Figures
Abstract
As a core component of intelligent transportation systems, the Internet of Vehicles (IoV) relies heavily on secure and efficient authentication mechanisms to support real-time information exchange and data sharing among network entities. However, traditional centralized authentication schemes widely adopted in current IoV systems suffer from several drawbacks, including performance bottlenecks, inefficient cross-domain authentication, and insufficient identity privacy protection, which severely restrict the security and scalable deployment of IoV systems. To address these challenges, this paper proposes a novel blockchain-based multi-Trusted Authority (TA) collaborative authentication and key agreement scheme. The scheme adopts a decentralized cross-TA authentication architecture based on blockchain-enabled trust transfer to eliminate single point of failure risks. Furthermore, it constructs an anonymous authentication protocol supporting both vehicle-to-TA and vehicle-to-vehicle key agreement, ensuring identity privacy and resisting various security attacks. Comprehensive security validation, including Burrows-Abadi-Needham (BAN) logic formal analysis, informal security verification, and ProVerif-based verification, confirms the scheme’s strong security guarantees. Comparative evaluations with existing schemes demonstrate that the proposed scheme achieves reasonable energy consumption while ensuring high security performance. Specifically, its computational cost is reduced by 39.42% compared with the best existing scheme.
Citation: Huang W, Chen S (2026) Baa-iov: Blockchain-enabled anonymous authentication for internet of vehicles. PLoS One 21(4): e0347787. https://doi.org/10.1371/journal.pone.0347787
Editor: Hu Xiong, University of Electronic Science and Technology of China, CHINA
Received: December 14, 2025; Accepted: April 7, 2026; Published: April 24, 2026
Copyright: © 2026 Huang, Chen. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
Data Availability: All relevant data are within the manuscript.
Funding: The author(s) received no specific funding for this work.
Competing interests: The authors have declared that no competing interests exist.
1 Introduction
In the Internet of Vehicles (IoV), most existing authentication protocols are based on a single Trusted Authority (TA) model and assume that the TA has unlimited resources. However, in smart city scenarios involving multi-domain collaboration, a single TA model is no longer sufficient. Therefore, this study focuses on designing secure and efficient authentication and key agreement mechanisms in a high-speed IoV environment with multi-domain management.
The main technical challenges and corresponding design choices of this study are as follows: 1) Balancing Security and Efficiency in Cross-TA Authentication [1]. This challenge can be addressed through the decentralized trust mechanism of blockchain. The high mobility of vehicles may lead to frequent cross-domain transitions (e.g., moving from the TA management domain of City A to that of City B). Cross-domain vehicles need to complete cross-TA identity verification, but there is a trade-off between security and efficiency in current multi-TA authentication systems. If a domain-by-domain secondary authentication mechanism is adopted, it will cause traffic delays due to lengthy procedures, which conflicts with the high-speed interaction requirements of the IoV; if the authentication process is simplified, it may lead to security risks arising from differences in security policies. The distributed ledger feature of blockchain can effectively solve the above problems: it enables trusted authentication and sharing of identity information across TA domains, allowing verification to be completed without repeatedly submitting credentials. Additionally, the immutable nature of blockchain can prevent identity forgery. This is the key reason for choosing blockchain as the foundation for cross-TA trust, as it can balance security and efficiency simultaneously. 2) Resource Consumption Caused by Roadside Unit (RSU) Function Overload. This challenge can be addressed through function optimization combined with lightweight communication protocols. Existing solutions design RSUs as dual-function nodes (i.e., relay and authentication), which are required to forward data and participate in core operations such as hash computation and signature verification. However, RSUs have limited hardware resources (e.g., computing power and storage capacity). In high-density scenarios (e.g., peak-hour urban roads), this may lead to computing power saturation and bandwidth waste, potentially causing network performance degradation. Therefore, it is necessary to optimize the functions of RSUs: remove their authentication capabilities, retain only their relay role, and assign the authentication function to TAs, which have more abundant resources. The underlying logic of this design is to match hardware resources with functional responsibilities. Meanwhile, the solution integrates lightweight message transmission protocols to further reduce the communication overhead of RSUs, which aligns with the low-latency requirements of the IoV. 3) Security Risk Accumulation Caused by High-Frequency Interactions Between RSUs and TAs. This challenge can be mitigated by combining Elliptic Curve Cryptography (ECC) with anonymous authentication mechanisms. Each authentication process requires at least two to three message exchanges between an RSU and a TA. High-frequency interactions not only increase system overhead but also make the system more vulnerable to attacks and key compromise. ECC ensures the security of data transmission through public-key cryptographic mechanisms. At the same time, anonymous authentication technology allows vehicles to hide their real identities during authentication and only submit anonymous credentials to TAs. The core goal of this technology selection is to reduce the attack surface: it not only resists data tampering and theft through encryption but also reduces the risk of identity information abuse through anonymity.
To address the aforementioned issues, this paper proposes a blockchain-based multi-TA collaborative authentication and key agreement scheme. This solution establishes a decentralized trust architecture leveraging blockchain technology, enabling secure collaboration and trust transfer between TAs. The TA acts as the primary authentication entity, while the RSU is only responsible for relaying authentication messages. Furthermore, the protocol adopts anonymous authentication to ensure vehicle identity privacy and security, as well as secure key agreement between vehicles and TAs, and among vehicles themselves. The proposed solution improves system performance and scalability while maintaining strong security.
1.1 Key contributions and innovations
This study addresses core challenges in IoV identity authentication and key agreement by proposing an innovative blockchain-based solution. Compared to existing research, its primary contributions and innovations are as follows:
- 1) Innovative multi-TA collaborative authentication architecture
Overcoming the limitations of traditional single-trusted-authority models, this research proposes a blockchain-based multi-trusted-authority collaborative authentication framework. By enabling trusted data sharing among authorities via smart contracts, it resolves cross-domain authentication challenges while significantly enhancing system scalability.
- 2) Multi-layer security protection mechanism
Building upon conventional hash and XOR operations, it incorporates elliptic curve point multiplication and designs a dynamic blockchain pointer encryption mechanism, constructing a more robust security system resistant to various known attacks.
- 3) Optimized network resource allocation strategy
Redefines the functional boundaries of roadside units, limiting them to data relay nodes while delegating core authentication computation tasks to trusted authorities. This architectural innovation reduces network load while minimizing potential security exposure.
- 4) Efficient Vehicle-to-Vehicle key agreement protocol
Proposes a direct vehicle-to-vehicle key agreement mechanism based on blockchain-stored shared parameters. This significantly enhances authentication efficiency while maintaining high security, making it particularly suitable for high-density IoV environments.
- 5) Comprehensive Security and Performance Validation
The solution undergoes multidimensional verification through formal BAN logic analysis, informal security arguments, and ProVerif simulation. By optimizing parameter storage and simplifying computational workflows, security is substantially enhanced without compromising computational or communication efficiency. Experimental results demonstrate acceptable overall performance compared to existing mainstream solutions.
1.2 Paper organization
The remainder of this paper is organized as follows: Section 2 introduces the fundamental concepts required for understanding the proposed scheme, including blockchain, ECC, and BAN logic. Section 3 systematically analyzes the limitations of existing authentication protocols and blockchain-based solutions, while identifying research gaps. Section 4 formally defines the system model, threat model, security objectives, and security measures. Section 5 elaborates on the blockchain-based multi-TA collaborative authentication mechanism, comprising three phases: system initialization, entity registration, mutual authentication and key agreement. Section 6 rigorously evaluates the security of the proposed scheme through BAN logic verification, informal security analysis, and formal validation using the ProVerif tool. Section 7 presents a comprehensive performance comparison with five state-of-the-art protocols in terms of computational and communication overhead. Finally, Section 8 summarizes the key contributions and discusses potential future research directions in IoV security.
2 Preliminaries
2.1 Blockchain
The fundamental principles of blockchain comprise distributed storage, consensus mechanisms, and cryptographic algorithms. Distributed storage involves replicating and storing data across the network, while consensus mechanisms ensure data consistency among network nodes. Cryptographic algorithms are employed to safeguard the confidentiality and integrity of data. These basic principles collectively form the foundational architecture of blockchain, enabling decentralization while ensuring the security and reliability of data.
2.2 ECC
ECC is a public-key cryptographic system based on the mathematical structure of elliptic curves. Users can establish a secure elliptic curve by appropriately choosing parameters. The encryption and signature processes involve mathematical operations on points on the elliptic curve, including point addition, doubling, and other operations. Compared to traditional asymmetric encryption algorithms like RSA, ECC offers higher security with smaller key lengths, making it more suitable for resource-limited environments. The following subsections present the mathematical foundations and algorithms underlying ECC.
- 1) Elliptic Curve Equation
Parameters:
p: Large prime defining finite field Fp
a,b: Curve coefficients (4a3+27b2 ≡ 0(mod p))
G.
: Basepoint (generator) of prime order n
- 2) Elliptic Curve Diffie-Hellman (ECDH)
Key Generation:
Alice: Private key dA[1, n−1], Public key QA=dAG
Bob: Private key dB[1,n−1], Public key QA=dBG
Shared Secret Calculation:
Security: Relies on ECDH assumption (hard to compute dAdBG given QA, QB)
- 3) Elliptic Curve Digital Signature Algorithm (ECDSA)
Signature Generation (for message m):
Compute hash h = H(m), interpreted as integer in Zn, Select random k[1, n − 1], Compute (x,y)=kG, Output signature (r, s): r = x mod n, s = k−1(h + dAr) mod n.
Signature Verification:
Verify r, s∈[1,n − 1], Compute h = H(m)h, Calculate: u1 ≡ hs−1(mod n), u2 ≡ rs−1(mod n), (x,y)=u1G+u2QA.
Accept if r ≡ x (mod n).
2.3 BAN logic
BAN logic, proposed by Burrows, Abadi, and Needham in 1989, is a formal approach for analyzing and verifying cryptographic protocols. It translates protocol messages into logical formulas and applies inference rules to derive the beliefs and knowledge of the participating entities. By enabling structured analysis, BAN logic aids in identifying and addressing vulnerabilities to bolster the overall robustness of cryptographic systems.
