Skip to main content
Log in

Efficient access control scheme for heterogeneous signcryption based on blockchain in VANETs

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

Access control refers to the mechanisms and policies determining which vehicles or entities can access certain network resources, services, or information. Nevertheless, the dynamic nature of a VANET, the necessity to support a wide range of services, and the importance of protecting users’ personal information make access control a challenging issue in vehicle contexts. This study presents an efficient access control scheme based on a blockchain to enhance efficiency and security in heterogeneous signcryption (AC-HSC). Additionally, the AC-HSC protocol incorporates blockchain technology for revocation transparency, allowing roadside units to efficiently verify revoked pseudo-identities without relying on a central unit. The AC-HSC effectively fulfills various security criteria, including integrity, privacy preservation, authentication, traceability, unlinkability, non-repudiation, and resistance against replay attacks. Moreover, the formal analysis carried out in a random oracle model (ROM) proves that the proposed protocol is secure against indistinguishability under chosen-ciphertext attack (IND-CCA2) under the Computational Diffie-Hellman (CDH) assumption and existential unforgeability under chosen message attack (EUF-CMA) under the Discret-Logarithm (DL) assumption. In addition, the proposed protocol effectively addresses the issue of key escrow and successfully eliminates the challenges associated with certification management. Finally, the AC-HSC protocol implemented with a free pairing demonstrates reduced computational costs by 3.57%, 50%, 53.53%, 72.22%, 32.66%, 50.90%, 3.57%, and 57.14%, respectively, and the total energy consumption of the VANET nodes in our protocol reduced by about 4.16%, 45.03%, 50.04%, 68.37%, 31.52%, 49.67%, 4.16%, and 53.68%, respectively, as compared with the existing signcryption schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Li, B., Guo, X., Zhang, R., Du, X., Guizani, M.: Performance analysis and optimization for the MAC protocol in UAV-based IoT network. IEEE Trans. Veh. Technol. 69(8), 8925–8937 (2020)

    Article  Google Scholar 

  2. Elkhalil, A., Jiashu, Z., Elhabob, R., Eltayieb, N.: An efficient signcryption of heterogeneous systems for internet of vehicles. J. Syst. Arch. 113, 101885 (2021)

    Article  Google Scholar 

  3. Wang, C., Zhang, L., Li, Z., Jiang, C.: SDCoR: software defined cognitive routing for internet of vehicles. IEEE Internet Things J. 5(5), 3513–3520 (2018)

    Article  Google Scholar 

  4. Feng, Q., He, D., Zeadally, S., Liang, K.: BPAS: Blockchain-assisted privacy-preserving authentication system for vehicular ad hoc networks. IEEE Trans. Ind. Inform. 16(6), 4146–4155 (2019)

    Article  Google Scholar 

  5. Zekri, A., Jia, W.: Heterogeneous vehicular communications: a comprehensive study. Ad Hoc Netw. 75, 52–79 (2018)

    Article  Google Scholar 

  6. Liao, X., Wang, Z., Zhao, X., Han, K., Tiwari, P., Barth, M., Wu, G.: Cooperative ramp merging design and field implementation: a digital twin approach based on vehicle-to-cloud communication. IEEE Trans. Intellig. Transport. Syst. 1–11 (2021)

  7. Masood, A., Lakew, S., Cho, S.: Security and privacy challenges in connected vehicular cloud computing. IEEE Commun. Surveys Tutor. 22(4), 2725–2764 (2020)

    Article  Google Scholar 

  8. Tangade, S., Manvi, S., Lorenz, P.: Decentralized and scalable privacy-preserving authentication scheme in VANETs. IEEE Trans. Veh. Technol. 67(9), 8647–8655 (2018)

    Article  Google Scholar 

  9. Fan, K., Pan, Q., Zhang, K., Bai, Y., Sun, S., Li, H., Yang, Y.: A secure and verifiable data sharing scheme based on blockchain in vehicular social networks. IEEE Trans. Veh. Technol. 69(6), 5826–5835 (2020)

    Article  Google Scholar 

  10. Kong, Q., Lu, R., Yin, F., Cui, S.: Blockchain-based privacy-preserving driver monitoring for MaaS in the vehicular IoT. IEEE Trans. Veh. Technol. 70(4), 3788–3799 (2021)

    Article  Google Scholar 

  11. Ahmad, I., Noor, M., Zaba, R., Qureshi, A., Imran, M., Shoaib, M.: A cooperative heterogeneous vehicular clustering mechanism for road traffic management. Int. J. Parallel Programm. 48(5), 870–889 (2020)

