Skip to Content
DronesDrones
  • Article
  • Open Access

25 November 2022

Vehicle to Everything (V2X) and Edge Computing: A Secure Lifecycle for UAV-Assisted Vehicle Network and Offloading with Blockchain

,
,
,
and
1
Department of Computer Science, Sindh Madressatul Islam University, Karachi 74000, Pakistan
2
Department of Computing Science and Information Technology, Benazir Bhutto Shaheed University Lyari, Karachi 75660, Pakistan
3
School of Software Engineering, Shenyang Normal University, Shenyang 110034, China
4
Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou 510006, China
This article belongs to the Special Issue UAV-Assisted Intelligent Vehicular Networks

Abstract

Due to globalization and advances in network technology, the Internet of Vehicles (IoV) with edge computing has gained increasingly more attention over the last few years. The technology provides a new paradigm to design interconnected distributed nodes in Unmanned Aerial Vehicle (UAV)-assisted vehicle networks for communications between vehicles in smart cities. The process hierarchy of the current UAV-assisted networks is also becoming more multifaceted as more vehicles are connected, requiring accessing and exchanging information, performing tasks, and updating information securely. This poses serious issues and limitations to centralized UAV-assisted vehicle networks, directly affecting computing-intensive tasks and data offloading. This paper bridges these gaps by providing a novel, transparent, and secure lifecycle for UAV-assisted distributed vehicle communication using blockchain hyperledger technology. A modular infrastructure for Vehicle-to-Everything (V2X) is designed and ‘B-UV2X’, a blockchain hyperledger fabric-enabled distributed permissioned network-based consortium structure, is proposed. The participating nodes of the vehicle are interconnected with others in the chain of smart cities and exchange different information such as movement, etc., preserving operational logs on the blockchain-enabled immutable ledger. This automates IoV transactions over the proposed UAV-assisted vehicle-enabled consortium network with doppler spread. Thus, for this purpose, there are four different chain codes that are designed and deployed for IoV registration, adding new transactions, updating the ledger, monitoring resource management, and customized multi-consensus of proof-of-work. For lightweight IoV authentication, B-UV2X uses a two-way verification method with the defined hyperledger fabric consensus mechanism. Transaction protection from acquisition to deliverance and storage uses the NuCypher threshold proxy re-encryption mechanism. Simulation results for the proposed B-UV2X show a reduction in network consumption by 12.17% compared to a centralized network system, an increase in security features of up to 9.76%, and a reduction of 7.93% in the computational load for computed log storage.

