Introduction

The advance of intelligent and connected vehicles (ICVs), enabled by the development of big data, artificial intelligence (AI), cloud-edge computing, and Internet of vehicles (IoV) technologies, will radically reshape the intelligent transportation systems (ITS), economy [1] and environment forum [2], and drivers’ experience.

Meanwhile, IoV is becoming a vital technology to improve the efficiency and safety of the ITS [3]. And edge computing is another innovative extension of cloud computing, and it significantly reduces the transmission latency through the deployment of edge nodes that are geographically close to the end-users [4]. Technologies like fog computing, virtual cloudlet, and mobile cloud are all based on the same concept to enable a large scale of heterogeneous devices to run complex applications by leveraging the computational capability of the edge servers [5]. Real-time services and applications are not sufficiently handled due to the high latency of the cloud computing structure. On the contrary, MEC clouds are placed at the edge of the network and they can effectively exploit the computing and storage resources of the edge servers and subsequently reduce the delay of network transmission [6, 7]. Hence, the MEC will certainly become a vital enabler of various next-generation technologies like 5G, IoT, cyber-physical systems (CPS), vehicle-to-vehicle (V2V), and vehicle-to-everything (V2X) communications [8].

The research goal of ICVs in MEC is to improve road safety and boost the efficiency of the ITS [9]. Over 1.25 million people die in car accidents globally each year, some researchers believe that the adoption of ICVs will significantly reduce the figure of casualties [10]. Despite the benefits, it is also clear that the ICVs are also exposed to malicious cyber-attacks when ICVs are connected to the IoV [11]. There are various communication modules and interfaces inside an ICV, and these are potential vulnerabilities that could be exploited by malicious attackers. Without appropriate countermeasures, ICVs can be easily controlled by cyber-attackers and threaten the lives of drivers [12, 13].

Meanwhile, the digitalization of the transportation system will produce a large amount of data, particularly in large countries [14]. Through various embedded sensors and communication modules, an ICV can collect users’ information, such as the position and speed, the driver’s degree of attention, acceleration, and brake interventions, and send to the central server [15]. And these enormous quantities of data can also threaten the safety of ICVs and potentially compromise the privacy of users. The development of privacy-preserving and cyber-security techniques of ICVs are critical to a sustainable ITS [16, 20].

The emerge of DLTs and Blockchain (BC) instantly received enormous interest from researchers, industries, and governments [17, 18]. Due to their security characteristics, the implementation of these technologies could have the potential for anti-cyber attacks and privacy-preserving in the IoV [19, 20]. The integration of DLTs and MEC into the IoV systems can empower reliable access, data storage, and computation capacity which are distributed at the edge servers [21]. And security challenges of edge-based ICVs such as confidentiality and authenticity attacks, which can also be mitigated by leveraging the advance of DLT-based techniques. DLTs and MEC techniques have the potential ability to ensure the safety and security of V2X communication while improving the efficiency of data transmission [22]. Therefore, it is very important to do an in-depth investigation and analyze these technologies’ security requirements before implementation.

Our work aims to reveal how a range of emerged DLTs and edge computing techniques in recent years have been applied to tackle security and privacy issues within the Intelligent Transportation System and to survey potential applications of DLTs to ICVs. And we focus on the following questions: What are DLTs and MEC? How have DLTs and MEC techniques been used in the ITS? And what potential challenges DLTs can resolve?

Hence, an IoV network built on a DLT-based architecture has the potential to empower a secure and privacy-preserving ITS in an effective way. Other challenges in the IoV network concern the authentication mechanism, access control, and data management issues. Existing solutions to these challenges cannot be used in the IoV domain due to the limitation of computational capability and the scale of IoV. New designs and DLT-based technologies are needed to tackle these challenges. Table 1 enlists all the abbreviations used in this paper.

Table 1 Abbreviations in the paper

Contributions

There are several survey papers related to the integration of DLTs with ITS [23,24,25,26,27,28,29,30]. In the work of [21,22,23,24], they focus on the implementations of BC technologies in the IoV and IoT domains. However, the use of mobile edge computing in vehicular networks is not fully investigated in these papers. Likewise, in [25,26,27,28], the authors focus on the security and privacy solutions and challenges related to BC and vehicular edge computing (VEC) integration. Thus, DLTs and MEC integrated solutions in the ITS are only analyzed partially, and the existing DLT-based platforms and useful tools in vehicular MEC research are not discussed in detail. A comparison table of the different aspects of relevant surveys and the main issues in this article is given in Table 2. In comparison with the aforementioned survey papers, the contributions of this survey are four-fold:

  1. (1)

    Firstly, we focus on vehicular issues of DLTs in the IoV domains. We will also expand the coverage of security and privacy issues in MEC.

  2. (2)

    Secondly, we will survey the recently updated DLT-based applications in vehicular MEC.

  3. (3)

    Thirdly, a comparative analysis among various DLT-based applications in MEC is also provided in detail.

  4. (4)

    Furthermore, several DLTs related platforms and tools in IoV environments are described.

