Provable Secure and Lightweight Blockchain-Based V2I Handover Authentication and V2V Broadcast Protocol for VANETs

被引:12
|
作者
Xie, Qi [1 ]
Ding, Zixuan [1 ]
Tang, Wen [1 ]
He, Debiao [2 ,3 ]
Tan, Xiao [1 ]
机构
[1] Hangzhou Normal Univ, Key Lab Cryptog Zhejiang Prov, Hangzhou 311121, Peoples R China
[2] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan 430072, Peoples R China
[3] Qilu Univ Technol, Shandong Acad Sci, Shandong Prov Key Lab Comp Networks, Jinan 250014, Peoples R China
基金
中国国家自然科学基金;
关键词
Handover authentication; VANETs; blockchain; broadcast authentication; vehicle to infrastructure; vehicle to vehicle;
D O I
10.1109/TVT.2023.3289175
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
As one of the most valuable vehicle-based Internet of Things (IoT) applications, Vehicular Ad-hoc Networks (VANETs) have received extensive attention since it was proposed. In order to ensure the safety of VANETs and improve the communication efficiency between moving vehicles and different Roadside Units (RSUs), some handover authentication protocols for VANETs have been proposed. However, the existing protocols have some problems such as excessive computation overhead, untraceable malicious messages, and the inability to resist RSU captured attacks. To solve the above problems, we propose a blockchain-based protocol to achieve Vehicle to Infrastructure (V2I) authentication, V2I handover authentication, and Vehicle to Vehicle (V2V) broadcasting authentication. The advantages of our protocol are: (1) It achieves lightweight V2I handover authentication and V2V broadcast authentication, dynamic anonymity strategy and embedding strategy of pseudo-identity and vehicle feature are used to guarantee anonymity and traceability simultaneously; (2) The announcement can be broadcasted verifiably without the help of transportation infrastructure (e.g., RSU) or the Trusted Authority (TA); and (3) The Physically Unclonable Functions (PUF) technology is used to resist RSU captured attacks. We use formal security proof under random oracle model to prove the security of the proposed protocol. Compared with related V2I handover authentication protocols, our protocol can resist RSU captured attacks and other various known attacks. The sum of first and handover authentication efficiency of our protocol is 37.93% higher than the previous most effective protocol, while maintaining the same level of communication and storage costs.
引用
收藏
页码:15200 / 15212
页数:13
相关论文
共 50 条
  • [1] Provably Secure and Anonymous V2I and V2V Authentication Protocol for VANETs
    Xie, Qi
    Ding, Zixuan
    Zheng, Panpan
    [J]. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2023, 24 (07) : 7318 - 7327
  • [2] Design of Blockchain-Based Lightweight V2I Handover Authentication Protocol for VANET
    Son, Seunghwan
    Lee, Joonyoung
    Park, Yohan
    Park, Youngho
    Das, Ashok Kumar
    [J]. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2022, 9 (03): : 1346 - 1358
  • [3] A Lightweight Authentication Protocol for V2V Communication in VANETs
    Vasudev, Harsha
    Das, Debasis
    [J]. 2018 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI), 2018, : 1237 - 1242
  • [4] LVAP: Lightweight V2I authentication protocol using group communication in VANETs
    Liu, Yining
    Guo, Wei
    Zhong, Qi
    Yao, Gang
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (16)
  • [5] Secure Message Transmission for V2V Based on Mutual Authentication for VANETs
    Mahmood, Jabar
    Duan, Zongtao
    Xue, Heng
    Yang, Yun
    Berwo, Michael Abebe
    Khan, Sajjad Ahmad
    Yassin, Abd Al Kader Ahmed
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [6] Target Tracking in VANETs Using V2I and V2V Communication
    Derder, Abdessamed
    Moussaoui, Samira
    [J]. 2014 INTERNATIONAL CONFERENCE ON ADVANCED NETWORKING DISTRIBUTED SYSTEMS AND APPLICATIONS (INDS 2014), 2014, : 19 - 24
  • [7] Proven Secure Tree-Based Authenticated Key Agreement for Securing V2V and V2I Communications in VANETs
    Wei, Lu
    Cui, Jie
    Zhong, Hong
    Xu, Yan
    Liu, Lu
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2022, 21 (09) : 3280 - 3297
  • [8] Blockchain-Based Lightweight and Secured V2V Communication in the Internet of Vehicles
    Kamal, Mohsin
    Srivastava, Gautam
    Tariq, Muhammad
    [J]. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2021, 22 (07) : 3997 - 4004
  • [9] On the Joint V2I and V2V Scheduling for Cooperative VANETs With Network Coding
    Wang, Qing
    Fan, Pingyi
    Letaief, Khaled Ben
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2012, 61 (01) : 62 - 73
  • [10] Blockchain-Based Lightweight Certificateless Authenticated Key Agreement Protocol for V2V Communications in IoV
    Lin, Hui-Tang
    Jhuang, Wei-Li
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (16): : 27744 - 27759