A Blockchain-based Cross-domain Authentication for Conditional Privacy Preserving in Vehicular Ad-hoc Network

被引:4
|
作者
Yang, Yuhan [1 ,2 ]
Wu, Jing [1 ,2 ]
Long, Chengnian [1 ,2 ]
Zou, Qingquan [3 ]
Gao, Ji [3 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Automat, Shanghai 200240, Peoples R China
[2] Minist Educ China, Key Lab Syst Control & Informat Proc, Shanghai 200240, Peoples R China
[3] SAIC Motor, Intelligent Driving Ctr, Shanghai 201804, Peoples R China
关键词
Vehicular ad-hoc network; Anonymous authentication; Conditional privacy preserving; BATCH VERIFICATION; SCHEME; MANAGEMENT;
D O I
10.1145/3460537.3460545
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Vehicular Ad-Hoc Network enhances the driving safety and enables various intelligent transportation applications by adopting the revolutionary vehicular wireless communication technology, which attracts a lot of attention from academia and industry in recent years. Given the sophistication of vehicular manufacturing and the heterogeneity of intelligent transport terminals, performing vehicular authentication in the message exchange process is crucially important, while existing schemes fail to adapt to multi-domain scenario, and satisfy security, anonymity and conditional privacy protection simultaneously. To this end, we present a blockchain-based multi-domain vehicular authentication scheme, wherein a pseudonym-based authentication method is proposed to guarantee the anonymity and traceability. Specially, the pseudonym generation and distribution are supervised and executed by multiple entities, which improves the reliability and can adapt to the dynamic and unpredictable pseudonym requests. Furthermore, the security analysis and experiment results show the feasibility and low overhead of the proposed scheme.
引用
收藏
页码:183 / 188
页数:6
相关论文
共 50 条
  • [31] A Blockchain enabled location-privacy preserving scheme for vehicular ad-hoc networks
    Bhawna Chaudhary
    Karan Singh
    Peer-to-Peer Networking and Applications, 2021, 14 : 3198 - 3212
  • [32] A Blockchain enabled location-privacy preserving scheme for vehicular ad-hoc networks
    Chaudhary, Bhawna
    Singh, Karan
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (05) : 3198 - 3212
  • [33] Self-managed and Blockchain-based Vehicular Ad-hoc Networks
    Leiding, Benjamin
    Memarmoshrefi, Parise
    Hogrefe, Dieter
    UBICOMP'16 ADJUNCT: PROCEEDINGS OF THE 2016 ACM INTERNATIONAL JOINT CONFERENCE ON PERVASIVE AND UBIQUITOUS COMPUTING, 2016, : 137 - 140
  • [34] Efficient Privacy-Preserving Anonymous Authentication Protocol for Vehicular Ad-Hoc Networks
    Zhang, Xiaojun
    Wang, Wenchen
    Mu, Liming
    Huang, Chao
    Fu, Hong
    Xu, Chunxiang
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 120 (04) : 3171 - 3187
  • [35] Efficient Conditional Anonymity With Message Integrity and Authentication in a Vehicular Ad-Hoc Network
    Alazzawi, Murtadha A.
    Lu, Hongwei
    Yassin, Ali A.
    Chen, Kai
    IEEE ACCESS, 2019, 7 : 71424 - 71435
  • [36] SE-CPPA: A Secure and Efficient Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks
    Al-Shareeda, Mahmood A.
    Anbar, Mohammed
    Manickam, Selvakumar
    Hasbullah, Iznan H.
    SENSORS, 2021, 21 (24)
  • [37] EBAS: An Efficient Blockchain-Based Authentication Scheme for Secure Communication in Vehicular Ad Hoc Network
    Feng, Xia
    Cui, Kaiping
    Jiang, Haobin
    Li, Ze
    SYMMETRY-BASEL, 2022, 14 (06):
  • [38] Lightweight consortium blockchain-enabled secured Vehicular ad Hoc Network using certificateless conditional privacy-preserving authentication mechanism
    Ilyas, Iqra
    Din, Irfan ud
    Alourani, Abdullah
    Ashraf, M. Usman
    PLOS ONE, 2024, 19 (10):
  • [39] Privacy Issues for Vehicular Ad-Hoc Network
    Dok, Hang
    Echevarria, Ruben
    Fu, Huirong
    COMMUNICATION AND NETWORKING, 2009, 56 : 370 - +
  • [40] Privacy-preserving batch verification signature scheme based on blockchain for Vehicular Ad-Hoc Networks
    Ren, Yanli
    Li, Xiangyu
    Sun, Shi-Feng
    Yuan, Xingliang
    Zhang, Xinpeng
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 58