Open Access
ARTICLE
Privacy-Preserving and Lightweight V2I and V2V Authentication Protocol Using Blockchain Technology
1 Department of Engineering, Pakistan Television Corporation, Lahore, 54501, Pakistan
2 Department of Computer Science, National College of Business Administration and Economics, Multan, 60000, Pakistan
3 Department of Computer Science and Data Science, Parker Hannifin Corp, Chicago, IL 60503, USA
4 Department of Electrical Engineering, University of Texas, Arlington, TX 76019, USA
5 General Motors, Warren, MI 48092, USA
6 Department of Computer Science and Data Science, ECOLABS, Aurora, IL 60503, USA
7 Lecturer at Communications and Electronics Department, Nile Higher Institute for Engineering and Technology, Mansoura, 35111, Egypt
* Corresponding Author: Awad Bin Naeem. Email:
Intelligent Automation & Soft Computing 2024, 39(5), 783-803. https://doi.org/10.32604/iasc.2024.050819
Received 19 February 2024; Accepted 24 May 2024; Issue published 31 October 2024
Abstract
The confidentiality of pseudonymous authentication and secure data transmission is essential for the protection of information and mitigating risks posed by compromised vehicles. The Internet of Vehicles has meaningful applications, enabling connected and autonomous vehicles to interact with infrastructure, sensors, computing nodes, humans, and fellow vehicles. Vehicular hoc networks play an essential role in enhancing driving efficiency and safety by reducing traffic congestion while adhering to cryptographic security standards. This paper introduces a privacy-preserving Vehicle-to-Infrastructure authentication, utilizing encryption and the Moore curve. The proposed approach enables a vehicle to deduce the planned itinerary of Roadside Units (RSUs) before embarking on a journey. Crucially, the Certification Authority remains unaware of the specific route design, ensuring privacy. The method involves transforming all Roadside Units (RSUs) in a region into a vector, allowing for instant authentication of a vehicle’s route using RSU information. Real-world performance evaluations affirm the effectiveness of the proposed model.Keywords
Cite This Article
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.