and F w indicating 1 × 1 convolution operations, as shown in Equation (7).
g h = σ F h f h
g w = σ F w f w
y c i , j = x c i , j × g c h i × g c w j
In this paper, the coordinate attention mechanism is incorporated into both C3 modules. This enhancement not only reduces the network’s depth, saving a significant amount of computational resources, but also significantly improves efficiency. The new C3-CA module is capable of capturing global feature information comprehensively, thereby utilizing the attention mechanism more effectively.

3.3.3. Loss Function Improvement

IoU loss is a loss function that directly measures the IoU value between the predicted bounding box and the true bounding box and optimizes it as the goal. When the IoU value is low, the gradient of the loss function becomes very small, resulting in a long training time. In YOLOv5, CIou Loss is introduced as the loss function of bounding box regression, and binary cross-entropy loss (BEC Loss) is used for handling classification tasks. In this paper, the Wise-IoU v3 loss function is employed for bounding box regression in the model, replacing CIou [51].
The method adopted by Wise-IoU v3 offsets the negative impact of geometric factors, such as distance and aspect ratio, on the model [52]. In the case of a high overlap between the prediction box and the target box, the loss function is implemented by weakening the penalty of the geometric factors. This allows the model to improve its generalization capability with minimal training intervention. The schematic diagram of the Wise-IoU v3 loss function used in this study is shown in Figure 8.
In the diagram, W and H correspond to the predicted box’s width and height, while W g t and H g t represent the actual box’s width and height. W i and H i stand for the width and height of the overlapping area between the predicted box and the actual box. S u represents the combined area of overlap between the predicted box and the actual box, while L i o u is a measure of the loss incurred when gauging the level of overlap between the predicted box and the actual box, as shown in Equations (8) and (9).
S u = W H + W g t H g t W i H i
L i o u = 1 W i H i S u
The β outlier and λ gradient gain are mainly determined by the hyperparameters α and δ . β is utilized to gauge the extent of irregularity in the predicted box. A reduced irregularity corresponds to an anchor box of superior quality. By suitably tuning these hyperparameters, it becomes possible to establish a non-monotonic focus function. This function, in turn, allocates smaller gradient gains to prediction boxes with substantial outliers. This adjustment effectively reduces the harmful impact of gradient on prediction boxes with lower-quality training samples. Combining the above formulas yields the formula for Wise-IoU v3, as shown in Equation (11).
λ = β δ α β δ
L W i o u V 3 = L i o u exp x p x g t 2 + y p y g t 2 W g 2 + H g 2 * λ

3.3.4. BiFPN Feature Fusion Network

Feature pyramid networks (FPNs) use a top-down approach to merge features, as shown in Figure 9a [53]. The objective is to combine low-level positional information with high-level semantic information in order to improve the network’s feature extraction capability. Nonetheless, as features are transmitted through the network, there is potential for the loss of more detailed feature information. To address the limitation of feature pyramid networks that can only transmit information in a top-down manner, Liu et al. [47] proposed the Path Aggregation Network (PAN), as shown in Figure 9b. The PAN introduces an information channel that flows in a bottom-up manner within the feature pyramid structure. This approach helps mitigate the loss of feature information and ultimately enhances detection performance. Nevertheless, when employing this structure for small object detection, the rate of feature reuse is limited, and there is a risk of losing some information due to extensive upsampling and downsampling operations applied to the original features. The Google Brain team proposed an improved version of PANet called Bidirectional Feature Pyramid Network (BiFPN) [54], which is shown in Figure 9c. BiFPN improves the structure of PANet by removing the part with only one input node.
This article is inspired by the BiFPN idea and improves the neck of YOLOv5. Based on the original PAN structure, it introduces skip connections, which helps to effectively fuse features and improve detection accuracy.

