Professional Documents
Culture Documents
An Energy-Efficient Transaction Model For The Blockchain-Enabled Internet of Vehicles (Iov)
An Energy-Efficient Transaction Model For The Blockchain-Enabled Internet of Vehicles (Iov)
fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/LCOMM.2018.2883629, IEEE
Communications Letters
IEEE COMMUNICATIONS LETTERS 1
vehicles as these may consume the maximum available energy. To ,QWHUQHW $3V
&RUH
resolve this, an efficient model is presented in this letter which 9LUWXDOL]DWLRQ
%%83RRO
&
'
is capable of handling the energy demands of the blockchain- %6 '
&
,QWHUDFWLRQEHWZHHQFOXVWHUV
enabled Internet of Vehicles (IoV) by optimally controlling the (QHUJ\&RQVHUYLQJ3RLQWV
EDVHGRQVLPLODU
EORFNFKDLQDSSOLFDWLRQV
number of transactions through distributed clustering. Numerical (QHUJ\(IILFLHQW7UDQVDFWLRQV
1089-7798 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/LCOMM.2018.2883629, IEEE
Communications Letters
IEEE COMMUNICATIONS LETTERS 2
provided to IoV, such that the network differential variation, major factors in the proposed approach are about the selection
by using Heston Model [7], is given as: of CHs, decision to transmit (when and how), the number
dB
(t) (o)
√ dB0 of permissible blockchain queries, and location-based ledger-
= λ BS,i − BS,i + σ , (4) offloading. Satisfaction of all these issues through stochastic
dt dt
(o) volatility helps to sustain the network for longer durations.
where BS,i is the initial values for energy consumption, λ The mechanism of distributed clustering can be followed from
is the number of blockchain requests per unit time, is the
ratio of the excessive energy to the total initial energy of the
Components
A A
vehicle, σ is the standard deviation of energy required w.r.t.
Core
B B
0
energy utilized, and dB D Global
1089-7798 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/LCOMM.2018.2883629, IEEE
Communications Letters
IEEE COMMUNICATIONS LETTERS 3
λ1 6= λ2 , and f1 6= f2 , the energy decaying in the network for which is the desired output at R0 > 0, R00 > 0 and τ > 0.
(t)
each vehicle can be observed by solving the integral (βD,i ), Optimal Solution: The solution to the energy-efficient
which gives transition considering the distributed clustering mechanism
−
√
q √ q √
!
2 σ2 − ln( 2πf2 σ2 )+σ1 − ln( 2πf1 σ1 ) +λ2 +λ1 τ
can be attained by performing optimal offloading and
(o) 1− e selecting new CHs whenever the energy demand of the
BS,i
. , (9) (I)
|S| √
r √ r √ network increases. If St,i is the observation, which controls
2 σ2 − ln 2πf2 σ2 + σ1 − ln 2πf1 σ1 + λ2 + λ1
the changing of CH to optimize the transactions for
as an output. In actual practice, λ2 is unknown, however, its conserving energy, the solutions can be attained through
value can be estimated by assuming that all the operations following formulations:
in the network are synchronized, such that λ1 = λ2 and • Based on Optimal Stopping Theory (OST) [8], change
f1 = f2 . The deviation is varied to maintain a difference CH if
in regular and blockchain operations. Now, in such a case, max(St,i ) <
(I) (I)
Sexpected,i , (12)
−1 λ1 −λ1 2 λ −λ
1 2 (( ) )+( 2σ 2 )2 ) | {z }
f2 = f1 = 2πσ1 σ2 e
σ1 2 and λ2 becomes −Pc √R
0
!!
−erf
r
2 2σ 00
Et R +λexpected
−2
σ2 ln (2πσ1 σ2 f1 ) − λ1σ−λ
2
1
1
+ λ1 , based on which, the
energy decaying is calculated as where stopping points are observable from Mayer, La-
2σ2
q
2 ln(2πf σ σ )−λ 2 +2λ λ −λ2 τ
−2σ1
grange and Supremum (MLS-OST) [8] for each CH at
1 1 2 1 1 1 1
(o)
BS,i σ1 − σ1 e
−
σ1 1 −2λ τ
negligible Heston variance [7], such that
. q . (10)
|S| 2 2 2
Z R00
!
