An anonymous access authentication scheme for vehicular ad hoc networks under edge computing
With the rapid booming of intelligent traffic system, vehicular ad hoc networks have attracted wide attention from both academic and industry. However, security is the main obstacle for the wide deployment of vehicular ad hoc networks. Vehicular ad hoc networks security has two critical issues: acce...
Saved in:
| Main Authors: | , , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Wiley
2018-02-01
|
| Series: | International Journal of Distributed Sensor Networks |
| Online Access: | https://doi.org/10.1177/1550147718756581 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1849467718656327680 |
|---|---|
| author | Tianhan Gao Yanqiang Li Nan Guo Ilsun You |
| author_facet | Tianhan Gao Yanqiang Li Nan Guo Ilsun You |
| author_sort | Tianhan Gao |
| collection | DOAJ |
| description | With the rapid booming of intelligent traffic system, vehicular ad hoc networks have attracted wide attention from both academic and industry. However, security is the main obstacle for the wide deployment of vehicular ad hoc networks. Vehicular ad hoc networks security has two critical issues: access authentication and privacy preservation. How to ensure privacy preservation and improve the efficiency of authentication has become the urgent needs. However, the existing access authentication schemes for vehicular ad hoc networks with different flaws cannot maintain the balance between security and efficiency. Thus, an anonymous access authentication scheme for vehicular ad hoc networks under edge computing based on ID-based short group signature mechanism is proposed in this article to improve the efficiency and anonymity of access authentication. Multiple pseudonyms are presented to preserve the privacy of vehicle node. Besides, a new method is designed to identify and revoke malicious vehicles in the evaluation manner. The core protocols of the proposed scheme are proved to be secure by SVO logic. According to the computation cost and transmission overhead analysis, we indicate that our scheme owns better performance. Moreover, in this article, we combine vehicular ad hoc networks with edge computing together to provide a new clue for the development of mobile edge computing. |
| format | Article |
| id | doaj-art-dfe039daf3194dc59501b2fc1857f7d0 |
| institution | Kabale University |
| issn | 1550-1477 |
| language | English |
| publishDate | 2018-02-01 |
| publisher | Wiley |
| record_format | Article |
| series | International Journal of Distributed Sensor Networks |
| spelling | doaj-art-dfe039daf3194dc59501b2fc1857f7d02025-08-20T03:26:05ZengWileyInternational Journal of Distributed Sensor Networks1550-14772018-02-011410.1177/1550147718756581An anonymous access authentication scheme for vehicular ad hoc networks under edge computingTianhan Gao0Yanqiang Li1Nan Guo2Ilsun You3Software College, Northeastern University, Shenyang, ChinaSoftware College, Northeastern University, Shenyang, ChinaSchool of Computer Science and Engineering, Northeastern University, Shenyang, ChinaDepartment of Information Security Engineering, Soonchunhyang University, Asan-si, South KoreaWith the rapid booming of intelligent traffic system, vehicular ad hoc networks have attracted wide attention from both academic and industry. However, security is the main obstacle for the wide deployment of vehicular ad hoc networks. Vehicular ad hoc networks security has two critical issues: access authentication and privacy preservation. How to ensure privacy preservation and improve the efficiency of authentication has become the urgent needs. However, the existing access authentication schemes for vehicular ad hoc networks with different flaws cannot maintain the balance between security and efficiency. Thus, an anonymous access authentication scheme for vehicular ad hoc networks under edge computing based on ID-based short group signature mechanism is proposed in this article to improve the efficiency and anonymity of access authentication. Multiple pseudonyms are presented to preserve the privacy of vehicle node. Besides, a new method is designed to identify and revoke malicious vehicles in the evaluation manner. The core protocols of the proposed scheme are proved to be secure by SVO logic. According to the computation cost and transmission overhead analysis, we indicate that our scheme owns better performance. Moreover, in this article, we combine vehicular ad hoc networks with edge computing together to provide a new clue for the development of mobile edge computing.https://doi.org/10.1177/1550147718756581 |
| spellingShingle | Tianhan Gao Yanqiang Li Nan Guo Ilsun You An anonymous access authentication scheme for vehicular ad hoc networks under edge computing International Journal of Distributed Sensor Networks |
| title | An anonymous access authentication scheme for vehicular ad hoc networks under edge computing |
| title_full | An anonymous access authentication scheme for vehicular ad hoc networks under edge computing |
| title_fullStr | An anonymous access authentication scheme for vehicular ad hoc networks under edge computing |
| title_full_unstemmed | An anonymous access authentication scheme for vehicular ad hoc networks under edge computing |
| title_short | An anonymous access authentication scheme for vehicular ad hoc networks under edge computing |
| title_sort | anonymous access authentication scheme for vehicular ad hoc networks under edge computing |
| url | https://doi.org/10.1177/1550147718756581 |
| work_keys_str_mv | AT tianhangao ananonymousaccessauthenticationschemeforvehicularadhocnetworksunderedgecomputing AT yanqiangli ananonymousaccessauthenticationschemeforvehicularadhocnetworksunderedgecomputing AT nanguo ananonymousaccessauthenticationschemeforvehicularadhocnetworksunderedgecomputing AT ilsunyou ananonymousaccessauthenticationschemeforvehicularadhocnetworksunderedgecomputing AT tianhangao anonymousaccessauthenticationschemeforvehicularadhocnetworksunderedgecomputing AT yanqiangli anonymousaccessauthenticationschemeforvehicularadhocnetworksunderedgecomputing AT nanguo anonymousaccessauthenticationschemeforvehicularadhocnetworksunderedgecomputing AT ilsunyou anonymousaccessauthenticationschemeforvehicularadhocnetworksunderedgecomputing |