3.3.5. GGS Module

Depth-wise separable convolution (DSC) is a lightweight convolutional structure that can effectively reduce the computational burden but may lead to a significant decrease in detection accuracy. DSC splits the information in each channel during processing, which may result in the loss of a large number of hidden connections, thereby reducing the feature extraction ability and making it less powerful than ordinary convolution operations. To overcome this shortcoming, this study adopts an improved DSC structure, namely, GSConv [55]. Compared with standard convolution, GSConv has fewer parameters and is more suitable for building lightweight detection models.
As shown in Figure 10, GSConv consists of standard convolution, DSC, and random sorting. First, downsampling is performed with a convolution operation; then, the results of the two convolution operations are merged together using deep separable convolution. Finally, a random sorting operation is performed to ensure that the channel numbers of the previous two convolution operations are arranged adjacent to each other, maintaining implicit connections among channels and increasing the diversity of features. This approach preserves the quality of the feature map while minimizing its impact on the model’s inference time.
In YOLOv5, we adopt an improved convolutional module called GGS, which consists of three key components, i.e., GSConv, Group Norm (GN) [56], and the SMU activation function [57], replacing the traditional CBS convolutional module consisting of a standard convolutional layer, Batch Norm (BN), and the SiLU activation function. In most cases, although BN can improve the speed of training and convergence, when the batch size is too small, performance may decrease. This occurs because the preceding batch of data may not accurately represent the distribution of the entire input data, leading to a gradual rise in the error rate of BN. GN is a new normalization method that can replace BN. Its working mechanism is slightly different from that of BN, as shown in Figure 11. The key idea of GN is to normalize the information within each channel independently, rather than relying on the statistical information of the entire batch as in BN. This makes GN a better choice for certain specific application scenarios, particularly when dealing with small batch sizes or inconsistent input data sizes, as it tends to deliver more stable performance. In addition, GN can reduce computational complexity, because the normalization of each group is performed independently, as shown in Figure 12. As illustrated in Figure 13, when comparing the error rates of the two, it becomes evident that GN outperforms the other.
The SMU activation function represents an enhanced iteration of Leaky ReLU, offering improved smoothness and non-linearity. It aids in the effective training of deep neural networks. SMU achieves smoothness by dividing the input into positive and negative parts and using a logarithmic function to process the negative part. This design equips SMU to excel in various tasks, including classification, object detection, and semantic segmentation. It is worth noting that e r f refers to the Gaussian error function, as shown in Equations (12) and (13).
f S M U x , α x , μ = 1 + α x + 1 α x · e r f μ 1 α x 2
e r f x = 2 π 0 x e t 2 d t
The GGS convolutional module effectively reduces the computational burden with GSConv while incorporating the GN layer to significantly reduce the impact of the batch size on training performance. This combination not only improves the trainability of the model but also exhibits strong performance in feature extraction. Using the SMU activation function, the smoothness and non-linearity of this activation function enable it to better extract and represent features. It helps the model better capture complex patterns and information in the input data. Experimental results have demonstrated that the utilization of the GGS convolutional module can substantially enhance the training performance of neural networks. This enhancement is evident in higher detection accuracy and improved overall performance. This holds particular significance for applications in computer vision, such as object detection. It can enhance model accuracy while optimizing resource utilization and training time.

3.3.6. GGS-YOLO Detection Model

This paper proposes a new target detection model named GGS-YOLO. The structure of the model is shown in Figure 14. This model is an improvement and innovation based on the original YOLOv5. The major enhancements include replacing the CBS module with GGS, incorporating the CA mechanism ahead of both C3 modules to enhance the network’s feature extraction capabilities. This aims to make the model more intelligent in selecting and enhancing key features. Furthermore, we also replace the original CIoU with Wise-IoU to enhance the precision of target detection, leading to improved accuracy. The introduction of the BiFPN feature fusion network could help to better integrate multilevel feature information, thus improving performance in target detection. The introduction of BiFPN makes GGS-YOLO more reliable in detecting targets in various complex scenarios.

4. Experimentation and Evaluation

In this section, firstly, we report the determination of the appropriate values of the Wise-IoU v3 hyperparameters through experiments. Next, we report on the ablation experiments conducted to evaluate the improvement in the overall performance of the improved parts. Finally, we report on the comparative experiments conducted to detail the advantages and improvements of the proposed method compared with other methods.

4.1. Dataset

The dataset utilized in this paper was Chinese Traffic Signs Dataset (CCTSDB), which was created by Changsha University of Science and Technology in 2021 [58]. The dataset comprises a total of 12,000 images, and each image is accompanied by corresponding annotation information. These images cover a variety of road conditions, including highways, urban roads, and rural roads, as well as various complex weather conditions, such as rainy days, snowy days, foggy days, weak light at night, and strong light during the day and night. These conditions significantly amplify the complexity of traffic sign detection. The dataset categorizes traffic signs into three main groups: mandatory signs, prohibitory signs, and warning signs. For experimental purposes, the dataset was split into two subsets, with 9000 images being used for training the model and 3000 images being employed for evaluating the model’s performance. Some images from the dataset are shown in Figure 15.

4.2. Laboratory Environment

This experiment was carried out on the Ubuntu 20.04 operating system, using a system with an Intel(R) Xeon(R) Gold 5222 CPU @ 3.80 GHz, an NVIDIA RTX 3090 24 GB GPU, and total system memory of 128 GB. The experiment used Python version 3.8 and CUDA 11.8 acceleration. In terms of deep learning framework, PyTorch 2.0.1 was used for model training. During the training stage, the following parameters were set: the total training period (epochs) was 300; the batch size per batch was 16; and eight processes (workers) were used to accelerate the data processing and the training process.

