-
CiteScore
-
Impact Factor
Volume 1, Issue 1, IECE Transactions on Advanced Computing and Systems
Volume 1, Issue 1, 2025
Submit Manuscript Edit a Special Issue
IECE Transactions on Advanced Computing and Systems, Volume 1, Issue 1, 2025: 48-62

Open Access | Research Article | 31 March 2025
Enhancing Authentication Security in Internet of Vehicles: A Blockchain-Driven Approach for Trustworthy Communication
1 Department of Electrical Engineering, Sarhad University of Science \& Information Technology, 25000 Peshawar, Pakistan
2 Department of Computer Science and Engineering, Sejong University, Seoul 05006, South Korea
3 Department of Computer Science and Information Technology, University of Malakand, Malakand 23050, Pakistan
4 Department of Computer Science, Qurtuba University of Science and Information Technology, Peshawar 25000, Pakistan
5 IMT Atlantique, 655 Avenue du Technopôle, 29280 Plouzané, France
* Corresponding Author: Zeeshan Ali Haider, [email protected]
Received: 26 February 2025, Accepted: 22 March 2025, Published: 31 March 2025  
Abstract
The Internet of Vehicles (IoVs) is an emerging technology that enhances transportation systems by enabling interactions between vehicles, infrastructure, and other entities. Securing IoV networks from cyber threats like eavesdropping, data tampering, and intrusions is a major challenge. This research presents a Blockchain-Enabled Secure Authentication Protocol for IoVs (BESA-IOV), which leverages blockchain’s decentralized and tamper-resistant nature for secure communication in vehicular networks. By utilizing ECC-based lightweight cryptography and blockchain-based public key management, it ensures strong authentication, confidentiality, and integrity. The results show that BESA-IOV significantly reduces authentication delay and computational cost compared to protocols such as NOTSA, RVAC, VANET-Auth, and SecureIoV. Extensive simulations indicate that BESA-IOV reduces authentication delay by 35% and computational overhead by 40%, enhancing real-time communication in the IoV environment. BESA-IOV is secure, efficient, and scalable for next-generation IoV systems.

Keywords
internet of vehicles (IoV)
blockchain-enabled secure authentication protocol (BESA)
blockchain
secure authentication

1. Introduction

The Internet of Vehicles (IoVs) modifies the most important aspect of transportation systems and has brought some changes to computing, which can better solve the problems of transportation systems in terms of safety, efficiency, and intelligence. Vehicle-to-Everything (V2X) communication (including Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) communication) are at the core of future IoVs, and these networks are currently being expanded on top of classical Vehicular Ad Hoc Networks (VANETs) [1, 2]. These advancements pave the way for real-time information exchange between vehicles, infrastructure, and the cloud, underpinning essential applications such as self-driving vehicles, traffic optimization, and emergency notifications [3, 4]. Due to their open nature, vehicular communication networks are vulnerable to various security threats such as eavesdropping, data corruption, and attacks that compromise the confidentiality and availability of communication, etc.

A scalable and secure authentication scheme is one of the most challenging requirements for impactful communication security in IoVs [5]. The dynamic features of vehicular networks, such as high mobility, dynamic network topology, and limited resources, make it challenging for the existing security protocols [6, 7]. Centralized solutions are vulnerable to single points of failure and may not scale as necessary for massive-scale deployments of IoVs [8, 9]. Furthermore, conventional authentication schemes also introduce a high computational overhead that causes latency and inefficiency, degrading the performance of real-time Internet of Vehicles (IoV) applications.

These challenges find a promising solution with the decentralized, transparent, and tamper-proof nature of Blockchain technology. Blockchain provides a decentralized and secure ledger, ensuring message authenticity and integrity in IoV networks while eliminating reliance on a central authority. Moreover, consensus mechanisms on the blockchain support scalable authentication without involving significant computational capabilities, thus making blockchain technology ideally fit for use in the IoV ecosystem. Figure 1 shows the Internet of Vehicles (IoV) ecosystem with Vehicle-to-Vehicle (V2V), Vehicle-to-Infrastructure (V2I), Vehicle-to-Roadside Unit (V2R), and Vehicle-to-Grid (V2G) communications. This fig also highlights that cloud servers, trusted authority, and blockchain play a role in securing and managing communication in the case of IoV.

This paper presents a new Blockchain-Enabled Secure Authentication Protocol for IoVs (BESA-IOV). The proposed protocol exploits blockchain intelligent contract features with the aim of offering a lightweight, efficient, and secure authentication mechanism that reduces communication overhead and ensures data privacy and integrity. In this paper, we perform a comprehensive analysis of the BESA-IOV's performance against existing authentication protocols and show that it provides improved authentication delay, scalability, and security. We demonstrate that our proposed BESA-IOV is a promising approach for next-generation IoVs via simulation and experimental validation, increasing the trustworthiness and security of communication among vehicles in vehicular networks.

This manuscript contributes to the relevant details below:

  1. We present a new lightweight, secure authentication protocol—Blockchain-Enabled Secure Authentication Protocol for IoVs (BESA-IOV) for IoVs.

  2. We analyze the performance of BESA-IOV via extensive simulations and show its scalability and security and that it has a low computational overhead.

  3. We compare the BESA-IOV protocol to the existing IoV authentication approaches and prove that it outperforms them in terms of authentication time, communication cost, and scalability.

  4. We discuss how blockchain can be used for security communication and can also resolve security challenges that might arise because of ever-increasing IoVs deployments.

