Skip to main content
Erschienen in: The Journal of Supercomputing 3/2018

10.06.2016

Secure vehicle traffic data dissemination and analysis protocol in vehicular cloud computing

verfasst von: Lewis Nkenyereye, Youngho Park, Kyung-Hyune Rhee

Erschienen in: The Journal of Supercomputing | Ausgabe 3/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Intelligent transportation systems seek to maximize the usage of data generated by the vehicles for road users assistance. Combining vehicular ad hoc network with cloud computing makes it easy for the fixed infrastructures along the roads to collect and analyze safety messages for the benefits of the road users and the transportation authorities. However, security features need to be fully assessed before the adoption of such applications. In this paper, we present a secure vehicle traffic data dissemination and analysis in vehicular cloud computing in which the identity privacy of the vehicles and their generated message is achieved through pseudonym techniques. We use anonymous credential to guarantee the authorization of service demanding vehicles. ID-based signature is applied to assure the authentication of the vehicles for given pseudonyms. The efficient verification of signature on the message and revoked vehicles are achieved through batch verification technique and pseudonymous revocation list, respectively. Traffic estimation methods are applied to mine coarse-grained data collected by road side infrastructures. The merits of the proposed protocol compared to existing ones are shown through extensive simulations.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Babu P, Rekha NR (2014) Secured gps based traffic monitoring system in pervasive environment. In: Software Engineering and Service Science (ICSESS), 2014 5th IEEE International Conference on, pp. 775–779 (IEEE) Babu P, Rekha NR (2014) Secured gps based traffic monitoring system in pervasive environment. In: Software Engineering and Service Science (ICSESS), 2014 5th IEEE International Conference on, pp. 775–779 (IEEE)
2.
Zurück zum Zitat Chim TW, Yiu S, Hui LC, Li VO (2014) Vspn: Vanet-based secure and privacy-preserving navigation. Comp IEEE Trans 63(2):510–524MathSciNetCrossRef Chim TW, Yiu S, Hui LC, Li VO (2014) Vspn: Vanet-based secure and privacy-preserving navigation. Comp IEEE Trans 63(2):510–524MathSciNetCrossRef
3.
Zurück zum Zitat Cho W, Park Y, Sur C, Rhee KH (2013) An improved privacy-preserving navigation protocol in vanets. J Wireless Mobile Netw Ubiquitous Comput Dependable Appl 4(4):80–92 Cho W, Park Y, Sur C, Rhee KH (2013) An improved privacy-preserving navigation protocol in vanets. J Wireless Mobile Netw Ubiquitous Comput Dependable Appl 4(4):80–92
4.
Zurück zum Zitat Committee ITS et al (2006) Ieee trial-use standard for wireless access in vehicular environments-security services for applications and management messages. IEEE Vehic Technol Soc Stand 1609:2006 Committee ITS et al (2006) Ieee trial-use standard for wireless access in vehicular environments-security services for applications and management messages. IEEE Vehic Technol Soc Stand 1609:2006
5.
Zurück zum Zitat Eltoweissy M, Olariu S, Younis M (2010) Towards autonomous vehicular clouds. In: Ad hoc networks. Springer, pp 1–16 Eltoweissy M, Olariu S, Younis M (2010) Towards autonomous vehicular clouds. In: Ad hoc networks. Springer, pp 1–16
6.
Zurück zum Zitat Festag A, Papadimitratos P, Tielert T (2010) Design and performance of secure geocast for vehicular communication. Vehic Technol IEEE Trans 59(5):2456–2471CrossRef Festag A, Papadimitratos P, Tielert T (2010) Design and performance of secure geocast for vehicular communication. Vehic Technol IEEE Trans 59(5):2456–2471CrossRef
7.
Zurück zum Zitat Gentry C, Silverberg A (2002) Hierarchical id-based cryptography. In: Advances in cryptologyASIACRYPT 2002. Springer, pp 548–566 Gentry C, Silverberg A (2002) Hierarchical id-based cryptography. In: Advances in cryptologyASIACRYPT 2002. Springer, pp 548–566
8.