4.3. Evaluation

In this paper, the performance of the model was evaluated from various angles, and the following metrics were employed: precision, recall, average precision (AP), mean average precision (mAP), and parameter count (Params). Precision assessed the fraction of traffic signs that the model correctly predicted among all the model’s predictions. Recall quantifies the ratio of all correctly predicted traffic signs to all actual signs. Here, TP stands for the count of true-positive samples, which are actual positive signs correctly predicted as positive by the model. FP represents the count of true-negative samples incorrectly predicted as positive by the model, and FN represents the count of true-positive samples erroneously predicted as negative by the model.
P = T P T P + F P
R = T P T P + F N
AP quantifies the area under the precision–recall curve and serves as a comprehensive metric that considers both precision and recall in the evaluation of model performance. mAP is employed to assess the accuracy of multi-class object detection. It is calculated as the average of the AP values for all classes. In this context, N represents the total number of classes, and A P n represents the AP value of the nth class.
A P = 0 1 P t d t
m A P = n = 1 N A P n N
Furthermore, to assess the model’s size and speed, we incorporated parameter count as an indicator. A smaller number of parameters indicates a more lightweight model.

4.4. Experimental Results

We introduced the Wise-IoU v3 loss function to improve model performance. These hyperparameters may have different effects on different models and datasets. To attain the optimal performance of our model, we carried out a series of controlled experiments encompassing five different combinations of hyperparameters, as shown in Table 1. The bolded values in Table 1 represent the best results obtained from these experiments. These experiments aimed to determine which parameter configuration could achieve the best detection performance. After careful adjustment and comparison, we found that the model achieved the highest level of average accuracy when α = 1.2 and δ = 6 , which means that the overall detection effect reached a state close to optimal performance.
Based on the results of the ablation experiments presented in Table 2, it is evident that each enhancement has a positive influence on the performance of the model. The optimal outcomes from these ablation experiments are highlighted in bold in Table 2. First, model A introduces the CA mechanism based on YOLOv5, which improves accuracy by 8.7% while reducing the number of parameters by 0.6 × 10 7 . This improvement not only increases mAP by 0.9% but also helps better capture the target in the feature extraction process, while preserving shallow details, thus obtaining more effective feature details. Model B adopts Wise-IoU as the loss function, which increases the mAP value by 0.5%. This suggests that the loss function associated with the dynamic non-monotonic focusing mechanism contributes to the optimization of the model. Model C introduces BiFPN, which improves all indicators, especially the recall rate (by 5.1%). This indicates that the improved model has significantly improved target detection ability. Model D adopts the GGS module, which, although accuracy fluctuates, increases the mAP value by 0.9% while reducing the model parameters by 0.48 × 10 7 . This indicates that the GGS module not only helps to build a lightweight model but also effectively assists in network feature extraction. Model H is the improved GGS-YOLO, which reduces the number of parameters by 0.34 × 10 7 compared with YOLOv5 while increasing the mAP value by 4.9%. This achieves a detection effect with fewer parameters and higher average accuracy.

4.5. Comparative Test

To delve deeper into the exceptional performance of GGS-YOLO in traffic sign detection, we conducted an extensive comparison on the CCTSDB dataset. This comparison involved evaluating GGS-YOLO against several other detection algorithms, including Faster R-CNN, YOLOv3, YOLOv5s, YOLOv7-tiny, YOLOv8n, and YOLOv8s. The bolded values in Table 3 represent the best results obtained from these comparison experiments. Due to multiple downsampling operations, the classic algorithm Faster R-CNN suffers from the problem of losing small target information, resulting in an mAP value of only 73.4%. However, it is worth noting that although YOLOv7-tiny performs well in terms of accuracy, with accuracy of 87.5%, GGS-YOLO achieves a higher mAP value. In summary, the overall results demonstrate that GGS-YOLO outperforms other models on the CCTSDB dataset, while maintaining a relatively low parameter count. This superiority is particularly evident in the context of small target detection, underscoring its exceptional performance. This holds significant importance in the field of traffic sign detection. As depicted in Figure 16, the enhanced model exhibits a faster convergence rate, characterized by lower loss values and improved model convergence capabilities.
Figure 17 shows the visual detection results of YOLOv5s and GGS-YOLO in the CCTSDB dataset. In the upper section, you can observe YOLOv5s, while the lower part displays GGS-YOLO. In the initial column of images, it’s evident that both YOLOv5s and our proposed approach accurately detect traffic signs. However, the traffic signs detected by our method exhibit higher confidence, indicating that our proposed CA and BiFPN method is more precise in localizing traffic signs. In the second column of images, the original YOLOv5s mistakenly detected a sign on the billboard next to it, while our method was able to accurately distinguish between traffic signs and billboards. In the third column of images, we assessed the detection performance in challenging environments. The results indicate that our method, when compared to YOLOv5s, exhibited superior confidence in detecting traffic signs under such complex conditions.
The experimental results underscore the significance and effectiveness of integrating innovative technologies in the field of traffic sign detection. This research indicates that by integrating and optimizing innovative technologies, the accuracy of traffic sign detection markedly improves. These integration and optimization not only enhance the model’s comprehensive ability to recognize traffic signs in complex road environments but are also crucial to ensuring the safety and efficiency of autonomous driving and connected vehicle technologies. It is noteworthy that by reducing model parameters, the efficiency and simplicity of the model are also improved, which is particularly important for resource-constrained in-vehicle systems.

