iconOpen Access

ARTICLE

Blockchain-Based Message Authentication Scheme for Internet of Vehicles in an Edge Computing Environment

by Qiping Zou1, Zhong Ruan2,*, Huaning Song1

1 College of Artificial Intelligence and Manufacturing, Hechi University, Yizhou, 546300, China
2 College of Big Data and Computer, Hechi University, Yizhou, 546300, China

* Corresponding Author: Zhong Ruan. Email: email

(This article belongs to the Special Issue: Security and Privacy in Cognitive Internet of Vehicle)

Computer Systems Science and Engineering 2024, 48(5), 1301-1328. https://doi.org/10.32604/csse.2024.051796

Abstract

As an important application of intelligent transportation system, Internet of Vehicles (IoV) provides great convenience for users. Users can obtain real-time traffic conditions through the IoV’s services, plan users' travel routes, and improve travel efficiency. However, in the IoV system, there are always malicious vehicle nodes publishing false information. Therefore, it is essential to ensure the legitimacy of the source. In addition, during the peak period of vehicle travel, the vehicle releases a large number of messages, and IoV authentication efficiency is prone to performance bottlenecks. Most existing authentication schemes have the problem of low authentication efficiency in the scenario. To address the above problems, this paper designs a novel reliable anonymous authentication scheme in IoV for Rush-hour Traffic. Here, our scheme uses blockchain and elliptic curve cryptography (ECC) to design authentication algorithms for message authentication between vehicles and roadside units (RSU). Additionally, we introduce the idea of edge computing into the scheme, RSU will select the most suitable vehicle as the edge computing node for message authentication. In addition, we used the ProVerif tool for Internet security protocols and applications to test its security, ensuring that it is secure under different network attacks. In the simulation experiment, we compare our scheme with other existing works. Our scheme has a significant improvement in computational overhead, authentication efficiency and packet loss rate, and is suitable for traffic scenarios with large message volume.

Keywords


1  Introduction

1.1 Background and Research Motivation

With the continuous maturity of intelligent vehicle technology, IoV technology has become one of the most popular topics today [1]. The main goal of IoV is to provide road services to achieve traffic management and road safety [2]. In the traditional IoV system, it mainly includes three types of communication entities: Trusted Authority (TA), RSU and vehicle [3]. Vehicles can collect daily driving data and road traffic information through sensing technology and periodically send them to RSUs or other vehicles according to the DSRC [4] standard. RSU is an indispensable role [5], which is responsible for collecting and authenticating traffic messages sent by vehicles [6]. As a trusted center in the IoV, TA serves as a registration task for RSUs and vehicles [7,8]. The traditional model is shown in Fig. 1.

images

Figure 1: Traditional model of IoV

As an open network, IoV uses wireless electromagnetic wave communication technology to realize V2X communication [9]. In this communication environment, messages sent by vehicles can be easily intercepted and tampered by attackers, and their authenticity, integrity and legitimacy are uncertain [10,11]. In order to filter false information and improve the IoV’s reliability, RSU needs to verify the legitimacy of traffic information generated by vehicles [12]. In addition, when the vehicle sends traffic-related information, it does not want others to know some sensitive information (such as real identity, location information, etc.) [13]. Therefore, vehicles can use pseudonyms to achieve privacy protection during communication. In IoV, the combination of privacy protection and traceability is called conditional privacy protection [14]. In today’s IoV authentication mechanism, the higher the degree of privacy protection, the greater the computational and communication overhead. Especially in the traditional certificate authentication mechanism, the defect of excessive consumption of computing and storage resources is particularly obvious [15]. Nowadays, cloud computing technology has been widely used in IoV. But cloud computing also has limitations, that is, there is a higher transmission delay. During the peak period of vehicle travel, the vehicle releases a large number of messages, IoV authentication efficiency is prone to performance bottlenecks.

With the further development of technology, edge computing technology is introduced in IoV. As a new computing model that processes data away from the network center [16], edge computing can use flexible mechanisms and strategies to process sensitive information on edge terminal nodes. In addition, we no longer use the traditional certificate authentication mechanism, but use the encryption algorithm with lower computational complexity to reduce the consumption.

1.2 Contribution

This paper focuses on the research of IoV related applications, we combine blockchain and edge computing technology to design an efficient message authentication algorithm. The main research results of this paper are as follows:

(1) In the face of peak traffic scenarios, the message authentication work of the Internet of Vehicles is prone to bottlenecks. This paper is inspired by the idea of edge computing and applies it to the authentication scheme. RSU will select the most suitable vehicle as the edge computing node for message authentication according to the real-time location distance and computing load. In addition, we also use blockchain and elliptic cryptographic curve to design the authentication algorithm, which reduce authentication latency, decrease packet loss ratio and alleviate network congestion indirectly.

(2) To verify security, we conducted ProVerif simulation experiments and theoretical analysis, which prove its security and correctness. In terms of performance, simulation experiments show that our scheme can also achieve fast authentication of messages during peak hours of traffic flow, and has lower computation and transmission over-head. With the addition of edge computing nodes, the packet loss rate (PLR) of IoV system was improved.

1.3 Organization

The article is divided into seven chapters. The first chapter mainly introduces the IoV and main contributions of the article. In the following chapters, we focus on the current research status of the IoV authentication scheme. The third chapter describes the background of the entire IoV system and some related theories of cryptography. The fourth chapter describes the specific authentication scheme designed by the article. In Chapter 5, we theoretically prove that the scheme is secure. In Chapter 6, the simulation results show that the scheme is efficient. Finally, the seventh chapter summarizes this paper and looks forward to the future development.

2  Related Work

2.1 PKI-Based Authentication Scheme

At present, Public Key Infrastructure (PKI) authentication schemes are very popular in IoV systems, this type of authentication scheme is recognized by the IEEE 1609.2 standard. Raya et al. [17] proposed an authentication scheme that can protect user identity privacy. TA will generate many key pairs and certificates for these vehicles in advance, so that these vehicles can sign the message. In reference [18], Scholars have optimized and improved the traditional PKI scheme and applied it to the IoV, which further improves the user's privacy while ensuring message integrity. Lu et al. [19] designed a new authentication mechanism using bilinear pairing cryptography algorithm. In this scenario, the certificate issuer is no longer TA, but RSU. RSU issues temporary certificates to passing vehicles for communication purposes. To sum up, these authentication mechanisms have great defects, and their overhead is very large, which is not suitable for IoV scenario. Especially when the traffic flow is particularly large, the system will face increasing pressure.