Table 2 Comparison with related existing surveys

Organization

This paper's remainder is organized as follows: “DLTS and IOV network architecture” presents basic concepts relevant to the DLTs techniques and IoV network architecture. “DLTs for vehicular MEC security and privacy” summarizes the main features of DLTs in MEC, and “Applications of DLTs in vehicular MEC environment” presents the application scenarios of DLTs in vehicular MEC. “DLT related platforms and tools for vehicles in MEC” analyzes DLT related platforms and tools that are market available for Vehicles in MEC. “Open issues and challenges” analyzes the open issues and challenges of using DLTs in the IoV. “Conclusions” concludes the article. Figure 1 illustrates the overall organization of the paper.

Fig. 1
figure 1

Organization of the survey on DLTs in vehicular MEC

DLTS and IOV network architecture

After the invention of computers, traditional ledgers were replaced by digital ledgers to record money and property in a centralized manner. Digital distributed ledgers technology is a combination of cryptographic puzzles, security protocols, and incentive mechanisms [17, 31], and it is based on decentralized architecture and requires trust and transparency.

We describe the basic concept of a DLT-based system and its main features, and an overview of IoV architecture is also presented that provides the background information of IoV and its essential components.

Distributed ledger techniques

DLTs system structure

Bitcoin has already become a popular and expensive digital currency, which was introduced by Satoshi Nakamoto [32]. It is built on a decentralized structure based on BC technology, and transactions can be digitally made among Bitcoin owners without disclosure of user privacy.

A typical distributed ledger system has five layers [24], as shown in Fig. 2, including Data Layer, Network Layer, Consensus Layer, Contract Layer, and Application layer.

Fig. 2
figure 2

The structure of a typical distributed ledger system

The transaction is the basic unit of a DLT-based ledger, which is collected into blocks by leveraging hash functions. And these blocks are linked together in a BC in which blocks of data are chronologically connected. Each block contains a pre-hash which is used to link the previous block.

Each block contains a blockhead and a block body, as shown in Fig. 3. The block header has three parts: (1) the data used to connect the previous block and index of hash value from the parent block; (2) the mining difficulty, nonce (random number), the timestamp; (3) the Merkle root data of all the transactions which are stored in the block body [33]. The block body contains the transaction data, including the private keys, the figure of transactions, and the digital signature. It can be seen that most of the functions of BC can be realized through the blockhead. Meanwhile, directed acyclic graph (DAG) was developed to improve the scalability and efficiency problem of BC [34].

Fig. 3
figure 3

Detailed structure in the chained block

DLTs systems are built on the peer-to-peer (P2P) network structure in a decentralized manner, where all users share resources without central servers [35]. For instance, every node in the Bitcoin system is involved in the process of transmission and validation of transactions in the P2P network [32, 36]. A whole copy of the ledger is kept in each Full node, which makes it possible for them to verify the content of the transactions. Lightweight nodes have limited computational capability and storage space, so they only store the block headers for consistency verification.

The consensus algorithm is introduced to guarantee that each node can have the correct record of the ledger. Researchers have presented various consensus algorithms and used DLTs systems, and most of them fall into three categories: proof-based, vote-based, and DAG-based consensus algorithms [37].


Proof-based consensus: like proof of work (PoW) and proof of stake (PoS), requires the nodes to provide evidence that they should be included in the system [38].


Vote-based consensus requires nodes to share their results of verifying a new block before reaching an agreement [38]. And a multi-party communication protocol is needed to obtain each node’s state to reach a consensus.


DAG-based consensus: users are obligated to order their transactions when a leader vote is unnecessary. A representative’s weight is calculated as the sum of all balances for nodes that chose this representative. Based on the voters' weight, the node that gains the most votes will be the winner [34].

A smart contract is a computer protocol that can execute automatically, and it is written into code after the agreement is achieved between seller and buyer. The DLT-based system is the perfect environment for smart contracts to run due to its security intrinsic. Through smart contracts, DLT-based platforms can be used not only for cryptocurrencies but also for various applications in the real world [18, 24, 39].

Features of distributed ledger techniques

There are four features of the DLTs, which can be summarized as follows:

  1. (1)

    Distributed and decentralization: DLT-based system is distributed storage and computing without centralized management, and all nodes have the same rights and obligations. Meanwhile, numerous nodes are competing to obtain accounting rights in the BC, the single node error will not affect the functionality of the whole system. Only when over 51% of the computational power is in control, then malicious users can master the whole system in the BC which is almost impossible.

  2. (2)

    Openness: without a central authority, the nodes in the DLT-based systems do not trust each other but trust the whole system. Because of the conflict of interest between nodes and systems, DLT-based systems have to disclose information on the system. Meanwhile, for privacy-preserving, the information of each node is confidential to other nodes.

  3. (3)

    Transparency: the data recording and updating operation of the DLT-based system is transparent to the whole network, which is the basis of the trustworthiness of the DLT-based system. DLT-based systems use open-source programs, open rules, therefore data records, and operational rules can be reviewed and tracked by each node to guarantee transparency.

  4. (4)

    Tamper-proof: in DLTs systems, the data is permanently stored and cannot be changed after it is verified and added to the BC. Any attempt to modify data on a single node is impossible, and therefore the data stability and reliability of the DLTs system are extremely high.

