Review Article
A Summary of Security Techniques-Based Blockchain in IoV
Table 1
Comparison of architecture of BIoV.
| Classification of models | Literature | Key technologies used in the model | Strengths/weaknesses |
| Entity-centric model | [10] | Blockchain | RSU acts as a blockchain node, but the scale and deployment issues of nodes are not resolved | [11] | Cloud computing and double-chain structure | [12] | SDN, fog computing, and blockchain | The problem of coordination between nodes has not been solved | [13] | Blockchain, deep learning, and spatial crowdsourcing | The performance of the blockchain is improved, but the computing power and throughput performance requirements are increased |
| A model centered on the data life cycle | [2, 16] | The communication layer, the computing layer, and the application layer are integrated with the blockchain technology | Integrate data and blockchain to varying degrees, but the management and performance of the system bring great challenges | [17] | Blockchain is incorporated into every layer of the model | [18] | Five types of data correspond to five subchains |
|
|