Skip to main content

Advertisement

Log in

ECAS: an efficient and conditional privacy preserving collision warning system in fog-based vehicular ad hoc networks

  • Regular Paper
  • Published:
CCF Transactions on Networking

Abstract

VANET is a prominent way to provide road security and prevent vehicles from collision by using various methods, such as message dissemination, traffic management, etc. However, the traditional vehicular network faces some problems related to high latency, low bandwidth, and communication in open wireless environment. Thus, some researchers have attempted to combine fog computing with vehicular ad hoc networks to overcome these problems. In this paper, we design an efficient and conditional privacy preserving collision warning system for fog-based vehicular ad hoc networks without using bilinear pairing. The fog nodes collect the speed violation reports from the speed sensor of vehicles. This protocol achieves privacy protection, message authentication, and revocate malicious vehicles. We also provide strict security proof and illustrate how to reach the security requirements in the proposed protocol. Moreover, the experiment demonstrates that the proposed protocol provides better efficiency in computation overhead and communication overhead, and makes it more applicable for adoption in the VANET collision warning systems.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  • Ale, L., Zhang, N., Wu, H., Chen, D., Han, T.: Online proactive caching in mobile edge computing using bidirectional deep recurrent neural network. IEEE Internet Things J. 6(3), 5520–5530 (2019)

    Article  Google Scholar 

  • Bonomi, F., Milito, R., Zhu, J., Addepalli, S.: Fog computing and its role in the internet of things. In: Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, pp. 13–16 (2012)

  • Cao, X., Liu, L., Cheng, Y., Cai, L.X., Sun, C.: On optimal device-to-device resource allocation for minimizing end-to-end delay in VANETs. IEEE Trans. Veh. Technol. 65(10), 7905–7916 (2016)

    Article  Google Scholar 

  • Chen, D., Zhang, N., Qin, Z., Mao, X., Qin, Z., Shen, X., Li, X.Y.: S2M: a lightweight acoustic fingerprints-based wireless device authentication protocol. IEEE Internet Things J. 4(1), 88–100 (2016)

    Article  Google Scholar 

  • Chen, D., Zhang, N., Cheng, N., Zhang, K., Qin, Z., Shen, X.S.: Physical layer based message authentication with secure channel codes. IEEE Trans. Dependable Secure Comput. 17(5), 1079–1093 (2018a)

    Article  Google Scholar 

  • Chen, D., Zhang, N., Lu, R., et al.: An LDPC Code based Physical layer Message Authentication Scheme with Prefect Security. IEEE J. Sel. Areas Commun. 36(4), 748–761 (2018b)

    Article  Google Scholar 

  • Cui, J., Zhang, X., Zhong, H., Ying, Z., Liu, L.: RSMA: reputation system-based lightweight message authentication framework and protocol for 5G-enabled vehicular networks. IEEE Internet Things J. 6(4), 6417–6428 (2019)

    Article  Google Scholar 

  • Han, M., Liu, S., Ma, S., Wan, A.: Anonymous-authentication scheme based on fog computing for VANET. PLoS One 15(2), e0228319 (2020)

    Article  Google Scholar 

  • He, D., Zeadally, S., Xu, B., Huang, X.: An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Trans. