计算机科学 ›› 2020, Vol. 47 ›› Issue (11): 55-59.doi: 10.11896/jsjkx.200500116

所属专题: 智能移动身份认证

• 智能移动身份认证 • 上一篇    下一篇

车联网环境下基于区块链技术的条件隐私消息认证方案

熊玲1,2, 李发根1, 刘志才2   

  1. 1 电子科技大学计算机科学与工程学院(网络空间安全学院) 成都 611731
    2 西华大学计算机与软件工程学院 成都 610039
  • 收稿日期:2020-05-25 修回日期:2020-08-15 出版日期:2020-11-15 发布日期:2020-11-05
  • 通讯作者: 李发根(fagenli@uestc.edu.cn)
  • 作者简介:xiongling.swjtu@aliyun.com
  • 基金资助:
    中国博士后面上基金(2019M663475);四川省科技厅项目(2020JDRC0100)

Conditional Privacy-preserving Authentication Scheme Based on Blockchain for Vehicular Ad Hoc Networks

XIONG Ling1,2, LI Fa-gen1, LIU Zhi-cai2   

  1. 1 School of Computer Science and Engineering(School of Cyberspace Security),University of Electronic Science and Technology of China,Chengdu 611731,China
    2 School of Computer and Software Engineering,Xihua University,Chengdu 610039,China
  • Received:2020-05-25 Revised:2020-08-15 Online:2020-11-15 Published:2020-11-05
  • About author:XIONG Ling,born in 1983,Ph.D,is a member of China Computer Federation.Her main research interests include authentication protocol and blockchain.
    LI Fa-gen,born in 1979,Ph.D,professor,Ph.D supervisor,is a member of IEEE.His main research interests include cryptography and network secu-rity.
  • Supported by:
    This work was supported by the China Postdoctoral Science Foundation (2019M663475) and Science and Technology Fund of Sichuan Province (2020JDRC0100).

摘要: 随着网络与信息技术的飞速发展,车联网作为实现自动驾驶乃至无人驾驶的重要组成部分,是未来智能交通系统的核心模块。因此,车联网环境中的安全和条件隐私问题成为亟待解决的研究热点问题。然而,当前车联网环境中的大多数条件隐私消息认证方案不能很好地解决数据跨域通信问题。区块链技术的去中心化和不可伪造性等优良特性为车联网环境中的跨域通信问题提供了一个可行的解决方案,但是目前车联网环境中基于区块链技术的消息认证方案还存在不可链接性问题。为了解决这一问题,文中基于物理不可克隆函数和区块链技术设计了一个适用于车联网环境的具有条件隐私的轻量级消息认证方案。该方案能够提供消息认证、消息完整性、匿名、不可链接性以及可追踪性等安全属性。

关键词: 车联网, 区块链, 认证, 条件隐私, 物理不可克隆函数

Abstract: With the rapid development of network and information techniques,as an important part of automatic driving,the vehicular ad hoc networks are the core module of the future intelligent transportation system.As a result,the security and conditional privacy of the vehicular ad hoc networks (VANET) has become an urgent research hotspot.However,most of the current conditional privacy-preserving authentication schemes for VANET environment suffer from the problem of cross-datacenter authentication.To the best of our knowledge,blockchain technology has lots of advantages like decentralized and unforgeability bringing a promising solution to this problem compared with the traditional cryptography technologies.However,the current message authentication schemes based on blockchain technology for VANET environment cannot provide unlinkability.To address this issue,this paper designs a lightweight conditional privacy-preserving authentication scheme for VANET environment using physically unclonable function and blockchain technology,which can provide message authentication,integrity,identity privacy preserving,unlinkability and traceability.

Key words: Authentication, Blockchain, Conditional privacy, Physically unclonable function, Vehicular ad hoc networks

中图分类号: 