3 Related works
In light of the research direction of this study, the relevant literature is categorized into two parts: the authentication schemes for in-vehicle self-organizing networks and blockchain applications in IoV.
3.1 Authentication schemes for in-vehicle self-organizing networks
- 1) Conditional Privacy-Preserving Authentication with Efficient Revocation Mechanisms
This category includes schemes that achieve conditional privacy while optimizing communication and computational efficiency via novel revocation mechanisms. Zhong et al.[2] proposed a conditional privacy-preserving authentication scheme based on registration lists, which reduces communication overhead by substituting traditional revocation lists and mitigates malicious vehicle behavior. Alazzawi et al.[3] proposed a novel pseudo-identity-based solution for achieving conditional anonymity in Vehicular Ad Hoc Networks (VANETs), which discards bilinear pairings and certificate revocation lists, thus significantly improving the efficiency of signing and authentication. However, Al-Shareeda et al.[4] identified that the scheme of Alazzawi et al. suffers from vulnerabilities in privacy preservation and unlinkability, fails to provide password modification functionality, and is susceptible to side-channel attacks. To address these issues, Al-Shareeda et al. redesigned a conditional privacy-preserving authentication scheme based on elliptic curve cryptography, effectively resolving the aforementioned problems.
Overall, existing conditional privacy-preserving schemes still have room for improvement in achieving efficient revocation and privacy trade-offs, particularly lacking lightweight solutions that simultaneously satisfy low communication overhead, strong privacy protection, and resistance to physical side-channel attacks.
- 2) Certificateless and lightweight authentication architectures
These schemes eliminate traditional certificate management through certificateless or identity-based cryptographic constructs while maintaining low computational overhead. Cui et al.[5] proposed an extensible authentication mechanism for multi-cloud environments, leveraging ECC and simplifying service selection complexity through cloud brokers to meet diversified service demands. Liu et al.[6] proposed an authentication scheme integrating anonymous identity generation, trust authority verification, and a reputation evaluation mechanism to dynamically assess vehicle credibility based on historical interaction behavior. Ma et al.[7] proposed a scheme that does not rely on bilinear pairings, supporting mutual authentication and generates secure session keys for secret communication while preserving privacy. Wu et al.[8] introduced a certificateless aggregated signatures scheme for IoV to address the problem of frequent key updates by vehicles. Tangade et al.[9] proposed an identity-based scheme utilizing keyed-Hash Message Authentication Code (HMAC) that employs reward points to calculate vehicle trust values. However, it does not support batch verification of messages and signatures. Su et al.[10] proposed a scheme for Vehicle-to-Grid (V2G) networks employing non-supersingular elliptic curves.
Although certificateless and lightweight architectures eliminate complex certificate management, most solutions still face the following challenges: difficulty in efficiently supporting batch verification across large-scale vehicular networks, communication overhead caused by frequent key updates, and ensuring equivalent security levels without introducing bilinear pairing operations.
- 3) Multi-factor and physically enhanced authentication schemes
This category encompasses methods that incorporate Physical Unclonable Functions (PUF), biometrics, or multi-factor protocols to enhance security and resilience against physical attacks. Li et al.[11] proposed a scheme based on anonymous identity, introducing a new authentication architecture and hiding the computation of the user’s identity through a one-way hash function to enhance privacy and security. Alfadhli et al.[12] proposed a scheme combining PUFs and one-time dynamic pseudo-identities as factors for authentication to improve overall security and efficiency. Xu et al.[13] proposed a scheme that delineates distinct roles within system operations. During the initialization phase, the System Administrator (SA) performs security registration in a specified environment. Subsequently, the TA takes responsibility for disseminating authentication parameters to the RSUs. Umar et al.[14] proposed a PUF-based scheme for secure and efficient data transfer over public channels, though its anonymity relies on trusted third parties for pseudonym updates. Jiang et al.[15] proposed a PUF-based scheme integrating PUFs, passwords, and biometrics to achieve multifactor authentication, thus increasing the difficulty of forgery by adversaries.
While incorporating physical factors such as PUFs or biometrics enhances security, it also introduces new challenges, including the instability of PUF responses, privacy concerns for biometric templates, and increased user experience complexity and deployment costs associated with multi-factor protocols.
- 4) Advanced cryptographic protocols and group-oriented authentication
These approaches employ advanced cryptographic techniques such as chaotic maps, puncturable signatures, and group authentication to achieve scalability, forward secrecy, and efficient batch verification. Wei et al.[16] proposed a bidirectional anonymous traceable group authentication scheme for IoV. Their scheme manages multiple RSUs through fast dynamic grouping and uses the unidirectional trapdoor nature and semigroup property of Chebyshev chaotic mapping to authenticate the access of vehicles entering the RSU groups. Hou et al.[17] introduced a lightweight PUF into the authentication scheme and integrated the in-vehicle unit with a 5G Subscriber Identity Module (SIM) card to address identity forgery issues. Sripathi et al.[18] proposed a scheme for nonlinear pairings that supports batch verification by using a certificate-less signature mechanism to avoid certificate management and key escrow issues. Xie et al.[19] employed PUFs to resist RSU capture attacks while enhancing security through a three-factor secrecy strategy. Hou et al.[20] proposed an efficient two-factor authentication protocol by integrating blockchain with Trusted Execution Environment (TEE) technology, which not only guarantees anonymity but also reduces computational overhead. Jiang et al.[21] developed a two-level security framework based on blockchain and ensemble learning, achieving lightweight authentication via PUF while utilizing Whale Optimization Algorithm (WOA) and Extreme Gradient Boosting (XGBoost) for malicious attack detection. Xiong et al.[22] introduced a mutual authentication protocol supporting fine-grained forward/backward security through the combination of puncturable signatures and parallel key-insulated proxy re-signature schemes. Bhatt et al.[23] proposed a blockchain-based conditional privacy-preserving authentication scheme for temporary platoon communications, reducing RSU reliance and infrastructure costs while incorporating an accident prevention mechanism. Ibrahim et al.[24] proposed the PPA6-IoV protocol featuring a six-step authentication process to preserve vehicle privacy while effectively reducing both communication and computational costs. Zhang et al.[25] proposed a system based on a trusted connection architecture, which introduced a platform authentication mechanism and effectively improved communication security in IoV environments.
Group authentication and advanced cryptographic protocols—such as chaotic mapping and puncturable signatures—demonstrate advantages in scalability and forward secrecy. However, their computational complexity is typically high, and most schemes fail to achieve efficient group dynamic management within highly dynamic vehicular ad hoc networks.
- 5) Decentralized IoV authentication
Recent research emphasizes the shift toward decentralized authentication in the IoV to address scalability, security, and privacy challenges. The edge enhancement protocol proposed by Lo et al.[26] reduces cloud dependencies and improves system resilience by leveraging a consortium blockchain. The BAKARI (Blockchain-Powered AKA Scheme with a Reputation-Centric) proposed by Mukathe et al.[27] is a blockchain-based key agreement scheme with reputation incentives. Haider et al.[28] proposed the Blockchain Enabled Secure Authentication Protocol for IoVs (BESA-IOV), which utilizes ECC and blockchain for a lightweight authentication mechanism to achieve the goal of reducing latency and cost. Borges et al.[29] proposed using decentralized reputation management to verify identity, and this approach has the advantage of ensuring identity security even in disconnected environments. Wang et al.[30] introduced BCADS, a blockchain-assisted cross-domain authentication scheme with decentralized identity for VANETs under strict oversight, enabling autonomous identifier management and reducing computational and communication costs by 36.6% and 87.1%. Liu et al.[31] proposed a Cybertwin-enabled distributed authentication scheme that employs lightweight cryptography and digital twins for real-time behavior tracking and dynamic trust distribution, reducing authentication latency in high-density vehicular environments.
Emerging decentralized solutions leverage technologies such as blockchain to mitigate single points of failure and trust issues. However, they still face widespread performance bottlenecks, including high transaction latency and substantial consensus overhead, and lack effective mechanisms to balance computational and communication loads between resource-constrained in-vehicle units and powerful backend systems.
3.2 Blockchain-related research in the field of IoV
- 1) Authentication and Key Management Schemes
This category focuses on leveraging blockchain’s decentralization, immutability, and traceability to construct novel authentication frameworks and key management systems. Dorri et al.[32] presented an innovative lightweight and scalable blockchain system designed to meet the high demands of the IoV. However, their approach relies on centralized key management lists that are susceptible to compromise, leading to large-scale key compromise incidents. To address these challenges, Wang et al.[33] proposed a scheme for IoV that fully integrates blockchain technology, including consensus-mechanism-driven smart contracts and cryptographic accumulator-based Public Key Infrastructure (PKI) mechanisms. Zhang et al.[34] proposed a blockchain-based asymmetric group key agreement protocol for IoV, aiming to protect user privacy through anonymous authentication techniques. Qureshi et al.[35] proposed an efficient, secure, and anonymous blockchain-based conditional privacy protection and authentication mechanism. They implemented a blockchain using Hyperledger Fabric to enable vehicle nodes to share data anonymously and maintain anonymity, traceability, and unlinkability during data communication. Ma et al.[36] proposed an innovative decentralized key management scheme in the field of VANETs, with the main goal of achieving automatic registration, updating, and revocation of users’ public keys to ensure communication security. However, this scheme may introduce high computational complexity for resource-constrained devices in VANETs. Lin et al.[37] employed blockchain technology to solve key update and certificate management challenges in public key cryptographic authentication systems. They combined blockchain technology with key derivation algorithms to proactively manage certificates for secure authentication. Li et al.[38] proposed a blockchain-assisted revocable cross-domain authentication scheme for VANETs, supporting different authentication methods across domains and enabling malicious vehicle revocation via group public key updates while avoiding blockchain-induced latency. Akhter et al.[39] designed a blockchain-based switching authentication scheme to reduce the redundant computational overhead incurred by vehicles when switching RSUs. Singh et al.[40] proposed a lightweight group-based authentication protocol for 5G-enabled IoV networks, achieving mutual authentication, forward/backward secrecy, and session unlinkability. AVISPA and BAN logic validation confirm attack resistance, with signaling overhead reduced by 47.3% and bandwidth consumption by 32.3%.