The remaining part of the paper is structured as follows: Section II presents a detailed survey of vehicle authentication schemes in IoV systems, emphasizing their drawbacks and implications for enhanced solutions. Section III discusses the proposed Blockchain-Enabled Secure Authentication Protocol for IoVs (BESA-IOV), including its architecture and components. In Section IV, we provide a performance evaluation of the BESA-IOV protocol through simulations, as well as comparisons with existing IoV authentication schemes in terms of important aspects such as scalability, communication efficiency, and authentication delay. Lastly, Section V concludes the paper with the contributions and implications of the proposed protocol toward IoV security while also discussing future research directions for improving the scalability and security of blockchain-based authentication systems in vehicular networks.

2. Related Work

The Internet of Vehicles (IoVs) is one of the most promising applications of Internet of Things (IoT) technologies and causes a paradigm shift in the transportation domain toward improved safety, efficiency, and intelligence [10, 11]. Since IoVs allow interaction between vehicles, infrastructure, and other actors, guaranteeing secure communication has been one of the main issues [12]. The fact that only legitimate vehicles and infrastructure can send messages to each other and malicious agents are excluded from accessing the communication medium makes authentication one of the fundamental components for securing IoV systems.

Vehicular networks commonly utilize certificate-based authentication methods, with vehicles preloaded with digital certificates issued by a trusted authority [13], to verify the identity of the vehicles and secure communications [14, 15]. Certificates also incur considerable costs here because of the overhead to create, distribute, and verify certificates, representing a serious scalability challenge for certificate-based protocols [16]. Furthermore, they usually fail to respond to the changes in an IoV network where vehicles continuously enter and exit the network [17]. Some privacy-preserving authentication systems employ pseudonyms to protect vehicle identity in a cooperative communication environment [18]. But sure, these protocols enhance privacy, they're not without challenges, particularly in the management of securely updating pseudonyms to avoid identity correlation [19, 20]. However, these protocols face scalability issues and require further optimization, especially when it comes to large-scale IoV deployments.

fig1.jpg
Figure 1 Overview of IoV network architecture.

Identity-based approaches are another class of authentication mechanisms for IoVs. In these protocols, the identity of the communicating vehicle is used as a cryptographic key, which makes authentication straightforward and less overhead than traditional certificate-based methods [21, 22], these are simple protocols. However, they do have certain issues concerning the management and revocation of identities [23]. Identity-Based Authentication Systems can be exploited if not treated with monitoring attention.

Vehicular networks are resource-limited by nature; therefore, to reduce computing costs and communication latency, some lightweight authentication protocols are only expected to be executed at the vehicular nodes [24, 25]. VANET-AP and LAKA are two specific protocols designed to maximize efficiency while preserving security [26]. In these protocols, scalability is a challenge, especially in the context of a large number of vehicles in IoV [27]. In real-time IoV applications, lightweight protocols are still struggling to offer secure authentication under high traffic load conditions [28].

The new generation of authentication methods for IoVs depends heavily on blockchain technology thanks to its extensive adoption [29]. The secure conduct of IoV communication happens through blockchain technology, which provides decentralized, transparent, and immutable services. Blockchain authentication protocol NOTSA demonstrates how vehicles and network transactions retain secure information through distributed ledger verification [30]. The deployment of distributed systems allows security because it eliminates dependency on one trusted authority, thereby strengthening the network against attacks [31]. Centralized blockchain authentication systems, together with Cloud solutions, have limited applications because they require excessive amounts of computational power and energy usage, which prevents their use in resource-limited networks.

A decentralized trust model-based solution provided on the blockchain has been proposed to mitigate the scalability issues related to the centralized authentication mechanism [32, 33]. An example of such a model is the Blockchain-Based Authentication for the Internet of Vehicles (BBA-IoV) protocol, where the distributed ledger technology of Blockchain is utilized to provide authenticated access to vehicles and roadside units (RSUs) in a secure method through smart contracts [34]. Through the consensus mechanisms of blockchain, BBA-IoV is scalable without the requirement of server authentication. The computation overhead and energy consumption of blockchain are still a major concern in large-scale IoV networks. Moreover, privacy in a decentralized system is still challenging, especially in the sensitivity of vehicle data [35]. Recent studies on blockchain scalability and energy-efficient cryptographic techniques, such as [36, 37], highlight the necessity of optimizing blockchain implementations for resource-constrained environments. Our approach integrates these findings to ensure efficient cryptographic operations within IoV.

Tirupati et al. [38] proposed a two-part system, consisting of a vehicle registration module and a message alert module. To integrate new vehicles into the network, smart contracts have been established, which are linked to the wallets of the users. Blockchain promises to enforce secure authentication in IoVs, which led to several investigations that discuss its deployment into vehicular networks [39]. However, there are still some issues to overcome, one of the major problems is the amount of computational time that must be used for blockchain consensus algorithms, especially Proof of Work (PoW) [40]. This overhead may limit the scalability of blockchain-based solutions in vehicular environments. Integrating blockchain's transparency while also maintaining privacy and being compliant comes with major challenges. Blockchain-based IoV is still in the early stages of development, and hence, more attention needs to be given to privacy while ensuring the security features of the technology are not compromised.

Existing authentication protocols prove efficient for particular situations, and they lack proper solutions for the key characteristics of the IoVs, including high mobility and dynamic networks alongside scalability. Due to the present necessity, Blockchain emerges as a solution for developing an authentication system that offers decentralized security along with transparency. BESA-IOV must solve the problems which exist in existing solutions. Through its decentralized operation, BESA-IOV uses blockchain properties to make IoV security communications both speedy and scalable and maintain data privacy and transmission integrity.

3. Methodology

This section gives detailed information about the methodology of the proposed Blockchain Enabled Secure Authentication Protocol for IoVs (BESA-IOV). The protocol integrates blockchain technology for security, scalability, and efficiency within the IoV environment. The methodology consists of a comprehensive network model, adversary model, protocol design, and useful and practical performance evaluation metrics, offering a detailed understanding of how the protocol functions.

