Efficient privacy protection authentication protocol for vehicle network in 5G
【Author】 Zhang, Guixian; Zhao, Xiaoyu; Chen, Menglu; Ma, Shuyi
【Source】CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE
【影响因子】1.831
【Abstract】The traditional internet of vehicles (IoV) identity authentication system generally has the security risk that the center is not trusted. In the 5G IoV, a large number of deployed 5G base stations are integrated into it, which has further developed the technologies such as seamless handover, load balancing, and security authentication. The development of the IoV has largely alleviated the traffic pressure and improved the driving efficiency. However, there are many privacy security problems to be solved in 5G IoV. Therefore, with the characteristics of blockchain distribution, traceability, and non-tampering, an efficient privacy protection authentication protocol based on blockchain is proposed. The method includes two parts: identity registration and authentication. Vehicles and other traffic participants obtain a public identity block through identity registration before accessing the IoV. In the subsequent authentication, the communication parties use this identity block for anonymous authentication. The analysis results based on the formal analysis software Scyther are safe. The security analysis shows that the scheme could meet the security requirements in the IoV. At the same time, the comparison with the existing schemes shows that this scheme has lower computation overhead and communication cost.
【Keywords】5G; authentication; blockchain; internet of vehicles; security
【发表时间】
【收录时间】2022-08-28
【文献类型】实证数据
【主题类别】
区块链技术-协同技术-物联网
【DOI】 10.1002/cpe.7247
评论