IoV architecture

The advancement of ICVs creates new requirements on the ITS to support the increasing workloads and real-time applications and reshapes the transportation system. The future ITS includes smart vehicles, Roadside units (RSUs), network infrastructure, MEC edge, and the cloud. The MEC techniques enhance the edge cloud for autonomous driving by providing services like real-time Maps, real-time traffic monitoring, etc. Meanwhile, it empowers ICVs to drive cooperatively and roadside awareness, and provide better user experience and trust to drivers [40].

This section illustrates the IoV network architecture and modes of operations. As shown in Fig. 4, the architecture has three layers: cloud layer, mobile edge computing layer, and vehicular layer.

Fig. 4
figure 4

IoV Layered Architecture


The Cloud layer has two main functions: storage and computation. It deals with data aggregation, data mining, big data storage, batch processing, and the workload of complex computations, and the storage and computation requirements of these tasks cannot be provided by the edge servers [41]. Moreover, the cloud layer computes enormous amounts of data and complex computations in a short period. And the data storage in the cloud could be exploited for future purposes and non-real-time applications, which are sent to the cloud layer through Software Define Network (SDN) controller.


The MEC layer is the middle of the vehicular and cloud layers to ensure data exchange. This poses challenges to the wireless communication modules in the ICVs [30]. To provide low latency, be aware of the roadside environment, emergency management, data caching, content delivery, computation capability, and improve the quality of services (QoS) since the MEC layer is close to ICVs, which is used to deal with real-time tasks from ICVs, such as traffic signs recognition, video analytics, and human behavior recognition.[42]. Thus, the MEC layer provides the following services to ICVs in the IoV.


Infrastructure as a service: ICVs need extra storage to run their applications and make a backup for a temporary purpose. This requirement is fulfilled by leveraging the resources that are provided by the distributed and decentralized edge servers. Edge servers provide free storage and computation facilities for clients to run their applications and construct the DLT-based vehicular network.


Platform as a service: DLT-based services are offered as a platform, which provides a development environment, programming languages, and toolkits for users. Meanwhile, it also gives useful APIs to the edge servers such as BC-based storage, smart contracts, and consensus mechanism.


Software as a service: multiple services for the vehicles are applications that are running on the edge servers, such as information sharing, encryption, authentication. Apart from offering a communication facility for V2V and vehicle to infrastructure (V2I), data sharing between ICVs happens constantly until data arrive on the RSUs or edge servers [43]. For instance, when an ICV shows abnormal behavior, like direction change, violation of the speed limit, or mechanical failure, nearby vehicles and RSUs will receive emergence messages, which contain information about that ICV [44]. And the data exchange among ICVs also relies on V2I communication facilities like RSUs and micro base stations over wireless connections managed through SDN.


The Vehicular layer is geographically around ICVs, and they share computing and storage resources by leveraging the 5G communication network [44]. The ICVs can collect from sensors, cameras, radar, lidar, GPS, etc. [3], and then the data will be sent to the MEC layer, which could be used to provide certain services like environmental awareness and behavior recognition of drivers. Meanwhile, with the implementation of Artificial Intelligence (AI) technologies, ICVs can anticipate the drivers’ intentions.

DLTs for vehicular MEC security and privacy

Regardless of the type of applications, it has become a key challenge to ensure the security of the IoV network, while strengthening privacy. After the advent of DLTs, it has been considered as a potential solution to this challenge. In this section, we discuss the way that DLTs techniques are being used to tackle these issues in vehicular MEC. The related security measures can be categorized as authentication, access control, and privacy-preserving.

Authentication

Identification is used for authentication to check whether the user is authorized [45]. In the IoV network, Basic safety messages (BSMs) are constantly broadcasted among ICVs to empower various applications, which are lightweight messages that contain critical information of ICVs. However, it can also be exploited by malicious attackers to control an ICV remotely by injecting fake BSMs [46]. The key to solving this threat is to guarantee that the ICVs verify the authenticity of the RSUs while authenticating themselves in a fast and effective way. Thus, a completely new design of lightweight and fast authentication between moving ICVs is needed to face this challenge.

According to the mechanisms and algorithms, there are five different authentication techniques: (1) light-weight authentication, (2) hash-based authentication, (3) batch verification-based authentication, (4) dual authentication, and (5) privacy-preserving authentication [47].

Normally, in the IoV environment, a user authentication mechanism involves the following steps [48]:

  • System configuration: the trusted authority (TA) is in charge of the system parameters generation.

  • Registration: before the deployment of ICVs and RSUs, they must be registered with the TA. Then the essential identifiers are embedded in the Onboard Unit (OBU) of the registered ICVs and RSUs.

  • User registration: users need to register with the TA to access the services offered by RSUs, and after analyzing the users’ data, the registered user will receive a smart card or mobile device from the TA.

  • Login: users provide their credentials, and after validation of the credentials by their smart cards or mobile devices, a "login request message" is sent to the RSU through a public channel.

  • Authentication and key agreement: after receiving the login request message, the RSU validates the message and sends the “authentication request message” to the user. The user also checks the validity of the received message and then rapidly replies to the RSU. Once validating the received message from the user, the RSU and user agree on a standard session key for secret communication between them.

  • Password and biometric update: users can change their passwords or biometrics locally with the absence of the TA, and this process is important for security enhancement.

  • Smart card/mobile device revocation: this phase is essential when a registered smart card or mobile device is missing, and a new smart card or mobile device will be issued with updated credentials.

  • Dynamic node addition: this session allows a new vehicle or an RSU to be added after deployment.

To authenticate ICVs and certify their identities, Public Key Infrastructures (PKIs) are introduced, but centralized PKIs have various pitfalls like single point of failure, privacy, trust, expensive, etc. [23]. In this context, various DLT-based PKIs have been proposed in the IoV domain.

Access control

Access control is another critical security measure to guarantee the safety of data generated in the IoV networks, where only authorized nodes can access sensitive data. An access control mechanism contains two tasks [48]:

  • Node authentication: new nodes (ICVs and RSUs) must authenticate themselves before they can access the services.

  • Key establishment: To enhance secure communication between nodes, a secret key is needed from the new node to its neighbors when the mutual authentication is finished.

RSUs are the basic elements of the Vehicular Fog Computing (VFC) infrastructures which are located at the edge of the IoV network, and it is used to handle generated data within the ICVs. Sharma et al. [49] proposed a DLT-based vehicular data management architecture to access these data securely and efficiently. In this architecture, RSUs are exploited as the key components to manage data and a consensus is introduced to maintain the trustworthiness of the newly added data. Similarly, Kai et al. [50] developed three security measures: key management, cache poisoning detection, and access control, which are used to improve the cyber-security of named data networking (NDN) VEC networks.

Privacy-preservation schemes

ICVs are exposed to various cyber-attacks when the central servers can access the users’ data which raises another concern about privacy violation [15]. To address these issues, researchers developed various DLT-based privacy-preserving schemes in the IoV. Ferdous et al. [51] presented a DLT-based scheme that empowers ICVs to generate a tamper-proof record of data. Similarly, Kong et al. [52] developed a scheme for sensory data sharing based on DLTs in the VFC, which can improve the protection of user privacy and data integrity.

Likewise, Li et al. [53] proposed a scheme for carpooling using DLT-based techniques and VFC. To guarantee data auditability, RSUs are chained together to form a private BC and it is used to record carpooling processes in a DLT-based ledger.

A DLT-based parking system was proposed by Amiri et al. [54], to ensure the security, transparency, and availability of the parking offers, in which parking spot owners create a consortium BC. Likewise, Hu et al. [55] developed a BC-based framework for parking management by integrating Block Chain Open Source and smart contract technology to secure the privacy of users. And Zhang et al. [56] proposed a BC-based parking scheme by leveraging group signatures, bloom filters, and vector-based encryption for privacy-preserving.

Applications of DLTs in vehicular MEC environment

The design goal of ITS is to boost the performance of Vehicular Ad hoc NETworks (VANETs), and it provides various services including smart parking, smart routing, traffic monitoring, and smart insurance claiming [24]. But traditional ITS is based on centralized servers which have many security pitfalls [57]. With the emerging of DLTs, researchers begin to develop the integrated applications of DLTs and IoV. This section will discuss many cases of DLTs in VEC scenarios, such as the design of network structures, authentication schemes, consensus algorithms, data sharing, and energy sharing and trading.

Network frameworks

Centralized solutions are not suitable for the smart ITS, on the contrary, decentralized and tamper-proof DLT-based frameworks are developed to improve trustworthiness. For example, RSUs are used to offload tasks to nearby ICVs in the framework designed by Iqbal et al. [58], and reputation scores of ICVs are maintained on a BC.

Gao et al. [59] presented a framework based on BC and SDN, and it is designed for VFC systems by leveraging the 5G communication network. The BC technology is introduced to boost the efficiency of IoV and build trust among ICVs, and SDN is exploited for management in VANET systems. By leveraging the computational capability of the edge servers in the VFC, the handover issues among the ICVs were improved.

A framework was designed by Liu et al. [60] to solve the security issues for both information and energy interactions in electric vehicles cloud and edge computing. The context-aware vehicular applications were presented based on the EVs’ different roles, and they also introduced DLT-based data coins and energy coins to achieve distributed consensus. Meanwhile, data contribution frequency and energy contribution quantities are used for proof determination.

Likewise, Zhang et al. [56] proposed a framework to enhance the security of VANET that integrates BC and MEC. This framework is divided into three layers, namely the perception layer, the edge computing layer, and the service layer. By leveraging the BC-based technology, the perception layer guarantees the safety of VANET data in the communication process and the service layer secures the data in the cloud. The edge computing layer offers computing resources and edge cloud services to the perception layer.

TrafficChain is presented by Wang et al. [61], which uses BC technology to build a secure and privacy-preserving distributed system for traffic data collection. In particular, a two-layer blockchain architecture is introduced to boost efficiency, and a privacy-preserving framework is developed to protect the privacy of users. Meanwhile, a derivation of a LSTM-based deep learning algorithm is used against Byzantine attacks and Sybil attacks. Furthermore, to encourage user participation an incentive mechanism is employed in the framework.

Chen et al. [62] proposed a framework for self-driving vehicles to improve efficiency, in which vehicles are grouped in a platoon and led by the Platoon Head (PH). A PH selection algorithm was designed to offer a motivation for vehicles to be PHs, and update the platoon whenever needed. Moreover, to against malicious and false payments between the PH and Platoon Members (PMs), a smart contract is introduced to enable the BC-based payment.

