1-s2.0-S2214209624001074-main
1-s2.0-S2214209624001074-main
1-s2.0-S2214209624001074-main
Vehicular Communications
journal homepage: www.elsevier.com/locate/vehcom
A R T I C L E I N F O A B S T R A C T
Keywords: With the prevalence of intelligent driving, the vehicular data corresponding to driving safety and traffic
Internet of Vehicles (IoV) management efficiency is widely applied by the Internet of Vehicles (IoV) applications. Vehicular data is shared
Blockchain frequently in IoV, leading to privacy leakage of the message sender, yet most privacy-preserving measures bring
Conditional privacy-preserving authentication
difficulties for receivers to detect malicious messages. To trade-off between privacy and security, conditional
(CPPA)
Key derivation algorithm
privacy-preserving authentication (CPPA) solutions have been proposed. However, CPPA protocols deployed in
IoV rely on hardware devices or center servers to manage key generation and updates. This paper proposed
a blockchain-based CPPA mechanism for IoV data-sharing to mitigate these challenges. A hierarchical key
generation mechanism is presented to protect drivers’ privacy and authenticate messages which is suitable for
resource-limited IoV nodes. Management nodes can issue temporary pseudo-identity (PID) from their keys for
vehicles to interact in their area and trace the malicious behaviors, but know nothing about vehicles’ activities
outside their administration. A hierarchical and zonal blockchain is presented to realize distributed fine-grained
IoV management and enhance efficiency concerning traditional blockchain. Specifically, we propose a cross-
domain data-sharing mechanism, which can facilitate efficient communication and a mutual cross-domain chain
verification to guarantee the security of each domain blockchain in our IoV system. The security analysis and
performance evaluation demonstrate the security as well as computational and storage efficiency of our scheme.
1. Introduction in vehicle services and the expansion of vehicular network coverage, the
existing IoV framework is of privacy and security concerns in handling
The development of the smart automotive industry and information all data.
technology has led to widespread attention to the increasing traffic data A typical IoV system mainly consists of a Trusted Authority (TA),
[11]. Data collected by the vehicles’ on-board devices during driving, RSUs, and vehicles sharing real-time traffic information through wired/
combined with Global Positioning System information such as speed, wireless networks. Despite TA that is responsible for taking appropri-
location, weather, and road conditions, can be shared through the IoV ate actions based on traffic information obtained from other entities,
with other nodes, including other vehicles, roadside units (RSU), service public wireless communication in Vehicle-to-Vehicle (V2V) and Vehicle-
providers, and the traffic authority. This enables autonomous driving to to-Roadside (V2R) scenarios makes the transmitted data vulnerable to
enhance driving safety and convenience according to traffic conditions, attackers that impact traffic safety [6]. Malicious vehicles may also share
ultimately improving travel efficiency [20]. However, with the increase false information, misguiding others and affecting traffic security. To
✩
This work was supported in part by the National Key R&D Program of China (2021YFB2700200), National Natural Science Foundation of China (62102017,
62001055, 62372020, 61972017, 61932014, 61972018), Beijing Natural Science Foundation (L222050, M22038), and in part by the Fundamental Research Funds
for the Central Universities (YWF-23-L-1240).
* Principal corresponding author.
** Corresponding author.
E-mail addresses: zhouziyu@buaa.edu.cn (Z. Zhou), nawang@buaa.edu.cn (N. Wang), liujianwei@buaa.edu.cn (J. Liu), 19377014@buaa.edu.cn (W. Zhou),
fujs@bupt.edu.cn (J. Fu), denglunzhi@163.com (L. Deng).
https://doi.org/10.1016/j.vehcom.2024.100832
Received 3 March 2024; Received in revised form 9 July 2024; Accepted 20 July 2024
Available online 26 July 2024
2214-2096/© 2024 Elsevier Inc. All rights are reserved, including those for text and data mining, AI training, and similar technologies.
Z. Zhou, N. Wang, J. Liu et al. Vehicular Communications 49 (2024) 100832
prevent malicious vehicles from sharing false information, message au- 1. The CPPA supporting key generation mechanism: This paper in-
thentication needs to be taken into consideration. Yet the transmitted troduces a hierarchical key generation mechanism to achieve con-
data may contain sensitive information, such as car numbers, locations, ditional privacy-preserving for the IoV context. Vehicles can arbi-
and personal information about drivers, privacy-preserving measures trarily interact with different pseudo-identities in various domains,
are required to prevent privacy breaches. The complexity of the IoV ensuring anonymity and the privacy of sensitive information. Even
structure makes it challenging to strike a balance between effectively if an adversary gains complete control over a particular node, the
ensuring vehicle privacy and efficiently monitoring malicious vehicle data accessible to the adversary is limited, ensuring data security.
behavior. Thus conditional privacy-preserving authentication (CPPA) Meanwhile, malicious behaviors are traceable to ensure the mes-
is necessary to guarantee traffic security as well as preserve privacy. sage reliability and all behaviors of a certain adversary can be
Data encryption and anonymous identities are introduced to protect filtered avoiding further loss.
senders’ privacy and transmitted content, meanwhile, adversaries can be 2. Blockchain for efficient IoV distributed management: The hierarchi-
detected [16]. However, existing CPPA protocols [18,36,25] deployed cal and zonal blockchain designed in this paper relieves the depen-
in IoV impose certain requirements on the storage and computational dence on a central server and realizes the distributed hierarchical
identity authentication in the IoV system. The Vehicle temporarily
capabilities of vehicles that rely on onboard trusted devices. In pseudo-
registered in a particular domain, is managed by the corresponding
identity schemes, a center server is also required to manage key gener-
domain chain. This blockchain framework enhances the efficiency
ation and updates.
of pseudo-identity issues and data retrieval in various domains, as
The IoV systems using reputation evaluation trust management only
well as reduces the computational and storage overhead for an IoV
to enhance the credibility of IoV data [1,4], are struggling to meet the
node that participates in blockchain maintenance.
demands of multi-domain, hierarchy entities, and a large amount of re-
3. Cross-domain secure data sharing and verification mechanism: Ve-
dundant information in IoV data sharing. Moreover, the processing of
hicle nodes can obtain traffic information from other domains
a large amount of IoV data imposes high storage and computational re- through the proposed cross-domain data interaction mechanism.
quirements on a standalone central server, and the reliance on it puts This mechanism enables vehicles to quickly access data from other
the system has risk of a single point of failure (SPOF). To avoid the risk domains with the assistance of Roadside Units (RSUs) securely,
of a centralized system, multiple servers are introduced, combined with thereby improving data availability and reducing storage overhead.
