Table 6.
Technical aspects of blockchain and smart contracts’ methodologies for ethical CCAM challenges.
| Ref | Challenge | Blockchain/ Smart Contract |
Consensus Mechanism | Techniques/Tools | Performance of the Methodology |
|---|---|---|---|---|---|
| [56] | Accountability | Blockchain | PoW | NDN | Moderate performance in the communication load due to the handling of a large amount of data by the vehicles but also due to the different key pairs used in the technologies based on |
| [57] | Accountability | Permissioned Blockchain and Smart Contracts | PoW | IPFS, SDNs | Low performance |
| [58] | Accountability | Blockchain and Smart Contracts | DPoS, PoW | Better for large concurrent authentication requests than a large number of requests | |
| [59] | Responsibility | Blockchain | PBFT | SDN, Fog computing | Moderate performance in terms of communication load |
| [60] | Responsibility | Permissioned Blockchain and Smart Contracts | PoA | IPFS | Low performance as the number of malicious nodes increases, compared to the methodology without smart contracts |
| [43] | Trust management | Blockchain and Smart Contracts | PoW and PoS | PUFs | Works effectively against data tampering and identity disclosure attacks |