[HTML][HTML] Baiv: An efficient blockchain-based anonymous authentication and Integrity Preservation Scheme for secure communication in VANETs

A Maria, AS Rajasekaran, F Al-Turjman, C Altrjman… - Electronics, 2022 - mdpi.com
Electronics, 2022mdpi.com
Recent development in intelligent transport systems (ITS) has led to the improvement of
driving experience in vehicular ad-hoc network (VANET) systems. Providing a low
computational cost with high serving capability, however, is a critical phenomenon in the
current VANET system. In the existing scenario, when the authenticated vehicle user moves
from one roadside unit (RSU) to another RSU region, re-authentication of the vehicle user is
required by the current RSU, which increases the computational complexity. To overcome …
Recent development in intelligent transport systems (ITS) has led to the improvement of driving experience in vehicular ad-hoc network (VANET) systems. Providing a low computational cost with high serving capability, however, is a critical phenomenon in the current VANET system. In the existing scenario, when the authenticated vehicle user moves from one roadside unit (RSU) to another RSU region, re-authentication of the vehicle user is required by the current RSU, which increases the computational complexity. To overcome the above-mentioned challenge, a blockchain-based authentication protocol is developed in this work. In this suggested process, blockchain is integrated with VANET, which enables the authentication of the vehicle user without the involvement of a trusted authority. Moreover, the integrity of the message and privacy of vehicle users are preserved in the blockchain network. Even though many blockchain-based schemes have been proposed recently, the existing schemes were not focused on conditional anonymity. However, in our proposed scheme, conditional privacy is introduced to revoke the malicious vehicles in the case of disputes and to avoid further damage to the VANET system. As a result, the proposed scheme provides an efficient mechanism for anonymous authentication, privacy, and integrity preservation with conditional tracking. Finally, the defense against different security threats is explained in the security analysis section, and the performance investigation section shows the competence and efficacy of our method with similar related methods.
MDPI
以上显示的是最相近的搜索结果。 查看全部搜索结果