4.6 Article

Privacy-Preserving Proxy Re-Encryption With Decentralized Trust Management for MEC-Empowered VANETs

期刊

IEEE TRANSACTIONS ON INTELLIGENT VEHICLES
卷 8, 期 8, 页码 4105-4119

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TIV.2023.3289069

关键词

Blockchain; identity privacy-preserving; proxy re-encryption; trust management; vehicular edge computing

向作者/读者索取更多资源

This paper proposes an aggregated security solution for MEC applications in VANETs, which can protect the privacy of vehicle identities while enabling confidential, efficient, and trustworthy data sharing.
Multi-access edge computing (MEC) technology is widely deployed at the edge of Vehicular Ad hoc Networks (VANETs) to enhance their communication and computational capabilities. However, existing security and privacy preservation solutions for MEC applications in VANETs face several challenges, such as the risk of privacy exposure of vehicle authentication, increased overhead due to cryptographic algorithms, as well as resource occupation and malicious attacks on edge servers. In this paper, we propose an aggregated security solution for the confidential, efficient, and trustworthy sharing of data while safeguarding the privacy of vehicle identities. Firstly, we present a broadcast proxy re-encryption scheme based on cubic spline interpolation that ensures the security of the VANET system and the identity privacy of large-scale vehicles. The re-encryption system is designed to prioritize the reduction of re-encryption computation time rather than focusing on the sizes of re-encryption keys and ciphertexts. We further model the aggregation overhead in terms of communication and computation. Additionally, we propose an efficient protocol based on Practical Byzantine Fault Tolerant (PBFT) consensus to facilitate decentralized trust management for edge proxy servers. Our security analysis demonstrates that the proposed scheme satisfies the security and confidentiality requirements for data sharing in VANETs. Finally, we provide extensive simulations that reveal the performance and effectiveness of our solution.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据