MDBV: Monitoring Data Batch Verification for Survivability of Internet of Vehicles

被引:12
作者
Liu, Jingwei [1 ]
Li, Qingqing [1 ]
Cao, Huijuan [1 ]
Sun, Rong [1 ]
Du, Xiaojiang [2 ]
Guizani, Mohsen [3 ]
机构
[1] Xidian Univ, Sch Telecommun Engn, Xian 710071, Shaanxi, Peoples R China
[2] Temple Univ, Dept Comp & Informat Sci, Philadelphia, PA 19122 USA
[3] Univ Idaho, Dept Elect & Comp Engn, Moscow, ID 83844 USA
来源
IEEE ACCESS | 2018年 / 6卷
关键词
Internet of Vehicles; survivability; batch verification; aggregate signature; big data; CERTIFICATELESS AGGREGATE SIGNATURE; KEY MANAGEMENT SCHEME; BROADCAST AUTHENTICATION; SECURE; ARCHITECTURE; TAXONOMY;
D O I
10.1109/ACCESS.2018.2869543
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Along with the development of vehicular sensors and wireless communication technology, Internet of Vehicles (IoV) is emerging that can improve traffic efficiency and provide a comfortable driving environment. However, there is still a challenge how to ensure the survivability of IoV. Fortunately, this goal can be achieved by quickly verifying real-time monitoring data to avoid network failure. Aggregate signature is an efficient approach to realize quick data verification. In this paper, we propose a monitoring data batch verification scheme based on an improved certificateless aggregate signature for IoV, named MDBV. The size of aggregated verification message is remaining roughly constant even as the increasing number of vehicles in MDBV. Additionally, MDBV is proved to be secure in the random oracle model assuming the intractability of the computational Diffie-Hellman problem. In consideration of the network survivability and performance, the proposed MDBV can decrease the computation overhead and is more suitable for IoV.
引用
收藏
页码:50974 / 50983
页数:10
相关论文
共 42 条
[1]   INTERNET-OF-THINGS-BASED SMART ENVIRONMENTS: STATE OF THE ART, TAXONOMY, AND OPEN RESEARCH CHALLENGES [J].
Ahmed, Ejaz ;
Yaqoob, Ibrar ;
Gani, Abdullah ;
Imran, Muhammad ;
Guizani, Mohsen .
IEEE WIRELESS COMMUNICATIONS, 2016, 23 (05) :10-16
[2]  
[Anonymous], IEEE T EMERG TOPICS
[3]  
[Anonymous], 2014, INT THINGS REF MOD
[4]  
[Anonymous], IACR CRYPTOLOGY EPRI
[5]  
[Anonymous], COMPUTER J
[6]  
[Anonymous], P WORKSH SYNCHR TIM
[7]  
[Anonymous], 2001, INT C THEORY APPL CR, DOI DOI 10.1007/3-540-45682-1_30
[8]  
[Anonymous], 2004, CRYPTOLOGY EPRINT AR
[9]  
Boneh D, 2003, LECT NOTES COMPUT SC, V2656, P416
[10]  
Chen Hu, 2015, Journal of Software, V26, P1173, DOI 10.13328/j.cnki.jos.004654