5. Conclusions

This paper introduces a traffic sign detection algorithm called GGS-YOLO, which is an improved version of YOLOv5. To enhance the sustainability of the traffic sign detection framework, the algorithm incorporates blockchain technology. By combining blockchain technology with traffic sign detection, the goal is to improve the robustness and security of the IoV, while significantly saving computational resources. The GGS-YOLO algorithm employs a series of improvement measures, including the introduction of the C3-CA module, which enhances the ability to capture global feature information using improved CA. To enhance the multi-scale feature fusion capability, improvements were made to the neck section by introducing the BiFPN feature fusion network. Additionally, the Wise-IoU v3 bounding box loss function was introduced to better guide the model in learning accurate boundaries of targets. To improve the lightweight performance of the model, the algorithm introduces the GGS module, incorporating GSconv technology. Experimental results demonstrate that the model performs well in terms of accuracy. By integrating blockchain technology, not only can the sustainability of storage and computational resources be ensured, but the security of data transmission is also enhanced. However, this solution still faces some issues that require further research, including how to compress the number of data transmitted in blockchain and addressing potential false positives and false negatives in the detection model. These challenges will be the focus of future work.

Author Contributions

Conceptualization, Y.L. and Q.Q.; Methodology, Y.L. and H.Z.; Software, Y.L., H.Z. and J.L.; Validation, H.Z., J.L. and N.N.X.; Formal analysis, Y.L., Y.Z. and N.N.X.; Investigation, Y.L., Q.Q. and Y.Z.; Writing—original draft preparation, Y.L. and Q.Q.; Writing—review and editing, Y.L., H.Z. and N.N.X.; Project administration, H.Z.; Funding acquisition, Y.L. and H.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by National Natural Science Foundation of China under grant 61963017; in part by Shanghai Science and Technology Program, China, under grant 23010501000; in part by Shanghai Educational Science Research Project, China, under grant C2022056; in part by Humanities and Social Sciences of Ministry of Education Planning Fund, China, under grant 22YJAZHA145.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data presented in this study are available upon request from the corresponding author. The data are not publicly available due to restrictions.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Ali, M.S.; Vecchio, M.; Pincheira, M.; Dolui, K.; Antonelli, F.; Rehmani, M.H. Applications of blockchains in the Internet of Things: A comprehensive survey. IEEE Commun. Surv. Tutor. 2018, 21, 1676–1717. [Google Scholar] [CrossRef]
  2. De Vries, A.; Stoll, C. Bitcoin’s growing e-waste problem. Resour. Conserv. Recycl. 2021, 175, 105901. [Google Scholar] [CrossRef]
  3. Liu, Y.; Fang, Z.; Cheung, M.H.; Cai, W.; Huang, J. An incentive mechanism for sustainable blockchain storage. IEEE/ACM Trans. Netw. 2022, 30, 2131–2144. [Google Scholar] [CrossRef]
  4. Liu, C.; Li, S.; Chang, F.; Wang, Y. Machine vision based traffic sign detection methods: Review, analyses and perspectives. IEEE Access 2019, 7, 86578–86596. [Google Scholar] [CrossRef]
  5. Yang, Y.; Wu, F. Real-time traffic sign detection via color probability model and integral channel features. In Proceedings of the Pattern Recognition: 6th Chinese Conference, CCPR 2014, Changsha, China, 17–19 November 2014; Proceedings, Part II 6. Springer: Berlin/Heidelberg, Germany, 2014; pp. 545–554. [Google Scholar]
  6. Zaklouta, F.; Stanciulescu, B. Real-time traffic sign recognition in three stages. Robot. Auton. Syst. 2014, 62, 16–24. [Google Scholar] [CrossRef]