Existing blockchain-based authentication and key management solutions effectively enhance traceability and tamper resistance. However, their performance is often constrained by the inherent throughput and latency limitations of blockchain technology. Moreover, designing truly lightweight on-chain operations suitable for vehicle-embedded environments remains an open challenge.
- 2) Certificateless and lightweight cryptographic schemes
These schemes eliminate traditional certificate management through lightweight cryptographic constructs and efficient algorithms. Ali et al.[41] proposed an innovative certificateless public key signature solution utilizing bilinear pairing techniques aimed at enhancing the privacy security of vehicle-to-infrastructure communications. However, this solution utilizes bilinear pairing for batch signature aggregation and verification, which leads to the challenge of high computational complexity. Meng et al.[42] proposed a lightweight anonymous mutual authentication and key agreement scheme, enabling efficient cross-regional node authentication and session key establishment. Tan et al.[43] introduced a VANET system model incorporating edge computing infrastructure, which provides sufficient computational and storage resources for individual vehicles. Vishwakarma et al.[44] proposed a lightweight blockchain security scheme supporting Software-Defined Networking (SDN) for secure storage and communication, enabling vehicles to generate their own key pairs and obtain temporary credentials during registration.
Despite adopting certificateless and lightweight designs, many solutions struggle to balance robust privacy protection (such as identity unlinkability) with efficient cross-domain authentication while achieving fully decentralized trust.
- 3) Privacy-preserving and conditional anonymity schemes
This category comprises identity protection, conditional traceability, and communication privacy without sacrificing security. Bhushan et al.[45] proposed a vehicular blockchain network model introducing a consensus authentication model to smart city infrastructure, handling security and traffic control via specialized miner nodes but heavily relying on sensor data and underutilizing smart contracts and PKI technologies. Feng et al.[46] proposed an Efficient Privacy-Preserving Authentication Model (EPAM) using asynchronous accumulators to extend blockchain applications for efficient membership verification and pseudonym management, though its three-level model may add computational overhead. Xu et al.[47] proposed a blockchain and token-based scheme reducing costs through time-sensitive tokens but is vulnerable to Man-In-The-Middle (MITM) attacks. Son et al.[48] proposed a blockchain-based Vehicle-to-Infrastructure (V2I) authentication scheme comprising five phases. The initial authentication phase uses ECC for security authentication, and authentication data is stored on the blockchain. If the RSU discovers vehicle misbehavior, it can execute vehicle revocation through the blockchain. Lu et al.[49] proposed a lattice-based dual blockchain anonymous authentication scheme featuring forward security and revocability for VANETs. The dual-chain architecture decouples identity from mobility to enhance anonymity. Bonsai tree structures ensure forward security, and malicious vehicles can be anonymously revoked. This work addresses quantum computing threats while maintaining balanced security and efficiency.
Existing privacy-preserving solutions strike a good balance between conditional anonymity and traceability, but they often rely on complex cryptographic accumulators or multi-layer architectures. This can impose significant storage and computational burdens in practical deployments and lack sufficient support for rapid revocation of dynamic vehicle members.
- 4) Hybrid and multi-technology integrated schemes
These approaches combine blockchain with other technologies such as edge computing, software-defined networking (SDN), and advanced consensus mechanisms to achieve scalable and efficient authentication. Mei et al.[50] proposed a scheme that combines blockchain, IoV, and edge computing to support efficient computation and storage functions. Xu et al.[51] proposed a scheme for IoV that utilizes blockchain and RSU-assisted technologies, aiming to address the complex authentication problems faced by vehicles in the transportation domain. Shi et al.[52] proposed a blockchain-enabled domain name service and mutual authentication protocol based on the Blockchain-enabled Authentication and Communications Network (BeACONS) framework, significantly reducing reliance on centralized infrastructure for inter-vehicle communications. Surapaneni et al.[53] developed a handover authentication scheme combining blockchain with the InterPlanetary File System (IPFS), utilizing a Proof-of-Reputation (PoR) consensus mechanism to substantially improve vehicle re-authentication efficiency. Lin et al.[54] enhanced their protocol by employing blockchain to implement distributed trusted third-party services, effectively preventing single points of failure. The BAKARI scheme proposed by Mukathe et al.[27] achieves secure key agreement through Schnorr signatures and elliptic curve cryptography while employing blockchain smart contracts for vehicle reputation management. Ma et al.[55] introduced an optimized Practical Byzantine Fault Tolerance (PBFT) consensus-based distributed authentication scheme, where smart-contract-automated authentication processes enable the reuse of authentication results.
Integrating blockchain with technologies such as edge computing and SDN represents a cutting-edge research direction. However, current research still faces significant gaps in designing collaborative security architectures across technology stacks, establishing unified trust propagation mechanisms, and ensuring scalability for massive vehicle fleets.
- 5) Blockchain-based trust mechanisms
Recent research indicates that trust mechanisms empowered by blockchain have become the core technical direction for enhancing the security and trustworthy interaction of the Internet of Vehicles (IoV). Srivastava et al.[56] proposed an Additive Increase and Multiple Decrease (AIMD) trust model based on a permissioned blockchain, which reduces latency while improving the packet delivery rate. Wei et al.[57] proposed a game-theory-driven dynamic Proof of Work (PoW) consensus that adjusts mining difficulty based on RSU trust values; this protocol achieves Nash equilibrium and higher efficiency. Yadav et al.[58] developed a Delegated Proof of Stake (DPoS) consensus that ensures trustworthiness by employing entropy and binomial distribution for miner selection, enabling information traceability and anonymous information sharing. Wang et al.[59] proposed a drone-assisted trust management scheme that combines certificateless authentication and Quality of Service (QoS) evaluation; this scheme resists both internal and external attacks.
Trust mechanisms based on game theory or novel consensus protocols enhance system security. However, these mechanisms typically require complex global information exchange or assume relatively stable network environments. Their effectiveness and efficiency in highly dynamic, partially connected IoV scenarios still require further validation and optimization.
The comparison of related research methods is shown in Table 1.
Analysis of Table I reveals that existing solutions primarily exhibit three limitations. First, there is an imbalance between security and efficiency, often resulting in high computational overhead for enhanced security or compromised privacy protection for higher efficiency. Second, centralization dependency and scalability issues persist, with trust models or key management presenting single points of failure. Third, deployment complexity and weak dynamic adaptability remain problematic, as many solutions rely on specific hardware or complex cryptography while offering limited support for cross-domain and highly mobile scenarios. Correspondingly, this proposal introduces three core design solutions. First, it employs lightweight cryptographic modules and batch-verifiable anonymous authentication protocols. By integrating security mechanisms such as ECC point multiplication while optimizing efficiency, it achieves a balance between security and performance. Second, it constructs a multi-TA decentralized trust architecture based on blockchain. Through smart contracts, it enables automated trust propagation and key management, eliminating central bottlenecks and enhancing scalability. Finally, it simplifies RSUs to pure relay nodes and designs a cross-domain direct authentication mechanism. This reduces deployment dependencies and leverages the blockchain’s global state to enable rapid, secure mutual recognition among vehicles in dynamic environments. Through this systematic design, the proposed solution comprehensively addresses existing challenges, delivering a more practical and scalable authentication framework for the IoV.
4 Security framework and analysis
This section describes the network model of the proposed scheme and its expected security objectives.
4.1 System model
This section presents the proposed system model, which comprises five key components: On-Board Unit (OBU), Roadside Unit (RSU), Trusted Authority (TA), blockchain, and Data Center (DC). Fig 1 illustrates the system model of the proposed scheme.
This figure shows that the system model comprises five key components: OBU, RSU, TA, blockchain, and DC.
OBU: Each vehicle is equipped with an OBU that provides computational and storage capabilities, along with support for cryptographic operations. The primary functions of the OBU include registering with third-party TAs and sending and receiving real-time traffic information via wireless communication with nearby RSUs.
RSU: Installed in road infrastructure, RSUs have limited communication ranges and moderate computational resources. They serve as the first contact point between vehicles and TAs, acting as information bridges. RSUs must register with TAs and facilitate message exchange with vehicles and TAs within their coverage area. Notably, RSUs do not authenticate vehicles or participate in blockchain transactions. It is important to emphasize that complete end-to-end identity authentication and key agreement must always be performed directly between the OBU and the TA. The essential communication exchanges between the OBU and the TA cannot be omitted. Consequently, offloading the authentication function from RSUs does not introduce additional network round-trip delays.
TA: The TA functions as a fully trusted third-party entity with substantial computing and robust storage resources. Both vehicles and RSUs must register with the TA. During vehicle registration, the TA generates and stores shared key parameters on the blockchain for subsequent authentication. When authenticating a vehicle, the TA retrieves the relevant parameters stored on the blockchain. It is worth noting that there are usually multiple TAs in a city or region, and the high-speed, long-distance mobility of vehicles necessitates cross-TA authentication.
Blockchain: Within the proposed network model, the collection of TAs constitutes a private blockchain-based multiserver network, with TAs actively assuming the role of miners. However, it is essential to note that any TA joining the network must be authorized by the system administrator through a meticulous process. Each block of the blockchain contains a pointer to the previous block, through which the corresponding block data can be queried. TAs upload information about registered vehicles to the blockchain, acting as nodes responsible for maintaining the ledger and uploading signed transactions. Regarding the consensus mechanism, to meet the high-speed, low-latency requirements of the IoV, a fast random node selection mechanism based on verifiable random functions (VRF) is adopted (drawing inspiration from Algorand) to participate in block generation. This mechanism efficiently and fairly selects consensus nodes in each round, avoiding the high energy consumption and long delays associated with PoW while eliminating the multi-round communication overhead of Practical Byzantine Fault Tolerance (PBFT). Consequently, it ensures security while enabling rapid and stable block generation.
