Skip to main content
Erschienen in: Peer-to-Peer Networking and Applications 4/2021

11.05.2021

Anonymous and Traceable Authentication for Securing Data Sharing in Parking Edge Computing

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 4/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In parking edge computing, the service providers can engage the parking vehicles to provide computing services. The requesting vehicles can enjoy the advantages of the parking computing services with no need to build expensive equipment locally, whereas the parking vehicles can sell the computing resources to gain benefits. However, in an open parking computing system, the identity of each entity is easy to be counterfeited by other malicious entities, which may cause the leakage of privacy data of honest entities and the waste of parking computing resources. To address this issue, we propose an efficient authentication protocol between vehicle and roadside unit near the parking lot, which also allows two verified entities to generate a common key to enjoy the parking computing service confidentially. The protocol is extended to allow anonymous authentication so that the true identity would not be leaked to RSU during the authentication process, and malicious vehicle tracing if some forged or illegal authentication message is submitted to cheat the service provider or roadside unit. The security and efficiency analysis demonstrate that the proposed authentication protocols are secure and practical in applications.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Al-kahtani MS (2012) Survey on security attacks in vehicular ad hoc networks (vanets). In: 2012 6th international conference on signal processing and communication systems, pp 1–9 Al-kahtani MS (2012) Survey on security attacks in vehicular ad hoc networks (vanets). In: 2012 6th international conference on signal processing and communication systems, pp 1–9
2.
Zurück zum Zitat Arif S, Olariu S, Wang J, Yan G, Yang W, Khalil I (2012) Datacenter at the airport: reasoning about time-dependent parking lot occupancy. IEEE Transactions on Parallel and Distributed Systems 23(11):2067–2080CrossRef Arif S, Olariu S, Wang J, Yan G, Yang W, Khalil I (2012) Datacenter at the airport: reasoning about time-dependent parking lot occupancy. IEEE Transactions on Parallel and Distributed Systems 23(11):2067–2080CrossRef
3.
Zurück zum Zitat Au MH, Liu JK, Zhang Z, Susilo W, Li J, Zhou J (2017) Anonymous announcement system (aas) for electric vehicle in vanets. The Computer Journal 60(4):588–599 Au MH, Liu JK, Zhang Z, Susilo W, Li J, Zhou J (2017) Anonymous announcement system (aas) for electric vehicle in vanets. The Computer Journal 60(4):588–599
4.
Zurück zum Zitat Boneh D, Boyen X, Shacham H Franklin M (ed) (2004) Short group signatures. Springer, Berlin Boneh D, Boyen X, Shacham H Franklin M (ed) (2004) Short group signatures. Springer, Berlin
5.
Zurück zum Zitat Chaurasia BK, Verma S (2011) Conditional privacy through ring signature in vehicular ad-hoc networks, vol 6750. Springer, Berlin, pp 147–156 Chaurasia BK, Verma S (2011) Conditional privacy through ring signature in vehicular ad-hoc networks, vol 6750. Springer, Berlin, pp 147–156
6.
Zurück zum Zitat Douceur JR (2002) The sybil attack. In: Druschel P, Kaashoek F, Rowstron A (eds) International workshop on peer-to-peer systems. Springer, Berlin, pp 251–260 Douceur JR (2002) The sybil attack. In: Druschel P, Kaashoek F, Rowstron A (eds) International workshop on peer-to-peer systems. Springer, Berlin, pp 251–260
7.
