Realization of blockchain in named data networking-based internet-of-vehicles

Journal article


Ahmad, F., Kerrache, Chaker Abdelaziz, Kurugollu, Fatih and Hussain, Rasheed 2019. Realization of blockchain in named data networking-based internet-of-vehicles. IT Professional. https://doi.org/10.1109/MITP.2019.2912142
AuthorsAhmad, F., Kerrache, Chaker Abdelaziz, Kurugollu, Fatih and Hussain, Rasheed
Abstract

The revolution of Internet-of-vehicles (IoV) has stimulated a substantial response from academia, research and industry due to its massive potential to improve overall transportation. Current IoV faces huge challenges due to its reliance on the IP-based network architecture. Therefore, Named Data Networking (NDN) is proposed as a promising architecture to solve issues posed by IP-based systems. Recently, Blockchains (BCs) are utilized within IoV to increase network security. However, the integration of BC within NDN-enabled IoV is still an open research problem. In this study, we proposed a novel tier-based architecture known as “Blockchain in NDN-enabled Internet-of-Vehicles (BINDN)” which can support BC within NDN-enabled IoV. BINDN can be used as a reference architecture to design security solutions in NDN-enabled IoV using BC. Further, it provides an extensive set of applications including IoV security, trust management and privacy enhancements. Moreover, we highlighted major challenges and issues when integrating BC within NDN-enabled IoV.

KeywordsInternet of Vehicles; Named Data Networking; Blockchain; Internet of Things
Year2019
JournalIT Professional
PublisherIEEE
ISSN15209202
1941045X
Digital Object Identifier (DOI)https://doi.org/10.1109/MITP.2019.2912142
Web address (URL)http://hdl.handle.net/10545/624014
http://creativecommons.org/licenses/by-nc-nd/3.0/us/
hdl:10545/624014
Publication dates15 Jul 2019
Publication process dates
Deposited19 Jul 2019, 09:54
Accepted14 Apr 2019
Rights

Attribution-NonCommercial-NoDerivs 3.0 United States

© 20XX IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.

ContributorsCyber Security Research Group, University of Derby, UK, Department of Mathematics and Computer Science, University of Ghardaia, Algeria and Institute of Information Systems, Innopolis University, Russia
File
File Access Level
Open
File
File Access Level
Open
File
File Access Level
Open
Permalink -

https://repository.derby.ac.uk/item/939w2/realization-of-blockchain-in-named-data-networking-based-internet-of-vehicles

Download files

  • 70
    total views
  • 34
    total downloads
  • 4
    views this month
  • 1
    downloads this month