  7. Girshick, R.; Donahue, J.; Darrell, T.; Malik, J. Rich feature hierarchies for accurate object detection and semantic segmentation. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Columbus, OH, USA, 23–28 June 2014; pp. 580–587. [Google Scholar]
  8. Zhang, J.; Xie, Z.; Sun, J.; Zou, X.; Wang, J. A cascaded R-CNN with multiscale attention and imbalanced samples for traffic sign detection. IEEE Access 2020, 8, 29742–29754. [Google Scholar] [CrossRef]
  9. Wang, F.; Li, Y.; Wei, Y.; Dong, H. Improved faster rcnn for traffic sign detection. In Proceedings of the 2020 IEEE 23rd International Conference on Intelligent Transportation Systems (ITSC), Rhodes, Greece, 20–23 September 2020; pp. 1–6. [Google Scholar]
  10. Redmon, J.; Divvala, S.; Girshick, R.; Farhadi, A. You only look once: Unified, real-time object detection. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Honolulu, Hawaii, 21–26 July 2016; pp. 779–788. [Google Scholar]
  11. Liu, W.; Anguelov, D.; Erhan, D.; Szegedy, C.; Reed, S.; Fu, C.Y.; Berg, A.C. Ssd: Single shot multibox detector. In Proceedings of the Computer Vision–ECCV 2016: 14th European Conference, Amsterdam, The Netherlands, 11–14 October 2016; Proceedings, Part I 14. Springer: Berlin/Heidelberg, Germany, 2016; pp. 21–37. [Google Scholar]
  12. Wang, J.; Chen, Y.; Dong, Z.; Gao, M. Improved YOLOv5 network for real-time multi-scale traffic sign detection. Neural Comput. Appl. 2023, 35, 7853–7865. [Google Scholar] [CrossRef]
  13. Chen, J.; Jia, K.; Chen, W.; Lv, Z.; Zhang, R. A real-time and high-precision method for small traffic-signs recognition. Neural Comput. Appl. 2022, 15, 1–13. [Google Scholar] [CrossRef]
  14. Zhang, J.; Huang, M.; Jin, X.; Li, X. A real-time Chinese traffic sign detection algorithm based on modified YOLOv2. Algorithms 2017, 10, 127. [Google Scholar] [CrossRef]
  15. Lin, S.; Zhang, Z.; Tao, J.; Zhang, F.; Fan, X.; Lu, Q. Traffic Sign Detection Based on Lightweight Multiscale Feature Fusion Network. Sustainability 2022, 14, 14019. [Google Scholar] [CrossRef]
  16. Changzhen, X.; Cong, W.; Weixin, M.; Yanmei, S. A traffic sign detection algorithm based on deep convolutional neural network. In Proceedings of the 2016 IEEE International Conference on Signal and Image Processing (ICSIP), Beijing, China, 13–15 August 2016; pp. 676–679. [Google Scholar]
  17. Khan, J.A.; Yeo, D.; Shin, H. New dark area sensitive tone mapping for deep learning based traffic sign recognition. Sensors 2018, 18, 3776. [Google Scholar] [CrossRef] [PubMed]
  18. Jaramillo-Alcazar, A.; Govea, J.; Villegas-Ch, W. Advances in the Optimization of Vehicular Traffic in Smart Cities: Integration of Blockchain and Computer Vision for Sustainable Mobility. Sustainability 2023, 15, 15736. [Google Scholar] [CrossRef]
  19. Wang, S.; Zhang, Y.; Zhang, Y. A blockchain-based framework for data sharing with fine-grained access control in decentralized storage systems. IEEE Access 2018, 6, 38437–38450. [Google Scholar] [CrossRef]
  20. Zhang, M.; Wang, S.; Zhang, P.; He, L.; Li, X.; Zhou, S. Protecting data privacy for permissioned blockchains using identity-based encryption. In Proceedings of the 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), Chengdu, China, 15–17 March 2019; pp. 602–605. [Google Scholar]
  21. Xu, C.; Wu, H.; Liu, H.; Gu, W.; Li, Y.; Cao, D. Blockchain-oriented privacy protection of sensitive data in the internet of vehicles. IEEE Trans. Intell. Veh. 2022, 8, 1057–1067. [Google Scholar] [CrossRef]
  22. Liang, W.; Tang, M.; Long, J.; Peng, X.; Xu, J.; Li, K.C. A secure fabric blockchain-based data transmission technique for industrial Internet-of-Things. IEEE Trans. Ind. Inform. 2019, 15, 3582–3592. [Google Scholar] [CrossRef]
  23. Si, H.; Sun, C.; Li, Y.; Qiao, H.; Shi, L. IoT information sharing security mechanism based on blockchain technology. Future Gener. Comput. Syst. 2019, 101, 1028–1040. [Google Scholar] [CrossRef]
