Open Access
ARTICLE
A Blockchain-Based Efficient Cross-Domain Authentication Scheme for Internet of Vehicles
1 Guangxi Engineering Research Center of Industrial Internet Security and Blockchain, Guilin University of Electronic Technology, Guilin, 541004, China
2 School of Information and Communication, Guilin University of Electronic Technology, Guilin, 541004, China
3 School of Computer Science and Information Security, Guilin University of Electronic Technology, Guilin, 541004, China
* Corresponding Author: Chunhai Li. Email:
(This article belongs to the Special Issue: Security and Privacy for Blockchain-empowered Internet of Things)
Computers, Materials & Continua 2024, 80(1), 567-585. https://doi.org/10.32604/cmc.2024.052233
Received 27 March 2024; Accepted 14 May 2024; Issue published 18 July 2024
Abstract
The Internet of Vehicles (IoV) is extensively deployed in outdoor and open environments to effectively address traffic efficiency and safety issues by connecting vehicles to the network. However, due to the open and variable nature of its network topology, vehicles frequently engage in cross-domain interactions. During such processes, directly uploading sensitive information to roadside units for interaction may expose it to malicious tampering or interception by attackers, thus compromising the security of the cross-domain authentication process. Additionally, IoV imposes high real-time requirements, and existing cross-domain authentication schemes for IoV often encounter efficiency issues. To mitigate these challenges, we propose CAIoV, a blockchain-based efficient cross-domain authentication scheme for IoV. This scheme comprehensively integrates technologies such as zero-knowledge proofs, smart contracts, and Merkle hash tree structures. It divides the cross-domain process into anonymous cross-domain authentication and safe cross-domain authentication phases to ensure efficiency while maintaining a balance between efficiency and security. Finally, we evaluate the performance of CAIoV. Experimental results demonstrate that our proposed scheme reduces computational overhead by approximately 20%, communication overhead by around 10%, and storage overhead by nearly 30%.Keywords
Cite This Article
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.