Abstract

Due to globalization and advances in network technology, the Internet of Vehicles (IoV) with edge computing has gained increasingly more attention over the last few years. The technology provides a new paradigm to design interconnected distributed nodes in Unmanned Aerial Vehicle (UAV)-assisted vehicle networks for communications between vehicles in smart cities. The process hierarchy of the current UAV-assisted networks is also becoming more multifaceted as more vehicles are connected, requiring accessing and exchanging information, performing tasks, and updating information securely. This poses serious issues and limitations to centralized UAV-assisted vehicle networks, directly affecting computing-intensive tasks and data offloading. This paper bridges these gaps by providing a novel, transparent, and secure lifecycle for UAV-assisted distributed vehicle communication using blockchain hyperledger technology. A modular infrastructure for Vehicle-to-Everything (V2X) is designed and ‘B-UV2X’, a blockchain hyperledger fabric-enabled distributed permissioned network-based consortium structure, is proposed. The participating nodes of the vehicle are interconnected with others in the chain of smart cities and exchange different information such as movement, etc., preserving operational logs on the blockchain-enabled immutable ledger. This automates IoV transactions over the proposed UAV-assisted vehicle-enabled consortium network with doppler spread. Thus, for this purpose, there are four different chain codes that are designed and deployed for IoV registration, adding new transactions, updating the ledger, monitoring resource management, and customized multi-consensus of proof-of-work. For lightweight IoV authentication, B-UV2X uses a two-way verification method with the defined hyperledger fabric consensus mechanism. Transaction protection from acquisition to deliverance and storage uses the NuCypher threshold proxy re-encryption mechanism. Simulation results for the proposed B-UV2X show a reduction in network consumption by 12.17% compared to a centralized network system, an increase in security features of up to 9.76%, and a reduction of 7.93% in the computational load for computed log storage.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call