1. Introduction
As the significant infrastructure of the Intelligent Transportation System (ITS), the vehicle ad hoc network (VANET) is the self-configuring network that has emerged as an advanced solution for improved driving safety and experience. VANET contains several heterogeneous entities, such as the trusted authority (TA), roadside units (RSUs), and vehicles [
1]. Significantly, the vigorous development of wireless communication technology has allowed VANET to gain considerable attention from researchers in public and private sectors [
2]. In VANET, each authorized vehicle can collect the time-critical road/traffic information and upload it to the TA or cloud server, to be utilized to analyze real-time road conditions.
However, a range of challenges and threats to information security and system availability are emerging [
3,
4,
5,
6], which is mainly reflected in three aspects. First, the messages should be authenticated by recipients. As mentioned in [
7], malicious vehicles may propagate forged traffic/road messages via impersonating others, as well as fooling the trusted authority into accepting false or pointless information without being caught. Moreover, the privacy-preserving and anti-tracking aspects are not negligible in the authentication process. Attackers may track a vehicle’s trajectory to steal private information or fabricate traffic scenes [
8]. Second, the proposed scheme must be efficient to satisfy the real-time nature of messages in VANET. Therefore, the algorithm contained in the proposed scheme must be efficiently executed while ensuring privacy security. Third, considering the system scalability, the proposed scheme should have an excellent information management mechanism to ensure that the scheme has stable performance and saves storage resources, especially based on the distributed system—the existing authentication scheme [
9,
10,
11].
Numerous researchers have proposed various exploratory schemes to address information security issues [
12,
13,
14]. For example, as mentioned in [
12], one message is accepted by the TA if the same information is broadcast by at least
vehicles, and the TA analyzes real-time road condition information with the assistance of received messages. However, the architectural design of these approaches brings unaffordable costs, such as more computing and storage resources.
Moreover, cryptography is utilized in privacy preservation during authentication [
15,
16,
17]. Cryptography is a technique to convert plain text to ciphertext with the assistance of the key and algorithm [
18], where the plain text is readable text and the ciphertext is unreadable text. Based on the cryptography technique, there are two types of authentication schemes: symmetric and asymmetric. In the schemes utilizing symmetric key cryptography, the same key is utilized in the encryption and decryption process of private information; on the contrary, in the asymmetric key cryptography scheme represented by public key infrastructure (PKI), the encryption and decryption processes are accomplished using public and private keys [
19].
Blockchain technology originated from the paper “Bitcoin: A peer-to-peer electronic cash system”, published by Satoshi Nakamoto in 2008 [
20]. Blockchain has become an effective method of addressing vehicle management and data transfer security issues. Numerable researchers at home and abroad have proposed blockchain-based authentication schemes [
11,
21,
22,
23]. However, there are three limitations in existing approaches. First, due to the consensus mechanism, using smart contracts to accomplish the authentication process would incur extra time overhead. Second, the existing schemes are short of scalability, which may lead to a scheme without long-term stable performance. Third, the schemes utilize vehicles/RSUs as the mining nodes, which lacks consideration of the limited computing power and bandwidth.
From the above analysis, we can see that the existing approaches have the following restrictions. First, the existing methods have a prolonged delay, especially in authenticating and obtaining the related records. Second, the schemes lack sufficient scalability, which is an issue faced by most schemes, especially blockchain-based distributed authentication schemes. The data storage of the database increases as the number of certificates grows, which necessitates more storage resources. Third, there are linkability risks with real identities and certificates in the existing scheme. In this paper, to address the issues mentioned above, we propose an efficient blockchain-based authentication scheme for secure communication in a vehicular ad hoc network (EBAS), which provides the following functionalities:
Message authentication. The vehicle generates a traffic message and uploads it to the Regional Trusted Authority (RTA) together with one transaction. The RTA can independently accomplish authentication by verifying the legality of the transaction. Furthermore, the RTA accepts the uploaded traffic message sent by vehicles successfully authenticated; otherwise, the message would be discarded.
