4.5 Article

A blockchain-based Roadside Unit-assisted authentication and key agreement protocol for Internet of Vehicles

Journal

JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING
Volume 149, Issue -, Pages 29-39

Publisher

ACADEMIC PRESS INC ELSEVIER SCIENCE
DOI: 10.1016/j.jpdc.2020.11.003

Keywords

Authentication; Key agreement; Internet of vehicles; Cryptography

Funding

  1. National Natural Science Foundation of China [61872138, 61772185]

Ask authors/readers for more resources

The paper introduces a blockchain-based authentication and key agreement protocol for the Internet of Vehicles in a multi-TA network model, which improves authentication efficiency and enhances security.
A fundamental layer of smart cities, the Internet of Vehicles (IoV) can significantly improve transportation efficiency, reduce energy consumption, and traffic accidents. However, because of the vehicle and the RoadSide Units (RSU) use wireless channels for communication, the risk of information being leaked or tampered is highly increased. Therefore, secure and reliable authentication and key agreement protocol is the masterpiece of IoV security. As most of the existing authentication protocols pertain to a centralized structure and single Trusted Authority (TA) network model, all vehicles involved can only perform mutual authentication with one TA through the intermediate node RSU, and thus, the efficiency of these centralized authentication protocols is easily affected by TA's communication and computing resource bottlenecks. In this article, a blockchain-based authentication and key agreement protocol is designed for the multi-TA network model, moving the computing load of TA down to the RSU to improve the efficiency of authentication. In addition, blockchain technology is used for multiple TAs to manage the ledger that stores vehicle-related information, which results in vehicles that can easily achieve cross-TA authentication. Both formal and informal security analysis and simulation results from ProVerif show that the proposed protocol is secure. Comparisons with other existing work show that the proposed protocol has less computational overhead, higher authentication efficiency, and can resist various common attacks. (C) 2020 Elsevier Inc. All rights reserved.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available