BPA: A Novel Blockchain-Based Privacy-Preserving Authentication Scheme for the Internet of Vehicles
Abstract
:1. Introduction
- We developed a blockchain-based privacy-preserving authentication scheme (BPA) to verify the legitimacy of vehicle identities. Our scheme comprises five phases: system initialization, registration, authentication, re-authentication, and revocation, which are cover the whole life cycle of the management and usage of identities in the IoV.
- Our scheme utilizes ZKP to transfer the authenticated computing load to the RSU, eliminating communication latency to some extent. In the re-authentication process after the initial authentication process, we utilize blockchain to share vehicle authentication processes among RSUs, avoiding the redundant computations by sharing and maintaining the trust key of each vehicle among the RSUs, reducing the computational overhead of the vehicles.
- We conducted a rigorous security analysis to prove the security and integrity of our scheme, which is strong enough to protect the privacy and secrecy of vehicle identities. Compared with other schemes, our scheme has more advantages.
2. Related Work
3. System Overview
3.1. System Model
- TA: The TA is responsible for generating the system’s public parameters and deploying the RSU. Additionally, the TA distributes the keys to corresponding users and reveals the genuine identity of the vehicle. In our proposed scheme, the TA is deemed a trusted entity, which is usually played by the government in reality. It is assumed to possess significant computational resources and is expected to operate without colluding with other entities.
- RSU: Deployed at the roadside, all RSUs collectively maintain a consortium blockchain. When a vehicle enters its communication range, the RSU uploads the vehicle’s authentication information to the blockchain, and subsequent RSUs can authenticate the vehicle based on the data recorded on the blockchain.
- Vehicle: Equipped with an OBU (on-board Unit) possessing computational power, vehicles need to register with a TA before accessing the IoV. Following registration, vehicles obtain relevant traffic information and services by authenticating with the RSU after entering the RSU’s communication range.
- Blockchain: All RSUs collaboratively maintain a consortium blockchain utilizing the Practical Byzantine Fault Tolerance (PBFT) consensus algorithm. When the vehicle accesses the IoV for the first time, it uses the key issued by the TA to authenticate. The RSU uploads the vehicle’s authentication token to the blockchain. When the vehicle travels to the next RSU, it is authenticated based on the information uploaded to the blockchain.
3.2. Attack Model
- Anonymity and Unlinkability: During the authentication process between vehicles and RSUs, the identity of the vehicle is confidential, and the RSUs cannot obtain it. Even if RSUs or adversaries acquire the vehicle’s authentication information, they cannot track the vehicle’s activities or infer the vehicle’s real identity from this information.
- Traceability: If a vehicle engages in illegal activities, the TA (Trusted Authority) can trace and reveal the vehicle’s real identity information.
- Forward Secrecy: Even if attackers possess the keys for the current session, they cannot obtain information from previous sessions.
- Resistance to Replay Attacks: Attackers cannot pass identity verification by sending expired authentication information of the vehicle.
- Collusion Attack: Multiple attackers cannot deduce the TA’s key from the registration or authentication information.
- Impersonation Attack: Even if attackers can obtain a vehicle’s authentication information, they cannot simulate legitimate authentication information to authenticate.
3.3. Elliptic Curve Cryptography (ECC)
- Elliptic curve discrete logarithm (ECDL) problem: Select the points Q and P that satisfy on the elliptic curve E (P is the generator of ); it is hard to find a when Q and P are given.
- Elliptic curve computational Diffie–Hellman assumption (ECCDH) problem: Select the points and P that satisfy and on the elliptic curve E (P is the generator of ); it is hard to compute when and P are given.
- Elliptic curve decisional Diffie–Hellman assumption (ECDDH) problem: Select the points and P that satisfy , and on the elliptic curve E (P is the generator of ); it is hard to determine whether when and P are given.
3.4. Zero-Knowledge Proof
4. Our Scheme
4.1. System Initialization
- The TA generates an additive group G on a elliptic curve E with prime order q and generator P.
- The TA random chooses as it’s private key and calculates as a public key. Then, the TA constructs a secure one-way hash function , where .
- The TA randomly chooses as a private key and computes as a public key for . The TA sends to , where the public key is public, and the private key is private to the .
- The TA sets the visibility of the parameters, where is public, and the private key is private.
4.2. Registration
- The vehicle encrypts its own vehicle (which is only known to the vehicle itself) with the public key of the TA by computing and . Then, sends , to TA.
