4.6 Article

A Blockchain-Based Authentication Protocol for Cooperative Vehicular Ad Hoc Network

期刊

SENSORS
卷 21, 期 4, 页码 -

出版社

MDPI
DOI: 10.3390/s21041273

关键词

Internet of Vehicles; Vehicular Ad hoc Network; blockchain; distributes storage; intelligent vehicles; Vehicular Social Networking; emergency vehicles; COVID-19

向作者/读者索取更多资源

Cooperative communication protocols are effective in enhancing the reliability and transmission range of VANET, but identity verification and communication security must be ensured. A blockchain-based secure authentication protocol is proposed for IoV to optimize system throughput, reduce PDR and delay, suitable for IoVs with limited resources.
The efficiency of cooperative communication protocols to increase the reliability and range of transmission for Vehicular Ad hoc Network (VANET) is proven, but identity verification and communication security are required to be ensured. Though it is difficult to maintain strong network connections between vehicles because of there high mobility, with the help of cooperative communication, it is possible to increase the communication efficiency, minimise delay, packet loss, and Packet Dropping Rate (PDR). However, cooperating with unknown or unauthorized vehicles could result in information theft, privacy leakage, vulnerable to different security attacks, etc. In this paper, a blockchain based secure and privacy preserving authentication protocol is proposed for the Internet of Vehicles (IoV). Blockchain is utilized to store and manage the authentication information in a distributed and decentralized environment and developed on the Ethereum platform that uses a digital signature algorithm to ensure confidentiality, non-repudiation, integrity, and preserving the privacy of the IoVs. For optimized communication, transmitted services are categorized into emergency and optional services. Similarly, to optimize the performance of the authentication process, IoVs are categorized as emergency and general IoVs. The proposed cooperative protocol is validated by numerical analyses which show that the protocol successfully increases the system throughput and decreases PDR and delay. On the other hand, the authentication protocol requires minimum storage as well as generates low computational overhead that is suitable for the IoVs with limited computer resources.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据