2.2 Identity-Based Authentication Scheme

Because PKI-based authentication schemes consume a lot, researchers have proposed a new scheme [20]. In these schemes, TA and RSU do not need to generate certificates for users, it greatly reduces the resource consumption. Kyung et al. [21] proposed to use pseudonym signature to protect user privacy in V2I communication. However, in this scheme, malicious nodes can modify information and cannot guarantee security. Vasudev et al. [22] implemented anonymous authentication between communicating entities through physical unclonable functions, but it cannot prevent man-in-the-middle attacks. Harsha et al. [23] designed a scheme with very low computational complexity. After mutual authentication, vehicle and RSU communicate through key negotiation. Although the performance of scheme is optimized, its security is weakened. Once a malicious event occurs, RSU cannot locate and track and know the identity of the malicious node. Zhang et al. [24] proposed the idea of batch authentication. Compared with other scheme in which RSU can only authenticate one message, this scheme can authenticate multiple messages in batches, which greatly improves the efficiency. However, due to the limited computing resources of the RSU itself, it is still unable to quickly complete the message authentication and packet loss problem is serious during the peak travel time. Liu et al. [25] provided another new batch authentication scheme for IoV. The scheme uses bilinear algorithm to sign and encrypt messages. However, the scheme does not achieve a balance between security and efficiency. Wang et al. [26] used bilinear algorithm to realize segmented authentication of vehicles. The subsequent authentication process of vehicle is related to the previous authentication, which optimizes the authentication process and reduces the computational consumption, However, this scheme relies heavily on the stability of IoV system. If there is a line fault, RSU will not know the data related to vehicle authentication for the next calculation. If multiple vehicles simultaneously initiate identity authentication, it will also affect the efficiency of RSU. The scheme proposed by Islam et al. [27] is different from the conventional scheme. These vehicles in this scheme communicate by generating a group key and can freely choose groups, regardless of joining or leaving, the vehicle's behavior will continue to promote password updates. However, this scheme cannot support message batch authentication, which is very limited in the scenario of IoV. Xu et al. [28] applied blockchain technology to IoV authentication, which not only reduces the authentication overhead, but also avoids the single point problem in the network by designing the system model of multiple TAs. However, it needs to access the cloud center resources every time, and it will increase the delay time. Song et al. [29] proposed to use vehicles with rich computing resources as fog nodes to authenticate vehicles traveling around, which greatly reduces the burden of RSU authentication. Because vehicle has fast mobility, this will make the network topology of IoV change greatly, and the stability of the scheme needs to be further proved. Vijayakumar et al. [30] proposed a scheme for 6G scenarios, However, the computational complexity of the bilinear pairings is high, which leads to a large resource overhead. He et al. [31] combined fog computing with multi-TA model to give full play to their respective advantages. The fog computing is used to reduce the time delay of authentication, and the multi-TA structure is designed to prevent single-point problems in scheme.

In today's IoV authentication research, how to maintain low-cost consumption while ensuring system security is an urgent problem to be overcome. Therefore, a qualified authentication scheme must fit the actual application scenario of IoV and meet the real-time performance while meeting the security requirements.

3  Background and System Structure

3.1 System Model

IoV system involves four types of communication entities, which are trusted agency (TA), roadside unit (RSU), vehicles and edge computing node (ECN). Fig. 2 is the system model of IoV.

images

Figure 2: System model of IOV

(1) TA: it has rich computing and storage resources, generally established by the government, and has full credibility [32]. It is responsible for maintaining the daily work of system operation and data storage. If malicious nodes appear in the IoV, TA can trace malicious nodes and make penalties at the same time. In the traditional IoV, it is often set up a TA, if the TA encounters a performance bottleneck, it will reduce the efficiency of authentication of system. And the setting of a single TA is also easy to cause the centralization problem. Therefore, this scheme places a TA in each region. These TA act as blockchain nodes to form an alliance chain and regularly publish relevant information on vehicle registration.

(2) RSU: it is also a completely trusted third party and it can communicate directly with TA and vehicles [33]. In this scheme, it is responsible for publishing the anonymous identity of vehicles and verifying the legitimacy of messages collected by edge computing nodes. RSU can join the alliance chain after being registered and authenticated by TA. As a blockchain light node, it is used for maintaining the network information.

(3) Edge computing node (ECN): it is also essentially a legitimate vehicle and has a certain amount of computing resources. It is a node selected by RSU and is responsible for assisting the RSU in message authentication.

(4) Vehicle: it is the main user of IoV and can enjoy the service application of the system. Each vehicle has a communication device and tamper-proof device (TPD).

3.2 Related Cryptography Theory

In 1987, Miller and Koblitz proposed elliptic curve cryptography [34], which is based on the knowledge of groups and fields in mathematics. Because it has the characteristics of high safety strength and fast calculation speed, it is suitable for the environment with limited resources. ECC is more difficult to factorize the large composite number than RSA. It is generally defined as formula y2=x3+ax+b modq, where a, b are coefficients, and 4a3+27b20modq .

The addition principle of elliptic curve: take two points A(X1, Y1), B(X2, Y2) on curve. Select two points A and B to make a straight line and intersect with the elliptic curve, where the intersection point is R(X1, Y1). Cross point R to make the vertical line of X axis intersect with the elliptic curve and point R (It is R’s symmetric point on X axis), this is A+B=R.

The multiplication principle of elliptic curve: it is different from our usual multiplication. It is calculated in the form of accumulation. For example, when 3Q needs to be calculated, it is generally reduced to 3Q=2Q+Q=(Q+Q)+Q, and the general form is KQ=Q+Q+Q+Q+Q (K times). Fig. 3 shows the specific case of R = P + Q.

images

Figure 3: Elliptic curve algorithm example R = P + Q

Most encryption applications based on elliptic curves mainly use the following two generally accepted thorny issues:

The elliptic curve discrete logarithm problem: For example, R=KP, where R on elliptic curve, KZq. When P and K are known, R can be calculated, but when R and P are known, it is impossible to calculate K.

The elliptic curve computational Diffie-Hellman problem [35] (ECCDH). It is difficult to calculate abP for any known P, aP, bPG, where a, bZq.

3.3 Blockchain

Blockchain itself is a distributed system, It is characterized by chain connection, decentralization, group decision-making, and programmable customization. Each data block on the chain is stored in a chain structure and connected in chronological order.

In proposed scheme, all TA and RSU form a multi-server network based on a consortium chain. TA is a miner (full node) in the blockchain network with accounting rights, and RSU (light node) does not participate in the accounting. A new TA must be authorized before joining the network. Light nodes want to access information on the blockchain, must be authorized by the full node. Considering that the resources of IoV node are limited, we use the PBFT algorithm with higher efficiency and less computing resource consumption to make group decision between nodes. Our scheme also uses smart contract technology to automatically execute and manage data information in the authentication process according to predetermined rules, supporting users to achieve flexible and diverse automated operations, which helps to simplify the process and improve the authentication efficiency.

