BEPHAP: A Blockchain-based Efficient Privacy-Preserving Handover Authentication Protocol with key agreement for Internet of Vehicles

نویسندگان

چکیده

The Internet of Vehicles (IoV) can significantly improve transportation efficiency and ensure traffic safety. Authentication is regarded as the fundamental defense line against attacks in IoV. However, state-of-the-art approaches suffer from several drawbacks, including bottlenecks single cloud server model, high computational overhead operations, excessive trust servers roadside units (RSUs), leakage vehicle trajectory privacy. This paper introduces BEPHAP, a Blockchain-based Efficient Privacy-preserving Handover Protocol with key agreement for internet vehicles, to address these problems. BEPHAP achieves anonymous cross-domain mutual handover authentication based on tamper-proof blockchain, symmetric cryptography, chameleon hash function under security model that RSUs may launch attacks. particularly well suited IoV since it allows vehicles only perform lightweight cryptographic operations during authentication. also data confidentiality, unlinkability, traceability, non-repudiation, non-frameability, escrow freeness. Formal verification ProVerif formal proofs BAN logic indicates resistant various typical attacks, such man-in-the-middle impersonation replay Performance analysis demonstrates surpasses existing works both computation communication efficiencies. It worth noting reduces cost by 2 4 orders magnitude compared current schemes. And message loss rate remains 0 at 5000 requests per second, which meets requirement

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Efficient privacy-preserving authentication protocol for vehicular communications with trustworthy

In this paper, we introduce an efficient and trustworthy conditional privacy-preserving communication protocol for VANETs based on proxy re-signature. The proposed protocol is characterized by the Trusted Authority (TA) designating the Roadside Units (RSUs) to translate signatures computed by the On-Board Units (OBUs) into one that are valid with respect to TA’s public key. In addition, the pro...

متن کامل

Efficient User Authentication and Key Agreement with User Privacy Protection

Using smart cards, remote user authentication and key agreement can be simplified, flexible, and efficient for creating a secure distributed computers environment. Addition to user authentication and key distribution, it is very useful for providing identity privacy for users. In this paper, we propose novel user authentication and key agreement schemes with privacy protection. We first propose...

متن کامل

An Efficient ECC-based Authentication and Key Agreement Protocol

Public-key cryptography is commonly used to authenticate communicating entities in some networks. One of the key tools in this way is to use the elliptic curves cryptography (ECC) which is relatively lightweight due to its shorter key size compared to the conventional River-Shamir-Adleman (RSA) method. This paper is proposing an efficient protocol by analysing two variants of ECC-based wireless...

متن کامل

Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC

Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...

متن کامل

A New Privacy-Preserving Handover Authentication Scheme for Wireless Networks

Handover authentication is a critical issue in wireless networks, which is being used to ensure mobile nodes wander over multiple access points securely and seamlessly. A variety of handover authentication schemes for wireless networks have been proposed in the literature. Unfortunately, existing handover authentication schemes are vulnerable to a few security attacks, or incur high communicati...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Systems Architecture

سال: 2023

ISSN: ['1383-7621', '1873-6165']

DOI: https://doi.org/10.1016/j.sysarc.2023.102869