  • TP391
[1] HE D,ZEADALLY S,XU B,et al.An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks[J].IEEE Trans.Inf.Forensics Security,2015,10(12):2681-2691.
[2] LO N,TSAI J.An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks without pairings[J].IEEE Trans.Intell.Transp.Syst.,2016,17(5):1319-1328.
[3] ZHANG L,WU Q,DOMINGO J,et al.Distributed aggregateprivacy-preserving authentication in VANETs[J].IEEE Trans.Intell.Transp.Syst.,2017,18(3):516-526.
[4] YAO Y,CHANG X,MISIC J,et al.BLA:Blockchain-Assisted Lightweight Anonymous Authentication for Distributed Vehicular Fog Services[J].IEEE Internet of Things Journal,2019,6(2):3775-3784.
[5] LIU Z,XIONG L,PENG T,et al.A Realistic Distributed Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks[J].IEEE Access,2018,6:26307-26317.
[6] KANG J,YU R,HUANG X,et al.Blockchain for Secure andEfficient Data Sharing in Vehicular Edge Computing and Networks[J].IEEE Internet of Things Journal,2019,6(3):4660-4670.
[7] LI M,ZHU L,LIN X.Efficient and Privacy-Preserving Carpooling Using Blockchain-Assisted Vehicular Fog Computing[J].IEEE Internet of Things Journal,2019,6(3):4573-4584.
[8] WAZID M,BAGGA P,DAS A,et al.AKM-IoV:Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment[J].IEEE Internet of Things Journal,2019,6(5):8804-8817.
[9] WANG D,WANG P.Two Birds with One Stone:Two-FactorAuthentication with Security Beyond Conventional Bound[J].IEEE Trans.Dependable Secur.Comput.,2018,15(4):708-722.
[10] WANG D,WANG N,WANG P,et al.Preserving privacy forfree:Efficient and provably secure two-factor authentication scheme with user anonymity[J].Information Sciences,2015,321:162-178.
[11] ZHOU C,LU H,XIANG Y,et al.Survey on Application ofBlock chain in VANET[J].Computer Science,2020,47(2):213-220.
[12] KIAYIAS A,RUSSELL A,DAVID B,et al.Ouroboros:A provably secure proof-of-stake blockchain protocol[C]//Annual International Cryptology Conference.2017:357-388.
[13] AYSU A,GULCAN E,MORIYAMA D,et al.End-to-end Design of a PUF-based Privacy Preserving Authentication Protocol[C]//The annual Conference on Cryptographic Hardware and Embedded Systems.2015:556-576.
[14] DELVAUX J,GU D,VERBAUWHEDE I,et al.Efficient Fuzzy Extraction of PUF-Induced Secrets:Theory and Applications [C]//The annual Conference on Cryptographic Hardware and Embedded Systems.2016:412-431.
[15] GOPE P,LEE J,QUEK T.Lightweight and Practical Anony-mous Authentication Protocol for RFID Systems Using Physically Unclonable Functions[J].IEEE Trans.Information Forensics and Security,2018,3(11):2831-2843.
[16] GOPE P,SIKDAR B.Lightweight and Privacy-Preserving Two-Factor Authentication Scheme for IoT Devices[J].IEEE Internet of Things Journal,2019,6(1):580-589.
[1] 王子凯, 朱健, 张伯钧, 胡凯.
区块链与智能合约并行方法研究与实现
Research and Implementation of Parallel Method in Blockchain and Smart Contract
计算机科学, 2022, 49(9): 312-317. https://doi.org/10.11896/jsjkx.210800102
[2] 蹇奇芮, 陈泽茂, 武晓康.
面向无人机通信的认证和密钥协商协议
Authentication and Key Agreement Protocol for UAV Communication
计算机科学, 2022, 49(8): 306-313. https://doi.org/10.11896/jsjkx.220200098
[3] 陈晶, 吴玲玲.
多源异构环境下的车联网大数据混合属性特征检测方法
Mixed Attribute Feature Detection Method of Internet of Vehicles Big Datain Multi-source Heterogeneous Environment
计算机科学, 2022, 49(8): 108-112. https://doi.org/10.11896/jsjkx.220300273
[4] 傅丽玉, 陆歌皓, 吴义明, 罗娅玲.
区块链技术的研究及其发展综述
Overview of Research and Development of Blockchain Technology
计算机科学, 2022, 49(6A): 447-461. https://doi.org/10.11896/jsjkx.210600214
[5] 高健博, 张家硕, 李青山, 陈钟.
RegLang:一种面向监管的智能合约编程语言
RegLang:A Smart Contract Programming Language for Regulation
计算机科学, 2022, 49(6A): 462-468. https://doi.org/10.11896/jsjkx.210700016
[6] 毛典辉, 黄晖煜, 赵爽.
符合监管合规性的自动合成新闻检测方法研究
Study on Automatic Synthetic News Detection Method Complying with Regulatory Compliance
计算机科学, 2022, 49(6A): 523-530. https://doi.org/10.11896/jsjkx.210300083
[7] 陈彦冰, 钟超然, 周超然, 薛凌妍, 黄海平.
基于医疗联盟链的跨域认证方案设计
Design of Cross-domain Authentication Scheme Based on Medical Consortium Chain
计算机科学, 2022, 49(6A): 537-543. https://doi.org/10.11896/jsjkx.220200139
[8] 李博, 向海昀, 张宇翔, 廖浩德.
面向食品溯源场景的PBFT优化算法应用研究
Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios
计算机科学, 2022, 49(6A): 723-728. https://doi.org/10.11896/jsjkx.210800018
[9] 周航, 姜河, 赵琰, 解相朋.
适用于各单元共识交易的电力区块链系统优化调度研究
Study on Optimal Scheduling of Power Blockchain System for Consensus Transaction ofEach Unit
计算机科学, 2022, 49(6A): 771-776. https://doi.org/10.11896/jsjkx.210600241
[10] 王思明, 谭北海, 余荣.
面向6G可信可靠智能的区块链分片与激励机制
Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence
计算机科学, 2022, 49(6): 32-38. https://doi.org/10.11896/jsjkx.220400004
[11] 孙浩, 毛瀚宇, 张岩峰, 于戈, 徐石成, 何光宇.
区块链跨链技术发展及应用
Development and Application of Blockchain Cross-chain Technology
计算机科学, 2022, 49(5): 287-295. https://doi.org/10.11896/jsjkx.210800132
[12] 阳真, 黄松, 郑长友.
基于区块链与改进CP-ABE的众测知识产权保护技术研究
Study on Crowdsourced Testing Intellectual Property Protection Technology Based on Blockchain and Improved CP-ABE
计算机科学, 2022, 49(5): 325-332. https://doi.org/10.11896/jsjkx.210900075
[13] 任畅, 赵洪, 蒋华.
一种量子安全拜占庭容错共识机制
Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism
计算机科学, 2022, 49(5): 333-340. https://doi.org/10.11896/jsjkx.210400154
[14] 冯了了, 丁滟, 刘坤林, 马科林, 常俊胜.
区块链BFT共识算法研究进展
Research Advance on BFT Consensus Algorithms
计算机科学, 2022, 49(4): 329-339. https://doi.org/10.11896/jsjkx.210700011
[15] 宋涛, 李秀华, 李辉, 文俊浩, 熊庆宇, 陈杰.
大数据时代下车联网安全加密认证技术研究综述
Overview of Research on Security Encryption Authentication Technology of IoV in Big Data Era
计算机科学, 2022, 49(4): 340-353. https://doi.org/10.11896/jsjkx.210400112
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!