Computer Science ›› 2020, Vol. 47 ›› Issue (11): 55-59.doi: 10.11896/jsjkx.200500116

Special Issue: Intelligent Mobile Authentication

• Intelligent Mobile Authentication • Previous Articles     Next Articles

Conditional Privacy-preserving Authentication Scheme Based on Blockchain for Vehicular Ad Hoc Networks

XIONG Ling1,2, LI Fa-gen1, LIU Zhi-cai2   

  1. 1 School of Computer Science and Engineering(School of Cyberspace Security),University of Electronic Science and Technology of China,Chengdu 611731,China
    2 School of Computer and Software Engineering,Xihua University,Chengdu 610039,China
  • Received:2020-05-25 Revised:2020-08-15 Online:2020-11-15 Published:2020-11-05
  • About author:XIONG Ling,born in 1983,Ph.D,is a member of China Computer Federation.Her main research interests include authentication protocol and blockchain.
    LI Fa-gen,born in 1979,Ph.D,professor,Ph.D supervisor,is a member of IEEE.His main research interests include cryptography and network secu-rity.
  • Supported by:
    This work was supported by the China Postdoctoral Science Foundation (2019M663475) and Science and Technology Fund of Sichuan Province (2020JDRC0100).

Abstract: With the rapid development of network and information techniques,as an important part of automatic driving,the vehicular ad hoc networks are the core module of the future intelligent transportation system.As a result,the security and conditional privacy of the vehicular ad hoc networks (VANET) has become an urgent research hotspot.However,most of the current conditional privacy-preserving authentication schemes for VANET environment suffer from the problem of cross-datacenter authentication.To the best of our knowledge,blockchain technology has lots of advantages like decentralized and unforgeability bringing a promising solution to this problem compared with the traditional cryptography technologies.However,the current message authentication schemes based on blockchain technology for VANET environment cannot provide unlinkability.To address this issue,this paper designs a lightweight conditional privacy-preserving authentication scheme for VANET environment using physically unclonable function and blockchain technology,which can provide message authentication,integrity,identity privacy preserving,unlinkability and traceability.

Key words: Authentication, Blockchain, Conditional privacy, Physically unclonable function, Vehicular ad hoc networks

CLC Number: 