1. Introduction

The future development of the Internet of Vehicles (IoV) depends on Vehicle to Everything (V2X) applicational maturity [1,2]. However, applications include intent sharing, distributed environment design, bi-directional intercommunication, interactive gaming, and wireless network-based coordinated driving. These developments are anticipated to make the system more efficient, reliable, secure, and diverse, allowing execution of vehicular transactions autonomously [3]. However, in recent advances, the success of these vehicular applications relies on a large amount of generated data, a fusion of data handling, and processing from wireless sensor-based distributed networks that are associated with the vehicles. Therefore, deployed on-road infrastructure guarantees data management in real time while precisely perceiving the environment. Perception and related computation for each vehicle increases the continuity of learning in the smart environment. In fact, it leads to low resource consumption in terms of computing energy, network bandwidth, and storage, due to the high price of precision sensors and the powerful computational processing units (CPUs) used [4]. The usage of low-priced equipment in the IoV domain impacts the performance ratio of systems. Furthermore, it limits local perception capabilities, which directly affects centralized network-based V2X applications. Resource usage, especially energy consumption for computation and high-precision sensor management, substantially reduces the efficiency of vehicular systems in terms of battery life, reducing mileage. In order to improve the use of computational resources, different applications of the IoV have adopted different artificial intelligence (AI)-based methods for dynamic monitoring. This has led to various significant challenges that pose resource-management-related problems in IoV terminals [5].
Beyond these limitations, each IoV node is able to directly interconnect with other nodes in the chain of smart cities, as shown in Figure 1. This is possible because the centralized network-enabled infrastructure provides intercommunication facilities with no repudiation [6]. However, the technology is more robust with vehicular edge computing, fifth-generation networks (5G), and fog/cloud-based system integration. These developments aim to provide a vigorous computational environment, high storage, sensor connectivity, smart sharing and exchanging, and service orientation by leveraging distributed IoV energy usage with low-cost distributed communication [7]. This differs from cloud/fog-enabled technologies, which use an old paradigm where physical proximity between information systems and computing services promised distinct advantages. These advantages include low throughput and latency, high power efficiency, security and privacy protection reliability, reduced network bandwidth usage, and storage-related context awareness. On the other hand, vehicular edge computing integration depends on distributed wireless networks to divide a large number of computing tasks and sensor-based corresponding records/details over the IoV and the edge network. This leads to a quick response by enabling smart vehicles to perform all applications for a distributed IoV network.
Figure 1. The current Vehicle to Everything (V2X) environment.
The current standard of V2X (UAV-assisted network) is categorized into two different parts: short-range dedicated communication and a cellular V2X. Dedicated short-range communication is used as a standard protocol of IEEE 802.11p, while cellular communication follows 5G protocols [8,9], as shown in Figure 1. The combination of short-range and cellular V2X on the existing system is used to gain broader coverage for pilot-distributed applicational facilities with distance transmission, steadier channels, and UAV network-related deployment. The recent of UAV-assisted infrastructure system uses 5G cellular V2X to offload a large amount of data to IoV edge nodes with new frequencies, such as millimeter-wave frequency bands.
However, the offloading problem in a UAV-assisted network creates different challenges in the V2X environment. These include problem segmentation, IoV edge selection and offloading, problem mitigation, and privacy protection, which are becoming widely researched concerns [10]. For instance, edge computing offloading strongly depends on a large-scale ubiquitous base station to handle data and coverage for transmission. It assumes that the current communication resources of the UAV-assisted network are not sufficient for vehicular edge offloading [11]. Therefore, deploying a dense-base station reduces the load of vehicular edge computing-enabled traffic by providing a simple structure to manage all the transactions. However, it is considered a cost-inefficient method for IoV services and locations. To manage these complexities, a middle base station/middle infrastructure with the standard process hierarchy is required to evaluate the requests of IoV devices concurrently. Only a valid service request can pass; otherwise, it is discarded at an initial level.
Major actors are analyzing distributed UAV-assisted vehicular network solutions related to connectivity and offloading for futuristic transportation. One of the main reasons for adopting blockchain hyperledger-enabled distributed architecture in a UAV-assisted vehicular network is to eliminate the dependency on certificate authority [12,13,14,15,16]. The decentralized nature of blockchain ledger technology integrates with different domains of computing to allow new designs in IoV transaction processing, privacy, and security. The modular infrastructure of blockchain technology provides automated transaction execution facilities via distributed applications (DApp). Thus, it ensures information security against malicious attacks during inter/outer-communication between nodes. However, the current system of UAV-assisted vehicle network consumes significant computing resources because no standard protocol for request management has been proposed [17]. For this reason, hyperledger technology is used to provide a customized design for consensus, chaincode execution, privacy and security procedures, and network communication-related facilities, directly reducing resource consumption. In addition, another advantage of this technology is that it provides ledger (log records) preservation and protection in a serverless environment through the proxy threshold re-encryption mechanism.

1.1. Objectives and Contributions

This paper addresses the current issues, challenges, and limitations involved in centralized UAV-assisted vehicle networks. It highlights the changes in the evolution of Vehicle to Everything (V2X) and presents the role of V2X in futuristic transportation development. A number of enhancements/improvements when deploying a UAV-assisted vehicular network with blockchain, including in record scheduling, managing, organizing, optimizing, and offloading in a secure and protected manner in a decentralized environment. By enabling the current design of UAV-assisted V2X to be integrated with a consortium channel’s blockchain structure, the load on vehicular network resources is reduced drastically compared to previous infrastructures. The major contributions of this research paper are as follows:
  • This paper proposes B-UV2X, a novel and secure distributed UAV-assisted vehicular network infrastructure for IoV interconnectivity. The designed system realizes interoperable communication between devices in the V2X environment with blockchain;
  • A blockchain-enabled standardized lifecycle is designed. The main objective is to maintain the process hierarchy throughout transactions acquisition towards deliverance in a secure manner;
  • A consortium network with doppler spread is deployed for edge-enabled IoV systems to handle requests related to permissioned or permissionless environments;
  • To protect individual transactions of the IoV, B-UV2X uses a proxy re-encryption threshold mechanism. Furthermore, a multi-consensus protocol is created with the predefined method of the digital signature of the hyperledger to schedule the list of node transaction executions, which helps in the management of resources;
  • In this paper, three different types (IoV connectivity and data management, record updates, and exchanging) of smart contracts are created and deployed;
  • Finally, this paper highlights the implementation challenges faced in the process of B-UV2X deployment, with future open research questions. Possible solutions are discussed.

