Due to the special nature of power communication, HPLC (High Power Line Carrier) communication technology faces many challenges, such as channel interference, transmission bandwidth limitations, transmission distance ...
详细信息
Improved advancements in 5G communication and intelligent connected vehicle technologies have accelerated the implementation of intelligent transportation systems. Intelligent vehicles, roadside devices, and open wire...
详细信息
Improved advancements in 5G communication and intelligent connected vehicle technologies have accelerated the implementation of intelligent transportation systems. Intelligent vehicles, roadside devices, and open wireless communication networks collectively expand the vulnerability landscape of intelligent transportation system (ITS) security, thereby increasing the potential exposure to security risks. Nonetheless, mobile vehicles require frequent authentication with Roadside Units (RSUs), which in turn results in substantial computational and communication overhead. Consequently, this approach leads to performance bottlenecks in resource-constrained On-Board Units (OBUs). In this paper, we are concerned with a lattice-based certificateless secure datatransmission scheme for the Internet of Vehicles (IoV) based on Blockchain. The proposed protocol incorporates identity authentication functionality and effectively integrates the cross-domain authentication characteristics of the Blockchain. Initially, the Trusted Authority (TA) uploads the registration information of vehicles onto the Blockchain to verify the authenticity of a vehicle's identity by examining the data stored in the Blockchain. When Roadside Units securely collect authenticated transactions and message transmission traffic, the integrity of the messages is ensured through the utilization of the lattice-based signcryption algorithm as part of a block. Subsequently, according to the data transmission algorithm, these partial blocks are transformed into complete blocks and disseminated across the entire network. The complete blocks were subsequently mined using a consensus algorithm that incorporated a voting mechanism. Furthermore, the security of the proposed protocol is rigorously proven by employing a random oracle model. Finally, the efficiency of the data transmission algorithm was rigorously evaluated under the Barabasi-Albert BA (3) and Erdos-Renyi ER (0,1) models, ensuring its effectiveness in
暂无评论