Blockchain-based batch authentication protocol for Internet of Vehicles

被引:101
作者
Bagga, Palak [1 ]
Sutrala, Anil Kumar [2 ]
Das, Ashok Kumar [1 ]
Vijayakumar, Pandi [3 ]
机构
[1] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India
[2] CA Technol Broadcom Co, Hyderabad 500032, India
[3] Univ Coll Engn Tindivanam, Dept Comp Sci & Engn, Villupuram 604001, India
关键词
Internet of Vehicles (IoV); Smart city; Batch authentication; Key agreement; Blockchain; Security; AVISPA; 3-FACTOR USER AUTHENTICATION; KEY AGREEMENT PROTOCOL; SCHEME; VERIFICATION; CHALLENGES; MANAGEMENT; EXCHANGE; SERVICE; DESIGN;
D O I
10.1016/j.sysarc.2020.101877
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The vehicles in Internet of Vehicles (IoV) can be used to opportunistically gather and distribute the data in a smart city environment. However, at the same time, various security threats arise due to insecure communication happening among various entities in an IoV-based smart city deployment. To address this issue, we aim to design a novel blockchain-enabled batch authentication scheme in Artificial Intelligence (AI)envisioned IoV-based smart city deployment. The latest trends and revolutions in technologies incorporate AI/Machine Learning (ML) in blockchaining to produce a secure, efficient and intelligent blockchain based system. The data stored in the blocks in the blockchain are authentic and genuine, which makes the AI/ML algorithms to work at their exceptions in order produce correct predictions on the blockchain data. Through the signing phase of the proposed scheme, each vehicle in a dynamically formed cluster broadcasts a message to its own member and respective road-side unit (RSU). In the proposed scheme, two types of authentication take place: vehicle to vehicle (V2V) authentication allows a vehicle to authenticate its neighbor vehicles in its cluster, while batch authentication permits a group of cluster vehicles to be authenticated by their RSU. At the end, a group key is established among the vehicles and RSU in their cluster RSU then gathers securely data from its vehicles and form several transactions including the information of vehicles and its own given information to the cluster member vehicles. The transactions are formed later by the nearby fog server associated with RSU and then by the cloud server to form a complete block. The created blocks are mined by the cloud servers in a Peer-to-Peer (P2P) cloud server network through the voting-based Practical Byzantine Fault Tolerance (PBFT) consensus algorithm. The authentic and genuine data of the blockchain are utilized for Big data analytics through AI/ML algorithms. It is shown that the proposed scheme is highly robust against various attacks through formal and informal security analysis, and also through formal security verification tool. A detailed comparative analysis reveals that the proposed scheme achieves superior security and functionality features, and offers comparable storage, communication and computational costs as compared to other existing competing schemes. Finally, the blockchain implementation has been carried out on the proposed scheme to show its effectiveness.
引用
收藏
页数:23
相关论文
共 74 条
[1]  
Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
[2]  
Alam B, 2014, PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS AND COMPUTER NETWORKS (ISCON), P11, DOI 10.1109/ICISCON.2014.6965209
[3]  
[Anonymous], 2018, WHAT IS PROOF ELAPSE
[4]  
[Anonymous], 2020, MIRACL cryptographic SDK: Multiprecision integer and rational arithmetic cryptographic library
[5]  
Asghar MuhammadEhtisham., 2018, P 28 INT TEL NETW AP, P1, DOI [DOI 10.1109/ATNAC.2018.8615224, DOI 10.1109/ICC.2018.8422732]
[6]  
AVISPA, 2019, AUT VAL INT SEC PROT
[7]   Secure clustering for efficient data dissemination in vehicular cyber-physical systems [J].
Bali, Rasmeet S. ;
Kumar, Neeraj .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 56 :476-492
[8]   A secure authentication scheme for VANETs with batch verification [J].
Bayat, Majid ;
Barmshoory, Mostafa ;
Rahimi, Majid ;
Aref, Mohammd Reza .
WIRELESS NETWORKS, 2015, 21 (05) :1733-1743
[9]  
Boneh D, 2012, LECT NOTES COMPUT SC, V7658, P1, DOI 10.1007/978-3-642-34961-4_1
[10]  
Canetti R, 2001, LECT NOTES COMPUT SC, V2045, P453