Open Access iconOpen Access

ARTICLE

Privacy-Preserving and Lightweight V2I and V2V Authentication Protocol Using Blockchain Technology

by Muhammad Imran Ghafoor1, Awad Bin Naeem2,*, Biswaranjan Senapati3, Md. Sakiul Islam Sudman4, Satyabrata Pradhan5, Debabrata Das6, Friban Almeida6, Hesham A. Sakr7

1 Department of Engineering, Pakistan Television Corporation, Lahore, 54501, Pakistan
2 Department of Computer Science, National College of Business Administration and Economics, Multan, 60000, Pakistan
3 Department of Computer Science and Data Science, Parker Hannifin Corp, Chicago, IL 60503, USA
4 Department of Electrical Engineering, University of Texas, Arlington, TX 76019, USA
5 General Motors, Warren, MI 48092, USA
6 Department of Computer Science and Data Science, ECOLABS, Aurora, IL 60503, USA
7 Lecturer at Communications and Electronics Department, Nile Higher Institute for Engineering and Technology, Mansoura, 35111, Egypt

* Corresponding Author: Awad Bin Naeem. Email: email

Intelligent Automation & Soft Computing 2024, 39(5), 783-803. https://doi.org/10.32604/iasc.2024.050819

Abstract

The confidentiality of pseudonymous authentication and secure data transmission is essential for the protection of information and mitigating risks posed by compromised vehicles. The Internet of Vehicles has meaningful applications, enabling connected and autonomous vehicles to interact with infrastructure, sensors, computing nodes, humans, and fellow vehicles. Vehicular hoc networks play an essential role in enhancing driving efficiency and safety by reducing traffic congestion while adhering to cryptographic security standards. This paper introduces a privacy-preserving Vehicle-to-Infrastructure authentication, utilizing encryption and the Moore curve. The proposed approach enables a vehicle to deduce the planned itinerary of Roadside Units (RSUs) before embarking on a journey. Crucially, the Certification Authority remains unaware of the specific route design, ensuring privacy. The method involves transforming all Roadside Units (RSUs) in a region into a vector, allowing for instant authentication of a vehicle’s route using RSU information. Real-world performance evaluations affirm the effectiveness of the proposed model.

Keywords


Cite This Article

APA Style
Ghafoor, M.I., Naeem, A.B., Senapati, B., Sudman, M.S.I., Pradhan, S. et al. (2024). Privacy-preserving and lightweight V2I and V2V authentication protocol using blockchain technology. Intelligent Automation & Soft Computing, 39(5), 783-803. https://doi.org/10.32604/iasc.2024.050819
Vancouver Style
Ghafoor MI, Naeem AB, Senapati B, Sudman MSI, Pradhan S, Das D, et al. Privacy-preserving and lightweight V2I and V2V authentication protocol using blockchain technology. Intell Automat Soft Comput . 2024;39(5):783-803 https://doi.org/10.32604/iasc.2024.050819
IEEE Style
M. I. Ghafoor et al., “Privacy-Preserving and Lightweight V2I and V2V Authentication Protocol Using Blockchain Technology,” Intell. Automat. Soft Comput. , vol. 39, no. 5, pp. 783-803, 2024. https://doi.org/10.32604/iasc.2024.050819



cc Copyright © 2024 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 572

    View

  • 203

    Download

  • 0

    Like

Share Link