- The TA computes to obtain the .
- The TA randomly chooses and computes , and and records in its database. Then, the TA sends to .
- computes . Then, it verifies . If the verification is successful, computes as its partial private key for initial authentication.
4.3. Initial Authentication
- first generates a random number and computes and . Then, transmits to for authentication.
- After receiving the authentication request and parameters sent by , first checks . If , the continues to authenticate; otherwise, it terminates this authentication. Note that is the current timestamp and is a predefined maximum transmission delay.
- computes and verifies and . If the verification is successful, is considered to be legal; otherwise, the authentication fails.
- After a successful authentication, randomly selects and calculates and , where is used as the session negotiation key between and for later communication, and n is the parameter to be used by in the next authentication. Then, computes and transmits to . is used as the negotiation key for the between and .
- uploads to the blockchain, where is equal to the R sent by the TA to . The parameter refers to the current state of the vehicle, such as legal and illegal. Then, the ledger will be updated among the RSUs through the PBFT consensus algorithm.
- After receives the parameters sent back by , it also checks first and then calculates and verifies . is used as the negotiation key for . If this equation holds, it indicates that the parameters have not been tampered with during the transmission process, and the parameter n can be used in the next authentication.
4.4. Re-Authentication
- The vehicle uses the parameter n sent by after the last authentication to calculate and send the to .
- checks and retrieves the transaction from the blockchain. Thereafter, computes and verifies .
- If the verification is successful, randomly chooses and computes . Then, transmits to .
- The uploads to the blockchain; note that is consistent with the uploaded by the previous RSU.
- checks first and then calculates and verifies .
4.5. Tracing and Revocation
5. Security Analysis
5.1. Correctness
5.2. Formal Security Analysis
- Setup(): When queries this oracle, generates the system parameters, and randomly selects P and q as the generator and order of group G. Subsequently, randomly selects a secret value as the TA’s key and computes the public key . At last, returns all the parameters except to . Meanwhile, maintains four lists, , , , and , which are initially empty.
- ExtractPublicKey(VID): When calls this query, first queries whether the list contains corresponding ; if it does contain them, then sends to . Otherwise, randomly selects and and sets , and . adds and to and separately. Then, returns to .
- : When queries this oracle, first looks up its list . If the entry exist, sends to ; otherwise, calls ExtractPublicKey(VID) and sends to .
- : When queries this oracle, first looks up its list . If the entry exist, sends to ; otherwise calls ExtractPublicKey(VID) (inserts into in this query) and sends to .
- ExtractSecretValue(VID): In this query, searches to find and the corresponding secret value x. If does not exist, searches after executing the ExtractPublicKey(VID) query and returns an appropriate x to .
- ExtractPartialPrivateKey(VID): When receives ExtractPartialPrivateKey(VID) from for , first checks whether holds, and if it holds, aborts. Otherwise, queries list and finds . If the query does not include it, calls ExtractPublicKey(VID) and returns to .
- ReplacePublicKey(VID, x, X, ): When calls this query, searches with to find the corresponding . If this query exists in , will replace the user’s original and x with and . If is not in , then outputs an unknown value ⊥. The -I attacker can invoke this query to replace the of the challenged vehicle.
- ExtractProof(VID): When receiving this query from regarding , determines whether holds, and if it holds, the challenger maintains a list containing . If the queried is not previously created, obtains from the list . Then, calculates and adds to . Finally, returns to .
- ForgeProof(): In this query, we assume that successfully establishes legitimate authentication parameters such that the following equation holdsAccording to the above equation, we derive it as follows:Further, by selecting a different and repeating the above process, we haveUsing the above equation, we derive the following derivation:According to the above equation, we can calculate . However, this contradicts the ECDLP assumption. Therefore, assuming that the ECDLP is difficult, we propose that the scheme is insurmountable against an type-I adversary in the ROM.
5.3. Simulation Based on ProVerif Tool
- TARegVu (bitstring): th TA registers the vehicle.
- VuAcTA (bool): The vehicle checks the information sent by the TA.
- RsuAcVu (bool): The RSU successfully authenticates the vehicle in the initial authentication phase.
- RSUReacVu (bool): The RSU successfully authenticates the vehicle in the re-authentication phase.
- VuAcRSU (bool): The vehicle successfully authenticates the RSU.
- TAEnd ( ): The TA completes the proposed protocol.
- VuEnd ( ): The vehicle completes the proposed protocol.
- RSUEnd ( ): The RSU completes the proposed protocol.
5.4. Informal Security Analysis
- MITM Attack: According to the model defined in this article, the user transmits the message over an insecure channel, so the adversary can intercept the message of the user’s transmission. In the registration phase and the initial authentication phase, the adversary can intercept , etc. We protect the utilizing the ECDHP. Similarly, the adversary fails to acquire r and x from R and X because of the ECDL problem. In this way, the private keys of the TA and vehicle, utilized for authentication, remain hidden from adversaries. In the re-authentication phase, due to the ECDDH and ECCDH difficulty problems of the elliptic curve, the adversary cannot obtain the parameters used by the vehicle user for authentication next time after intercepting the , and E parameters.
- Anonymity and Unlinkability: According to the above analysis, the adversary cannot obtain the and private key used in the authentication through the insecure channel. Furthermore, the private key used for subsequent authentication is generated by the RSU after the last authentication is completed, and the message sent by each authentication is different. Consequently, the anonymity and unlinkability of the vehicle are guaranteed in the NBP.
- Traceability and Revocability: In the BPA, parameter R assumes a crucial role in the authentication process. This parameter corresponds to the genuine identity of the vehicle and is recorded by the TA. And the TA can track a vehicle based on this parameter. Meanwhile, the RSU can upload the vehicle revocation transaction to the blockchain, indicating that the vehicle has been revoked. Therefore, the BPA satisfies the traceability and revocable requirements.
- Replay Attack: In the BPA, the initial authentication phase and re-authentication phase both use timestamps and to indicate the information sending time, respectively. When the RSU and vehicle receive a message from each other, they first verify the validity of the timestamp. In addition, in the timestamp of and are protected by , elliptic curve mathematical difficulties, and the XOR operation, so that the adversary cannot replace the timestamp. Once the adversary replaces the timestamp, the message cannot be verified.
- Impersonation Attack: In the BPA, it is impossible for an illegal vehicle to impersonate a legitimate vehicle for authentication. In the registration phase, the vehicle uses the public key of the TA and encrypts using ElGamal encryption with an elliptic curve, and only the TA can decrypt it using the private key . When the TA sends the to the vehicle, the private key of the vehicle is encrypted using . Since the vehicle is known only to the vehicle and TA, the adversary cannot obtain the . In the authentication phase, the vehicle uses random numbers to encrypt the private key . In the re-authentication phase, the RSU and the vehicle share the next authentication private key of the vehicle with their own private key and secret number, respectively. Therefore, the adversary cannot create a valid authentication message or by intercepting the message sent by the vehicle. The BPA can prohibit simulated attacks.
- Session Fixation Attack: A session fixation attack is the use of fixed parameters present in messages sent by communicating parties to hijack other sessions or simulate other objects [5]. In the BPA, all parameters in each authentication message are different, and there are no fixed parameters, so adversaries cannot hijack other sessions or simulate other objects, and the BPA is resistant to session fixation attacks.
- Forward Secrecy: In the BPA, it is assumed that the adversary obtains the current session key, but the random numbers n and m are only used once in the current session, and they updated after each identity authentication to ensure that each secret is fresh in the current session, so the adversary cannot obtain the previous information, ensuring forward security.
- Colluding Attack Resistance: In the proposed scheme, a collusion attack refers to multiple illegal/compromised vehicles colluding together to obtain the TA key . The TA sends the key to the vehicle in the registration phase, and the vehicle can decrypt through its own . However, there is an unknown number r in this parameter, and the vehicle cannot obtain r through R due to the ECDHP. At the same time, the r of each vehicle is different, so and r are unknown to the adversary, and the cannot be obtained. Our scheme is resistant to colluding attacks.