Chen et al. [63] presented a BC-based searchable public-key encryption framework with forward and backward privacy, in which the central search cloud server is replaced by a decentralized searchable public-key encryption framework using a smart contract. Meanwhile, the framework employs forward and backward privacy to enhance privacy-preserving.

Rawat et al. [64] presented a privacy-aware V2X communications framework by exploiting the BC and NDN. In the proposed framework, only non-private information is included while providing verifiable, secure V2X communications for the integrity and accountability of the communications by combing the advantages of BC and NDN.

Authentication schemes

Vehicular fog computing services (VFCSs) are provided through various distributed data centers, which require cross-data center authentication. Traditional authentication schemes are not suitable for the ICVs in the IoV to access VFCSs, because they often lack consideration of user privacy and communication latency. Recent research on DLT-based authentication schemes are characterized by light-weight, key exchange mechanism, traceable driving route data, and the dynamic proxy mechanism as well as the privacy-preserving. Specifically, Yao et al. [65] proposed a BC-assisted lightweight anonymous authentication (BLA) mechanism for distributed VFCSs offering to ICVs. Flexible cross datacenter authentication can be achieved in the BLA scheme, in which an ICV can choose whether or not to be re-authenticated when it goes into a neighbor vehicular edge. Meanwhile, through anonymity and granting drivers’ responsibility users’ privacy is protected. To achieve the lightweight performance, both the interactivity between ICVs and service managers and the communication between SMs in the authentication process are eliminated, as a result, the communication latency is significantly decreased. By leveraging cryptographical and BC technologies, BLA is tamper-proof to the risk of single point of failure by design.

A lightweight authentication and key exchange scheme for VFC infrastructures have been proposed in [66]. The scheme is based on VEC and BC, in which ICVs can access VFCS with multiple features like cross datacenter authentication, user anonymity, mutual authentication, lightweight, privacy-preserving, and confidentiality. The proposed scheme considerably reduces communicational and computational overheads with effective security countermeasures. Similarly, Huajie et al. [67] proposed a BC-based lightweight Certificate Authority (CA) for efficient privacy-preserving location-based service in IoV networks.

Zhang et al. [68] presented a DLT-based authentication scheme for ICVs in the IoV, and each node contains a decentralized identification that is based on traceable driving route data and the dynamic proxy mechanism. In the dynamic proxy edge computing (DPEC) mode, cooperative authentication based on secret sharing and DLT-based data tracking and trust management is employed to enhance the protection of user privacy while improving system performance.

A lightweight threshold CA for consortium BC and a privacy-preserving location-based service (LBS) protocol enforced vehicular social networks (VSNs) is proposed by Shen et al. [67]. In this scheme, a lightweight threshold CA framework, a threshold proxy signature where the proxy signing key is issued by a coalition of the threshold number of CAs as authorized nodes in the consortium BC. A privacy preserving LBS protocol PPVC is designed against the background analysis attack by updating the ICVs’ BC address regularly.

Wang et al. [69] proposed a B-TSCA scheme, which is a BC-assisted trustworthiness scalable computation system-based V2I authentication, to reduce the complexity of continuous identity authentication when the ICVs pass the nearby RSUs. Fast re-authentication among network nodes is achieved in the scheme, through sharing ownership between RSUs securely based on DLT-based techniques.

Consensus mechanism

Vehicular MEC has been considered as an essential application of edge computing in IoV networks. Bonadio et al. [70] proposed an architecture inspired by edge paradigm to achieve a full context awareness for VANET, and deal with anomalous traffic conditions. Classical DTN Flooding based, NC multi-flows, and chord protocols are investigated, while DLTs are introduced to achieve a distributed consensus. The generated data of ICVs have linked to a permissionless blockchain in a correlated traffic pattern joint the consensus-making process. And an alternative PoW is introduced, which implements a lightweight and time-based consensus mechanism, to reduce complexity and boost reactiveness. In this architecture, ICVs send the information they collected and update the content of their block. Once a block is filled, ICVs initiate the validation phase and send the validated block to other nodes through a VM.

To implement offloading services, enhance network security and boost efficiency, Huang et al. [71] proposed a Parked Vehicle Assisted Fog Computing (PVFC) Chain by using DLTs technology. Request posting, workload undertaking, task evaluation, and reward assignment are organized and validated automatically through the execution of a smart contract.

Javaid et al. [72] developed a BC-based protocol using smart contracts, Physical unclonable functions (PUF), certificates, and a dynamic proof of work (dPoW) consensus algorithm in IoV. Combined with contracts and the BC, a secure system is formed to register trusted ICVs and block malicious ones. PUFs are exploited to improve trustworthiness through which a unique identity is given to each ICV. The use of dPoW consensus allows the protocol to scale based on the traffic and certificates are issued by RSUs for privacy-preserving.

To resolve the Byzantine Generals Problem, Zheng et al. [73] introduced lightweight BC consensus protocols on VSN. In this scheme, a hybrid chain is formed by a private chain and a public chain. Communication reliability is considered on the private chain and a scheme is provided for transferring data onto the public chain.