Scheme scalability. We proposed a transaction update mechanism in our scheme to enable scalability. With the assistance of the update mechanism, our scheme stabilizes the information retrieval efficiency of the system database and saves storage resources. Under the simulation, the retrieval overhead is maintained at around 0.32 ms while the storage cost is around 32.7 M.
Efficient authentication. The transaction is generated based on the UTXO model. Therefore, based on asymmetric cryptography, the RTA checks the legitimacy of the message sender by verifying the validity of the single input contained in the transaction uploaded together with traffic messages. Under the simulation, one single RTA can accomplish authentication within 0.942 ms. Moreover, compared with other related schemes, our proposal outperforms the existing common schemes.
Realization of the scheme prototype. We simulate the proposed scheme on the Hyperledger Fabric 2.0 and Network Simulator 2. In addition, we implement an exhaustive analysis of the efficiency and scalability of the proposed scheme. The security analysis shows that our scheme can defend against common attacks in VANET with the assistance of the asymmetric key encryption technique.
The remainder of this paper is organized as follows.
Section 2 reviews the existing authentication schemes.
Section 3 introduces the preliminaries and mathematical assumptions of the proposed scheme. The EBAS framework and the security model are formalized in
Section 4.
Section 5 introduces our EBAS scheme. In
Section 6, we analyze the safety and efficiency of our EBAS scheme. Finally,
Section 7 concludes the paper.
2. Related Research
Recently, numerous researchers have contributed a series of studies on the security and privacy-preserving issues in the VANET. In this section, we review some related research.
Numerous researchers have focused on addressing the reliability issues [
12,
24,
25]. Threshold authentication is a promising technology to achieve reliability in VANET, which has received widespread attention. Specifically, this involves the transmission of information via a non-fully-trusted communication environment in VANET. The threshold mechanism allows the message to be accepted only when the number of confirmed vehicles exceeds the threshold value. Chen et al. [
12] proposed a threshold anonymous announcement system. The recipient accepts the traffic/road messages when the number of vehicles that report the same message exceeds the threshold value. However, this scheme cannot revoke the certificates efficiently, which leads to the scheme being unable to resist frequent attacks. A one-time authentication and message-linkable group signatures scheme are proposed by Wu et al. [
24], which can implement authentication efficiently. However, the scheme is inefficient for tracing doubtable messages because the process requires multiple expensive pairing operations. Lin et al. [
25] proposed a roadside unit (RSU)-aided protocol to achieve the local detection and efficient traceability of malicious vehicles. However, the scheme is unsuitable for areas with sparse RSUs and cannot be bootstrapped by untrusted RSUs.
More and more safety threats [
26,
27,
28,
29] have drawn widespread attention. Zhang et al. [
30] proposed a scheme of addressing the linkability issue in vehicular announcement networks with the assistance of a group signature. However, the same private key needs to be shared in one group, which is unsafe. Success et al. [
31] proposed an autonomous privacy-preserving authentication scheme to guarantee the vehicle’s traceability privacy. The vehicles can authenticate the messages securely and efficiently and renew their pseudonyms without interacting with trusted authorities. Jiang et al. [
32] proposed a batch authentication scheme for message signatures based on a binary authentication tree. However, this scheme relies on the participation of semi-trusted RSUs. Ying et al. [
33] proposed a lightweight authentication scheme. Based on the characteristic of fast calculation of a hash function, this scheme realizes mutual authentication among the OBU, RSU and TA. However, this scheme cannot effectively resist replay attacks and tampering attacks.
Blockchain [
20] has promising adaptability in many fields. Plenty of existing schemes utilize blockchain and asymmetric key cryptography to mitigate the privacy and security issues in the VANET. Yao et al. [
11] proposed a blockchain-based lightweight anonymous authentication scheme. This scheme can satisfy security requirements such as anonymity, authentication, and integrity. However, this scheme does not consider the linkability of vehicles during the authentication process. Attackers can track vehicles based on static pseudonyms, leading to the disclosure of vehicles’ private information. Lu et al. [
21] propose an authentication protocol utilizing the Merkle Patricia Tree (MPT) as the underlying data structure, which is efficient and can save storage resources. However, the scheme cannot provide excellent scalability, and data processing in upper nodes may lead to more time overhead following the data storage increase in MPT. Lei et al. [
22] utilize blockchain to predigest the key management. Arora et al. [
23] proposed a blockchain-based authentication scheme. However, this scheme relies on a centralized authority to implement the vehicle registration process, which is prone to cause a single point of failure problem.
5. EBAS: An Efficient Blockchain-Based Authentication Scheme for Secure Communication in Vehicular Ad Hoc Network
Entities of the user layer must be registered in the RA. After the registration, the vehicles have the qualification to generate the instant transaction and participate in the authentication process. We illustrate the entity registration process and several mechanisms related to the authentication in this section. Moreover, the notations and definitions are listed in
Table 3.
5.1. Initialization
In the system initialization process, the RA is responsible for generating master key pairs and accomplishing user-layer entity registration.
5.1.1. The Master Key Pair Generation
In our scheme, the user’s private information (e.g., identity) is encrypted with the master key pair (, ). Moreover, the transaction pseudonym is also generated with the public key . The master key pair generation details are as follows:
The RA selects an elliptic curve
:
, where
is a prime,
and constants with
. Let
denote the set of pairs
along with
, which is the point at infinity. The RA generates the master key pair (
,
) based on elliptic curve cryptography (ECC) [
39].
The RTA chooses a random number as its secret key , and then computes the corresponding public key = .
The RTA stores the key pair (, ) locally and broadcasts via the RSUs.
In the master key pair generation procedure, the RA first selects an elliptic curve . Based on the curve , the RA generates the master key pair (, ), and the RTA generates the key pair (, ). The master key is mainly utilized to encrypt the user identity, and the RTA’s key is mainly utilized in the transaction generation.
5.1.2. User-Layer Entity Registration
In effect, each RTA has a disjoint management region. Each entity participates in the registration process by submitting its real identity information to the RA. The RA generates the entity’s pseudonym via encrypting the received real identity information with the master key.
After this, the RA forwards the registration results to the corresponding RTA. The RTA utilizes one registration transaction to issue n license coins to the registered entity to initialize authentication permissions. Moreover, this registration transaction would be uploaded to the database as the original pioneer transaction. The details of the user-layer entity registration are as follows:
The entity in the user layer submits its real identity material to the RA.
The RA verifies the legitimacy of the received material. After this, the RA generates the via encrypting the entity’s real identity information with the master key.
The RA gives authorization to the user for the transaction generation.
The RA forwards the registration results to the corresponding RTA. The RTA utilizes one registration transaction to issue n license coins to the registered entity to initialize authentication permissions, which can be utilized in the authentication process.
We define the generation of
as follows:
where
t is the timestamp of the entity registration.
represents the entity’s real identity information.
represents the encrypted operation.
is ciphertext. The operation of the function
is to intercept the first 20 characters of the target field (hexadecimal), which is utilized to generate
.
Finally, the RA stores the entity’s and as key value pairs in the blockchain state database. It is worth noting that the RTAs and RA are the consensus node, so each RTA can retrieve the in the blockchain state database.
5.2. Transaction Generation
There are two computation operations in the transaction generation process, key pair generation and transaction pseudonym generation. The details are as follows.
5.2.1. Key Pair Generation
In our scheme, the newest instant transaction is generated based on the original transaction. The license coin information stored in the original transaction would be utilized in the newest instant transaction . The details of key pair generation are as follows:
The vehicle calls the instant transaction generation algorithm.
The OBU chooses a random number as its secret key , and computes the corresponding public key .
The vehicle stores the key pair locally.
After this, the secret key is stored in the tamper-proof device. Moreover, we assume that this phase has no privacy disclosure and security attack risk threat.
5.2.2. Transaction Pseudonym Generation
The transaction pseudonym acts as the retrieval index of the transaction. Moreover, the transaction pseudonym is utilized for conditional privacy protection and non-reputation. The vehicle generates the transaction pseudonym using the RTA public key broadcast periodically via the RSU. The details of transaction pseudonym generation are as follows:
is the regional code where the vehicle is located. is an asymmetric encryption operation based on the RTA public key . is the transaction pseudonym. and the ciphertext are recorded in the blockchain state database as key value pairs.
