Research on Blockchain-Based Identity Verification Between IoV Entities

As the outcome of the reform of the automobile industry driven by mobile communication, automotive electronics and new automotive bus, Internet of Vehicle(IoV)will make differences in the transport system. Located in the terminal layer, Connected Vehicles(CVs) will bind to people's daily lives. One current mainstream CV access approach to a network is cellular-based V2X(C- V2X), CV are vulnerable to be deceived during the access process form illegal entities such as fake base stations and terminals. To protect access, we designed an identity verification method based on blockchain. Considering that vehicular terminals have limited computing performance, we reduced the complexity and procedures as much as possible to meet the low latency requirement. The result of security analysis shows that this method can fulfill efficiency and security requirements in communication scenarios between CV and other entities.

[1]  Qing Yang,et al.  On the Security of Information Dissemination in the Internet-of-Vehicles , 2017 .

[2]  Tao Zhang,et al.  Security and Privacy in the Internet of Vehicles , 2015, 2015 International Conference on Identification, Information, and Knowledge in the Internet of Things (IIKI).

[3]  Abdelmajid Badri,et al.  Performance of DSRC and WIFI for Intelligent Transport Systems in VANET , 2018 .

[4]  Zachary MacHardy,et al.  V2X Access Technologies: Regulation, Research, and Remaining Challenges , 2018, IEEE Communications Surveys & Tutorials.

[5]  Tim Leinmüller,et al.  Survey on Misbehavior Detection in Cooperative Intelligent Transportation Systems , 2016, IEEE Communications Surveys & Tutorials.

[6]  Satoshi Nakamoto Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .

[7]  Danny Dolev,et al.  On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).

[8]  Moni Naor,et al.  Pricing via Processing or Combatting Junk Mail , 1992, CRYPTO.

[9]  Leslie Lamport,et al.  The Byzantine Generals Problem , 1982, TOPL.

[10]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.