• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Han Mu, Yang Chen, Hua Lei, Liu Shuai, Ma Shidian. Vehicle Pseudonym Management Scheme in Internet of Vehicles for Mobile Edge Computing[J]. Journal of Computer Research and Development, 2022, 59(4): 781-795. DOI: 10.7544/issn1000-1239.20200620
Citation: Han Mu, Yang Chen, Hua Lei, Liu Shuai, Ma Shidian. Vehicle Pseudonym Management Scheme in Internet of Vehicles for Mobile Edge Computing[J]. Journal of Computer Research and Development, 2022, 59(4): 781-795. DOI: 10.7544/issn1000-1239.20200620

Vehicle Pseudonym Management Scheme in Internet of Vehicles for Mobile Edge Computing

Funds: This work was supported by the National Natural Science Foundation of China(61902156), the Innovation Plan for Postgraduate Research of Jiangsu Province (KYLX_1057), and the Natural Science Foundation of Jiangsu Province (BK20180860).
More Information
  • Published Date: March 31, 2022
  • Mobile edge computing (MEC) deploys computing and storage resources to the edge of the network, which brings real-time and high-reliability services to the Internet of vehicles (IoV). However, MEC faces various security threats. Attackers may control edge data centers and leak the pseudonym information of the vehicle, thereby threatening the vehicle’s identity privacy. For this problem, a vehicle pseudonym management scheme in MEC-IoV is proposed, which can realize efficient update of pseudonym information, secure storage of pseudonym information in the edge cloud, and traceability of pseudonyms. This scheme uses the edge cloud with high real-time performance to replace the central cloud to authenticate the vehicle identity, which improves the efficiency of identity authentication and realizes efficient pseudonym update. The pseudonym information is encrypted by the homomorphic encryption algorithm, which guarantees the security of the pseudonym information and doesn’t affect pseudonym management in the edge cloud. Each pseudonym table of the vehicle is associated with a search term calculated based on the pseudonym in the table, and the highest authority of the system can calculate the search term based on the ciphertext of the pseudonym table to expose the real identity of the malicious vehicle, which realize traceability of pseudonyms. After that, through the provable security theory, it is proved that the scheme is indistinguishable under the chosen plaintext attack, and the security analysis of the anonymity of the vehicle identity, the integrity and non-repudiation of the message in the scheme is carried out, which achieve the security requirements of preserving vehicle’s identity privacy in IoV. In the end, the efficiency analysis and simulation of the scheme in terms of identity authentication, pseudonym request, and homomorphic encryption performance are carried out. Experimental results show this scheme can achieve the requirements of low-latency communication in IoV and is superior to existing schemes in authentication efficiency.
  • Related Articles

    [1]Li Qian, Hu Yupeng, Ye Zhenyu, Xiao Ye, Qin Zheng. An Ant Colony Optimization Algorithms Based Data Update Scheme for Erasure-Coded Storage Systems[J]. Journal of Computer Research and Development, 2021, 58(2): 305-318. DOI: 10.7544/issn1000-1239.2021.20200383
    [2]Zhang Yao, Chu Jiajia, Weng Chuliang. Survey on Data Updating in Erasure-Coded Storage Systems[J]. Journal of Computer Research and Development, 2020, 57(11): 2419-2431. DOI: 10.7544/issn1000-1239.2020.20190675
    [3]Tan Chao, Ji Genlin, Zhao Bin. Self-Adaptive Streaming Big Data Learning Algorithm Based on Incremental Tangent Space Alignment[J]. Journal of Computer Research and Development, 2017, 54(11): 2547-2557. DOI: 10.7544/issn1000-1239.2017.20160712
    [4]Wu Libing, Dang Ping, Nie Lei, He Yanxiang, Li Fei. A Fragmentable Admission Control Algorithm for Resource Reservation[J]. Journal of Computer Research and Development, 2014, 51(6): 1199-1205.
    [5]Xing Jing, Xiong Jin, Sun Ninghui, and Ma Jie. Scalable Storage Space Management to Support EB-Scale Storage[J]. Journal of Computer Research and Development, 2013, 50(8): 1573-1582.
    [6]Liu Shenglan, Feng Lin, Jin Bo, Wu Zhenyu. A New Local Space Alignment Algorithm[J]. Journal of Computer Research and Development, 2013, 50(7): 1426-1434.
    [7]Xiao Peng, Hu Zhigang. An Adaptive Dynamic Redundant Reservation Strategy in Grid Computing[J]. Journal of Computer Research and Development, 2013, 50(3): 481-489.
    [8]Liu Xiaozhu, Peng Zhiyong. On-Line Dynamic Index Hybrid Update Scheme Based on Self-Learning of Allocated Space[J]. Journal of Computer Research and Development, 2012, 49(10): 2118-2130.
    [9]Hu Chunming, Huai Jinpeng, and Wo Tianyu. Flexible Resource Capacity Reservation Mechanism for Service Grid Using Slack Time[J]. Journal of Computer Research and Development, 2007, 44(1): 20-28.
    [10]Yang Renzhong, Hou Zifeng, Li Jingxia. A Resource Reservation Scheme for PCF Handoff Station in WLAN[J]. Journal of Computer Research and Development, 2005, 42(11): 1962-1968.

Catalog

    Article views (383) PDF downloads (319) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return