Chinese Journal of Network and Information Security ›› 2020, Vol. 6 ›› Issue (5): 27-35.doi: 10.11959/j.issn.2096-109x.2020057
Special Issue: 区块链
• Papers • Previous Articles Next Articles
Hao WANG(),Tianhao WU,Konglin ZHU,Lin ZHANG
Revised:
2019-07-12
Online:
2020-10-15
Published:
2020-10-19
Supported by:
CLC Number:
Hao WANG,Tianhao WU,Konglin ZHU,Lin ZHANG. Anonymous vehicle authentication scheme based on blockchain technology in the intersection scenario[J]. Chinese Journal of Network and Information Security, 2020, 6(5): 27-35.
[1] | 李克强, 戴一凡, 李升波 ,等. 智能网联汽车(ICV)技术的发展现状及趋势[J]. 汽车安全与节能学报, 2017,8(1): 1-14. |
LI K Q , DAI Y F , LI S B ,et al. State-of-the-art and technical trends of intelligent and connected vehicles[J]. Journal of Automotive Safety and Energy, 2017,8(1): 1-14. | |
[2] | 孟震 . 智能网联汽车信息共享安全机制的研究与实现[D]. 北京:北京邮电大学, 2016. |
MENG Z . Research and implementation of security communication mechanism in intelligent-cyber vehicles[D]. Beijing:Beijing Uni-versity of Posts and Telecommunications, 2016. | |
[3] | 戴婕 . 基于密钥管理和无中心化加密的网联汽车信息安全的设计与实现[D]. 北京:北京邮电大学, 2018. |
DAI J . Design and implementation of vehicular information security based on key management and decentralized encryption[D]. Beijing:Beijing University of Posts and Telecommunications, 2018. | |
[4] | JIANG T G , FANG H , WANG H G . Blockchain-based internet of vehicles:distributed network architecture and performance analysis[J]. IEEE Internet of Things Journal, 2018 ( Early Access ). |
[5] | BISWAS S,MI?I? J . A cross-layer approach to privacy-preserving authentication in WAVE-enabled VANETs[J]. IEEE Transactions on Vehicular Technology, 2013,62(5): 2182-2192. |
[6] | SHEN W , LIU L , CAO X . Cooperative message authentication in vehicular cyber-physical systems[J]. IEEE Trans Emerging Topics Comput, 2013,1(1): 2182-2192. |
[7] | GUO J H , BAUGH J P , WANG S Q . A group signature based secure and privacy-preserving vehicular communication framework[C]// Mobile Networking for Vehicular Environments. 2007. |
[8] | ISLAM S H , OBAIDAT M S , VIJAYAKUMAR P ,et al. A robust and efficient password-based conditional privacy preserving authentication and group-key agreement protocol for VANETs[J]. Future Generation Computer Systems, 2018,84(1): 216-227. |
[9] | AZEES M , VIJAYAKUMAR P , DEBOARH L J . EAAP:efficient anonymous authentication with conditional privacy-preserving scheme for vehicular ad hoc networks[J]. IEEE Transactions on Intelligent Transportation Systems, 2017,(18): 2467-2476. |
[10] | KARATI A , ISLAM S H , BISWAS G P ,et al. Provably secure identitybased signcryption scheme for crowdsourced industrial internet of things environments[J]. IEEE Internet of Things Journal, 2018,5(4): 2904-2914. |
[11] | YUAN Y , WANG F Y . Towards blockchain-based intelligent transportation systems[C]// 2016 IEEE 19th International Conference on Intelligent Transportation Systems (ITSC). 2016: 2663-2668. |
[12] | CROSBY M , PATTANAYAK P , VERMA S ,et al. Blockchain technology:beyond bitcoin[J]. Applied Innovation, 2016(2): 6-10. |
[13] | 张勖, 马欣 . 基于区块链的轻量化移动自组网认证方案[J]. 网络与信息安全学报, 2020,6(4): 14-22. |
ZHANG X , MA X . Light weight mobile Ad Hoc network authenti-cation scheme based on blockchain[J]. Chinese Journal of Network and Information Security, 2020,6(4): 14-22. | |
[14] | LEI A , CRUICKSHANK H , CAO Y ,et al. Blockchain-based dynamic key management for heterogeneous intelligent transportation systems[J]. IEEE Internet of Things Journal, 2017,4(16): 1832-1843. |
[15] | WANG W T , HU N , LIU X . BlockCAM:a blockchain-based cross-domain authentication model[C]// 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC). 2018: 896-901. |
[16] | 黄泽源, 孔勇平, 张会炎 . 基于区块链的物联网安全技术研究[J]. 移动通信, 2018,42(12): 8-13. |
HUANG Z Y , KONG Y P , ZHANG H Y . Research on security technology of internet of things based on blockchain[J]. Mobile Communications, 2018,42(12): 8-13. | |
[17] | VIJAYAKUMAR P , AZEES M , KANNAN A ,et al. Dual authentication and key management techniques for secure data transmission in vehicular ad hoc networks[J]. IEEE Trans Intell Transp Syst, 2016,17(4): 1015-1028. |
