Skip to main content
Log in

An efficient blockchain assisted dynamic authentication scheme for geo-spatial enabled vehicular network

  • Published:
Telecommunication Systems Aims and scope Submit manuscript

Abstract

The primary goal of vehicular networks is to increase vehicle safety as well as transportation efficiency with the application of wireless communications technology. Therefore, it is crucial to develop an effective data distribution mechanism that notifies vehicles of significant safety incidents. Two recent developments that could assist a vehicular network in this regard include geospatial and blockchain technology. With the help of distributed nodes and geo-locations made possible by blockchain technology, it is possible to investigate the patterns of participants both spatially and geographically. The primary objective of this work is to create, implement, and evaluate an effective dynamic authentication scheme for a geospatially enabled vehicular network using blockchain technology. The proposed scheme’s security and correctness are demonstrated using the random oracle model and the study of performance shows that it meets the requirement of less communication and computation overhead. It is also proven secure against active as well as a passive adversary. However, precise informal security analysis and verification have been done using widely adopted “Automated Validation of Internet Security Protocol and Application”(AVISPA) tool. The proposed scheme’s suitability for a vehicular system is demonstrated by its performance and security analysis.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Data availability

The datasets generated during the current study are available from the corresponding author on reasonable request.

References

  1. Ouaddah, Aafaf, Elkalam, Anas Abou, & Ouahman, Abdellah Ait. (2016). Fairaccess: A new blockchain-based access control framework for the internet of things. Security and communication networks, 9(18), 5943–5964.

    Article  Google Scholar 

  2. Hafizul Islam, S. K., Mishra, Nimish, Biswas, Souvik, Keswani, Bharat, & Zeadally, Sherali. (2021). An efficient and forward-secure lattice-based searchable encryption scheme for the big-data era. Computers & Electrical Engineering, 96, 107533.

    Article  Google Scholar 

  3. SK Hafizul Islam. (2020). Provably secure two-party authenticated key agreement protocol for post-quantum environments. Journal of Information Security and Applications, 52, 102468.

    Article  Google Scholar 

  4. Saurabh Rana, Dheerendra Mishra, and Saurabh Gupta. (2021). Computationally efficient and secure session key agreement techniques for vehicular cloud computing. In Advances in Communication and Computational Technology: Select Proceedings of ICACCT 2019, Springer, pp. 453–467.

  5. Jijun Yin, Tamer ElBatt, Gavin Yeung, Bo Ryu, Stephen Habermas, Hariharan Krishnan, and Timothy Talty. (2004). Performance evaluation of safety applications over dsrc vehicular ad hoc networks. In Proceedings of the 1st ACM International Workshop on Vehicular Ad Hoc Networks, pp. 1–9

  6. Jakob Eriksson, Lewis Girod, Bret Hull, Ryan Newton, Samuel Madden, and Hari Balakrishnan. (2008). The pothole patrol: using a mobile sensor network for road surface monitoring. In Proceedings of the 6th International Conference on Mobile Systems, Applications, and Services, pp. 29–39

  7. Leilani Battle, Michael Stonebraker, and Remco Chang. (2013). Dynamic reduction of query result sets for interactive visualizaton. In 2013 IEEE International Conference on Big Data, IEEE, pp. 1–8.

  8. Giacomo Alessandroni, LC Klopfenstein, Saverio Delpriori, M Dromedari, G Luchetti, B Paolini, Andrea Seraghiti, Emanuele Lattanzi, Valerio Freschi, Alberto Carini, et al. (2014). Smartroadsense: Collaborative road surface condition monitoring. Proceedings of the UBICOMM, pp. 210–215

  9. Kumari, Saru, Karuppiah, Marimuthu, Li, Xiong, Fan, Wu., Das, Ashok Kumar, & Odelu, Vanga. (2016). An enhanced and secure trust-extended authentication mechanism for vehicular ad-hoc networks. Security and Communication Networks, 9(17), 4255–4271.

    Article  Google Scholar 

  10. Mohit, Prerna, Amin, Ruhul, & Biswas, G. P. (2017). Design of authentication protocol for wireless sensor network-based smart vehicular system. Vehicular Communications, 9, 64–71.

    Article  Google Scholar 

  11. Hafizul Islam, S. K., Obaidat, Mohammad S., Vijayakumar, Pandi, Abdulhay, Enas, Li, Fagen, Krishna Chaitanya, M., & Reddy, C. (2018). A robust and efficient password-based conditional privacy preserving authentication and group-key agreement protocol for vanets. Future Generation Computer Systems, 84, 216–227.

