4.7 Article

Quantum-Defended Blockchain-Assisted Data Authentication Protocol for Internet of Vehicles

Journal

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
Volume 71, Issue 3, Pages 3255-3266

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TVT.2022.3144785

Keywords

Blockchains; Security; Privacy; Protocols; Vehicular ad hoc networks; Internet of Things; Authentication; Security; privacy; authentication; internet of vehicles; blockchain; lattice-based cryptography

Funding

  1. Taiwan Ministry of Science and Technology [MOST 110-2222-E-110-006]
  2. Indian Rajiv Gandhi Institute of Petroleum Technology [P-2106]

Ask authors/readers for more resources

This paper proposes a novel certificateless data authentication protocol for secure communication in the Internet of Vehicle (IoV) systems. The protocol utilizes lattice cryptography to resist quantum attack and employs a reliable blockchain mechanism for vehicles' trustworthiness in batch data verification. Rigorous formal analysis and performance analysis demonstrate the protocol's ability to ensure security and efficiency.
The so-called Internet of Vehicle (IoV) systems will interconnect numerous vehicles to communicate significant information through an Internet of Things (IoT) enabled network. It has emerged as a promising system wherein various data authentication techniques have been introduced using clumsy certificate management and Diffie-Hellman (DH) assumption. However, in the presence of quantum cryptanalysis, DH-type problems could be solved in polynomial-time. In this paper, a novel certificateless data authentication protocol is designed, enabling security features in open wireless communication in the IoV. The proposed protocol resists a quantum attack using lattice cryptography. Further, a reliable blockchain mechanism is shown to provide vehicles' trustworthiness in batch data verification. Rigorous formal analysis shows the ability of the proposed algorithm to resist existential unforgeability against the chosen-message attack. Nonetheless, the developed protocol supports other essential security functionalities, including unlikability, conditional-traceability, anti-replay, and data authenticity. Performance analysis exhibits the simulation orchestration and shows the way the proposed protocol outperforms other related techniques in energy consumption, data computation, communication, and cryptographic key storage overheads.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available