An Efficient Message-Authentication Scheme Based on Edge Computing for Vehicular Ad Hoc Networks

2019 ◽  
Vol 20 (5) ◽  
pp. 1621-1632 ◽  
Author(s):  
Jie Cui ◽  
Lu Wei ◽  
Jing Zhang ◽  
Yan Xu ◽  
Hong Zhong
2018 ◽  
Vol 14 (2) ◽  
pp. 155014771875658 ◽  
Author(s):  
Tianhan Gao ◽  
Yanqiang Li ◽  
Nan Guo ◽  
Ilsun You

With the rapid booming of intelligent traffic system, vehicular ad hoc networks have attracted wide attention from both academic and industry. However, security is the main obstacle for the wide deployment of vehicular ad hoc networks. Vehicular ad hoc networks security has two critical issues: access authentication and privacy preservation. How to ensure privacy preservation and improve the efficiency of authentication has become the urgent needs. However, the existing access authentication schemes for vehicular ad hoc networks with different flaws cannot maintain the balance between security and efficiency. Thus, an anonymous access authentication scheme for vehicular ad hoc networks under edge computing based on ID-based short group signature mechanism is proposed in this article to improve the efficiency and anonymity of access authentication. Multiple pseudonyms are presented to preserve the privacy of vehicle node. Besides, a new method is designed to identify and revoke malicious vehicles in the evaluation manner. The core protocols of the proposed scheme are proved to be secure by SVO logic. According to the computation cost and transmission overhead analysis, we indicate that our scheme owns better performance. Moreover, in this article, we combine vehicular ad hoc networks with edge computing together to provide a new clue for the development of mobile edge computing.


Vehicular ad hoc networks (VANETs) are under active development phase, especially due to the latest and foremost wireless communication and networking technologies. Basically VANETs consist of some parts which play the major role to enable message authentication between vehicles which are on-board units as well as roadside units. To reduce the load on trusted authorities several roadside units are set up and message authentication using proxy vehicles has been proposed. This used to minimize the computational overhead of roadside units significantly. Due to this message authentication scheme the efficiency of roadside unit improves. In this paper we propose an Efficient Hybrid Message Authentication Scheme (EHMAS) that deals with the technique where it not only guarantees message authenticity, but it is also resistant against impersonation and modification attacks. First we explain the properties of the attacks in security model. Second we provide an EHMAS scheme where a novel authentication technique is proposed for registration and verification of users using elliptic crypto system. Finally the paper concluded with the scope of the proposed work and provides future enhancement using machine learning techniques.


2021 ◽  
pp. 1-12
Author(s):  
Ermioni Qafzezi ◽  
Kevin Bylykbashi ◽  
Phudit Ampririt ◽  
Makoto Ikeda ◽  
Keita Matsuo ◽  
...  

Vehicular Ad hoc Networks (VANETs) aim to improve the efficiency and safety of transportation systems by enabling communication between vehicles and roadside units, without relying on a central infrastructure. However, since there is a tremendous amount of data and significant number of resources to be dealt with, data and resource management become their major issues. Cloud, Fog and Edge computing, together with Software Defined Networking (SDN) are anticipated to provide flexibility, scalability and intelligence in VANETs while leveraging distributed processing environment. In this paper, we consider this architecture and implement and compare two Fuzzy-based Systems for Assessment of Neighboring Vehicles Processing Capability (FS-ANVPC1 and FS-ANVPC2) to determine the processing capability of neighboring vehicles in Software Defined Vehicular Ad hoc Networks (SDN-VANETs). The computational, networking and storage resources of vehicles comprise the Edge Computing resources in a layered Cloud-Fog-Edge architecture. A vehicle which needs additional resources to complete certain tasks and process various data can use the resources of the neighboring vehicles if the requirements to realize such operations are fulfilled. The proposed systems are used to assess the processing capability of each neighboring vehicle and based on the final value, it can be determined whether the edge layer can be used by the vehicles in need. FS-ANVPC1 takes into consideration the available resources of the neighboring vehicles and the predicted contact duration between them and the present vehicle, while FS-ANVPC2 includes in addition the vehicles trustworthiness value. Our systems take also into account the neighboring vehicles’ willingness to share their resources and determine the processing capability for each neighbor. We evaluate the proposed systems by computer simulations. The evaluation results show that FS-ANVPC1 decides that helpful neighboring vehicles are the ones that are predicted to be within the vehicle communication range for a while and have medium/large amount of available resources. FS-ANVPC2 considers the same neighboring vehicles as helpful neighbors only if they have at least a moderate trustworthiness value ( VT = 0.5). When VT is higher, FS-ANVPC2 takes into consideration also neighbors with less available resources.


2016 ◽  
Vol 64 ◽  
pp. 50-60 ◽  
Author(s):  
J. Sánchez-García ◽  
J.M. García-Campos ◽  
D.G. Reina ◽  
S.L. Toral ◽  
F. Barrero

Sign in / Sign up

Export Citation Format

Share Document