DC: The DC stores all IoV-related information, including vehicle registration data and encrypted communication records. Importantly, all TAs share a common DC and communicate with it through wired channels. Given that DCs and TAs possess abundant resources, the secure channels established between them ensure message integrity and confidentiality.
In summary, the proposed system model incorporates multiple entities—OBU, RSU, TA, blockchain, and DC—to enable secure communication and authentication in intelligent vehicular networks. The synergy among these entities ensures vehicle security and data integrity.
4.2 Threat model
When constructing a secure communication system for the IoV, it is essential to clearly define the capabilities, targets, and methods of potential attackers. This threat model aims to comprehensively analyze the potential security threats, laying a foundation for the subsequent security objectives and measures proposed.
- 1) Capabilities of potential attackers
Computational Capability: Attackers may possess substantial computational resources, enabling them to perform complex cryptographic analyses, such as breaking keys or forging signatures.
Information Gathering Capability: Attackers may obtain sensitive information by eavesdropping on network communications or infiltrating system nodes, including vehicle identity information and communication keys.
Temporal Flexibility: Attackers can initiate attacks at any time without temporal constraints.
Network Control Capability (Extended from the Dolev-Yao Model): Attackers are assumed to possess complete control over the communication channel, enabling them to intercept, eavesdrop, inject, tamper with, or replay any message transmitted within the network. However, they cannot directly decrypt cryptographically sound encrypted messages without the corresponding keys.
- 2) Attack targets
Vehicle Identity Information: Attackers may attempt to obtain or tamper with vehicle identity information to conduct impersonation attacks.
Communication Keys: Attackers may attempt to compromise or steal communication keys to eavesdrop on or tamper with communication content.
System Integrity: Attackers may attempt to disrupt the normal operation of the system, for instance, through denial-of-service (DoS) attacks aimed at paralyzing the network.
- 3) Attack methods
Vehicle Impersonation Attack: Attackers may forge vehicle identities, masquerading as legitimate vehicles to communicate, thereby gaining illegal benefits or compromising system security.
Man-in-the-Middle Attack: Attackers may intercept communications between vehicles and RSUs or TAs, and tamper with or forge communication content to commit fraud or disrupt system operations.
Replay Attack: Attackers may intercept and store legitimate messages, then retransmit them at a later time to deceive the system or vehicles.
Key-Breaking Attack: Attackers may utilize powerful computational resources to attempt to break communication keys to obtain sensitive information or conduct unauthorized communications.
- 4) Threat model integration and foundational principles
This model systematically integrates core concepts from classical threat modeling frameworks when describing attacker capabilities and methods, ensuring a comprehensive and rigorous analysis:
Dolev-Yao Model: We adopt the Dolev-Yao model’s core assumption regarding attacker network capabilities—namely, attackers fully control communication channels and can perform eavesdropping, interception, injection, and replay operations. This forms the foundation for analyzing network-layer attacks, such as man-in-the-middle and replay attacks, within this model.
STRIDE Model: The attack types addressed by this model span multiple critical dimensions of the STRIDE threat classification:
Spoofing: Corresponds to vehicle impersonation attacks, where adversaries forge identities to masquerade as legitimate entities.
Tampering: In scenarios such as man-in-the-middle attacks, adversaries may illegally modify transmitted data content.
Repudiation: Leveraging blockchain immutability and smart contract execution logs, this proposed solution aims to provide verifiable audit trails for all critical operations to counter such threats.
Information Disclosure: Key cracking attacks and eavesdropping directly threaten information confidentiality.
Denial of Service: Attackers may incapacitate RSUs or TAs through resource exhaustion or similar methods, threatening system availability.
Elevation of Privilege: This solution employs multi-level authentication and strict separation of duties to prevent adversaries from exploiting vulnerabilities to gain unauthorized access beyond their permitted scope.
4.3 Security objectives and measures
The proposed scheme addresses the following security requirements through corresponding measures:
- 1) Registration security: During the registration process, the vehicle must transmit sensitive identity information, which is accomplished over a secure channel to ensure the security of the registration.
- 2) Confidentiality of TA key: The TA’s master key is neither transmitted over the network nor stored in RSUs at any time to ensure confidentiality.
- 3) Security of the blockchain pointer: This solution employs a blockchain pointer P as the key index credential for accessing specific on-chain data, such as vehicle identities or transaction records. Unlike the content-addressable approach based on hashes or block heights in conventional blockchains, P undergoes cryptographic processing to provide more direct access control tailored for specific application scenarios. To enhance the pointer’s security, the solution incorporates not only conventional XOR and hash operations but also elliptic curve point multiplication during its computation, thereby strengthening its resistance to cryptographic attacks.
- 4) Identity anonymity: Identity IDs cannot be directly involved in communication or cryptographic operations to preserve identity anonymity.
- 5) Communication security between RSU and TA: RSUs do not perform computations—they only act as data relays—thereby mitigating critical data transmission risks between RSUs and TAs.
- 6) Bidirectional authentication and key agreement: The scheme achieves mutual authentication between the OBU and TA while simultaneously negotiating session keys. Vehicle-to-vehicle communication is enabled via key agreement protocols.
- 7) Session key strength: To ensure that session keys are not easily cracked, their complexity must be increased.
- 8) Message integrity: Message integrity is ensured by verifying that the computed hash matches the received hash, confirming the sender’s legitimacy. Hash operations are employed to achieve this property.
- 9) Forward security: Forward security is ensured by deriving each session key independently using fresh random parameters, such that compromising a current session key does not reveal any previously established session keys.
- 10) Resistance to common attacks: The solution is designed to resist common attacks, including vehicle impersonation, MITM attacks, and replay attacks.
These security measures collectively ensure that the system remains robust against a diverse range of threats.
5 Proposed scheme
This section proposes a blockchain-based anonymous authentication and key agreement scheme for the IoV. The scheme comprises three distinct phases: initialization, registration, and authentication [60]. Table 2 illustrates the notations and descriptions employed in the proposed scheme.
5.1 Initialization phase
The initialization phase is as follows:
- Step I1: TA generates K and rTA.
- Step I2: TA initializes List = 0. For every OBU request: List←List+1.
5.2 Registration phase
The registration phase includes OBU registration and RSU registration.
- 1) Vehicle registration phase
The process of registering an OBU within any TA involves several steps, which are outlined as follows. During this process, the OBU and TA communicate via a secure channel.
Step R1:OBU registers with TA through a secure channel. The owner inputs IDi, PWi and BIOi via the OBU, generates a random number ri and calculates Ri = ri·G. Using biometric fuzzy extraction, it generates αi, βi by biometric fuzzy extraction, calculates HIDi = h(IDi‖αi), HPWi = h(PWi‖αi), O1 = h(IDi‖PWi‖αi)⊕ri, and O2 = h(IDi‖PWi‖αi‖ri). After completing the above steps, {HIDi,HPWi,Ri} are sent to TA via a secure channel.
Step R2: TA receives the message and calculates RTA = rTA·G, RTA-i = rTA·Ri, KTA = h(K‖rTA), OKTA = KTA⊕h(HIDi‖HPWi), and THIDi = h(HIDi‖KTA). TA sends {OKTA,THIDi,RTA} to the OBU via the secure channel.
Step R3: OBU receives the message, calculates KTA = OKTA⊕h(HIDi‖HPWi), and S1 = ri⊕KTA, then sends S1 to TA via the secure channel.
Step R4:TA receives the message, generates blockchain pointer P, calculates ri = S1⊕KTA, OP = P⊕h(KTA‖RTA-i), OT = ri⊕h(THIDi‖KTA), and uploads {HIDi,OT,S1} to the blockchain block corresponding to the pointer P. TA sends {OP} to the OBU via the secure channel.
Step R5:OBU receives the message and saves {OKTA,THIDi,O1,O2,OP,ri}. The OBU registration is completed.
Fig 2 illustrates the OBU registration phase.
This figure shows the interaction process when the OBU completes registration with the TA.
- 2) RSU registration phase
Here are the steps for an RSU to register with TA. During this process, the RSU and TA communicate via a secure channel.
Step R1: RSU generates identity information RIDj and a random number rj, then calculates HRIDj = h(RIDj‖rj) for subsequent authentication. RSU sends {HRIDj} to TA via the secure channel.
Step R2: TA receives the message, calculates TRIDj = h(HRIDi‖KTA), and saves TRIDj.
Fig 3 illustrates the RSU registration phase.
This figure shows the interaction process when the RSU completes registration with the TA.
5.3 Authentication and key agreement phase
The authentication phase is divided into two sub-phases: OBU and TA authentication and OBU and OBU authentication. During the subsequent authentication process, all three parties communicate via a public channel.
- 1) OBU and TA authentication
The authentication and key agreement phase for OBU and TA is as follows.
Step A1: The owner inputs IDi, PWi, BIOi via OBU, calculates αi* = Rep(BIOi,βi), ri* = O1⊕h(IDi‖PWi‖αi*), O2* = h(IDi‖PWi‖αi*‖ri*), and checks if O2* equals O2, If yes, proceed; otherwise, stop. Next, OBU calculates HIDi = h(IDi‖αi), HPWi = h(PWi‖αi), KTA = OKTA⊕h(HIDi‖HPWi), OT = ri⊕h(THIDi‖KTA), generates T1, and calculates M1 = h(THIDi‖OT‖ri‖KTA‖T1). It sends {M1, OP, Ri, T1} to RSU.
Step A2: RSU receives the message, appends its identity HRIDj, and sends {M1, OP,Ri,T1,HRIDj} to TA.
Step A3: TA receives the message and verifies time parameter T1. It then verifies the RSU identity by calculating if TRIDj*= h(HRIDi*‖KTA) equals TRIDj. If RSU identity is valid, TA calculates RTA-i = rTA·Ri, P = OP⊕h(KTA‖RTA-i), and checks if blockchain pointer P exists. If so, it reads the blockchain data corresponding to {HIDi,OT,S1}. Using the read data, it calculates ri* = S1*⊕KTA, THIDi = h(HIDi*‖KTA), OT* = ri*⊕h(THIDi*‖KTA), M1* = h(THIDi*‖OT*‖ri*‖KTA‖T1), checks if M1* equals M1, and if so, performs List = List+1 to prevent replay attack. TA generates rs, rT and T2, calculates ri’ = h(ri‖rs), OT’ = ri’⊕h(THIDi‖KTA), RTA-i’ = rTA·ri’·G, and derives the session key SKT = h(THIDi‖ri‖rT‖KTA‖RTA-i’). It generates a new blockchain pointer P’, calculates OP’ = P’⊕h(KTA‖RTA-i’), and puts {HIDi,OT’,SK} to the new block. Next, it calculates M2 = rs⊕h(HIDi‖KTA‖TRIDj), M3 = rT⊕h(THIDi‖KTA‖rs), M4 = h(THIDi‖TRIDj‖ri’‖rT‖T2), M5 = h(THIDi‖KTA‖TRIDj‖SK). Finally, {M2,M3,M4, M5, RTA, T2} are sent to RSU.
Step A4: RSU receives the message from TA, appends its identity, and sends {M2,M3,M4, M5, RTA,HRIDj,T2} to TA.
Step A5: OBU receives the message and verifies time parameter T2. Then it calculates TRIDj* = h(HRIDi*‖KTA), rs* = M2⊕h(HIDi‖KTA‖TRIDj*), rT* = M3⊕h(THIDi‖KTA‖rs*), ri’* = h(ri‖rs*), M4* = h(THIDi‖TRIDj‖ri’*‖rT*‖T2), and verifies if M4* equals M4. If verified, it calculates Ri-TA* = ri’*·RTA, derives session key SKO* = h(THIDi‖ri‖rT*‖KTA‖Ri-TA*), calculates M5* = h(THIDi‖KTA‖TRIDj*‖SK*), and verifies if M5* equals M5. If this also passes, it calculates O1’ = h(IDi‖PWi‖αi)⊕ri’, O2’ = h(IDi‖PWi‖αi‖ri’), and updates OBU’s storage data to {OKTA,THIDi,O1’,O2’,OP’,ri’}.
Fig 4 illustrates the authentication and key agreement phase for OBU and TA.
This figure shows the process of the OBU completing authentication and key agreement with the TA.
- 2) OBU and OBU authentication
The authentication and key agreement phase for OBU and OBU is as follows.
Step A1: OBUA and OBUB broadcast their respective identity information {HIDA,OPA,RA} and {HIDB,OPB,RB}. The communicating parties receive each other’s information and send authentication requests to RSU in the region, respectively.
Step A2: RSU forwards authentication requests {OPA,RA,OPB,RB} from OBUA and OBUB to TA.
Step A3: TA receives the message and calculates RTA-A = rTA·RA, RTA-B = rTA·RB, PA = OPA⊕h(KTA‖RTA-A), PB = OPB⊕h(KTA‖RTA-B). It then checks whether blockchain pointer PA, and PB exist in the blockchain. If they do, it reads blockchain data {HIDA,OTA,SKA} associated with PA and {HIDB,OTB,SKB} associated with PB, calculates SKAB = h(SKA‖SKB), derives the session keys PKBA = SKAB⊕h(KTA‖SKB) and PKAB = SKAB⊕h(KTA‖SKA) between OBUA and OBUB, and sends {HIDA, PKBA} and {HIDB, PKAB} to RSU.
Step A4: RSU sends {HIDA, PKBA} to OBUB and {HIDB, PKAB} to OBUA.
Step A5: OBUB calculates session key SKAB = PKBA⊕h(KTA‖SKB), OBUA calculates session key SKAB = PKAB⊕h(KTA‖SKA). OBUA and OBUB then communicate using the session key.
Fig 5 illustrates the authentication and key agreement phase for OBU and OBU.
This figure shows the process of authentication and key agreement between two OBUs.
5.4 Scalability analysis and optimization strategy
This scheme focuses on two core bottlenecks in large-scale deployment scenarios, especially in heterogeneous vehicle networks. First, differentiated authentication requirements across multiple vehicle types may lead to an imbalance in TA computational load. With the increasing diversity of vehicles—such as fuel-powered vehicles, new energy vehicles, and autonomous vehicles—authentication dimensions vary significantly. During peak hours, TA computing resources may become overloaded, potentially degrading authentication efficiency. Second, variations in RSU hardware specifications across different regions can cause coordination failures. In heterogeneous networks, discrepancies in RSU processing capabilities may result in mismatched message forwarding rates, with low-capability RSUs becoming data transmission bottlenecks that compromise real-time authentication performance.
To address these challenges, two key optimization strategies are proposed. To tackle the first bottleneck, a dynamic computing power scheduling mechanism is constructed, which sets authentication priorities based on vehicle types and authentication requirements, and diverts non-core authentication tasks to edge nodes. Additionally, a flexible resource pool is configured for the TA, enabling automatic scaling during peak periods to accommodate surges in computational demand. Regarding the second bottleneck, a hierarchical collaborative system for RSUs is established, dividing them into high-computing-power core nodes and ordinary relay nodes based on hardware capabilities. Core nodes are responsible for aggregating and forwarding cross-domain authentication data, whereas ordinary nodes serve only as low-load local relays. By synchronizing RSU load status through blockchain, the system dynamically adjusts data transmission paths to avoid single-point overload and ensure the scalability of the system under large-scale deployment.
6 Security analysis
The security of the scheme was assessed using three different security analysis approaches: formal security analysis based on BAN logic [61], informal security analysis to verify security features and resist attacks, and simulation experiments via the ProVerif tool.
6.1 Formal security analysis
Next, the scheme’s security was verified using BAN logic, whose notations, descriptions, and inference rules are defined as shown in Tables 3 and 4.
- 1) Goals:
- 2) Idealized forms:
- 3) Assumptions:
- 4) Main proofs
Step 1: From I1 and I2, we can deduce that TA has received message M1.
Step 2: Applying the message-meaning rule (R1) to S1 and assumption A1 yields:
This confirms that TA believes M1 originated from OBUi.
Step 3: By applying the freshness rule (R4) to assumption A3, we obtain:
Thus, TA believes that M1 is fresh.
Step 4: Applying the nonce-verification rule (R2) to S2 and S3 gives:
This indicates that TA believes OBUi also believes M1.
Step 5: From S4 and assumption A5, the jurisdiction rule (R3) allows us to infer:
Thus, TA believes that M1 is true.
Step 6: Applying the conjunction rule (R5) to S5 and assumption A5 yields:
where ri is a component of M1. This confirms that TA believes that OBUi also believes ri.
Step 7: With S6, assumption A3, and the session key , applying rule R6 gives:
This achieves goal G1, i.e., TA believes that SK is a secure shared key between itself and OBUi.
Step 8: From S7, assumption A3, and assumption A7, applying rules R2 and R4 yields:
This achieves goal G2, i.e., TA believes that OBUi also believes SK is a secure shared key between them.
Step 9: From I3 and I4, we can deduce that OBUi has received message M4.
Step 10: Applying the message-meaning rule (R1) to S9 and assumption A2 yields:
This confirms that OBUi believes M4 originated from TA.
Step 11: By applying the freshness rule (R4) to assumption A4, we obtain:
Thus, OBUi believes that M4 is fresh.
Step 12: Applying the nonce-verification rule (R2) to S10 and S11 gives:
This indicates that OBUi believes that TA also believes M4.
Step 13: From S12 and assumption A6, the jurisdiction rule (R3) allows us to infer:
Thus, OBUi believes that M4 is true.
Step 14: Applying the conjunction rule (R5) to S13 and assumption A6 yields:
where rT is a component of M4. This confirms that OBUi believes that TA also believes rT.
Step 15: With S14, assumption A4, and the session key , applying rule R6 gives:
This achieves goal G3, i.e., OBUi believes that SK is a secure shared key between itself and TA.
Step 16: From S15, assumption A4, and assumption A8, applying rules R2 and R4 yields:
This achieves goal G4, i.e., OBUi believes that TA also believes SK is a secure shared key between them.
6.2 Informal security analysis
Informal security analysis evaluates the scheme’s security properties and its resistance to diverse attacks. Each security property and attack type is briefly defined, followed by a demonstration of how the proposed scheme effectively resists the identified threats.
- 1) Vehicle anonymity
All vehicle identity information is secured via one-way hashing: the scheme concatenates vehicle ID with a random number, then hashes the result to generate HIDi = h(IDi‖αi), ensuring that adversaries cannot derive real identities from the hash value.
- 2) Vehicle impersonation attack
Even if an adversary captures vehicle information and obtains ID/PW, they must input the owner’s biometric BIO to verify αi and compute ri* = O1⊕h(IDi‖PWi‖αi*) and O2* = h(IDi‖PWi‖αi*‖ri*) for login. The adversary does not possess the biometrics of the vehicle owner, so he cannot log in the system. Furthermore, each login requires a fresh random number ri, that cannot be obtained by the adversary. Therefore, even if the adversary captures the vehicle’s information, he/she cannot execute an impersonation attack.
- 3) Message integrity
The TA verifies M1 = h(THIDi‖OT‖ri‖KTA‖T1) upon receiving OBU messages, so if the data are tampered with or deleted, the M1 verification will fail, and the scheme will terminate the verification and subsequent processes. Similarly, the OBU verifies the one-way hash functions M4 = h(THIDi‖TRIDj‖ri’‖rT‖T2) and M5 = h(THIDi‖KTA‖TRIDj‖SK) after receiving the message from the TA, if the data are tampered with or deleted, the verification will fail, thereby ensuring information integrity.
