| With the advent of the era of the Internet of Everything,the car has evolved from the simplest means of transportation to intelligent and connected mobile terminal.Internet of Vehicles provides an impetus for smart transportation and smart cities.However,the current centralized management of Internet of Vehicles leads to a serious network load,and the problems of user identity leaks and transmitted messages being stolen and tampered with by malicious attackers caused by the fast movement of vehicles and frequent information exchange remain unsolved.Since blockchain has the characteristics of decentralization,traceability and high security,it can provide solutions for distributed information storage and user security authentication in Internet of Vehicles.However,it still faces the problem that the existing consensus algorithms cannot be applied to Internet of Vehicles.The various attacks on private data of Internet of Vehicles can be solved through privacy preserving authentication,and the integrity and validity of messages during vehicle data transmission can be achieved through security authentication mechanism.After studying the existing schemes and basic theoretical knowledge,we propose an improved Byzantine Fault Tolerant consensus algorithm based on a voting system suitable for the Internet of Vehicles,and designs an identity authentication protocol for the Internet of Vehicles based on the blockchain.The key elements are as follows:(1)A Voting Improvement Practical Byzantine Fault Tolerance(VIBFT)consensus algorithm is proposed.The Road Side Unit(RSU)in Internet of Vehicles is used as a network node for blockchain.First of all,a voting reward and punishment mechanism is introduced to evaluate the reputation of nodes,and the consensus node set and alternative node set are divided based on the voting value,which is suitable for the environment with uneven configuration of each node in Internet of Vehicles.And the voting value is limited with the help of Sigmoid function to avoid the system disruption problem caused by the reset of the voting cycle,which provides a strong basis for evaluating the system security performance.Secondly,when malicious nodes do not exist,an improved consensus protocol is used to reduce the communication complexity to O(n),which reduces the communication overhead.Thirdly,a master node selection mechanism is proposed to reduce the probability of malicious nodes becoming master nodes by traversing and comparing the nodes based on their voting values.Finally,through performance analysis and simulation experiments,it is demonstrated that VIBFT algorithm is better than traditional algorithms in terms of throughput,transaction delay and communication overhead.(2)Based on VIBFT consensus algorithm,we design a blockchain-based identity authentication protocol for Internet of Vehicles.The protocol is implemented with the help of blockchain,cloud storage and other technologies.First of all,the Merkle Patricia Tree(MPT)is used to expand the blockchain structure.The bottom layer stores identity information in the form of key-value pairs,with a specific prefix Token as the key and identity encryption informationLink_i as the value,realizing distributed authentication between vehicles.With the help of smart contract technology,it can realize the traceability and revocation of malicious user identities on the blockchain.Secondly,using the bound identities of users and vehicles as real identities can be used in scenarios with multiple households in one vehicle and one household with multiple vehicles,which enhances the universality of the designed protocol.A complete protocol process is proposed which consists of registration,signature,and verification.A certificateless signature authentication scheme allows only trusted authority to track the real identities of vehicles and users,which protects the user’s privacy information.The non-bilinear operation is used to complete the batch verification of messages,and the computational cost is reduced.Finally,with the help of difficult problems hypothesis and provable security theory,we prove the unforgeable of the signature in the proposed scheme,and analyzes the advantages of the protocol scheme in terms of functionality and security.(3)Compared with the existing schemes,the proposed protocol has lower computing overhead and better communication overhead.By using OMNe T++simulation software for simulation,the results proved the feasibility of the protocol. |