RSUs, for distributed management of IoV data and vehicle credibility Moreover, a mutual cross-domain chain verification mechanism for
to resist threats from SPOF [27]. Nevertheless, the distributed system security is presented to increase the cost of blockchain attack, where
has the challenge of view unification among multiple servers. As some the adversary has to conquer all domain chains to overwrite the
servers may be subject to intrusion or collusion, the authenticity of IoV data in a certain chain.
data cannot be fully guaranteed and the investigation of traffic accidents
is not transparent. Blockchain consensus [21,30] enables decentralized 2. Related work
nodes that do not trust each other to reach a consensus on a public
ledger. It has been widely introduced to distributed networks [2,13] to 2.1. Conditional privacy-preserving authentication for the IoV system
ensure the integrity, tamper resistance, and traceability of ledger data
through cryptographic techniques. Integrating blockchain technology Despite the existing various IoV privacy-preserving solutions [35,22]
with IoV [32] allows participating nodes to share and store traffic in- can safeguard personal information in data interactions, these solutions
formation without dependence on a single server. However, unlike the face challenges in fully protecting privacy while tracing the behaviors of
Internet of Things with fixed nodes, mobile IoV has a dynamic topology malicious vehicles. The key to IoV privacy-preserving is to ensure that
where the vehicles should keep connecting with servers while moving vehicle messages are authentic and reliable without revealing driver pri-
arbitrarily. Directly introducing blockchain protocols into existing IoV vacy, that is authorities should be able to trace driver responsibility
systems may exert a node too much pressure to store a large amount through data and other nodes know nothing about the drivers’ pri-
of irrelevant blockchain data and incur additional computational over- vacy. Early privacy-preserving authentication schemes for vehicles [23]
head. always preload a large number of public/private key pairs and corre-
To address the above issues, it is necessary to design a decentralized sponding certificates into onboard devices. When vehicles share their
IoV framework and introduce a conditional privacy-preserving authenti- status, a random public/private key pair is chosen for signature veri-
fication, achieving anonymous authentication to hide the real identity
cation scheme, allowing the TA to effectively trace malicious behaviors
of vehicles, and authorities can trace vehicle data based on certificates.
without revealing sensitive information of other nodes, where multiple
However, vehicles needed to regularly update anonymous key sets, and
supervisors and regular nodes can be involved in assistant management.
there were significant storage and revocation costs for both vehicles and
To enhance the efficiency of IoV blockchain management and reduce the
relevant institutions [16].
data maintenance overhead of individual nodes, this paper proposes a
For the sake of reducing the cost of key sets update, Zhang et al.
hierarchical zonal IoV blockchain architecture. The upper-level architec-
[37] proposed a CPPA scheme based on the Chinese Remainder Theo-
ture consists of high-reputation representative nodes from each domain,
rem where the trusted authority regularly updated new group keys for
collectively maintaining a global blockchain managing the identity and
vehicles in VANET groups. However, this scheme requires the TA to
credibility of all IoV nodes, recording important traffic data, and stor- constantly update keys based on the situation of vehicles entering and
ing lower-level data digests. The lower-level zonal architecture includes leaving specific areas, leading to substantial communication overhead.
multiple domains, each maintained by lower-level nodes managing their Zhao et al. [39] presented an efficient privacy-preserving authentica-
local blockchains, which store real-time traffic data details in the respec- tion scheme for VANETs based on the Paillier cryptosystem, where the
tive domains and the temporary identity information of active nodes in update of PIDs and tracking of malicious vehicle identities require coor-
the current domain. A hierarchical key generation management mech- dination among multiple organizations. However, these schemes rely on
anism is proposed for the above architecture to achieve conditional tamper-proof devices, such that vehicles need to carry specific hardware
privacy-preserving. In the context of data sharing, nodes without cor- devices for certification computing and storage.
responding permissions are unable to access any private information To mitigate the reliance on onboard devices. Gu et al. [7] proposed
about the data sender. Authorized nodes have the capability to track a vehicle traceable privacy-preserving scheme based on fog computing,
and penalize malicious nodes. The main contributions are summarized combining fog computing and secret sharing technology to hide and
as follows: identify vehicle identities. However, the scheme requires collaboration
2
Z. Zhou, N. Wang, J. Liu et al. Vehicular Communications 49 (2024) 100832
among a certain number of fog servers to trace vehicles, leading to sig- Table 1
nificant communication and computation costs. Ullah et al. [28] used Notation Descriptions.
Hyperelliptic Curve Cryptography to build a heterogeneous signcryp-
Notations Descriptions
tion scheme providing CPPA for VANETs. It utilizes a key generation
center to generate keys, and roadside units know the real identity of 𝑇𝐴 Trusted authority
vehicles. Considering the multiple cloud servers in IoV, Cui et al. [3] 𝐷𝑀 Domain manager
designed a CPPA scheme to meet the diverse service requirements in 𝑅 Roadside units (RSUs nodes)
VANETs. But it needs a single trusted authority as a hub for vehicle regis- 𝑣 Vehicle nodes
tration and service scheduling, and the elliptic curve PID is generated by 𝑚 Parameter for key derivation
vehicles, placing computational demands on them. The temporary PID 𝐺𝐶 Global blockchain
generation in the aforementioned studies mostly relies on a center for 𝐿𝐶𝑖 Local blockchain of domain 𝑖
key generation, leading to significant operational and maintenance costs 𝐶𝑖 Blockchain of node 𝑖
for a single server which has a risk of a single point of failure. Trusted 𝐼𝐷𝑖 The unique identity of node 𝑖
authorities also have opaque operations, posing the risk of unfair ac-
𝑃 𝐼𝐷𝑖 The temporary pseudo-identity of node 𝑖
countability in case of incidents. Moreover, they lack a pseudo-identity
(𝑑, 𝑄) Key pair
update mechanism, each vehicle’s real identity corresponds to only one
𝐻(⋅) Hash computation
pseudo-identity, posing privacy leakage risks in subsequent interactions.