  24. Cai, C.; Yuan, X.; Wang, C. Towards trustworthy and private keyword search in encrypted decentralized storage. In Proceedings of the 2017 IEEE International Conference on Communications (ICC), Paris, France, 21–25 May 2017; pp. 1–7. [Google Scholar]
  25. Gao, D.; Wang, S.; Liu, Y.; Jiang, W.; Li, Z.; He, T. Spoofing-jamming attack based on cross-technology communication for wireless networks. Comput. Commun. 2021, 177, 86–95. [Google Scholar] [CrossRef]
  26. Shen, M.; Tang, X.; Zhu, L.; Du, X.; Guizani, M. Privacy-preserving support vector machine training over blockchain-based encrypted IoT data in smart cities. IEEE Internet Things J. 2019, 6, 7702–7712. [Google Scholar] [CrossRef]
  27. Magsi, A.H.; Yovita, L.V.; Ghulam, A.; Muhammad, G.; Ali, Z. A Content Poisoning Attack Detection and Prevention System in Vehicular Named Data Networking. Sustainability 2023, 15, 10931. [Google Scholar] [CrossRef]
  28. Gao, F.; Zhu, L.; Gai, K.; Zhang, C.; Liu, S. Achieving a covert channel over an open blockchain network. IEEE Netw. 2020, 34, 6–13. [Google Scholar] [CrossRef]
  29. Gao, D.; Liu, Y.; Hu, B.; Wang, L.; Chen, W.; Chen, Y.; He, T. Time Synchronization based on Cross-Technology Communication for IoT Networks. IEEE Internet Things J. 2023, 10, 19753–19764. [Google Scholar] [CrossRef]
  30. Gao, D.; Guan, Z.; Zhang, S.; Hu, B. Maximum network throughput based on cross-technology communication for sensor networks. China Commun. 2021, 18, 30–44. [Google Scholar] [CrossRef]
  31. Xu, X.; Zhang, X.; Liu, X.; Jiang, J.; Qi, L.; Bhuiyan, M.Z.A. Adaptive computation offloading with edge for 5G-envisioned internet of connected vehicles. IEEE Trans. Intell. Transp. Syst. 2020, 22, 5213–5222. [Google Scholar] [CrossRef]
  32. Ren, Q.; Man, K.L.; Li, M.; Gao, B.; Ma, J. Intelligent design and implementation of blockchain and Internet of things–based traffic system. Int. J. Distrib. Sens. Netw. 2019, 15, 1550147719870653. [Google Scholar] [CrossRef]
  33. Prashar, D.; Jha, N.; Jha, S.; Joshi, G.P.; Seo, C. Integrating IOT and blockchain for ensuring road safety: An unconventional approach. Sensors 2020, 20, 3296. [Google Scholar] [CrossRef] [PubMed]
  34. Ghimire, B.; Rawat, D.B. Secure, privacy preserving, and verifiable federating learning using blockchain for internet of vehicles. IEEE Consum. Electron. Mag. 2021, 11, 67–74. [Google Scholar] [CrossRef]
  35. Chen, C.; Wu, J.; Lin, H.; Chen, W.; Zheng, Z. A secure and efficient blockchain-based data trading approach for internet of vehicles. IEEE Trans. Veh. Technol. 2019, 68, 9110–9121. [Google Scholar] [CrossRef]
  36. Joshi, G.P.; Perumal, E.; Shankar, K.; Tariq, U.; Ahmad, T.; Ibrahim, A. Toward blockchain-enabled privacy-preserving data transmission in cluster-based vehicular networks. Electronics 2020, 9, 1358. [Google Scholar] [CrossRef]
  37. Kang, J.; Yu, R.; Huang, X.; Wu, M.; Maharjan, S.; Xie, S.; Zhang, Y. Blockchain for secure and efficient data sharing in vehicular edge computing and networks. IEEE Internet Things J. 2018, 6, 4660–4670. [Google Scholar] [CrossRef]
  38. Alfadhli, S.A.; Lu, S.; Chen, K.; Sebai, M. Mfspv: A multi-factor secured and lightweight privacy-preserving authentication scheme for vanets. IEEE Access 2020, 8, 142858–142874. [Google Scholar] [CrossRef]
  39. Chai, H.; Leng, S.; Chen, Y.; Zhang, K. A hierarchical blockchain-enabled federated learning algorithm for knowledge sharing in internet of vehicles. IEEE Trans. Intell. Transp. Syst. 2020, 22, 3975–3986. [Google Scholar] [CrossRef]
  40. Gao, D.; Wang, H.; Guo, X.; Wang, L.; Gui, G.; Wang, W.; Yin, Z.; Wang, S.; Liu, Y.; He, T. Federated Learning Based on CTC for Heterogeneous Internet of Things. IEEE Internet Things J. 2023, 10, 22673–22685. [Google Scholar] [CrossRef]