- 4) Forward safety
Suppose an adversary compromises the vehicle’s current session key SKO = h(THIDi‖ri‖rT‖KTA‖Ri-TA) through a key attack. Since the key is derived from a hash of parameters (THIDi, ri, rT, KTA and Ri-TA), the adversary cannot retrieve these parameters from the hash value alone. Suppose the adversary captures all past data transmitted over the channel to obtain parameters (e.g., Ri, RTA), parameters such as THIDi, ri, rT, KTA are never transmitted over the channel, and the random number ri is updated every round. In addition, the attacker cannot calculate ri and rTA using Ri = ri·G and RTA = rTA·G because this calculation involves the Elliptic Curve Discrete Logarithm Problem (ECDLP) mathematical difficulties. Therefore, an adversary cannot calculate the previous key from the current key.
- 5) Replay attack
This scheme contains timestamps T1 and T2. During the scheme, when the OBU, RSU, and TA receive a message, they must verify the timestamp. Because the timestamp is generated based on the current time, it is unmodifiable, and the adversary cannot forge it. If the adversary carries out a replay attack, the OBU, RSU, and TA can quickly identify the adversary by recognizing the validity of the timestamp, thereby resisting the replay attack.
- 6) MITM attack
According to the challenge/response mechanism, both OBU-RSU and RSU-TA communications require mutual identity verification. As established in the analysis of vehicle impersonation attacks, an adversary cannot successfully masquerade as a legitimate entity. Moreover, as demonstrated in the message integrity analysis, an adversary cannot tamper with transmitted messages without detection. Suppose the adversary intercepts the messages {M1, OP,Ri,T1} and {M2,M3,M4, M5, RTA, T2} over public channels. The messages M1, M2, M3, and M4 are hash functions, and Ri and RTA are results of elliptic curve scalar multiplications. According to the unidirectional property of hash functions and the mathematical hardness of the ECDLP, the adversary cannot obtain any useful parameters from them. Thus, the adversary cannot disguise themselves as intermediaries during MITM attack. Furthermore, timestamps and random numbers are inherently time-sensitive and cannot be forged via MITM attack, making it impossible for an attacker to pose as an intermediary and initiate an assault.
- 7) Sybil attack
The proposed scheme mainly includes two measures to resist Sybil attack: binding the vehicle identity with a unique biometric credential, and leveraging the immutability of blockchain. During the registration phase, each OBU needs to complete registration with the TA through exclusive biometric information, which is processed through hashing and stored on the blockchain. During the authentication process, the TA will verify the hash value corresponding to the biometric features against the blockchain records. Due to the tamper-proof nature of blockchain, attackers cannot forge valid biometric credentials. Furthermore, real-time synchronization is achieved through blockchain during multi-TA verification. Even if attackers register false identities in a single TA domain, cross-TA verification can quickly detect anomalies and effectively resist Sybil attacks.
- 8) DoS attack
This solution employs RSU function optimization and lightweight cryptographic computations to resist DoS attacks. On one hand, RSUs are restricted to functioning solely as message relays, which effectively prevents attackers from exhausting RSU resources through forged authentication requests. On the other hand, the ECC key of this protocol adopts a 160-bit short key length, which not only ensures security but also reduces computation time. Even under high request volumes, the TA can efficiently process legitimate requests and effectively resist DoS attacks targeting system overload.
- 9) Rogue RSU attack
The dual-layer verification mechanism of this scheme can effectively resist Rogue RSU attack. Legitimate RSUs need to be registered with the TA in advance, and the TA will issue the OKTA parameter containing the RSU’s identity and public key. Before receiving a message, the OBU and TA will first verify the validity of the operation result corresponding to OKTA. Any rogue RSU that fails this verification is immediately rejected. In addition, the TA will send the blockchain pointer parameter OP to legitimate users during registration. Communication between the OBU and TA also requires verification of OP, and rogue RSUs will be directly rejected. Finally, the TA distributes the RSU certificate revocation list to the network through blockchain to ensure that rejected RSUs can be promptly excluded, effectively resisting Rogue RSU attacks.
- 10) Bidirectional authentication and key agreement
The scheme achieves bidirectional authentication between OBU and TA via M1 = h(THIDi‖OT‖ri‖KTA‖T1), M4 = h(THIDi‖TRIDj‖ri’‖rT‖T2), M5 = h(THIDi‖KTA‖TRIDj‖SK) and simultaneously derives the session key SKT = h(THIDi‖ri‖rT‖KTA‖RTA-i’)= h(THIDi‖ri‖rT‖KTA‖Ri-TA)= SKO.
- 11) Backward secrecy
The session key SK = h(THIDi‖ri‖rT‖KTA‖Ri-TA) in this scheme is jointly generated by the KTA and the round-specific temporary random numbers ri and rT. These random numbers are immediately discarded after each session and are never transmitted in plaintext, preventing attackers from obtaining historical ri/rT values. Consequently, the TA’s master key KTA alone cannot be used to derive any past SK. This ensures strict backward secrecy, protecting all past communication sessions.
- 12) Session key security
In this scheme, each session key SK = h(THIDi‖ri‖rT‖KTA‖Ri-TA)is generated using a unique and independent temporary random number ri and rT for each round. The strong one-way property of the hash function ensures that the random numbers used to generate the key cannot be derived from the old SK. More importantly, the random numbers used in different authentication rounds are mathematically and temporally independent. Thus, leakage of random numbers from one session provides no advantage to an adversary in guessing or deriving random numbers for any other session. Therefore, the scheme guarantees session key security.
- 13) Insider and malicious TA attacks
This solution employs blockchain multi-TA coordination and cryptographic mechanisms to counter insider threats. When a single TA node attempts unauthorized authentication due to key theft or malicious intent, it must provide the OBU’s random number ri for verification by peer TAs. The blockchain’s smart contracts ensure transparent and verifiable trust states. Any abnormal TA behavior is recorded on-chain and excluded through consensus, thereby suppressing internal attacks.
- 14) Smart-card-lost/device capture attack
The critical login parameter αi in this solution is protected by the vehicle owner’s biometric data (BIOi). The value O1 stored within the device is either a hash or ciphertext. Without BIOi, αi cannot be recovered nor can valid random numbers ri be generated. Furthermore, the ri required for session key generation is dynamically produced each time and is not stored on the device, ensuring physical tampering is ineffective. Therefore, even if the device is lost, an attacker cannot authenticate using the lost device.
Table 5 presents the security characteristics of the proposed scheme alongside a comparative security analysis against various attacks using related schemes from the past two years. In the table, √ denotes protection, and × denotes no protection.
6.3 Simulation-based verification using proverif
This section employs the formal verification tool ProVerif to conduct a rigorous security analysis of the proposed authentication and key agreement protocol, thereby validating the security of the scheme. ProVerif, based on the Applied Pi calculus, is an automated verification tool designed to assess confidentiality, authenticity, and integrity in cryptographic protocols. It can analyze a protocol’s resistance to both passive and active attacks.
- 1) Methodology description
First, model the protocol participants (OBU, RSU, and TA) and their interaction process, including: 1) Defining multiple private channels (sch1, sch2) and public channels (ch1, ch2) for transmitting confidential and public information, respectively; 2) Defining cryptographic operations, including hash functions (h), exclusive-OR operations (xor), point multiplication (mult), symmetric encryption (syme), and biometric-related functions (Gen, Rep); 3) Defining multiple private-type key parameters, such as vehicle identity IDi, temporary key ri, and TA master key K, to prevent theft by attackers.
Second, characterize the authentication process by inserting event markers at critical protocol steps: event beginTA(id) and event endTA(id) mark the start and end of TA authentication; event beginOBUi(id) and event endOBUi(id) mark the start and end of vehicle OBUi authentication.
Finally, verify the protocol’s security properties through the following queries: 1) Using query attacker(SKO) and query attacker(SKT) to conduct confidentiality queries, verifying whether the session keys SKO and SKT have been compromised by attackers; 2) Employing inj-event formal queries to assess bidirectional authentication properties, and conducting authentication queries to verify whether communication between TA and OBUi is susceptible to identity spoofing or replay attacks.
- 2) Analysis process
The entire system analysis process is divided into three parallel processes:!processOBUi |!processRSU |!processTA, representing the behaviors of the vehicle OBU, RSU, and TA respectively. These include: 1) OBUi uses biometric information Bio to generate auxiliary data (alpha_i, beta_i), calculates the hidden identity HIDi and hidden password HPWi, and sends registration-related data to TA; 2) The TA uses the master key K and random number rTA to generate key material, returning data such as OKTA, temporary identity THIDi, and public key parameters RTAA to OBUi to complete OBUi registration; 3) OBUi and TA complete mutual authentication through multiple interactions, ultimately negotiating session keys SKO and SKT. RSU acts as a relay node, forwarding authentication messages between OBUi and TA without participating in key derivation or security parameter processing.
During verification, ProVerif automatically simulates the Dolev-Yao attacker model. Under this model, the attacker fully controls the public channel, capable of eavesdropping, intercepting, tampering with, and injecting messages, while possessing cryptographic computation capabilities. ProVerif detects whether the attacker can violate the defined security properties by exploring attack paths in the state space and deriving rules.
- 3) Analysis results
The automated verification results from ProVerif are shown in Fig 6. Based on the verification results, the protocol’s security is analyzed as follows.
This figure shows the automated verification results generated by ProVerif.
Session key confidentiality is strictly guaranteed. Verification results (1) and (2) show that both “not attacker(SKO[])” and “not attacker(SKT[])” yield true. This indicates that even under the Dolev-Yao threat model, where the attacker fully controls the public channel and employs eavesdropping, replay, or tampering attacks—the attacker cannot obtain the session keys SKO and SKT negotiated between the vehicle and the TA. These results validate the security of the protocol’s key exchange process, thereby ensuring the confidentiality of subsequent communications.
