Trust access authentication in vehicular network based on blockchain
Data sharing and privacy securing present extensive opportunities and challenges in vehicular network. This paper introduces 'trust access authentication scheme' as a mechanism to achieve real-time monitoring and promote collaborative sharing for vehicles. Blockchain, which can provide sec...
Saved in:
Published in | China communications Vol. 16; no. 6; pp. 18 - 30 |
---|---|
Main Authors | , , , , , |
Format | Journal Article |
Language | English |
Published |
China Institute of Communications
01.06.2019
State Key Laboratory of Networking and Switching Technology, BUPT, Beijing 100876, China%State Grid Zhejiang Electric Power Co., Ltd. Institute of Electric Power Science, Zhejiang 310007, China%State Grid Henan Electric Power Company Information and Communication Company, Henan 450052, China%State Grid Hebei Electric Power Company, Information and Communication Company, Hebei 050022, China |
Subjects | |
Online Access | Get full text |
ISSN | 1673-5447 |
DOI | 10.23919/JCC.2019.06.002 |
Cover
Loading…
Summary: | Data sharing and privacy securing present extensive opportunities and challenges in vehicular network. This paper introduces 'trust access authentication scheme' as a mechanism to achieve real-time monitoring and promote collaborative sharing for vehicles. Blockchain, which can provide secure authentication and protected privacy, is a crucial technology. However, traditional cloud computing performs poorly in supplying low-latency and fast-response services for moving vehicles. In this situation, edge computing enabled Blockchain network appeals to be a promising method, where moving vehicles can access storage or computing resource and get authenticated from Blockchain edge nodes directly. In this paper, a hierarchical architecture is proposed consist of vehicular network layer, Blockchain edge layer and Block-chain network layer. Through a authentication mechanism adopting digital signature algorithm, it achieves trusted authentication and ensures valid verification. Moreover, a caching scheme based on many-to-many matching is proposed to minimize average delivery delay of vehicles. Simulation results prove that the proposed caching scheme has a better performance than existing schemes based on centralized model or edge caching strategy in terms of hit ratio and average delay. |
---|---|
ISSN: | 1673-5447 |
DOI: | 10.23919/JCC.2019.06.002 |