3.4 Security Model

The IoV system needs to have the following security features:

(1) Privacy protection: In the Internet era, users pay great attention to their privacy. In the process of communication, users do not want to expose their personal information and identity.

(2) Unforgeability: Any illegal vehicle cannot forge a legitimate signature.

(3) Traceability: If malicious behavior occurs in the system, TA can track and recover the identity of malicious nodes.

(4) Unlinkability: When a node receives multiple messages from the same vehicle, it is impossible to determine whether these messages are from the same message source.

(5) Resist man-in-the-middle attack: Attackers cannot implement this type of attack.

4  Proposed Scheme

In this chapter, we will explain each step of the authentication scheme in detail. The scheme has six steps: system set-up, registration, pseudonym generation, edge computing node selection, vehicle message signature, and vehicle message authentication. The complete authentication process will be shown in Fig. 4.

images

Figure 4: The process of messages authentication

When the system starts, TA performs the system set-up phase. If a vehicle wants to join IoV, it must obtain identity and key in system from the TA. These pre-operations are carried out in a secure network environment.

In our scheme, once vehicle gets (PubOBUi, Keyi), TA will publish it to the blockchain for maintenance.

The symbols and parssssameter definitions that appear in the scheme will be explained and explained in detail in Table 1.

images

4.1 System Set-Up

At this stage, TA, as a fully trusted node, will complete the initialization of the system and broadcast the generated system parameters. It has a total of four steps:

Step (1): TA selects p and q (two large primes), an G (additive group) with order q and generator P.

Step (2): TA selects a random number STZq as its own key, and calculates PubTA=STP.

Step (3): TA chooses three one-way hash functions: h1:GG;h2:GZq;h3:{0, 1}Zq.

Step (4): TA publishes {G, p, q, P, PubTA, h1, h2, h3} to all.

4.2 Registration Phase

4.2.1 Registration of Vehicles

When a vehicle needs to be registered, its driver should submit the relevant information to TA. After TA checks that the received information is correct, it first randomly selects a number SVZq as vehicle key, and computes PubOBUi for vehicle.

PubOBUi=SVP(1)

After calculating public and private keys of the vehicle, TA calculates Keyi=h(SVPubTA), and broadcasts (PubOBUi, Keyi) to all TAs. In addition, PubOBUi is not only public key of vehicle, but also can be can be used as a pointer on the blockchain to help RSU quickly find vehicle’s other parameters. Through PubOBUi, RSU retrieves the tuple (PubOBUi, Keyi)from blockchain. Finally, master node will initiate a consensus to write the transaction data (PubOBUi, Keyi) of all TA broadcasts in the time period into the new block.

Finally, TA will send message {PubOBUi, SV, Keyi} to vehicle's tamper-proof device TPD in a secure environment. Fig. 5 shows the structure of our blockchain.

images

Figure 5: Blockchain structure of system

4.2.2 Registration of RSU

When roadside unit equipment RSUi is installed, it needs to record the identity information at the TA. After receiving its registration application, TA will choose SRZq as its key, and calculates PubRSUi:

PubRSUi=SRP(2)

Finally, TA sends message {PubRSUi, SR} to RSUi through secure channel. The entire registration process for each entity is shown in Fig. 6. After RSUi registration is completed and successfully connected to IoV, it can apply to TA as a light node to obtain access to blockchain ledger, so that it can complete the issuance of anonymous identities for subsequent vehicles.

images

Figure 6: The registration process of vehicle and RSU

4.3 Anonymous Identity Generation of Vehicles

4.3.1 The Vehicle Applies for Anonymity

First, vehicle will request an anonymous identity from RSU, but it will first use a temporary anonymity to complete the application. The vehicle randomly selects a rZq, and calculates the temporary anonymity AIDi.

AIDi={AIDi1, AIDi2}(3)

where AIDi1=rP,AIDi2=(r+SV)PubRSUi. Vehicle then begins to calculate PidOBUi=PubOBUih(rPubRSUi). Ttime is time stamp generated by vehicle. Then, vehicle sends message {AIDi, PidOBUi, Ttime} to RSUi to apply for anonymous identity.

The specific implementation algorithm is as follows:

images

4.3.2 RSU Issues Anonymous Identity to Vehicles

When RSUi receives application sent by vehicle, RSUi starts to verify the validity of the message. If TnowTtime<ΔT, then the message has timeliness. After timeliness check is passed, RSUi begins to calculate PubOBUi of vehicle:

PubOBUi=PidOBUih(SRAIDi1)(4)

After RSUi obtains PubOBUi of vehicle, RSUi will check whether there is information about PubOBUi on the blockchain by executing a smart contract. If it exists, it means that a vehicle has indeed obtained the identity PubOBUi. In this process, RSUi will also obtain the parameter Keyi for further authentication calculations. After determining that PubOBUi already exists, RSUi will continue to confirm the authenticity of AIDi, that is, whether AIDi is PubOBUi temporary anonymity. Next, RSUi computes the equation

AIDi2==SRAIDi1+SRPubOBUi(5)

If the equation holds, then the message is indeed sent by vehicle, and AIDi’s identity legitimacy is confirmed.

RSUi is prepared to generate an anonymous identity that is used by vehicles to communicate with ECN for vehicle. First, the random number tZq is selected as private key of vehicle’s temporary identity. RSUi saves {PIDvi, PubOBUi} locally. The generation process of anonymous identity is as follows:

PIDv1=tP(6)

PIDv2=PubOBUih(tSRPubTA)(7)

where anonymous identity is PIDvi={PIDv1, PIDv2}, After generating anonymous identity PIDvi, RSUi computes StPID=th(Keyi), AuthRSUi=h(SRAIDi1)h(Keyi). Finally, RSUi generates a timestamp Ttime based on the present time and sends {PIDvi, StPID, AuthRSUi, Ttime} to vehicle. The algorithm is as follows:

images

4.3.3 Vehicle Receives Anonymous Identity

When vehicle PubOBUi receives message from RSUi, the timeliness of the message must be verified first that TnowTtime<ΔT. The vehicle determines whether the PIDvi is published by RSUi. The vehicle first verifies the equation

h(Keyi)==AuthRSUih(rPubRSUi)(8)

If not equal, then the PIDvi is discarded; if it is equal, then the PIDvi is published by RSUi. Vehicle will also calculate private key t of anonymous identity through the following equation to indicate the message that needs to be published.

t=StPIDh(Keyi)(9)

The specific implementation algorithm is as follows:

images

The application process of anonymous identity is shown in the Fig. 7.

