Review Article

A Summary of Security Techniques-Based Blockchain in IoV

Table 1

Comparison of architecture of BIoV.

Classification of modelsLiteratureKey technologies used in the modelStrengths/weaknesses

Entity-centric model[10]BlockchainRSU acts as a blockchain node, but the scale and deployment issues of nodes are not resolved
[11]Cloud computing and double-chain structure
[12]SDN, fog computing, and blockchainThe problem of coordination between nodes has not been solved
[13]Blockchain, deep learning, and spatial crowdsourcingThe performance of the blockchain is improved, but the computing power and throughput performance requirements are increased

A model centered on the data life cycle[2, 16]The communication layer, the computing layer, and the application layer are integrated with the blockchain technologyIntegrate data and blockchain to varying degrees, but the management and performance of the system bring great challenges
[17]Blockchain is incorporated into every layer of the model
[18]Five types of data correspond to five subchains