Abstract
Internet of vehicles (IoVs) is a variant of vehicular ad hoc network, which provides an efficient communication method for vehicles. However, some traffic messages usually include sensitive identity information, which is easy to bring about the leakage of vehicular identities during data communications. Further, if vehicular identities are fully protected, then it can lead to trusted authority cannot reveal the real identities of malicious vehicles, which incurs more security issues in IoVs. Therefore, in this article, we propose an efficient conditional identity privacy-preserving authentication scheme based on cooperation of multiple fog servers under fog computing-based IoVs, where fog servers are used to verify (authenticate) the legitimacy of vehicles without revealing their real identities. Further, an associated vehicular identity updating mechanism is constructed to solve the problem that some compromised fog servers may leak their stored verification information to pool real vehicular identities. Additionally, a malicious vehicular identity tracing mechanism is proposed to support related fog servers that receive signed false messages can trace the real identities of malicious vehicles. Compared with other related schemes, our scheme further improves its security. Experimental results show our scheme is efficient under fog computing-based IoVs.
- [1] . 2018. EMBA: An efficient anonymous mutual and batch authentication schemes for vanets. In Proceedings of the International Conference on Inventive Communication and Computational Technologies (ICICCT’18).1320–1326. Google ScholarCross Ref
- [2] . 2015. Internet of things: A survey on enabling technologies, protocols, and applications. IEEE Commun. Surveys Tutor. 17, 4 (2015), 2347–2376. Google ScholarDigital Library
- [3] . 2021. Survey of authentication and privacy schemes in vehicular ad hoc networks. IEEE Sensors J. 21, 2 (2021), 2422–2433. Google ScholarCross Ref
- [4] . 2016. A pseudonym management system to achieve anonymity in vehicular ad hoc networks. IEEE Trans. Depend. Secure Comput. 13, 1 (2016), 106–119. Google ScholarDigital Library
- [5] . 2017. EAAP: Efficient anonymous authentication with conditional privacy-preserving scheme for vehicular ad hoc networks. IEEE Trans. Intell. Transport. Syst. 18, 9 (2017), 2467–2476. Google ScholarDigital Library
- [6] . 2021. BBAAS: Blockchain-based anonymous authentication scheme for providing secure communication in VANETs. Secur. Commun. Netw. 2021 (Feb. 2021), 1–11. Google ScholarDigital Library
- [7] . 2020. NERA: A new and efficient RSU based authentication scheme for VANETs. Wireless Netw 26, 5 (2020), 3083–3098. Google ScholarDigital Library
- [8] . 2009. Blend-in: A privacy-enhancing certificate-selection method for vehicular communication. IEEE Trans. Vehic. Technol. 58, 9 (2009), 5190–5199. Google ScholarCross Ref
- [9] . 2004. Direct anonymous attestation. In Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS’04). ACM, New York, NY, 132–145. Google ScholarDigital Library
- [10] . 2020. Accessibility analysis and modeling for IoV in an urban scene. IEEE Trans. Vehic. Technol. 69, 4 (2020), 4246–4256. Google ScholarCross Ref
- [11] . 2016. Fog and IoT: An overview of research opportunities. IEEE Internet Things J. 3, 6 (2016), 854–864. Google ScholarCross Ref
- [12] . 2022. Reliable and efficient content sharing for 5G-enabled vehicular networks. IEEE Trans. Intell. Transport. Syst. 23, 2 (2022), 1247–1259. Google ScholarDigital Library
- [13] . 2020. Edge computing in VANETs-an efficient and privacy-preserving cooperative downloading scheme. IEEE J. Select. Areas Commun. 38, 6 (2020), 1191–1204. Google ScholarCross Ref
- [14] . 2013. Evaluating (Geo) content sharing with the ONE simulator. In Proceedings of the 11th ACM International Symposium on Mobility Management and Wireless Access (MobiWac’13). ACM, New York, NY, 37–40. Google ScholarDigital Library
- [15] . 2006. Attribute-based encryption for fine-grained access control of encrypted data. Proceedings of the ACM Conference on Computer and Communications Security, 89–98. Google ScholarDigital Library
- [16] . 2017. Replace: A reliable trust-based platoon service recommendation scheme in VANET. IEEE Trans. Vehic. Technol. 66, 2 (2017), 1786–1797. Google ScholarCross Ref
- [17] . 2008. Distributed key management with protection against RSU compromise in group signature based VANETs. In Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM’08). 1–5. Google ScholarCross Ref
- [18] . 2018. Efficient privacy-aware authentication scheme for mobile cloud computing services. IEEE Syst. J. 12, 2 (2018), 1621–1631. Google ScholarCross Ref
- [19] . 2018. A provably-secure cross-domain handshake scheme with symptoms-matching for mobile healthcare social network. IEEE Trans. Depend. Secure Comput. 15, 4 (2018), 633–645. Google ScholarDigital Library
- [20] . 2018. Certificateless public auditing scheme for cloud-assisted wireless body area networks. IEEE Syst. J. 12, 1 (2018), 64–73. Google ScholarCross Ref
