Open Access
ARTICLE
Blockchain-Based Message Authentication Scheme for Internet of Vehicles in an Edge Computing Environment
1 College of Artificial Intelligence and Manufacturing, Hechi University, Yizhou, 546300, China
2 College of Big Data and Computer, Hechi University, Yizhou, 546300, China
* Corresponding Author: Zhong Ruan. Email:
(This article belongs to the Special Issue: Security and Privacy in Cognitive Internet of Vehicle)
Computer Systems Science and Engineering 2024, 48(5), 1301-1328. https://doi.org/10.32604/csse.2024.051796
Received 15 March 2024; Accepted 11 July 2024; Issue published 13 September 2024
Abstract
As an important application of intelligent transportation system, Internet of Vehicles (IoV) provides great convenience for users. Users can obtain real-time traffic conditions through the IoV’s services, plan users' travel routes, and improve travel efficiency. However, in the IoV system, there are always malicious vehicle nodes publishing false information. Therefore, it is essential to ensure the legitimacy of the source. In addition, during the peak period of vehicle travel, the vehicle releases a large number of messages, and IoV authentication efficiency is prone to performance bottlenecks. Most existing authentication schemes have the problem of low authentication efficiency in the scenario. To address the above problems, this paper designs a novel reliable anonymous authentication scheme in IoV for Rush-hour Traffic. Here, our scheme uses blockchain and elliptic curve cryptography (ECC) to design authentication algorithms for message authentication between vehicles and roadside units (RSU). Additionally, we introduce the idea of edge computing into the scheme, RSU will select the most suitable vehicle as the edge computing node for message authentication. In addition, we used the ProVerif tool for Internet security protocols and applications to test its security, ensuring that it is secure under different network attacks. In the simulation experiment, we compare our scheme with other existing works. Our scheme has a significant improvement in computational overhead, authentication efficiency and packet loss rate, and is suitable for traffic scenarios with large message volume.Keywords
Cite This Article
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.