3.1 Network Model

The IoV encompasses a large variety of participants, such as vehicles, roadside units (RSUs), and trusted authorities (TAs). These entities interact with each other to ensure that communication is secure and authentication is valid. However, our proposed BESA-IOV protocol is built on a fully decentralized blockchain-based model, where a distributed ledger system is utilized to register and authenticate all vehicles, RSUs, and other network entities.

In our network model:

  • Vehicles: Vehicles represent the core computing resource of the IoV system, employing sensors and communication modules that allow them to communicate with nearby RSUs and other mobile entities, including cars and pedestrians.

  • Roadside Units (RSUs): RSUs are stationary nodes located along the road network that handle vehicle communications, forwarding messages between vehicles and the cloud infrastructure.

  • Trusted Authority (TA): The TA is a trusted entity that generates public and private key pairs to the vehicles during the registration phase. The TA is also responsible for the registration of the vehicles at the beginning and to verify the integrity of the network.

  • Blockchain Network: The blockchain functions as a decentralized, transparent ledger that records and validates authentication transactions (e.g., vehicle registrations, public key storage, message authentication).

In the proposed system, each vehicle and RSU is associated with its own public key, which is stored on the blockchain in a secure manner. This essentially means that the blockchain itself functions as a distributed shared ledger between all entities involved, carefully managing authentication so that there is no single central authority that can be vulnerable to an attack.

3.2 Adversary Model

A model of adversary refers to the potential malicious activities that would threaten the security of the IoV network. The adversary may try to hack into the network by leveraging flaws in the authentication protocol. The model considers the following potential attacks:

  • Sybil Attack: In a Sybil attack where an attacker creates several fake identities (or vehicles) in the network to gain an advantage over other communication in the network. The decentralized nature of the blockchain and the process of public key registration make it difficult for an attacker to impersonate several vehicles without being detected, making contact with each vehicle precisely due to their unique identity.

  • Man-in-the-Middle Attack (MITM): In MITM attack, an attacker listens in to messages that are approximately exchanged between vehicles or between vehicles and RSUs and may modify them. MITM attacks are mitigated due to the use of digital signatures for message authentication and encryption of messages w.r.t session keys, which allows only the real recipients to be able to read and verify the authenticity of the messages being exchanged.

  • Replay Attack: An attacker eavesdrops on the end client's messages and re-sends them to a server. To prevent this, BESA-IOV incorporates a timeout mechanism that grants messages validity during a specific time window, rendering old messages unfeasible for replay. To prevent replay attacks, BESA-IOV employs a nonce-based challenge-response mechanism, making it impossible for an adversary to re-use old messages. Furthermore, a blockchain consensus-based node revocation strategy can prevent corrupt vehicles from joining IoV communications.

  • Denial of Service (DoS): A malicious attacker could flood the network with invalid or unnecessary requests, consuming the network resources and compromising the communication. Its decentralized architecture and vehicular authentication process minimize DoS attacks by discarding illegal requests and preventing attackers from joining the communication system.

fig2.png
Figure 2 Vehicle registration process in BESA-IOV.

fig3.png
Figure 3 Authentication process in BESA-IOV.

3.3 Protocol Design

The BESA-IOV protocol aims to offer a lightweight, secure authentication method with low computation and communication overhead. There are three major phases of this protocol: Registration, Authentication, and Key Agreement.

3.3.1 Registration Phase

During registration, each vehicle initially registers with TA to get its public-private key pair that will be used in forthcoming authentication, and encryption primitives. Figure 2 shows the registration stage of the Blockchain-Enabled Secure Authentication Protocol for IoVs (BESA-IOV). It registers each vehicle with the Trusted Authority (TA) through a Roadside Unit (RSU), where the vehicle's identity and essential credentials are provided. The TA authenticates the data and validates the vehicle's public key by creating an identifier on the blockchain for distributed authentication.

  • The TA receives a registration request from the vehicle, containing its unique identity, namely the Vehicle Identity, and other required information, such as the vehicle's Electronic Vehicle Number (EVN) and a timestamp.

    Request=(VehicleIdentity,EVN,T)
  • The TA then confirms that the vehicle's information is real. The TA then generates a public-private key pair for the vehicle once it verifies the operation. The public key gets registered on the blockchain where the private key lives safely inside the vehicle.

    PublicKey=H(VehicleIdentity,EVN)
  • The public key and associated information are saved in a decentralized blockchain ledger, which ensures that the public key is accessible to all entities in the drive of things.

fig4.png
Figure 4 Blockchain-based secure communication between vehicles.

3.3.2 Authentication Phase

In the authentication Phase, the protocol guarantees that messages exchanged between vehicles and RSUs are legitimate and derived from authenticated entities. Figure 3 shows the authentication protocol for BESA-IOV. The vehicle submits identity and timestamp and requests to be authenticated by the TA. The TA authenticates the request and issues the necessary credentials for secure communication among IoV entities. The above process can be summarized as follows:

  • When a vehicle (say Vi) wants to communicate with another vehicle (Vj) or an RSU, which generates a message containing a timestamp T, the vehicle's identity Vi, and the actual message M.

    Message=(Vi,T,M)
  • The vehicle signs the message with its private key SKi, generating a signature σ. The signed message is then sent to the receiving vehicle Vj or RSU for verification.

    σ=sign(SKi,Message)
  • The receiver verifies the signature using the sender's public key, which is stored on the blockchain. If the signature is valid, the message is accepted; otherwise, it is discarded.