Zurück zum Zitat Geroliminis N, Daganzo CF (2008) Existence of urban-scale macroscopic fundamental diagrams: Some experimental findings. Trans Res Part B Methodol 42(9):759–770CrossRef Geroliminis N, Daganzo CF (2008) Existence of urban-scale macroscopic fundamental diagrams: Some experimental findings. Trans Res Part B Methodol 42(9):759–770CrossRef
9.
Zurück zum Zitat Haklay M, Weber P (2008) Openstreetmap: user-generated street maps. Pervas Comp IEEE 7(4):12–18CrossRef Haklay M, Weber P (2008) Openstreetmap: user-generated street maps. Pervas Comp IEEE 7(4):12–18CrossRef
10.
Zurück zum Zitat He D, Zeadally S, Xu B, Huang X (2015) An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. Inform Forens Security IEEE Trans 10(12):2681–2691CrossRef He D, Zeadally S, Xu B, Huang X (2015) An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. Inform Forens Security IEEE Trans 10(12):2681–2691CrossRef
11.
Zurück zum Zitat Herrera JC, Bayen AM (2007) Traffic flow reconstruction using mobile sensors and loop detector data. University of California Transportation Center, California Herrera JC, Bayen AM (2007) Traffic flow reconstruction using mobile sensors and loop detector data. University of California Transportation Center, California
12.
Zurück zum Zitat Hu J, Li G, Yu X, Liu S (2007) Design and application of sae j1939 communication database in city-bus information integrated control system development. In: Mechatronics and Automation, 2007. ICMA 2007. International Conference on. IEEE, pp 3429–3434 Hu J, Li G, Yu X, Liu S (2007) Design and application of sae j1939 communication database in city-bus information integrated control system development. In: Mechatronics and Automation, 2007. ICMA 2007. International Conference on. IEEE, pp 3429–3434
13.
Zurück zum Zitat Hussain R (2014) Cooperation-aware vanet clouds: providing secure cloud services to vehicular ad hoc networks. J Inform Process Syst 10(1):103–118CrossRef Hussain R (2014) Cooperation-aware vanet clouds: providing secure cloud services to vehicular ad hoc networks. J Inform Process Syst 10(1):103–118CrossRef
14.
Zurück zum Zitat Hussain R, Rezaeifar Z, Lee YH, Oh H (2015) Secure and privacy-aware traffic information as a service in vanet-based clouds. Pervas Mobile Comp 24:194–209CrossRef Hussain R, Rezaeifar Z, Lee YH, Oh H (2015) Secure and privacy-aware traffic information as a service in vanet-based clouds. Pervas Mobile Comp 24:194–209CrossRef
15.
Zurück zum Zitat Johansson KH, Törngren M, Nielsen L (2005) Vehicle applications of controller area network. In: Handbook of networked and embedded control systems. Springerpp 741–765 Johansson KH, Törngren M, Nielsen L (2005) Vehicle applications of controller area network. In: Handbook of networked and embedded control systems. Springerpp 741–765
16.
Zurück zum Zitat Kenney JB (2011) Dedicated short-range communications (dsrc) standards in the united states. Proceed IEEE 99(7):1162–1182CrossRef Kenney JB (2011) Dedicated short-range communications (dsrc) standards in the united states. Proceed IEEE 99(7):1162–1182CrossRef
17.
Zurück zum Zitat Lee CC, Lai YM (2013) Toward a secure batch verification with group testing for vanet. Wireless Networks 19(6):1441–1449CrossRef Lee CC, Lai YM (2013) Toward a secure batch verification with group testing for vanet. Wireless Networks 19(6):1441–1449CrossRef
18.
Zurück zum Zitat Lee E, Lee EK, Gerla M, Oh SY (2014) Vehicular cloud networking: architecture and design principles. Commun Magazine IEEE 52(2):148–155CrossRef Lee E, Lee EK, Gerla M, Oh SY (2014) Vehicular cloud networking: architecture and design principles. Commun Magazine IEEE 52(2):148–155CrossRef
19.
Zurück zum Zitat Lee JK, Jeong YS, Park JH (2015) s-itsf: a service based intelligent transportation system framework for smart accident management. Human-centric Comp Inform Sci 5(1):1–9CrossRef Lee JK, Jeong YS, Park JH (2015) s-itsf: a service based intelligent transportation system framework for smart accident management. Human-centric Comp Inform Sci 5(1):1–9CrossRef
20.
