scholarly journals Distributed Edge Computing with Blockchain Technology to Enable Ultra-Reliable Low-Latency V2X Communications

Electronics ◽  
2022 ◽  
Vol 11 (2) ◽  
pp. 173
Author(s):  
Andrei Vladyko ◽  
Vasiliy Elagin ◽  
Anastasia Spirkina ◽  
Ammar Muthanna ◽  
Abdelhamied A. Ateya

Vehicular communication is a promising technology that has been announced as a main use-case of the fifth-generation cellular system (5G). Vehicle-to-everything (V2X) is the vehicular communication paradigm that enables the communications and interactions between vehicles and other network entities, e.g., road-side units (RSUs). This promising technology faces many challenges related to reliability, availability and security of the exchanged data. To this end, this work aims to solve the scientific problem of building a vehicular network architecture for reliable delivery of correct and uncompromised data within the V2X concept to improve the safety of road users, using blockchain technology and mobile edge computing (MEC). The proposed work provides a formalized mathematical model of the system, taking into account the interconnection of objects and V2X information channels and an energy-efficient offloading algorithm to manage traffic offloading to the MEC server. The main applications of the blockchain and MEC technology in the developed system are discussed. Furthermore, the developed system, with the introduced sub-systems and algorithms, was evaluated over a reliable environment, for different simulation scenarios, and the obtained results are discussed.

Author(s):  
Andrei Vladyko ◽  
Vasiliy Elagin ◽  
Anastasia Spirkina ◽  
Ammar Muthanna ◽  
Abdelhamied A. Ateya

As V2X technology develops, acute problems related to reliable and secure information exchange between network objects in real time appear. The article aims to solve the scientific problem of building a network architecture for reliable delivery of correct and uncompromised data within the V2X concept to improve the safety of road users, using blockchain technology and mobile edge computing (MEC). The authors present a formalized mathematical model of the system, taking into account the interconnection of objects and V2X information channels, and an energy-efficient algorithm of traffic offloading to the MEC server. The paper presents the results of application of blockchain technologies and mobile edge computing in the developed system, their description, evaluation of advantages and disadvantages of the implementation.


2018 ◽  
Vol 56 (12) ◽  
pp. 104-111 ◽  
Author(s):  
Pradip Kumar Sharma ◽  
Shailendra Rathore ◽  
Young-Sik Jeong ◽  
Jong Hyuk Park

2021 ◽  
Vol 13 (7) ◽  
pp. 4025
Author(s):  
Ahmet Faruk Aysan ◽  
Fouad Bergigui ◽  
Mustafa Disli

As the world is striving to recover from the shockwaves triggered by the COVID-19 crisis, all hands are needed on deck to transition towards green recovery and make peace with nature as prerequisites of a global sustainable development pathway. In this paper, we examine the blockchain hype, the gaps in the knowledge, and the tools needed to build promising use cases for blockchain technology to accelerate global efforts in this decade of action towards achieving the SDGs. We attempt to break the “hype cycle” portraying blockchain’s superiority by navigating a rational blockchain use case development approach. By prototyping an SDG Acceleration Scorecard to use blockchain-enabled solutions as SDG accelerators, we aim to provide useful insights towards developing an integrated approach that is fit-for-purpose to guide organizations and practitioners in their quest to make informed decisions to design and implement blockchain-backed solutions as SDG accelerators. Acknowledging the limitations in prototyping such tools, we believe these are minimally viable products and should be considered as living tools that can further evolve as the blockchain technology matures, its pace of adoption increases, lessons are learned, and good practices and standards are widely shared and internalized by teams and organizations working on innovation for development.


Author(s):  
Chia-Shin Yeh ◽  
Shang-Liang Chen ◽  
I-Ching Li

The core concept of smart manufacturing is based on digitization to construct intelligent production and management in the manufacturing process. By digitizing the production process and connecting all levels from product design to service, the purpose of improving manufacturing efficiency, reducing production cost, enhancing product quality, and optimizing user experience can be achieved. To digitize the manufacturing process, IoT technology will have to be introduced into the manufacturing process to collect and analyze process information. However, one of the most important problems in building the industrial IoT (IIoT) environment is that different industrial network protocols are used for different equipment in factories. Therefore, the information in the manufacturing process may not be easily exchanged and obtained. To solve the above problem, a smart factory network architecture based on MQTT (MQ Telemetry Transport), IoT communication protocol, is proposed in this study, to construct a heterogeneous interface communication bridge between the machine tool, embedded device Raspberry Pi, and website. Finally, the system architecture is implemented and imported into the factory, and a smart manufacturing information management system is developed. The edge computing module is set up beside a three-axis machine tool, and a human-machine interface is built for the user controlling and monitoring. Users can also monitor the system through the dynamically updating website at any time and any place. The function of real-time gesture recognition based on image technology is developed and built on the edge computing module. The gesture recognition results can be transmitted to the machine controller through MQTT, and the machine will execute the corresponding action according to different gestures to achieve human-robot collaboration. The MQTT transmission architecture developed here is validated by the given edge computing application. It can serve as the basis for the construction of the IIoT environment, assist the traditional manufacturing industry to prepare for digitization, and accelerate the practice of smart manufacturing.


Author(s):  
Ashish Singh ◽  
Kakali Chatterjee ◽  
Suresh Chandra Satapathy

AbstractThe Mobile Edge Computing (MEC) model attracts more users to its services due to its characteristics and rapid delivery approach. This network architecture capability enables users to access the information from the edge of the network. But, the security of this edge network architecture is a big challenge. All the MEC services are available in a shared manner and accessed by users via the Internet. Attacks like the user to root, remote login, Denial of Service (DoS), snooping, port scanning, etc., can be possible in this computing environment due to Internet-based remote service. Intrusion detection is an approach to protect the network by detecting attacks. Existing detection models can detect only the known attacks and the efficiency for monitoring the real-time network traffic is low. The existing intrusion detection solutions cannot identify new unknown attacks. Hence, there is a need of an Edge-based Hybrid Intrusion Detection Framework (EHIDF) that not only detects known attacks but also capable of detecting unknown attacks in real time with low False Alarm Rate (FAR). This paper aims to propose an EHIDF which is mainly considered the Machine Learning (ML) approach for detecting intrusive traffics in the MEC environment. The proposed framework consists of three intrusion detection modules with three different classifiers. The Signature Detection Module (SDM) uses a C4.5 classifier, Anomaly Detection Module (ADM) uses Naive-based classifier, and Hybrid Detection Module (HDM) uses the Meta-AdaboostM1 algorithm. The developed EHIDF can solve the present detection problems by detecting new unknown attacks with low FAR. The implementation results illustrate that EHIDF accuracy is 90.25% and FAR is 1.1%. These results are compared with previous works and found improved performance. The accuracy is improved up to 10.78% and FAR is reduced up to 93%. A game-theoretical approach is also discussed to analyze the security strength of the proposed framework.


Sign in / Sign up

Export Citation Format

Share Document