A Privacy-Preserving Vehicular Crowdsensing-Based Road Surface Condition Monitoring System Using Fog Computing

被引:202
作者
Basudan, Sultan [1 ]
Lin, Xiaodong [1 ]
Sankaranarayanan, Karthik [1 ]
机构
[1] Univ Ontario, Fac Business & Informat Technol, Inst Technol, Oshawa, ON L1H 7K4, Canada
来源
IEEE INTERNET OF THINGS JOURNAL | 2017年 / 4卷 / 03期
关键词
Certificateless aggregate signcryption (CLASC); fog computing; road surface condition monitoring system; security; MESSAGE AUTHENTICATION SCHEME; CERTIFICATELESS ENCRYPTION; SECURITY;
D O I
10.1109/JIOT.2017.2666783
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the recent past, great attention has been directed toward road surface condition monitoring. As a matter of fact, this activity is of critical importance in transportation infrastructure management. In response, multiple solutions have been proposed which make use of mobile sensing, more specifically contemporary applications and architectures that are used in both crowdsensing and vehicle-based sensing. This has allowed for automated control as well as analysis of road surface quality. These innovations have thus encouraged and showed the importance of cloud to provide reliable transport services to clients. Nonetheless, these initiatives have not been without challenges that range from mobility support, locational awareness, low latency, as well as geo-distribution. As a result, a new term has been coined for this novel paradigm, called, fog computing. In this paper, we propose a privacy-preserving protocol for enhancing security in vehicular crowdsensing-based road surface condition monitoring system using fog computing. At the onset, this paper proposes a certificateless aggregate signcryption scheme that is highly efficient. On the basis of the proposed scheme, a data transmission protocol for monitoring road surface conditions is designed with security aspects such as information confidentiality, mutual authenticity, integrity, privacy, as well as anonymity. In analyzing the system, the ability of the proposed protocol to achieve the set objectives and exercise higher efficiency with respect to computational and communication abilities in comparison to existing systems is also considered.
引用
收藏
页码:772 / 782
页数:11
相关论文
共 35 条
  • [1] Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
  • [2] [Anonymous], 2017, WINT DRIV BE PREP BE
  • [3] [Anonymous], EFFICIENT IMPLEMENTA
  • [4] [Anonymous], 1993, ACM CCS 1993, DOI DOI 10.1145/168588.168596
  • [5] [Anonymous], 2012, 2012 6 INT C APPL IN
  • [6] [Anonymous], 2011, P 2 INT WORKSH NETW
  • [7] [Anonymous], 2007, PROC 1 INT WORKSHOP
  • [8] Barbosa M., 2008, P 2008 ACM S INF COM, P369
  • [9] Identity-based encryption from the Weil pairing
    Boneh, D
    Franklin, M
    [J]. SIAM JOURNAL ON COMPUTING, 2003, 32 (03) : 586 - 615
  • [10] Bonomi F, 2012, P 1 ED MCC WORKSH MO, P13, DOI [DOI 10.1145/2342509.2342513, 10.1145/2342509.2342513]