𝑆𝑖𝑔𝑛𝑜𝑑𝑒 Message signature of 𝑛𝑜𝑑𝑒
𝑠𝑙𝑗 Slot 𝑗
2.2. Blockchain for IoV privacy-preserving
𝑠𝑒𝑒𝑑 Random number seed of key
𝜆𝑖 Block issue parameter of domain 𝑖
To address the limitations of IoV systems that rely on a single institu-
𝜖 Malicious punishment parameter
tion to manage vehicles and centralized generate key pairs, an increasing
𝜖′ Inactive punishment parameter
number of studies are turning to distributed measures for vehicle man-
𝜁 Award parameter
agement [10]. Many blockchain-based schemes have been proposed to
ensure decentralized privacy-preserving in IoV systems to achieve public
censorship and immutability of transportation data [26,34]. Gupta et al.
[8] analyzed the security and privacy issues in connected autonomous intelligent and fair IoV charging service. Zhang et al. [38] introduce mul-
vehicles and proposed a blockchain-based secure and decentralized ar- tiple blockchains with the cross-chain mechanism into a multidomain
chitecture to mitigate them. Feng et al. [5] proposed a blockchain- IoV system for location-aware verifiable outsourcing data aggregation.
assisted privacy-preserving authentication system, which automatically Data providers of each data domain upload data to the corresponding
provides public key queries to vehicles through a smart contract, but re-
child blockchain. However, in the above work, the blockchains of each
lies on trusted authority to take charge of all key-related work. Zheng
domain are parallel which leaves management issues for data process-
et al. [40] designed an ID-based CPPA protocol using pseudonym tech-
ing.
nology, which has traceable anonymity but faces the challenge of ideal
Considering the different authorities for various nodes in the IoV
hardware requirements and cannot withstand leakage from certificate
system, there exist many works that utilize a double-layer blockchain
issuing agencies. Xie et al. [31] combined symmetric encryption with
architecture to improve the efficiency of blockchain-based IoV data
chameleon hash functions to implement blockchain-based anonymous
management. Kandah et al. [12] introduced a two-layer blockchain trust
cross-domain mutual authentication. Trusted agencies can obtain the
management model composed of platoon blockchains for each platoon
real identity of malicious vehicles through on-chain information com-
and a global blockchain. The platoon blockchains store localized trust
bined with chameleon hash, but the scheme fails to periodically update
values of vehicles, while the global blockchain stores the trust factors of
the PID, potentially leading to privacy leakage of the tracked vehicles.
all vehicles in the system. RSUs use trust-binding consensus to add data
As for PID update, Lu et al. [19] integrated blockchain with Merkle
from the platoon blockchain to the global blockchain. Lee et al. [14]
Patricia Tree to propose a new type of CPPA protocol with efficient
proposed a two layered blockchain-based reputation system in vehicu-
certificate revocation. Still, this protocol requires frequent interactions
lar networks, consisting of one-day message blockchains and a global
between vehicles and certificate-issuing agencies for anonymous certifi-
reputation blockchain, where the reputation of each vehicle is updated
cate generation. Lin et al. [16] proposed a CPPA based on the Ethereum
and permanently stored in the global vehicle reputation blockchain, and
blockchain using smart contracts, but its key generation and revoca-
the one-day message blockchains store local traffic information, with
tion depend on CA invoking smart contracts, leading to on-chain gas
RSUs and vehicles acting as blockchain nodes. Ruan et al. [24] proposed
expenses, and key revocation is initiated by the CA too. If a node needs to
a double-layer blockchain trust management system for vehicular net-
verify the validity of a message, it needs to retrieve all ID index informa-
works, including a vehicle blockchain and an RSU blockchain. Nodes can
tion on the blockchain, which is a costly process. Liu et al. [17] proposed
choose which chain to store messages based on their importance. The
a 5G IoV CPPA scheme based on the Elliptic Curve Diffie-Hellman prob-
vehicle consortium chain temporarily stores unimportant information
lem. It uses a hierarchical pseudo-identity mechanism to protect the
generated by vehicles and deletes it every hour, while the RSU private
vehicles’ real identities while enabling the recovery of the information of
chain stores vehicle trust values and important messages generated us-
malicious vehicles through corresponding pseudo-identities when nec-
ing logistic regression. However, the above studies lack consideration of
essary. However, the EC-based keys are challenging to apply in complex
vehicles’ activities and thus did not provide details on the data interac-
hierarchical IoV systems.
tion between different local chains. Moreover, vehicles can obtain the
information of others from anywhere, posing a risk of privacy leakage.
2.3. Blockchain framework for IoV system
As the large size of the IoV coverage and the highly dynamic net- 3. Problem definition
work topology because of vehicles’ mobility, many studies introduce
multiple blockchains to manage data in different areas with low latency. In this section, we formulate the system model and discuss the secu-
Li et al. [15] let each IoV area independently maintain a blockchain rity model. A summary of the notations used in this article is presented
reducing the internal communication delay of the vehicles to realize in Table 1.
3
Z. Zhou, N. Wang, J. Liu et al. Vehicular Communications 49 (2024) 100832
3.1. System model ers to maintain the global blockchain, managing node registrations,
node reputation values, and significant traffic events. Along with
In the hierarchical IoV scenario, vehicle data is collected and pack- the RSUs and vehicle nodes with additional computational power,
aged by the roadside units in their respective domains. Different domain DMs maintain their domain blockchains, that manage nodes’ in-
managers individually control and manage the behavior of RSUs and formation and traffic events. Moreover, for malicious vehicles dis-
vehicle nodes in the corresponding IoV domains. Due to the frequent seminating false information, DMs can associate and retrieve all
joining and leaving of vehicle nodes in each domain and the data in- messages and footprints published by malicious vehicles, reporting
teraction between different domains, it is necessary to design an appro- them to the global blockchain network for punishment.
priate blockchain framework and data-sharing mechanisms to achieve 3. Road Side Unit: RSUs, serving as roadside infrastructure, are widely
efficiency and security requirements. This paper presents a double-layer distributed along roadways. While their computing and storage ca-
blockchain conditional privacy-preserving IoV framework, as illustrated pabilities are slightly weaker than those of DMs, they still possess
in Fig. 1. The framework consists of entities such as the Trusted Author- significantly greater computing and storage capacity than vehicle
ity (TA), Domain Managers (DMs), Road Side Units (RSUs), and vehicles. nodes. RSUs are crucial in facilitating inter-vehicle communication,
A DM along with the RSUs in its domain, collectively serve as nodes on providing real-time traffic information to vehicles, and offering
the local domain blockchain to share and supervise domain data. As temporary pseudo-identity (PID) registration services for vehicles
data on the local domain blockchain continues to grow, DMs periodi- entering their coverage area. Furthermore, for malicious vehicles
cally broadcast important data summaries and node reputation data to that register at RSUs and exhibit dishonest behavior within their
the global blockchain network. Under the supervision of the TA and the coverage area, RSUs can detect and associate those behaviors, and
collective participation of DMs and some RSUs with high reputations, then report them to DMs for further verification.