2 σ2 −2σ1 ln (2πf1 σ1 σ2 ) − λ1 + 2λ1 λ1 − λ1 + λ1 σ1 (I) (t) 0
St,i = sup Et f (p) .Pc dp + sup f (B ) . (13)
0≤t≤τ 0 0≤t≤τ
The values for these help to form an estimated overview of
Using Lemma-1 and Lemma-2, (13) deduces to
energy requirements/consumptions of each vehicle, and allow
0 00
tracking of differential variations for energy demands in (4). −Pc erf R
√ −R − erf √R
0
2σ 00 2σ 00
R R
Such provisioning facilitates the selection of CHs with a high max Et
2
+ 2λ1 . (14)
availability of energy. In addition, the extent up to which the
• If OST does not hold, Lemma-2 is used for changing
network can survive at a given depletion rate is observable (I) (T ) (I)
CH, i.e. St,i = KR,i and if St,i <
through these results. | {z }
Lemma-2 The number of transactions needed to shift the Upper limit of handling transactions
(T )
entire load depends on the number of local as well as global KR , select CH that satisfies this condition provided that
updates performed in the IoV. The local updates can be R ≤ R00 . If no CH is available, divide load based on
(τ )
accumulated and transferred once a slot for global exchange max (R00 ), or divide the load based on max Ft for
is initiated. Based on these, the actual number of required the given conditions in (8).
(T )
transactions (KR ) is given by • If both the above metrics fail to decide or create ambigu-
(I)
ity, St,i is modeled for pre-energy decaying, i.e. change
P
|C| Pψ 2
erf R0 − R00 − erf R0
'
j=1 λ Pc τ
&
−
i=1
, (11) R τ −ω (t) √ dB0
5
2 2 DσR00 CH, if 0 λ βD,i + σ dt dt <
expected
R0 > 0, R00 > 0 and τ > 0 assuming that all vehicles (o)
2λ1 BS,i
follow similar pattern where R00 is their radio range, R0 |S|
.
affected and there can be more than one solution for (9)-(14),
By
solving the remaining
part, the observed value becomes because of which the identification of CH becomes ambiguous
& P|C| Pψ 2 0 00 0 '
i=1 j=1 λ Pc τ (erf (R − R ) − erf (R )) and (15) is used as a solution. However, such a case is most
− 5 , unlikely to occur in practical scenarios. All the procedures
2 2 DσR00
1089-7798 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/LCOMM.2018.2883629, IEEE
Communications Letters
IEEE COMMUNICATIONS LETTERS 4
defined in the system model can be accumulated, as shown while keeping its principles intact. The performance was
in Algorithm 1, which suggests when to change the CH and recorded for the number of transactions required to offload
time slot in which pre-offloading should be performed to avoid the entire blockchain (Fig. 3) and total energy conserved in
delays and conserve the energy. The operational complexity of variation with the number of requests (Fig. 4). The results
the algorithm depends on C and ψ. The distributed and parallel in Fig. 3 show that the proposed scheme overpowers the
operations can further help to conserve the energy associated traditional blockchain by reducing the transaction load up to
with the onboard processing on each vehicle. 82.06% even at higher values for λ. These results govern the
optimal solutions for selecting CH whenever the network’s
Algorithm 1 CH Selection and offloading energy consumption goes beyond the set limits. Moreover,
(I)
1: Input: Set network metrics and set idealistic values for Sp,i the proposed scheme shows an average energy conservation
2: Set: Initial CHs and mark slots, ω, t
of 40.16% compared with traditional blockchain at varying
3: repeat
4: Compute energy ratings for each vehicle and find St,i
(I) requests. Although the conserved energy decreases with an
(I) (I)
5: Change CH if St,i < Sp,i increase in the number of requests, the increase is lower than
6: until: t ≤ τ , (7) and (8) hold
the standard operations and the conservation follows the values
(I) (I)
7: Output: Offloading at t − ω for St−ω,i < Sp,i and new CH
33.32%, 40.02%, 42.85%, 44.45% for different values of λ,
λ1 and λ2 , as shown in Fig. 4. At present, the security of the
5
x 10
network depends on the success of transactions and updates
2.5
Proposed Scheme, λ=2 shared between the vehicles. The intermittent evaluations of
Proposed Scheme, λ=3
the principles of the blockchain-security are beyond the scope
for Blockchain offloading
Number of Transactions
1.5
Traditional Blockchain, λ=2 of this article and will be discussed in future reports.
