Journal
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS
Volume 38, Issue 6, Pages 1191-1204Publisher
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JSAC.2020.2986617
Keywords
Cryptography; Edge computing; Data privacy; Cellular networks; Acceleration; Vehicular ad hoc networks; VANETs; data downloading; security; privacy-preserving; edge computing; fuzzy logic
Funding
- National Natural Science Foundation of China [61872001, 6191101332, U1936220]
- Special Fund for Key Program of Science and Technology of Anhui Province, China [18030901027]
- Open Fund of Key Laboratory of Embedded System and Service Computing (Tongji University), Ministry of Education [ESSCKF2018-03]
- Open Fund for Discipline Construction, Institute of Physical Science and Information Technology, Anhui University
- Excellent Talent Project of Anhui University
Ask authors/readers for more resources
With the advancements in social media and rising demand for real traffic information, the data shared in vehicular ad hoc networks (VANETs) indicate that the size and amount of requested data will continue increasing. Vehicles in the same area often have similar data downloading requests. If we ignore the common requests, the resource allocation efficiency of the VANET system will be quite low. Motivated by this fact, we propose an efficient and privacy-preserving data downloading scheme for VANETs, based on the edge computing concept. In the proposed scheme, a roadside unit (RSU) can find the popular data by analyzing the encrypted requests sent from nearby vehicles without having to sacrifice the privacy of their download requests. Further, the RSU caches the popular data in nearby qualified vehicles called edge computing vehicles (ECVs). If a vehicle wishes to download the popular data, it can download it directly from the nearby ECVs. This method increases the downloading efficiency of the system. The security analysis results show that the proposed scheme can resist multiple security attacks. The performance analysis results demonstrate that our scheme has reasonable computation and communication overhead. Finally, the OMNeT++ simulation results indicate that our scheme has good network performance.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available