5.3. Message Authentication
In the following section, we illustrate the authentication procedure and issuance of license coins. The details are as follows.
5.3.1. Authentication Operation
We elaborate the authentication between the entity of the user layer and the RTA.
M is ciphertext for the traffic report, which is generated with . The signature for is generated using . The and are contained in the of . Afterward, based on the transaction update mechanism, the vehicle generates one newest instant transaction to implement the next authentication or license coin aggregation.
5.3.2. Issuance of License Coins
The RTA will issue license coins to vehicles successfully authenticated, and the details are as follows:
Step1: The RTA implements the authentication operations.
Step2: The RTA generates one instant transaction locally and calculates the based on the vehicle’s public key.
Step3: The RTA sends the instant transaction to the RTAs and stores it in the blockchain state database. The RTAs broadcast the received instant transaction in the management region.
Step4: Vehicles accomplishing the authentication process execute the license aggregation procedure.
5.4. Transaction Confirmation
We define the process of checking the legitimacy of the transaction as transaction confirmation, which contains several operations, such as retrieve, verification, and storage. After the transaction confirmation process, the original transaction would be replaced by the latest verified transaction. The details are as follows:
In the blockchain state database, the previous transaction involved in would be retrieved through the transaction pseudonym.
The system verifies the signature and compares the hash value of public key, which has been illustrated in
Section 3.1.3.
The transaction would be stored in the database as the latest original transaction to replace the previous one.
5.5. Aggregation Transaction
The RTA will issue license coins to the corresponding vehicle successfully authenticated through one instant transaction. The vehicle utilizes the aggregation transaction to aggregate all owned coins existing in other transactions. Based on the other transactions, the vehicle constructs several contained in the aggregation transaction. Afterward, the vehicle constructs aggregated transaction based on the local key pair. This aggregation transaction is uploaded to the RTA, and the RTA executes the transaction authentication process. Finally, this aggregation transaction would be stored in the blockchain state database as the newest original transaction.
5.6. Transaction Update
As shown in
Figure 3, we define the conversion between different types of transactions as an update process. Based on the transaction update mechanism, our proposal can guarantee scalability. The details of the transaction update are as follows:
The instant transaction is utilized in authentication or in aggregating license coins, and the instant transaction is redefined as an authentication transaction or aggregation transaction.
Authentication or aggregating license coins would be accomplished via the transaction confirmation process, and the transaction would be the newest original transaction stored in the blockchain state database.
Based on the original transaction, the user can construct the , which would be contained in one newest instant transaction.
Afterward, the newest instant transaction can be utilized in the next authentication process or license coin aggregation.
Through the transaction update process, we achieve the replacement of old and new transaction data stored in the blockchain state database, thereby guaranteeing the scalability of the storage level.
7. Conclusions
In this article, we propose an efficient blockchain-based authentication scheme for secure communication in a vehicular ad hoc network (EBAS). In our scheme, the entities can accomplish authentication with the assistance of transactions constructed based on the UTXO model. The verifier checks the validity of the single input contained in the uploaded transaction to verify the legitimacy of the message sender’s identity. In terms of privacy preservation, based on the asymmetric key encryption technique, the transaction pseudonym is generated to assist users to participate in the authentication process anonymously. Moreover, our scheme guarantees the scalability of EBAS by proposing a transaction update mechanism, which can keep data storage and retrieval efficiency at a stable level rather than undergoing near-linear growth. Based on the security analysis, our scheme is more comprehensive in terms of privacy preservation and resisting common attacks in the VANET. Regarding the authentication scheme, the simulations show that the average computational cost of the proposed scheme is around 0.942 ms, which outperforms the existing schemes. Furthermore, we implement a simulation experiment to evaluate the communication delay and authentication overhead. Thus, compared with other existing schemes, our proposal has advantages in communication delay and authentication overhead. The future work will focus on adding an incentive module, which is a significant step toward wider applications.