B-TSCA: Blockchain Assisted Trustworthiness Scalable Computation for V2I Authentication in VANETs
Autor: | Jian Shen, Jianwei Liu, Jin-Feng Lai, Chen Wang |
---|---|
Rok vydání: | 2021 |
Předmět: |
Scheme (programming language)
Security analysis Authentication Computer science business.industry Reliability (computer networking) 020206 networking & telecommunications 0102 computer and information sciences 02 engineering and technology 01 natural sciences Computer Science Applications Human-Computer Interaction Handover Secure communication 010201 computation theory & mathematics Scalability 0202 electrical engineering electronic engineering information engineering Computer Science (miscellaneous) business computer 5G Information Systems computer.programming_language Computer network |
Zdroj: | IEEE Transactions on Emerging Topics in Computing. 9:1386-1396 |
ISSN: | 2376-4562 |
DOI: | 10.1109/tetc.2020.2978866 |
Popis: | The rapid development of 5G networks has made smart driving possible. The vehicular ad-hoc networks (VANETs) are the main environment for smart driving, providing road information, instant communication between vehicle and vehicle (V2V) or vehicle and infrastructure (V2I). The information interaction security of VANETs is critical to the proper functioning of the traffic. Much research in recent years has focused on secure communication in VANETs, especially the secure V2V or V2I communications. However, current security schemes often require complex identity re-authentication when vehicles enter a new infrastructure coverage, which greatly reduces the efficiency of the entire network. In addition, the emergence of blockchain has created opportunities to overcome the challenges in VANETs mentioned above. In this article, blockchain is utilized to enhance the scalability of the trustworthiness scalable computation. The proposed blockchain assisted trustworthiness scalable computation based V2I authentication (B-TSCA) scheme achieves rapid re-authentication of vehicles through secure ownership transfer between infrastructures. Note that, trustworthiness scalable computation assisted by blockchian technology ensures the decentralization and non tamperability of the scalable computation result. The security analysis indicates that B-TSCA scheme is a CDH-secure scheme. The time cost of the novel handover authentication phase is half of that of the initial one as is presented in the simulation. |
Databáze: | OpenAIRE |
Externí odkaz: |