Traditional Blockchain, λ=3
Traditional Blockchain, λ=4
1 Traditional Blockchain, λ=5
V. C ONCLUSION
0.5
This letter aims at reducing the number of transactions
0
10 20 30 40 50 60 70 80 90 100 required to update ledgers on the Internet of Vehicles. The pur-
Timing Slots (τ) (s)
pose of the proposed approach is to reduce the burden of the
Fig. 3. Number of Transactions vs. operational time. network from numerous blockchain-transfer operations while
conserving a maximum amount of available energy. To satisfy
this goal, a distributed clustering model is designed which
IV. P ERFORMANCE E VALUATIONS helps to conserve energy by 40.16% (average) and reduces
The proposed scheme was numerically evaluated for its the number of ledger-transactions by 82.06% compared with
efficacy compared with the traditional blockchain solution, the traditional blockchain-based Internet of Vehicles (IoV).
which relies on the broadcasting of ledgers through MatlabTM .
The evaluations were carried with settings |C| = 5, |I| = 10 R EFERENCES
in each cluster, |S| = 10, λ = 2 ∼ 5, γ = λ requests [1] J. Gu, B. Sun, X. Du, J. Wang, Y. Zhuang, and Z. Wang, “Consortium
blockchain-based malware detection in mobile devices,” IEEE Access,
per blockchain per second, k = 3, λ1 = 1 ∼ 4, H = 10, vol. 6, pp. 12118–12128, 2018.
(t)
λ2 = 2 ∼ 5, ER = EC = 2580J, and βC,M = 0.625J is the ap- [2] H. Liu, Y. Zhang, and T. Yang, “Blockchain-enabled security in electric
prox. average, which can be fixed based on the curve algorithm vehicles cloud and edge computing,” IEEE Network, vol. 32, no. 3,
pp. 78–83, 2018.
or any dedicated security scheme [9] [10]. Excessive energy [3] E. Uhlemann, “Time for autonomous vehicles to connect [connected
is taken twice as the total energy, i.e., = 2, τ = 10 ∼ 100s, vehicles],” IEEE Vehicular Technology Magazine, vol. 13, no. 3, pp. 10–
R = 500m [11], R0 = R00 = 300m, ω = 1s, Pc = 1 13, 2018.
[4] C.-Y. Wei, A. C.-S. Huang, C.-Y. Chen, and J.-Y. Chen, “Qos-aware
i.e. maximum presence of vehicles. In addition, standard hybrid scheduling for geographical zone-based resource allocation in
normal distribution was considered for normal and blockchain cellular vehicle-to-vehicle communications,” IEEE Communications Let-
operations with zero mean and unit deviation. The proposed ters, vol. 22, no. 3, pp. 610–613, 2018.
[5] J. Lim, H. Yu, K. Kim, M. Kim, and S.-B. Lee, “Preserving location
scheme helps to conserve energy by following a non-standard privacy of connected vehicles with highly accurate location updates,”
formation of clusters against the original policies of blockchain IEEE Communications Letters, vol. 21, no. 3, pp. 540–543, 2017.
[6] X. Liu, W. Wang, D. Niyato, N. Zhao, and P. Wang, “Evolutionary
game for mining pool selection in blockchain networks,” IEEE Wireless
Communications Letters, pp. 1–1, 2018.
0.5
Proposed Scheme [7] E. Benhamou, E. Gobet, and M. Miri, “Time dependent heston model,”
Traditional Blockchain
SIAM Journal on Financial Mathematics, vol. 1, no. 1, pp. 289–325,
Excessive Energy Utilization
1089-7798 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.