images

Figure 7: Application of anonymous identity

4.4 Selection of Edge Computing Nodes

All vehicles can apply to become ECN, but must meet two requirements, one is parked within the communication range of RSUi, and the other is a certain amount of computing resources. The main task of ECN is to carry out the first round of authentication of the messages sent by other vehicles to RSUi and feeds back results to RSUi. Vehicle application to become an ECN proceeds mainly through the following three steps:

(1) First, vehicle should be a legal vehicle registered through IoV system. Vehicle can use private key t of temporary identity to sign the message mrequest. The specific operations are as follows:

Requesti=tih(mrequest||Tm)+Sv(PIDvi)(10)

The vehicle sends {PIDvi, Requesti, mrequest, Tm} to RSUi. Immediately upon receipt of the message, RSUi first queries vehicle’s PubOBUi according to PIDvi. If PIDvi does not exist, the first step of vehicle’s legitimacy verification does not pass, and all data sent by the vehicle is discarded. If the vehicle passes, RSUi continues the next calculation:

RequestiP==PIDvih(mrequest||Tm)+PubOBUi(PIDvi)(11)

If the equation is passed, then the legitimacy of the application vehicle is verified, and the vehicle can be listed as one of candidate ECN.

(2) Considering the success rate of message authentication, ECN should have sufficient computing resources and maintain a short communication distance with RSUi. We will select ECN from candidate nodes according to two factors of distance and available computing resources. We set the communication radius of RSUi to be x,and the straight distance between the vehicle and RSUi is d. Distance will be an important factor affecting the vehicle to become an ECN. We will calculate di in two cases:

di={d/X,0<d<X0,d>X}(12)

In terms of computing resources, we are more inclined to select vehicles with more available computing resources. When a vehicle is applying as a bus, considering that it has more computing resources and is a fully trusted node, we will give priority to the bus.

The formula for selecting ECN is as follows:

ECNi=αidi1+βi(Rusei)1+γi(13)

αi and βi are the weights, respectively, αi + βi = 1 and γi is a unique variable of bus. When the application node itself is a bus, the value of γi is 0, otherwise γi is 1. Among all vehicles, the vehicle with the smallest ECNi value will be selected as ECN, and the number of ECNs is determined by RSUi. For example, RSUi needs to select two ECNs, which take the two candidate nodes with the smallest ECNi as ECNs.

images

When vehicle becomes ECN, RSUi randomly selects a number RiZq as it’s key, and begins to issue new anonymous identity HIDi for ECN:

HIDi={HIDi1, HIDi2}(14)

HIDi1=RiP(15)

HIDi2=PubOBUih(RiSRPubRSU)(16)

RSUi sends {HIDi,Ri} to TPD device of ECN through secure transmission. ECN will use HIDi to communicate with RSUi for subsequent message authentication. The ECN sends information to RSUi at regular intervals to maintain identity of ECN. At a certain time, if RSUi does not receive daily feedback from ECN. RSUi will cancel the identity of ECN. In the simulation experiment, we set 150 ms.

4.5 Messages Publish and Authentication

After vehicle is on the road, it first randomly selects a number KiZq, and uses Ki and ti to sign the traffic information m through the TPD device.

σi1=KiP(17)

σi2=tih(PIDv2)+Kih(m||Tm)(18)

σmi={σm,1,σm2,}(19)

The vehicle will select the nearest ECN Edgei in the current RSUi communication range to send messages {PIDvi, σmi, m, Tm}.

images

When ECN receives instruction of RSUi, ENC performs batch authentication algorithm processing i messages{PIDvi, σmi, mi, Tm} (1 < i < n) received in a certain time. The authentication method of this batch of messages is as follows:

(i=1naiσi2)P=i=1naiPIDvi,1h(PIDvi,2)+i=1naiσi1h(mi||Tm)(20)

ECN merge authenticated successful and time-sensitive messages into MT=(i=1nMi)||Ti, and use Ri and ti to sign MT through the TPD device:

θi=tih(HIDi2)+Rih(MT)(21)

Finally, the ECN sends message{MT, θi, HIDi, PIDvi} of its own authentication success to RSUi.

images

When RSUi receives result from ECN, it begins the next authentication calculation to prove its validity.

θiP==PIDv1h(HIDi2)+HIDi1h(MT)(22)

If the equation holds, then RSUi considers that the message sent by the ECN is legitimate. RSUi will find the PIDi of each message sender based on MT collection of traffic messages received, and broadcast {PIDi, m, Edgei}to all vehicles in a secure way. If vehicle has objections to this result, then it can feedback to RSUi. If the vehicle ‘s objection is established, then all the information received in the original time-period will be re-authenticated. If RSUi does not receive any feedback in a fixed time period, then all messages authenticated by the ECN are verified and paid as a reward. So far, RSUi have completed all the message authentication work.

5  Security Analysis

In terms of security, we have theoretically verified the scheme, and it can resist the network attack behavior in Chapter 3.4.

5.1 Formal Security Analysis

Theorem 1: The scheme can resist adaptive chosen message attack.

The whole proof process is carried out under the principle of ECDLP. The following is the proof process:

Adversary A forged a signature {PIDvi, σmi, m, Tm}, and give an ECDLP instance Q=XP, and then the C is challenger that can solve the discrete logarithm problem with a certain probability under A’s query.

Initialization: Challenger C first selects a random number tiZq, and compute PIDv1=tiP.Next, C sets the system parameters {p, q, P, PubTA, PIDv1, h1, h2, h3} and sents to A. And C constructs three hash lists, that is, the form of LH1 is (α, τh1), the form of LH2 is (PIDv1, PIDv2, τh2), and the form of LH3 is (m,Tmτh2).

H1 query: Challenger C creates and maintains list H1. When receiving α queries from adversary A, C first confirms whether there is a tuple (α, τh1) in table H1. If it exists, C returns τh1 = h1(α) to adversary A. If not, C randomly selects a number τh1Zq to return it to A and store (α,τh1) to table H1.

H2 query: Challenger C creates and maintains list H2. When receiving PIDv2 queries from adversary A, if (PIDv1, PIDv2, τh2) exists in table H2, C tells τh2=h1(PIDv2) to A. If not, C chooses a random number τh2Zq to return it to A and store(PIDv1, PIDv2, τh2) to table H2.

H3 query: Challenger C creates and maintains list H3. After C receiving (m,Tm) queries from adversary A, C first confirms whether there is a tuple (m, Tm, τh3) in table H3. If so, C will tell τh3=h1(m||Tm) to A. If not, C chooses a random number τh3Zq to return it to A and store (m, Tm, τh3) to table H3.

Signature query: After C receives a message request from A, C randomly selects hi,2, hi,3, σm2Zq, σm1G, Next, C calculates PIDv1=σm2Pσm1hi,3hi,2. Then C increases (PIDv1, PIDv2, τh2) and (m, Tm, τh3) to H2 and H3, respectively. Finally, the response of C to A is {PIDvi σmi, m, Tm}.

