0% Complete
فارسی
Home
/
شانزدهمین کنفرانس بین المللی فناوری اطلاعات و دانش
Coded Sharding for Vehicular Blockchains: A Lagrange Interpolation-Based Approach to IoV Scalability
Authors :
Behdad Alagha
1
Maedeh Mosharraf
2
1- دانشگاه شهید بهشتی
2- دانشگاه شهید بهشتی
Keywords :
Blockchain Scalability،Decentralization،Internet of Vehicles،Polynomial Encoding،Scalability Trilemma،Sharding Scheme
Abstract :
The rapid growth of Internet of Vehicles (IoV) systems introduces significant scalability and storage challenges, especially as vehicle-generated data must be securely and efficiently managed on resource-constrained infrastructure. Inspired by PolyShard’s coding-theoretic approach to resolving the blockchain trilemma, this paper proposes a Lagrange interpolation-based coded sharding scheme tailored for vehicular blockchain environments. Our method encodes shard data using evaluations of low-degree polynomials, allowing nodes to store compact, coded versions of the chain. We simulate this approach on a 10×10 Manhattan grid topology to assess its storage efficiency, throughput and resilience against adversarial data loss. Experimental results demonstrate that the proposed scheme significantly reduces per-node storage consumption compared to full replication while delivering substantially higher throughput and superior fault tolerance over naïve sharding. Hence, the scheme demonstrates promising adaptability and scalability for dynamic and intermittently connected IoV scenarios, where traditional blockchain systems often fall short. Furthermore, this work lays a foundational step towards scalable and secure vehicular blockchains and opens avenues for integrating coded verification in future deployments.
Papers List
List of archived papers
Towards Provable Privacy Protection in IoT-Health Applications
Samane Sobuti - دکتر سیاوش خرسندی
Stock Market Prediction Using Hard and Soft Data Fusion
Saeed Mohammadi Dashtaki - Masoud Alizadeh - Behzad Moshiri
AI-based Secure Intrusion Detection Framework for Digital Twin-enabled Critical Infrastructure
Tanisha Patel - Nilesh Kumar Jadav - Tejal Rathod - Sudeep Tanwar - Deepak Garg - Hossein Shahinzadeh
کشف برخط تقلب پیشنهاد ساختگی (Bid-Shielding) در مناقصه و مزایدههای الکترونیکی هلندی با رویکرد تحلیل شبکه اجتماعی
فاطمه الثلایا - دکتر سید علیرضا هاشمی گلپایگانی فاطمه الثلایا - سید علیرضا هاشمی گلپایگانی -
AI-based Message Spam Classification Framework for Secure Autonomous Vehicles Communication
Riya Upadhyay - Mili Virani - Lakshit Pathak - Rajesh Gupta - Sudeep Tanwar - Hossein Shahinzadeh
ارزیابی و برنامهریزی اجرای پیشنهادی هوش مصنوعی در صنعت پتروشیمی ایران
امین رضا انصاری - احد قائمی - سید مهدی کوچک کوثری
Spatial On–Off Keying Modulation with Mirror-Array Optical IRSs for Indoor Machine-to-Machine Visible Light Communication
Babak Sadeghi - Seyed Mohammad Sajad Sadough
شناسایی حملات فیشینگ با استفاده از الگوریتم عقاب آتشین و شبکه عصبی کانولوشن
علی کوشاری - مهدی فرتاش
FiReT: A Neural Radiance Fields Framework for Wireless Field Reconstruction and Transmitter Placement
Negar Pouya - Armin Soleymani - Gholamreza Moradi - Farzaneh Abdollahi
شناسایی حملات رومینگ تلفنهمراه با استفاده از یادگیری ماشین
سعیده سیف الدین - سجاد شیرعلی شهرضا
more
Samin Hamayesh - Version 42.5.2