[1]LI Zixin,SHI Shuiling,LIU Wenqi.A trusted authentication system for telematics with cross-chain technical support[J].CAAI Transactions on Intelligent Systems,2025,20(5):1188-1197.[doi:10.11992/tis.202411010]
Copy
CAAI Transactions on Intelligent Systems[ISSN 1673-4785/CN 23-1538/TP] Volume:
20
Number of periods:
2025 5
Page number:
1188-1197
Column:
学术论文—智能系统
Public date:
2025-09-05
- Title:
-
A trusted authentication system for telematics with cross-chain technical support
- Author(s):
-
LI Zixin1; 2; SHI Shuiling1; 2; LIU Wenqi1; 2
-
1. Data Science Research Center, Kunming University of Science and Technology, Kunming 650500, China;
2. Faculty of Science, Kunming University of Science and Technology, Kunming 650500, China
-
- Keywords:
-
blockchain; telematics; cross-chain; authentication protocols; cryptography; blind signatures; data sharing; privacy
- CLC:
-
TP393;TN92
- DOI:
-
10.11992/tis.202411010
- Abstract:
-
As intelligent transportation systems rapidly evolve, telematics plays a vital role in enabling efficient traffic management. However, maintaining security and privacy in inter-vehicle communication remains a challenge. To address this issue, we propose a trusted authentication system built on cross-chain technology. The system introduces a dual-chain vehicular networking architecture using side-chain technology, cryptographic methods, and blind signature schemes to enhance authentication and facilitate secure data exchange between vehicles and roadside units. The side chain adopts a Byzantine consensus protocol, while the main chain employs deposit-based validation and hash locks to maintain data consistency and ensure cross-regional security. Smart contracts are used to emulate the dual-chain structure and support the dynamic updating of system parameters. Fabric-based simulation experiments demonstrate a 12%–33% reduction in computational overhead per transaction compared with traditional single-chain PKI-based schemes. The results confirm significant improvements in authentication efficiency, address the limitations of centralized authentication in vehicular networks, and validate the system’s scalability and practical applicability.