  41. Xiao, H.; Zhang, W.; Li, W.; Chronopoulos, A.T.; Zhang, Z. Joint clustering and blockchain for real-time information security transmission at the crossroads in C-V2X networks. IEEE Internet Things J. 2021, 8, 13926–13938. [Google Scholar] [CrossRef]
  42. Cui, J.; Ouyang, F.; Ying, Z.; Wei, L.; Zhong, H. Secure and efficient data sharing among vehicles based on consortium blockchain. IEEE Trans. Intell. Transp. Syst. 2021, 23, 8857–8867. [Google Scholar] [CrossRef]
  43. Lu, Y.; Huang, X.; Zhang, K.; Maharjan, S.; Zhang, Y. Blockchain empowered asynchronous federated learning for secure data sharing in internet of vehicles. IEEE Trans. Veh. Technol. 2020, 69, 4298–4311. [Google Scholar] [CrossRef]
  44. Tan, C.; Li, X.; Luan, T.H.; Gu, B.; Qu, Y.; Gao, L. Digital twin based remote resource sharing in internet of vehicles using consortium blockchain. In Proceedings of the 2021 IEEE 94th Vehicular Technology Conference (VTC2021-Fall), Virtual, 27 September–28 October 2021; pp. 1–6. [Google Scholar]
  45. Abdellatif, T.; Brousmiche, K.L. Formal verification of smart contracts based on users and blockchain behaviors models. In Proceedings of the 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS), Paris, France, 26–28 February 2018; pp. 1–5. [Google Scholar]
  46. Krichen, M.; Lahami, M.; Al-Haija, Q.A. Formal methods for the verification of smart contracts: A review. In Proceedings of the 2022 15th International Conference on Security of Information and Networks (SIN), Sousse, Tunisia, 11–13 November 2022. [Google Scholar]
  47. Liu, S.; Qi, L.; Qin, H.; Shi, J.; Jia, J. Path aggregation network for instance segmentation. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Salt Lake City, UT, USA, 18–22 June 2018; pp. 8759–8768. [Google Scholar]
  48. Qi, J.; Liu, X.; Liu, K.; Xu, F.; Guo, H.; Tian, X.; Li, M.; Bao, Z.; Li, Y. An improved YOLOv5 model based on visual attention mechanism: Application to recognition of tomato virus disease. Comput. Electron. Agric. 2022, 194, 106780. [Google Scholar] [CrossRef]
  49. Nacir, O.; Amna, M.; Imen, W.; Hamdi, B. YOLO V5 for traffic sign recognition and detection using transfer learning. In Proceedings of the 2022 IEEE International Conference on Electrical Sciences and Technologies in Maghreb (CISTEM), Tunis, Tunisia, 26–28 October 2022; Volume 4, pp. 1–4. [Google Scholar]
  50. Hou, Q.; Zhou, D.; Feng, J. Coordinate attention for efficient mobile network design. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, Nashville, TN, USA, 20–25 June 2021; pp. 13713–13722. [Google Scholar]
  51. Tong, Z.; Chen, Y.; Xu, Z.; Yu, R. Wise-IoU: Bounding Box Regression Loss with Dynamic Focusing Mechanism. arXiv 2023, arXiv:2301.10051. [Google Scholar]
  52. Li, Y.; Fan, Q.; Huang, H.; Han, Z.; Gu, Q. A Modified YOLOv8 Detection Network for UAV Aerial Image Recognition. Drones 2023, 7, 304. [Google Scholar] [CrossRef]
  53. Lin, T.Y.; Dollár, P.; Girshick, R.; He, K.; Hariharan, B.; Belongie, S. Feature pyramid networks for object detection. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Honolulu, HI, USA, 21–26 July 2017; pp. 2117–2125. [Google Scholar]
  54. Tan, M.; Pang, R.; Le, Q.V. Efficientdet: Scalable and efficient object detection. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, Seattle, WA, USA, 13–19 June 2020; pp. 10781–10790. [Google Scholar]
  55. Li, H.; Li, J.; Wei, H.; Liu, Z.; Zhan, Z.; Ren, Q. Slim-neck by GSConv: A better design paradigm of detector architectures for autonomous vehicles. arXiv 2022, arXiv:2206.02424. [Google Scholar]
  56. Ioffe, S.; Szegedy, C. Batch normalization: Accelerating deep network training by reducing internal covariate shift. Proc. Int. Conf. Mach. Learn. PMLR 2015, 37, 448–456. [Google Scholar]
  57. Biswas, K.; Kumar, S.; Banerjee, S.; Pandey, A.K. SMU: Smooth activation function for deep networks using smoothing maximum technique. arXiv 2021, arXiv:2111.04682. [Google Scholar]