Export as

Related outputs

Deep labeller: automatic bounding box generation for synthetic violence detection datasets
Nadeem, M., Kurugollu, F., Saravi, S., Atlam, H. and Franqueira, V. 2023. Deep labeller: automatic bounding box generation for synthetic violence detection datasets. Multimedia Tools and Applications. pp. 1-18. https://doi.org/10.1007/s11042-023-15621-5
Front and Back Views Gait Recognitions Using EfficientNets and EfficientNetV2 Models Based on Gait Energy Image
Tengku Mohd Afendi, Zulcaffle,, Kurugollu, F., Kuryati, K., Joseph, A. and Bong, D. L. 2023. Front and Back Views Gait Recognitions Using EfficientNets and EfficientNetV2 Models Based on Gait Energy Image. International Journal of Computing and Digital Systems. 2, pp. 1-10. https://doi.org/10.12785/ijcds/XXXXXX
Explaining deep neural networks: A survey on the global interpretation methods
Saleem, R., Yuan, B., Kurugollu, F., Anjum, A. and Liu, L. 2022. Explaining deep neural networks: A survey on the global interpretation methods. Neurocomputing. 513, pp. 165-180. https://doi.org/10.1016/j.neucom.2022.09.129
Severity Estimation of Plant Leaf Diseases Using Segmentation Method
Entuni, Chyntia Jaby, Afendi Zulcaffle, Tengku Mohd, Kipli, Kuryati and Kurugollu, Fatih 2020. Severity Estimation of Plant Leaf Diseases Using Segmentation Method. Applied Science and Engineering Progress. 14 (1), pp. 108-119. https://doi.org/10.14416/j.asep.2020.11.004
Explaining probabilistic Artificial Intelligence (AI) models by discretizing Deep Neural Networks
Saleem, Rabia, Yuan, Bo, Kurugollu, Fatih and Anjum, Ashiq 2020. Explaining probabilistic Artificial Intelligence (AI) models by discretizing Deep Neural Networks. IEEE. https://doi.org/10.1109/ucc48980.2020.00070
NOTRINO: a NOvel hybrid TRust management scheme for INternet-Of-vehicles
Ahmad, F., Kurugollu, Fatih, Kerrache, Chaker Abdelaziz, Sezer, Sakir and Liu, Lu 2021. NOTRINO: a NOvel hybrid TRust management scheme for INternet-Of-vehicles. IEEE Transactions on Vehicular Technology. https://doi.org/10.1109/TVT.2021.3049189
A Novel Security Methodology for Smart Grids: A Case Study of Microcomputer-Based Encryption for PMU Devices
Varan, Metin, Akgul, Akif, Kurugollu, Fatih, Sansli, Ahmet and Smith, K. 2021. A Novel Security Methodology for Smart Grids: A Case Study of Microcomputer-Based Encryption for PMU Devices. Complexity. 2021, pp. 1-15. https://doi.org/10.1155/2021/2798534
Persation: an IoT based personal safety prediction model aided solution
Alofe, Olasunkanmi Matthew, Fatema, Kaniz, Azad, Muhammad Ajmal and Kurugollu, Fatih 2020. Persation: an IoT based personal safety prediction model aided solution. International Journal of Computing and Digital Systems.
MARINE: Man-in-the-middle attack resistant trust model IN connEcted vehicles
Ahmad, F., Kurugollu, Fatih, Adnane, Asma, Hussain, Rasheed and Hussain, Fatima 2020. MARINE: Man-in-the-middle attack resistant trust model IN connEcted vehicles. IEEE Internet of Things. https://doi.org/10.1109/JIOT.2020.2967568
CRT-BIoV: A cognitive radio technique for blockchain-enabled internet of vehicles
Rathee, Geetanjali, Ahmad, F., Kurugollu, Fatih, Azad, Muhammad, Iqbal, Razi and Imran, Muhammad 2020. CRT-BIoV: A cognitive radio technique for blockchain-enabled internet of vehicles. IEEE Transactions on Intelligent Transportation Systems. https://doi.org/10.1109/TITS.2020.3004718
A first look at privacy analysis of COVID-19 contact tracing mobile applications
Azad, Muhammad Ajmal, Arshad, Junaid, Akmal, Syed Muhammad Ali, Riaz, Farhan, Abdullah, Sidrah, Imran, Muhammad and Ahmad, F. 2020. A first look at privacy analysis of COVID-19 contact tracing mobile applications. IEEE Internet of Things Journal. https://doi.org/10.1109/JIOT.2020.3024180
Vehicular sensor networks: Applications, advances and challenges
Kurugollu, Fatih, Ahmed, Syed Hassan, Hussain, Rasheed, Ahmad, F. and Kerrache, Chaker Abdelaziz 2020. Vehicular sensor networks: Applications, advances and challenges. Sensors. https://doi.org/10.3390/s20133686
Spatio-temporal rich model-based video steganalysis on cross sections of motion vector planes
Tasdemir, Kasim, Kurugollu, Fatih and Sezer, Sakir 2016. Spatio-temporal rich model-based video steganalysis on cross sections of motion vector planes. IEEE Transactions on Image Processing. https://doi.org/10.1109/TIP.2016.2567073
Cascaded multimodal biometric recognition framework
Albesher, Badr, Kurugollu, Fatih, Bouridane, Ahmed and Baig, Asim 2013. Cascaded multimodal biometric recognition framework. IET Biometrics. https://doi.org/10.1049/iet-bmt.2012.0043
Privacy region protection for H.264/AVC with enhanced scrambling effect and a low bitrate overhead
Wang, Yongsheng, O׳Neill, Máire, Kurugollu, Fatih and O׳Sullivan, Elizabeth 2015. Privacy region protection for H.264/AVC with enhanced scrambling effect and a low bitrate overhead. Signal Processing: Image Communication. https://doi.org/10.1016/j.image.2015.04.013