Output: A final output message tuple {PIDvi, σmi, m, Tm}

σm2P=PIDv1hi,2+σm1hi,3(23)

C uses Eq. (23) to check message tuples. If the equation does not hold, C ends the game.

In this paper, the above process is repeated with different values H2, and A can obtain another effective message tuple {PIDvi, σmi, m, Tm}.In this case, the following equation can be obtained:

σm2P=PIDv1hi,2+σm1hi,3(24)

Through Eqs. (23) and (24), we can get

(σm2σm2)P(25)

=σm2Pσm2P

=PIDv1hi,2+σm1hi,3PIDv1hi,2+σm1hi,3

=(hi,2hi,2)PIDv1

=(hi,2hi,2)tP

Therefore, this paper can get (σm2σm2)=(hi,2hi,2)tmodq, Therefore, C can solve the ECDL problem PIDv1=tP by calculating t=(σm2σm2)(hi,2hi,2)1. However, this conclusion contradicts with the recognized difficulty of the ECDL problem. The above process is not established.

5.2 Informal Security Analysis

5.2.1 The Correctness of Signature

When the ECN starts the first step of authentication, it will use Eq. (26) to judge:

(i=1naiσi2)P=(i=1nai[tih(PIDv2)+Kih(m||Tm)])P=[i=1naitih(PIDv2)+i=1naiKih(m||Tm)]P=i=1naiPIDvi,1h(PIDvi,2)+i=1naiσi1h(mi||Tm)(26)

5.2.2 Vehicle Identity’s Privacy Protection

In the process of IoV communication, in order to protect identity privacy and security, all communication entities use anonymous identity to communicate. Taking an ordinary vehicle as an example, we use ti and PubOBUi to obtain its anonymous identity PIDi={PIDv1, PIDv2}, where PIDv1=tiPubRSUi, PIDv2=PubOBUih(tiSRPubTA).

If malicious node wants to understand vehicle’s privacy data, then it must know ti and SR in advance. It is assumed that adversary A can calculate key ti through vehicle’s PIDv1, that is, AdvAECDLP(t)=Prb[A(PIDv1,P)=ti]. At the same time, A can calculate RSUi’s key SR through PubRSUi, that is, AdvAECDLP(t)=Prb[A(PubRSUi, P)=SR]. Then A can calculate vehicle’s PubOBUi by cracking ti and SR. However, the above operation is contrary to ECDLP principle. We know that the probability of AdvAECDLP(t)<ϵ and ϵ > 0 is very small, so it has the security characteristics of vehicle identity’s privacy protection.

In addition, the anonymous identity of the vehicle can be changed at any time. When other vehicles receive multiple messages from the same vehicle, it cannot know vehicle’s identity that sends these messages. That is to say, the scheme of this paper satisfies unlinkability.

5.2.3 Traceability

In this scheme, in order to protect their privacy, everyone uses anonymous identity to communicate. In order to prevent malicious behavior of legitimate users, RSU and TA can trace its real identity through anonymous identity. The formulas used by RSU and TA for identity traceability are as follows:

RSU:h(tiSRPubTA)PIDv2=h(tiSRPubTA)PubOBUih(tSRPubTA)=PubOBUi

TA:h(tiSRPubTA)PIDv2=h(tiSRPubTA)PubOBUih(tSRPubTA)=PubOBUi

Because other nodes do not know the secret key of RSUi and TA, it can ensure the security and authenticity of identity traceability.

5.2.4 Resist Replay Attacks

The messages {PIDvi, σmi, m, Tm} broadcast by the vehicle have time stamps, which are also part of the signature message. The time stamp cannot be modified. Checking Tm will be the first step for the receiver. If TnowTm>Δ (a fixed time interval), the message is discarded. This can well guarantee against replay attacks.

5.2.5 Resist Man-in-the-Middle Attackss

We can avoid adversaries impersonating others to participate in communication, in our scheme, anonymous identity applications and message sending require multi-stakeholder participation and mutual authentication. During the entire authentication session, the message sent by each node needs to be signed using the corresponding secret key. The pseudonym and the generated signature message are based on the ECDL problem, so it can effectively resist the man-in-the-middle attack.

6  Experimental Analysis

In this part, the team also used simulation tools to carry out security simulation experiments and performance analysis experiments.

6.1 Safety Simulation Experiment

We chose the widely accepted software tool ProVerif for experimental operation and the complete scheme described in Section 4 is implemented and verified in ProVerif. For a detailed description of the scheme, please see the Fig. A1.

In the experimental simulation, malicious node’s goal is to launch an attack to obtain the privacy of the vehicle. Simulation results (as shown in Fig. 8) show that although malicious nodes launch network attacks, they still fail to achieve their goals. Malicious nodes can’t get vehicle’s private data, such as PubOBUi and key ti. All in all, our proposed scheme is secure.

images

Figure 8: The scheme’s simulation results

6.2 Performance Simulation Experiment

In terms of performance, we mainly analyze several factors and compare the performance with CAEC [36], DCBA [37] and ABAH [38] schemes.

We use a popular cryptography library called Crypto + + library to measure all the cryptographic operations involved in the above scheme. The performance evaluation is carried out in a machine environment configured with Intel i7-9750 3 GHZ and Visual Studio 2019. In addition, we also use the Veins simulation platform to build simulation scenarios for experiments.

6.2.1 Computational Overhead

We set up a security level of 80 bits scheme, Elliptic curve cryptography is set as follows: E:y2=x3+ax+b mod q, G is defined in the additive group of elliptic curves by order q and generator P, where P, q are primes of 160 bits. In the experiment,we average the execution time of each corresponding operation. Let TPM represent point multiplication operation on the elliptic curve, and its execution time is 0.7358 ms; TPMS represents point multiplication operation of elliptic curve vector, and its execution time is 0.0428 ms; TPA represents the point addition operation of elliptic curve, and its execution time is 0.004 ms. TGM represents the bilinear pairing point multiplication operation, and its run time is 2.6439 ms; TGE represents the bilinear pairing operation, and its execution time is 6.4164 ms; TGA represents bilinear point-to-point addition operation, and its execution time is 0.0146 ms; TMPT represents the MapToPoint operation, and its execution time is 1.3277 ms; TH represents a one-way hash function operation with a run time of 0.002 ms.

