scholarly journals Distributed Blockchain-Based Message Authentication Scheme for Connected Vehicles

Electronics ◽  
2020 ◽  
Vol 9 (1) ◽  
pp. 74 ◽  
Author(s):  
Jaewon Noh ◽  
Sangil Jeon ◽  
Sunghyun Cho

Vehicular ad-hoc networks (VANETs) have several security issues such as privacy preservation, secure authentication, and system reliability. In the VANET, a vehicle communicates with other vehicles or infrastructures using broadcasting messages. These messages contain not only normal traffic information, but also identification information of sender. In general, the identification information remains encrypted to ensure privacy. However, the conventional centralized system can decrypt the identification information using private information of the sender vehicle. As a result, the central server can often be targeted by adversaries. We propose a message authentication scheme for anonymity and decentralization of information using blockchain technology. Here, we introduce public-private key and message authentication code (MAC) for secure authentication. In this paper, we adopt consensus algorithms for composing blockchain system such as the proof of work (PoW) and Practical Byzantine Fault Tolerance (PBFT) into the proposed authentication process. Finally, we demonstrate that the proposed method is secure from the attacks which include impersonation from internal attacker as well as typical attacks.

2016 ◽  
Vol 64 ◽  
pp. 50-60 ◽  
Author(s):  
J. Sánchez-García ◽  
J.M. García-Campos ◽  
D.G. Reina ◽  
S.L. Toral ◽  
F. Barrero

2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Azees Maria ◽  
Vijayakumar Pandi ◽  
Jeatha Deborah Lazarus ◽  
Marimuthu Karuppiah ◽  
Mary Subaja Christo

Smart driving has become conceivable due to the rapid growth of vehicular ad hoc networks. VANETs are considered as the main platform for providing safety road information and instant vehicle communication. Nevertheless, due to the open wireless nature of communication channels, VANET is susceptible to security attacks by malicious users. For this reason, secure anonymous authentication schemes are essential in VANETs. However, when vehicles reach a new roadside unit (RSU) coverage area, the vehicles need to perform reauthentication with the current RSU, which significantly diminishes the efficiency of the entire VANET. Therefore, the introduction of blockchain technology has created opportunities for VANETs to resolve the aforementioned challenges. Due to the decentralized nature of blockchain technology, rapid reauthentication of vehicles is achieved in this paper through secure authentication code transfer between the consecutive RSUs. The security strength of the proposed blockchain-based anonymous authentication scheme against various harmful security attacks is proven in the security analysis section to ensure that it provides better security. In addition, blockchain, as presented in the performance analysis section, is used to substantially diminish the computational cost compared to conventional authentication schemes.


2018 ◽  
Vol 14 (2) ◽  
pp. 155014771875658 ◽  
Author(s):  
Tianhan Gao ◽  
Yanqiang Li ◽  
Nan Guo ◽  
Ilsun You

With the rapid booming of intelligent traffic system, vehicular ad hoc networks have attracted wide attention from both academic and industry. However, security is the main obstacle for the wide deployment of vehicular ad hoc networks. Vehicular ad hoc networks security has two critical issues: access authentication and privacy preservation. How to ensure privacy preservation and improve the efficiency of authentication has become the urgent needs. However, the existing access authentication schemes for vehicular ad hoc networks with different flaws cannot maintain the balance between security and efficiency. Thus, an anonymous access authentication scheme for vehicular ad hoc networks under edge computing based on ID-based short group signature mechanism is proposed in this article to improve the efficiency and anonymity of access authentication. Multiple pseudonyms are presented to preserve the privacy of vehicle node. Besides, a new method is designed to identify and revoke malicious vehicles in the evaluation manner. The core protocols of the proposed scheme are proved to be secure by SVO logic. According to the computation cost and transmission overhead analysis, we indicate that our scheme owns better performance. Moreover, in this article, we combine vehicular ad hoc networks with edge computing together to provide a new clue for the development of mobile edge computing.


Sign in / Sign up

Export Citation Format

Share Document