Furthermore, the bidirectional authentication mechanism is effectively implemented. Verification results (3) and (4) demonstrate that “inj-event(endTA(id)) ==> inj-event(beginTA(id))” and “inj-event(endOBUi(id)) ==> inj-event(beginOBUi(id))” both yield true. This confirms the protocol’s capability to achieve secure mutual authentication. Specifically, only after the TA has indeed initiated an authentication session with a specific vehicle OBUi (beginTA(id)) can that session successfully conclude (endTA(id)); similarly, only after the vehicle OBUi has correctly initiated the authentication process (beginOBUi(id)) can it successfully complete authentication with the TA (endOBUi(id)). This causal relationship between injection events (inj-event) proves the protocol’s resistance to MITM attack and identity spoofing attack, ensuring the authenticity of both communicating parties.
7 Performance analysis and comparison
To evaluate the performance of the proposed scheme, two key metrics are introduced: computational cost and communication cost. These metrics are calculated and compared with those of existing schemes. Here, computational cost refers to the time resources expended in executing the necessary processing tasks, and communication cost denotes the quantified volume of data bits transmitted through the communication channel.
7.1 Computational cost
The computational cost is defined as the total simulation time required to fully execute the proposed scheme, including operations such as authentication, verification, and key agreement. This study focuses on elliptic curve operations, modular exponentiation, symmetric cryptography, and hashing. XOR and concatenation costs are negligible compared to others. In this section, the execution time data for various cryptographic primitives are examined, employing the well-regarded Multi-precision Integer and Rational Arithmetic Cryptographic Library (MIRACL) as the benchmark, in accordance with established literature [62]. The considered hardware configuration has the setting: “Raspberry PI 3 B+ Rev 1.3, Ubuntu 20.04 LTS, 64-bit OS, 1.4 GHz Quad-core processor, cores 4, 1 GB RAM”. The measured computation times for the relevant cryptographic operations are presented in Table 6.
Assuming that the computational costs of OBUi, RSU, and TA are ECAOBUi, ECARSU, and ECATA, respectively, the specific computational expressions are as follows:
The total computation costs ECAtotal of the scheme are as follows:
To substantiate the efficacy of the proposed scheme and validate its performance, its computational costs were compared with those of related schemes from the past two years. Fig 7 illustrates this comparison. The proposed scheme achieves the lowest computational cost among all compared solutions. It employs an ECDH-based key agreement mechanism, where the majority of the computational overhead is attributed to point multiplication operations. Although point multiplication is relatively time-intensive, it offers higher key density and enables the use of shorter key lengths while maintaining an equivalent security level. Consequently, despite incorporating this operation, the overall computational cost of the proposed scheme does not increase significantly, thereby effectively enhancing the operational efficiency of the IoV system.
The figure illustrates the comparison of the computation costs of various schemes.
7.2 Communication cost
Communication cost refers to the bits required to transmit variables and parameters. This study evaluates costs based on data lengths, including hash values, timestamps, and elliptic curve points (public keys). For consistency with other compared schemes, the proposed scheme adopts the data length settings defined in reference [30]. The specific values are detailed in Table 7.
Assuming that the length of the data sent by OBUi, RSU, and TA is ECOOBUi, ECORSU, and ECOTA, respectively, the specific calculation expression is as follows:
The total transmit data length ECOtotal is as follows:
To assess the effectiveness of the proposed scheme, a comprehensive comparison of its communication costs with those of the aforementioned schemes was conducted. Fig 8 presents a quantitative comparison of communication costs across different schemes. As illustrated, the communication overhead of the proposed scheme falls within the mid-to-high range among all compared solutions. This result is primarily attributed to the transmission of multiple public keys and hash values during the authentication process, which enhances security and attack resistance by incorporating redundant security information. Although this leads to a slight increase in communication overhead, the overall cost remains within a reasonable and controllable range acceptable for practical IoV deployments. Thus, the proposed scheme achieves a balanced trade-off between security and communication efficiency.
The figure illustrates the specific quantification of the communication costs of various schemes.
8 Conclusion
This study proposes a blockchain-based scheme for anonymous authentication and key agreement in IoV, leveraging a multi-TA model and blockchain architecture. With the help of the blockchain, vehicle OBUs, RSUs, and TAs are integrated and authenticated, and secure storage is provided. The TAs in this scheme form a blockchain network that solves the problem of cross-TA vehicle authentication. Security is ensured via bidirectional authentication and key agreement between OBUs and TAs. Formal security verification using BAN logic demonstrates the scheme’s robustness against various attacks, while simulation analysis with the ProVerif tool confirms its practical feasibility. Performance evaluation of computational and communication overhead indicates that the proposed scheme achieves lower costs compared to most existing protocols. Although the proposed solution achieves a favorable balance between security and performance, it still exhibits certain limitations. Future work will focus on optimizing the following two aspects. First, the current reliance on elliptic curve cryptography results in relatively high computational overhead. Subsequent research will explore lightweight cryptographic algorithms or hardware acceleration techniques to improve efficiency. Second, cross-TA online collaborative authentication is sensitive to network latency. We plan to design mechanisms that support local verification and asynchronous consensus to enhance system robustness. Overall, this study provides a viable pathway toward achieving secure and efficient cross-domain authentication for IoV, and the proposed optimizations will further advance research in this area.
References
- 1. Zheng J, Wang X, Yang Q, Xiao W, Sun Y, Liang W. A blockchain-based lightweight authentication and key agreement scheme for internet of vehicles. Conn Sci. 2022;34(1):1430–53.
- 2. Zhong H, Huang B, Cui J, Xu Y, Liu L. Conditional Privacy-Preserving Authentication Using Registration List in Vehicular Ad Hoc Networks. IEEE Access. 2018;6:2241–50.
- 3. Alazzawi MA, Lu H, Yassin AA, Chen K. Efficient Conditional Anonymity With Message Integrity and Authentication in a Vehicular Ad-Hoc Network. IEEE Access. 2019;7:71424–35.
- 4. Al-Shareeda MA, Anbar M, Manickam S, Hasbullah IH. Towards Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks. IEEE Access. 2021;9:113226–38.
- 5. Cui J, Zhang X, Zhong H, Zhang J, Liu L. Extensible Conditional Privacy Protection Authentication Scheme for Secure Vehicular Networks in a Multi-Cloud Environment. IEEE Trans Inform Forensic Secur. 2020;15:1654–67.
- 6. Liu Y, Wang Y, Chang G. Efficient Privacy-Preserving Dual Authentication and Key Agreement Scheme for Secure V2V Communications in an IoV Paradigm. IEEE Trans Intell Transport Syst. 2017;18(10):2740–9.
- 7. Ma M, He D, Wang H, Kumar N, Choo K-KR. An Efficient and Provably Secure Authenticated Key Agreement Protocol for Fog-Based Vehicular Ad-Hoc Networks. IEEE Internet Things J. 2019;6(5):8065–75.
- 8. Wu W, Ye F. A secure and efficient certificateless aggregate signature authentication scheme with pseudonyms for VANETs. IEEE Internet Things J. 2025;12(1):124–39.
- 9. Tangade S, Manvi SS, Lorenz P. Trust Management Scheme Based on Hybrid Cryptography for Secure Communications in VANETs. IEEE Trans Veh Technol. 2020;69(5):5232–43.
- 10. Su Y, Shen G, Zhang M. A Novel Privacy-Preserving Authentication Scheme for V2G Networks. IEEE Syst J. 2020;14(2):1963–71.
- 11. Li Y, Cheng Q, Liu X, Li X. A Secure Anonymous Identity-Based Scheme in New Authentication Architecture for Mobile Edge Computing. IEEE Syst J. 2021;15(1):935–46.
- 12. Alfadhli SA, Lu S, Chen K, Sebai M. MFSPV: A Multi-Factor Secured and Lightweight Privacy-Preserving Authentication Scheme for VANETs. IEEE Access. 2020;8:142858–74.
- 13. Xu Z, Li X, Xu J, Liang W, Choo K-KR. A secure and computationally efficient authentication and key agreement scheme for Internet of Vehicles. Comput Electr Eng. 2021;95:107409.
- 14. Umar M, Islam SH, Mahmood K, Ahmed S, Ghaffar Z, Saleem MA. Provable Secure Identity-Based Anonymous and Privacy-Preserving Inter-Vehicular Authentication Protocol for VANETS Using PUF. IEEE Trans Veh Technol. 2021;70(11):12158–67.
- 15. Jiang Q, Zhang X, Zhang N, Tian Y, Ma X, Ma J. Three-factor authentication protocol using physical unclonable function for IoV. Comput Commun. 2021;173:45–55.
- 16. Wei Z, Zhu M, Zhang N, Wang L, Zou Y, Meng Z, et al. UAV-Assisted Data Collection for Internet of Things: A Survey. IEEE Internet Things J. 2022;9(17):15460–83.
- 17. Hou W, Sun Y, Li D, Cui J, Guan Z. PUF-based V2V anonymous authentication and key agreement protocol for 5G Telematics. Comput Res Dev. 2021;58(10):2265–77.
- 18. Sripathi Venkata Naga SK, Yesuraj R, Munuswamy S, Arputharaj K. A Comprehensive Survey on Certificate-Less Authentication Schemes for Vehicular Ad hoc Networks in Intelligent Transportation Systems. Sensors (Basel). 2023;23(5):2682. pmid:36904886
- 19. Xie Q, Huang J. Improvement of a Conditional Privacy-Preserving and Desynchronization-Resistant Authentication Protocol for IoV. Appl Sci. 2024;14(6):2451.
- 20. Hou Q, Hsu C, Au MH, Hu H, Zhao Z, Wu Z. Efficient and provably secure privacy-preserving two-factor authentication and key-agreement using blockchain and TEE for IoV environments. J Syst Archit. 2025;164:103422.
- 21. Jiang W, Lv X, Tao J. A secure authentication framework for IoV based on blockchain and ensemble learning. Veh Commun. 2024;50:100836.
