4.6 Article

A novel authentication scheme for edge computing-enabled Internet of Vehicles providing anonymity and identity tracing with drone-assistance

Journal

JOURNAL OF SYSTEMS ARCHITECTURE
Volume 132, Issue -, Pages -

Publisher

ELSEVIER
DOI: 10.1016/j.sysarc.2022.102737

Keywords

Formal proof; Internet of vehicles; Edge computing; Drone; Traceability

Funding

  1. Xiamen University Tan Kah Kee Col-lege Scientific Research Foundation [JG2022SRF02]
  2. National Natural Science Foundation of China [62072078]
  3. Natural Science Foundation of Sichuan, China [2022NSFSC0550]
  4. Open Foundation of Henan Key Laboratory of Cyberspace Situation Awareness [HNTS2022009]

Ask authors/readers for more resources

This paper investigates the authentication issue of smart vehicles in edge computing-enabled Internet of Vehicles with drone assistance. A scheme is proposed and proven to be secure and practical through formal proof and network simulation.
As an element of the network edge for the smart city, the smart vehicle with computation capability undertakes information collection and transmission and serves as a node of the Internet of Vehicles (IoV). It is emergent to keep available communication for IoV in rural or disaster areas under 5G/beyond 5G environments, where drones play a critical part in the above cases. Also, edge computing is a good method to complete the incentive computing for high-speed vehicles. In this paper, an authentication scheme is constructed for an edge computing-enabled Internet of Vehicles with drone assistance. The vehicles can keep their identities anonymous in the data transmission. The roadside unit, as the mobile edge computing server, deals with data from vehicles. If any vehicle's identity is required, the trusted authority will disclose it via the corresponding message. The formal proof demonstrates that the messages between participants cannot be forged by the attacker. Compared with some recent schemes of drone-assisted IoV, our scheme is the only one that maintains all security features. Moreover, our scheme is sound and practical via the expression of performance discussion and network simulation.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available