A privacy-preserving data aggregation system based on blockchain in VANET

被引:1
作者
Yang, Ruicheng [1 ,2 ]
Dong, Guofang [1 ,2 ]
Xu, Zhengnan [1 ,2 ]
Ning, Juangui [1 ,2 ]
Du, Jianming [1 ,2 ]
机构
[1] Yunnan Minzu Univ, Sch Elect Informat Technol, Kunming 650500, Peoples R China
[2] Yunnan Key Lab Unmanned Autonomous Syst, Kunming 650500, Peoples R China
来源
BLOCKCHAIN-RESEARCH AND APPLICATIONS | 2024年 / 5卷 / 03期
基金
中国国家自然科学基金;
关键词
Vehicular ad hoc networks; Data aggregation; Blockchain; Key escrow resilience; Anonymity; BATCH VERIFICATION; SCHEME; AUTHENTICATION; SECURITY;
D O I
10.1016/j.bcra.2024.100210
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the realm of vehicular ad hoc networks (VANETs), data aggregation plays a pivotal role in bringing together data from multiple vehicles for further processing and sharing. Erroneous data feedback can significantly impact vehicle operations, control, and overall safety, necessitating the assurance of security in vehicular data aggregation. Addressing the security risks and challenges inherent in data aggregation within VANETs, this paper introduces a blockchain-based scheme for secure and anonymous data aggregation. The proposed scheme integrates cloud computing with blockchain technology, presenting a novel blockchain-based data aggregation system that robustly supports efficient and secure data collection in VANETs. Leveraging key escrow resilience mechanisms, the solution ensures the security of system keys, preventing the security problems caused by keys generated by third parties alone in the past. Furthermore, through secondary data aggregation, fine-grained data aggregation is achieved, providing effective support for cloud services in VANETs. The effectiveness of the proposed scheme is confirmed through security analysis and performance evaluations, demonstrating superior computational and communication efficiency compared existing alternatives.
引用
收藏
页数:13
相关论文
共 41 条
[1]   An Energy-Efficient Data Aggregation Mechanism for IoT Secured by Blockchain [J].
Ahmed, Adeel ;
Abdullah, Saima ;
Bukhsh, Muhammad ;
Ahmad, Israr ;
Mushtaq, Zaigham .
IEEE ACCESS, 2022, 10 :11404-11419
[2]   A secure authentication scheme for VANETs with batch verification [J].
Bayat, Majid ;
Barmshoory, Mostafa ;
Rahimi, Majid ;
Aref, Mohammd Reza .
WIRELESS NETWORKS, 2015, 21 (05) :1733-1743
[3]   On the false-positive rate of Bloom filters [J].
Bose, Prosenjit ;
Guo, Hua ;
Kranakis, Evangelos ;
Maheshwari, Anil ;
Morin, Pat ;
Morrison, Jason ;
Smid, Michiel ;
Tang, Yihui .
INFORMATION PROCESSING LETTERS, 2008, 108 (04) :210-213
[4]   Double-Blockchain Assisted Secure and Anonymous Data Aggregation for Fog-Enabled Smart Grid [J].
Chen, Siguang ;
Yang, Li ;
Zhao, Chuanxin ;
Varadarajan, Vijayakumar ;
Wang, Kun .
ENGINEERING, 2022, 8 :159-169
[5]   New Publicly Verifiable Databases with Efficient Updates [J].
Chen, Xiaofeng ;
Li, Jin ;
Huang, Xinyi ;
Ma, Jianfeng ;
Lou, Wenjing .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2015, 12 (05) :546-556
[6]   Certificateless aggregate signature with efficient verification [J].
Chen, Yu-Chi ;
Tso, Raylin ;
Mambo, Masahiro ;
Huang, Kaibin ;
Horng, Gwoboa .
SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (13) :2232-2243
[7]   SPECS: Secure and privacy enhancing communications schemes for VANETs [J].
Chim, T. W. ;
Yiu, S. M. ;
Hui, Lucas C. K. ;
Li, Victor O. K. .
AD HOC NETWORKS, 2011, 9 (02) :189-203
[8]   Fair payments for privacy-preserving aggregation of mobile crowdsensing data [J].
Dorsala, Mallikarjun Reddy ;
Sastry, V. N. ;
Chapram, Sudhakar .
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (08) :5478-5492
[9]   An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks [J].
He, Debiao ;
Zeadally, Sherali ;
Xu, Baowen ;
Huang, Xinyi .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (12) :2681-2691
[10]   b-SPECS plus : Batch Verification for Secure Pseudonymous Authentication in VANET [J].
Horng, Shi-Jinn ;
Tzeng, Shiang-Feng ;
Pan, Yi ;
Fan, Pingzhi ;
Wang, Xian ;
Li, Tianrui ;
Khan, Muhammad Khurram .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (11) :1860-1875