Anonymous and Traceable Authentication for Securing Data Sharing in Parking Edge Computing

被引:1
|
作者
Li, Chunhai [1 ]
Li, Xiaohuan [1 ,2 ]
Wang, Yujue [3 ]
Ding, Yong [3 ,4 ]
Zhao, Feng [1 ]
机构
[1] Guilin Univ Elect Technol, Sch Informat & Commun, Guilin 541004, Peoples R China
[2] Guangxi Res Inst Comprehens Transportat Big Data, Nanning 530000, Peoples R China
[3] Guilin Univ Elect Technol, Sch Comp Sci & Informat Secur, Guangxi Key Lab Cryptog & Informat Secur, Guilin 541004, Peoples R China
[4] Peng Cheng Lab, Cyberspace Secur Res Ctr, Shenzhen 518000, Peoples R China
基金
中国国家自然科学基金;
关键词
Parking edge computing; Vehicle authentication; Anonymous authentication; Vehicle traceability;
D O I
10.1007/s12083-021-01104-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In parking edge computing, the service providers can engage the parking vehicles to provide computing services. The requesting vehicles can enjoy the advantages of the parking computing services with no need to build expensive equipment locally, whereas the parking vehicles can sell the computing resources to gain benefits. However, in an open parking computing system, the identity of each entity is easy to be counterfeited by other malicious entities, which may cause the leakage of privacy data of honest entities and the waste of parking computing resources. To address this issue, we propose an efficient authentication protocol between vehicle and roadside unit near the parking lot, which also allows two verified entities to generate a common key to enjoy the parking computing service confidentially. The protocol is extended to allow anonymous authentication so that the true identity would not be leaked to RSU during the authentication process, and malicious vehicle tracing if some forged or illegal authentication message is submitted to cheat the service provider or roadside unit. The security and efficiency analysis demonstrate that the proposed authentication protocols are secure and practical in applications.
引用
收藏
页码:2099 / 2114
页数:16
相关论文
共 50 条
  • [31] Towards Fully Anonymous Integrity Checking and Reliability Authentication for Cloud Data Sharing
    Ding, Ran
    Xu, Yan
    Zhong, Hong
    Cui, Jie
    Sha, Kewei
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (05) : 3782 - 3795
  • [32] Linkable and traceable anonymous authentication with fine-grained access control
    Li, Peng
    Lai, Junzuo
    Zhou, Dehua
    Huang, Lianguan
    Sun, Meng
    Wu, Wei
    Yang, Ye
    FRONTIERS OF COMPUTER SCIENCE, 2025, 19 (02)
  • [33] Traceable Anonymous Authentication Scheme for Vehicular Ad-hoc Networks
    Kim, Zeen
    Yim, Junhyun
    Kim, Jangseong
    Kim, Kwangjo
    Shon, Taeshik
    2011 NINTH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS WORKSHOPS (ISPAW), 2011, : 250 - 255
  • [34] Securing the Internet of Health Things with Certificateless Anonymous Authentication Scheme
    Innab, Nisreen
    CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 80 (02): : 2237 - 2258
  • [35] HyCPK: Securing Identity Authentication in ubiquitous computing
    Xu, Guangquan
    Ren, Yan
    Zhang, Gaoxu
    Liu, Bin
    Li, Xiaohong
    Feng, Zhiyong
    IEEE 12TH INT CONF UBIQUITOUS INTELLIGENCE & COMP/IEEE 12TH INT CONF ADV & TRUSTED COMP/IEEE 15TH INT CONF SCALABLE COMP & COMMUN/IEEE INT CONF CLOUD & BIG DATA COMP/IEEE INT CONF INTERNET PEOPLE AND ASSOCIATED SYMPOSIA/WORKSHOPS, 2015, : 239 - 246
  • [36] A blockchain-based provably secure anonymous authentication for edge computing-enabled IoT
    Shiqiang Zhang
    Dongzhi Cao
    The Journal of Supercomputing, 2024, 80 : 6778 - 6808
  • [37] Secure and Efficient Biometric-Based Anonymous Authentication Scheme for Mobile-Edge Computing
    Zhu, Qiang
    You, Lin
    Hu, Gengran
    Wang, Shengguo
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (20): : 33604 - 33623
  • [38] A Secure Anonymous Identity-Based Scheme in New Authentication Architecture for Mobile Edge Computing
    Li, Yuting
    Cheng, Qingfeng
    Liu, Ximeng
    Li, Xinghua
    IEEE SYSTEMS JOURNAL, 2021, 15 (01): : 935 - 946
  • [39] Blockchain-Based Anonymous Authentication With Key Management for Smart Grid Edge Computing Infrastructure
    Wang, Jing
    Wu, Libing
    Choo, Kim-Kwang Raymond
    He, Debiao
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (03) : 1984 - 1992
  • [40] PUF-Based Anonymous Authentication Scheme for Hardware Devices and IPs in Edge Computing Environment
    Long, Jing
    Liang, Wei
    Li, Kuan-Ching
    Zhang, Dafang
    Tang, Mingdong
    Luo, Haibo
    IEEE ACCESS, 2019, 7 : 124785 - 124796