{"id":"https://openalex.org/W3191392053","doi":"https://doi.org/10.1109/iwcmc51323.2021.9498779","title":"Mobility-Aware Blockchain Resource Allocation Algorithm for Vehicular Networks","display_name":"Mobility-Aware Blockchain Resource Allocation Algorithm for Vehicular Networks","publication_year":2021,"publication_date":"2021-06-28","ids":{"openalex":"https://openalex.org/W3191392053","doi":"https://doi.org/10.1109/iwcmc51323.2021.9498779","mag":"3191392053"},"language":"en","primary_location":{"id":"doi:10.1109/iwcmc51323.2021.9498779","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc51323.2021.9498779","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 International Wireless Communications and Mobile Computing (IWCMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5017675358","display_name":"Boxian Liao","orcid":"https://orcid.org/0000-0003-2812-3697"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Boxian Liao","raw_affiliation_strings":["State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045072935","display_name":"Siya Xu","orcid":"https://orcid.org/0000-0001-6124-0030"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Siya Xu","raw_affiliation_strings":["State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101502802","display_name":"Qiang Gao","orcid":"https://orcid.org/0000-0003-4372-9021"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Qiang Gao","raw_affiliation_strings":["Shenzhen Power Supply Co, Ltd, Guangdong, China"],"affiliations":[{"raw_affiliation_string":"Shenzhen Power Supply Co, Ltd, Guangdong, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101534961","display_name":"Qian Wu","orcid":"https://orcid.org/0000-0002-0558-2500"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Qian Wu","raw_affiliation_strings":["Shenzhen Power Supply Co, Ltd, Guangdong, China"],"affiliations":[{"raw_affiliation_string":"Shenzhen Power Supply Co, Ltd, Guangdong, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100416018","display_name":"Jia Chen","orcid":"https://orcid.org/0000-0002-1785-8746"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jia Chen","raw_affiliation_strings":["Shenzhen Power Supply Co, Ltd, Guangdong, China"],"affiliations":[{"raw_affiliation_string":"Shenzhen Power Supply Co, Ltd, Guangdong, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5017675358"],"corresponding_institution_ids":["https://openalex.org/I139759216"],"apc_list":null,"apc_paid":null,"fwci":0.1003,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.42516979,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"160","last_page":"165"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.98580002784729,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13918","display_name":"Advanced Data and IoT Technologies","score":0.9847999811172485,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8307082653045654},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.7657471895217896},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6012563705444336},{"id":"https://openalex.org/keywords/throughput","display_name":"Throughput","score":0.5580873489379883},{"id":"https://openalex.org/keywords/vehicular-ad-hoc-network","display_name":"Vehicular ad hoc network","score":0.501013994216919},{"id":"https://openalex.org/keywords/resource-allocation","display_name":"Resource allocation","score":0.4734054505825043},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.4324345886707306},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4311196208000183},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.40905529260635376},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3597886562347412},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.20129644870758057},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.17763400077819824}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8307082653045654},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.7657471895217896},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6012563705444336},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.5580873489379883},{"id":"https://openalex.org/C192448918","wikidata":"https://www.wikidata.org/wiki/Q682677","display_name":"Vehicular ad hoc network","level":4,"score":0.501013994216919},{"id":"https://openalex.org/C29202148","wikidata":"https://www.wikidata.org/wiki/Q287260","display_name":"Resource allocation","level":2,"score":0.4734054505825043},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.4324345886707306},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4311196208000183},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.40905529260635376},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3597886562347412},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.20129644870758057},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.17763400077819824},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iwcmc51323.2021.9498779","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc51323.2021.9498779","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 International Wireless Communications and Mobile Computing (IWCMC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W565267543","https://openalex.org/W2020081405","https://openalex.org/W2131049857","https://openalex.org/W2308890454","https://openalex.org/W2569805695","https://openalex.org/W2586333888","https://openalex.org/W2803109435","https://openalex.org/W2887486920","https://openalex.org/W2901152868","https://openalex.org/W2909485178","https://openalex.org/W2916889275","https://openalex.org/W2964043796","https://openalex.org/W2969565105","https://openalex.org/W2998623446","https://openalex.org/W6692846177"],"related_works":["https://openalex.org/W4210406818","https://openalex.org/W4306779889","https://openalex.org/W4386732777","https://openalex.org/W3211706803","https://openalex.org/W4382775358","https://openalex.org/W4246942721","https://openalex.org/W3209862047","https://openalex.org/W4304136894","https://openalex.org/W2989851257","https://openalex.org/W3025994448"],"abstract_inverted_index":{"With":[0],"the":[1,6,18,38,44,54,60,71,75,99,103,108,126,134,141,144,148,151],"development":[2],"of":[3,8,40,51,62,70,77,140,150],"intelligent":[4],"transportation,":[5],"concept":[7],"vehicular":[9,19,91],"networks":[10],"is":[11,58],"becoming":[12],"more":[13,15],"and":[14,28,37,53,111,115,137],"popular.":[16],"In":[17,68],"networks,":[20,92],"vehicle":[21,45],"nodes":[22],"have":[23],"large":[24],"scale,":[25],"strong":[26],"mobility,":[27],"there":[29],"are":[30],"malicious":[31],"attackers.":[32],"The":[33],"open":[34],"network":[35],"environment":[36],"diversity":[39],"communication":[41],"types":[42,50],"make":[43],"information":[46,57,101],"vulnerable":[47],"to":[48,132],"various":[49],"attacks,":[52],"user's":[55],"privacy":[56,100],"facing":[59],"risk":[61],"being":[63],"leaked":[64],"at":[65],"any":[66],"time.":[67],"view":[69],"security":[72],"threats":[73],"in":[74,102,107],"Internet":[76],"vehicles":[78],"(IoV),":[79],"this":[80],"paper":[81],"proposes":[82,112],"a":[83,94,113],"blockchain-based":[84],"trusted":[85],"authentication":[86],"service":[87],"processing":[88],"framework":[89],"for":[90],"designs":[93],"block":[95],"generation":[96],"model,":[97],"stores":[98],"blockchain":[104,118],"system":[105],"deployed":[106],"edge":[109],"layer,":[110],"delay":[114,136],"throughput-oriented":[116],"mobility-aware":[117],"resource":[119],"allocation":[120],"(MABRA)":[121],"algorithm.":[122],"Also,":[123],"we":[124],"use":[125],"deep":[127],"reinforcement":[128],"learning":[129],"(DRL)":[130],"algorithm":[131,153],"optimize":[133],"total":[135],"transaction":[138],"throughput":[139],"system.":[142],"Finally,":[143],"simulation":[145],"results":[146],"show":[147],"effectiveness":[149],"MABRA":[152],"under":[154],"different":[155],"parameter":[156],"settings.":[157]},"counts_by_year":[{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
