Efficient privacy protection authentication protocol for vehicle network in 5G

被引:4
作者
Zhang, Guixian [1 ]
Zhao, Xiaoyu [1 ]
Chen, Menglu [1 ]
Ma, Shuyi [1 ]
机构
[1] Dalian Univ Sci & Technol, Sch Traff & Transportat, Dalian 116052, Peoples R China
关键词
5G; authentication; blockchain; internet of vehicles; security; SECURITY; SCHEME; TECHNOLOGIES;
D O I
10.1002/cpe.7247
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The traditional internet of vehicles (IoV) identity authentication system generally has the security risk that the center is not trusted. In the 5G IoV, a large number of deployed 5G base stations are integrated into it, which has further developed the technologies such as seamless handover, load balancing, and security authentication. The development of the IoV has largely alleviated the traffic pressure and improved the driving efficiency. However, there are many privacy security problems to be solved in 5G IoV. Therefore, with the characteristics of blockchain distribution, traceability, and non-tampering, an efficient privacy protection authentication protocol based on blockchain is proposed. The method includes two parts: identity registration and authentication. Vehicles and other traffic participants obtain a public identity block through identity registration before accessing the IoV. In the subsequent authentication, the communication parties use this identity block for anonymous authentication. The analysis results based on the formal analysis software Scyther are safe. The security analysis shows that the scheme could meet the security requirements in the IoV. At the same time, the comparison with the existing schemes shows that this scheme has lower computation overhead and communication cost.
引用
收藏
页数:10
相关论文
共 33 条
  • [1] A Secured Privacy-Preserving Multi-Level Blockchain Framework for Cluster Based VANET
    Akhter, A. F. M. Suaib
    Ahmed, Mohiuddin
    Shah, A. F. M. Shahen
    Anwar, Adnan
    Zengin, Ahmet
    [J]. SUSTAINABILITY, 2021, 13 (01) : 1 - 25
  • [2] [Anonymous], 2020, 23287 3GPP TS
  • [3] EAAP: Efficient Anonymous Authentication With Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks
    Azees, Maria
    Vijayakumar, Pandi
    Deboarh, Lazarus Jegatha
    [J]. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2017, 18 (09) : 2467 - 2476
  • [4] Security of public-key cryptosystems based on Chebyshev polynomials
    Bergamo, P
    D'Arco, P
    De Santis, A
    Kocarev, L
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2005, 52 (07) : 1382 - 1393
  • [5] A Personalized QoS Prediction Method for Web Services via Blockchain-Based Matrix Factorization
    Cai, Weihong
    Du, Xin
    Xu, Jianlong
    [J]. SENSORS, 2019, 19 (12)
  • [6] Chen Mao., 2020, 2020 2 INT C ELECTRO
  • [7] A Vision of C-V2X: Technologies, Field Testing, and Challenges With Chinese Development
    Chen, Shanzhi
    Hu, Jinling
    Shi, Yan
    Zhao, Li
    Li, Wen
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (05): : 3872 - 3881
  • [8] Cremers C. J. F., 2006, SCYTHER SEMANTICS VE
  • [9] Cremers C.J. F., The scyther tool
  • [10] Crosby M., 2016, APPL INNOV REV, V2, P6