Zurück zum Zitat Li CT, Hwang MS, Chu YP (2008) A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks. Comp Commun 31(12):2803–2814CrossRef Li CT, Hwang MS, Chu YP (2008) A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks. Comp Commun 31(12):2803–2814CrossRef
21.
Zurück zum Zitat Mehran B, Kuwahara M, Naznin F (2012) Implementing kinematic wave theory to reconstruct vehicle trajectories from fixed and probe sensor data. Trans Res Part C Emerg Technol 20(1):144–163CrossRef Mehran B, Kuwahara M, Naznin F (2012) Implementing kinematic wave theory to reconstruct vehicle trajectories from fixed and probe sensor data. Trans Res Part C Emerg Technol 20(1):144–163CrossRef
22.
Zurück zum Zitat Mohammad SA, Rasheed A, Qayyum A (2011) Vanet architectures and protocol stacks: a survey. In: Communication technologies for vehicles. Springer, pp 95–105 Mohammad SA, Rasheed A, Qayyum A (2011) Vanet architectures and protocol stacks: a survey. In: Communication technologies for vehicles. Springer, pp 95–105
23.
Zurück zum Zitat Nakagami M (1960) The m-distribution-a general formula of intensity distribution of rapid fading. Statistical Method of Radio Propagation, Nakagami M (1960) The m-distribution-a general formula of intensity distribution of rapid fading. Statistical Method of Radio Propagation,
24.
Zurück zum Zitat Nkenyereye L, Tama BA, Park Y, Rhee KH (2015) A fine-grained privacy preserving protocol over attribute based access control for vanets. J Wireless Mobile Netw Ubiquitous Comput Dependable Appl 6(2):98–112 Nkenyereye L, Tama BA, Park Y, Rhee KH (2015) A fine-grained privacy preserving protocol over attribute based access control for vanets. J Wireless Mobile Netw Ubiquitous Comput Dependable Appl 6(2):98–112
25.
Zurück zum Zitat Olariu S, Hristov T, Yan G (2013) The next paradigm shift: from vehicular networks to vehicular clouds. Mobile ad hoc networking: cutting edge directions, 2nd edn. John Wiley & Sons, Inc, Hoboken Olariu S, Hristov T, Yan G (2013) The next paradigm shift: from vehicular networks to vehicular clouds. Mobile ad hoc networking: cutting edge directions, 2nd edn. John Wiley & Sons, Inc, Hoboken
26.
Zurück zum Zitat Olariu S, Khalil I, Abuelela M (2011) Taking vanet to the clouds. Int J Pervas Comp Commun 7(1):7–21CrossRef Olariu S, Khalil I, Abuelela M (2011) Taking vanet to the clouds. Int J Pervas Comp Commun 7(1):7–21CrossRef
27.
Zurück zum Zitat Palomar E, de Fuentes JM, González-Tablas AI, Alcaide A (2012) Hindering false event dissemination in vanets with proof-of-work mechanisms. Trans Res Part C Emerg Technol 23:85–97CrossRef Palomar E, de Fuentes JM, González-Tablas AI, Alcaide A (2012) Hindering false event dissemination in vanets with proof-of-work mechanisms. Trans Res Part C Emerg Technol 23:85–97CrossRef
28.
Zurück zum Zitat Park H, Miloslavov A, Lee J, Veeraraghavan M, Park B, Smith B (2011) Integrated traffic-communication simulation evaluation environment for intellidrive applications using sae j2735 message sets. Trans Res Record J Trans Res Board 2243:117–126CrossRef Park H, Miloslavov A, Lee J, Veeraraghavan M, Park B, Smith B (2011) Integrated traffic-communication simulation evaluation environment for intellidrive applications using sae j2735 message sets. Trans Res Record J Trans Res Board 2243:117–126CrossRef
29.
Zurück zum Zitat Raya M, Hubaux JP (2007) Securing vehicular ad hoc networks. J Comp Security 15(1):39–68CrossRef Raya M, Hubaux JP (2007) Securing vehicular ad hoc networks. J Comp Security 15(1):39–68CrossRef
30.
