Abstract
Aiming at the security problem of data network transmission between smart car and server, based on the identity authentication technology in blockchain, a data encryption transmission and authentication scheme is proposed. Based on the identity authentication technology in the blockchain, the identity authentication of the car after data transmission is realized. Through the Diffie-Hellman algorithm, the key exchange between the car and the server is realized. After combining the two technologies, the proposed scheme can not only realize the encrypted transmission of data, but also effectively carry out identity authentication, which greatly improves the security of data transmission between the car and the server.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Shao, J., X. Lin, R. Lu, et al. 2016. A threshold anonymous authentication protocol for VANETs. IEEE Transactions on Vehicular Technology 65 (3): 1711–1720.
Manvi, S.S., and S. Tangade. 2017. A survey on authentication schemes in VANETs for secured communication. Vehicular Communications 9: 19–30.
Ji Peng, Lu Xuming, Su Shanting, Chen Shuo, Li Dongmin, and Liu Sai. 2018. A novel order-order encryption algorithm based on code tree in cloud environment. Computer Engineering 44 (12): 288–293.
Guo Hongbo, Dai Dewei, Ma Huibin, and Xu Yuzhao. 2019. Design of a security lock system based on RSA encryption algorithm. Computer and Information Technology (1): 34–36.
Huang Feng, Deng Huiming, and Bai Shixiong. 2019. Design of double information encryption algorithm for network control system based on CPS. Journal of Hunan Institute of Engineering(Natural Science Edition) (1): 1–4.
Chen, J., X. Du, and B. Fang. 2012. An efficient anonymous communication protocol for wireless sensor networks. Wireless Communications & Mobile Computing 12 (14): 1302–1312.
Ayday, E., and F. Fekri. 2012. A secure broadcasting scheme to provide availability, reliability and authentication for wireless sensor networks. Ad Hoc Networks 10 (7): 1278–1290.
Shim, K.A., Y.R. Lee, and C.M. Park. 2013. EIBASEIBAS: An efficient identity-based broadcast authentication scheme in wireless sensor networks. Ad Hoc Networks 11 (1): 182–189.
Debnath, A., P. Singaravelu, and S. Verma. 2014. Privacy in wireless sensor networks using ring signature. Journal of King Saud University—Computer and Information Sciences 26 (2): 228–236.
Chang Fen. 2017. Research on wireless sensor network authentication technology based on elliptic curve. Anhui University.
Wang Wenjun and Liu Yawei. 2015. Certificate-based vehicle identity authentication scheme in Internet of Vehicles. Wireless Communication Technology 24 (02): 47–51.
Wu Libing, Xie Yong, and Zhang Yubo. 2016. An efficient and secure message authentication scheme for Internet of Vehicles. Transactions of Communications 37 (11): 1–10.
Meng Fanchao and Wu Yue. 2017. Research on vehicle network security and data trust mechanism based on information center network. Electronic Technology and Software Engineering (02): 228.
Yan Yu. 2018. Research on a safe and efficient authentication scheme in the Internet of Vehicles. Beijing Jiaotong University.
Acknowledgements
This work was supported by the Talent Project of Sichuan University of Science & Engineering (2017RCL23); the Science Founding of Artificial Intelligence Key Laboratory of Sichuan Province (2017RZJ03); the Opening Project of Sichuan Province University Key Laboratory of Bridge Non-destruction Detecting and Engineering Computing (2017QYJ03); the college students’ innovation and entrepreneurship training project (cx201912); the Science Project of Hainan Province (619QN193).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Li, L., Lin, G., Xie, Z., Yu, S., Guo, Z., Liang, Y. (2020). Data Encryption Transmission and Authentication Scheme Based on Blockchain Technology. In: Huang, C., Chan, YW., Yen, N. (eds) Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019). Advances in Intelligent Systems and Computing, vol 1088. Springer, Singapore. https://doi.org/10.1007/978-981-15-1468-5_240
Download citation
DOI: https://doi.org/10.1007/978-981-15-1468-5_240
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-1467-8
Online ISBN: 978-981-15-1468-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)