    Article  Google Scholar 

  12. Liang, Z., Han, W., Yong, B., Gaofeng, L.: Cross-Regional Transmission Control for Satellite Network-Assisted Vehicular Ad Hoc Networks. IEEE Trans. Intellig. Transport. Syst. 1–10 (2021)

  13. Sultana, R., Grover, J., Tripathi, M.: Security of sdn-based vehicular ad hoc networks: State-of-the-art and challenges. Veh. Commun. 27, 100284 (2021)

    Google Scholar 

  14. Ali, I., Lawrence, T., Omala, A., Li, F.: An efficient hybrid signcryption scheme with conditional privacy-preservation for heterogeneous vehicular communication in VANETs. IEEE Trans. Veh. Technol. 69(10), 11266–11280 (2020)

    Article  Google Scholar 

  15. Wang, P., Liu, Y.: SEMA: secure and efficient message authentication protocol for VANETs. IEEE Syst. J. 15(1), 846–855 (2021)

    Article  Google Scholar 

  16. Lin, C., He, D., Huang, X., Kumar, N., Choo, K.: BCPPA: a blockchain-based conditional privacy-preserving authentication protocol for vehicular ad hoc networks. IEEE Trans. Intellig. Transport. Syst. 22, 7408–7420 (2020)

    Article  Google Scholar 

  17. Shamir, A.: Identity-based cryptosystems and signature schemes, Workshop on the theory and application of cryptographic techniques, pp. 47–53 (1984)

  18. Sudarsono, A., Yuliana, M., Darwito, A.: A secure data sharing using identity-based encryption scheme for e-healthcare system. In: 2017 3rd International Conference on Science in Information Technology (ICSITech), pp. 429–434 (2017)

  19. Huang, Q., Yue, W., He, Y., Yang, Y.: Secure identity-based data sharing and profile matching for mobile healthcare social networks in cloud computing. IEEE Access 6, 36584–36594 (2018)

    Article  Google Scholar 

  20. Liu, X., Wang, Z., Ye, Y., Li, F.: An efficient and practical certificateless signcryption scheme for wireless body area networks. Comput. Commun. 162, 169–178 (2020)

    Article  Google Scholar 

  21. Kumar, P., Gurtov, A., Iinatti, J., Sain, M., Ha, P.H.: Access control protocol with node privacy in wireless sensor networks. IEEE Sensors J. 16(22), 8142–8150 (2016)

    Article  Google Scholar 

  22. Li, F., Han, Y., Jin, C.: Practical access control for sensor networks in the context of the Internet of Things. Comput. Commun. 89, 154–164 (2016)

    Article  Google Scholar 

  23. Omala, A., Mbandu, A., Mutiria, K., Jin, C., Li, F.: Provably secure heterogeneous access control scheme for wireless body area network. J. Med. Syst. 42(6), 108 (2018)

    Article  Google Scholar 

  24. Luo, M., Luo, Y., Wan, Y., Wang, Z.: Secure and efficient access control scheme for wireless sensor networks in the cross-domain context of the IoT. Security Commun. Netw. 2018, 1–10 (2018). https://doi.org/10.1155/2018/6140978

    Article  Google Scholar 

  25. Xue, J., Xu, C., Zhang, Y.: Private blockchain-based secure access control for smart home systems. KSII Trans. Internet Inf. Syst. 12(12), 6057–6078 (2018)

    Google Scholar 

  26. Zeng, X., Xu, G., Zheng, X., Xiang, Y., Zhou, W.: E-AUA: an efficient anonymous user authentication protocol for mobile IoT. IEEE Internet Things J. 6(2), 1506–1519 (2019)

    Article  Google Scholar 

  27. Qin, X., Huang, Y., Li, X.: An ECC-based access control scheme with lightweight decryption and conditional authentication for data sharing in vehicular networks. Soft. Comput. 24(24), 18881–18891 (2020)

    Article  Google Scholar 

  28. Bera, B., Chattaraj, D., Das, A.K.: Designing secure blockchain-based access control scheme in IoT-enabled internet of drones deployment. Comput. Commun. 153, 229–249 (2020)

    Article  Google Scholar 

  29. Malani, S., Srinivas, J., Das, A.K., Srinathan, K., Jo, M.: Certificate-based anonymous device access control scheme for IoT environment. IEEE Internet Things J. 6(6), 9762–9773 (2019)

    Article  Google Scholar 

  30. Xiong, H.: Cost-effective scalable and anonymous certificateless remote authentication protocol. IEEE Trans. Inform. Forensics Security 9(12), 2327–2339 (2014)

    Article  Google Scholar 

  31. Zhou, Y., Yang, B., Zhang, W.: Provably secure and efficient certificateless generalized signcryption. Chinese J. Comput. 39, 543–551 (2016)

