This version is not peer-reviewed.
Submitted:
04 July 2024
Posted:
05 July 2024
You are already at the latest version
A peer-reviewed article of this preprint also exists.
Survey | Technical Challenges | Social Challenges | Ethical Challenges | Blockchain approaches |
---|---|---|---|---|
[12,15,16] | ✓ | |||
[13] | ✓ | ✓ | ||
[14,17,18] | ✓ | ✓ | ||
[19] | ✓ | |||
[20] | ✓ | ✓ | ||
This work | ✓ | ✓ | ✓ | ✓ |
Ref | Challenge | Summary | Advantages | Disadvantages |
---|---|---|---|---|
[42] | Security | Protection mechanism against malicious attacks on the data collected by RSUs of VANET networks using blockchain technology for distributed data storage and smart contracts for access by vehicles and neighboring RSUs through data coins. | Protection against attacks on centralized systems, due to the decentralized architecture. Protection against Brute Force attacks based on asymmetric encryption and signature verification techniques. Protection against malicious RSUs. |
With a small number of involved RSUs in the network there is an increased possibility of malicious tampering and thus the system is unstable. |
[43] | Security | Description and configuration of secure message transmission in geographically defined blockchain systems in VANETs so that they are protected against majority attacks. | It defines those parameters that ensure the secure transmission of messages in VANETs located in a limited geographical area. | Even with a small percentage of malicious nodes, if the delay time of messages from malicious nodes is less than “good” nodes, the 51% attack is quite possible. |
[44] | Security | Protocol for creating secure communications in VANET networks based on the blockchain version of the conditional privacy-preserving authentication (CPPA) protocol | Provides security against various types of attacks such as: Hijacking, 51% resistance to attacks, DDoS, Man-in-the-middle | The average packet delay (APD) of the data is affected by changes in the average speed of the vehicles. |
[45] | Privacy | Protection against transmission of false messages in vehicle transactions in V2V & V2I communications based on authentication through blockchain technology | Efficient methodology because it reduces the dependency on the central authorization authority and the burden on vehicle authentication | It is not a purely decentralized solution because it is based on a relatively small number of servers in the cloud. |
[46] | Decentralization | Blockchain technology consensus mechanism based on node votes for road event transmission | Reliable mechanism in case of knotting. Fewer validation losses than other consensus mechanisms. |
The voting mechanism causes long delays in the transmission of messages (latency). It is impervious to 51% majority attacks. |
[47] | Sensing Accuracy | A methodology that uses blockchain and smart contracts in combination with neural networks to improve location accuracy and share it in VANET networks | Improvement in position accuracy is possible even when access to reference points is interrupted | It does not consider random errors in positioning |
[48] | Audit | Mechanism for recording vehicle announcements based on quality characteristics, based on blockchain technology | It reduces the need for processing power in vehicles | Stored feature policies are not dynamic and do not change. |
Ref | Challenge | Blockchain / Smart Contract |
Consensus mechanism | Techniques/tools | Performance of the methodology |
---|---|---|---|---|---|
[42] | Security | Blockchain | PoW & Practical Byzantine fault tolerance (PBFT) | - | Better performance in computation and transmission times as the number of verification signatures increases, compared to existing solutions (IBV, SPRING, IBCPPA and EAAP) |
[43] | Security | Blockchain | PoW | - | It implements the BIP325 key extraction algorithm to avoid preloading keys and burdening OBUs with storage consumption. The performance of the technique is not affected by the average speed as far as packet loss is concerned |
[44] | Security | Permissionless Blockchain & Smart Contracts (Ethereum) | PoW & Proof-of-Stake | - | The methodology is efficient for small delay time in the transmission of messages from the group of “good” nodes |
[45] | Privacy | Blockchain | PoW | Distributed Cloud Servers | It achieves fewer cycles (steps) in communication compared to pre-existing methodologies |
[46] | Decentralization | Blockchain | Proof-of-Quality-Factor (PoQF) | Game Theory, Vehicular edge computing (VEC) network | Compared to the rest of the consensus mechanisms studied, it has less loss when validating events but this has the impact of the longest delay in message transmission |
[47] | Sensing Accuracy | Permissioned Blockchain & Smart Contracts | Delegated Proof-of-Stake (DPoS) | Deep Neural networks (DNN) | Position correction compared to other methodologies is more effective when we have many errors from the sensors |
[48] | Audit | Blockchain | Proof-of-Storage | - | Moderate transmission speed performance – High security |
