期刊论文详细信息
Sensors
A Blockchain-Based Authentication Protocol for Cooperative Vehicular Ad Hoc Network
Adnan Anwar1  A.F. M. Suaib Akhter2  Ahmet Zengin2  A.S. M. Kayes3  A.F. M. Shahen Shah4  Mohiuddin Ahmed5 
[1] Centre for Cyber Security Research and Innovation (CSRI), School of IT, Deakin University, Waurn Ponds, VIC 3216, Australia;Department of Computer Engineering, Sakarya University, Serdivan 54050, Sakarya, Turkey;Department of Computer Science and Information Technology, School of Engineering and Mathematical Sciences (SEMS), La Trobe University, Bundoora, VIC 3086, Australia;Department of Electrical and Electronics Engineering, Istanbul Gelisim University, Avcilar 34315, Istanbul, Turkey;School of Science, Edith Cowan University, Perth, WA 6027, Australia;
关键词: Internet of Vehicles;    Vehicular Ad hoc Network;    blockchain;    distributes storage;    intelligent vehicles;    Vehicular Social Networking;   
DOI  :  10.3390/s21041273
来源: DOAJ
【 摘 要 】

The efficiency of cooperative communication protocols to increase the reliability and range of transmission for Vehicular Ad hoc Network (VANET) is proven, but identity verification and communication security are required to be ensured. Though it is difficult to maintain strong network connections between vehicles because of there high mobility, with the help of cooperative communication, it is possible to increase the communication efficiency, minimise delay, packet loss, and Packet Dropping Rate (PDR). However, cooperating with unknown or unauthorized vehicles could result in information theft, privacy leakage, vulnerable to different security attacks, etc. In this paper, a blockchain based secure and privacy preserving authentication protocol is proposed for the Internet of Vehicles (IoV). Blockchain is utilized to store and manage the authentication information in a distributed and decentralized environment and developed on the Ethereum platform that uses a digital signature algorithm to ensure confidentiality, non-repudiation, integrity, and preserving the privacy of the IoVs. For optimized communication, transmitted services are categorized into emergency and optional services. Similarly, to optimize the performance of the authentication process, IoVs are categorized as emergency and general IoVs. The proposed cooperative protocol is validated by numerical analyses which show that the protocol successfully increases the system throughput and decreases PDR and delay. On the other hand, the authentication protocol requires minimum storage as well as generates low computational overhead that is suitable for the IoVs with limited computer resources.

【 授权许可】

Unknown   

  文献评价指标  
  下载次数:0次 浏览次数:0次