Zurück zum Zitat Elsayed SA, Abdelhamid S, Hassanein HS (2018) Proactive caching at parked vehicles for social networking. In: 2018 IEEE International conference on communications (ICC), pp 1–6 Elsayed SA, Abdelhamid S, Hassanein HS (2018) Proactive caching at parked vehicles for social networking. In: 2018 IEEE International conference on communications (ICC), pp 1–6
9.
Zurück zum Zitat He D, Zeadally S, Xu B, Huang X (2015) An efficient identity-based conditional privacypreserving authentication scheme for vehicular ad hoc networks. IEEE Trans Inform Forensics Security 10 (12):2681–2691CrossRef He D, Zeadally S, Xu B, Huang X (2015) An efficient identity-based conditional privacypreserving authentication scheme for vehicular ad hoc networks. IEEE Trans Inform Forensics Security 10 (12):2681–2691CrossRef
10.
Zurück zum Zitat He W, Yan G, Xu LD (2014) Developing vehicular data cloud services in the iot environment. IEEE Transactions on Industrial Informatics 10(2):1587–1595CrossRef He W, Yan G, Xu LD (2014) Developing vehicular data cloud services in the iot environment. IEEE Transactions on Industrial Informatics 10(2):1587–1595CrossRef
11.
Zurück zum Zitat Kaur K, Garg S, Kaddoum G, Gagnon F, Ahmed SH (2019) Blockchain-based lightweight authentication mechanism for vehicular fog infrastructure. In: 2019 IEEE International conference on communications workshops (ICC workshops), pp 1–6 Kaur K, Garg S, Kaddoum G, Gagnon F, Ahmed SH (2019) Blockchain-based lightweight authentication mechanism for vehicular fog infrastructure. In: 2019 IEEE International conference on communications workshops (ICC workshops), pp 1–6
13.
Zurück zum Zitat Lee CC, Lai YM (2013) Toward a secure batch verification with group testing for vanet. Wireless Networks 19(6):1441C1449 Lee CC, Lai YM (2013) Toward a secure batch verification with group testing for vanet. Wireless Networks 19(6):1441C1449
14.
Zurück zum Zitat Li C, Wang S, Huang X, Li X, Yu R, Zhao F (2019) Parked vehicular computing for energy–efficient internet of vehicles: a contract theoretic approach. IEEE Internet of Things Journal 6(4):6079–6088CrossRef Li C, Wang S, Huang X, Li X, Yu R, Zhao F (2019) Parked vehicular computing for energy–efficient internet of vehicles: a contract theoretic approach. IEEE Internet of Things Journal 6(4):6079–6088CrossRef
15.
Zurück zum Zitat Li X, Liu H, Wei F, Ma J, Yang W (2015) A lightweight anonymous authentication protocol using k-pseudonym set in wireless networks. In: 2015 IEEE Global communications conference (GLOBECOM), pp 1–6 Li X, Liu H, Wei F, Ma J, Yang W (2015) A lightweight anonymous authentication protocol using k-pseudonym set in wireless networks. In: 2015 IEEE Global communications conference (GLOBECOM), pp 1–6
16.
Zurück zum Zitat Lin X, Sun X, Ho P, Shen X (2007) Gsis: a secure and privacy-preserving protocol for vehicular communications. IEEE Trans Veh Technol 56(6):3442–3456CrossRef Lin X, Sun X, Ho P, Shen X (2007) Gsis: a secure and privacy-preserving protocol for vehicular communications. IEEE Trans Veh Technol 56(6):3442–3456CrossRef
17.
Zurück zum Zitat Liu JK, Baek J, Zhou J, Yang Y, Wong JW (2010) Efficient online/offline identity-based signature for wireless sensor network. Int J Inf Secur 9(4):287–296CrossRef Liu JK, Baek J, Zhou J, Yang Y, Wong JW (2010) Efficient online/offline identity-based signature for wireless sensor network. Int J Inf Secur 9(4):287–296CrossRef
18.
Zurück zum Zitat Maiti S, Misra S (2020) P2b: privacy preserving identity-based broadcast proxy re-encryption. IEEE Trans Veh Technol 69(5):5610–5617CrossRef Maiti S, Misra S (2020) P2b: privacy preserving identity-based broadcast proxy re-encryption. IEEE Trans Veh Technol 69(5):5610–5617CrossRef
21.
Zurück zum Zitat Raya M, Hubaux JP (2007) Securing vehicular ad hoc networks. J Comput Secur 15(1):3968 Raya M, Hubaux JP (2007) Securing vehicular ad hoc networks. J Comput Secur 15(1):3968