Blind image watermark detection algorithm based on discrete shearlet transform using statistical decision theory
Ahmaderaghi, Baharak, Kurugollu, Fatih, Rincon, Jesus Martinez Del and Bouridane, Ahmed 2018. Blind image watermark detection algorithm based on discrete shearlet transform using statistical decision theory. IEEE Transactions on Computational Imaging. https://doi.org/10.1109/TCI.2018.2794065
Frontal view gait recognition with fusion of depth features from a time of flight camera
Afendi Tengku Mohd, Kurugollu, Fatih, Crookes, Danny, Bouridane, Ahmed and Farid, Mohsen 2018. Frontal view gait recognition with fusion of depth features from a time of flight camera. IEEE Transactions on Information Forensics and Security. https://doi.org/10.1109/TIFS.2018.2870594
Towards a trusted unmanned aerial system using blockchain (BUAS) for the protection of critical infrastructure
Barka, Ezedin, Kerrache, Chaker Abdelaziz, Benkraouda, Hadjer, Shuaib, Khaled, Ahmad, F. and Kurugollu, Fatih 2019. Towards a trusted unmanned aerial system using blockchain (BUAS) for the protection of critical infrastructure. Transactions on Emerging Telecommunications Technologies. https://doi.org/10.1002/ett.3706
A comparative analysis of trust models for safety applications in IoT-enabled vehicular networks
Ahmad, F., Adnane, Asma, Hussain, Rasheed and Kurugollu, Fatih 2019. A comparative analysis of trust models for safety applications in IoT-enabled vehicular networks. IEEE.
A survey of deep learning solutions for multimedia visual content analysis.
Nadeem, Muhammad Shahroz, Franqueira, Virginia N. L., Zhai, Xiaojun and Kurugollu, Fatih 2019. A survey of deep learning solutions for multimedia visual content analysis. IEEE Access. https://doi.org/10.1109/ACCESS.2019.DOI
Spatio-temporal rich model-based video steganalysis on cross sections of motion vector planes.
Tasdemir, Kasim, Kurugollu, Fatih and Sezer, Sakir 2016. Spatio-temporal rich model-based video steganalysis on cross sections of motion vector planes. IEEE Transactions on Image Processing. https://doi.org/10.1109/TIP.2016.2567073
Man-In-The-Middle attacks in Vehicular Ad-Hoc Networks: Evaluating the impact of attackers’ strategies.
Ahmad, F., Adnane, Asma, Franqueira, Virginia N. L., Kurugollu, Fatih and Liu, Lu 2018. Man-In-The-Middle attacks in Vehicular Ad-Hoc Networks: Evaluating the impact of attackers’ strategies. Sensors. 18 (11), p. 4040. https://doi.org/10.3390/s18114040
TEAM: A trust evaluation and management framework in context-enabled vehicular ad-hoc networks.
Ahmad, F., Franqueira, Virginia N. L. and Adnane, Asma 2018. TEAM: A trust evaluation and management framework in context-enabled vehicular ad-hoc networks. IEEE Access. https://doi.org/10.1109/ACCESS.2018.2837887
Faith in vehicles: A set of evaluation criteria for trust management in vehicular ad-hoc network
Ahmad, F., Hall, Jordan, Adnane, Asma and Franqueira, Virginia N. L. 2017. Faith in vehicles: A set of evaluation criteria for trust management in vehicular ad-hoc network. IEEE.
Internet-of-Things-based smart cities: Recent advances and challenges.
Mehmood, Yasir, Ahmad, F., Yaqoob, Ibrar, Adnane, Asma, Imran, Muhammad and Guizani, Sghaier 2017. Internet-of-Things-based smart cities: Recent advances and challenges. IEEE Communications Magazine. https://doi.org/10.1109/MCOM.2017.1600514
Digital video source identification based on green-channel photo response non-uniformity (G-PRNU)
Al-Athamneh, Mohammad, Kurugollu, Fatih, Crookes, Danny and Farid, Mohsen 2016. Digital video source identification based on green-channel photo response non-uniformity (G-PRNU). https://doi.org/10.5121/csit.2016.61105
A systematic approach for cyber security in vehicular networks
Ahmad, F., Adnane, Asma and Franqueira, Virginia N. L. 2016. A systematic approach for cyber security in vehicular networks. Journal of Computer and Communications. https://doi.org/10.4236/jcc.2016.416004
A novel context-based risk assessment approach in vehicular networks
Ahmad, F. and Adnane, Asma 2016. A novel context-based risk assessment approach in vehicular networks. IEEE. https://doi.org/10.1109/WAINA.2016.60
Evaluation platform for trust in vehicular ad hoc networks
Ahmad, F. and Adnane, Asma 2016. Evaluation platform for trust in vehicular ad hoc networks.
Vehicular cloud networks: Architecture, applications and security issues
Ahmad, F., Kazim, M., Adnane, Asma and Abir, Awad 2015. Vehicular cloud networks: Architecture, applications and security issues. IEEE. https://doi.org/10.1109/UCC.2015.101
Vehicular cloud networks: Architecture and security
Ahmad, F., Kazim, M. and Adnane, Asma 2015. Vehicular cloud networks: Architecture and security. in: Springer.
Design of trust based context aware routing protocol in vehicular networks
Ahmad, F. and Adnane, Asma 2015. Design of trust based context aware routing protocol in vehicular networks.