Skip to main content

Data Encryption Transmission and Authentication Scheme Based on Blockchain Technology

  • Conference paper
  • First Online:
Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1088))

  • 92 Accesses

Abstract

Aiming at the security problem of data network transmission between smart car and server, based on the identity authentication technology in blockchain, a data encryption transmission and authentication scheme is proposed. Based on the identity authentication technology in the blockchain, the identity authentication of the car after data transmission is realized. Through the Diffie-Hellman algorithm, the key exchange between the car and the server is realized. After combining the two technologies, the proposed scheme can not only realize the encrypted transmission of data, but also effectively carry out identity authentication, which greatly improves the security of data transmission between the car and the server.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Shao, J., X. Lin, R. Lu, et al. 2016. A threshold anonymous authentication protocol for VANETs. IEEE Transactions on Vehicular Technology 65 (3): 1711–1720.

    Article  Google Scholar 

  2. Manvi, S.S., and S. Tangade. 2017. A survey on authentication schemes in VANETs for secured communication. Vehicular Communications 9: 19–30.

    Article  Google Scholar 

  3. Ji Peng, Lu Xuming, Su Shanting, Chen Shuo, Li Dongmin, and Liu Sai. 2018. A novel order-order encryption algorithm based on code tree in cloud environment. Computer Engineering 44 (12): 288–293.

    Google Scholar 

  4. Guo Hongbo, Dai Dewei, Ma Huibin, and Xu Yuzhao. 2019. Design of a security lock system based on RSA encryption algorithm. Computer and Information Technology (1): 34–36.

    Google Scholar 

  5. Huang Feng, Deng Huiming, and Bai Shixiong. 2019. Design of double information encryption algorithm for network control system based on CPS. Journal of Hunan Institute of Engineering(Natural Science Edition) (1): 1–4.

    Google Scholar 

  6. Chen, J., X. Du, and B. Fang. 2012. An efficient anonymous communication protocol for wireless sensor networks. Wireless Communications & Mobile Computing 12 (14): 1302–1312.

    Article  Google Scholar 

  7. Ayday, E., and F. Fekri. 2012. A secure broadcasting scheme to provide availability, reliability and authentication for wireless sensor networks. Ad Hoc Networks 10 (7): 1278–1290.

    Article  Google Scholar 

  8. Shim, K.A., Y.R. Lee, and C.M. Park. 2013. EIBASEIBAS: An efficient identity-based broadcast authentication scheme in wireless sensor networks. Ad Hoc Networks 11 (1): 182–189.

    Article  Google Scholar 

  9. Debnath, A., P. Singaravelu, and S. Verma. 2014. Privacy in wireless sensor networks using ring signature. Journal of King Saud University—Computer and Information Sciences 26 (2): 228–236.

    Article  Google Scholar 

  10. Chang Fen. 2017. Research on wireless sensor network authentication technology based on elliptic curve. Anhui University.

    Google Scholar 

  11. Wang Wenjun and Liu Yawei. 2015. Certificate-based vehicle identity authentication scheme in Internet of Vehicles. Wireless Communication Technology 24 (02): 47–51.

    Google Scholar 

  12. Wu Libing, Xie Yong, and Zhang Yubo. 2016. An efficient and secure message authentication scheme for Internet of Vehicles. Transactions of Communications 37 (11): 1–10.

    Google Scholar 

  13. Meng Fanchao and Wu Yue. 2017. Research on vehicle network security and data trust mechanism based on information center network. Electronic Technology and Software Engineering (02): 228.

    Google Scholar 

  14. Yan Yu. 2018. Research on a safe and efficient authentication scheme in the Internet of Vehicles. Beijing Jiaotong University.

    Google Scholar 

Download references

Acknowledgements

This work was supported by the Talent Project of Sichuan University of Science & Engineering (2017RCL23); the Science Founding of Artificial Intelligence Key Laboratory of Sichuan Province (2017RZJ03); the Opening Project of Sichuan Province University Key Laboratory of Bridge Non-destruction Detecting and Engineering Computing (2017QYJ03); the college students’ innovation and entrepreneurship training project (cx201912); the Science Project of Hainan Province (619QN193).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yufang Liang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Li, L., Lin, G., Xie, Z., Yu, S., Guo, Z., Liang, Y. (2020). Data Encryption Transmission and Authentication Scheme Based on Blockchain Technology. In: Huang, C., Chan, YW., Yen, N. (eds) Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019). Advances in Intelligent Systems and Computing, vol 1088. Springer, Singapore. https://doi.org/10.1007/978-981-15-1468-5_240

Download citation

Publish with us

Policies and ethics