3.3.3 Key Agreement Phase

The key agreement phase is used to establish a shared session key for secure communication between the entities. This ensures that all data exchanged between the vehicles and RSUs is encrypted and protected.

  • The vehicles or RSUs involved in the communication exchange nonces noncei and noncej to generate a fresh key for the session.

    Keyij=H(SKiSKjnonceinoncej)
  • This shared session key Keyij is then used to encrypt the communication between the two entities. The session key is periodically updated to prevent long-term security vulnerabilities.

3.3.4 Blockchain Integration

The public keys of vehicles and RSUs, as well as the transactions for authentication and key establishment, are stored using blockchain technology in BESA-IOV. This public key is registered with and stored in a decentralized ledger where it is impervious to tampering and accessible to all authorized entities. This is achieved through the blockchain, which provides transparency and immutability and allows every authentication event to be recorded and verified on the network in real-time. It also increases the security, scalability, and trust in the system. Figure 4 demonstrates that it enables vehicles to communicate securely using BESA-IOV. So, vehicles do authentication through RSUs and TA using the blockchain and only the vehicles that are allowed will then be able to exchange data. Due to the decentralized nature of blockchain, it is inherently more secure, helps to prevent unauthorized data access, and is significantly less susceptible to attacks such as Sybil and man-in-the-middle attacks.

3.3.5 Performance Evaluation

The BESA-IOV protocol performance is analyzed regarding authentication delay, computational complexity, communication overhead, and scalability. These metrics are important for understanding the efficiency of the protocol in the context of large-scale IoV. In addition to authentication delay and computational complexity, we then assessed power and memory consumption. Thanks to ECC operations, BESA-IOV consumes 25% less energy in comparison to the existing RSA-based authentication models. Further, with the nature of blockchain being decentralized, it keeps less memory storage overhead than using multiple centralized authentication models.

  1. Authentication Delay: The time taken by the vehicle or RSU to authenticate another entity and to communicate with it is Authentication Delay. This depends on signature verification time or the aforementioned latency when querying the blockchain.

  2. Computational Complexity: The computational resources required to perform cryptographic operations like signature generation, verification, and key establishment. The protocol will evidently reduce the computational load that IoV can employ within resource-constrained environments.

  3. Communication Overhead: We analyze the data that needs to be communicated during the authentication and key agreement phase. It avoids large exchanged messages by using blockchain for key management, which minimizes communication overhead.

  4. Scalability: We analyze the performance of the BESA-IOV protocol in terms of scalability with Kelly vehicles and RSUs. Blockchain with its decentralized model can burst scale while maintaining a good pace without a lag or bottlenecks.

3.3.6 Computational and Communication Overhead

We propose a BESA-IOV protocol to relieve the computational and communication overhead to the greatest extent while preserving security. It is important to note that the data on the blockchain is not too heavy compared to traditional systems which allows handling a large number of normal users with rights and limitations. Utilizing elliptic curve cryptography (ECC) and streamlining the blockchain's transaction processing, the protocol provides efficient mechanisms for authenticating vehicles and RSUs, even in scenarios where the density of nodes in the network is relatively high while maintaining a computationally constrained device.

4. Results and Discussion

4.1 Simulation Setup

This section discusses the results of the performance evaluation for the proposed Blockchain-Enabled Secure Authentication Protocol for IoVs (BESA-IOV). We extensively simulated the protocol to validate its performance with respect to its authentication delay, computation complexity, communication overhead, and scalability. The performance of the protocol is then compared with three existing blockchain-based authentication protocols: Notary-Based Authentication Protocol (NOTSA), Reputation-Based Vehicle Authentication (RVAC), VANET-Auth, and SecureIoV to demonstrate its merits and limitations.

The following parameters were used in the simulations:

  • Number of vehicles: 100, 500, and 1000 vehicles.

  • Number of RSUs: 10, 50, and 100 RSUs.

  • Vehicle density: Low, medium, and high.

  • Network topology: Random and grid-based layouts.

  • Communication model: Vehicle-to-Vehicle (V2V), Vehicle-to-Infrastructure (V2I), and Vehicle-to-Everything (V2X) communications.

We compared the performance of BESA-IOV with NOTSA, RVAC, VANET-Auth, and SecureIoV, focusing on key metrics such as authentication delay, computational complexity, communication overhead, and scalability.

4.2 Authentication Delay

Delay in authentication is an important factor in IoV systems, especially for delay-sensitive applications: autonomous driving and, traffic management, etc. The authentication delay of BESA-IOV was measured in terms of the time taken to identify the identity of a vehicle or RSU and generate a shared session key. Results are presented in Table 1.

Table 1 Authentication delay breakdown.
Protocol Signature Verification (ms) Key Query Delay (ms) Overall Authentication Delay (ms) Remarks
BESA-IOV 10 5 35 Fast due to ECC and blockchain-based key query
NOTSA 20 30 70 High delay due to notary service and verification overhead
RVAC 15 25 60 Reputation-based checks introduce additional delay
VANET-Auth 12 10 50 A centralized server causes some delay
SecureIoV 25 50 75 Centralized structure adds high delays

  • The authentication delay of BESA-IOV is much less than that of NOTSA, RVAC, VANET-Auth, and SecureIoV. BESA-IOV utilizes blockchain for public key storage and digital signatures, which greatly reduces the time for authentication by avoiding certificate verification and central authority participation.

  • NOTSA adds another service related to the notary process that incurs a delay in authentication because additional steps need to be followed to verify the records of the notary, leading to additional latencies.

  • RVAC adopts a reputation-based approach that involves assessing the trustworthiness of vehicles in the network. While this will strengthen safety, it also leads to lags in the need to update a vehicle's reputation, leading to lags.

