4.6 Article

Secure, Robust and Flexible Cooperative Downloading Scheme for Highway VANETs

期刊

IEEE ACCESS
卷 9, 期 -, 页码 5199-5211

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/ACCESS.2020.3048273

关键词

Authentication; Internet; Security; Vehicular ad hoc networks; Task analysis; Robustness; Privacy; Vehicular ad hoc network; cooperative downloading; security; privacy; authentication

资金

  1. National Key R&D Program of China [2017YFB0802000]
  2. NSF of China [61972159, 61572198, 61321064, 61702259]
  3. Open Research Fund of Engineering Research Center of Software/Hardware Co-design Technology and Application, Ministry of Education (East China Normal University)
  4. Fundamental Research Funds for the Central Universities
  5. Cloud Technology Endowed Professorship

向作者/读者索取更多资源

This paper proposes a secure, robust and flexible cooperative downloading scheme based on reputation based selection mechanism and ordered signatures, aiming to address the challenge of selecting reliable proxy vehicles in fast driving situations, and achieving a balance between flexible data downloading and strong security.
The increasing popularity of smart vehicles and vehicular ad hoc networks (VANETs) has reinforced the importance of Internet connectivity. However, existing solutions (e.g., those based on cooperative downloading via drive-thru Internet) have a number of limitations, partly due to the challenges in selecting reliable proxy vehicles in a fast moving driving situation, and balancing between flexible data downloading and achieving strong security. Therefore, in this paper we propose a secure, robust and flexible cooperative downloading scheme based on our reputation based selection mechanism and ordered signatures. Using the reputation based selection mechanism, only vehicles with the highest expected downloading capacities will be selected as proxy vehicles. This helps us to avoid selecting less reliable proxy vehicles. The flexible data downloading is achieved by dividing a file into small blocks so that a proxy vehicle can flexibly vary the file / data download, for example based on existing condition. Our scheme also achieves strong security, in the sense that it realizes traditional authentication, privacy preservation and message confidentiality, as well as a newly introduced security requirement (i.e., process authentication: authenticates the order of file blocks and the order of the assisting vehicles using ordered signatures).

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据