Joint Clustering and Blockchain for Real-Time Information Security Transmission at the Crossroads in C-V2X Networks

Hailin Xiao*, Wenqian Zhang, Wanying Li, Anthony Theodore Chronopoulos, Zhongshan Zhang

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

21 Citations (Scopus)

Abstract

The cellular vehicle-to-everything (C-V2X) networks support diverse kinds of services, such as traffic management, road safety, and sharing data. However, the safety issues cannot be ignored in the process of information transmission. In this article, a joint clustering and blockchain scheme is proposed for real-time information security transmission to prevent some vehicles from sending malicious messages to disrupt the traffic order at the crossroads in C-V2X networks. In this scheme, the dynamic stability of the cluster is maintained by updating the trust value of the vehicle nodes, which can improve the real time and accuracy of the information transmission. The modified Webster algorithm is presented to divert the traffic flow so as to reduce the traffic jams at the crossroads. Meanwhile, the blockchain technology is utilized to establish a vehicle trust management mechanism in C-V2X, which can avoid malicious tampering of vehicle information during information sharing and ensure the safety of vehicle information communication. The simulation results of the Veins simulation platform are provided to demonstrate the effectiveness of the proposed algorithm and verify that the proposed scheme can guarantee the security of real-time information transmission.

Original languageEnglish
Article number9383777
Pages (from-to)13926-13938
Number of pages13
JournalIEEE Internet of Things Journal
Volume8
Issue number18
DOIs
Publication statusPublished - 15 Sept 2021

Keywords

  • Blockchain
  • cellular vehicle to everything (C-V2X), clustering
  • information security transmission

Fingerprint

Dive into the research topics of 'Joint Clustering and Blockchain for Real-Time Information Security Transmission at the Crossroads in C-V2X Networks'. Together they form a unique fingerprint.

Cite this