    MathSciNet  Google Scholar 

  32. Shao, Z., Gao, Y.: A provably secure signature scheme based on factoring and discrete logarithms. Appl. Math. Inform. Sci. 8(4), 1553 (2014)

    Article  Google Scholar 

  33. Luo, M., Wen, Y., Hu, X.: Practical data transmission scheme for wireless sensor networks in heterogeneous IoT environment. Wireless Personal Commun. 109(1), 505–519 (2019)

    Article  Google Scholar 

  34. Niu, S., Li, Z., Wang, C.: Privacy-preserving multi-party aggregate signcryption for heterogeneous systems. Int. Conference Cloud Comput. Security 216–229 (2017)

  35. Li, Y., Wang, C., Zhang, Y., Niu, S.: Privacy-preserving multi-receiver signcryption scheme for heterogeneous systems. Security Commun. Netw. 9(17), 4574–4584 (2016)

    Article  Google Scholar 

  36. Shim, K.: S2DRP: secure implementations of distributed reprogramming protocol for wireless sensor networks. Ad Hoc Netw. 19, 1–8 (2014)

    Article  Google Scholar 

  37. Ren, Y., Li, X., Sun, S.F., Yuan, X., Zhang, X.: Privacy preserving batch verification signature scheme based on blockchain for Vehicular Ad-Hoc Networks. J. Inf. Secur. Appl. 58(1), 102698 (2021)

    Google Scholar 

  38. Shao, H., Xia, Y., Piao, C.: Blockchain-assisted certificateless signcryption for vehicle-to-vehicle communication in VANETs. Comput. Netw. 1(235), 109969 (2023)

    Article  Google Scholar 

  39. Islam, A., Altaf, F., Maity, S.: Efficient certificate-less signcryption scheme for vehicular ad hoc networks [C]. Inventive Communication and Computational Technologies: Proceedings of ICICCT 2021, pp. 927–942. Springer (2022)

  40. Ali, I., Chen, Y., Ullah, N., Afzal, M., Wen, H.: Bilinear pairing-based hybrid signcryption for secure heterogeneous vehicular communications [J]. IEEE Trans. Veh. Technol. 70(6), 5974–5989 (2021)

    Article  Google Scholar 

  41. Guo, R., Xu, L., Li, X., Zhang, Y., Li, X.: An efficient certificateless ring signcryption scheme with conditional privacy-preserving in VANETs. J. Syst. Arch. 129, 102633 (2022)

    Article  Google Scholar 

  42. Al-Shareeda, M.A., Manickam, S.: COVID-19 vehicle based on an efficient mutual authentication scheme for 5G-enabled vehicular fog computing. Int. J. Environ. Res. Public Health 19(23), 15618 (2022)

    Article  Google Scholar 

  43. Al-Shareeda, M.A., Anbar, M., Manickam, S., Hasbullah, I.H.: SE-CPPA: a secure and efficient conditional privacy-preserving authentication scheme in vehicular ad-hoc networks. Sensors 21(24), 8206 (2021)

    Article  Google Scholar 

  44. Al-Shareeda, M.A., Anbar, M., Manickam, S., Hasbullah, I.H.: Towards identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Access 9, 113226–113238 (2021)

    Article  Google Scholar 

  45. Mohammed, B.A., Al-Shareeda, M.A., Manickam, S., Al-Mekhlafi, Z.G., Alreshidi, A., Alazmi, M., et al.: FC-PA: Fog computing-based pseudonym authentication scheme in 5G-enabled vehicular networks. IEEE Access 11, 18571–18581 (2023)

    Article  Google Scholar 

  46. Al-Shareeda, M.A.A., Manickam, S.: MSR-DoS: Modular square root-based scheme to resist denial of service (DoS) attacks in 5G-enabled vehicular networks. IEEE Access 10, 120606–120615 (2022)

    Article  Google Scholar 

Download references

Acknowledgements

This work is supported by the Industry University Research Innovation Fund of Science and Technology Development Center of the Ministry of Education, China (Grant No. 2021JQR007), Major Technology Innovation Projects of Shandong Province, China (Grant No. 2019TSLH0203) and the National Key Research and Development Program of China (Grant No. 2020YFB1600501).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wen-Xing Zhu.

Ethics declarations

Conflict of interest

The authors state that they have no Conflict of interest.

Ethical standard

This article does not contain any studies with human participants or animals performed by any of the authors.

Informed consent

Informed consent was taken from all individual participants included in the study.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Khalafalla, W., Zhu, WX., Elkhalil, A. et al. Efficient access control scheme for heterogeneous signcryption based on blockchain in VANETs. Cluster Comput (2024). https://doi.org/10.1007/s10586-024-04479-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10586-024-04479-3

Keywords

Navigation