Journal of Computer Applications ›› 2024, Vol. 44 ›› Issue (1): 252-260.DOI: 10.11772/j.issn.1001-9081.2023010068
Special Issue: 网络空间安全
• Cyber security • Previous Articles Next Articles
Received:
2023-01-03
Revised:
2023-05-16
Accepted:
2023-05-16
Online:
2023-06-06
Published:
2024-01-10
Contact:
Guofang DONG
About author:
NING Juangui, born in 1997, M. S. candidate. Her research interests include secure authentication protocol, privacy protection.
Supported by:
通讯作者:
董国芳
作者简介:
宁娟桂(1997—),女,广西钦州人,硕士研究生,主要研究方向:安全认证协议、隐私保护;基金资助:
CLC Number:
Juangui NING, Guofang DONG. Blockchain-based vehicle-to-infrastructure fast handover authentication scheme in VANET[J]. Journal of Computer Applications, 2024, 44(1): 252-260.
宁娟桂, 董国芳. 基于区块链的车载自组网车与基础设施快速切换认证方案[J]. 《计算机应用》唯一官方网站, 2024, 44(1): 252-260.
Add to citation manager EndNote|Ris|BibTeX
URL: https://www.joca.cn/EN/10.11772/j.issn.1001-9081.2023010068
参数 | 含义 | 参数 | 含义 |
---|---|---|---|
乘法循环群 | |||
TA的私钥 | |||
TA的公钥 | |||
第 | |||
第 | |||
Tab. 1 Parameters and their definitions
参数 | 含义 | 参数 | 含义 |
---|---|---|---|
乘法循环群 | |||
TA的私钥 | |||
TA的公钥 | |||
第 | |||
第 | |||
密码学运算 | 含义 | 平均执行时间 |
---|---|---|
双线性配对运算 | 10.309 2 | |
基于双线性配对的Map To Point哈希运算 | 3.581 9 | |
基于双线性配对的乘法运算 | 1.420 2 | |
基于双线性配对的点加运算 | 0.017 2 | |
取幂运算 | 1.624 1 | |
哈希运算 | 0.001 0 |
Tab. 2 Average execution time of cryptographic operations
密码学运算 | 含义 | 平均执行时间 |
---|---|---|
双线性配对运算 | 10.309 2 | |
基于双线性配对的Map To Point哈希运算 | 3.581 9 | |
基于双线性配对的乘法运算 | 1.420 2 | |
基于双线性配对的点加运算 | 0.017 2 | |
取幂运算 | 1.624 1 | |
哈希运算 | 0.001 0 |
认证方案 | 生成签名 | 单一认证 | 批量认证 |
---|---|---|---|
匿名批量认证方案 | |||
全聚合认证方案 | |||
无证书聚合签名方案 | |||
基于区块链认证方案 | |||
本文方案 |
Tab. 3 Theoretic computation costs of various schemes in authentication phase
认证方案 | 生成签名 | 单一认证 | 批量认证 |
---|---|---|---|
匿名批量认证方案 | |||
全聚合认证方案 | |||
无证书聚合签名方案 | |||
基于区块链认证方案 | |||
本文方案 |
认证方案 | 通信开销 |
---|---|
匿名批量认证方案 | |
全聚合认证方案 | |
无证书聚合签名方案 | |
基于区块链认证方案 | |
本文方案 |
Tab. 4 Communication costs of various schemes in authentication phase
认证方案 | 通信开销 |
---|---|
匿名批量认证方案 | |
全聚合认证方案 | |
无证书聚合签名方案 | |
基于区块链认证方案 | |
本文方案 |
1 | FENG Q, HE D, ZEADALLY S, et al. BPAS: blockchain-assisted privacy-preserving authentication system for vehicular Ad Hoc networks [J]. IEEE Transactions on Industrial Informatics, 2020, 16(6): 4146-4155. 10.1109/tii.2019.2948053 |
2 | LIN C, HE D, HUANG X, et al. BCPPA: a blockchain-based conditional privacy-preserving authentication protocol for vehicular ad hoc networks [J]. IEEE Transactions on Intelligent Transportation Systems, 2021, 22(12): 7408-7420. 10.1109/tits.2020.3002096 |
3 | 张海波,陈舟,黄宏武,等. VANET系统中基于中国剩余定理的群内相互认证密钥协商协议[J].通信学报, 2022, 43(1): 182-193. 10.11959/j.issn.1000-436x.2022002 |
ZHANG H B, CHEN Z, HUANG H W, et al. Intra-group mutual authentication key agreement protocol based on Chinese remainder theorem in VANET system [J]. Journal on Communications, 2022, 43(1): 182-193. 10.11959/j.issn.1000-436x.2022002 | |
4 | WANG C, SHEN J, LAI J F, et al. B-TSCA: blockchain assisted trustworthiness scalable computation for V2I authentication in VANETs [J]. IEEE Transactions on Emerging Topics in Computing, 2021, 9(3): 1386-1396. 10.1109/tetc.2020.2978866 |
5 | CUI J, XU W, HAN Y, et al. Secure mutual authentication with privacy preservation in vehicular ad hoc networks [J]. Vehicular Communications, 2020, 21: No.100200. 10.1016/j.vehcom.2019.100200 |
6 | YANG A, WENG J, YANG K, et al. Delegating authentication to edge: a decentralized authentication architecture for vehicular networks [J]. IEEE Transactions on Intelligent Transportation Systems, 2022, 23(2): 1284-1298. 10.1109/tits.2020.3024000 |