[18] | AZEES M , VIJAYAKUMAR P , DEBORAH L J . Comprehensive survey on security services in vehicular Ad-Hoc networks[J]. IET Intell Transp Syst, 2016,10(6): 379-388. |
[19] | SHIM K . CPAS:an efficient conditional privacy-preserving authentication scheme for vehicular sensor networks[J]. IEEE Transactions on Vehicular Technology, 2012,61(4): 1874-1883. |
[20] | ZHU X , JIANG S , WANG L ,et al. Efficient privacy-preserving authentication for vehicular Ad Hoc networks[J]. IEEE Transactions on Vehicular Technology, 2014,63(2): 907-919. |
[21] | IEEE trial-use standard for wireless access in vehicular environments (WAVE)-security services for applications and management messages[S]. 2006. |
[22] | LO N , TSAI J . An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks without pairings[J]. IEEE Trans Intell Transp Syst, 2016,17(5): 1319-1328. |
[23] | BAYAT M , BARMSHOORY M , RAHIMI M ,et al. A secure authentication scheme for VANETs with batch verification[J]. Wireless Netw, 2015,21(5): 1733-1743. |
[24] | HORNG S , TZENG S , PAN Y ,et al. b-SPECS+:batch verification for secure pseudonymous authentication in VANET[J]. IEEE Trans Inf Forensics Security, 2013,8(11): 1860-1875. |
[1] | Zhao CAI, Tao JING, Shuang REN. Survey on Ethereum phishing detection technology [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 21-32. |
[2] | Min XIAO, Faying MAO, Yonghong HUANG, Yunfei CAO. Anonymous trust management scheme of VANET based on attribute signature [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 33-45. |
[3] | Heli WANG, Qiao YAN. Selfish mining detection scheme based on the characters of transactions [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 104-114. |
[4] | Beiyuan YU, Shanyao REN, Jianwei LIU. Overview of blockchain assets theft attacks and defense technology [J]. Chinese Journal of Network and Information Security, 2023, 9(1): 1-17. |
[5] | Fei TANG, Ning GAN, Xianggui YANG, Jinyang WANG. Anti malicious KGC certificateless signature scheme based on blockchain and domestic cryptographic SM9 [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 9-19. |
[6] | Dan LIN, Kaixin LIN, Jiajing WU, Zibin ZHENG. Bytecode-based approach for Ethereum smart contract classification [J]. Chinese Journal of Network and Information Security, 2022, 8(5): 111-120. |
[7] | Cong YI, Jun HU. Novel continuous identity authentication method based on mouse behavior [J]. Chinese Journal of Network and Information Security, 2022, 8(5): 179-188. |
[8] | Liquan CHEN, Xiao LI, Zheyi YANG, Sijie QIAN. Blockchain-based high transparent PKI authentication protocol [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 1-11. |
[9] | Wenbo ZHANG, Simin CHEN, Lifei WEI, Wei SONG, Dongmei HUANG. State-of-the-art survey of smart contract verification based on formal methods [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 12-28. |
[10] | Feng LIU, Jie YANG, Jiayin QI. Survey on blockchain privacy protection techniques in cryptography [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 29-44. |
[11] | Xiaoling SONG, Yong LIU, Jingnan DONG, Yongfei HUANG. Application and prospect of blockchain in Metaverse [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 45-65. |
[12] | Lin JIN, Youliang TIAN. Multi-authority attribute hidden for electronic medical record sharing scheme based on blockchain [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 66-76. |
[13] | Pengkun JIANG, Wenyin ZHANG, Jiuru WANG, Shanyun HUANG, Wanshui SONG. Blockchain covert communication scheme based on the cover of normal transactions [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 77-86. |
[14] | Jianlin NIU, Zhiyu REN, Xuehui DU. Cross-domain authentication scheme based on consortium blockchain [J]. Chinese Journal of Network and Information Security, 2022, 8(3): 123-133. |
[15] | Baoqin ZHAI, Jian WANG, Lei HAN, Jiqiang LIU, Jiahao HE, Tianhao LIU. Hierarchical proxy consensus optimization for IoV based on blockchain and trust value [J]. Chinese Journal of Network and Information Security, 2022, 8(3): 142-153. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|