4.7 Article

Edge Computing-Based Privacy-Preserving Authentication Framework and Protocol for 5G-Enabled Vehicular Networks

Journal

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
Volume 69, Issue 7, Pages 7940-7954

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TVT.2020.2994144

Keywords

5G mobile communication; Protocols; Authentication; Edge computing; Computational modeling; Privacy; 5G-enabled Vehicular Networks; Edge Computing; Fuzzy Logic; Authentication; Security; Privacy

Funding

  1. National Natural Science Foundation of China [61872001, 6191101332, 61702005, U1936220]
  2. Open Fund of Key Laboratory of Embedded System and Service Computing (Tongji University), M Ministry of Education [ESSCKF2018-03]
  3. Open Fund for Discipline Construction, Institute of Physical Science and Information Technology, Anhui University
  4. Excellent Talent Project of Anhui University

Ask authors/readers for more resources

Based on the functional characteristics of inter-vehicle communication networks under the current framework, a privacy-preserving authentication framework that combines fifth-generation communication technology (5G) and edge computing technology is proposed. The proposed framework is different from that used in the previous 802.11p-based inter-vehicle communication network architecture, and we use device-to-device technology to achieve communication between vehicles. One difference between a 5G-enabled model and a traditional model for vehicle ad hoc networks is that secure communication between vehicles in a 5G-enabled model is challenging. The authentication protocol proposed in this study can be divided into two parts. The first part involves authenticating and selecting an edge computing vehicle, wherein a fuzzy logic mathematical method is used in the selection process. The second part is the mutual authentication between edge computing and ordinary vehicles. In this process, the exchange of security information between vehicles in a group is possible. Simultaneously, the identity privacy and traceability of the vehicle are ensured. Moreover, the proposed signature scheme is proved to be secure under a random oracle model. Performance evaluation results demonstrate that our proposed scheme has relatively lower computational and communication overhead than existing schemes.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available