22.
Zurück zum Zitat Rivest RL, Shamir A, Tauman Y (2001) How to leak a secret. In: Boyd C (ed) Advances in cryptology-ASIACRYPT 2001. Springer, Berlin, p 552c565 Rivest RL, Shamir A, Tauman Y (2001) How to leak a secret. In: Boyd C (ed) Advances in cryptology-ASIACRYPT 2001. Springer, Berlin, p 552c565
23.
Zurück zum Zitat Safkhani M, Bagheri N, Peris-Lopez P, Mitrokotsa A, Hernandez-Castro JC (2012) Weaknesses in another gen2-based rfid authentication protocol. In: 2012 IEEE International conference on RFID-technologies and applications (RFID-TA), pp 80– 84 Safkhani M, Bagheri N, Peris-Lopez P, Mitrokotsa A, Hernandez-Castro JC (2012) Weaknesses in another gen2-based rfid authentication protocol. In: 2012 IEEE International conference on RFID-technologies and applications (RFID-TA), pp 80– 84
24.
Zurück zum Zitat Shao J, Lin X, Lu R, Zuo C (2016) A threshold anonymous authentication protocol for vanets. IEEE Trans Veh Technol 65(3):1711–1720CrossRef Shao J, Lin X, Lu R, Zuo C (2016) A threshold anonymous authentication protocol for vanets. IEEE Trans Veh Technol 65(3):1711–1720CrossRef
26.
Zurück zum Zitat Su Z, Hui Y, Yang Q (2017) The next generation vehicular networks: a content-centric framework. IEEE Wirel Commun 24(1):60–66CrossRef Su Z, Hui Y, Yang Q (2017) The next generation vehicular networks: a content-centric framework. IEEE Wirel Commun 24(1):60–66CrossRef
27.
Zurück zum Zitat Su Z, Xu Q, Hui Y, Wen M, Guo S (2017) A game theoretic approach to parked vehicle assisted content delivery in vehicular ad hoc networks. IEEE Trans Veh Technol 66(7):6461–6474CrossRef Su Z, Xu Q, Hui Y, Wen M, Guo S (2017) A game theoretic approach to parked vehicle assisted content delivery in vehicular ad hoc networks. IEEE Trans Veh Technol 66(7):6461–6474CrossRef
28.
Zurück zum Zitat Wang Y, Ding Y, Wu Q, Wei Y, Qin B, Wang H (2019) Privacy-preserving cloud-based road condition monitoring with source authentication in vanets. IEEE Transactions on Information Forensics and Security 14(7):1779–1790CrossRef Wang Y, Ding Y, Wu Q, Wei Y, Qin B, Wang H (2019) Privacy-preserving cloud-based road condition monitoring with source authentication in vanets. IEEE Transactions on Information Forensics and Security 14(7):1779–1790CrossRef
31.
Zurück zum Zitat Zhang C, Ho PH, Tapolcai J (2011) Onbatchverificationwithgrouptestingforvehicularcommunications. WirelNetw 17(8):1851–1865 Zhang C, Ho PH, Tapolcai J (2011) Onbatchverificationwithgrouptestingforvehicularcommunications. WirelNetw 17(8):1851–1865
32.
Zurück zum Zitat Zhang C, Lu R, Lin X, Ho P, Shen X (2008) Anefficientidentity-basedbatchverificationschemeforvehicularsensornetworks. In: IEEEINFOCOM2008-The27thconferenceoncomputercommunications,pp246–250 Zhang C, Lu R, Lin X, Ho P, Shen X (2008) Anefficientidentity-basedbatchverificationschemeforvehicularsensornetworks. In: IEEEINFOCOM2008-The27thconferenceoncomputercommunications,pp246–250
33.
Zurück zum Zitat Zhang L, Hu C, Wu Q, Domingo-Ferrer J, Qin B (2016) Privacy-preservingvehicularcommunicationauthenticationwithhierarchicalaggregationandfastresponse. IEEETransComput 65(8):2562–2574MATH Zhang L, Hu C, Wu Q, Domingo-Ferrer J, Qin B (2016) Privacy-preservingvehicularcommunicationauthenticationwithhierarchicalaggregationandfastresponse. IEEETransComput 65(8):2562–2574MATH
Metadaten
Titel
Anonymous and Traceable Authentication for Securing Data Sharing in Parking Edge Computing
Publikationsdatum
11.05.2021
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 4/2021
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-021-01104-7

Weitere Artikel der Ausgabe 4/2021

Peer-to-Peer Networking and Applications 4/2021 Zur Ausgabe