4.6 Article

A novel authentication scheme for edge computing-enabled Internet of Vehicles providing anonymity and identity tracing with drone-assistance

期刊

JOURNAL OF SYSTEMS ARCHITECTURE
卷 132, 期 -, 页码 -

出版社

ELSEVIER
DOI: 10.1016/j.sysarc.2022.102737

关键词

Formal proof; Internet of vehicles; Edge computing; Drone; Traceability

资金

  1. Xiamen University Tan Kah Kee Col-lege Scientific Research Foundation [JG2022SRF02]
  2. National Natural Science Foundation of China [62072078]
  3. Natural Science Foundation of Sichuan, China [2022NSFSC0550]
  4. Open Foundation of Henan Key Laboratory of Cyberspace Situation Awareness [HNTS2022009]

向作者/读者索取更多资源

This paper investigates the authentication issue of smart vehicles in edge computing-enabled Internet of Vehicles with drone assistance. A scheme is proposed and proven to be secure and practical through formal proof and network simulation.
As an element of the network edge for the smart city, the smart vehicle with computation capability undertakes information collection and transmission and serves as a node of the Internet of Vehicles (IoV). It is emergent to keep available communication for IoV in rural or disaster areas under 5G/beyond 5G environments, where drones play a critical part in the above cases. Also, edge computing is a good method to complete the incentive computing for high-speed vehicles. In this paper, an authentication scheme is constructed for an edge computing-enabled Internet of Vehicles with drone assistance. The vehicles can keep their identities anonymous in the data transmission. The roadside unit, as the mobile edge computing server, deals with data from vehicles. If any vehicle's identity is required, the trusted authority will disclose it via the corresponding message. The formal proof demonstrates that the messages between participants cannot be forged by the attacker. Compared with some recent schemes of drone-assisted IoV, our scheme is the only one that maintains all security features. Moreover, our scheme is sound and practical via the expression of performance discussion and network simulation.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据