Ref | Challenge | Summary | Advantages | Disadvantages |
---|---|---|---|---|
[49] | Road Safety | Improving the performance of communications in VANET road safety applications with the help of Blockchain technology | It reduces the need for processing power in vehicles | Stored feature policies are not dynamic and do not change. |
[50] | Road Safety | Filtering event data and storing it on blockchain for road safety through false event protection | Efficient technique in a large and dense number of vehicles | - |
[51] | Resource Management | Energy exchange methodology between charging stations and vehicles with the aim of saving energy and security from 2 types of attacks using blockchain & smart contracts. | Elimination of cheaters, complete supplier coverage with short time of searching and reduces costs for purchasers | There is no integration with IoV Infrastructure |
[52] | Financial | Electronic payment methodology in VANETs based on blockchain | The communication load increases linearly in relation to the number of vehicles and not exponentially as it happens in pre-existing techniques. | Data transmission performance decreases for vehicles that are further away from other RSUs. |
[53] | Financial | A methodology for supplier selection with secure buyer-seller exchange in Smart EV charging to mitigate anxiety in VANETs | Fast transaction transfer | The authentication mechanism and communications architecture are not described |
[54] | Social Networking | Dynamic PoW mechanism based on checkpoint-block and different difficulty levels to manage IoV social network data | Low delays in V2I communications | Cloud servers pose a problem as far as the distributed feature of the methodology is concerned |
Ref | Challenge | Blockchain / Smart Contract |
Consensus mechanism | Techniques/tools | Performance of the methodology |
---|---|---|---|---|---|
[49] | Road Safety | Blockchain | PoW | Distributed Cloud Servers | Low efficiency: Linear increase in both storage space and operating costs in line with the increase in vehicles |
[50] | Road Safety | Blockchain | Delegated Proof-of-Stake (DPoS) | 5G New Radio (NR) V2X | High performance compared to the SPS technique in terms of collision probability and delay. |
[51] | Resource Management | Consortium Blockchain & Smart Contracts | Proof of Authority | Smart Grid | Moderate energy saving performance compared to existing solutions. |
[52] | Financial | Blockchain | PoW | - | High performance in relation to the time needed to search for a location but also the reduction of congestion and costs |
[53] | Financial | Blockchain | PoW | Named Data Networking, Vehicular Sensor Networks | Moderate performance relative to pre-existing works. Effectiveness: collection reporting, fake identical rate & time for trade |
[54] | Social Networking | Permissioned Blockchain | dynamic PoW (dPoW) | - | High: Compared to existing methodologies, this one performs better on a large increase in social network data and offloads vehicles from resource consumption |
Ref | Challenge | Summary | Advantages | Disadvantages |
---|---|---|---|---|
[55] | Accountability | Combining Blockchain and Named Data Networking (NDN) to provide secure distributed V2X communications while maintaining privacy. | The identity of the parties involved in the road network is not disclosed. It is an appropriate methodology to protect against identity disclosure and non-attribution attacks. | It has no filtering techniques for the data generated by the vehicle. Using different key pairs for blockchain and NDN functions puts a strain on system performance |
[56] | Accountability | Event message search mechanism through blockchain and smart contracts maintaining the anonymity and accountability of VANET network users and improving the performance of the 5G network by applying SDN technology. | Reduces message transmission time and network load | It does not meet the needs of real-time VANETs. |
[57] | Accountability | A hierarchical certificate service chain based on blockchain and on a new reputation measurement model for effective authentication of node’s identity in VANETs | Small block storage pressure, and high consensus algorithm efficiency | Not tested in real scenarios |
[58] | Responsibility | Propagation of messages based on reputation between connected vehicles and a combination of SDN, Fog Computing and blockchain technologies. | Platform capable of providing trust to the involved entities of VANETs | There are shortcomings in the methodology as far as privacy protection is concerned |
[59] | Responsibility | A mechanism for generating, exchanging and storing the reputation of nodes in VANETs in order to encourage vehicle accountability. | The reputation score is available to individual nodes when requested with no central dependency. | The process of registering a vehicle does not guarantee concealment of the vehicle’s location |