1.2. Section Distribution

The remainder of this paper is structured and organized as follows. In Section 2, various related works are studied and investigated to find the current gaps in vehicle-to-everything, UAV-assisted vehicle networks, the IoV, and seamless edge computing services for centralized networks. The problem description, formulations, and related working objectives of the proposed B-UV2X are discussed in Section 3. The experimental results of B-UV2X and related comparisons with other state-of-the-art methods are presented in Section 4. In Section 5, the paper describes different implementation challenges, issues, and limitations, and highlights futuristic objectives as well. Finally, the conclusion of this research is discussed in Section 6.

3. Preliminary Knowledge of the Proposed B-UV2X

This section discusses the fundamentals and critical assumptions of blockchain-enabled distributed technologies in UAV-assisted vehicular networks to create a new paradigm in the IoV. Related problem formulations are discussed as follows:

3.1. Notation, Problem Formulation, and Description

First, to design a UAV-assisted distributed vehicular network lifecycle, the state of the data item is requested by the IoV nodes in a transactional manner; then, the IoV builds encoded data point broadcasts based on the high clique (priority) of the transactional request. Second, these transactional requests must be secure and protected while being transmitted. To ensure this, we present a standardized process hierarchy: (i) data generation (transaction request sent from the IoV devices/nodes), (ii) capturing, (iii) examining, (iv) analyzing, (v) preserving, (vi) sharing/exchanging, and (vii) reporting (details of log recordings), as shown in Figure 2. Finally, the IoV receives encoded data points via the process hierarchy of the proposed B-UV2X lifecycle. In the decoding procedure, the broadcasted logs of UAV-assisted vehicular data points are accepted by the IoV itself. In the design and development, the main objective is to reduce resource usage in terms of IoV-enabled computational energy, network bandwidth consumption, and memory, which directly affect battery life. For the sake of standardization and simplification, we use IoV1, IoV2, IoV3, …., IoVn to denote Internet of Vehicles (IoV) devices; the position coordinates of IoVs in smart cities are as follows: (ax, bx) of IoVn. d1, d2, d3, …, dn represent the transactional requests and related data broadcasted over the UAV-assisted vehicular network. ‘r’ represents the radius of interconnected IoV nodes for communication (or sharing information) in the designed distributed vehicular network.
Figure 2. Block diagram of the proposed lifecycle of B-UV2X.
In order to check that the IoV nodes in the proposed B-UV2X-enabled distributed vehicular network are receiving or sending data points/transactional requests at the same time, the interoperable platform provides a distanced measurement structure that calculates the distance between devices before transmitting requests. The distance between IoV devices is represents as ‘2r’, ‘r’, and ‘r0’, showing the coverage radius of two nodes in the UAV-assisted distributed network. The maximum radius of the distributed IoV network is equal to the distance between locations, which must be less than or equal to the coverage area (‘r’).
With the goal of reducing network bandwidth usage in the distributed environment, we tune the maximum radius of multiple IoVs (maximum in the four interconnected pairs of shared information/transactional requests). Given the maximum area (‘r’) of the distributed network circle, we can obtain the coverage area of a circle of the inscribed graphical domain (such as an equilateral triangle). The length of the sides of the equilateral triangle (which means the area of IoVs/drones) is √four-sides (√4s).
If the size of the IoVs is = √4s or >= √4s, the maximum distance between IoVs is ‘r’, which is directly proportional to √4s. The exterior radius of the designed UAV-assisted distributed vehicular network is 2r. In another case, the exterior is >= 2r.
The vehicle IoVn sends or receives transactional requests for data points dn; then, the UAV-assisted distributed vehicular network schedules transactions tn. In this way, the system can identify from which IoV devices the requested and scheduled transactions originate, as well as where they are shared. In addition, the integration of edge-enabled computation with the proposed B-UV2X lifecycle reduces the load of data offloading. With request/transaction scheduling, the computational processing of the IoVs is reduced by increasing the rate of execution and transmission. In this manner, the cost of information preservation is also reduced.
However, duplicate and redundant scheduled transactions can be discarded before execution. This is because the system verifies and validates request automatically by the use of deployed chain codes (and functions such as IoVReg(), UAVAVLC(), AddNTD(), update() and InfoPre()). The role of a hyperledger expert, the person responsible for initiating the proposed B-UV2X chain and handling the request for participating IoV registrations, is also highlighted in this scenario.