6. Performance Analysis
6.1. Security Feature Comparison
6.2. Computational Costs
6.3. Communication Costs
7. Open Challenges and Future Research Directions
8. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Dong, Z.; Jing, C.; Guo, R.; Gao, S.; Wang, L. A Traceable Blockchain-Based Access Authentication System with Privacy Preservation in VANETs. IEEE Access 2019, 7, 117716–117726. [Google Scholar]
- Liu, X.; Huang, H.; Xiao, F.; Ma, Z. A Blockchain-Based Trust Management with Conditional Privacy-Preserving Announcement Scheme for VANETs. IEEE Internet Things J. 2020, 7, 4101–4112. [Google Scholar] [CrossRef]
- Contreras-Castillo, J.; Zeadally, S.; Guerrero-Ibañez, J.A. Internet of Vehicles: Architecture, Protocols, and Security. IEEE Internet Things J. 2018, 5, 3701–3709. [Google Scholar] [CrossRef]
- Aman, M.; Javaid, U.; Sikdar, B. A Privacy-Preserving and Scalable Authentication Protocol for the Internet of Vehicles. IEEE Internet Things J. 2020, 8, 1123–1139. [Google Scholar] [CrossRef]
- Xu, Z.; Liang, W.; Li, K.; Xu, J.B.; Jin, H. A Blockchain-Based Roadside Unit-Assisted Authentication and Key Agreement Protocol for Internet of Vehicles. J. Parallel Distrib. Comput. 2021, 149, 29–39. [Google Scholar] [CrossRef]
- Li, J.T.; Li, Y.F.; Cao, C.H.; Lam, K.-Y. Conditional Anonymous Authentication with Abuse-Resistant Tracing and Distributed Trust for Internet of Vehicles. IEEE Internet Things J. 2022, 9, 8749–8762. [Google Scholar] [CrossRef]
- Lin, C.; Huang, X.Y.; He, D.B. EBCPA: Efficient Blockchain-Based Conditional Privacy-Preserving Authentication for VANETs. IEEE Trans. Dependable Secur. Comput. 2023, 20, 1818–1832. [Google Scholar] [CrossRef]
- Wang, S.B.; Yao, N.M. LIAP: A Local Identity-Based Anonymous Message Authentication Protocol in VANETs. Comput. Commun. 2017, 112, 154–164. [Google Scholar] [CrossRef]
- Zhou, X.T.; He, D.B.; Khan, M.K.; Wu, W.; Choo, K.R. An Efficient Blockchain-Based Conditional Privacy-Preserving Authentication Protocol for VANETs. IEEE Trans. Veh. Technol. 2023, 72, 81–92. [Google Scholar] [CrossRef]
- Fei, W.; Xu, Y.J.; Zhang, H.W.; Zhang, Y.J.; Zhu, L.H. 2FLIP: A Two-Factor Lightweight Privacy-Preserving Authentication Scheme for VANET. IEEE Trans. Veh. Technol. 2015, 65, 896–911. [Google Scholar]
- Li, J.L.; Ji, Y.S.; Kim-Kwang, R.C.; Dieter, H. CL-CPPA: Certificate-Less Conditional Privacy-Preserving Authentication Protocol for the Internet of Vehicles. IEEE Internet Things J. 2019, 6, 10332–10343. [Google Scholar] [CrossRef]
- Wang, P.; Chen, C.M.; Saru, K.; Mohammad, S.; Rahim, T. HDMA: Hybrid D2D Message Authentication Scheme for 5G-Enabled VANETs. IEEE Trans. Intell. Transp. Syst. 2021, 22, 5071–5080. [Google Scholar] [CrossRef]
- Huang, H.P.; Zhu, P.; Xiao, F.; Sun, X.; Huang, Q.L. A Blockchain-Based Scheme for Privacy-Preserving and Secure Sharing of Medical Data. Comput. Secur. 2020, 99, 102010. [Google Scholar] [CrossRef] [PubMed]
- Gao, S.; Peng, Z.; Tan, F.; Zheng, Y.Q.; Xiao, B. SymmeProof: Compact Zero-knowledge Argument for Blockchain Confidential Transactions. IEEE Trans. Dependable Secur. Comput. 2022, 20, 2289–2301. [Google Scholar] [CrossRef]
- Raya, M.; Hubaux, J. Securing Vehicular Ad Hoc Networks. J. Comput. Secur. 2007, 15, 39–68. [Google Scholar] [CrossRef]
- Qiu, H.; Qiu, M.; Lu, R. Secure V2X Communication Network based on Intelligent PKI and Edge Computing. IEEE Netw. 2019, 34, 172–178. [Google Scholar] [CrossRef]
