Abstract
Internet of vehicles (IoVs) is a variant of vehicular ad hoc network, which provides an efficient communication method for vehicles. However, some traffic messages usually include sensitive identity information, which is easy to bring about the leakage of vehicular identities during data communications. Further, if vehicular identities are fully protected, then it can lead to trusted authority cannot reveal the real identities of malicious vehicles, which incurs more security issues in IoVs. Therefore, in this article, we propose an efficient conditional identity privacy-preserving authentication scheme based on cooperation of multiple fog servers under fog computing-based IoVs, where fog servers are used to verify (authenticate) the legitimacy of vehicles without revealing their real identities. Further, an associated vehicular identity updating mechanism is constructed to solve the problem that some compromised fog servers may leak their stored verification information to pool real vehicular identities. Additionally, a malicious vehicular identity tracing mechanism is proposed to support related fog servers that receive signed false messages can trace the real identities of malicious vehicles. Compared with other related schemes, our scheme further improves its security. Experimental results show our scheme is efficient under fog computing-based IoVs.
- [1] . 2018. EMBA: An efficient anonymous mutual and batch authentication schemes for vanets. In Proceedings of the International Conference on Inventive Communication and Computational Technologies (ICICCT’18).1320–1326. Google Scholar
Cross Ref
- [2] . 2015. Internet of things: A survey on enabling technologies, protocols, and applications. IEEE Commun. Surveys Tutor. 17, 4 (2015), 2347–2376. Google Scholar
Digital Library
- [3] . 2021. Survey of authentication and privacy schemes in vehicular ad hoc networks. IEEE Sensors J. 21, 2 (2021), 2422–2433. Google Scholar
Cross Ref
- [4] . 2016. A pseudonym management system to achieve anonymity in vehicular ad hoc networks. IEEE Trans. Depend. Secure Comput. 13, 1 (2016), 106–119. Google Scholar
Digital Library
- [5] . 2017. EAAP: Efficient anonymous authentication with conditional privacy-preserving scheme for vehicular ad hoc networks. IEEE Trans. Intell. Transport. Syst. 18, 9 (2017), 2467–2476. Google Scholar
Digital Library
- [6] . 2021. BBAAS: Blockchain-based anonymous authentication scheme for providing secure communication in VANETs. Secur. Commun. Netw. 2021 (Feb. 2021), 1–11. Google Scholar
Digital Library
- [7] . 2020. NERA: A new and efficient RSU based authentication scheme for VANETs. Wireless Netw 26, 5 (2020), 3083–3098. Google Scholar
Digital Library
- [8] . 2009. Blend-in: A privacy-enhancing certificate-selection method for vehicular communication. IEEE Trans. Vehic. Technol. 58, 9 (2009), 5190–5199. Google Scholar
Cross Ref
- [9] . 2004. Direct anonymous attestation. In Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS’04). ACM, New York, NY, 132–145. Google Scholar
Digital Library
- [10] . 2020. Accessibility analysis and modeling for IoV in an urban scene. IEEE Trans. Vehic. Technol. 69, 4 (2020), 4246–4256. Google Scholar
Cross Ref
- [11] . 2016. Fog and IoT: An overview of research opportunities. IEEE Internet Things J. 3, 6 (2016), 854–864. Google Scholar
Cross Ref
- [12] . 2022. Reliable and efficient content sharing for 5G-enabled vehicular networks. IEEE Trans. Intell. Transport. Syst. 23, 2 (2022), 1247–1259. Google Scholar
Digital Library
- [13] . 2020. Edge computing in VANETs-an efficient and privacy-preserving cooperative downloading scheme. IEEE J. Select. Areas Commun. 38, 6 (2020), 1191–1204. Google Scholar
Cross Ref
- [14] . 2013. Evaluating (Geo) content sharing with the ONE simulator. In Proceedings of the 11th ACM International Symposium on Mobility Management and Wireless Access (MobiWac’13). ACM, New York, NY, 37–40. Google Scholar
Digital Library
- [15] . 2006. Attribute-based encryption for fine-grained access control of encrypted data. Proceedings of the ACM Conference on Computer and Communications Security, 89–98. Google Scholar
Digital Library
- [16] . 2017. Replace: A reliable trust-based platoon service recommendation scheme in VANET. IEEE Trans. Vehic. Technol. 66, 2 (2017), 1786–1797. Google Scholar
Cross Ref
- [17] . 2008. Distributed key management with protection against RSU compromise in group signature based VANETs. In Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM’08). 1–5. Google Scholar
Cross Ref
- [18] . 2018. Efficient privacy-aware authentication scheme for mobile cloud computing services. IEEE Syst. J. 12, 2 (2018), 1621–1631. Google Scholar
Cross Ref
- [19] . 2018. A provably-secure cross-domain handshake scheme with symptoms-matching for mobile healthcare social network. IEEE Trans. Depend. Secure Comput. 15, 4 (2018), 633–645. Google Scholar
Digital Library
- [20] . 2018. Certificateless public auditing scheme for cloud-assisted wireless body area networks. IEEE Syst. J. 12, 1 (2018), 64–73. Google Scholar
