Trust access authentication in vehicular network based on blockchain

Data sharing and privacy securing present extensive opportunities and challenges in vehicular network. This paper introduces 'trust access authentication scheme' as a mechanism to achieve real-time monitoring and promote collaborative sharing for vehicles. Blockchain, which can provide sec...

Full description

Saved in:
Bibliographic Details
Published inChina communications Vol. 16; no. 6; pp. 18 - 30
Main Authors Guo, Shaoyong, Hu, Xing, Zhou, Ziqiang, Wang, Xinyan, Qi, Feng, Gao, Lifang
Format Journal Article
LanguageEnglish
Published China Institute of Communications 01.06.2019
State Key Laboratory of Networking and Switching Technology, BUPT, Beijing 100876, China%State Grid Zhejiang Electric Power Co., Ltd. Institute of Electric Power Science, Zhejiang 310007, China%State Grid Henan Electric Power Company Information and Communication Company, Henan 450052, China%State Grid Hebei Electric Power Company, Information and Communication Company, Hebei 050022, China
Subjects
Online AccessGet full text
ISSN1673-5447
DOI10.23919/JCC.2019.06.002

Cover

Loading…
More Information
Summary:Data sharing and privacy securing present extensive opportunities and challenges in vehicular network. This paper introduces 'trust access authentication scheme' as a mechanism to achieve real-time monitoring and promote collaborative sharing for vehicles. Blockchain, which can provide secure authentication and protected privacy, is a crucial technology. However, traditional cloud computing performs poorly in supplying low-latency and fast-response services for moving vehicles. In this situation, edge computing enabled Blockchain network appeals to be a promising method, where moving vehicles can access storage or computing resource and get authenticated from Blockchain edge nodes directly. In this paper, a hierarchical architecture is proposed consist of vehicular network layer, Blockchain edge layer and Block-chain network layer. Through a authentication mechanism adopting digital signature algorithm, it achieves trusted authentication and ensures valid verification. Moreover, a caching scheme based on many-to-many matching is proposed to minimize average delivery delay of vehicles. Simulation results prove that the proposed caching scheme has a better performance than existing schemes based on centralized model or edge caching strategy in terms of hit ratio and average delay.
ISSN:1673-5447
DOI:10.23919/JCC.2019.06.002