Data management

Vehicular sensing is empowered by the enormous data generated in ICVs, and the RSUs can also be used as edge nodes to collect and share data in MEC. Nevertheless, there are still several issues to be solved to guarantee that the sensory data can be shared securely in MEC.

Chen et al. [74] built a two layers data-sharing system based on DLTs. The demands and supplies of nodes are collected by the nearest RSUs at the bottom layer which can be used for further matching at the upper layer. A matching algorithm is developed to achieve the balance between demand and supply. Meanwhile, to motivate nodes to offer positive services, a reputation management mechanism was introduced.

By leveraging consortium BC and smart contract technologies, Kang et al. [75] presented a P2P data-sharing system, in which a reputation-based mechanism is developed to secure data sharing among ICVs. And a three-weight subjective logic model is used for handling the reputation of the ICVs. In this scheme, accurate reputation management for data sharing is achieved, and during the data sharing process, ICVs have the option to choose high-ranked data providers.

To reduce transmission costs and protect user privacy, Lu et al. [76] presented a framework based on federated learning and developed a hybrid blockchain architecture to secure the model parameters by combining the permissioned BC and the local DAG. Moreover, an asynchronous federated learning scheme is introduced based on Deep Reinforcement Learning (DRL) for fast node selection. To ensure data reliability, they integrated the trained models into BC and employed a double verification.

A BC-based data sharing scheme is presented for vehicular networks in [77]. Edge service providers are introduced to boost the efficiency of data sharing, which are placed close to the ordinary nodes to guarantee the reliability of communication between them. Interplanetary file system, a distributed file storage system, is introduced to store the data generated within the IoV network to tackle the issues related to data storage in centralized architectures, including data tampering, lack of privacy, vulnerability to hackers, etc. And with monetary incentives, edge nodes are motivated for accurate and fast service provisioning.

Dai et al. [78] integrated DRL and permissioned BC into IoV for intelligent and secure content caching. And a BC-based distributed content caching framework is designed where ICVs perform content caching and base stations maintain the permissioned BC. By employing the advanced DRL approach, a content caching scheme is introduced with taking mobility into account. Furthermore, a block verifier selection technique is also developed, Proof-of-utility (PoU), to shorten the block verification process.

Jeong et al. [79] proposed a BC-based platform for vehicle data marketplace, along with a data-sharing scheme, using BC-based data-owner-based attribute-based encryption (DO-ABE). The proposed platform achieves data confidentiality, integrity, and privacy, and handles large-capacity and privacy-sensitive black box video data by storing the metadata on BC and encrypted raw data on off-chain storage. Furthermore, the data owners can control their data by applying the BC-based DO-ABE and owner-defined access control lists.

Javaid et al. [80] presented DrivMan that is a PUF and BC-based solution for driving trust management and data-sharing in VANETs. DrivMan is a trustless system model that uses BC and a CA to register ICVs and withdraw their registration. Certificates issued by RSUs are used to preserve the privacy of the ICVs and PUFs are used to ensure data reliability.

Liu et al. [81] proposed a data-trading and debt-credit system for IoV based on the BC technique to solve the efficiency issues caused by transaction confirmation delays and cold-start problems of new users. In this system, a motivation-based debt-credit mechanism is designed to encourage data exchange among ICVs. Meanwhile, a two-stage Stackelberg game is formulated to maximize the profits of involving ICVs in the data exchange procedure.

Energy sharing and trading

To introduce the opportunities brought by plug-in hybrid electric vehicles (PHEV) to the energy network, Sun et al. [82] proposed a local V2V energy trading architecture based on FC in social hotspots and model the social welfare maximization (SWM) problem to balance the interests of both charging and discharging PHEVs. Consortium BC is employed in this architecture, by leveraging the decentralized nature of the DLTs techniques, which reduces reliance on third parties. Moreover, they improved the practical Byzantine fault tolerance (PBFT) algorithm and developed a consensus algorithm, called delegated proof of stake algorithm, which significantly lowers the cost of resources and boosts consensus efficiency. An energy iterative bidirectional auction mechanism is employed to tackle the SWM problem and obtain optimal charging and discharging decisions and energy pricing, to encourage PHEVs to join V2V energy transactions.

Similarly, Firoozjaei et al. [83] proposed the EVChain, which is a trustworthy and decentralized platform empowered by BC technology. The main BC in EVChain is connected to one or more subnetwork blockchains to share credits. Meanwhile, an interconnection position is introduced for privacy-preserving among users with k-anonymity protection. Likewise, a P2P energy trade network was developed by Thakur et al. [84] that combines V2V or V2X energy trades. In an energy distribution network, energy transfer among microgrids is not permitted so each microgrid operates one local charging station in this system. For the optimum utilization of energy, these microgrids can trade EV charging requests among themselves.

For the sake of energy companies, Fu et al. [85] proposed an EV charging system to improve the user experience with the help of energy companies. Charging information is managed and recorded on a consortium BC and a smart contract is employed to balance the distribution of the charging EVs to ensure that energy companies have equal opportunities to make a profit on this platform. A bio-objective mixed-integer programming model is presented as the logic of smart contracts to balance the trade-off between companies' and customers' interests. Furthermore, a new algorithm named limited neighborhood search with memory is designed to boost the deployment which could significantly improve the performance of the smart contract.

