| Literature DB >> 35336471 |
Xingyu He1, Xianhua Niu1,2, Yangpeng Wang1, Ling Xiong1, Zhizhong Jiang1, Cheng Gong1.
Abstract
Through information sharing, vehicles can know the surrounding road condition information timely in Vehicular Adhoc Networks. To ensure the validity of these messages and the security of vehicles, the message authentication, privacy-preserving, and delay problems are three important issues. Although many conditional privacy-preserving authentication schemes have been proposed to ensure secure communication, there still exist some imperfections such as frequent interactions or unlinkability. From this, our paper proposes a novel hierarchical blockchain-assisted authentication scheme to solve these existing issues comprehensively. First, unlinkability is achieved by a dynamic key derivation algorithm. Second, the proposed scheme can reduce correlation processing delay, queuing delay, and deployment costs by adopting hierarchical Vehicle Fog Computing. Third, cross-region authentication is achieved by taking advantage of the properties of blockchain. In addition, we demonstrate our scheme can fulfill the security criteria of the Vehicular Adhoc Network by security analysis. Furthermore, the simulations are carried out to show its availability by using JAVA and NS-3. The findings reveal that the suggested method outperforms earlier schemes in terms of computation cost and communication cost. All in all, making the authentication scheme more efficient and concise is the focus of our future research.Entities:
Keywords: authentication; blockchain; hierarchical; privacy-preserving
Year: 2022 PMID: 35336471 PMCID: PMC8952327 DOI: 10.3390/s22062299
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1A typical VANET structure.
Summary of related work.
| Scheme | Key Technology | Pros | Cons |
|---|---|---|---|
| Picconi [ | Challenge the aggregator to provide a proof |
Easy to verify Independence | Certificate management is difficult |
| Zhang [ |
Guarantee security and privacy preservation Strong scalability | Certificate management is difficult | |
| He [ | Elliptic Curve Cryptography |
Support batch verification Fast validation | The implementation of cross-region authentication is complex |
| Zhong [ | Pseudonym-based signatures |
Support batch verification Fast validation | The implementation of cross-region authentication is complex |
| Wang [ | Pseudonyms-based and group-based signatures |
Easy to verify Guarantee security and privacy preservation | Require frequent authentication |
| Ali [ | Hybrid signature |
Easy to verify Support batch verification | No consideration for unlinkability |
| Yao [ |
Distributed VFC Blockchain-based |
Flexible cross-region authentication Convenient subsequent certification | No consideration for unlinkability |
| Kaur [ |
Key-exchange Distributed VFC Blockchain-based |
Flexible cross-region authentication Convenient subsequent certification Support mutual authentication | No consideration for unlinkability |
| Wang [ |
Trustworthiness evaluation mechanism Blockchain-based |
Flexible cross-region authentication Guarantee security and privacy preservation | Require frequent interaction |
| Lu [ |
MPT Blockchain-based |
Realize transparency of certificate and revocation Flexible cross-region authentication | Require frequent interaction |
| Lin [ |
Dynamic key derivative algorithm Smart contract Blockchain-based |
Flexible cross-region authentication Guarantee unlinkablility of message | High message processing and queuing latency |
Figure 2Key generation algorithm.
Defintion of notations.
| Notations | Definition |
|---|---|
|
|
|
|
| two large prime integers |
|
| an additive cyclic group of prime order |
|
| a generator of |
|
| the number of SMs |
|
| two multiplicative cyclic groups of prime order |
|
| a generator of |
|
| a bilinear map where |
|
| current timestamp |
|
| real identity |
|
| pseudonym |
|
| symmetric encryption utilizing |
|
| symmetric decryption utilizing |
|
| hash function |
| ⊕ | exclusive-OR operation |
| ‖ | concatenation operation |
Figure 3System model.
Figure 4Registration phase.
Figure 5Identity authentication phase.
Figure 6Message authentication phase.
Security comparisons.
| Yao [ | Lin [ | Ali [ | Ours | |
|---|---|---|---|---|
| Identity authentication | ✓ | ✓ | ✓ | ✓ |
| Message authentication | ✓ | ✓ | ✓ | ✓ |
| Identity privacy preservation | ✓ | ✓ | ✓ | ✓ |
| Unlinkability | × | ✓ | × | ✓ |
| Traceability | ✓ | ✓ | ✓ | ✓ |
| Resist various attacks | ✓ | ✓ | ✓ | ✓ |
✓: The requirement is satisfy. ×: The requirement is not satisfy.
The average time for each algorithm.
| Algorithm | Average Time (ms) |
|---|---|
|
| 4.6003 |
|
| 1.5271 |
|
| 6.5458 |
|
| 0.7088 |
|
| 0.0434 |
|
| 0.0198 |
|
| 0.0118 |
|
| 0.6871 |
|
| 0.0047 |
Comparison of computing cost.
| V2S Communication | V2V Communication | |
|---|---|---|
| Yao’s scheme [ | ||
| Lin’s scheme [ | - | |
| Ali’s scheme [ | - | |
| Our scheme |
-: It does not have this part.
Comparison of communication cost.
| Communication Cost (bytes) | |
|---|---|
| Yao’s scheme [ | 120 |
| Lin’s scheme [ | 304 |
| Ali’s scheme [ | 188 |
| Our scheme | 180 |
Figure 7The map with 0.5 × 0.5 km2.
Figure 8The impact of density in delay and packet loss ratio.