[60] | Trust management | Model for creating a distributed trust management system that registers and recalls vehicles using blockchain and smart contracts and the unique ID generated by the PUFs of the vehicles’ SoCs. | It provides data with integrity, security and reliability. | Vulnerable to Modeling attacks on PUFs. |
Ref | Challenge | Blockchain / Smart Contract |
Consensus mechanism | Techniques/tools | Performance of the methodology |
---|---|---|---|---|---|
[55] | Accountability | Blockchain | PoW | Named data networking (NDN) | Moderate performance in the communication load due to the handling of a large amount of data by the vehicles but also due to the different key pairs used in the technologies based on |
[56] | Accountability | Permissioned Blockchain & Smart Contracts | PoW | InterPlanetary File System (IPFS), Software-Defined Networks (SDNs) | Low performance |
[57] | Accountability | Blockchain & Smart Contracts | Delegated proof of stake (DPoS), Proof of work (PoW) | Better for large concurrent authentication requests than a large number of requests | |
[58] | Responsibility | Blockchain | Practical Byzantine fault tolerance (PBFT) | SDN, Fog computing | Moderate performance in terms of communication load |
[59] | Responsibility | Permissioned Blockchain & Smart Contracts | Proof of Authority | Interplanetary file system (IPFS) | Low performance as the number of malicious nodes increases, compared to the methodology without smart contracts |
[60] | Trust management | Blockchain & Smart Contracts | PoW & Proof-of-Stake | Physical Unclonable Functions (PUFs) | Works effectively against data tampering and identity disclosure attacks |
Ref | Βrute Force | Hijacking | Alteration Attack | Jamming | DDoS | Man-in-the-middle | 51% Attack Resilience | Unlinkability | Intrusion Detection | Identity Authentication | User Account Management | Tracking Attack | Sybil Attack | Location Privacy Threats | Collusion Attack | Eavesdropping Attack |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
[42] | ✓ | |||||||||||||||
[43] | ✓ | |||||||||||||||
[44] | ✓ | ✓ | ✓ | ✓ | ||||||||||||
[45] | ✓ | |||||||||||||||
[46] | ✓ | |||||||||||||||
[47] | ✓ | ✓ | ✓ | |||||||||||||
[48] | ✓ | ✓ | ✓ | |||||||||||||
[49] | ✓ | |||||||||||||||
[50] | ✓ | ✓ | ||||||||||||||
[51] | ✓ | |||||||||||||||
[52] | ✓ | |||||||||||||||
[53] | ✓ | |||||||||||||||
[54] | ✓ | ✓ | ||||||||||||||
[55] | ✓ | ✓ | ✓ | |||||||||||||
[56] | ✓ | |||||||||||||||
[57] | ✓ | ✓ | ✓ | ✓ | ||||||||||||
[58] | ✓ | |||||||||||||||
[59] | ✓ | |||||||||||||||
[60] | ✓ | ✓ | ✓ |
Future direction | Description |
---|---|
Well-structured trust models | Models that will create a climate of trust and security for users and that will include all involved entities, different types of data, different properties, measurements and parameters. |
Building a framework to protect against a set of attacks | Methodologies should cover many different types of attacks and not just a few. A comprehensive framework for dealing with most VANET attacks and failures should be designed and evaluated. |
Mechanisms and methodologies with a small energy footprint | Defining parameters in the processes and operations that will be implemented in order to reduce the consumption of resources that affect energy consumption and environmental pollution. |
Comprehensive profiling, reputation and rating system for all entities involved | Creating a profile based on the contribution to road incident data, but also defining the reputation of each entity (fixed or not, direct or indirect), but also creating a reward system for its behavior in the road ecosystem. |
Use of Federal Learning and Artificial Intelligence technologies. | Applying Federated Learning and Artificial Intelligence models to create a global intelligence in the IoT ecosystem. |
Use of emerging technologies | Cloud Services, Fog & Edge computing, Software Defined Networking (SDN), Network Functions Virtualization (NFV). |
Improving the performance of Blockchain technology for use in different applications | Blockchain offers users many different applications with different performance requirements, which must be met by Blockchain technology in order to overcome latency and load issues. |
Improvement and development of detection systems and sensors | Further research into the creation of more reliable and efficient devices and sensors, filtering and evaluating the data they produce before being sent to the RSUs and central infrastructure. |
Balancing between decentralization and network load | Blockchain technology, the consensus mechanism and the constant exchange of large volumes of data burdens the network and causes load and delays. |
Allocation of resources, processing and storage | Due to the complexity and decentralization of Blockchain technology, as well as the dynamic nature of the blockchain, new performance and resource allocation challenges arise. |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
Downloads
187
Views
43
Comments
0
Subscription
Notify me about updates to this article or when a peer-reviewed version is published.
© 2025 MDPI (Basel, Switzerland) unless otherwise stated