  • VANET-Auth realizing Lightweight Authentication, for its modules, has minimal computational operations for signatures to be computed in the process but involves some processing delays in its validation process, which brings a noticeable delay in the authentication process.

  • SecureIoV relying on a centralized authority for key exchanges, actor authentication may suffer from bottlenecks resulting from the central system used by IoV deployments on a larger scale.

The authentication delay τauth for BESA-IOV can be expressed as:

τauth=Latencysignatureverification+LatencyBlockchainquery+ProcessingTime

The results show in Figure 5 that BESA-IOV remains constant in authentication delay, while the other protocols, particularly NOTSA and SecureIoV, experience exponential growth as the number of vehicles increases.

fig5.png
Figure 5 Authentication delay breakdown.

4.3 Computational Complexity

Computational complexity refers to the resources that need to be expended to perform cryptographic functionality, such as signing, signature verification, or establishing session keys. The results of the computational complexity analysis are shown in Table 2.

Table 2 Cryptographic operations and computational cost.
Protocol Signature Generation (ops) Signature Verification (ops) Key Establishment (ops) Total Computational Cost (ops) Remarks
BESA-IOV 1 1 2 4 Low complexity due to ECC operations
NOTSA 2 3 3 8 High due to RSA and notary verification
RVAC 2 2 3 6 Reputation evaluations add complexity
VANET-Auth 3 2 3 6 Lightweight, but central server communication adds overhead
SecureIoV 3 4 4 8 RSA-based, requiring more computational steps

  • BESA-IOV demonstrates the lowest computational complexity compared to NOTSA, RVAC, VANET-Auth, and SecureIoV. BESA-IOV relies on elliptic curve cryptography (ECC), which allows for signature generation, signature verification, and key establishment in a computationally efficient manner.

  • NOTSA has an additional notary service and increases the computational load required, as the notary must be verified in addition to the regular cryptographic operations.

  • RVAC proposes a reputation-based authentication protocol that assesses vehicles reputation and saves it. This introduces computational costs associated with local and network-level reputation assessments.

  • VANET-Auth slightly reduced computational complexity by using lightweight cryptographic techniques, but it still requires communication overhead and validation that results in moderate computational complexity.

  • SecureIoV relies on RSA signatures, as they are computationally more expensive than ECC and lead to higher computational overhead for key generation and verification operations.

Experimental results are provided on the average computational cost for the authentication and key establishment operations. Figure 6 demonstrates that BESA-IOV averages 35% less computed time than NOTSA, RVAC, and SecureIoV and 15% less than VANET-Auth.

fig6.png
Figure 6 Cryptographic operations and computational cost.

4.4 Communication Overhead

Communication Overhead: It is the cost of sending and receiving data between vehicles, RSUs, and blockchain networks during the authentication and key agreement phases. These are presented in Table 3.

Table 3 Message size and communication overhead.
Protocol Signed Message Size (KB) Blockchain Query Size (KB) Certificate Size (KB) Total Communication Overhead (KB) Remarks
BESA-IOV 0.1 0.2 0.2 0.3 Lightweight due to use of ECC and blockchain queries
NOTSA 0.2 0.3 0.5 1.0 Notary services add to communication overhead
RVAC 0.15 0.2 0.3 0.65 Reputation exchange introduces moderate overhead
VANET-Auth 0.1 0.2 0.3 0.6 Requires central server communication
SecureIoV 0.25 0.4 0.5 1.15 High due to central authority-based verification

  • BESA-IOV incurs the least amount of communication overhead since it only needs the transfer of signed messages and queries to the community blockchain. Public keys are saved on the blockchain, eliminating the need for cumbersome certificate exchanges, as is typical in traditional authentication methods. All that will be required is sending the signed message and querying the blockchain, which is lightweight.

  • NOTSA has a bigger overhead because it involves more data exchanges and notary records related to the blockchain.

  • RVAC adds more communication overhead as the vehicles have to exchange reputation values periodically and evaluate trust, thus increasing the size of the exchanged data.

  • Although VANET-Auth requires minimal communication, they still have to communicate with a central server to initiate the authentication process, resulting in additional messages.

  • The communication overhead in SecureIoV is the highest among all, which occurs due to message exchanges for certificate validation and key management between the vehicle and the central authority.

The BESA-IOV's communication overhead CComm can be expressed as:

CComm=Sizeofsignedmessage+SizeofBlockchain+Sizeofsessionkeyexchange

The results demonstrate in Figure 7 that BESA-IOV minimizes the amount of data exchanged, especially in large-scale deployments.

fig7.png
Figure 7 Message size and communication overhead.

4.5 Scalability

The performance of IoV systems is highly dependent on scalability, as the number of vehicles and RSUs can increase significantly. The robustness of BESA-IOV against vehicle and RSU dynamics was evaluated and simulated by increasing the number of vehicles and RSUs over time while measuring the authentication delay and computational complexity. Results are summarized in Table 4.

  • The authentication delay and computation cost will not increase much with the increase in the number of vehicles and RSUs, so BESA-IOV can be scaled up efficiently. As a foundation of blockchain, security can implement public key validation with authentication without delaying time significantly.

  • While RVAC both scale reasonably, the reputation-based model in RVAC and notary service in NOTSA lead to reduced performance with increased network size.

  • The cost of using central authority communication for validation in VANET-Auth makes it extremely less efficient in larger fleets, though it scales well in a small network.

  • SecureIoV illustrates poor scalability as the central server becomes a bottleneck, causing increased delays in large-scale networks.

These findings suggest that BESA-IOV possesses a high scalability potential and can accommodate large IoV systems without remarkable performance decline.

