4.6 Article

A Hierarchical Blockchain-Assisted Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks

Journal

SENSORS
Volume 22, Issue 6, Pages -

Publisher

MDPI
DOI: 10.3390/s22062299

Keywords

privacy-preserving; hierarchical; authentication; blockchain

Funding

  1. National Science Foundation of China [62171387]
  2. China Postdoctoral Science Foundation [2019M663475]
  3. Spring Plan of the Ministry of Education of China in 2018 [191629]
  4. Science and Technology Fund of Sichuan Province [2020JDRC0100]
  5. Xihua Cup Innovation and Entrepreneurship Fundation [2021054]
  6. Key Projects of Xihua University [Z202005]

Ask authors/readers for more resources

In this paper, a novel hierarchical blockchain-assisted authentication scheme is proposed, achieving unlinkability through a dynamic key derivation algorithm. The scheme reduces processing delay, queuing delay, and deployment costs through hierarchical Vehicle Fog Computing. Cross-region authentication is achieved by leveraging the properties of blockchain. Security analysis and simulations demonstrate the scheme's effectiveness and superiority over earlier methods.
Through information sharing, vehicles can know the surrounding road condition information timely in Vehicular Adhoc Networks. To ensure the validity of these messages and the security of vehicles, the message authentication, privacy-preserving, and delay problems are three important issues. Although many conditional privacy-preserving authentication schemes have been proposed to ensure secure communication, there still exist some imperfections such as frequent interactions or unlinkability. From this, our paper proposes a novel hierarchical blockchain-assisted authentication scheme to solve these existing issues comprehensively. First, unlinkability is achieved by a dynamic key derivation algorithm. Second, the proposed scheme can reduce correlation processing delay, queuing delay, and deployment costs by adopting hierarchical Vehicle Fog Computing. Third, cross-region authentication is achieved by taking advantage of the properties of blockchain. In addition, we demonstrate our scheme can fulfill the security criteria of the Vehicular Adhoc Network by security analysis. Furthermore, the simulations are carried out to show its availability by using JAVA and NS-3. The findings reveal that the suggested method outperforms earlier schemes in terms of computation cost and communication cost. All in all, making the authentication scheme more efficient and concise is the focus of our future research.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available