4.7 Article

Reliable and Efficient Content Sharing for 5G-Enabled Vehicular Networks

期刊

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TITS.2020.3023797

关键词

Authentication; Reliability; 5G mobile communication; Delay effects; Intelligent transportation systems; Privacy; Message authentication; content sharing; elliptic curve; vehicular networks; privacy preservation

资金

  1. National Natural Science Foundation of China [61872001, 62011530046, 61702005, U1936220]
  2. Open Fund of Key Laboratory of Embedded System and Service Computing, Tongji University, Ministry of Education [ESSCKF2018-03]
  3. Open Fund for Discipline Construction, Institute of Physical Science and Information Technology, Anhui University
  4. Excellent Talent Project of Anhui University

向作者/读者索取更多资源

This study proposes a reliable and efficient content sharing scheme in 5G-enabled vehicular networks, which utilizes adjacent vehicles as proxy vehicles to fulfill content downloading requests and meets security requirements.
Conditional privacy preservation and message authentication serve as the primary research issues in terms of security in vehicular networks. With the arrival of 5G era, the downloading speed of network services and the message transmission speed have significantly improved. Consequently, the content exchanged by users in vehicular networks is not limited to traffic information, and vehicles moving at high speeds can share a wide variety of contents. However, sharing content reliably and efficiently remains challenging owing to the fast-moving character of vehicles. To solve this problem, we propose a reliable and efficient content sharing scheme in 5G-enabled vehicular networks. The vehicles with content downloading requests quickly filter the adjacent vehicles to choose capable and suitable proxy vehicles and request them for content services. Thus, the purpose of obtaining a good hit ratio, saving network traffic, reducing time delay, and easing congestion during peak hours can be achieved. The security analysis indicates that the proposed scheme meets the security requirements of vehicular networks. Our cryptographic operations are based on the elliptic curve, and finally, the proposed scheme also displays favorable performance compared to other related schemes.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据