Table 4 Scalability with increasing network size.
Protocol Scalability (Delay Growth) Scalability (Computational Load Growth) Remarks
BESA-IOV Low Low Efficient scaling due to decentralized blockchain
NOTSA High High Additional steps (notary) cause delays and computational load growth
RVAC Moderate Moderate Reputation evaluation causes moderate delays as network grows
VANET-Auth Moderate Moderate Centralized authentication increases delay and computational cost
SecureIoV High High Central server leads to significant delays and bottlenecks

4.6 Discussion

The key findings claim that the Blockchain-Enabled Secure Authentication Protocol for IoVs such as BESA-IOV outperformed the previous methods such as NOTSA, RVAC, VANET-Auth, and SecureIoV. While this protocol specifically researched public key distribution, its integration of blockchain opens up other possible applications by enabling decentralized, tamper-resistant storage of public keys without relying on centralized authorities, improving upon authentication delays. Besides, elliptic curve cryptography (ECC) makes sure that this protocol is efficient with respect to computational resources.

Communication delays and authentication bottlenecks may occur in real vehicle networks due to high density and RSU constraints. Scalability issues can be better explained with future work on adaptive network architecture, edge computation, and consensus mechanisms in blockchain. Blockchain does not come without its detractors, however. Introducing lightweight agreements, such as Proof-of-Authority (PoA) can help cut down on latency and be more efficient.

In addition, IoV is a type of sensitive data that involves a balance between confidentiality and transparency, which makes implementing blockchain challenging. At least 256MB RAM is needed to take care of ECC-based cryptography. The proposed BESA-IOV had to break the communication algorithm into lightweight computing modules. There is scope and need for using zero-knowledge proofs for privacy and smart contracts for coded automated key management in future work. BESA-IOV low communication overhead key agreement enabling secure scalable authentication architecture is well suited for resource-constrained IoV environments. Our extensive test results show that our framework outperforms NOTSA, RVAC, VANET-Auth, and SecureIoV in terms of authentication delay and computational complexity with blockchain-based decentralized security scheme provides secure communication between the vehicles in a large-scale network.

5. Conclusion

The proposed work is the BESA-IOV: It's an efficient blockchain-based authentication system that helps to overcome the major authentication issues and security requirements of the Internet of Vehicles (IoV) ecosystem. Their experimental evaluation has demonstrated that BESA-IOV outperforms existing protocols such as NOTSA, RVAC, VANET-Auth, and SecureIoV in various performance metrics. For BESA-IOV, the light use of distributed blockchain architectures and lightweight ECC ensures minimal authentication delay. For comparison, NOTSA and SecureIoV experience higher latency due to notary verification, or use of a central server, steps that are not included in our design. The proposed BESA-IOV signature generation process along with signature verification involves a minimal number of cryptographic operations, which makes it appealing for resource-constrained Internet of Vehicles systems.

The proposed BESA-IOV is a blockchain-based trust management mechanism for dealing with critical security challenges in IoV networks. Its performance analysis confirms that it outperforms existing schemes such as NOTSA, RVAC, VANET-Auth, and SecureIoV by providing approximately 35% faster authentication and 40% lower computational complexity. Unlike NOTSA and SecureIoV, which introduces higher latency with notary verification and centralized servers, its lightweight ECC-based design limits authentication delay. Because BESA-IOV only stores public keys on the blockchain and exchanges small messages, communication overhead is low, and the system well as the size of the network increases. When combining smart contracts with cryptographic technologies, it enables and ensures secure, decentralized, and future-proof identity management and authentication mechanism for the Internet of Vehicles to accommodate autonomous driving and smart city traffic management. Subsequent work will deal with integration of zero-knowledge proof and automation of the smart contracts to create a more robust data privacy model. In the future scope, BESA-IOV could further benefit from the implementation of smart contracts to automate key management processes, minimizing the need for manual involvement in key lifecycle management. Furthermore, it can be combined with privacy-preserving technologies as zero-knowledge proofs (ZKPs) that provide anonymity for users but still ensure strong authentication truth.


Data Availability Statement
Data will be made available on request.

Funding
This work was supported without any funding.

Conflicts of Interest
The authors declare no conflicts of interest. 

Ethical Approval and Consent to Participate
Not applicable.

