A Blockchain-Based Privacy-Preserving Authentication Scheme for VANETs

被引:164
作者
Lu, Zhaojun [1 ]
Wang, Qian [1 ]
Qu, Gang [1 ]
Zhang, Haichun [2 ]
Liu, Zhenglin [2 ]
机构
[1] Univ Maryland, Dept Elect & Comp Engn, College Pk, MD 20742 USA
[2] Huazhong Univ Sci & Technol, Sch Optic & Elect Informat, Wuhan 430074, Peoples R China
基金
美国国家科学基金会;
关键词
Blockchain; privacy-preserving authentication; semitrusted authority; transparency; vehicular ad hoc networks (VANETs); EFFICIENT; SECURE;
D O I
10.1109/TVLSI.2019.2929420
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The privacy-preserving authentication is considered as the first line of defense against the attacks in addition to preserving the identity privacy of the vehicles in the vehicular ad hoc networks (VANETs). However, the existing authentication schemes suffer from drawbacks such as nontransparency of the trusted authorities (TAs), heavy workload to revoke certificates, and high computation overhead to authenticate identities and messages. In this paper, we propose a blockchain-based privacy-preserving authentication (BPPA) scheme for VANETs. In BPPA, all the certificates and transactions are recorded permanently and immutably in the blockchain to make the activities of the semi-TAs transparent and verifiable. However, it remains a challenge how to use such blockchain effectively for authentication in real driving scenarios (e.g., high speed or large amount of messages during congestion). With a novel data structure named the Merkle Patricia tree (MPT), we extend the conventional blockchain structure to provide a distributed authentication scheme without the revocation list. To achieve conditional privacy, we allow a vehicle to use multiple certificates. The linkability between the certificates and real identity is encrypted and stored in the blockchain and can only be revealed in case of disputes. We evaluate the validity and performance of BPPA on the Hyperledger Fabric (HLF) platform for each entity. The experimental results show that the distributed authentication can be processed by individual vehicles within 1 ms, which meets the real-time requirement and is much more efficient, in terms of the processing time and storage requirement, than existing approaches.
引用
收藏
页码:2792 / 2801
页数:10
相关论文
共 23 条
[1]   Charm: a framework for rapidly prototyping cryptosystems [J].
Akinyele, Joseph A. ;
Garman, Christina ;
Miers, Ian ;
Pagano, Matthew W. ;
Rushanan, Michael ;
Green, Matthew ;
Rubin, Aviel D. .
JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2013, 3 (02) :111-128
[2]   Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains [J].
Androulaki, Elli ;
Barger, Artem ;
Bortnikov, Vita ;
Cachin, Christian ;
Christidis, Konstantinos ;
De Caro, Angelo ;
Enyeart, David ;
Ferris, Christopher ;
Laventman, Gennady ;
Manevich, Yacov ;
Muralidharan, Srinivasan ;
Murthy, Chet ;
Binh Nguyen ;
Sethi, Manish ;
Singh, Gari ;
Smith, Keith ;
Sorniotti, Alessandro ;
Stathakopoulou, Chrysoula ;
Vukolic, Marko ;
Cocco, Sharon Weed ;
Yellick, Jason .
EUROSYS '18: PROCEEDINGS OF THE THIRTEENTH EUROSYS CONFERENCE, 2018,
[3]   EAAP: Efficient Anonymous Authentication With Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks [J].
Azees, Maria ;
Vijayakumar, Pandi ;
Deboarh, Lazarus Jegatha .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2017, 18 (09) :2467-2476
[4]   Comprehensive survey on security services in vehicular ad-hoc networks [J].
Azees, Maria ;
Vijayakumar, Pandi ;
Deborah, Lazarus Jegatha .
IET INTELLIGENT TRANSPORT SYSTEMS, 2016, 10 (06) :379-388
[5]   EthIKS: Using Ethereum to Audit a CONIKS Key Transparency Log [J].
Bonneau, Joseph .
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2016, 2016, 9604 :95-105
[6]   Universally Composable Authentication and Key-Exchange with Global PKI [J].
Canetti, Ran ;
Shahaf, Daniel ;
Vald, Margarita .
PUBLIC-KEY CRYPTOGRAPHY - PKC 2016, PT II, 2016, 9615 :265-296
[7]   A robust and efficient password-based conditional privacy preserving authentication and group-key agreement protocol for VANETs [J].
Islam, S. K. Hafizul ;
Obaidat, Mohammad S. ;
Vijayakumar, Pandi ;
Abdulhay, Enas ;
Li, Fagen ;
Reddy, M. Krishna Chaitanya .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 84 :216-227
[8]   Provably Secure and Lightweight Certificateless Signature Scheme for IIoT Environments [J].
Karati, Arijit ;
Islam, S. K. Hafizul ;
Karuppiah, Marimuthu .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (08) :3701-3711
[9]   Signal word-level statistical properties-based activation approach for hardware Trojan detection in DSP circuits [J].
Li, He ;
Liu, Qiang ;
Chen, Fuqiang .
IET COMPUTERS AND DIGITAL TECHNIQUES, 2018, 12 (06) :258-267
[10]   Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in VANETs [J].
Lu, Rongxing ;
Lin, Xiaodong ;
Luan, Tom H. ;
Liang, Xiaohui ;
Shen, Xuemin .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2012, 61 (01) :86-96