In a single RUS domain, we take the scenario where the vehicle only transmits one message as an example for analysis. In the whole process, the computational consumption generated by the vehicle ‘s signature is TPM+2TH+TPA0.7348 ms. After the vehicle sends a message, ECN needs to authenate it and feedback the results to RSUi, and these operations will result in the computational cost of 6TPM+2TPA+4TH4.4268 ms. We analyze the computational consumption of several other schemes in the same scenario, as shown in Table 2. By comparing the experimental data from Fig. 9, we clearly see that our consumption in the signature phase is the least, but it is not as good as the schemes DCBA and ABAK in the authentication phase.

images

images

Figure 9: The authentication and signature computation overhead of a message

Next, we consider the peak scenario of vehicle travel. In a short period of time, many vehicles send messages to ECN, ECN will batch authenticate the corresponding messages. In most cases, batch authentication of ECN is passed at one time.

We assume that within the communication domain of RSUi, RSUi received n messages, and the number of ECN selected by RSUi is x. We assume that each ECN authenticates the same number of messages, which are n/x. The computation cost to complete the authentication of n messages is TMAX{THID1,THID2,THID3THIDx}+(2x+1)TPM+xTPMS+2xTH+TPA,TMAX is the maximum time consumption for each ECN to verify n/x messages. Setting aside the impact of time consumption caused by network transmission, we assume that each ECN takes the same amount of time to authenticate the same number of messages. Therefore, the time to authenticate this batch of messages in the entire RSU domain is [2(n+x2+x/x)]TPM+2(n+x2)TH+(n+x2/x)TPMS+2TPAms.The computational consumption of scheme CAEC, DCBA and ABAH is 2nTGE+(n+1)TPM+2nTH+nTPA ms, 8nTPM+nTPMS+3nTH+4nTPA ms and (n+1)TPM+nTPMS+nTH+nTPA ms, respectively. We conducted experiments on scenarios with 500, 1000, 1500, 2000, and 2500 messages generated in the entire RSU domain during a certain interval time. The experimental results are shown in Fig. 10. When 500 messages are generated in the domain, the computation time of our scheme is 383.61 ms (x = 2), which is close to ABAH. Our schemes are 392.53 ms. However, in the peak scenario, the advantages of our scheme become obvious.

images

Figure 10: Comparison of computational consumption

We also consider the influence of the number of ECN. Fig. 11 reveals the correlation between time consumption and ECNs. With the addition of more ECN, the time consumption of message authentication becomes less, because ECN greatly alleviates the authentication pressure of RSU and accelerates the whole process.

images

Figure 11: The correlation between the number of ECNs and computational consumption

6.2.2 Communication Overhead

In the part, we consider another factor, namely the communication overhead. We have done experiments on the communication consumption between DCBA, CAEC, ABAH and this scheme. Taking the communication domain of an RSU as an example. At a certain time, the sum of the transmission consumption of all vehicles and the transmission consumption of ENC is the total communication overhead in the domain.

In Chapter 6.1, we know that the P1 is 64 bytes and P is 20 bytes. Therefore, the elements in group G1 is 128 bytes and the elements in G are is 40 bytes. Suppose that the message m is 16 bytes and the time-stamp is 4 bytes.

We clearly know the communication consumption of each scheme from Table 3. In this scheme, the data sent from vehilce to ECN is {Mi, δmi, PIDVi, Ti}, where is PIDi1, PIDi2, δm1G, δm2, Zq, So the communication overhead of sending a message is 3×40+1×20+(16+4)=160bytes. The result of the ECN feedback to the RSU is {MT,θi,HIDi,PIDvi} and the size of these messages transmitted is 4×40+1×20+(16+4)=200 bytes, where is HIDiG, θiZq. Similarly, the communication consumption of the scheme DCBA is 260 bytes, CAEC is 168 bytes, ABAH is 240 bytes. Fig. 12 indicates that Our scheme is better than others. (We set the number of ECNs to be 2). We derive the relationship between ECN and communication overhead. In the single message authentication scenario, This scheme is not as good as the other three schemes in terms of communication overhead, but we know that the impact of the number of ECN on transmission consumption can be ignored in the scenario of a large number of message authentication from Fig. 13.

images

images

Figure 12: Comparison of communication consumption of message authentication

images

Figure 13: Impact of the number of ECN on communication consumption

6.2.3 Packet Loss Rate

In high-density traffic scenarios, it is easy to cause packet loss events during transmission. To reflect advantages of this scheme in this aspect, in the part, we use the Veins simulation architecture to conduct experiments. The calculation formula of packet loss rate is PLR=AB/A. A is the total packet, and B is the received packet. Table 4 is the setting of simulation parameters.

images

Fig. 14 is the PLR results of the experiment under different vehicle traffic scenarios. From the experimental results, it can be known that the throughput of IoV is easily affected by the size of traffic flow. The larger the traffic flow, the higher the packet loss rate. In our scheme (only one ECN is set), the traffic flow is in the range of 2~16 vehicles per metre, the PLR is 2.91%~3.06%, and we increased ECN to 2 vehicles, the PLR is 2.89%~2.93%. All in all, our scheme still has certain advantages and is suitable for authentication in peak traffic scenarios.

images

Figure 14: Comparison of PLR

7  Conclusions and Prospected

This paper is devoted to the application research of IoV, we combine blockchain and edge computing technology to design a novel scheme for message authentication. Unlike in traditional authentication scheme, ECN in the scheme will assume part of the responsibility of RSU for the first round of message authentication, which can make full use of the idle computing resources and accelerate the overall authentication process of messages. In addition, TA and RSU in the scheme are used as blockchain nodes to maintain vehicle information. By accessing the information on the blockchain, RSU can authenticate vehicles from different domains and enable vehicles to achieve cross-domain authentication. The scheme we designed also has limitations. Considering that ECN are temporarily parked vehicles, there is uncertainty in identity authentication work. At the same time, frequent replacement of ECN will also increase the resource consumption of the system.

At present, most of authentication mechanisms are mainly aimed at the security characteristics required by IoV. The higher the security of the scheme, the greater the corresponding computational communication consumption. How to achieve a perfect balance between the two and design a high security and performance authentication scheme is still our goal in the future. Nowadays, blockchain, artificial intelligence and other technologies can be used in authentication schemes, and it is also feasible to design authentication schemes by combining multiple technologies.

Acknowledgement: Throughout the submission process, we are very grateful for the patient guidance of editors and reviewers. We thank our colleagues and experts for their guidance and support.

Funding Statement: This research was funded by Guangxi Natural Science Foundation General Project—Research on Visual Positioning and Navigation Robot Based on Deep Learning, Project Number: 2023GXNSFAA026025.

Author Contributions: The authors confirm contribution to the paper as follows: study conception and design: Qiping Zou, Zhong Ruan; data collection: Zhong Ruan; analysis and interpretation of results: Zhong Ruan; draft manuscript preparation: Huaning Song. All authors reviewed the results and approved the final version of the manuscript.

Availability of Data and Materials: Data sharing is not applicable to this article as no datasets were generated or analyzed during the current study.

Ethics Approval: Not applicable.

Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study.

References

1. A. Hammoud, “AI, blockchain, and vehicular edge computing for smart and secure IoV: Challenges and directions,” IEEE Internet Things Mag., vol. 3, no. 2, pp. 68–73, 2020. doi: 10.1109/IOTM.0001.1900109. [Google Scholar] [CrossRef]

2. P. M. Rao, S. Jangirala, S. Pedada, A. K. Das, and Y. H. Park, “Blockchain integration for IoT-Enabled V2X communications: A comprehensive survey, security issues and challenges,” IEEE Access, vol. 3281844, no. 11, pp. 54476–54494, 2023. [Google Scholar]

3. M. T. Abbas and M. Afaq, “SD-IoV: SDN enabled routing for internet of vehicles in road-aware approach,” J. Ambient Intell. Hum. Comput., vol. 11, no. 3, pp. 1265–1280, 2020. doi: 10.1007/s12652-019-01319-w. [Google Scholar] [CrossRef]

4. M. El, S. Samira, and E. G. Abdelaziz, “Internet of vehicles: Concept, process, security aspects and solutions,” Multimed. Tools Appl., vol. 81, no. 12, pp. 16563–16587, 2020. [Google Scholar]

5. J. Cui, L. Wei, J. Zhang, Y. Xu, and H. Zhong, “An efficient message-authentication scheme based on edge computing for vehicular ad hoc networks,” IEEE Trans. Intell. Transp. Syst., vol. 20, no. 5, pp. 1621–1632, 2018. doi: 10.1109/TITS.2018.2827460. [Google Scholar] [CrossRef]

6. S. O. Ogundoyin, “An autonomous lightweight conditional privacy-preserving authentication scheme with provable security for vehicular ad-hoc networks,” Int. J. Comput. Appl., vol. 42, no. 2, pp. 196–211, 2020. doi: 10.1080/1206212X.2018.1477320. [Google Scholar] [CrossRef]

7. S. Jiang, X. Zhu, and L. Wang, “An efficient anonymous batch authentication scheme based on HMAC for VANETs,” IEEE Trans. Intell. Transp. Syst., vol. 17, no. 8, pp. 2193–2204, 2016. doi: 10.1109/TITS.2016.2517603. [Google Scholar] [CrossRef]

8. C. Yang, J. Peng, Y. Xu, Q. Wei, L. Zhou and Y. Tang, “Edge computing-based VANETs’ anonymous message authentication,” Symmetry, vol. 14, no. 12, pp. 2662, 2022. doi: 10.3390/sym14122662. [Google Scholar] [CrossRef]

9. B. Palaniswamy, S. Camtepe, E. Foo, and J. Pieprzyk, “An efficient authentication scheme for intra-vehicular controller area network,” IEEE Trans. Inf. Forensics Secur., vol. 15, pp. 3107–3122, 2020. doi: 10.1109/TIFS.2020.2983285. [Google Scholar] [CrossRef]

10. Z. Shen, F. Ren, and H. Wang, “Combining blockchain and crowd-sensing for location privacy protection in Internet of vehicles,” Veh. Commun., vol. 45, pp. 100724–100732, 2024. doi: 10.1016/j.vehcom.2023.100724. [Google Scholar] [CrossRef]

11. M. Azees, P. Vijayakumar, and L. J. Deboarh, “EAAP: Efficient anonymous authentication with conditional privacy-preserving scheme for vehicular Ad Hoc networks,” IEEE Trans. Intell. Transp. Syst., vol. 18, no. 9, pp. 2467–2476, 2017. doi: 10.1109/TITS.2016.2634623. [Google Scholar] [CrossRef]

12. J. Cui, D. Wu, J. Zhang, Y. Xu, and H. Zhong, “An efficient authentication scheme based on semi-trusted authority in VANETs,” IEEE Trans. Vehicular Technol., vol. 68, no. 3, pp. 2972–2986, 2019. doi: 10.1109/TVT.2019.2896018. [Google Scholar] [CrossRef]

13. J. Cui, J. Wen, S. Han, and H. Zhong, “Efficient privacy-preserving scheme for real-time location data in vehicular ad-hoc network,” IEEE Internet Things J., vol. 5, no. 5, pp. 3491–3498, 2018. doi: 10.1109/JIOT.2018.2797206. [Google Scholar] [CrossRef]

14. L. Zhang, “OTIBAAGKA: A new security tool for cryptographic mix-zone establishment in vehicular ad hoc networks,” IEEE Trans. Inf. Forensics Secur., vol. 12, no. 6, pp. 2998–3010, 2017. doi: 10.1109/TIFS.2017.2730479. [Google Scholar] [CrossRef]

15. W. Xiong, R. Wang, Y. Wang, F. Zhou, and X. Luo, “CPPA-D: Efficient conditional privacy-preserving authentication scheme with double-insurance in VANETs,” IEEE Trans. Vehicular Technol., vol. 70, no. 4, pp. 3456–3468, 2021. doi: 10.1109/TVT.2021.3064337. [Google Scholar] [CrossRef]

16. W. Shi, X. Zhang, Y. Wang, and Q. Zhang, “Edge computing: State-of-the-art and future directions,” J. Comput. Res. Dev., vol. 56, no. 1, pp. 69–89, 2019. [Google Scholar]

17. M. Raya and J. -P. Hubaux, “Securing vehicular ad hoc networks,” J. Comput. Secur., vol. 15, no. 1, pp. 39–68, 2007. doi: 10.3233/JCS-2007-15103. [Google Scholar] [CrossRef]

18. Y. Sun, R. Lu, X. Lin, X. Shen, and J. Su, “An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications,” IEEE Trans. Vehicular Technol., vol. 59, no. 1, pp. 3589–3603, 2010. doi: 10.1109/TVT.2010.2051468. [Google Scholar] [CrossRef]

19. R. Lu, X. Lin, H. Zhu, P. -H. Ho, and X. Shen, “ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications,” in Proc. IEEE INFOCOM, Phoenix, AZ, USA, 2008, pp. 1229–1237. [Google Scholar]

20. Y. Qing, Z. Xiao, Z. Jing, and X. L. Wang, “A novel authentication and key agreement scheme for Internet of Vehicles,” Future Gener. Comput. Syst., vol. 145, no. 1, pp. 415–428, 2023. doi: 10.1016/j.future.2023.03.037. [Google Scholar] [CrossRef]

21. K. -A. Shim, “CPAS: An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks,” IEEE Trans. Vehicular Technol., vol. 61, no. 4, pp. 1874–1883, 2012. doi: 10.1109/TVT.2012.2186992. [Google Scholar] [CrossRef]