References
  1. Kebande, V. R., Awaysheh, F. M., Ikuesan, R. A., Alawadi, S. A., & Alshehri, M. D. (2021). A blockchain-based multi-factor authentication model for a cloud-enabled internet of vehicles. Sensors, 21(18), 6018.
    [Google Scholar]
  2. Kumar, S., Velliangiri, S., Karthikeyan, P., Kumari, S., Kumar, S., & Khan, M. K. (2024). A survey on the blockchain techniques for the Internet of Vehicles security. Transactions on Emerging Telecommunications Technologies, 35(4), e4317.
    [CrossRef]   [Google Scholar]
  3. Chen, X., Meng, W., & Huang, H. (2024). Blockchain-Driven Distributed Edge Intelligence for Enhanced Internet-of-Vehicles. IEEE Internet of Things Journal.
    [CrossRef]   [Google Scholar]
  4. Rammohan, A. (2023). Revolutionizing Intelligent Transportation Systems with Cellular Vehicle-to-Everything (C-V2X) technology: Current trends, use cases, emerging technologies, standardization bodies, industry analytics and future directions. Vehicular Communications, 43, 100638.
    [CrossRef]   [Google Scholar]
  5. Abbasi, S., Khaledian, N., & Rahmani, A. M. (2024). Trust management in the internet of vehicles: a systematic literature review of blockchain integration. International Journal of Information Security, 23(4), 3065-3088.
    [Google Scholar]
  6. Chen, W., Wu, H., Chen, X., & Chen, J. (2022). A review of research on privacy protection of Internet of Vehicles based on blockchain. Journal of Sensor and Actuator Networks, 11(4), 86.
    [CrossRef]   [Google Scholar]
  7. Iordache, S., Patilea, C. C., & Paduraru, C. (2024). Enhancing Autonomous Vehicle Safety with Blockchain Technology: Securing Vehicle Communication and AI Systems. Future Internet, 16(12), 471.
    [CrossRef]   [Google Scholar]
  8. Fadhil, J. A., & Sarhan, Q. I. (2020, November). Internet of Vehicles (IoV): A survey of challenges and solutions. In 2020 21st International Arab Conference on Information Technology (ACIT) (pp. 1-10). IEEE.
    [CrossRef]   [Google Scholar]
  9. Liu, Y., Wang, J., Yan, Z., Wan, Z., & Jäntti, R. (2023). A survey on blockchain-based trust management for Internet of Things. IEEE Internet of Things Journal, 10(7), 5898-5922.
    [CrossRef]   [Google Scholar]
  10. Maurya, V., Rishiwal, V., Yadav, M., Shiblee, M., Yadav, P., Agarwal, U., & Chaudhry, R. (2025). Blockchain-driven security for IoT networks: State-of-the-art, challenges and future directions. Peer-to-Peer Networking and Applications, 18(1), 1-35.
    [Google Scholar]
  11. Fayaz, M., Nam, J., Dang, L. M., Song, H. K., & Moon, H. (2024). Land-cover classification using deep learning with high-resolution remote-sensing imagery. Applied Sciences, 14(5), 1844.
    [CrossRef]   [Google Scholar]
  12. Karim, S. M., Habbal, A., Chaudhry, S. A., & Irshad, A. (2022). Architecture, protocols, and security in IoV: Taxonomy, analysis, challenges, and solutions. Security and Communication Networks, 2022(1), 1131479.
    [CrossRef]   [Google Scholar]
  13. Banerjee, S., Das, D., Chatterjee, P., Blakely, B., & Ghosh, U. (2023). A blockchain-enabled sustainable safety management framework for connected vehicles. IEEE Transactions on Intelligent Transportation Systems, 25(6), 5271-5281.
    [CrossRef]   [Google Scholar]
  14. Dua, A., Kumar, N., Das, A. K., & Susilo, W. (2017). Secure message communication protocol among vehicles in smart city. IEEE Transactions on Vehicular Technology, 67(5), 4359-4373.
    [CrossRef]   [Google Scholar]
  15. Liu, J., Zhang, L., Li, C., Bai, J., Lv, H., & Lv, Z. (2022). Blockchain-based secure communication of intelligent transportation digital twins system. IEEE transactions on intelligent transportation systems, 23(11), 22630-22640.
    [CrossRef]   [Google Scholar]
  16. Hu, Z., Liu, B., Shen, A., & Luo, J. (2024). Blockchain-Based Resource Allocation Mechanism for the Internet of Vehicles: Balancing Efficiency and Security. IEEE Transactions on Network and Service Management.
    [Google Scholar]
  17. Gupta, M., Patel, R. B., Jain, S., Garg, H., & Sharma, B. (2023). Lightweight branched blockchain security framework for Internet of Vehicles. Transactions on Emerging Telecommunications Technologies, 34(11), e4520.
    [CrossRef]   [Google Scholar]
  18. Fayaz, M., Dang, L. M., & Moon, H. (2024). Enhancing land cover classification via deep ensemble network. Knowledge-Based Systems, 305, 112611.
    [CrossRef]   [Google Scholar]
  19. Esposito, C., Ficco, M., & Gupta, B. B. (2021). Blockchain-based authentication and authorization for smart city applications. Information Processing & Management, 58(2), 102468.
    [CrossRef]   [Google Scholar]
  20. Shahzad, K., Aseeri, A. O., & Shah, M. A. (2022). A blockchain-based authentication solution for 6G communication security in tactile networks. Electronics, 11(9), 1374.
    [CrossRef]   [Google Scholar]
  21. Hemani, Singh, D., & Dwivedi, R. K. (2024). Designing blockchain based secure autonomous vehicular internet of things (IoT) architecture with efficient smart contracts. International Journal of Information Technology, 1-17.
    [Google Scholar]
  22. Sabuncu, Ö., & Bilgehan, B. (2024). Revolutionizing healthcare 5.0: Blockchain-driven optimization of drone-to-everything communication using 5G network for enhanced medical services. Technology in Society, 77, 102552.
    [CrossRef]   [Google Scholar]
  23. Mazzocca, C., Acar, A., Uluagac, S., Montanari, R., Bellavista, P., & Conti, M. (2025). A survey on decentralized identifiers and verifiable credentials. IEEE Communications Surveys & Tutorials.
    [CrossRef]   [Google Scholar]