3.2. Proposed Architecture

The operation of the proposed B-UV2X is divided into four phases. First, B-UV2X registers the IoV node in the designed consortium chain after proper verification and validation while obtaining the enrollment request from the nodes and related device stakeholders. For a complete analysis of the registered request, the role of a blockchain hyperledger expert is crucial; this person is responsible for initiating chain transactions, handling a number of requests and related executions, and managing information preservation (records logs), as shown in Figure 3. The data movement hierarchy of this phase is bi-directional in nature. Second, in the distributed vehicular environment, the IoV-enabled captured data is received via a wireless sensor network (which is placed between the first and second phases); the captured data points are processed through the proposed B-UV2X standardized lifecycle, as shown in Figure 3. Initially, data points are collected and data are preprocessed and filtered for different types of noises, such as duplication, shallow data, etc. After that, the system examines and analyzes the data (schedules to execute); if the data have necessary details that require further investigation, then the system preserves the data, transmits them towards execution, and presents a report (category of information of further investigation).
Figure 3. Proposed B-UV2X.
In the third phase, the computational node is placed between the lifecycle and blockchain hyperledger-enabled distributed ledger technology. There, it receives scheduled transactions/data points for execution. Therefore, the performance of B-UV2X is robust while reducing usage of computational energy. This is because edge nodes consume fewer computing resources compared to the fog, cloud, and other customized computational units. The data movement hierarchy of this phase is bidirectional. The fourth phase includes security and privacy operations of the proposed B-UV2X, as shown in Figure 3 and Figure 4. A blockchain hyperledger-enabled consortium modular infrastructure is proposed; the main purpose of this design is to protect data from malicious attackers, provide data integrity, transparency, provenance. organization, and management, and to prevent forgery of and tampering with data, thereby maintaining privacy and security.
Figure 4. Working operation of the proposed B-UV2X security and privacy hierarchy.
In order to maintain privacy and security, we design two channels of inter-communication between inter-connected nodes of the IoV over the distributed UAV-assisted vehicular network, as shown in Figure 4. In this process, a transaction processor is placed, the main objective of which is to handle requests for transactions in the deployed B-UV2X consortium Peer-to-Peer network (P2P). For instance, to reset the stack of transactional requests and schedule transactions and exchanges, we use the REST API and state facilities of hyperledger technology. Multi-proof-of-stack (MPoS), along with chain code (with different functions ()), is designed, created, and deployed to automate verification, validation, transaction execution, and preservation. For storage of IoV-based logs (transactional requests), cloud-edge-enabled distributed immutable storage is utilized, which is considered one of the most customizable and cost-efficient distributed information preservation methods in the domain of blockchain-enabled ledger technology.

3.3. Smart Contracts Implementation

In this section, we discuss the procedure to automate transactional requests of IoVs and process each request through the designed lifecycle of a UAV-assisted vehicular network, responding to these transactions via DApp and records (in the cloud–edge-enabled immutable storage, as mentioned in Table 2 (InfoPre())). For execution (request verification and validation) automation, we designed, created, and deployed chain code with five different functions, multi-consensus protocols, and digital signature, as shown in Table 2. The main objectives of these codes/functions are to provide operations automation in terms of IoV registration (IoVReg()), monitoring stakeholder registration in accordance with the designed lifecycle (UAVAVLC()), schedule the number of transactions, perform related requests executions (AddNTD()), conduct record management (UpdTr()), and preserve (InfoPre()) and exchange information.
Table 2. Chain codes, consensus, and digital signature implementation.

4. Simulations, Results, and Discussion

This section discusses the simulation of the proposed B-UV2X. The results are based on a blockchain hyperledger-enabled consortium modular infrastructure designed for connected nodes of IoVs for a UAV-assisted distributed vehicular network. The proposed B-UV2X was tested on a Core i7 VPro CPU (2.8 base clock speed—3.4 Turbo Boost) with 16 GB RAM, 8 GB shared Iris Xe Graphics, and 1 TB storage/internal SSD. The network connectivity between IoVs and the proposed architecture was 24 MB/s with dedicated channels of distribution. With some assumptions (discussed as follows), the docker of the blockchain hyperledger included:
  • Heterogeneous node connectivity;
  • 4MB size of transactional nodes;
  • Single network bandwidth used
  • Cloud-edge enabled customized distributed storage deployed;
  • Blockchain hyperledger expert initiates a chain of the transactional requests of IoVs, as shown in Figure 5 (the test code of smart contract/chain codes with MPoS consensus is presented, along with the parameters of simulations executions).
    Figure 5. Chain code with MPoS. Test code for simulation of the proposed B-UV2X.
In Figure 6(1–3), the simulation results of the proposed B-UV2X show that it decreases the cost of computing resources by 7.93%, which allows edge-enabled computation (as shown in Figure 3). After evaluation of the computation of B-UAV2X, it is considered to be a good candidates for real-time industrial implementation and scheduling. The operation of this simulation shows that the process initiates when the request management of the proposed lifecycle executes (as shown in Figure 6(3)), the matrices of which are the number of data requests received and the data examined for further executions.
Figure 6. The working operation of the proposed B-UV2X lifecycle: (1) shows the rate of data captured by the IoVs, (2) shows the rate of data collected, and (3) shows that the fluctuation between the data received and the data scheduled for execution.
However, the IoV-enabled self-data-capturing capability was enhanced after the tuning of lifecycle hierarchy, as shown in Figure 4(1–3) and Figure 6(1–3), which is most importantly used for the sake of heuristic reconciliation in smart cities. This capability is also needed because the process hierarchy sends a request to preserve captured records for heuristic investigation. To do this, we manipulate the design of the lifecycle to examine and analyze the collected details in terms of binary color transformation, entropy, extracted critical features, and preserve optimized records, as shown in Figure 7 and Figure 8 (also discussed in the proposed architecture section and highlighted in Figure 3).
Figure 7. IoV-enabled data capture: (1) shows the original image, (2) shows the transformation in the binary color format, (3) shows the extracted features for heuristic purposes, and (4) shows the optimized record preservation.
Figure 8. IoV-enabled data capture: (1) shows the original image, (2) shows the transformation in the binary color format, (3) shows the extracted features for heuristic purposes, and (4) shows the optimized record preservation.
In the entire process of B-UV2X simulations, the blockchain hyperledger expert and registered participating stakeholders can observe the resources utilized in the complete process execution. The consumption of network bandwidth is reduced by 12.17% throughout the execution of each transaction, and security capability is increased by up to 9.76% by protecting individual ledger transactions of UAV-assisted vehicles using the NuCypher threshold proxy re-encryption mechanism (as shown in Figure 9).
Figure 9. Monitoring of resource usage: shows the consumption fluctuation in number of IoVs connected and number of requested transactions.
Observe that the deployment of the chaincodes and related functions (such as IoVReg(), UAVAVLC(), AddNTD(), UpdTr(), and InfoPre()) with MPoS customized consensus policy and edge computing technology decreases the cost of IoV-enabled data scheduling, organization, management, optimization, and preservation. Figure 10 illustrates the fluctuations between the predefined hyperledger consensus and the proposed B-UV2X over the UAV-assisted consortium distributed vehicular network in terms of the number of transactional requests and the number of connected IoVs’ for data verification and validation.
Figure 10. UAV-assisted consortium distributed vehicular network shows the fluctuation between the predefined hyperledger consensus and the proposed B-UV2X.
The evaluation matrices of the proposed B-UV2X are compared with newly published methods (previous state-of-the-art methods) such as “edge intelligence for IoV” [31] and “blockchain-based conditional privacy preservation” [32]. The metrics for this analytical procedure are based on the usage of resources, preservation, protection efficiency (proxy threshold re-encryption level), reliability, privacy, and security. In Table 3, a few more analytical comparisons are discussed, indicating the superiority of the proposed work compared to other state-of-the-art methods. A comparative parameter of the evaluation is presented (as mentioned in Table 3, attribute 3), which helps to measure the fluctuation/improvement of the proposed B-UAV2X compared to other methods.
Table 3. Comparison table: state-of-the-art methods.

6. Conclusions

This paper addresses current problems involving centralized UAV-assisted vehicular networks such as scheduling, offloading, management, optimization, privacy, and security. The key objective of this paper is to address gaps in the design, development, and deployment of distributed vehicular networks for the IoV in smart cities using the blockchain hyperledger. The existing protocol/process hierarchy of IoV-enabled request execution via distributed applications (DApp) is also highlighted. This paper proposes B-UV2X, a secure and novel lifecycle of UAV-assisted vehicular data processing for the IoV, using blockchain consortium architecture. It includes a customized consensus mechanism for multi-proof-of-stack (MPoS), where data offloading can be managed, directly impacting the management of resources as well. Transactional executions of the proposed B-UV2X are fully protected by the NuCypher threshold proxy re-encryption algorithm. The individual ledger/records of the node’s transactions are preserved in immutable storage, such as edge network-enabled cloud storage. The participating stakeholders of the proposed B-UV2X receive details of ledger traceability for the sake of dynamic monitoring of resource management and related IoV node activities in smart city environments. The simulation results of B-UV2X show that it reduces network consumption by 17%, reduces the computing load with preservation by 7.93%, and increases security by 9.76% compared to other state-of-the-art methods.

