DBCPA: Dual Blockchain-Assisted Conditional Privacy-Preserving Authentication Framework and Protocol for Vehicular Ad Hoc Networks

被引:34
作者
Zhang, Jing [1 ,2 ]
Jiang, Yue [1 ,2 ]
Cui, Jie [1 ,2 ]
He, Debiao [3 ,4 ]
Bolodurina, Irina [5 ]
Zhong, Hong [1 ,2 ]
机构
[1] Anhui Univ, Sch Comp Sci & Technol, Key Lab Intelligent Comp & Signal Proc, Minist Educ, Hefei 230039, Peoples R China
[2] Anhui Univ, Anhui Engn Lab IoT Secur Technol, Hefei 230039, Peoples R China
[3] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan 430072, Peoples R China
[4] MatrixElements Technol, Shanghai Key Lab Privacy Preserving Computat, Shanghai 201204, Peoples R China
[5] Orenburg State Univ, Fac Math & Informat Technol, Orenburg 460018, Russia
基金
中国国家自然科学基金;
关键词
Blockchains; Security; Authentication; Privacy; Vehicular ad hoc networks; Smart contracts; Vehicle dynamics; dual blockchain; smart contract; vehicular ad hoc networks; BATCH VERIFICATION; 5G; SCHEME; SECURE; COMMUNICATION; EFFICIENT;
D O I
10.1109/TMC.2022.3230853
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Vehicular ad hoc networks (VANETs) connect all vehicles through wireless channels. They provide extensive real-time traffic information services that improve driving safety and traffic management efficiency. However, VANETs are vulnerable to security attacks because of the open wireless nature of their communication channels. Most security mechanisms for traditional VANETs are centralized and have certain limitations in satisfying security requirements, such as anti-single-point failure, distributed security authentication of messages, and privacy preservation in VANETs. To address these issues, herein, we propose a dual blockchain-assisted conditional privacy-preserving authentication framework and protocol for VANETs. The identity authentication and privacy preservation of vehicles in VANETs can be realized without relying on a centralized trusted third party. The proposed scheme also allows for the conditional tracking of illegal vehicles. The decentralized dynamic revocation of illegal vehicles can be realized through smart contracts, rendering the scheme efficient and scalable. We implement this scheme in an Ethereum test network to demonstrate its feasibility and conduct an in-depth security analysis and comprehensive performance evaluation of the proposed scheme. The results demonstrate that the proposed scheme is an effective solution for the development of a decentralized authentication system for VANETs.
引用
收藏
页码:1127 / 1141
页数:15
相关论文
共 54 条
[1]   Bilinear Pairing-Based Hybrid Signcryption for Secure Heterogeneous Vehicular Communications [J].
Ali, Ikram ;
Chen, Yong ;
Ullah, Niamat ;
Afzal, Muhammad ;
He, Wen .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 70 (06) :5974-5989
[2]   An Efficient and Provably Secure ECC-Based Conditional Privacy-Preserving Authentication for Vehicle-to-Vehicle Communication in VANETs [J].
Ali, Ikram ;
Chen, Yong ;
Ullah, Niamat ;
Kumar, Rajesh ;
He, Wen .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 70 (02) :1278-1291
[3]   An efficient identity-based signature scheme without bilinear pairing for vehicle-to-vehicle communication in VANETs [J].
Ali, Ikram ;
Lawrence, Tandoh ;
Li, Fagen .
JOURNAL OF SYSTEMS ARCHITECTURE, 2020, 103 (103)
[4]   Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains [J].
Androulaki, Elli ;
Barger, Artem ;
Bortnikov, Vita ;
Cachin, Christian ;
Christidis, Konstantinos ;
De Caro, Angelo ;
Enyeart, David ;
Ferris, Christopher ;
Laventman, Gennady ;
Manevich, Yacov ;
Muralidharan, Srinivasan ;
Murthy, Chet ;
Binh Nguyen ;
Sethi, Manish ;
Singh, Gari ;
Smith, Keith ;
Sorniotti, Alessandro ;
Stathakopoulou, Chrysoula ;
Vukolic, Marko ;
Cocco, Sharon Weed ;
Yellick, Jason .
EUROSYS '18: PROCEEDINGS OF THE THIRTEENTH EUROSYS CONFERENCE, 2018,
[5]  
Calandriello G, 2007, VANET'07: PROCEEDINGS OF THE FOURTH ACM INTERNATIONAL WORKSHOP ON VEHICULAR AD HOC NETWORKS, P19
[6]   Practical byzantine fault tolerance and proactive recovery [J].
Castro, M ;
Liskov, B .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2002, 20 (04) :398-461
[7]   Every finite abelian group is a subgroup of the additive group of a finite simple left brace [J].
Cedo, F. ;
Jespers, E. ;
Okninski, J. .
JOURNAL OF PURE AND APPLIED ALGEBRA, 2021, 225 (01)
[8]   Lightweight Searchable Public-Key Encryption with Forward Privacy over IIoT Outsourced Data [J].
Chen, Biwen ;
Wu, Libing ;
Kumar, Neeraj ;
Choo, Kim-Kwang Raymond ;
He, Debiao .
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2021, 9 (04) :1753-1764
[9]   A Secure Content Sharing Scheme Based on Blockchain in Vehicular Named Data Networks [J].
Chen, Chen ;
Wang, Cong ;
Qiu, Tie ;
Lv, Ning ;
Pei, Qingqi .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (05) :3278-3289
[10]   SPECS: Secure and privacy enhancing communications schemes for VANETs [J].
Chim, T. W. ;
Yiu, S. M. ;
Hui, Lucas C. K. ;
Li, Victor O. K. .
AD HOC NETWORKS, 2011, 9 (02) :189-203