To tackle challenge of the driving endurance for the EVs, Xia et al. [86] proposed a V2V electricity trading framework in BC-enabled IoV, and the Bayesian game is employed for pricing with partial information of the users for privacy-preserving which is implemented through the smart contract. The optimal pricing has been achieved, which maximizes the utilities of both sides of the electricity transaction.

One of the successful applications of CPS is the smart grid. Smart EVs empower the implementation of Vehicle-to-Grid (V2G) technology that is a potential solution to improve the demand–supply mismatch issue. Zhou et al. [87] designed a V2G energy trading framework by combining BC, smart contract, and edge computing. A consortium BC-based energy trading mechanism and an incentive mechanism are introduced. To boost the success rate of block creation, edge computing has been incorporated into this scheme.

Summary

The DLTs techniques are considered as the potential solutions to these challenges faced by traditional centralized architectures. Table 3 lists a set of existing DLT-based solutions for different aspects of VEC. And Figs. 5 and 6 show that ICVs connections structure and DLT-based IoV in smart cities, in which DLT-based IoV is considered as the network architecture (for example, a secure fog computing paradigm in [58] or a BC-SDN-enabled architecture for the IoV in 5G and fog computing systems in [59]) for the integration of different elements of ITS. In the DLT-based IoV network, clustering combines ICVs based on map information [88] and DLT-based approaches (for instance, a BLA mechanism for distributed VFS in [65], a data-sharing system that consists of a double-layer blockchain in [74] or a P2P data-sharing system by exploiting consortium BC and smart contract technologies in [75]) are used to guarantee the security and storage of data in network architecture between ICVs. Meanwhile, the energy trading and sharing between V2V or V2G are also considered in this system, such as a local V2V energy trading architecture based on FC in [82, 84] and the work in [87] a V2G energy trading framework is proposed by exploiting BC, contract theory, and edge computing. In this context, ICVs are connected in the DLT-based system, which offers a secure, privacy-preserving, and efficient platform for transactions, data exchange, and energy trading and sharing in ITS without a centralized deficiency.

Table 3 Application scenarios of DLTs in vehicular MEC
Fig. 5
figure 5

The structure of ICVs connections

Fig. 6
figure 6

DLT-based Internet of vehicles in smart cities

DLT related platforms and tools for vehicles in MEC

We will describe some existing DLT-based platforms and useful tools in vehicular MEC research and list some typical platforms and tools that are suitable in the IoV domain, as shown in Fig. 7. And a comparison of distributed ledger platforms for the vehicles in MEC is given in Table 4.

Fig. 7
figure 7

Typical platforms and tools in the IoV domain

Table 4 Comparison of distributed ledger platforms for the vehicles in MEC

Bitcoin [32] is the very first BC system and the PoW-based cryptocurrency. But the performance of Bitcoin [24] is not suitable for any real-time applications. Even it offers an efficient, cheap, and secure payment system. The innovative data structure and consensus algorithm of Bitcoin inspiring various DLT-based solutions in vehicular MEC, such as in [58, 65, 79].


Ethereum [90] is an open-source platform for decentralized applications created in 2015. And it is a popular programmable BC [91] endorsed by thousands of developers worldwide, and various applications are developed on Ethereum such as cryptocurrency wallets, financial applications, decentralized markets, and so on [86]. Turing complete scripting language, known as Solidity, is used for implementing smart contracts. Ethereum virtual machine (EVM) offers an isolated runtime environment for handling the computation and state of smart contracts in Ethereum [71]. By utilizing the smart contract, lots of IoV applications can be implemented or tested on Ethereum. Sharma et al. [49] implemented vehicular data management as a smart contract on the Ethereum blockchain. Ethereum was also used for performing simulations in the research work of Reference [77], in which a BC-based data storage is presented for decentralized vehicular networks.


Hyperledger fabric [92] is an important member of the open-source BC framework family, Hyperledger [93], supported by the Linux Foundation. Hyperledger Fabric is designed as a platform for developing applications with a modular framework. Consensus and membership services can be plug-and-play on this platform. Its modular and versatile design is suitable for a wide range of industry use scenarios and it provides an extraordinary approach to a consensus that empowers performance while preserving privacy [94]. In [59], Hyperledger Fabric is used as the DLT-based platform, Gao et al. presented a BC-SDN-enabled architecture for the IoV in 5G and FC systems.


vDLT [95, 96] is a service-oriented BC system with virtualization and decoupled management, control, and execution. There are various types of services and applications based on their QoS requirements. Jiang et al. [97] proposed a BC-enabled model sharing approach, and the vehicle BC is based on the vDLT.


TRUFFLE [98] is a friendly development environment for developers, testing framework, and asset pipeline for BC using the EVM. The main features of the TRUFFLE suite include built-in smart contract compilation, linking, deployment and binary management, and automated contract testing for fast development.


NS-3 [99] is a free network simulator for Internet systems, which is widely used in research institutions and universities. To evaluate the performance of their Secure-V2X framework, Rawat et al. [64] used a sharding-based tool built-in NS-3 with different devices and capabilities to join in BC-based communications.