- [21] . 2015. An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Trans. Info. Forensics Secur. 10, 12 (2015), 2681–2691. Google ScholarDigital Library
- [22] . 2013. b-SPECS+: Batch verification for secure pseudonymous authentication in VANET. IEEE Trans. Info. Forensics Secur. 8, 11 (2013), 1860–1875. Google ScholarDigital Library
- [23] . 2007. Differential Power Analysis. Springer, Boston, MA, 119–165. Google ScholarCross Ref
- [24] . 2019. RSEAP: RFID based secure and efficient authentication protocol for vehicular cloud computing. Vehic. Commun. 22 (2019), 100213. Google ScholarDigital Library
- [25] . 2007. GSIS: A secure and privacy-preserving protocol for vehicular communications. IEEE Trans. Vehic. Technol. 56, 6 (2007), 3442–3456. Google ScholarCross Ref
- [26] . 2007. Securing vehicular ad hoc networks. In Proceedings of the 2nd International Conference on Pervasive Computing and Applications. 424–429. Google ScholarCross Ref
- [27] . 2019. 5G vehicle-to-everything services: Gearing up for security and privacy. Proc. IEEE 108, 99 (2019), 1–17. Google ScholarCross Ref
- [28] . 2019. Towards secure and privacy preserving collision avoidance system in 5G fog based internet of vehicles. Future Gen. Comput. Syst. 95 (June 2019). Google ScholarDigital Library
- [29] . 2008. Privacy of recent RFID authentication protocols. In Proceedings of the International Conference on Information Security Practice and Experience. Google ScholarCross Ref
- [30] . 2000. Security arguments for digital signatures and blind signatures. J. Cryptol. 13, 3 (2000), 361–396. Google ScholarDigital Library
- [31] . 2020. Comments on “AKM-IoV: Authenticated key management protocol in fog computing-based internet of vehicles deployment.” IEEE Internet Things J. 7, 5 (2020), 4671–4675. Google ScholarCross Ref
- [32] . 1979. How to share a secret. Commun. ACM 22 (Nov. 1979), 612–613. Google ScholarDigital Library
- [33] . 2019. A survey on internet of vehicles: Applications, security issues and solutions. Vehic. Commun. 20 (2019), 100182. Google ScholarCross Ref
- [34] . 2017. Fog vehicular computing: Augmentation of fog computing using vehicular cloud computing. IEEE Vehic. Technol. Mag. 12, 3 (2017), 55–64. Google ScholarCross Ref
- [35] . 2022. OpenJUMP. Retrieved from http://www.openjump.org/.Google Scholar
- [36] . 2022. OpenStreetMap. Retrieved from https://wiki.openstreetmap.org/wiki/Main-Page.Google Scholar
- [37] . 2022. The Pairing-Based Cryptography Library. Retrieved from http://crypto.stanford.edu/pbc/.Google Scholar
- [38] . 2017. Enhancing security and privacy for identity-based batch verification scheme in VANETs. IEEE Trans. Vehic. Technol. 66, 4 (2017), 3235–3248. Google ScholarCross Ref
- [39] . 2022. An anonymous batch authentication and key exchange protocols for 6G enabled VANETs. IEEE Trans. Intell. Transport. Syst. 23, 2 (2022), 1630–1638. Google ScholarDigital Library
- [40] . 2019. AKM-IoV: Authenticated key management protocol in fog computing-based internet of vehicles deployment. IEEE Internet Things J. 6, 5 (2019), 8804–8817. Google ScholarCross Ref
- [41] . 2017. An enhanced privacy-aware authentication scheme for distributed mobile cloud computing services. KSII Trans. Internet Info. Syst. 11, 12 (2017), 6169–6187. Google ScholarCross Ref
- [42] . 2016. A novel message authentication method for VANET without RSU. Eng. Comput. 33 (Nov. 2016), 2288–2301. Google ScholarCross Ref
- [43] . 2014. On the security of a secure batch verification with group testing for VANET. Int. J. Netw. Secur. 16 (Sep. 2014), 355–362. Google ScholarCross Ref
- [44] . 2010. A scalable robust authentication protocol for secure vehicular communications. IEEE Trans. Vehic. Technol. 59, 4 (2010), 1606–1617. Google ScholarCross Ref
Index Terms
- Conditional Identity Privacy-preserving Authentication Scheme Based on Cooperation of Multiple Fog Servers under Fog Computing-based IoVs
Recommendations
Ring Signature-Based Conditional Privacy-Preserving Authentication in VANETs
AbstractVehicular ad hoc networks (VANETs) consist of vehicles with high mobility that broadcasts delay-intolerant safety and informative messages frequently. The real identity of a vehicle needs to be kept private as these vehicles operate in an open and ...
Conditional privacy-preserving authentication scheme for V2V communication without pseudonyms
AbstractPseudonym is widely used in conditional privacy-preserving authentication (CPPA) scheme for vehicle-to-vehicle (V2V) communication in vehicular ad hoc networks (VANETs) in order to protect user’s privacy. The main disadvantage of pseudonym-based ...
A privacy-preserving authentication scheme based on Elliptic Curve Cryptography and using Quotient Filter in fog-enabled VANET
AbstractSecurity and privacy are considered as two main challenges in Vehicular Ad Hoc Network (VANET). To cope with these challenges and in order to improve the safety of VANET, we propose a secure and privacy-preserving authentication ...
Comments