A Blockchain-Based Efficient, Secure and Anonymous Conditional Privacy-Preserving and Authentication Scheme for the Internet of Vehicles

被引:18
作者
Qureshi, Kashif Naseer [1 ]
Shahzad, Luqman [1 ]
Abdelmaboud, Abdelzahir [2 ]
Elfadil Eisa, Taiseer Abdalla [2 ]
Alamri, Bandar [3 ]
Javed, Ibrahim Tariq [1 ]
Al-Dhaqm, Arafat [4 ,5 ]
Crespi, Noel [6 ]
机构
[1] Bahria Univ, Dept Comp Sci, Islamabad 44000, Pakistan
[2] King Khalid Univ, Coll Arts & Sci, Dept Informat Syst, Muhayil Asir 61913, Saudi Arabia
[3] Univ Limerick, Lero Irish Software Res Ctr, Limerick V94 T9PX, Ireland
[4] Univ Teknol Malaysia, Sch Comp, Fac Engn, Skudai 81300, Malaysia
[5] Aden Community Coll, Dept Comp Sci, Aden 8916862, Yemen
[6] Inst Polytech Paris Telecom SudParis Evry, 9 Rue Charles Fourier, F-91000 Evry, France
来源
APPLIED SCIENCES-BASEL | 2022年 / 12卷 / 01期
关键词
IoV; authentication; security; blockchain; privacy; network; latency; scalability;
D O I
10.3390/app12010476
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
The rapid advancement in the area of the Internet of Vehicles (IoV) has provided numerous comforts to users due to its capability to support vehicles with wireless data communication. The exchange of information among vehicle nodes is critical due to the rapid and changing topologies, high mobility of nodes, and unpredictable network conditions. Finding a single trusted entity to store and distribute messages among vehicle nodes is also a challenging task. IoV is exposed to various security and privacy threats such as hijacking and unauthorized location tracking of smart vehicles. Traceability is an increasingly important aspect of vehicular communication to detect and penalize malicious nodes. Moreover, achieving both privacy and traceability can also be a challenging task. To address these challenges, this paper presents a blockchain-based efficient, secure, and anonymous conditional privacy-preserving and authentication mechanism for IoV networks. This solution is based on blockchain to allow vehicle nodes with mechanisms to become anonymous and take control of their data during the data communication and voting process. The proposed secure scheme provides conditional privacy to the users and the vehicles. To ensure anonymity, traceability, and unlinkability of data sharing among vehicles, we utilize Hyperledger Fabric to establish the blockchain. The proposed scheme fulfills the requirement to analyze different algorithms and schemes which are adopted for blockchain technology for a decentralized, secure, efficient, private, and traceable system. The proposed scheme examines and evaluates different consensus algorithms used in the blockchain and anonymization techniques to preserve privacy. This study also proposes a reputation-based voting system for Hyperledger Fabric to ensure a secure and reliable leader selection process in its consensus algorithm. The proposed scheme is evaluated with the existing state-of-the-art schemes and achieves better results.
引用
收藏
页数:19
相关论文
共 26 条
[1]  
Alamri B., 2021, P 2021 11 IFIP INT C, P1, DOI DOI 10.1109/NTMS49979.2021.9432661
[2]  
Arora A., 2018, P 3 INT C INT THINGS, P267, DOI 10.2139/ssrn.3166721
[3]   EAAP: Efficient Anonymous Authentication With Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks [J].
Azees, Maria ;
Vijayakumar, Pandi ;
Deboarh, Lazarus Jegatha .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2017, 18 (09) :2467-2476
[4]   SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies [J].
Bonneau, Joseph ;
Miller, Andrew ;
Clark, Jeremy ;
Narayanan, Arvind ;
Kroll, Joshua A. ;
Felten, Edward W. .
2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015, 2015, :104-121
[5]   BlockChain: A Distributed Solution to Automotive Security and Privacy [J].
Dorri, Ali ;
Steger, Marco ;
Kanhere, Salil S. ;
Jurdak, Raja .
IEEE COMMUNICATIONS MAGAZINE, 2017, 55 (12) :119-125
[6]   Metaheuristic algorithm for anomaly detection in Internet of Things leveraging on a neural-driven multiagent system [J].
Forestiero, Agostino .
KNOWLEDGE-BASED SYSTEMS, 2021, 228
[7]   A hybrid approach for efficient anomaly detection using metaheuristic methods [J].
Ghanem, Tamer F. ;
Elkilani, Wail S. ;
Abdul-kader, Hatem M. .
JOURNAL OF ADVANCED RESEARCH, 2015, 6 (04) :609-619
[8]   An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks [J].
He, Debiao ;
Zeadally, Sherali ;
Xu, Baowen ;
Huang, Xinyi .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (12) :2681-2691
[9]   Software Defined Networking for Energy Harvesting Internet of Things [J].
Huang, Xumin ;
Yu, Rong ;
Kang, Jiawen ;
Xia, Zhuoquan ;
Zhang, Yan .
IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (03) :1389-1399
[10]   Health-ID: A Blockchain-Based Decentralized Identity Management for Remote Healthcare [J].
Javed, Ibrahim Tariq ;
Alharbi, Fares ;
Bellaj, Badr ;
Margaria, Tiziana ;
Crespi, Noel ;
Qureshi, Kashif Naseer .
HEALTHCARE, 2021, 9 (06)