Secure VANETs: Trusted Communication Scheme between Vehicles and Infrastructure Based on Fog Computing

被引:56
|
作者
Arif, Muhammad [1 ]
Wang, Guojun [1 ]
Balas, Valentina Emilia [2 ]
机构
[1] Guangzhou Univ, Dept Comp Sci & Technol, Guangzhou 510006, Guangdong, Peoples R China
[2] Aurel Vlaicu Univ Arad, Arad, Romania
来源
STUDIES IN INFORMATICS AND CONTROL | 2018年 / 27卷 / 02期
基金
中国国家自然科学基金;
关键词
Privacy; Vehicles; Communication; Infrastructure; RSU; OBU; Encryption; Decryption; Message; Location; PRESERVING AUTHENTICATION SCHEME; VEHICULAR COMMUNICATIONS; PRIVACY;
D O I
10.24846/v27i2y201811
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the Vehicular Ad-hoc Networks (VANETs), a vehicle or the vehicle driver could be recognized and tracked by eavesdropping its queries (e.g., beacons) by an adversary as these contains personal information like location, speed, and communication of the vehicles. This attack leads to threats to the vehicle's location and leakage of personal information. The current solution, is to use the anonymizer as a third trusted party between the vehicles and the LBS. In this paper we refer to the use of a Fog server with Fog anonymizer to secure the communication among the vehicles and LBS. Our scheme consists of four phases. In first phase, the vehicle driver initiates the communication process and generate the encrypted messages. These messages may contain the sub-messages. In phase 2, the Fog server received the messages via different roots. The Fs combined the messages and decrypt the messages based on the PK received by the vehicle. All the Fog server perform the same task for encryption and decryption. If any of the Fog server was compromised, we still had the link for communication. In Phase 3, the Fog anonymizer receive the messages from the Fog node, anonymize them based on the anonymization process. Thereafter, the Fog anonymizer send these messages to LBS to achieve desired goals. The Fog anonymizer perform the same job for anonymization and de-anonymization, while sending and receiving the messages from the LBS. In the last phase, the LBS received the messages from the Fog anonymizer, understand the communication messages, compile the desired results, and sent them back to the Fog anonymizer. Our analysis shows that the proposed scheme preserved the location privacy based on the queries at low communication and computational cost.
引用
收藏
页码:235 / 246
页数:12
相关论文
共 50 条
  • [1] SDN-Based Secure VANETs Communication with Fog Computing
    Arif, Muhammad
    Wang, Guojun
    Wang, Tian
    Peng, Tao
    SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE (SPACCS 2018), 2018, 11342 : 46 - 59
  • [2] Secure data sharing scheme for VANETs based on edge computing
    Jingwen Pan
    Jie Cui
    Lu Wei
    Yan Xu
    Hong Zhong
    EURASIP Journal on Wireless Communications and Networking, 2019
  • [3] Secure data sharing scheme for VANETs based on edge computing
    Pan, Jingwen
    Cui, Jie
    Wei, Lu
    Xu, Yan
    Zhong, Hong
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2019, 2019 (1)
  • [4] A Lightweight Anonymous Authentication and Secure Communication Scheme for Fog Computing Services
    Weng, Chi-Yao
    Li, Chun-Ta
    Chen, Chin-Ling
    Lee, Cheng-Chi
    Deng, Yong-Yuan
    IEEE ACCESS, 2021, 9 : 145522 - 145537
  • [5] DSSPS: A dynamic secure service provision scheme in fog-based VANETs
    Xu, Yan
    Shi, Ailian
    Cui, Jie
    Zhong, Hong
    VEHICULAR COMMUNICATIONS, 2024, 47
  • [6] A Hierarchic Secure Cloud Storage Scheme based on Fog Computing
    Zhou, Jiyuan
    Wang, Tian
    Bhuiyan, Md Zakirul Alam
    Liu, Anfeng
    2017 IEEE 15TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 15TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 3RD INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS(DASC/PICOM/DATACOM/CYBERSCI, 2017, : 470 - 477
  • [7] Lightweight Hardware Based Secure Authentication Scheme for Fog Computing
    Huang, Baiyi
    Cheng, Xiuzhen
    Cao, Yuan
    Zhang, Le
    2018 THIRD IEEE/ACM SYMPOSIUM ON EDGE COMPUTING (SEC), 2018, : 433 - 439
  • [8] Seal-based secure boot scheme for trusted computing platform
    Song C.
    Peng W.-P.
    Xin Y.
    Luo S.-S.
    Zhu H.-L.
    Journal of China Universities of Posts and Telecommunications, 2010, 17 (SUPPL. 2): : 16 - 21
  • [9] Efficient and Secure Multi-Signature Scheme Based on Trusted Computing
    HAO Liming1
    2.School of Information Security Engineering
    WuhanUniversityJournalofNaturalSciences, 2008, (02) : 180 - 184
  • [10] Verification Based Authentication Scheme for Bogus Attacks in VANETs for Secure Communication
    Celes, A. Asline
    Elizabeth, N. Edna
    PROCEEDINGS OF THE 2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION AND SIGNAL PROCESSING (ICCSP), 2018, : 388 - 392