Author Contributions

A.A.K. wrote the original draft and was responsible for organization, preparation, and analysis. A.A.K., A.A.L., S.A.A., M.S. and Z.G. reviewed and rewrote the draft, performed part of the literature survey, investigated and designed the architecture/framework, were responsible for lifecycle design, code, and presentation, and explored software tools. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the National Natural Science Foundation of China (grant nos. 62250410365, 61902082), and the Guangzhou Science and Technology Planning Project (no. 202102010507).

Institutional Review Board Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors of this paper declare that there are no conflict of interest.

References

  1. Lv, Z.; Qiao, L.; Hossain, M.S.; Choi, B.J. Analysis of Using Blockchain to Protect the Privacy of Drone Big Data. IEEE Netw. 2021, 35, 44–49. [Google Scholar] [CrossRef]
  2. Gumaei, A.; Al-Rakhami, M.; Hassan, M.M.; Pace, P.; Alai, G.; Lin, K.; Fortino, G. Deep Learning and Blockchain with Edge Computing for 5G-Enabled Drone Identification and Flight Mode Detection. IEEE Netw. 2021, 35, 94–100. [Google Scholar] [CrossRef]
  3. Cheema, M.A.; Ansari, R.I.; Ashraf, N.; Hassan, S.A.; Qureshi, H.K.; Bashir, A.K.; Politis, C. Blockchain-based secure delivery of medical supplies using drones. Comput. Netw. 2022, 204, 108706. [Google Scholar] [CrossRef]
  4. Hasan, M.K.; Islam, S.; Shafiq, M.; Ahmed, F.R.A.; Ataelmanan, S.K.M.; Babiker, N.B.M.; Abu Bakar, K.A. Communication Delay Modeling for Wide Area Measurement System in Smart Grid Internet of Things Networks. Wirel. Commun. Mob. Comput. 2021, 2021, 9958003. [Google Scholar] [CrossRef]
  5. Khan, A.A.; Laghari, A.A.; Awan, S.; Jumani, A.K. Fourth Industrial Revolution Application: Network Forensics Cloud Security Issues. In Security Issues and Privacy Concerns in Industry 4.0 Applications; John Wiley & Sons, Inc.: Hoboken, NJ, USA, 2021; pp. 15–33. [Google Scholar] [CrossRef]
  6. Feng, C.; Yu, K.; Bashir, A.K.; Al-Otaibi, Y.D.; Lu, Y.; Chen, S.; Zhang, D. Efficient and Secure Data Sharing for 5G Flying Drones: A Blockchain-Enabled Approach. IEEE Netw. 2021, 35, 130–137. [Google Scholar] [CrossRef]
  7. Li, T.; Liu, W.; Liu, A.; Dong, M.; Ota, K.; Xiong, N.N.; Li, Q. BTS: A Blockchain-Based Trust System to Deter Malicious Data Reporting in Intelligent Internet of Things. IEEE Internet Things J. 2021, 9, 22327–22342. [Google Scholar] [CrossRef]
  8. Khan, A.A.; Laghari, A.A.; Shaikh, A.A.; Dootio, M.A.; Estrela, V.V.; Lopes, R.T. A blockchain security module for brain-computer interface (BCI) with Multimedia Life Cycle Framework (MLCF). Neurosci. Inform. 2021, 2, 100030. [Google Scholar] [CrossRef]
  9. Alsamhi, S.H.; Almalki, F.A.; Afghah, F.; Hawbani, A.; Shvetsov, A.V.; Lee, B.; Song, H. Drones’ Edge Intelligence Over Smart Environments in B5G: Blockchain and Federated Learning Synergy. IEEE Trans. Green Commun. Netw. 2021, 6, 295–312. [Google Scholar] [CrossRef]
  10. Aloqaily, M.; Bouachir, O.; Boukerche, A.; Al Ridhawi, I. Design Guidelines for Blockchain-Assisted 5G-UAV Networks. IEEE Netw. 2021, 35, 64–71. [Google Scholar] [CrossRef]
  11. Shafiq, M.; Tian, Z.; Bashir, A.K.; Cengiz, K.; Tahir, A. SoftSystem: Smart Edge Computing Device Selection Method for IoT Based on Soft Set Technique. Wirel. Commun. Mob. Comput. 2020, 2020, 8864301. [Google Scholar] [CrossRef]
  12. Khan, A.A.; Wagan, A.A.; Laghari, A.A.; Gilal, A.R.; Aziz, I.A.; Talpur, B.A. BIoMT: A State-of-the-Art Consortium Serverless Network Architecture for Healthcare System Using Blockchain Smart Contracts. IEEE Access 2022, 10, 78887–78898. [Google Scholar] [CrossRef]
  13. Luo, S.; Li, H.; Wen, Z.; Qian, B.; Morgan, G.; Longo, A.; Rana, O.; Ranjan, R. Blockchain-Based Task Offloading in Drone-Aided Mobile Edge Computing. IEEE Netw. 2021, 35, 124–129. [Google Scholar] [CrossRef]
  14. Khan, A.A.; Shaikh, A.A.; Shaikh, Z.A.; Laghari, A.A.; Karim, S. IPM-Model: AI and metaheuristic-enabled face recognition using image partial matching for multimedia forensics investigation with genetic algorithm. Multimedia Tools Appl. 2022, 81, 23533–23549. [Google Scholar] [CrossRef]
  15. Abualigah, L.; Diabat, A.; Sumari, P.; Gandomi, A.H. Applications, Deployments, and Integration of Internet of Drones (IoD): A Review. IEEE Sens. J. 2021, 21, 25532–25546. [Google Scholar] [CrossRef]
  16. Khan, A.A.; Shaikh, Z.A.; Belinskaja, L.; Baitenova, L.; Vlasova, Y.; Gerzelieva, Z.; Laghari, A.A.; Abro, A.A.; Barykin, S. A Blockchain and Metaheuristic-Enabled Distributed Architecture for Smart Agricultural Analysis and Ledger Preservation Solution: A Collaborative Approach. Appl. Sci. 2022, 12, 1487. [Google Scholar] [CrossRef]
  17. Shaikh, Z.A.; Khan, A.A.; Teng, L.; Wagan, A.A.; Laghari, A.A. BIoMT Modular Infrastructure: The Recent Challenges, Issues, and Limitations in Blockchain Hyperledger-Enabled E-Healthcare Application. Wirel. Commun. Mob. Comput. 2022, 2022, 813841. [Google Scholar] [CrossRef]
  18. Wang, D.; Wu, M.; He, Y.; Pang, L.; Xu, Q.; Zhang, R. An HAP and UAVs Collaboration Framework for Uplink Secure Rate Maximization in NOMA-Enabled IoT Networks. Remote. Sens. 2022, 14, 4501. [Google Scholar] [CrossRef]
  19. Wang, D.; Zhou, F.; Lin, W.; Ding, Z.; Al-Dhahir, N. Cooperative Hybrid Non-Orthogonal Multiple Access Based Mobile-Edge Computing in Cognitive Radio Networks. IEEE Trans. Cogn. Commun. Netw. 2022, 8, 1104–1117. [Google Scholar] [CrossRef]
  20. Singh, M.P.; Aujla, G.S.; Bali, R.S. Blockchain for the Internet of Drones: Applications, Challenges, and Future Directions. IEEE Internet Things Mag. 2021, 4, 47–53. [Google Scholar] [CrossRef]
  21. Khan, A.A.; Khan, M.M.; Khan, K.M.; Arshad, J.; Ahmad, F. A blockchain-based decentralized machine learning framework for collaborative intrusion detection within UAVs. Comput. Netw. 2021, 196, 108217. [Google Scholar] [CrossRef]
  22. Gupta, R.; Bhattacharya, P.; Tanwar, S.; Kumar, N.; Zeadally, S. GaRuDa: A Blockchain-Based Delivery Scheme Using Drones for Healthcare 5.0 Applications. IEEE Internet Things Mag. 2021, 4, 60–66. [Google Scholar] [CrossRef]
  23. Aujla, G.S.; Vashisht, S.; Garg, S.; Kumar, N.; Kaddoum, G. Leveraging Blockchain for Secure Drone-to-Everything Communications. IEEE Commun. Stand. Mag. 2021, 5, 80–87. [Google Scholar] [CrossRef]
  24. Yahuza, M.; Idris, M.Y.I.; Bin Ahmedy, I.; Wahab, A.W.A.; Nandy, T.; Noor, N.M.; Bala, A. Internet of Drones Security and Privacy Issues: Taxonomy and Open Challenges. IEEE Access 2021, 9, 57243–57270. [Google Scholar] [CrossRef]
  25. Wang, J.; Liu, Y.; Niu, S.; Song, H. Lightweight blockchain assisted secure routing of swarm UAS networking. Comput. Commun. 2021, 165, 131–140. [Google Scholar] [CrossRef]
  26. Mei, Q.; Xiong, H.; Zhao, Y.; Yeh, K.-H. Toward Blockchain-Enabled IoV with Edge Computing: Efficient and Privacy-Preserving Vehicular Communication and Dynamic Updating. In Proceedings of the 2021 IEEE Conference on Dependable and Secure Computing (DSC), Aizuwakamatsu, Japan, 30 January–2 February 2021; pp. 1–8. [Google Scholar] [CrossRef]
  27. Wang, D.; He, T.; Zhou, F.; Cheng, J.; Zhang, R.; Wu, Q. Outage-driven link selection for secure buffer-aided networks. Sci. China Inf. Sci. 2022, 65, 182303. [Google Scholar] [CrossRef]
  28. Al-Hourani, A.; Kandeepan, S.; Lardner, S. Optimal LAP Altitude for Maximum Coverage. IEEE Wirel. Commun. Lett. 2014, 3, 569–572. [Google Scholar] [CrossRef]
  29. He, Y.; Wang, D.; Huang, F.; Zhang, R.; Pan, J. Trajectory Optimization and Channel Allocation for Delay Sensitive Secure Transmission in UAV-Relayed VANETs. IEEE Trans. Veh. Technol. 2022, 71, 4512–4517. [Google Scholar] [CrossRef]
  30. Islam, S.; Badsha, S.; Sengupta, S.; La, H.; Khalil, I.; Atiquzzaman, M. Blockchain-Enabled Intelligent Vehicular Edge Computing. IEEE Netw. 2021, 35, 125–131. [Google Scholar] [CrossRef]
  31. Jiang, X.; Yu, F.R.; Song, T.; Leung, V.C. Edge Intelligence for Object Detection in Blockchain-Based Internet of Vehicles: Convergence of Symbolic and Connectionist AI. IEEE Wirel. Commun. 2021, 28, 49–55. [Google Scholar] [CrossRef]
  32. Yang, J.; Liu, J.; Song, H.; Liu, J.; Lei, X. Blockchain-based Conditional Privacy-Preserving Authentication Protocol with Implicit Certificates for Vehicular Edge Computing. In Proceedings of the 2022 7th International Conference on Cloud Computing and Big Data Analytics (ICCCBDA) 2022, Chengdu, China, 22–24 April 2022; pp. 210–216. [Google Scholar] [CrossRef]
  33. Jing, W.; Fu, X.; Liu, P.; Song, H. Joint resource trading and computation offloading in blockchain enhanced D2D-assisted mobile edge computing. Clust. Comput. 2022, 1–15. [Google Scholar] [CrossRef]
  34. Xu, L.; Ge, M.; Wu, W. Edge Server Deployment Scheme of Blockchain in IoVs. IEEE Trans. Reliab. 2022, 71, 500–509. [Google Scholar] [CrossRef]
  35. Zhang, D.; Yu, F.R.; Yang, R. Blockchain-Based Multi-Access Edge Computing for Future Vehicular Networks: A Deep Compressed Neural Network Approach. IEEE Trans. Intell. Transp. Syst. 2021, 23, 12161–12175. [Google Scholar] [CrossRef]
  36. Wang, K.; Tu, Z.; Ji, Z.; He, S. Faster Service with Less Resource: A Resource Efficient Blockchain Framework for Edge Computing. 2022. Available online: https://assets.researchsquare.com/files/rs-1719287/v1_covered.pdf?c=1654894162 (accessed on 31 October 2022).
  37. Shaikh, Z.A.; Khan, A.A.; Baitenova, L.; Zambinova, G.; Yegina, N.; Ivolgina, N.; Laghari, A.A.; Barykin, S.E. Blockchain Hyperledger with Non-Linear Machine Learning: A Novel and Secure Educational Accreditation Registration and Distributed Ledger Preservation Architecture. Appl. Sci. 2022, 12, 2534. [Google Scholar] [CrossRef]
  38. Ahmed, M.M.; Hasan, M.K.; Shafiq, M.; Qays, O.; Gadekallu, T.R.; Nebhen, J.; Islam, S. A peer-to-peer blockchain based interconnected power system. Energy Rep. 2021, 7, 7890–7905. [Google Scholar] [CrossRef]
  39. Khan, A.A.; Laghari, A.A.; Gadekallu, T.R.; Shaikh, Z.A.; Javed, A.R.; Rashid, M.; Estrela, V.V.; Mikhaylov, A. A drone-based data management and optimization using metaheuristic algorithms and blockchain smart contracts in a secure fog environment. Comput. Electr. Eng. 2022, 102, 108234. [Google Scholar] [CrossRef]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.