Veins [100] is an open-source framework for running vehicular network simulations. It is based on two well-established simulators: (1) OMNeT +  +  [101] is an object-oriented, time discrete message passing driven network simulator, and (2) SUMO [102], is a microscopic and continuous multi-modal traffic simulator. OMNeT +  +  is popular for its modularity, high fidelity, and flexibility, which could also be extended towards the 5G system via VeinsLTE. These features allow the proposal of Bonadio et al. [70] to be allied with the standard for the automotive industry, to model the IoV domain correctly, and to test its performance utilizing network simulations as close as possible to reality. SUMO is an open-source, microscopic, highly portable, and continuous road traffic simulation package designed to handle large road networks. A case study is designed by Javaid et al. [72] for a BC-based protocol using the SUMO simulation package with OSMWebWizard2. Veins’ framework extends these to offer a comprehensive suite of Inter-Vehicle Communication (IVC) simulation [103].


AnyLogic [104] is a simulation platform with support for traffic simulation. And it helps to deal with complex challenges like transport network optimization [58]. It allows users to manage transport resource planning, maximize transport load, and minimize costs within the simulation environment.


MIRACL library [105] is a well-known cryptographic library and it is normally used to perform mathematical operations underlying pairing-based cryptography. By utilizing this tool, Ali et al. [106] proposed an efficient certificate-less public-key signature scheme using bilinear pairing to provide conditional privacy-preserving authentication V2I communication in VANETs. Moreover, Chen et al. [63] presented a BC-based searchable public-key encryption scheme with forward and backward privacy for VSN.


Cpabe-toolkit [107] offers a set of programs implementing a ciphertext-policy attribute-based encryption scheme. In a ciphertext policy attribute-based encryption scheme, the private key of each user is associated with a set of attributes representing their capabilities, and ciphertext is encrypted such that only users whose attributes satisfy a certain policy can decrypt. Feng et al. [108] introduced a framework called BC-assisted privacy-preserving authentication system, and it effectively protects user privacy in VANETs, which is based on the cpabe-toolkit.

Open issues and challenges

The adoption of DLTs in the IoV domain is still in its early phase, and its evolution may follow different potential directions. There is a wide range of open issues and challenges with the application of DLTs to VEC.

  • Security and privacy: even though DLTs are introduced to solve the security and privacy issues in the IoV, it still has various security deficiencies which can be exploited by malicious attackers. For instance, attacked by malicious users, the IOTA users lost over 4 Million dollars [19]. Various vulnerabilities can be used by cyber-attackers, including canceling all transactions, random forks, selfish mining, and double-spending. In the IoV network, ICVs need to share data effectively even the communications between ICVs being unstable. Further and thorough research is still needed to improve data sharing efficiency and enhance network reliability. Meanwhile, drivers are increasingly worried about the security of their data and privacy-preserving that can deter them from positive data-sharing. Consequently, it is still an open issue to secure the data generated in IoV without sacrifice the system performance.

  • Mobile edge computing, fog computing, and DLTs: edge and fog computing is a potential architecture to reduce the load of the central cloud and boost real-time applications [109]. The rapid development of MEC and FC is due to their abilities to ease some difficult issues like network congestion, latency, and local autonomy. The integration of MEC and BC technologies empowers the upgrade of ITS. For instance, Bonadio et al. [70] proposed a fog communication and computing paradigm to deal with anomalous conditions in the ITS. However, those proposed solutions and applications have not been deployed worldwide due to scalability and communication deficiency [46].

  • AI and DLTs: researchers have already investigated the integration of BC and AI [110]. In the framework of traditional machine learning (ML), a centralized server is required to collect data. On the contrary, the new emerging federated learning paradigm is a promising approach for distributed circumstances, in which users keep their data with themselves and only the parameters are sent to the server for aggregation [76]. This mechanism enables users to learn a wide model collaboratively while their privacy is well protected [111]. Unfortunately, the ML that directly applies federated learning to ICVs still has pitfalls relying on a central server due to updates of the global ML model are centralized. In the work of Reference [112], Fu et al. designed a BC-based collective learning framework, in which central servers are replaced by the BC system, which can improve the security and performance of the collective learning process. Despite these meaningful research outputs, the implementations of AI and DLTs still have a long way to go, and further research efforts are still needed, such as incentive mechanisms, optimal selection mechanism of model sharing, and so on.

  • Scalability: a significant challenge within the cyber-security domain is scalability. The network applications serve thousands of users and the scales grow rapidly. The transaction speed in some BC-assisted systems is relevantly low with a higher charging fee.

  • Energy consumption: PoW is the most popular consensus mechanism in most BC systems. For instance, by 2020, the energy consumption of Bitcoin reaches 59.26 Terawatt-Hours (TwH), which is even higher than those in some largest countries around the world [113].

  • Quantum-resilient: another challenge is caused by the emergence of quantum computers, and secure quantum-resilient security architectures are needed against cyber-attacks from quantum computers shortly. The authors in [114] proposed a distributed ledger scheme to face this threat. Quantum computing will bring challenges for BC and be used as part of DLTs systems [115].

Conclusions

This survey has provided a review of DLTs techniques and applications in the vehicular MEC. Meanwhile, we have listed the open issues and future research directions like security and privacy, the integration of AI and DLTs, and energy consumption to quantum resilient.