  • TP391
[1] HE D,ZEADALLY S,XU B,et al.An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks[J].IEEE Trans.Inf.Forensics Security,2015,10(12):2681-2691.
[2] LO N,TSAI J.An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks without pairings[J].IEEE Trans.Intell.Transp.Syst.,2016,17(5):1319-1328.
[3] ZHANG L,WU Q,DOMINGO J,et al.Distributed aggregateprivacy-preserving authentication in VANETs[J].IEEE Trans.Intell.Transp.Syst.,2017,18(3):516-526.
[4] YAO Y,CHANG X,MISIC J,et al.BLA:Blockchain-Assisted Lightweight Anonymous Authentication for Distributed Vehicular Fog Services[J].IEEE Internet of Things Journal,2019,6(2):3775-3784.
[5] LIU Z,XIONG L,PENG T,et al.A Realistic Distributed Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks[J].IEEE Access,2018,6:26307-26317.
[6] KANG J,YU R,HUANG X,et al.Blockchain for Secure andEfficient Data Sharing in Vehicular Edge Computing and Networks[J].IEEE Internet of Things Journal,2019,6(3):4660-4670.
[7] LI M,ZHU L,LIN X.Efficient and Privacy-Preserving Carpooling Using Blockchain-Assisted Vehicular Fog Computing[J].IEEE Internet of Things Journal,2019,6(3):4573-4584.
[8] WAZID M,BAGGA P,DAS A,et al.AKM-IoV:Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment[J].IEEE Internet of Things Journal,2019,6(5):8804-8817.
[9] WANG D,WANG P.Two Birds with One Stone:Two-FactorAuthentication with Security Beyond Conventional Bound[J].IEEE Trans.Dependable Secur.Comput.,2018,15(4):708-722.
[10] WANG D,WANG N,WANG P,et al.Preserving privacy forfree:Efficient and provably secure two-factor authentication scheme with user anonymity[J].Information Sciences,2015,321:162-178.
[11] ZHOU C,LU H,XIANG Y,et al.Survey on Application ofBlock chain in VANET[J].Computer Science,2020,47(2):213-220.
[12] KIAYIAS A,RUSSELL A,DAVID B,et al.Ouroboros:A provably secure proof-of-stake blockchain protocol[C]//Annual International Cryptology Conference.2017:357-388.
[13] AYSU A,GULCAN E,MORIYAMA D,et al.End-to-end Design of a PUF-based Privacy Preserving Authentication Protocol[C]//The annual Conference on Cryptographic Hardware and Embedded Systems.2015:556-576.
[14] DELVAUX J,GU D,VERBAUWHEDE I,et al.Efficient Fuzzy Extraction of PUF-Induced Secrets:Theory and Applications [C]//The annual Conference on Cryptographic Hardware and Embedded Systems.2016:412-431.
[15] GOPE P,LEE J,QUEK T.Lightweight and Practical Anony-mous Authentication Protocol for RFID Systems Using Physically Unclonable Functions[J].IEEE Trans.Information Forensics and Security,2018,3(11):2831-2843.
[16] GOPE P,SIKDAR B.Lightweight and Privacy-Preserving Two-Factor Authentication Scheme for IoT Devices[J].IEEE Internet of Things Journal,2019,6(1):580-589.
[1] WANG Zi-kai, ZHU Jian, ZHANG Bo-jun, HU Kai. Research and Implementation of Parallel Method in Blockchain and Smart Contract [J]. Computer Science, 2022, 49(9): 312-317.
[2] JIAN Qi-rui, CHEN Ze-mao, WU Xiao-kang. Authentication and Key Agreement Protocol for UAV Communication [J]. Computer Science, 2022, 49(8): 306-313.
[3] CHEN Yan-bing, ZHONG Chao-ran, ZHOU Chao-ran, XUE Ling-yan, HUANG Hai-ping. Design of Cross-domain Authentication Scheme Based on Medical Consortium Chain [J]. Computer Science, 2022, 49(6A): 537-543.
[4] LI Bo, XIANG Hai-yun, ZHANG Yu-xiang, LIAO Hao-de. Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios [J]. Computer Science, 2022, 49(6A): 723-728.
[5] FU Li-yu, LU Ge-hao, WU Yi-ming, LUO Ya-ling. Overview of Research and Development of Blockchain Technology [J]. Computer Science, 2022, 49(6A): 447-461.
[6] GAO Jian-bo, ZHANG Jia-shuo, LI Qing-shan, CHEN Zhong. RegLang:A Smart Contract Programming Language for Regulation [J]. Computer Science, 2022, 49(6A): 462-468.
[7] MAO Dian-hui, HUANG Hui-yu, ZHAO Shuang. Study on Automatic Synthetic News Detection Method Complying with Regulatory Compliance [J]. Computer Science, 2022, 49(6A): 523-530.
[8] ZHOU Hang, JIANG He, ZHAO Yan, XIE Xiang-peng. Study on Optimal Scheduling of Power Blockchain System for Consensus Transaction ofEach Unit [J]. Computer Science, 2022, 49(6A): 771-776.
[9] WANG Si-ming, TAN Bei-hai, YU Rong. Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence [J]. Computer Science, 2022, 49(6): 32-38.
[10] SUN Hao, MAO Han-yu, ZHANG Yan-feng, YU Ge, XU Shi-cheng, HE Guang-yu. Development and Application of Blockchain Cross-chain Technology [J]. Computer Science, 2022, 49(5): 287-295.
[11] YANG Zhen, HUANG Song, ZHENG Chang-you. Study on Crowdsourced Testing Intellectual Property Protection Technology Based on Blockchain and Improved CP-ABE [J]. Computer Science, 2022, 49(5): 325-332.
[12] REN Chang, ZHAO Hong, JIANG Hua. Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism [J]. Computer Science, 2022, 49(5): 333-340.
[13] FENG Liao-liao, DING Yan, LIU Kun-lin, MA Ke-lin, CHANG Jun-sheng. Research Advance on BFT Consensus Algorithms [J]. Computer Science, 2022, 49(4): 329-339.
[14] SONG Tao, LI Xiu-hua, LI Hui, WEN Jun-hao, XIONG Qing-yu, CHEN Jie. Overview of Research on Security Encryption Authentication Technology of IoV in Big Data Era [J]. Computer Science, 2022, 49(4): 340-353.
[15] YANG Xin-yu, PENG Chang-gen, YANG Hui, DING Hong-fa. Rational PBFT Consensus Algorithm with Evolutionary Game [J]. Computer Science, 2022, 49(3): 360-370.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!