Zurück zum Zitat Seo T, Kusakabe T, Asakura Y (2015) Estimation of flow and density using probe vehicles with spacing measurement equipment. Trans Res Part C Emerg Technol 53:134–150CrossRef Seo T, Kusakabe T, Asakura Y (2015) Estimation of flow and density using probe vehicles with spacing measurement equipment. Trans Res Part C Emerg Technol 53:134–150CrossRef
31.
Zurück zum Zitat Sur C, Park Y, Rhee KH (2014) An efficient and secure navigation protocol based on vehicular cloud. International Journal of Computer Mathematics (ahead-of-print), pp 1–20 Sur C, Park Y, Rhee KH (2014) An efficient and secure navigation protocol based on vehicular cloud. International Journal of Computer Mathematics (ahead-of-print), pp 1–20
32.
Zurück zum Zitat Torrent-Moreno M, Santi P, Hartenstein H (2005) Fair sharing of bandwidth in vanets. In: Proceedings of the 2nd ACM international workshop on Vehicular ad hoc networks. ACM, pp 49–58 Torrent-Moreno M, Santi P, Hartenstein H (2005) Fair sharing of bandwidth in vanets. In: Proceedings of the 2nd ACM international workshop on Vehicular ad hoc networks. ACM, pp 49–58
33.
Zurück zum Zitat Unterluggauer T, Wenger E (2014) Efficient pairings and ecc for embedded systems. In: Cryptographic Hardware and Embedded Systems–CHES 2014. Springer, pp 298–315 Unterluggauer T, Wenger E (2014) Efficient pairings and ecc for embedded systems. In: Cryptographic Hardware and Embedded Systems–CHES 2014. Springer, pp 298–315
34.
Zurück zum Zitat Whaiduzzaman M, Sookhak M, Gani A, Buyya R (2014) A survey on vehicular cloud computing. J Network Comp Appl 40:325–344CrossRef Whaiduzzaman M, Sookhak M, Gani A, Buyya R (2014) A survey on vehicular cloud computing. J Network Comp Appl 40:325–344CrossRef
35.
Zurück zum Zitat Yu R, Zhang Y, Gjessing S, Xia W, Yang K (2013) Toward cloud-based vehicular networks with efficient resource management. Network IEEE 27(5):48–55CrossRef Yu R, Zhang Y, Gjessing S, Xia W, Yang K (2013) Toward cloud-based vehicular networks with efficient resource management. Network IEEE 27(5):48–55CrossRef
36.
Zurück zum Zitat Zhang C, Lin X, Lu R, Ho PH (2008) Raise: An efficient rsu-aided message authentication scheme in vehicular communication networks. In: Communications, 2008. ICC’08. IEEE International Conference on, pp 1451–1457. IEEE Zhang C, Lin X, Lu R, Ho PH (2008) Raise: An efficient rsu-aided message authentication scheme in vehicular communication networks. In: Communications, 2008. ICC’08. IEEE International Conference on, pp 1451–1457. IEEE
37.
Zurück zum Zitat Zhang T, Delgrossi L (2012) Vehicle safety communications: protocols, security, and privacy, vol 103. Wiley, USA Zhang T, Delgrossi L (2012) Vehicle safety communications: protocols, security, and privacy, vol 103. Wiley, USA
38.
Zurück zum Zitat Zhu J, Roy S (2003) Mac for dedicated short range communications in intelligent transport system. Commun Magazine IEEE 41(12):60–67CrossRef Zhu J, Roy S (2003) Mac for dedicated short range communications in intelligent transport system. Commun Magazine IEEE 41(12):60–67CrossRef
Metadaten
Titel
Secure vehicle traffic data dissemination and analysis protocol in vehicular cloud computing
verfasst von
Lewis Nkenyereye
Youngho Park
Kyung-Hyune Rhee
Publikationsdatum
10.06.2016
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 3/2018
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-016-1773-0

Weitere Artikel der Ausgabe 3/2018

The Journal of Supercomputing 3/2018 Zur Ausgabe