7 | RAYA M, HUBAUX J P. Securing vehicular ad hoc networks [J]. Journal of Computer Security, 2007, 15(1): 39-68. 10.3233/jcs-2007-15103 |
8 | WASEF A, JIANG Y, SHEN X. ECMV: efficient certificate management scheme for vehicular networks [C]// Proceedings of the 2008 IEEE Global Telecommunications Conference. Piscataway: IEEE, 2008: 1-5. 10.1109/glocom.2008.ecp.129 |
9 | SUN Y, LU R, LIN X, et al. An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications [J]. IEEE Transactions on Vehicular Technology, 2010, 59(7): 3589-3603. 10.1109/tvt.2010.2051468 |
10 | JIANG S, ZHU X, WANG L. An efficient anonymous batch authentication scheme based on HMAC for VANETs [J]. IEEE Transactions on Intelligent Transportation Systems, 2016, 17(8): 2193-2204. 10.1109/tits.2016.2517603 |
11 | LI J, LU H, GUIZANI M. ACPN: a novel authentication framework with conditional privacy-preservation and non-repudiation for VANETs [J]. IEEE Transactions on Parallel and Distributed Systems, 2015, 26(4): 938-948. 10.1109/tpds.2014.2308215 |
12 | 刘辉,李晖,马占欣.一个安全高效的车载网认证方案[J].西南交通大学学报, 2011, 46(2): 315-320. 10.3969/j.issn.0258-2724.2011.02.023 |
LIU H, LI H, MA Z X. Efficient and secure authentication scheme for vehicular ad hoc networks [J]. Journal of Southwest Jiaotong University, 2011, 46(2): 315-320. 10.3969/j.issn.0258-2724.2011.02.023 | |
13 | OGUNDOYIN S O, KAMIL I A. An efficient authentication scheme with strong privacy preservation for fog-assisted vehicular ad hoc networks based on blockchain and neuro-fuzzy [J]. Vehicular Communications, 2021, 31: No.100384. 10.1016/j.vehcom.2021.100384 |
14 | ZHANG J, ZHONG H, CUI J, et al. Edge computing-based privacy-preserving authentication framework and protocol for 5G-enabled vehicular networks [J]. IEEE Transactions on Vehicular Technology, 2020, 69(7): 7940-7954. 10.1109/tvt.2020.2994144 |
15 | KAMIL I A, OGUNDOYIN S O. On the security of privacy-preserving authentication scheme with full aggregation in vehicular ad hoc network [J]. Security and Privacy, 2020, 3(3): No.e104. 10.1002/spy2.104 |
16 | XU Z, HE D, KUMAR N, et al. Efficient certificateless aggregate signature scheme for performing secure routing in VANETs [J]. Security and Communication Networks, 2020, 2020: No.5276813. 10.1155/2020/5276813 |
17 | CUI J, ZHANG X, ZHONG H, et al. RSMA: reputation system-based lightweight message authentication framework and protocol for 5G-enabled vehicular networks [J]. IEEE Internet of Things Journal, 2019, 6(4): 6417-6428. 10.1109/jiot.2019.2895136 |
18 | HE D, CHAN S, GUIZANI M. Handover authentication for mobile networks: security and efficiency aspects [J]. IEEE Network, 2015, 29(3): 96-103. 10.1109/mnet.2015.7113232 |
19 | XIE Y, WU L, KUMAR N, et al. Analysis and improvement of a privacy-aware handover authentication scheme for wireless network [J]. Wireless Personal Communications, 2017, 93(2): 523-541. 10.1007/s11277-016-3352-3 |
20 | HE D, ZEADALLY S, WU L, et al. Analysis of handover authentication protocols for mobile wireless networks using identity-based public key cryptography [J]. Computer Networks, 2017, 128: 154-163. 10.1016/j.comnet.2016.12.013 |
21 | TAN H, CHUNG I. Secure authentication and key management with blockchain in VANETs [J]. IEEE Access, 2020, 8: 2482-2498. 10.1109/access.2019.2962387 |
22 | NAKAMOTO S. Bitcoin: a peer-to-peer electronic cash system [EB/OL]. [2022-11-12]. . 10.2139/ssrn.3977007 |
23 | LIU H, ZHANG P, PU G, et al. Blockchain empowered cooperative authentication with data traceability in vehicular edge computing [J]. IEEE Transactions on Vehicular Technology, 2020, 69(4): 4221-4232. 10.1109/tvt.2020.2969722 |