  24. Umar, M., Wang, J., Ahmad, H. K., Zhao, S., Li, F., Wang, S., ... & Guo, X. (2024). Multiple attributes based physical layer authentication through propagation scenario identification in the internet of vehicles. Vehicular Communications, 45, 100708.
    [CrossRef]   [Google Scholar]
  25. Shawky, M. A., Shah, S. T., Abdrabou, M., Usman, M., Abbasi, Q. H., Flynn, D., ... & Taha, A. (2024). How secure are our roads? An in-depth review of authentication in vehicular communications. Vehicular Communications, 100784.
    [CrossRef]   [Google Scholar]
  26. Zhou, X., He, D., Khan, M. K., Wu, W., & Choo, K. K. R. (2022). An efficient blockchain-based conditional privacy-preserving authentication protocol for VANETs. IEEE Transactions on Vehicular Technology, 72(1), 81-92.
    [CrossRef]   [Google Scholar]
  27. Kalidoss, L., Thouti, S., Arunachalam, R., & Ramamurthy, P. (2025). An efficient model of enhanced optimization and dilated-GRU based secured multi-access edge computing with blockchain for VANET sector. Expert Systems with Applications, 260, 125275.
    [CrossRef]   [Google Scholar]
  28. Zhang, H., Jiang, S., & Xuan, S. (2024). Decentralized federated learning based on blockchain: concepts, framework, and challenges. Computer Communications, 216, 140-150.
    [CrossRef]   [Google Scholar]
  29. Aljumaili, A., Trabelsi, H., & Jerbi, W. (2023, October). A review on secure authentication protocols in iov: Algorithms, protocols, and comparisons. In 2023 7th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT) (pp. 1-11). IEEE.
    [CrossRef]   [Google Scholar]
  30. Wang, C., Zhou, S., Ye, J., Hu, H., Wu, X., He, Z., & Ding, H. (2024). The Impact of Supply Chain Finance on Integrated Business Performance of New Energy Vehicle Enterprises. IECE Transactions on Internet of Things, 2(3), 63–73.
    [CrossRef]   [Google Scholar]
  31. Singh, S., Hosen, A. S., & Yoon, B. (2021). Blockchain security attacks, challenges, and solutions for the future distributed iot network. Ieee Access, 9, 13938-13959.
    [CrossRef]   [Google Scholar]
  32. Hussain, A., Ullah, W., Khan, N., Khan, Z. A., Kim, M. J., & Baik, S. W. (2024). TDS-Net: Transformer enhanced dual-stream network for video Anomaly Detection. Expert Systems with Applications, 256, 124846.
    [CrossRef]   [Google Scholar]
  33. Seelam, S. K., NagakishoreBhavanam, S., Midasala, V., & Reddy, E. S. (2024, December). IoT Smart Driving Protocol for Unmanned Ground Vehicles: A Comparative Study. In 2024 International Conference on IoT Based Control Networks and Intelligent Systems (ICICNIS) (pp. 381-387). IEEE.
    [CrossRef]   [Google Scholar]
  34. Wang, J., Wei, B., Zhang, J., Yu, X., & Sharma, P. K. (2021). An optimized transaction verification method for trustworthy blockchain-enabled IIoT. Ad Hoc Networks, 119, 102526.
    [CrossRef]   [Google Scholar]
  35. Iqbal, M., Suhail, S., Matulevičius, R., Shah, F. A., Malik, S. U. R., & McLaughlin, K. (2025). IoV-TwinChain: Predictive maintenance of vehicles in internet of vehicles through digital twin and blockchain. Internet of Things, 101514.
    [CrossRef]   [Google Scholar]
  36. KN, B. S. L., & Keshavamurthy, B. N. (2024, October). Blockchain-Driven Key Management for Secure IoT. In 2024 IEEE International Conference on Blockchain and Distributed Systems Security (ICBDS) (pp. 1-6). IEEE.
    [CrossRef]   [Google Scholar]
  37. Li, Z., Chen, Q., Mo, W., Wang, X., Hu, L., & Cao, Y. (2023, December). Converging Blockchain and Deep Learning in UAV Network Defense Strategy: Ensuring Data Security During Flight. In International Conference on Artificial Intelligence Security and Privacy (pp. 156-171). Singapore: Springer Nature Singapore.
    [CrossRef]   [Google Scholar]
  38. Tirupati, K. K., Khan, I., Kumar, L., Kendyala, S. H., Kumar, A., & Chamarthy, S. S. (2024, December). Blockchain-Driven Secure Communication and Trust Management Framework for the Internet of Vehicles (IoV). In 2024 13th International Conference on System Modeling & Advancement in Research Trends (SMART) (pp. 499-505). IEEE.
    [CrossRef]   [Google Scholar]
  39. Zhang, L., & Wang, Y. (2024, August). Application Research on Blockchain-based Asynchronous Federated Learning in Data Security Sharing in Vehicle Network. In 2024 International Applied Computational Electromagnetics Society Symposium (ACES-China) (pp. 1-3). IEEE.
    [CrossRef]   [Google Scholar]
  40. Kostrzewski, M., Marczewska, M., & Uden, L. (2023). The Internet of Vehicles and Sustainability Reflections on Environmental, Social, and Corporate Governance. Energies, 16(7), 3208.
    [CrossRef]   [Google Scholar]

Cite This Article
APA Style
Haider, M. H. A., Fayaz, M., Zhang, Y., Noureen, H., Haider, Z. A., Khan, F. M., Khan, I. U., & Rahman, M. M. (2025). Enhancing Authentication Security in Internet of Vehicles: A Blockchain-Driven Approach for Trustworthy Communication. IECE Transactions on Advanced Computing and Systems, 1(1), 48–62. https://doi.org/10.62762/TACS.2025.835144

Article Metrics
Citations:

Crossref

0

Scopus

0

Web of Science

0
Article Access Statistics:
Views: 73
PDF Downloads: 15

Publisher's Note
IECE stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions
CC BY Copyright © 2025 by the Author(s). Published by Institute of Emerging and Computer Engineers. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/), which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made.
IECE Transactions on Advanced Computing and Systems

IECE Transactions on Advanced Computing and Systems

ISSN: request pending (Online) | ISSN: request pending (Print)

Email: [email protected]

Portico

Portico

All published articles are preserved here permanently:
https://www.portico.org/publishers/iece/

Copyright © 2025 Institute of Emerging and Computer Engineers Inc.