Provable Secure and Lightweight Blockchain-Based V2I Handover Authentication and V2V Broadcast Protocol for VANETs

被引:21
作者
Xie, Qi [1 ]
Ding, Zixuan [1 ]
Tang, Wen [1 ]
He, Debiao [2 ,3 ]
Tan, Xiao [1 ]
机构
[1] Hangzhou Normal Univ, Key Lab Cryptog Zhejiang Prov, Hangzhou 311121, Peoples R China
[2] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan 430072, Peoples R China
[3] Qilu Univ Technol, Shandong Acad Sci, Shandong Prov Key Lab Comp Networks, Jinan 250014, Peoples R China
基金
中国国家自然科学基金;
关键词
Handover authentication; VANETs; blockchain; broadcast authentication; vehicle to infrastructure; vehicle to vehicle;
D O I
10.1109/TVT.2023.3289175
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
As one of the most valuable vehicle-based Internet of Things (IoT) applications, Vehicular Ad-hoc Networks (VANETs) have received extensive attention since it was proposed. In order to ensure the safety of VANETs and improve the communication efficiency between moving vehicles and different Roadside Units (RSUs), some handover authentication protocols for VANETs have been proposed. However, the existing protocols have some problems such as excessive computation overhead, untraceable malicious messages, and the inability to resist RSU captured attacks. To solve the above problems, we propose a blockchain-based protocol to achieve Vehicle to Infrastructure (V2I) authentication, V2I handover authentication, and Vehicle to Vehicle (V2V) broadcasting authentication. The advantages of our protocol are: (1) It achieves lightweight V2I handover authentication and V2V broadcast authentication, dynamic anonymity strategy and embedding strategy of pseudo-identity and vehicle feature are used to guarantee anonymity and traceability simultaneously; (2) The announcement can be broadcasted verifiably without the help of transportation infrastructure (e.g., RSU) or the Trusted Authority (TA); and (3) The Physically Unclonable Functions (PUF) technology is used to resist RSU captured attacks. We use formal security proof under random oracle model to prove the security of the proposed protocol. Compared with related V2I handover authentication protocols, our protocol can resist RSU captured attacks and other various known attacks. The sum of first and handover authentication efficiency of our protocol is 37.93% higher than the previous most effective protocol, while maintaining the same level of communication and storage costs.
引用
收藏
页码:15200 / 15212
页数:13
相关论文
共 50 条
  • [31] Integration of 5G mmWave-Enabled V2I and V2V: Experimental Evaluation
    Kim, Junhyeong
    Chung, Heesang
    Kim, Ilgyu
    Noh, Gosan
    IEEE COMMUNICATIONS MAGAZINE, 2024, 62 (01) : 104 - 110
  • [32] Unified security architecture and protocols using third party identity in V2V and V2I networks
    Choi, Jaeduck
    Jung, Souhwan
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2012, 12 (15) : 1326 - 1337
  • [33] Performance improvement of V2I uplink transmission on far vehicles using frequency scheduling-based cooperative V2V relay transmission
    Ishikawa, Hayato
    Okamoto, Eiji
    Okada, Hiraku
    Makido, Satoshi
    2020 IEEE 17TH ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC 2020), 2020,
  • [34] Smart Card-Based Identity Management Protocols for V2V and V2I Communications in CCAM: A Systematic Literature Review
    Berlato, Stefano
    Centenaro, Marco
    Ranise, Silvio
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2022, 23 (08) : 10086 - 10103
  • [35] Blockchain-enabled solution for secure and scalable V2V video content dissemination
    Hang Shen
    Xin Liu
    Ning Shi
    Tianjing Wang
    Guangwei Bai
    Peer-to-Peer Networking and Applications, 2023, 16 : 554 - 570
  • [36] BlockSLAP: Blockchain-based Secure and Lightweight Authentication Protocol for Smart Grid
    Wang, Weizheng
    Huang, Huakun
    Zhang, Lejun
    Han, Zhaoyang
    Qiu, Chen
    Su, Chunhua
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1333 - 1339
  • [37] Economic comparison between vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) at freeway on-ramps based on microscopic simulations
    Dong, Changyin
    Wang, Hao
    Li, Ye
    Liu, Yongfei
    Chen, Quan
    IET INTELLIGENT TRANSPORT SYSTEMS, 2019, 13 (11) : 1726 - 1735
  • [38] Blockchain-enabled solution for secure and scalable V2V video content dissemination
    Shen, Hang
    Liu, Xin
    Shi, Ning
    Wang, Tianjing
    Bai, Guangwei
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2023, 16 (02) : 554 - 570
  • [39] How to provide fair service for V2I communications in VANETs?
    Hoeft, Michal
    Rak, Jacek
    AD HOC NETWORKS, 2016, 37 : 283 - 294
  • [40] 5G-based V2V broadcast communications: A security perspective
    Muhammad, Mujahid
    Safdar, Ghazanfar Ali
    ARRAY, 2021, 11