    Article  Google Scholar 

  12. Liu, Lianhai, Wang, Yujue, Zhang, Jingwei, & Yang, Qing. (2019). A secure and efficient group key agreement scheme for vanet. Sensors, 19(3), 482.

    Article  Google Scholar 

  13. Al-Shareeda, Mahmood A., Anbar, Mohammed, Hasbullah, Iznan Husainy, Manickam, Selvakumar, & Hanshi, Sabri M. (2020). Efficient conditional privacy preservation with mutual authentication in vehicular ad hoc networks. IEEE Access, 8, 144957–144968.

    Article  Google Scholar 

  14. Bagga, Palak, Sutrala, Anil Kumar, Das, Ashok Kumar, & Vijayakumar, Pandi. (2021). Blockchain-based batch authentication protocol for internet of vehicles. Journal of Systems Architecture, 113, 101877.

    Article  Google Scholar 

  15. Muhammad Umar, S. K., Islam, Hafizul, Mahmood, Khalid, Ahmed, Shafiq, Ghaffar, Zahid, & Saleem, Muhammad Asad. (2021). Provable secure identity-based anonymous and privacy-preserving inter-vehicular authentication protocol for vanets using puf. IEEE Transactions on Vehicular Technology, 70(11), 12158–12167.

    Article  Google Scholar 

  16. Zhang, Li., & Jianbo, Xu. (2022). Blockchain-based anonymous authentication for traffic reporting in vanets. Connection Science, 34(1), 1038–1065.

  17. Armando, Alessandro, Basin, David, Boichut, Yohan, Chevalier, Yannick, Compagna, Luca, Jorge Cuéllar, P., Drielsma, Hankes, Héam, Pierre-Cyrille., Kouchnarenko, Olga, Mantovani, Jacopo, et al. (2005). The avispa tool for the automated validation of internet security protocols and applications (pp. 281–285). In International conference on computer aided verification: Springer.

    Google Scholar 

  18. Armando, Alessandro, Basin, David, Cuellar, Jorge, Rusinowitch, Michael, & Viganò, Luca. (2006). Avispa: Automated validation of internet security protocols and applications. ERCIM News, 64, 76.

    Google Scholar 

  19. Dolev, Danny, & Yao, Andrew. (1983). On the security of public key protocols. IEEE Transactions on information theory, 29(2), 198–208.

    Article  Google Scholar 

  20. Feifei Wang, Guoai Xu, Chenyu Wang, and Junhao Peng. (2019). A provably secure biometrics-based authentication scheme for multiserver environment. Security and Communication Networks.(2019)

  21. Sunakshi Singh and Vijay Kumar Chaurasiya. (2021). Mutual authentication scheme of iot devices in fog computing environment. Cluster Computing, 24(3), 1643–1657.

    Article  Google Scholar 

  22. Shuai, Mengxia, Nenghai, Yu., Wang, Hongxia, Xiong, Ling, & Li, Yue. (2021). A lightweight three-factor anonymous authentication scheme with privacy protection for personalized healthcare applications. Journal of Organizational and End User Computing (JOEUC), 33(3), 1–18.

    Article  Google Scholar 

  23. Son, Seunghwan, Lee, Joonyoung, Park, Yohan, Park, Youngho, & Das, Ashok Kumar. (2022). Design of blockchain-based lightweight v2i handover authentication protocol for vanet. IEEE Transactions on Network Science and Engineering., 9(3), 1346–1358.

    Article  Google Scholar 

  24. Deepak Chhikara, Saurabh Rana, Ankita Mishra, Dheerendra Mishra, and Member of IEEE. Construction of elliptic curve cryptography-based authentication protocol for internet of things. Security and Privacy, n/a(n/a):e226.

Download references

Acknowledgements

Not applicable

Funding

This research received no specific grant from any funding agency.

Author information

Authors and Affiliations

Authors

Contributions

A.G. and S.R. conceived of the presented idea and designed the proposed scheme. D.C. developed the theory and performed the performance analysis. S.R. helped supervise the research paper. All authors read and approved the final manuscript.

Corresponding author

Correspondence to Deepak Chhikara.

Ethics declarations

Conflict of interest

The authors declare no competing interests.

Ethical approval and consent to participate

The authors declare that the manuscript does not report on or involve the use of any animal or human data or tissue.

Consent for publication

The manuscript does not contain any person’s data in any form.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Goswami, A., Rana, S. & Chhikara, D. An efficient blockchain assisted dynamic authentication scheme for geo-spatial enabled vehicular network. Telecommun Syst 83, 241–251 (2023). https://doi.org/10.1007/s11235-023-01016-2

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11235-023-01016-2

Keywords

Navigation