ISSN 1000-1239 CN 11-1777/TP

Journal of Computer Research and Development ›› 2022, Vol. 59 ›› Issue (4): 781-795.doi: 10.7544/issn1000-1239.20200620

Previous Articles     Next Articles

Vehicle Pseudonym Management Scheme in Internet of Vehicles for Mobile Edge Computing

Han Mu1, Yang Chen1, Hua Lei2, Liu Shuai3, Ma Shidian4   

  1. 1(School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang, Jiangsu 212013);2(School of Automotive and Traffic Engineering, Jiangsu University, Zhenjiang, Jiangsu 212013);3(Qingdao Guochuang Intelligent Home Appliance Research Institute Co.Ltd, Qingdao, Shandong 266061);4(Automotive Engineering Research Institute, Jiangsu University, Zhenjiang, Jiangsu 212013)
  • Online:2022-04-01
  • Supported by: 
    This work was supported by the National Natural Science Foundation of China(61902156), the Innovation Plan for Postgraduate Research of Jiangsu Province (KYLX_1057), and the Natural Science Foundation of Jiangsu Province (BK20180860).

Abstract: Mobile edge computing (MEC) deploys computing and storage resources to the edge of the network, which brings real-time and high-reliability services to the Internet of vehicles (IoV). However, MEC faces various security threats. Attackers may control edge data centers and leak the pseudonym information of the vehicle, thereby threatening the vehicle’s identity privacy. For this problem, a vehicle pseudonym management scheme in MEC-IoV is proposed, which can realize efficient update of pseudonym information, secure storage of pseudonym information in the edge cloud, and traceability of pseudonyms. This scheme uses the edge cloud with high real-time performance to replace the central cloud to authenticate the vehicle identity, which improves the efficiency of identity authentication and realizes efficient pseudonym update. The pseudonym information is encrypted by the homomorphic encryption algorithm, which guarantees the security of the pseudonym information and doesn’t affect pseudonym management in the edge cloud. Each pseudonym table of the vehicle is associated with a search term calculated based on the pseudonym in the table, and the highest authority of the system can calculate the search term based on the ciphertext of the pseudonym table to expose the real identity of the malicious vehicle, which realize traceability of pseudonyms. After that, through the provable security theory, it is proved that the scheme is indistinguishable under the chosen plaintext attack, and the security analysis of the anonymity of the vehicle identity, the integrity and non-repudiation of the message in the scheme is carried out, which achieve the security requirements of preserving vehicle’s identity privacy in IoV. In the end, the efficiency analysis and simulation of the scheme in terms of identity authentication, pseudonym request, and homomorphic encryption performance are carried out. Experimental results show this scheme can achieve the requirements of low-latency communication in IoV and is superior to existing schemes in authentication efficiency.

Key words: Internet of vehicles, mobile edge computing (MEC), privacy preserving, pseudonym management, homomorphic encryption

CLC Number: