当前位置: X-MOL 学术IEEE Trans. Veh. Technol. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Edge Computing-based Privacy Preserving Authentication Framework and Protocol for 5G-enabled Vehicular Networks
IEEE Transactions on Vehicular Technology ( IF 6.1 ) Pub Date : 2020-07-01 , DOI: 10.1109/tvt.2020.2994144
Jing Zhang , Hong Zhong , Jie Cui , Miaomiao Tian , Yan Xu , Lu Liu

Based on the functional characteristics of inter-vehicle communication networks under the current framework, a privacy-preserving authentication framework that combines fifth-generation communication technology (5G) and edge computing technology is proposed. The proposed framework is different from that used in the previous 802.11p-based inter-vehicle communication network architecture, and we use device-to-device technology to achieve communication between vehicles. One difference between a 5G-enabled model and a traditional model for vehicle ad hoc networks is that secure communication between vehicles in a 5G-enabled model is challenging. The authentication protocol proposed in this study can be divided into two parts. The first part involves authenticating and selecting an edge computing vehicle, wherein a fuzzy logic mathematical method is used in the selection process. The second part is the mutual authentication between edge computing and ordinary vehicles. In this process, the exchange of security information between vehicles in a group is possible. Simultaneously, the identity privacy and traceability of the vehicle are ensured. Moreover, the proposed signature scheme is proved to be secure under a random oracle model. Performance evaluation results demonstrate that our proposed scheme has relatively lower computational and communication overhead than existing schemes.

中文翻译:

用于支持 5G 的车载网络的基于边缘计算的隐私保护认证框架和协议

基于当前框架下车际通信网络的功能特点,提出了一种结合第五代通信技术(5G)和边缘计算技术的隐私保护认证框架。所提出的框架不同于之前基于 802.11p 的车辆间通信网络架构中使用的框架,我们使用设备到设备技术来实现车辆之间的通信。支持 5G 的模型与用于车辆自组织网络的传统模型之间的一个区别在于,支持 5G 的模型中车辆之间的安全通信具有挑战性。本研究中提出的认证协议可以分为两部分。第一部分涉及验证和选择边缘计算车辆,其中在选择过程中使用模糊逻辑数学方法。第二部分是边缘计算与普通车辆的相互认证。在这个过程中,一组车辆之间的安全信息交换成为可能。同时,保证了车辆的身份隐私和可追溯性。此外,所提出的签名方案在随机预言机模型下被证明是安全的。性能评估结果表明,我们提出的方案比现有方案具有相对较低的计算和通信开销。确保车辆的身份隐私和可追溯性。此外,所提出的签名方案在随机预言机模型下被证明是安全的。性能评估结果表明,我们提出的方案比现有方案具有相对较低的计算和通信开销。确保车辆的身份隐私和可追溯性。此外,所提出的签名方案在随机预言机模型下被证明是安全的。性能评估结果表明,我们提出的方案比现有方案具有相对较低的计算和通信开销。
更新日期:2020-07-01
down
wechat
bug