- [21] . 2015. An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Trans. Info. Forensics Secur. 10, 12 (2015), 2681–2691. Google Scholar
Digital Library
- [22] . 2013. b-SPECS+: Batch verification for secure pseudonymous authentication in VANET. IEEE Trans. Info. Forensics Secur. 8, 11 (2013), 1860–1875. Google Scholar
Digital Library
- [23] . 2007. Differential Power Analysis. Springer, Boston, MA, 119–165. Google Scholar
Cross Ref
- [24] . 2019. RSEAP: RFID based secure and efficient authentication protocol for vehicular cloud computing. Vehic. Commun. 22 (2019), 100213. Google Scholar
Digital Library
- [25] . 2007. GSIS: A secure and privacy-preserving protocol for vehicular communications. IEEE Trans. Vehic. Technol. 56, 6 (2007), 3442–3456. Google Scholar
Cross Ref
- [26] . 2007. Securing vehicular ad hoc networks. In Proceedings of the 2nd International Conference on Pervasive Computing and Applications. 424–429. Google Scholar
Cross Ref
- [27] . 2019. 5G vehicle-to-everything services: Gearing up for security and privacy. Proc. IEEE 108, 99 (2019), 1–17. Google Scholar
Cross Ref
- [28] . 2019. Towards secure and privacy preserving collision avoidance system in 5G fog based internet of vehicles. Future Gen. Comput. Syst. 95 (June 2019). Google Scholar
Digital Library
- [29] . 2008. Privacy of recent RFID authentication protocols. In Proceedings of the International Conference on Information Security Practice and Experience. Google Scholar
Cross Ref
- [30] . 2000. Security arguments for digital signatures and blind signatures. J. Cryptol. 13, 3 (2000), 361–396. Google Scholar
Digital Library
- [31] . 2020. Comments on “AKM-IoV: Authenticated key management protocol in fog computing-based internet of vehicles deployment.” IEEE Internet Things J. 7, 5 (2020), 4671–4675. Google Scholar
Cross Ref
- [32] . 1979. How to share a secret. Commun. ACM 22 (Nov. 1979), 612–613. Google Scholar
Digital Library
- [33] . 2019. A survey on internet of vehicles: Applications, security issues and solutions. Vehic. Commun. 20 (2019), 100182. Google Scholar
Cross Ref
- [34] . 2017. Fog vehicular computing: Augmentation of fog computing using vehicular cloud computing. IEEE Vehic. Technol. Mag. 12, 3 (2017), 55–64. Google Scholar
Cross Ref
- [35] . 2022. OpenJUMP. Retrieved from http://www.openjump.org/.Google Scholar
- [36] . 2022. OpenStreetMap. Retrieved from https://wiki.openstreetmap.org/wiki/Main-Page.Google Scholar
- [37] . 2022. The Pairing-Based Cryptography Library. Retrieved from http://crypto.stanford.edu/pbc/.Google Scholar
- [38] . 2017. Enhancing security and privacy for identity-based batch verification scheme in VANETs. IEEE Trans. Vehic. Technol. 66, 4 (2017), 3235–3248. Google Scholar
Cross Ref
- [39] . 2022. An anonymous batch authentication and key exchange protocols for 6G enabled VANETs. IEEE Trans. Intell. Transport. Syst. 23, 2 (2022), 1630–1638. Google Scholar
Digital Library
- [40] . 2019. AKM-IoV: Authenticated key management protocol in fog computing-based internet of vehicles deployment. IEEE Internet Things J. 6, 5 (2019), 8804–8817. Google Scholar
Cross Ref
- [41] . 2017. An enhanced privacy-aware authentication scheme for distributed mobile cloud computing services. KSII Trans. Internet Info. Syst. 11, 12 (2017), 6169–6187. Google Scholar
Cross Ref
- [42] . 2016. A novel message authentication method for VANET without RSU. Eng. Comput. 33 (Nov. 2016), 2288–2301. Google Scholar
Cross Ref
- [43] . 2014. On the security of a secure batch verification with group testing for VANET. Int. J. Netw. Secur. 16 (Sep. 2014), 355–362. Google Scholar
Cross Ref
- [44] . 2010. A scalable robust authentication protocol for secure vehicular communications. IEEE Trans. Vehic. Technol. 59, 4 (2010), 1606–1617. Google Scholar
Cross Ref
Index Terms
Conditional Identity Privacy-preserving Authentication Scheme Based on Cooperation of Multiple Fog Servers under Fog Computing-based IoVs
Recommendations
Ring Signature-Based Conditional Privacy-Preserving Authentication in VANETs
AbstractVehicular ad hoc networks (VANETs) consist of vehicles with high mobility that broadcasts delay-intolerant safety and informative messages frequently. The real identity of a vehicle needs to be kept private as these vehicles operate in an open and ...
Anonymous and secure aggregation scheme in fog-based public cloud computing
By using fog computing, cloud computing can be extended to the edge of the network. Generally, in the public cloud, fog computing comprises three components: terminal device, fog node and public cloud server (PCS). In this paper, we propose the concept ...
Security and privacy preservation in fog-based crowd sensing on the internet of vehicles
AbstractThe emergence of fog computing enables fog-based vehicle crowd sensing (FBVC) to be utilized in various fields. However, existing privacy issues represent a primary challenge that limits the degree of participation by vehicles. To meet ...






Comments