An Edge Computing-Enabled Decentralized Authentication Scheme for Vehicular Networks

被引:0
作者
Wang, Qianpeng [1 ]
Gao, Deyun [1 ]
Foh, Chuan Heng [2 ]
Leung, Victor C. M. [3 ]
机构
[1] Beijing Jiaotong Univ, Sch Elect & Informat Engn, Natl Engn Lab Next Generat Internet Technol, Beijing 100044, Peoples R China
[2] Univ Surrey, 5GIC, Inst Commun Syst ICS, Guildford, Surrey, England
[3] Univ British Columbia, Dept Elect & Comp Engn, Vancouver, BC V6T 1Z4, Canada
来源
ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC) | 2020年
关键词
Decentralized authentication; edge computing; vehicular networks; group signature; certificate revocation list; signature verification delay; transition zone; PRIVACY; SECURITY; PROTOCOL;
D O I
10.1109/icc40277.2020.9149021
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The problem of security and privacy in vehicular networks is a vital issue and it attracts increasing attention to address the security vulnerability of vehicular networks. Authentication solutions are introduced in vehicular networks to ensure that network access only comes from authorized users. Particularly, group signature not only offers authentication services in vehicular networks, but also provides conditional privacy preservation. However, the current group signature solution for authentication in vehicular networks exhibits time-consuming signature verification, which is attributed to the centralized certificate revocation list (CRL) management. To overcome this shortcoming, we propose utilizing edge computing approach and design a flexible and efficient decentralized authentication scheme (FEDAS). In the proposed architecture, a decentralized CRL management method is developed to reduce verification delay in the authentication process. In addition, transition zone is proposed to solve reliable authentication problem in border area of the group caused by decentralized architecture. We also conduct extensive simulations to show the effectiveness of our proposed scheme.
引用
收藏
页数:7
相关论文
共 24 条
[1]   Security Vulnerabilities of Connected Vehicle Streams and Their Impact on Cooperative Driving [J].
Amoozadeh, Mani ;
Raghuramu, Arun ;
Chuah, Chen-Nee ;
Ghosal, Dipak ;
Zhang, H. Michael ;
Rowe, Jeff ;
Levitt, Karl .
IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (06) :126-132
[2]  
[Anonymous], 2012, Tech. Rep
[3]   Security and Privacy in Location-Based Services for Vehicular and Mobile Communications: An Overview, Challenges, and Countermeasures [J].
Asuquo, Philip ;
Cruickshank, Haitham ;
Morley, Jeremy ;
Ogah, Chibueze P. Anyigor ;
Lei, Ao ;
Hathal, Waleed ;
Bao, Shihan ;
Sun, Zhili .
IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (06) :4778-4802
[4]   EAAP: Efficient Anonymous Authentication With Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks [J].
Azees, Maria ;
Vijayakumar, Pandi ;
Deboarh, Lazarus Jegatha .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2017, 18 (09) :2467-2476
[5]  
Bellare M, 2003, LECT NOTES COMPUT SC, V2656, P614
[6]   Short group signatures [J].
Boneh, D ;
Boyen, X ;
Shacham, H .
ADVANCES IN CRYPTOLOGY - CRYPTO 2004, PROCEEDINGS, 2004, 3152 :41-55
[7]  
Boneh D., 2004, CCS 04, P168
[8]  
CHAUM D, 1991, LECT NOTES COMPUT SC, V547, P257
[9]   Threshold Anonymous Announcement in VANETs [J].
Chen, Liqun ;
Ng, Siaw-Lynn ;
Wang, Guilin .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2011, 29 (03) :605-615
[10]  
Cooper D., 2008, INTERNET X 509 PUBLI