critical data within the IoV system is packaged and permanently stored 4. Vehicle: Vehicle nodes constitute the most numerous and essential
on the global blockchain. Only nodes with the corresponding permis- components in the IoV system. They possess limited computing and
sions can access the specific content of the data. A detailed description storage capabilities. Upon joining the IoV, vehicles register at the
of each entity is provided below: TA to obtain a unique identity identifier (ID), which only the TA can
access the specific vehicle owner’s identity information correspond-
1. Trusted Authority: TA is a trustworthy entity with sufficient com- ing to the ID. Each time a vehicle enters a new domain, it registers
puting and storage resources. It is responsible for managing the at the nearest RSU to obtain a temporary PID in the current area.
public keys and certificates of vehicles, DMs, and RSUs. TA directly This PID is used to participate in domain blockchain consensus and
generates keys for DMs and supervises the global blockchain, stor- share messages. Upon entering the next domain, the RSU in that
ing the keys, identities, and important information of all nodes. domain will issue a new PID for the vehicle and deregister the pre-
Additionally, TA can use its master key to trace all transaction in- vious PID from the previous domain.
formation corresponding to the issued subkeys and retrieve the real
identity of the target node from the blockchain. It is the only en- This paper adopts a double-layer blockchain framework for efficient IoV
tity capable of obtaining the complete real identities of all vehicles identity authentication and data management, which includes a global
from intercepted messages and penalizing dishonest nodes. blockchain for storing overall identity information and crucial events
2. Domain Manager: DMs serve as powerful cloud servers within each and local domain blockchains for storing traffic data within specific
domain, authorized by TA to provide registration, authentication, areas. The upper-layer nodes utilize the dynamic PBFT consensus al-
and revocation services for the RSUs under their management. The gorithm on the global blockchain to efficiently package important IoV
entire IoV system is composed of multiple domains, with each DM system data and simultaneously detect malicious nodes. The detection
offering direct or indirect services to the vehicle nodes in its re- of upper-layer consensus participation node crashes can be identified
sponsible area. In the double-layer blockchain architecture, DMs through the forwarded pre-prepare and preparation of data. Once a
act as full nodes in both the global blockchain and their domain Byzantine fault occurs in the upper-layer node, TA will directly penalize
blockchain. They collaborate with other upper-level nodes as min- it and reassess its reputation. Lower-layer nodes maintain their local do-
4
Z. Zhou, N. Wang, J. Liu et al. Vehicular Communications 49 (2024) 100832
main blockchain, using PIDs to protect privacy conditionally. Although blockchain consensus behavior. This could mask violations by vehicles
vehicles are aware of the credibility level and PIDs of nearby vehicles, or selfish mining to gain more block rewards and consensus control.
the overall activities of vehicles are not disclosed to any other nodes. Assuming IoV system nodes may experience two types of faults:
The double-layer blockchain is described as follows: crashes and Byzantine faults. In the event of a crash fault, a node will
cease participating in consensus and stop responding to received mes-
• Global main blockchain (GC): The upper-layer nodes, jointly main- sages. Byzantine attacks may involve RSUs maliciously controlling ve-
tained by TA, DMs, and some highly trusted RSUs, record trust hicle nodes within their coverage area for passive dishonest operations.
values, encrypted violation records, and significant traffic incidents In Byzantine faults, nodes may send incorrect messages, reject message
in the blocks. When a vehicle enters a new domain, it requests a transmission, or send messages out of order. For a Dynamic PBFT con-
temporary PID from the RSU in that area. The RSU, through DM, sensus with 3𝑓 + 1 upper-layer nodes, it can tolerate 𝑓 Byzantine fault
confirms the vehicle’s identity based on the main chain and sub- nodes. For a PoS consensus with 𝑛 domain nodes, it can tolerate 𝑛∕2
sequently issues a PID. When a vehicle is found to have malicious Byzantine nodes.
behavior, the RSU will report it to DM. DM verifies the report based
on the corresponding key and reports it to TA for final confirmation. 3.2.2. Secure requirements
The upper-layer nodes then package and record the information in This paper’s IoV data-sharing scheme needs to meet the following
the global chain block. security requirements:
• Local domain blockchain (DC): The local layer of our system is a
zonal blockchain covering several domains which consist of sev- (a) Message authentication: Entities authorized by TA, such as DMs,
eral local blockchains. Each domain maintains a local domain RSUs, and vehicles, can verify their legitimate entity identities
blockchain, collectively managed by the DM, RSUs, and some vehi- based on the corresponding chains. Messages sent by authenticated
cle nodes within that domain. The blocks in this blockchain record entities can be proven to be correct, with no modifications or forg-
traffic information within the domain and the driving records corre- eries.
sponding to each PID. RSUs provide temporary identity registration (b) Conditional privacy-preserving authentication: Only legitimate re-
services for vehicles, and the temporary registration information is cipients can access the content of messages sent by vehicles, which
stored in the local domain blockchain. The responsible RSU and may contain sensitive information. Except for authorized nodes, no
DM can then access the behavioral information of registered vehi- other entity can obtain the real identity information corresponding
cles. The domain blockchains between different domains can utilize to the data based on the messages sent or intercepted by vehicles.
cross-chain technology to share registration information, and traf- (c) Traceability and unlinkability: TA can trace all activities of mali-
fic data, and facilitate data interaction and service provision among cious nodes, while DMs and RSUs can trace all activities of nodes
vehicles across domains. using a specific temporary PID within their jurisdiction. Except for
TA, DMs, and RSUs can only link multiple messages within their
As shown in Fig. 1, when the vehicle 𝑣 transitions from domain 3 coverage area to the same entity. Other nodes cannot link multiple
to domain 2, it first needs to send a handover request {ℎ𝑎𝑛𝑑𝑜𝑣𝑒𝑟, 𝑃 𝐼𝐷, messages from the same entity in different zones.
𝑑𝑒𝑠𝑡𝑖𝑛𝑎𝑡𝑖𝑜𝑛, 𝑠𝑖𝑔𝑣 } to 𝑅𝑆𝑈{3} in domain 3. Here, 𝑃 𝐼𝐷 is the temporary (d) Blockchain security: Both the global main chain and domain sub-
key used by vehicle 𝑣 in domain 3, 𝑑𝑒𝑠𝑡𝑖𝑛𝑎𝑡𝑖𝑜𝑛 is the target area domain chains can not be taken over that aim to control information records
2 for vehicle 𝑣, and 𝑠𝑖𝑔 is the signature. Subsequently, 𝑅𝑆𝑈{3} will
and achieve double-spending or data tampering.
broadcast the vehicle’s handover message on the domain blockchain in
domain 3 and coordinate with 𝑅𝑆𝑈{2} in domain 2 to assign a new
4. Proposed scheme
temporary key and 𝑃 𝐼𝐷′ for the vehicle in domain 2. At this point,
𝑣 can use the new identity 𝑃 𝐼𝐷′ to participate in the IoV system in
This section begins by presenting a hierarchical key distribution and
domain 2.
temporary PID issuance scheme for entities in the IoV to achieve CPPA.
Following that, a double-layer blockchain consensus mechanism tai-
3.2. Secure model
lored for multi-domain IoV is introduced. Finally, a cross-chain data
interaction mechanism between domains is provided to enable data ex-
3.2.1. Secure assumption
change and service provision for vehicles across different areas.
Assuming TA, as the authenticator of node identities, is entirely
trustworthy, and only TA possesses knowledge of the true identities of
vehicles. TA, DM, and RSU, due to their fixed geographical locations, 4.1. Conditional privacy-preserving authentication
communicate through wired connections which are assumed secure.
RSU and DM, in tracking malicious vehicles, can use their keys to obtain 4.1.1. Hierarchical deterministic wallets
the driving trajectories and communication messages of vehicles within Currently, in many IoV systems, a large number of public/private
their coverage areas. Any entity in the model must strictly protect its key pairs and corresponding certificates need to be preloaded onto the
private keys. onboard devices of vehicles to achieve anonymous identity manage-
System attackers include external attackers and internal attackers. ment. This practice imposes certain demands on the storage space and
External attackers do not directly participate as entities in the IoV but computational capability of vehicles to manage these key pairs and cer-
may act as passive eavesdroppers, monitoring public communication tificates. To avoid that, [16] introduces the key derivation algorithm
channels, and attempting to obtain the real identities of vehicles, their used in the hierarchical deterministic wallets (HD Wallet). HD Wallets
driving trajectories, and encrypted messages. Internal attackers are en- alleviate much of the burden of wallet maintenance by generating a
tities within the IoV, such as vehicles, RSUs, and DMs. They may act pseudo-random sequence of child private keys from a master private
as passive eavesdroppers, monitoring public or secure communication key 𝑑̂, as defined in the Bitcoin Improvement Proposal 32 (BIP32) [9],
channels, attempting to obtain confidential information beyond what treat each child key as a new master private key. This allows the gener-
they are supposed to have initially. They may also collude with mali- ation of new child private key sequences infinitely. Corresponding child
cious vehicles or other corrupted nodes to gain profits, frame honest public keys can be generated by anyone who knows the master public
vehicles conflicting with their interests, or conceal the behavior of ma- key, and the entire hierarchical structure of private keys in the wallet
licious vehicles. For example, they may prevent honest traffic informa- can be recovered from the knowledge of 𝑑̂. HD Wallets possess the mas-
tion from being packaged into the blockchain by engaging in dishonest ter public key property, where users can create and publish a master
5
Z. Zhou, N. Wang, J. Liu et al. Vehicular Communications 49 (2024) 100832
6
Z. Zhou, N. Wang, J. Liu et al. Vehicular Communications 49 (2024) 100832
7
Z. Zhou, N. Wang, J. Liu et al. Vehicular Communications 49 (2024) 100832
Each epoch, TA confirms and broadcasts the digest of stake and tra- to send data that needs to be packaged onto the global blockchain in the
jectory information of each node to the global blockchain, which next epoch into the global chain network. After completing the commit
is then packaged into a block in 𝐺𝐶 by the leader of the global phase, DM sends the global PBFT result and organized data (typically
blockchain in that epoch. For nodes exhibiting malicious behavior, stake update information and important traffic data in the domain it
TA imposes stake penalties. Let 𝑠𝑡𝑎𝑘𝑒𝑛,𝑘 be the stake value of node manages) to TA. TA updates the stake of each node based on the data
𝑛 in the 𝑘-th epoch, and 𝜖 be the penalty factor. The stake of this uploaded by DM and the registration information of nodes. This infor-
node in the next epoch will be updated as follows: mation is signed and included in the content of the next epoch’s block.
After several epochs, TA initiates a view reset with changes in partici-
𝑠𝑡𝑎𝑘𝑒𝑛,𝑘+1 = 𝑚𝑎𝑥(𝑠𝑡𝑎𝑘𝑒𝑛,𝑘 ⋅ (1 − 𝜖), 0) (2) pating nodes in the IoV system. It updates new participating nodes in the
global blockchain based on the past activities of nodes. During the pre-
For nodes that have crashed, such as 𝑅𝑆𝑈 nodes that have been
prepare phase, it designates a new primary node for the next epoch and
inactive for an extended period, if they have not engaged in mes-
attaches information about other participating nodes and the duration of
sage forwarding or key generation tasks for consecutive 𝑙 slots, their
the new epoch. The designated node confirms with other participating
stake will be updated as follows:
nodes through the prepare and commit phases. The DPBFT algorithm is
illustrated in Algorithm 2. TA designates 4𝑓 trusted upper-layer nodes
𝑠𝑡𝑎𝑘𝑒𝑛,𝑘+𝑙 = 𝑚𝑎𝑥(𝑠𝑡𝑎𝑘𝑒𝑛,𝑘 ⋅ (1 − 𝜖 ′ ), 0) (3)
each epoch to participate in PBFT consensus, ensuring the system’s se-
For nodes actively participating in consensus verification and data curity when the number of corrupt nodes is less than 𝑓 . Each round of
sharing, TA will reward them with stake. Their stake for the next consensus execution involves five stages: request, pre-prepare, prepare,
epoch will be: commit, and reply.
𝑠𝑡𝑎𝑘𝑒𝑛,𝑘+1 = 𝑚𝑖𝑛(𝑠𝑡𝑎𝑘𝑒𝑛,𝑘 ⋅ (1 + 𝜁), 1) (4) (a) Request stage: The request command is initiated by TA and directly
sent to the primary node for the current epoch. The request informa-
4.2.2. The upper layer blockchain consensus tion includes the participant node information for the epoch 𝐺(𝐼𝐷),
Our double-layer IoV system employs a double-layer blockchain con- the data digest 𝑥 that needs to be updated, and the epoch number
sensus for data management. In the global permissioned blockchain 𝑒𝑝𝑜𝑐ℎ − 𝑖𝑛𝑖𝑡 = {𝑟𝑒𝑞𝑢𝑒𝑠𝑡, 𝐺(𝐼𝐷), 𝑝𝑒𝑟𝑖𝑜𝑑, 𝑒𝑝𝑜𝑐ℎ, 𝐻(𝑥), 𝑠𝑖𝑔𝑇 𝐴 }. Once
consensus, fixed participants include all DMs and RSUs selected by the primary node verifies the correctness of the request command,
TA based on each stake from different geographical locations. Com- it proceeds to the next stage.
pared to the local blockchain, the global blockchain consensus has a (b) Pre-prepare stage: For the first epoch during a period, the primary
slower block generation speed, intended for preserving and synchro- node will send a pre-prepare message to the corresponding nodes
nizing nodes’ stakes, traffic events, vehicles’ register records, and PID based on 𝐺(𝐼𝐷). The pre-prepare message includes the updated
registration information from each domain. This paper designs an upper- stake set for each node as requested by TA, denoted as 𝑆𝑇 𝑠𝑒𝑡,
layer dynamic PBFT (DPBFT) consensus, where TA periodically updates and all the summaries of important traffic information received in
the list of RSUs participating in global layer consensus based on on- the current epoch, denoted as 𝑉 𝑇 𝑥𝑠. The primary node packages
chain stakes, that facilitates joint and distributed supervision. As shown these contents into a block and broadcasts it to the other upper-
in Fig. 5 for the global layer, the orange blocks in 𝐺𝐶 represent one layer nodes designated for this epoch. If other nodes verify the
round of DPBFT consensus, and each increase of a block in 𝐺𝐶 corre- pre-prepare message successfully, they proceed to the preparation
sponds to an epoch in the local layer’s domain blockchain. The 𝐺𝐶 block phase.
records important data appearing throughout the entire epoch in each (c) Prepare stage: During the prepare phase, each DM node not only
𝐿𝐶 . constructs the corresponding prepare messages but also sends
Requests in the global layer are triggered by TA. Based on network 𝑑𝑜𝑚𝑎𝑖𝑛𝑑𝑎𝑡𝑎 − 𝑖𝑛𝑖𝑡 to the RSUs within its jurisdiction to initiate the
information, primary nodes issue blocks in the commit phase in each domain data aggregation for the new epoch. Simultaneously, RSUs
epoch, and other nodes jointly confirm and reach global data consen- in the upper-layer nodes begin assisting in the data aggregation for
sus. Additionally, before entering the commit phase, each DM issues a their respective domains. After initiating the data aggregation for
𝑐𝑜𝑚𝑚𝑖𝑡𝑑𝑜𝑚𝑎𝑖𝑛 request within its domain, causing RSUs in the domain the next epoch, upper-layer nodes broadcast prepare messages to
8
Z. Zhou, N. Wang, J. Liu et al. Vehicular Communications 49 (2024) 100832
recent confirmed block in 𝐿𝐶2 of domain 2. Assuming an adversary 10: end while
11: end function
forges a chain in the sparsely populated domain 1 to manipulate the
9
Z. Zhou, N. Wang, J. Liu et al. Vehicular Communications 49 (2024) 100832
10
Z. Zhou, N. Wang, J. Liu et al. Vehicular Communications 49 (2024) 100832
Table 2
Efficiency and overhead of our vehicle authen-
tication.
that involves generating all certificates at once and preloading them into
vehicles would lead to substantial storage overhead for vehicle nodes
and increase the security risks associated with potential data breaches.
In contrast, the hierarchical key generation scheme proposed in this pa-
per avoids the need for preloading a large number of key/certificate
pairs onto vehicles. Instead, vehicles only need to request a new tem-
porary PID upon entering a new domain to facilitate interaction within
that specific area. The efficiency of the vehicle PID generation system
and communication overhead is presented in Table 2. We simulated 100
Fig. 9. The number of successful rounds with different penalty parameters. instances where RSUs generated PIDs to vehicles. The average duration
for PID key derivation, data signing, and signature verification during
node communication was presented, where 𝑚 represents the parame-
ter for hierarchical key generation. It shows that with the increase of
𝑚, the efficiency of the key derivation decreases but the security im-
proves, as the random linear combination of keys would be harder for
adversaries to find. When 𝑚 = 3, the efficiency of key generation and
signature verification is illustrated in Fig. 11.
According to the DSRC protocol standard [37], each vehicle period-
ically sends traffic-related information, such as location and accident
records, to nearby vehicles and RSUs every 100-300 milliseconds, to as-
sist RSUs in managing traffic on roads and aid vehicles in navigation.
As depicted in Fig. 12a, considering an IoV system consisting of four do-
mains where each domain covers an area of 196 square kilometers, we
simulated 49 evenly distributed RSUs, 40 randomly deployed vehicles,
and a DM at the center in each domain. A central authority supervi-
sor TA for the entire system, is in the middle of the whole IoV system.
Considering the vehicle node 𝑣 circled in red in Fig. 12a, Fig. 12b illus-
Fig. 10. The number of successful rounds with different reward parameters. trates the time comparison between traditional communication and the
cross-domain communication proposed in this paper. The yellow points
represent the time consumed for 𝑣 to communicate with other vehicles
5.2. Vehicle authentication and communication efficiency in the whole system directly, and the green points represent the time
consumed in our work. As our work to the direct communication ratio
Assuming vehicles change their PIDs approximately every 1 hour, shown by the blue line, our RSU-assisted cross-domain communication
with each vehicle averaging 2 hours of travel per day, a vehicle would mechanism becomes more effective as the distance between the vehicle
need around 730 anonymous identities in a year. Traditional research node and the selected node increases.
11
Z. Zhou, N. Wang, J. Liu et al. Vehicular Communications 49 (2024) 100832
12
Z. Zhou, N. Wang, J. Liu et al. Vehicular Communications 49 (2024) 100832
Data availability
References
[1] M.A. Azad, S. Bag, S. Parkinson, F. Hao, Trustvote: privacy-preserving node ranking
Fig. 15. The number of successful rounds with different parameters. in vehicular networks, IEEE Int. Things J. 6 (2019) 5878–5891, https://doi.org/10.
1109/JIOT.2018.2880839.
a vehicle circled in green as shown in Fig. 13a, assuming it sends a [2] J. Chen, J. Wu, H. Liang, S. Mumtaz, J. Li, K. Konstantin, A.K. Bashir, R. Nawaz, Col-
laborative trust blockchain based unbiased control transfer mechanism for industrial
message to its nearest RSU. The orange line of Fig. 13c shows the time automation, IEEE Trans. Ind. Appl. 56 (2020) 4478–4488, https://doi.org/10.1109/
cost for the message to be included in our blockchain, and the blue line TIA.2019.2959550.
shows the counterpart of the traditional blockchain. Fig. 13c illustrates [3] J. Cui, X. Zhang, H. Zhong, J. Zhang, L. Liu, Extensible conditional privacy protection
that our blockchain takes less time to synchronize the message than the authentication scheme for secure vehicular networks in a multi-cloud environment,
IEEE Trans. Inf. Forensics Secur. 15 (2020) 1654–1667, https://doi.org/10.1109/
traditional approach.
TIFS.2019.2946933.
[4] R.G. Engoulou, M. Bellaiche, T. Halabi, S. Pierre, A decentralized reputation manage-
5.4. Overhead of data storage and retrieval in the hierarchical and zonal ment system for securing the internet of vehicles, in: 2019 International Conference
blockchain on Computing, Networking and Communications (ICNC), 2019, pp. 900–904.
[5] Q. Feng, D. He, S. Zeadally, K. Liang, Bpas: blockchain-assisted privacy-preserving
The zonal blockchain divides blockchain data into domains, signifi- authentication system for vehicular ad hoc networks, IEEE Trans. Ind. Inform. 16
(2020) 4146–4155, https://doi.org/10.1109/TII.2019.2948053.
cantly reducing the amount of data that each domain node needs to store
[6] Y. Genc, N. Aytas, A. Akkoc, E. Afacan, E. Yazgan, Elcpas: a new efficient lightweight
over the long term. In each domain blockchain, data digest is stored in certificateless conditional privacy preserving authentication scheme for iov, Veh.
the form of a binary tree for retrieval, with a time complexity of 𝑂(𝑙𝑜𝑔𝑛). Commun. 39 (2023) 100549, https://doi.org/10.1016/j.vehcom.2022.100549.
Assuming that in a given slot, the amount of data generated by the IoV is [7] K. Gu, K. Wang, X. Li, W. Jia, Multi-fogs-based traceable privacy-preserving scheme
𝑁 , the storage overhead and retrieval complexity for a node in a partic- for vehicular identity in internet of vehicles, IEEE Trans. Intell. Transp. Syst. 23
(2022) 12544–12561, https://doi.org/10.1109/TITS.2021.3115171.
ular domain is illustrated in Fig. 14 and Fig. 15. Here, 𝑑 represents the
[8] R. Gupta, A. Kumari, S. Tanwar, A taxonomy of blockchain envisioned edge-as-a-
number of domains the data is partitioned into, and 𝑑 = 1 corresponds connected autonomous vehicles, Trans. Emerg. Telecommun. Technol. 32 (2021),
to a scenario of a traditional blockchain IoV system. As the number of https://doi.org/10.1002/ett.4009.
partitioned domains increases, the storage requirements for individual [9] G. Gutoski, D. Stebila, Hierarchical deterministic bitcoin wallets that tolerate key
nodes decrease significantly, and the efficiency of retrieving data from leakage, in: International Conference on Financial Cryptography and Data Security,
Springer, 2015, pp. 497–504.
the blockchain improves considerably.
[10] B. Hazarika, K. Singh, S. Biswas, S. Mumtaz, C.P. Li, Multi-agent drl-based task of-
floading in multiple ris-aided iov networks, IEEE Trans. Veh. Technol. 73 (2024)
6. Conclusion 1175–1190, https://doi.org/10.1109/TVT.2023.3302010.
[11] B. Ji, Z. Chen, S. Mumtaz, C. Han, C. Li, H. Wen, D. Wang, A vision of iov in 5g
This paper introduces a conditional privacy-preserving and efficient hetnets: architecture, key technologies, applications, challenges, and trends, IEEE
Netw. 36 (2022) 153–161, https://doi.org/10.1109/MNET.012.2000527.
distributed IoV data-sharing scheme based on blockchain technology.
[12] F. Kandah, B. Huber, A. Skjellum, A. Altarawneh, A blockchain-based trust manage-
We propose a hierarchical key generation mechanism for IoV nodes, en- ment approach for connected autonomous vehicles in smart cities, in: 2019 IEEE 9th
abling conditional privacy-preserving authentication. This allows mes- Annual Computing and Communication Workshop and Conference (CCWC), 2019,
sages to be authenticated without disclosing any private information pp. 0544–0549.
13
Z. Zhou, N. Wang, J. Liu et al. Vehicular Communications 49 (2024) 100832
[13] A. Kumari, M.M. Patel, A. Shukla, S. Tanwar, N. Kumar, J.J.P.C. Rodrigues, Armor: [27] S. Tangade, S.S. Manvi, P. Lorenz, Trust management scheme based on hybrid cryp-
a data analytics scheme to identify malicious behaviors on blockchain-based smart tography for secure communications in vanets, IEEE Trans. Veh. Technol. 69 (2020)
grid system, in: GLOBECOM 2020 - 2020 IEEE Global Communications Conference, 5232–5243, https://doi.org/10.1109/TVT.2020.2981127.
2020, pp. 1–6. [28] I. Ullah, M.A. Khan, N. Kumar, A.M. Abdullah, A.A. AlSanad, F. Noor, A conditional
[14] S. Lee, S.H. Seo, Design of a two layered blockchain-based reputation system in privacy preserving heterogeneous signcryption scheme for internet of vehicles, IEEE
vehicular networks, IEEE Trans. Veh. Technol. 71 (2022) 1209–1223, https://doi. Trans. Veh. Technol. 72 (2023) 3989–3998, https://doi.org/10.1109/TVT.2022.
org/10.1109/TVT.2021.3131388. 3220041.
[15] D. Li, R. Chen, Q. Wan, Z. Guan, S. Li, M. Xie, J. Su, J. Liu, Intelligent and fair iov [29] N. Wang, Z. Zhou, J. Liu, L. Deng, J. Fu, Secure and distributed iov data shar-
charging service based on blockchain with cross-area consensus, IEEE Trans. Intell. ing scheme based on a hybrid pos blockchain protocol, IEEE Trans. Veh. Technol.
Transp. Syst. (2023) 1–11, https://doi.org/10.1109/TITS.2023.3249180. 1–16doi (2024), https://doi.org/10.1109/TVT.2024.3378534.
[16] C. Lin, D. He, X. Huang, N. Kumar, K.K.R. Choo, BCPPA: a blockchain-based con- [30] G. Wood, et al., Ethereum: a secure decentralised generalised transaction
ditional privacy-preserving authentication protocol for vehicular ad hoc networks, ledger, Ethereum Proj. Yellow Pap. 151 (2014) 1–32, https://ethereum.github.io/
IEEE Trans. Intell. Transp. Syst. 22 (2021) 7408–7420, https://doi.org/10.1109/ yellowpaper/paper.pdf.
TITS.2020.3002096. [31] X. Xie, B. Wu, B. Hou, Bephap: a blockchain-based efficient privacy-preserving han-
[17] J. Liu, C. Peng, R. Sun, L. Liu, N. Zhang, S. Dustdar, V.C.M. Leung, Cpahp: condi- dover authentication protocol with key agreement for Internet of vehicles, J. Syst.
tional privacy-preserving authentication scheme with hierarchical pseudonym for Archit. 138 (2023) 102869, https://doi.org/10.1016/j.sysarc.2023.102869.
5g-enabled iov, IEEE Trans. Veh. Technol. 72 (2023) 8929–8940, https://doi.org/ [32] Z. Xu, W. Liang, K.C. Li, J. Xu, H. Jin, A blockchain-based roadside unit-assisted au-
10.1109/TVT.2023.3246466. thentication and key agreement protocol for internet of vehicles, J. Parallel Distrib.
[18] R. Lu, X. Lin, H. Zhu, P.H. Ho, X. Shen, Ecpp: efficient conditional privacy preser- Comput. 149 (2021) 29–39, https://doi.org/10.1016/j.jpdc.2020.11.003.
vation protocol for secure vehicular communications, in: IEEE INFOCOM 2008 - the [33] A. Yakovenko, Solana: a new architecture for a high performance blockchain v0.
27th Conference on Computer Communications, 2008, pp. 1229–1237. 8.13, Whitepaper, https://solana.com/solana-whitepaper.pdf, 2018.
[19] Z. Lu, Q. Wang, G. Qu, H. Zhang, Z. Liu, A blockchain-based privacy-preserving [34] Z. Yang, K. Yang, L. Lei, K. Zheng, V.C.M. Leung, Blockchain-based decentralized
authentication scheme for vanets, IEEE Trans. Very Large Scale Integr. (VLSI) Syst. trust management in vehicular networks, IEEE Int. Things J. 6 (2019) 1495–1505,
27 (2019) 2792–2801, https://doi.org/10.1109/TVLSI.2019.2929420. https://doi.org/10.1109/JIOT.2018.2836144.
[20] S.K. Mohanty, S. Tripathy, Siovchain: time-lock contract based privacy-preserving [35] Y. Yao, X. Chang, J. Mišić, V.B. Mišić, Lightweight and privacy-preserving id-as-a-
data sharing in siov, IEEE Trans. Intell. Transp. Syst. 23 (2022) 24071–24082, service provisioning in vehicular cloud computing, IEEE Trans. Veh. Technol. 69
https://doi.org/10.1109/TITS.2022.3192566. (2020) 2185–2194, https://doi.org/10.1109/TVT.2019.2960831.
[21] S. Nakamoto, A. Bitcoin, Bitcoin: a peer-to-peer electronic cash system, Decentralized [36] C. Zhang, X. Lin, R. Lu, P.H. Ho, Raise: an efficient rsu-aided message authentication
business review 4, 15, https://bitcoin.org/bitcoin.pdf, 2008. scheme in vehicular communication networks, in: 2008 IEEE International Confer-
[22] K. Rabieh, M.M.E.A. Mahmoud, M. Younis, Privacy-preserving route reporting ence on Communications, 2008, pp. 1451–1457.
schemes for traffic management systems, IEEE Trans. Veh. Technol. 66 (2017) [37] J. Zhang, J. Cui, H. Zhong, Z. Chen, L. Liu, Pa-crt: Chinese remainder theorem based
2703–2713, https://doi.org/10.1109/TVT.2016.2583466. conditional privacy-preserving authentication scheme in vehicular ad-hoc networks,
[23] M. Raya, J.P. Hubaux, Securing vehicular ad hoc networks, J. Comput. Secur. 15 IEEE Trans. Dependable Secure Comput. 18 (2021) 722–735, https://doi.org/10.
(2007) 39–68, https://doi.org/10.3233/JCS-2007-15103. 1109/TDSC.2019.2904274.
[24] W. Ruan, J. Liu, Y. Chen, S.M.N. Islam, M. Alam, A double-layer blockchain based [38] J. Zhang, Y. Wang, Z. Ma, X. Yang, Z. Ying, J. Ma, A location-aware verifiable
trust management model for secure internet of vehicles, Sensors 23 (2023), https:// outsourcing data aggregation in multiblockchains, IEEE Int. Things J. 10 (2023)
doi.org/10.3390/s23104699. 4783–4798, https://doi.org/10.1109/JIOT.2022.3221555.
[25] K.A. Shim, Cpas: an efficient conditional privacy-preserving authentication scheme [39] C. Zhao, N. Guo, T. Gao, X. Deng, J. Qi, Pepa: Paillier cryptosystem-based efficient
for vehicular sensor networks, IEEE Trans. Veh. Technol. 61 (2012) 1874–1883, privacy-preserving authentication scheme for vanets, J. Syst. Archit. 138 (2023)
https://doi.org/10.1109/TVT.2012.2186992. 102855, https://doi.org/10.1016/j.sysarc.2023.102855.
[26] R. Shrestha, R. Bajracharya, A.P. Shrestha, S.Y. Nam, A new type of blockchain for se- [40] D. Zheng, C. Jing, R. Guo, S. Gao, L. Wang, A traceable blockchain-based access
cure message exchange in VANET, Digit. Commun. Netw. 6 (2020) 177–186, https:// authentication system with privacy preservation in vanets, IEEE Access 7 (2019)
doi.org/10.1016/j.dcan.2019.04.003. 117716–117726, https://doi.org/10.1109/ACCESS.2019.2936575.
14