- 22. Xiong H, Yao T, Zhao Y, Gong L, Yeh K-H. A Conditional Privacy-Preserving Mutual Authentication Protocol With Fine-Grained Forward and Backward Security in IoV. IEEE Trans Intell Transport Syst. 2024;25(11):15493–511.
- 23. Bhatt S, Kar J. A Blockchain-Based Privacy-Preserving Authentication Scheme for Secure Platoon Communications in VANET. IEEE Open J Veh Technol. 2026;7:468–90.
- 24. Jamal Ibrahim S, Beitollahi H. PPA6-IoV: A Six-Step Privacy-Preserving Authentication Protocol for the Internet of Vehicles. IEEE Access. 2024;12:168120–34.
- 25. Zhang H, Lai Y, Chen Y. Authentication methods for internet of vehicles based on trusted connection architecture. Simul Model Pract Theory. 2023;122:102681.
- 26. Lo N-W, Yu W-H, Huang J-J, Chen Y-C. Edge-enhanced decentralized vehicle authentication protocol for IoV. ICT Express. 2025;11(4):624–30.
- 27. Mukathe D, Di W, Ahmed W, Worku T. Blockchain-Powered Authenticated Key Agreement Scheme With Reputation-Incentive Mechanism for Vehicle-to-Vehicle Communication in IoV. IEEE Internet Things J. 2025;12(13):25500–15.
- 28. Haider MHA, Fayaz M, Zhang Y, Noureen H, Haider ZA, Khan FM, et al. Enhancing Authentication Security in Internet of Vehicles: A Blockchain-Driven Approach for Trustworthy Communication. ICCK Trans Adv Comput Syst. 2024;1(1):48–62.
- 29. Emanuel Farias da Costa Borges V, Sobrinho Á, Santos DFS, Perkusich A. A Self-Sovereign Identity-Based Authentication and Reputation Protocol for IoV Applications. IEEE Access. 2025;13:105693–711.
- 30. Wang J, Xu C, Zhu L, Zhang K, Liu H. BCADS: Blockchain-Assisted Cross-Domain Authentication with Decentralized Identity for VANETs under Strict Oversight. IEEE Trans Dependable Secur Comput. 2026;:1–18.
- 31. Liu C, Wei H, Xue Z, Kang J, Xu X, Han G. Cybertwin-Enhanced Distributed Authentication with Lightweight Cryptography for Secure Internet of Vehicles. IEEE Trans Veh Technol. 2026;:1–16.
- 32. Dorri A, Kanhere SS, Jurdak R, Gauravaram P. LSB: A Lightweight Scalable Blockchain for IoT security and anonymity. J Parallel Distrib Comput. 2019;134:180–97.
- 33. Wang X, Zeng P, Patterson N, Jiang F, Doss R. An Improved Authentication Scheme for Internet of Vehicles Based on Blockchain Technology. IEEE Access. 2019;7:45061–72.
- 34. Zhang Q, Li Y, Wang R, Li J, Gan Y, Zhang Y, et al. Blockchain-based asymmetric group key agreement protocol for internet of vehicles. Comput Electr Eng. 2020;86:106713.
- 35. Qureshi KN, Shahzad L, Abdelmaboud A, Elfadil Eisa TA, Alamri B, Javed IT, et al. A Blockchain-Based Efficient, Secure and Anonymous Conditional Privacy-Preserving and Authentication Scheme for the Internet of Vehicles. Appl Sci. 2022;12(1):476.
- 36. Ma Z, Zhang J, Guo Y, Liu Y, Liu X, He W. An Efficient Decentralized Key Management Mechanism for VANET With Blockchain. IEEE Trans Veh Technol. 2020;69(6):5836–49.
- 37. Lin C, He D, Huang X, Kumar N, Choo K-KR. BCPPA: A Blockchain-Based Conditional Privacy-Preserving Authentication Protocol for Vehicular Ad Hoc Networks. IEEE Trans Intell Transport Syst. 2021;22(12):7408–20.
- 38. Li R, Cui J, Zhang J, Wei L, Zhong H, He D. Blockchain-Assisted Revocable Cross-Domain Authentication for Vehicular Ad-Hoc Networks. IEEE Trans Dependable Secur Comput. 2025;22(5):4593–606.
- 39. Akhter AFMS, Ahmed M, Shah AFMS, Anwar A, Kayes ASM, Zengin A. A Blockchain-Based Authentication Protocol for Cooperative Vehicular Ad Hoc Network. Sensors (Basel). 2021;21(4):1273. pmid:33670097
- 40. Singh G, Sharma S, Saudagar AKJ, Kumar S. A secure group-based authentication protocol for IoVT in 5G-enabled smart transportation and road safety systems. Sci Rep. 2026;16(1):2212. pmid:41540082
- 41. Ali I, Gervais M, Ahene E, Li F. A blockchain-based certificateless public key signature scheme for vehicle-to-infrastructure communication in VANETs. J Syst Archit. 2019;99:101636.
- 42. Meng X, Xu J, Liang W, Xu Z, Li K-C. A lightweight anonymous cross-regional mutual authentication scheme using blockchain technology for internet of vehicles. Comput Electric Eng. 2021;95:107431.
- 43. Tan H, Chung I. Secure Authentication and Key Management With Blockchain in VANETs. IEEE Access. 2020;8:2482–98.
- 44. Vishwakarma L, Nahar A, Das D. LBSV: Lightweight Blockchain Security Protocol for Secure Storage and Communication in SDN-Enabled IoV. IEEE Trans Veh Technol. 2022;71(6):5983–94.
- 45. Bhushan B, Khamparia A, Sagayam KM, Sharma SK, Ahad MA, Debnath NC. Blockchain for smart cities: A review of architectures, integration trends and future research directions. Sustain Cities Soc. 2020;61:102360.
- 46. Feng X, Shi Q, Xie Q, Liu L. An Efficient Privacy-preserving Authentication Model based on blockchain for VANETs. J Syst Archit. 2021;117:102158.
- 47. Xu Z, Liang W, Li K-C, Xu J, Zomaya AY, Zhang J. A Time-Sensitive Token-Based Anonymous Authentication and Dynamic Group Key Agreement Scheme for Industry 5.0. IEEE Trans Ind Inf. 2022;18(10):7118–27.
- 48. Son S, Lee J, Park Y, Park Y, Das AK. Design of Blockchain-Based Lightweight V2I Handover Authentication Protocol for VANET. IEEE Trans Netw Sci Eng. 2022;9(3):1346–58.
- 49. Lu X, Zhang J, Liu S, Dong Y, Lu X, Liu J. A lattice-based dual blockchain anonymous authentication scheme with forward security and revocability for VANETs. J Inf Secur Appl. 2026;97:104369.
- 50.
Mei Q, Xiong H, Zhao Y, Yeh KH. Toward blockchain-enabled IoV with edge computing: Efficient and privacy-preserving vehicular communication and dynamic updating. In: Proceedings of the 2021 International Conference on Dependable Systems and Their Applications (DSC); 2021 Jan 30-Feb 1; Aizuwakamatsu, Japan. New York: IEEE; 2021. p. 1–8.
- 51. Xu Z, Liang W, Li K-C, Xu J, Jin H. A blockchain-based Roadside Unit-assisted authentication and key agreement protocol for Internet of Vehicles. J Parallel Distrib Comput. 2021;149:29–39.
- 52.
Shi Q, Sun J, Fu H, Fu P, Ma J, Xu H. BeACONS: A blockchain-enabled authentication and communications network for scalable IoV. In: Proceedings of the 2024 International Conference on Future Computing and Networking (FCN); 2024 Nov 18-22; Valletta, Malta. New York: IEEE; 2024. p. 1–6.
- 53. Surapaneni P, Bojjagani S, Maurya AK. Handover-Authentication Scheme for Internet of Vehicles (IoV) Using Blockchain and Hybrid Computing. IEEE Access. 2024;12:140483–501.
- 54. Lin H-T, Jhuang W-L. Blockchain-Based Lightweight Certificateless Authenticated Key Agreement Protocol for V2V Communications in IoV. IEEE Internet Things J. 2024;11(16):27744–59.
- 55. Ma Z, Jiang J, Wei H, Wang B, Luo W, Luo H, et al. A Blockchain-Based Secure Distributed Authentication Scheme for Internet of Vehicles. IEEE Access. 2024;12:81471–82.
- 56. Srivastava S, Agarwal D, Chaurasia BK, Adhikari M. Blockchain-based trust management for data exchange in internet of vehicle network. Multimed Tools Appl. 2024;84(8):4837–55.
- 57. Wei L, Cao Y, Cui J, Zhong H, Bolodurina I, He D. Game Theory and Trust Management Driven Dynamic Proof-of-Work Blockchain Consensus Algorithm for Securing Internet of Vehicles. IEEE Trans Mobile Comput. 2026;25(1):434–50.
- 58. Yadav S, Singh K, Yadav AK, Shariq M, Chaudhry SA, Das AK, et al. Efficient and Reliable Information Sharing for Internet of Vehicles Using Trust and Blockchain. IEEE Trans Veh Technol. 2025;74(11):16716–28.
- 59. Wang Q, Li X, Qiu Y, Ding X, Tang W, Qin Z. Trust in IoV: UAV-Assisted Trust Management Scheme for Secure Communication of Connected Vehicles. IEEE Internet Things J. 2025;12(18):37371–87.
- 60. Xie Q, Sun Z, Xie Q, Ding Z. A Cross-Trusted Authority Authentication Protocol for Internet of Vehicles Based on Blockchain. IEEE Access. 2023;11:97840–51.
- 61. Liu SM, Ye JY, Wang YL. Improvement and Security Analysis on Symmetric Key Authentication Protocol Needham-Schroeder. AMM. 2014;513–517:1289–93.
- 62. Chattaraj D, Bera B, Das AK, Saha S, Lorenz P, Park Y. Block-CLAP: Blockchain-Assisted Certificateless Key Agreement Protocol for Internet of Vehicles in Smart Transportation. IEEE Trans Veh Technol. 2021;70(8):8092–107.