Secure VANETs: Trusted Communication Scheme between Vehicles and Infrastructure Based on Fog Computing

被引:58
作者
Arif, Muhammad [1 ]
Wang, Guojun [1 ]
Balas, Valentina Emilia [2 ]
机构
[1] Guangzhou Univ, Dept Comp Sci & Technol, Guangzhou 510006, Guangdong, Peoples R China
[2] Aurel Vlaicu Univ Arad, Arad, Romania
来源
STUDIES IN INFORMATICS AND CONTROL | 2018年 / 27卷 / 02期
基金
中国国家自然科学基金;
关键词
Privacy; Vehicles; Communication; Infrastructure; RSU; OBU; Encryption; Decryption; Message; Location; PRESERVING AUTHENTICATION SCHEME; VEHICULAR COMMUNICATIONS; PRIVACY;
D O I
10.24846/v27i2y201811
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the Vehicular Ad-hoc Networks (VANETs), a vehicle or the vehicle driver could be recognized and tracked by eavesdropping its queries (e.g., beacons) by an adversary as these contains personal information like location, speed, and communication of the vehicles. This attack leads to threats to the vehicle's location and leakage of personal information. The current solution, is to use the anonymizer as a third trusted party between the vehicles and the LBS. In this paper we refer to the use of a Fog server with Fog anonymizer to secure the communication among the vehicles and LBS. Our scheme consists of four phases. In first phase, the vehicle driver initiates the communication process and generate the encrypted messages. These messages may contain the sub-messages. In phase 2, the Fog server received the messages via different roots. The Fs combined the messages and decrypt the messages based on the PK received by the vehicle. All the Fog server perform the same task for encryption and decryption. If any of the Fog server was compromised, we still had the link for communication. In Phase 3, the Fog anonymizer receive the messages from the Fog node, anonymize them based on the anonymization process. Thereafter, the Fog anonymizer send these messages to LBS to achieve desired goals. The Fog anonymizer perform the same job for anonymization and de-anonymization, while sending and receiving the messages from the LBS. In the last phase, the LBS received the messages from the Fog anonymizer, understand the communication messages, compile the desired results, and sent them back to the Fog anonymizer. Our analysis shows that the proposed scheme preserved the location privacy based on the queries at low communication and computational cost.
引用
收藏
页码:235 / 246
页数:12
相关论文
共 35 条
[1]  
Agbiboa D.E., 2018, URBAN FORUM, V29, P1, DOI DOI 10.1007/S12132-017-9312-5
[2]  
ALSARHAN A, 2018, IEEE T INTELLIGENT T
[3]  
[Anonymous], COMPUTER NETWORKS
[4]   A survey of local/cooperative-based malicious information detection techniques in VANETs [J].
Arshad, Muhammad ;
Ullah, Zahid ;
Ahmad, Naveed ;
Khalid, Muhammad ;
Criuckshank, Haithiam ;
Cao, Yue .
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2018,
[5]  
Asuquo P., 2018, IEEE Internet of Things Journal, Early Access
[6]   Real-world exhaust temperature profiles of on-road heavy-duty diesel vehicles equipped with selective catalytic reduction [J].
Boriboonsomsin, Kanok ;
Durbin, Thomas ;
Scora, George ;
Johnson, Kent ;
Sandez, Daniel ;
Vu, Alexander ;
Jiang, Yu ;
Burnette, Andrew ;
Yoon, Seungju ;
Collins, John ;
Dai, Zhen ;
Fulper, Carl ;
Kishan, Sandeep ;
Sabisch, Michael ;
Jackson, Doug .
SCIENCE OF THE TOTAL ENVIRONMENT, 2018, 634 :909-921
[7]   Assessing driving pattern factors for the specific energy use of electric vehicles: A factor analysis approach from case study data of the Mitsubishi i-MiEV minicar [J].
Braun, Andreas ;
Rid, Wolfgang .
TRANSPORTATION RESEARCH PART D-TRANSPORT AND ENVIRONMENT, 2018, 58 :225-238
[8]  
Chen C., 2018, IEEE INTERNET THINGS
[9]  
Chen S., 2017, CONCURRENCY COMPUTAT, V29
[10]   SPECS: Secure and privacy enhancing communications schemes for VANETs [J].
Chim, T. W. ;
Yiu, S. M. ;
Hui, Lucas C. K. ;
Li, Victor O. K. .
AD HOC NETWORKS, 2011, 9 (02) :189-203