Edge Computing-Based VANETs’ Anonymous Message Authentication
نویسندگان
چکیده
Vehicular Ad-hoc Networks (VANETs) have high requirements for real-time data processing and security of message authentication. In order to solve the computing power asymmetry between vehicles road side units (RSUs) in VANETs under high-density traffic, accelerate speed authentication, problems computational overhead long authentication time caused by use bilinear pairing encryption technology similar message-batch-authentication schemes, we propose introducing concept edge (EC) into using idle nodes’ resources assist RSU quickly authenticating messages achieve load balancing multiple traffic flows. We idea RSUs messages. This scheme performs two identity-based authentications based on identity signature constructed elliptic curve cryptography (ECC). One them is batch vehicle sending RSU-authenticated with free resources, as temporary nodes (TENs), other TEN fixed-edge-node RSUs. The are used reduce burden time, thereby improving efficiency system performed a analysis prove its properties compared it schemes terms performance. experimental results show that our has transmission 2400 bytes when there four TENs, number verification requests reaches 20, which outperforms methods. gap will be more evident numbers increase.
منابع مشابه
Anonymous Group Message Authentication Protocol for LTE-based V2X Communications
Correspondence Dongxiao Liu, Department of Electrical and Computer Engineering, University of Waterloo, Waterloo Canada N2L 3G1 Email: [email protected] Cellular technologies, in particular the current long-term evolution (LTE) and future 5G, are suitable for implementing vehicle-to-everything (V2X) services, due to the existing network infrastructure, device-to-device (D2D) communicati...
متن کاملServer-aided anonymous attribute-based authentication in cloud computing
The notion of attribute-based signature is one of the important security primitives to realize anonymous authentication. In an attribute based signature (ABS), users can generate a signature on a message with their attributes.With this signature, any verifier will be convinced that such a signature is generated from a signer with these attributes. However, the identity of the signers will be hi...
متن کاملInfrastructure based Authentication in VANETs
In a vehicular ad-hoc networks (VANETs), the veracity of a message requires authentication of the source vehicle. In this work, a technique for mutual authentication of a vehicle and road side unit (RSU) that preserves the privacy of the vehicle is proposed. The technique relies on the traffic authorities and assumes a hierarchical structure comprising a central trusted authority (TA) with stat...
متن کاملSource Anonymous Message Authentication Based On ECC in Wireless Sensor Networks
Source Anonymous Message authentication (SAMA) is one of the most effective ways to prevent unauthorized and corrupted messages from being forwarded in wireless sensor networks (WSNs).A scalable authentication scheme based on elliptic curve cryptography (ECC) is introduced to allow any node to transmit an unlimited number of messages without suffering the threshold problem and provides message ...
متن کاملAn Anonymous Communication Scheme based on Ring Signature in VANETs
Vehicular ad hoc networks allow vehicles to connect themselves as networks so that cars could communicate with each other. This paper introduces an anonymous communication scheme providing integrity protection, multi-level privacy and auditability. The scheme is based on a certificateless ring signature proposed in this paper, which is contributed to reduce the length of the signature and simpl...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Symmetry
سال: 2022
ISSN: ['0865-4824', '2226-1877']
DOI: https://doi.org/10.3390/sym14122662