4.6 Article

BSDCE-IoV: Blockchain-Based Secure Data Collection and Exchange Scheme for IoV in 5G Environment

Journal

IEEE ACCESS
Volume 11, Issue -, Pages 36158-36175

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/ACCESS.2023.3265959

Keywords

Authentication; Security; Blockchains; 5G mobile communication; Protocols; Cryptography; Servers; IoV; blockchain; security; authentication; V2V communication

Ask authors/readers for more resources

This article examines the benefits of using blockchain in a 5G-based Internet of Vehicles (IoV) environment. It proposes and evaluates a novel blockchain-based secure data exchange scheme, based on the Elliptic Curve Cryptography algorithm, that aims to eliminate potential attacks on the IoV environment. The scheme is validated for security and privacy using the Real-or-Random oracle model, Scyther tool, and MIRACL for assessing computational and communication overheads. BSDCE-IoV demonstrates better performance in terms of security, functionality, and time delay compared to recent work in IoV security.
The Internet of Vehicles (IoV) is a network that connects vehicles and their environment: in-built devices, pedestrians, and infrastructure through the Internet using heterogeneous access technologies. During communication between vehicles, roadside units, and control rooms, data confidentiality and privacy are critical issues that require effective measures. Several works have been proposed for securing IoV environments based on vehicles-to-infrastructure authentication; However, some schemes have security vulnerabilities, while others have shown efficiency issues. Due to its decentralization, stability, and transaction tracking capabilities, Blockchain as an emerging technology presents a potential solution for IoV security. This article provides an in-depth examination of the benefits of blockchain for a 5G-based IoV environment. In particular, we propose and evaluate a novel blockchain-based secure data exchange (BSDCE-IoV) scheme based on Elliptic Curve Cryptography algorithm. Our solution is designed to eliminate several potential attacks that pose a threat to the IoV environment. Deep examination using the Real-or-Random oracle model and Scyther tool, in addition to the informal security analysis, validates the scheme regarding security and privacy. The Multi-precision Integer and Rational Arithmetic Cryptographic Library (MIRACL) assesses the computational and communication overhead. Computational and communicative overheads were also evaluated using the Multi-precision Integer and Rational Arithmetic Cryptographic Library (MIRACL). BSDCE-IoV shows higher performance in terms of security, functionality, and time delay than a number of recent selective work in IoV security.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available