Vehicle Pseudonym Management Scheme in Internet of Vehicles for Mobile Edge Computing

被引:0
|
作者
Han M. [1 ]
Yang C. [1 ]
Hua L. [2 ]
Liu S. [3 ]
Ma S. [4 ]
机构
[1] School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang
[2] School of Automotive and Traffic Engineering, Jiangsu University, Zhenjiang
[3] Qingdao Guochuang Intelligent Home Appliance Research Institute Co.Ltd, Qingdao
[4] Automotive Engineering Research Institute, Jiangsu University, Zhenjiang
基金
中国国家自然科学基金;
关键词
Homomorphic encryption; Internet of vehicles; Mobile edge computing (MEC); Privacy preserving; Pseudonym management;
D O I
10.7544/issn1000-1239.20200620
中图分类号
学科分类号
摘要
Mobile edge computing (MEC) deploys computing and storage resources to the edge of the network, which brings real-time and high-reliability services to the Internet of vehicles (IoV). However, MEC faces various security threats. Attackers may control edge data centers and leak the pseudonym information of the vehicle, thereby threatening the vehicle's identity privacy. For this problem, a vehicle pseudonym management scheme in MEC-IoV is proposed, which can realize efficient update of pseudonym information, secure storage of pseudonym information in the edge cloud, and traceability of pseudonyms. This scheme uses the edge cloud with high real-time performance to replace the central cloud to authenticate the vehicle identity, which improves the efficiency of identity authentication and realizes efficient pseudonym update. The pseudonym information is encrypted by the homomorphic encryption algorithm, which guarantees the security of the pseudonym information and doesn't affect pseudonym management in the edge cloud. Each pseudonym table of the vehicle is associated with a search term calculated based on the pseudonym in the table, and the highest authority of the system can calculate the search term based on the ciphertext of the pseudonym table to expose the real identity of the malicious vehicle, which realize traceability of pseudonyms. After that, through the provable security theory, it is proved that the scheme is indistinguishable under the chosen plaintext attack, and the security analysis of the anonymity of the vehicle identity, the integrity and non-repudiation of the message in the scheme is carried out, which achieve the security requirements of preserving vehicle's identity privacy in IoV. In the end, the efficiency analysis and simulation of the scheme in terms of identity authentication, pseudonym request, and homomorphic encryption performance are carried out. Experimental results show this scheme can achieve the requirements of low-latency communication in IoV and is superior to existing schemes in authentication efficiency. © 2022, Science Press. All right reserved.
引用
收藏
页码:781 / 795
页数:14
相关论文
共 39 条
  • [1] Contreras-Castillo J, Zeadally S, Guerrero-Ibanez J A., Internet of vehicles: Architecture, protocols, and security, IEEE Internet of Things Journal, 5, 5, pp. 3701-3709, (2018)
  • [2] Sharma S, Kaushik B., A survey on Internet of vehicles: Applications, security issues & solutions[J/OL], Vehicular Communications, 20, (2019)
  • [3] Whaiduzzaman M, Sookhak M, Gani A, Et al., A survey on vehicular cloud computing, Journal of Network and Computer Applications, 40, pp. 325-344, (2014)
  • [4] Olariu S., A survey of vehicular cloud research: Trends, applications and challenges, IEEE Transactions on Intelligent Transportation Systems, 21, 6, pp. 2648-2663, (2020)
  • [5] Mekki T, Jabri I, Rachedi A, Et al., Vehicular cloud networks: Challenges, architectures, and future directions, Vehicular Communications, 9, pp. 268-280, (2017)
  • [6] Mao Yuyi, You Changsheng, Zhang Jun, Et al., A survey on mobile edge computing: The communication perspective, IEEE Communications Surveys & Tutorials, 19, 4, pp. 2322-2358, (2017)
  • [7] Shi Weisong, Zhang Xingzhou, Wang Yifan, Et al., Edge computing: State-of-the-art and future directions, Journal of Computer Research and Development, 56, 1, pp. 69-89, (2019)
  • [8] Tuohy S, Glavin M, Hughes C, Et al., Intra-vehicle networks: A review, IEEE Transactions on Intelligent Transportation Systems, 16, 2, pp. 534-545, (2015)
  • [9] Yang Shunren, Zheng Yuju, Huang Chenchia, Et al., Multi-access edge computing enhanced video streaming: Proof-of-concept implementation and prediction/QoE models, IEEE Transactions on Vehicular Technology, 68, 2, pp. 1888-1902, (2019)
  • [10] Ning Zhalong, Wang Xiaojie, Huang Jun, Mobile edge computing-enabled 5G vehicular networks: Toward the integration of communication and computing, IEEE Vehicular Technology Magazine, 14, 1, pp. 54-61, (2019)