- Heng, X.; Qin, S.; Xiao, Y.; Wang, J.; Tao, Y.; Zhang, R. A Strong Secure V2I Authentication Scheme from PKI and Accumulator. In Proceedings of the 2022 2nd International Conference on Consumer Electronics and Computer Engineering (ICCECE), Guangzhou, China, 14–16 January 2022; pp. 98–103. [Google Scholar]
- He, D.; Zeadally, S.; Xu, B.; Huang, X. An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks. IEEE Trans. Inf. Forensics Secur. 2015, 10, 2681–2691. [Google Scholar] [CrossRef]
- Ma, M.; He, D.; Wang, H.; Kumar, N.; Choo, K.K.R. An Efficient and Provably Secure Authenticated key Agreement Protocol for Fog-Based Vehicular Ad-Hoc Networks. IEEE Internet Things J. 2019, 6, 8065–8075. [Google Scholar] [CrossRef]
- Awais, S.M.; Yucheng, W.; Mahmood, K.; Kharel, R. Comments on “An Efficient and Provably Secure Authenticated Key Agreement Protocol for Fog-Based Vehicular Ad-Hoc Networks”. In Proceedings of the 2023 IEEE 6th International Conference on Electronics and Communication Engineering (ICECE), Xi’an, China, 15–17 December 2023; pp. 229–233. [Google Scholar]
- Tabany, M.; Syed, M. A Lightweight Mutual Authentication Protocol for Internet of Vehicles. J. Adv. Inf. Technol. 2024, 15, 155–163. [Google Scholar] [CrossRef]
- Chen, Y.; Chen, J. CPP-CLAS: Efficient and Conditional Privacy-Preserving Certificateless Aggregate Signature Scheme for VANETs. IEEE Internet Things J. 2021, 9, 10354–10365. [Google Scholar] [CrossRef]
- Xu, Z.; Wang, L.; Luo, Y.; Long, Y.; Zhang, K.; Yan, H.; Chen, K. A Security-Enhanced Conditional Privacy-Preserving Certificateless Aggregate Signature Scheme for Vehicular Ad-Hoc Networks. IEEE Internet Things J. 2023, 11, 13482–13495. [Google Scholar] [CrossRef]
- Kamil, I.A.; Ogundoyin, S.O. An Improved Certificateless Aggregate Signature Scheme without Bilinear Pairings for Vehicular Ad Hoc Networks. J. Inf. Secur. Appl. 2019, 44, 184–200. [Google Scholar] [CrossRef]
- Zhao, Y.; Hou, Y.; Wang, L.; Kumari, S.; Khan, M.K.; Xiong, H. An Efficient Certificateless Aggregate Signature Scheme for the Internet of Vehicles. Trans. Emerg. Telecommun. Technol. 2020, 31, e3708. [Google Scholar] [CrossRef]
- Han, Y.; Song, W.; Zhou, Z.; Wang, H.; Yuan, B. eCLAS: An Efficient Pairing-Free Certificateless Aggregate Signature for Secure VANET Communication. IEEE Syst. J. 2021, 16, 1637–1648. [Google Scholar] [CrossRef]
- Zheng, H.; Luo, M.; Zhang, Y.; Peng, C.; Feng, Q. A Security-Enhanced Pairing-Free Certificateless Aggregate Signature for Vehicular Ad-Hoc Networks. IEEE Syst. J. 2022, 17, 3822–3833. [Google Scholar] [CrossRef]
- Amar, A.R.; Rabi, N.M.; Felix, G.H. Adaptive Group-Based Zero Knowledge Proof-Authentication Protocol in Vehicular Ad Hoc Networks. IEEE Trans. Intell. Transp. Syst. 2020, 21, 867–881. [Google Scholar]
- Xi, N.; Li, W.; Jing, L.; Ma, J. ZAMA: A ZKP-Based Anonymous Mutual Authentication Scheme for the IoV. IEEE Internet Things J. 2022, 9, 22903–22913. [Google Scholar] [CrossRef]
- Varma, I.M.; Kumar, N. ZKP-Based Lightweight Authentication Protocol during Handovers in Vehicular Networks. In Proceedings of the GLOBECOM 2023—2023 IEEE Global Communications Conference, Kuala Lumpur, Malaysia, 4–8 December 2023; pp. 868–873. [Google Scholar]
- Meng, X.; Xu, J.; Liang, W.; Xu, Z.; Li, K. A Lightweight Anonymous Cross-Regional Mutual Authentication Scheme using Blockchain Technology for Internet of Vehicles. Comput. Electr. Eng. 2021, 95, 107431. [Google Scholar] [CrossRef]