  58. Zhang, J.; Zou, X.; Kuang, L.D.; Wang, J.; Sherratt, R.S.; Yu, X. CCTSDB 2021: A more comprehensive traffic sign detection benchmark. Hum. Centric Comput. Inf. Sci. 2022, 12, 23. [Google Scholar]
Figure 1. System architecture.
Figure 1. System architecture.
Sustainability 16 00171 g001
Figure 2. Data exchange among nodes.
Figure 2. Data exchange among nodes.
Sustainability 16 00171 g002
Figure 3. Car A updates information in its ledger.
Figure 3. Car A updates information in its ledger.
Sustainability 16 00171 g003
Figure 4. Automatic updates of other ledgers.
Figure 4. Automatic updates of other ledgers.
Sustainability 16 00171 g004
Figure 5. Data-sharing process.
Figure 5. Data-sharing process.
Sustainability 16 00171 g005
Figure 6. YOLOv5 network structure.
Figure 6. YOLOv5 network structure.
Sustainability 16 00171 g006
Figure 7. Coordinate attention mechanism.
Figure 7. Coordinate attention mechanism.
Sustainability 16 00171 g007
Figure 8. Wise-IoU v3 schematic diagram.
Figure 8. Wise-IoU v3 schematic diagram.
Sustainability 16 00171 g008
Figure 9. FPN, PANet, and BiFPN structures.
Figure 9. FPN, PANet, and BiFPN structures.
Sustainability 16 00171 g009
Figure 10. GSConv structure.
Figure 10. GSConv structure.
Sustainability 16 00171 g010
Figure 11. Batch normalization (left) and group normalization (right).
Figure 11. Batch normalization (left) and group normalization (right).
Sustainability 16 00171 g011
Figure 12. Group normalization principle diagram.
Figure 12. Group normalization principle diagram.
Sustainability 16 00171 g012
Figure 13. BN and GN error rates.
Figure 13. BN and GN error rates.
Sustainability 16 00171 g013
Figure 14. GGS-YOLO structure.
Figure 14. GGS-YOLO structure.
Sustainability 16 00171 g014
Figure 15. CCTSDB.
Figure 15. CCTSDB.
Sustainability 16 00171 g015
Figure 16. Loss curves of different models.
Figure 16. Loss curves of different models.
Sustainability 16 00171 g016
Figure 17. (ac) Comparison of detection results between YOLOv5s and GGS-YOLO.
Figure 17. (ac) Comparison of detection results between YOLOv5s and GGS-YOLO.
Sustainability 16 00171 g017
Table 1. The impact of different α and δ in Wise-IoU on the detection effect.
Table 1. The impact of different α and δ in Wise-IoU on the detection effect.
( α , δ )P/%R/%mAP@ 0.5/%Params/ 10 9
(1.0, 7)89.279.986.55.67
(1.2, 6)89.881.386.95.67
(1.4, 5)88.581.786.55.67
(1.6, 4)87.881.586.45.67
(2.5, 2)88.279.686.35.67
Table 2. Ablation experiment.
Table 2. Ablation experiment.
MethodCAWise-IoU v3BiFPNGGSP/%R/%mAP@ 0.5/%Params/ 10 9
YOLOv5s 75.572.581.87.1
A 84.273.682.77.04
B 79.176.282.37.1
C 80.877.682.47.1
D 74.678.782.76.62
E 77.780.585.66.7
F 85.281.784.96.72
H85.682.386.76.76
Table 3. Comparative experiment.
Table 3. Comparative experiment.
MethodP/%R/%mAP@ 0.5/%Params/ 10 9
Faster R-CNN59.876.773.4144.5
YOLOv361.672.863.261.5
YOLOv474.973.282.696.9
YOLOv5s75.572.581.87.1
YOLOv7-tiny87.581.282.46.2
YOLOv8n78.970.376.93
YOLOv8s85.476.485.411.2
Ours85.682.386.76.76
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Liu, Y.; Qian, Q.; Zhang, H.; Li, J.; Zhong, Y.; Xiong, N.N. Application of Sustainable Blockchain Technology in the Internet of Vehicles: Innovation in Traffic Sign Detection Systems. Sustainability 2024, 16, 171. https://doi.org/10.3390/su16010171

AMA Style

Liu Y, Qian Q, Zhang H, Li J, Zhong Y, Xiong NN. Application of Sustainable Blockchain Technology in the Internet of Vehicles: Innovation in Traffic Sign Detection Systems. Sustainability. 2024; 16(1):171. https://doi.org/10.3390/su16010171

Chicago/Turabian Style

Liu, Yanli, Qiang Qian, Heng Zhang, Jingchao Li, Yikai Zhong, and Neal N. Xiong. 2024. "Application of Sustainable Blockchain Technology in the Internet of Vehicles: Innovation in Traffic Sign Detection Systems" Sustainability 16, no. 1: 171. https://doi.org/10.3390/su16010171

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop