Skip to main content

Research on the Security of Beyond-the-Sight Services Based on Blockchain

  • Conference paper
  • First Online:
Blockchain and Trustworthy Systems (BlockSys 2021)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1490))

Included in the following conference series:

  • 1815 Accesses

Abstract

In 2008, blockchain was proposed as the basic technology of Bitcoin, and it is essentially a decentralized database. This technology is widely used in financial industry, data storage, edge computing and other scenarios. With the rapid increase of the number of devices connected to the Internet of Things (IoT), the traditional centralized cloud computing system is unable to satisfy the Quality of Service (QoS) of many IoT applications, especially for areas with real-time. IoT services based on Mobile Edge Computing (MEC) are gradually becoming popular, and the characteristics of the distributed accounting and consensus mechanism of the blockchain can ensure the security of MEC-based IoT services. In this paper, we first summarize the existing blockchain and MEC related technologies, and then propose a future-oriented Internet of Vehicles (IoV) service: beyond-the-sight service. At last, we specifically discuss how the blockchain can ensure the security of beyond-the-sight service in terms of terminal equipment identification and data transmission.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Yaga, D., Mell, P., Roby, N., Scarfone, K.: Blockchain technology overview (2019). arXiv preprint arXiv:1906.11078

  2. Buterin, V.: Ethereum: a next-generation smart contract and decentralized application platform (2014). https://github.com/ethereum/wiki/wiki/%5BEnglish%5D-White-Paper7

  3. Nakamoto, S., Bitcoin, A.: A peer-to-peer electronic cash system. Bitcoin (2008). https://bitcoin.org/bitcoin. pdf4

  4. Wilkinson, S., Boshevski, T., Brandoff, J., Buterin, V.: Storj a peer-to-peer cloud storage network (2014)

    Google Scholar 

  5. Sharma, P.K., Park, J.H.: Blockchain based hybrid network architecture for the smart city. Future Gener. Comput. Syst. 86, 650–655 (2018)

    Article  Google Scholar 

  6. Shao, Q.F., Zhang, Z., Zhu, Y.C., Zhou, A.Y.: Survey of enterprise blockchains. J. Softw. 30, 2571–2592 (2019)

    Google Scholar 

  7. King, S., Nadal, S.: Ppcoin: Peer-to-peer crypto-currency with proof-of-stake. Self-published paper, August 19, 1 (2012)

    Google Scholar 

  8. Moran, T., Orlov, I.: Simple proofs of space-time and rational proofs of storage. In: Boldyreva, A., Micciancio, D. (eds.) CRYPTO 2019. LNCS, vol. 11692, pp. 381–409. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-26948-7_14

    Chapter  Google Scholar 

  9. Larimer, D.: Delegated proof-of-stake (dpos). Bitshare Whitepaper 81, 85 (2014)

    Google Scholar 

  10. Castro, M., Liskov, B., et al.: Practical byzantine fault tolerance. In: OSDI, vol. 99, pp.173–186 (1999)

    Google Scholar 

  11. Paymard, P., Mokari, N.: Resource allocation in pd-noma–based mobile edge computing system: multiuser and multitask priority. Transactions on Emerging Telecommun. Technol. (1), e3631 (2019)

    Google Scholar 

  12. Luo, C., Xu, L., Li, D., Wu, W.: Edge computing integrated with blockchain technologies. In: Du, D.-Z., Wang, J. (eds.) Complexity and Approximation. LNCS, vol. 12000, pp. 268–288. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-41672-0_17

    Chapter  Google Scholar 

  13. Druschel, P., Kaashoek, M.F., Rowstron, A.I.: Revised papers from the first international workshop on peer-to-peer systems (2002)

    Google Scholar 

  14. Yong, L., Fei, L., Lulu, G., Xiang, X.: Feasibility study of automotive identity based on blockchain technology. Autom. Technol 513(6), 20–25 (2018)

    Google Scholar 

  15. Vijayakumar, P., Chang, V., Deborah, L.J., Balusamy, B., Shynu, P.: Computationally efficient privacy preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks. Fut. Gener. Comput. Syst 78, 943–955 (2018)

    Article  Google Scholar 

  16. Arnold, E., Dianati, M., de Temple, R., Fallah, S.: Cooperative perception for 3d object detection in driving scenarios using infrastructure sensors. IEEE Trans. Intell. Transp. Syst (2020)

    Google Scholar 

  17. Christidis, K., Devetsikiotis, M.: Blockchains and smart contracts for the internet of things. IEEE Access 4, 2292–2303 (2016)

    Article  Google Scholar 

Download references

Acknowledgments

We thank all the researchers providing support for the paper. This work was partially supported by the Key-Area Research and Development Program of Guangdong Province (No.2018B010113001).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xuefei Duan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Duan, X., Lu, H., Bai, L., Guo, Z. (2021). Research on the Security of Beyond-the-Sight Services Based on Blockchain. In: Dai, HN., Liu, X., Luo, D.X., Xiao, J., Chen, X. (eds) Blockchain and Trustworthy Systems. BlockSys 2021. Communications in Computer and Information Science, vol 1490. Springer, Singapore. https://doi.org/10.1007/978-981-16-7993-3_29

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-7993-3_29

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-7992-6

  • Online ISBN: 978-981-16-7993-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics