Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2024 Nov 21;24(23):7428.
doi: 10.3390/s24237428.

The Design and Implementation of Kerberos-Blockchain Vehicular Ad-Hoc Networks Authentication Across Diverse Network Scenarios

Affiliations

The Design and Implementation of Kerberos-Blockchain Vehicular Ad-Hoc Networks Authentication Across Diverse Network Scenarios

Maya Rahayu et al. Sensors (Basel). .

Abstract

Vehicular Ad-Hoc Networks (VANETs) play an essential role in the intelligent transportation era, furnishing users with essential roadway data to facilitate optimal route selection and mitigate the risk of accidents. However, the network exposure makes VANETs susceptible to cyber threats, making authentication crucial for ensuring security and integrity. Therefore, joining entity verification is essential to ensure the integrity and security of communication in VANETs. However, to authenticate the entities, authentication time should be minimized to guarantee fast and secure authentication procedures. We propose an authentication system for VANETs using blockchain and Kerberos for storing authentication messages in a blockchain ledger accessible to Trusted Authentication Servers (TASs) and Roadside Units (RSUs). We evaluate the system in three diverse network scenarios: suburban, urban with 1 TAS, and urban with 2 TASs. The findings reveal that this proposal is applicable in diverse network scenarios to fulfill the network requirements, including authentication, handover, and end-to-end delay, considering an additional TAS for an increasing number of vehicles. The system is also practicable in storing the authentication message in blockchain considering the gas values and memory size for all scenarios.

Keywords: Kerberos authentication; Vehicular Ad-Hoc Network; blockchain.

PubMed Disclaimer

Conflict of interest statement

The authors declare no conflicts of interest.

Figures

Figure 1
Figure 1
The vulnerability of VANET.
Figure 2
Figure 2
Resume of initial authentication phase and handover process.
Figure 3
Figure 3
Main parts of the Kerberos-blockchain VANETs system.
Figure 4
Figure 4
Experiment case scenarios: (a) suburban, (b) urban with 1 TAS, and (c) urban with 2 TASs.
Figure 5
Figure 5
Maps for the scenario of (a) suburban and (b) urban with 1 TAS and (c) urban with 2 TASs.
Figure 6
Figure 6
Initial authentication phase.
Figure 7
Figure 7
Handover signaling procedure.
Figure 8
Figure 8
Off-chain and on-chain environment of the proposed system.
Figure 9
Figure 9
Comparison of several delays of different scenarios.
Figure 10
Figure 10
Signalling overhead.
Figure 11
Figure 11
Number of vehicles vs. gas values.
Figure 12
Figure 12
Memory size required for the block to store various authentication message.

References

    1. Rashid S.A., Audah L., Hamdi M.M. Intelligent Transportation Systems (ITSs) in VANET and MANET. In: Dehuri S., Prasad Mishra B.S., Mallick P.K., Cho S.B., editors. Biologically Inspired Techniques in Many Criteria Decision Making. Smart Innovation, Systems and Technologies. Volume 271. Springer; Singapore: 2022. pp. 6–59.
    1. Ali R., Liu R., Nayyar A., Waris I., Li L., Shah M.A. Intelligent Driver Model-Based Vehicular Ad Hoc Network Communication in Real-Time Using 5G New Radio Wireless Networks. IEEE Access. 2023;11:4956–4971. doi: 10.1109/ACCESS.2023.3234964. - DOI
    1. Bhanu C. Cloud and IoT-Based Vehicular Ad Hoc Networks. Wiley; Hoboken, NJ, USA: 2021. Challenges, Benefits and Issues: Future Emerging VANETs and Cloud Approaches; pp. 142–149.
    1. Qu F., Wu Z., Wang F., Cho W. A Security and Privacy Review of VANETs. IEEE Trans. Intell. Transp. Syst. 2016;16:2985–2996. doi: 10.1109/TITS.2015.2439292. - DOI
    1. Jan S.A., Amin N.U., Othman M., Ali M., Umar A.I., Basir A. A Survey on Privacy-Preserving Authentication Schemes in VANETs: Attacks, Challenges and Open Issues. IEEE Access. 2021;9:153701–153726. doi: 10.1109/ACCESS.2021.3125521. - DOI

LinkOut - more resources