- Wang, C.; Shen, J.; Lai, J.; Liu, J. B-TSCA: Blockchain Assisted Trustworthiness Scalable Computation for V2I Authentication in VANETs. IEEE Trans. Emerg. Top. Comput. 2021, 9, 1386–1396. [Google Scholar] [CrossRef]
- Xie, Q.; Ding, Z.; Tang, W.; Tan, X. Provable Secure and Lightweight Blockchain-Based V2I Handover Authentication and V2V Broadcast Protocol for VANETs. IEEE Trans. Veh. Technol. 2023, 12, 72. [Google Scholar] [CrossRef]
- Tao, Q.; Ding, H.; Jiang, T.; Cui, X. B-DSPA: A Blockchain-Based Dynamically Scalable Privacy-Preserving Authentication Scheme in Vehicular Ad-hoc Networks. IEEE Internet Things J. 2023, 11, 1385–1397. [Google Scholar] [CrossRef]
- Zhang, J.; Cui, J.; Zhong, H.; Chen, Z.; Liu, L. PA-CRT: Chinese Remainder Theorem based Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-hoc Networks. IEEE Trans. Dependable Secur. Comput. 2019, 18, 722–735. [Google Scholar] [CrossRef]
- Wang, W.; Xu, H.; Alazab, M.; Gadekallu, T.; Han, Z.; Su, C. Blockchain-Based Reliable and Efficient Certificateless Signature for IIoT Devices. IEEE Trans. Ind. Inform. 2022, 18, 7059–7067. [Google Scholar] [CrossRef]
- Shen, M.; Lu, H.; Wang, F.; Liu, H.; Zhu, L. Secure and Efficient Blockchain-Assisted Authentication for Edge-Integrated Internet-of-Vehicles. IEEE Trans. Veh. Technol. 2022, 71, 12250–12263. [Google Scholar] [CrossRef]
- Feng, Q.; He, D.; Zeadally, S.; Liang, K. BPAS: Blockchain-Assisted Privacy-Preserving Authentication System for Vehicular Ad Hoc Networks. IEEE Trans. Ind. Inform. 2020, 16, 4146–4155. [Google Scholar] [CrossRef]
Notation | Meaning |
---|---|
i-th vehicle | |
j-th and k-th RSU | |
i-th vehicle’s id | |
G | additive cyclic group |
P | generator of G |
private key of TA | |
public key of TA | |
private keys of and | |
public keys of and | |
timestamp (i = 1, 2, 3,...) | |
hash function | |
⊕ | exclusive OR operation |
‖ | concatenation operation |
maximum transmission delay |
Authentication | Anonymity | Unlinkability | Traceability | Revocable |
---|---|---|---|---|
ZAMA [29] | √ | √ | √ | √ |
B-TSCA [32] | √ | × | √ | √ |
Amar’s scheme [28] | √ | √ | × | × |
SEA [37] | √ | × | × | × |
BPAS [38] | √ | × | √ | √ |
BPA | √ | √ | √ | √ |
Abbreviations | Operations | Time (ms) |
---|---|---|
Elliptic curve point multiplication operation | 0.2330 | |
Elliptic curve point addition operation | 0.2330 | |
Elliptic curve point subtraction operation | 0.0162 | |
Modular multiplication operation | 0.0031 | |
Modular addition operation | 0.2330 | |
Modular division operation | 0.0169 | |
Modular exponentiation operation | 0.0931 | |
SHA-256 hash operation | 0.0055 | |
Ellipse curve encryption operation | 1.0741 | |
Ellipse curve decryption operation | 0.4780 | |
Bilinear pairing operation | 4.7559 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Li, J.; Lin, Y.; Li, Y.; Zhuang, Y.; Cao, Y. BPA: A Novel Blockchain-Based Privacy-Preserving Authentication Scheme for the Internet of Vehicles. Electronics 2024, 13, 1901. https://doi.org/10.3390/electronics13101901
Li J, Lin Y, Li Y, Zhuang Y, Cao Y. BPA: A Novel Blockchain-Based Privacy-Preserving Authentication Scheme for the Internet of Vehicles. Electronics. 2024; 13(10):1901. https://doi.org/10.3390/electronics13101901
Chicago/Turabian StyleLi, Jie, Yuanyuan Lin, Yibing Li, Yan Zhuang, and Yangjie Cao. 2024. "BPA: A Novel Blockchain-Based Privacy-Preserving Authentication Scheme for the Internet of Vehicles" Electronics 13, no. 10: 1901. https://doi.org/10.3390/electronics13101901