22. H. Vasudev, D. Das, and A. V. Vasilakos, “Secure message propagation protocols for IoVs communication components,” Comput. Electr. Eng., vol. 82, no. 1, pp. 106555, 2020. doi: 10.1016/j.compeleceng.2020.106555. [Google Scholar] [CrossRef]

23. H. Vasudev, V. Deshpande, D. Das, and S. K. Das, “A lightweight mutual authentication protocol for V2V communication in internet of vehicles,” IEEE Trans. Vehicular Technol., vol. 69, no. 6, pp. 6709–6717, 2020. doi: 10.1109/TVT.2020.2986585. [Google Scholar] [CrossRef]

24. C. Zhang, X. Lin, R. Lu, P. -H. Ho, and X. Shen, “An efficient message authentication scheme for vehicular communications,” IEEE Trans. Vehicular Technol., vol. 57, no. 6, pp. 3357–3368, 2008. doi: 10.1109/TVT.2008.928581. [Google Scholar] [CrossRef]

25. B. Liu and L. Zhang, “An improved identity-based batch verification scheme for VANETs,” in Proc. 2013 5th Int. Conf. Intell. Netw. Coll. Syst., Xi’an, China, 2013, pp. 809–814. [Google Scholar]

26. C. Wang, R. Huang, J. Shen, J. Liu, P. Vijayakumar and N. Kumar, “A novel lightweight authentication protocol for emergency vehicle avoidance in VANETs,” IEEE Internet Things J., vol. 8, no. 18, pp. 14248–14257, 2021. doi: 10.1109/JIOT.2021.3068268. [Google Scholar] [CrossRef]

27. S. H. Islam, M. S. Obaidat, P. Vijayakumar, E. Abdulhay, F. Li and M. K. C. Reddy, “A robust and efficient password-based conditional privacy preserving authentication and group-key agreement protocol for VANETs,” Future Gener. Comput. Syst., vol. 84, no. 1, pp. 216–227, 2018. doi: 10.1016/j.future.2017.07.002. [Google Scholar] [CrossRef]

28. Z. Xu, W. Liang, K. -C. Li, J. Xu, and H. Jin, “A blockchain-based roadside unit-assisted authentication and key agreement protocol for internet of vehicles,” J. Parallel Distr. Comput., vol. 149, no. 1, pp. 29–39, 2021. doi: 10.1016/j.jpdc.2020.11.003. [Google Scholar] [CrossRef]

29. L. Song, G. Sun, H. Yu, X. Du, and M. Guizani, “FBIA: A fog-based identity authentication scheme for privacy preservation in internet of vehicles,” IEEE Trans. Vehicular Technol., vol. 69, no. 5, pp. 5403–5415, 2020. doi: 10.1109/TVT.2020.2977829. [Google Scholar] [CrossRef]

30. P. Vijayakumar, M. Azees, S. A. Kozlov, and J. J. Rodrigues, “An anonymous batch authentication and key exchange protocols for 6G enabled VANETs,” IEEE Trans. Intell. Transp. Syst., vol. 23, no. 2, pp. 1630–1638, 2021. doi: 10.1109/TITS.2021.3099488. [Google Scholar] [CrossRef]

31. Y. He, G. Li, and J. Liu, “Conditional privacy protection authentication scheme based on fog computing and multi-TA in Internet of vehicles,” Appl. Res. Comput., vol. 1, pp. 6–23, 2022. [Google Scholar]

32. S. -F. Tzeng, S. -J. Horng, T. Li, X. Wang, P. -H. Huang and M. K. Khan, “Enhancing security and privacy for identity-based batch verification scheme in VANETs,” IEEE Trans. Vehicular Technol., vol. 66, no. 4, pp. 3235–3248, 2015. [Google Scholar]

33. X. Zhu, S. Jiang, L. Wang, and H. Li, “Efficient privacy-preserving authentication for vehicular ad hoc networks,” IEEE Trans. Vehicular Technol., vol. 63, no. 2, pp. 907–919, 2013. doi: 10.1109/TVT.2013.2294032. [Google Scholar] [CrossRef]

34. N. Andola, Raghav, and V. K. Yadav, “A lightweight blockchain for authentication and anonymous authorization in IoD,” Wirel. Pers. Commun., vol. 119, no. 1, pp. 343–362, 2021. doi: 10.1007/s11277-021-08214-8. [Google Scholar] [CrossRef]

35. G. Xu, H. Bai, and J. Xing, “SG-PBFT: A secure and highly efficient distributed blockchain PBFT consensus algorithm for intelligent Internet of vehicles,” J. Parallel Distr. Comput., vol. 164, no. 1, pp. 1–11, 2022. doi: 10.1016/j.jpdc.2022.01.029. [Google Scholar] [CrossRef]

36. W. Peng, N. Han, and C. Song, “CAEC: Certificateless IOV identity authentication scheme in edge computing environment,” (in ChineseJ. Beijing Univ. Posts Telecommun., vol. 45, no. 2, pp. 46–51, 2022. [Google Scholar]

37. A. K. Sutrala, P. Bagga, A. K. Das, N. Kumar, J. J. Rodrigues and P. Lorenz, “On the design of conditional privacy preserving batch verification-based authentication scheme for Internet of vehicles deployment,” IEEE Trans. Vehicular Technol., vol. 69, no. 5, pp. 5535–5548, 2020. doi: 10.1109/TVT.2020.2981934. [Google Scholar] [CrossRef]

38. I. Ali, Y. Chen, N. Ullah, R. Kumar, and W. He, “An efficient and provably secure ECC-based conditional privacy-preserving authentication for vehicle-to-vehicle communication in VANETs,” IEEE Trans. Vehicular Technol., vol. 70, no. 2, pp. 1278–1291, 2021. doi: 10.1109/TVT.2021.3050399. [Google Scholar] [CrossRef]

Appendix A

images

Figure A1: Coding of the scheme


Cite This Article

APA Style
Zou, Q., Ruan, Z., Song, H. (2024). Blockchain-based message authentication scheme for internet of vehicles in an edge computing environment. Computer Systems Science and Engineering, 48(5), 1301-1328. https://doi.org/10.32604/csse.2024.051796
Vancouver Style
Zou Q, Ruan Z, Song H. Blockchain-based message authentication scheme for internet of vehicles in an edge computing environment. Comput Syst Sci Eng. 2024;48(5):1301-1328 https://doi.org/10.32604/csse.2024.051796
IEEE Style
Q. Zou, Z. Ruan, and H. Song, “Blockchain-Based Message Authentication Scheme for Internet of Vehicles in an Edge Computing Environment,” Comput. Syst. Sci. Eng., vol. 48, no. 5, pp. 1301-1328, 2024. https://doi.org/10.32604/csse.2024.051796


cc Copyright © 2024 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 408

    View

  • 172

    Download

  • 0

    Like

Share Link