Anonymous and Traceable Authentication for Securing Data Sharing in Parking Edge Computing

被引:1
作者
Li, Chunhai [1 ]
Li, Xiaohuan [1 ,2 ]
Wang, Yujue [3 ]
Ding, Yong [3 ,4 ]
Zhao, Feng [1 ]
机构
[1] Guilin Univ Elect Technol, Sch Informat & Commun, Guilin 541004, Peoples R China
[2] Guangxi Res Inst Comprehens Transportat Big Data, Nanning 530000, Peoples R China
[3] Guilin Univ Elect Technol, Sch Comp Sci & Informat Secur, Guangxi Key Lab Cryptog & Informat Secur, Guilin 541004, Peoples R China
[4] Peng Cheng Lab, Cyberspace Secur Res Ctr, Shenzhen 518000, Peoples R China
基金
中国国家自然科学基金;
关键词
Parking edge computing; Vehicle authentication; Anonymous authentication; Vehicle traceability;
D O I
10.1007/s12083-021-01104-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In parking edge computing, the service providers can engage the parking vehicles to provide computing services. The requesting vehicles can enjoy the advantages of the parking computing services with no need to build expensive equipment locally, whereas the parking vehicles can sell the computing resources to gain benefits. However, in an open parking computing system, the identity of each entity is easy to be counterfeited by other malicious entities, which may cause the leakage of privacy data of honest entities and the waste of parking computing resources. To address this issue, we propose an efficient authentication protocol between vehicle and roadside unit near the parking lot, which also allows two verified entities to generate a common key to enjoy the parking computing service confidentially. The protocol is extended to allow anonymous authentication so that the true identity would not be leaked to RSU during the authentication process, and malicious vehicle tracing if some forged or illegal authentication message is submitted to cheat the service provider or roadside unit. The security and efficiency analysis demonstrate that the proposed authentication protocols are secure and practical in applications.
引用
收藏
页码:2099 / 2114
页数:16
相关论文
共 34 条
  • [1] Al-kahtani MohammedSaeed., 2012, Signal Processing and Communication Systems (ICSPCS), 2012 6th International Conference on, P1, DOI DOI 10.1109/ICSPCS.2012.6507953
  • [2] Datacenter at the Airport: Reasoning about Time-Dependent Parking Lot Occupancy
    Arif, Samiur
    Olariu, Stephan
    Wang, Jin
    Yan, Gongjun
    Yang, Weiming
    Khalil, Ismail
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2012, 23 (11) : 2067 - 2080
  • [3] Anonymous Announcement System (AAS) for Electric Vehicle in VANETs
    Au, Man Ho
    Liu, Joseph K.
    Zhang, Zhenfei
    Susilo, Willy
    Li, Jin
    Zhou, Jianying
    [J]. COMPUTER JOURNAL, 2017, 60 (04) : 588 - 599
  • [4] Short group signatures
    Boneh, D
    Boyen, X
    Shacham, H
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2004, PROCEEDINGS, 2004, 3152 : 41 - 55
  • [5] Chaurasia Brijesh Kumar, 2011, Transactions on Computational Science XIII: LNCS 6750, P147, DOI 10.1007/978-3-642-22619-9_8
  • [6] The Sybil attack
    Douceur, JR
    [J]. PEER-TO-PEER SYSTEMS, 2002, 2429 : 251 - 260
  • [7] Elsaiah S, 2018, NORTH AMER POW SYMP
  • [8] Fetzer Valerie, 2020, Proceedings on Privacy Enhancing Technologies, V2020, P62, DOI 10.2478/popets-2020-0046
  • [9] An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks
    He, Debiao
    Zeadally, Sherali
    Xu, Baowen
    Huang, Xinyi
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (12) : 2681 - 2691
  • [10] Developing Vehicular Data Cloud Services in the IoT Environment
    He, Wu
    Yan, Gongjun
    Xu, Li Da
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2014, 10 (02) : 1587 - 1595