Journal
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
Volume 95, Issue -, Pages 488-499Publisher
ELSEVIER
DOI: 10.1016/j.future.2018.12.031
Keywords
5G cellular networks; Fog computing; Intelligent transportation system; Security; Collision avoidance system
Categories
Funding
- Basic Science Research Program through the National Research Foundation of Korea (NRF) - Ministry of Education [NRF-2017R1D1A1B03036285]
Ask authors/readers for more resources
Current avoidance systems mainly focus on the safety of the car occupants. The surrounding entities including the pedestrians, the cyclists are assumed to use a different avoidance system for their safety. Vehicle speed is reported as one of the major factors that causes such severe road accidents that affect other entities on the road. In response, several solutions have been implemented to control the causalities of over speeding ranging from speed camera, speed detectors to car avoidance systems. However, those solutions have not significantly improved the rate of traffic accidents and their impact. Additionally, the current solutions do not ensure timely notification of all the road users (surrounding vehicle drivers, pedestrians or others) that can alleviate crash causalities in case of fatal traffic accidents. The fifth generation (5G) cellular network is predicted to overcome the current limitations of Internet of-Vehicles (boy) by offering fast, low latency and reliable connections to enable boy based applications. Fog computing has also been proposed to complement IoV by bringing computational entities in nearby proximity of the vehicles. 5G based fog vehicular networks is a new paradigm that empower real-time and low latency services for Intelligent Transportation System (ITS). In this paper we proposed a secure and privacy-preserving collision avoidance system in 5G fog based boy. The fog devices are used to collect speed violation report (TVR) sent by the vehicles' speed sensors. The fog nodes aggregate multiple TVRs, verify the signatures on the TVRs and broadcast anonymous notifications to other entities in the vicinity. The protocol makes use of certificateless aggregate signcryption coupled with pseudonymous technique as the building blocks to ensure authentication, integrity, confidentiality and privacy preservation respectively. The batch verification technique is used by the fog devices to allow simultaneous TVRs signature verification for a timely response. The authorization of reporting speed sensors is both guaranteed by the location-based information along with the digital signature to discard all the bogus TVRs. The analysis of the protocol confirms its lightweightness and efficiency. (C) 2019 Elsevier B.V. All rights reserved.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available