24 | 陈葳葳,曹利,邵长虹.基于区块链技术的车联网高效匿名认证方案[J].计算机应用, 2020, 40(10): 2992-2999. 10.11772/j.issn.1001-9081.2020020211 |
CHEN W W, CAO L, SHAO C H. Blockchain based efficient anonymous authentication scheme for IOV [J]. Journal of Computer Applications, 2020, 40(10): 2992-2999. 10.11772/j.issn.1001-9081.2020020211 | |
25 | 张利华,付东辉,万源华.基于区块链的车联网汽车身份认证方案[J].现代电子技术, 2021, 44(8): 77-80. |
ZHANG L H, FU D H, WAN Y H. Blockchain-based Internet of Vehicles authentication scheme [J]. Modern Electronics Technique, 2021, 44(8): 77-80. | |
26 | 冯霞,崔凯平,谢晴晴,等. VANET中基于区块链的分布式匿名认证方案[J].通信学报, 2022, 43(9): 134-147. |
FENG X, CUI K P, XIE Q Q, et al. Distributed anonymous authentication scheme based on the blockchain in VANET [J]. Journal on Communications, 2022, 43(9): 134-147. |
[1] | Tingwei CHEN, Jiacheng ZHANG, Junlu WANG. Random validation blockchain construction for federated learning [J]. Journal of Computer Applications, 2024, 44(9): 2770-2776. |
[2] | Xiaoling SUN, Danhui WANG, Shanshan LI. Dynamic ciphertext sorting and retrieval scheme based on blockchain [J]. Journal of Computer Applications, 2024, 44(8): 2500-2505. |
[3] | He HUANG, Yu JIN. Cloud data auditing scheme based on voting and Ethereum smart contracts [J]. Journal of Computer Applications, 2024, 44(7): 2093-2101. |
[4] | Baoyan SONG, Junxiang DING, Junlu WANG, Haolin ZHANG. Consortium blockchain modification method based on chameleon hash and verifiable secret sharing [J]. Journal of Computer Applications, 2024, 44(7): 2087-2092. |
[5] | Jiao LI, Xiushan ZHANG, Yuanhang NING. Blockchain sharding method for reducing cross-shard transaction proportion [J]. Journal of Computer Applications, 2024, 44(6): 1889-1896. |
[6] | Meihong CHEN, Lingyun YUAN, Tong XIA. Data classified and graded access control model based on master-slave multi-chain [J]. Journal of Computer Applications, 2024, 44(4): 1148-1157. |
[7] | Lipeng ZHAO, Bing GUO. Blockchain consensus improvement algorithm based on BDLS [J]. Journal of Computer Applications, 2024, 44(4): 1139-1147. |
[8] | Gaimei GAO, Jin ZHANG, Chunxia LIU, Weichao DANG, Shangwang BAI. Privacy protection scheme for crowdsourced testing tasks based on blockchain and CP-ABE policy hiding [J]. Journal of Computer Applications, 2024, 44(3): 811-818. |
[9] | Haifeng MA, Yuxia LI, Qingshui XUE, Jiahai YANG, Yongfu GAO. Attribute-based encryption scheme for blockchain privacy protection [J]. Journal of Computer Applications, 2024, 44(2): 485-489. |
[10] | Yifan WANG, Shaofu LIN, Yunjiang LI. Highway free-flow tolling method based on blockchain and zero-knowledge proof [J]. Journal of Computer Applications, 2024, 44(12): 3741-3750. |
[11] | Ziqian CHEN, Kedi NIU, Zhongyuan YAO, Xueming SI. Review of blockchain lightweight technology applied to internet of things [J]. Journal of Computer Applications, 2024, 44(12): 3688-3698. |
[12] | Tingting GAO, Zhongyuan YAO, Miao JIA, Xueming SI. Overview of on-chain and off-chain consistency protection technologies [J]. Journal of Computer Applications, 2024, 44(12): 3658-3668. |
[13] | Miao JIA, Zhongyuan YAO, Weihua ZHU, Tingting GAO, Xueming SI, Xiang DENG. Progress and prospect of zero-knowledge proof enabling blockchain [J]. Journal of Computer Applications, 2024, 44(12): 3669-3677. |
[14] | Kedi NIU, Min LI, Zhongyuan YAO, Xueming SI. Review of blockchain consensus algorithms for internet of things [J]. Journal of Computer Applications, 2024, 44(12): 3678-3687. |
[15] | Yiting WANG, Wunan WAN, Shibin ZHANG, Jinquan ZHANG, Zhi QIN. Linkable ring signature scheme based on SM9 algorithm [J]. Journal of Computer Applications, 2024, 44(12): 3709-3716. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||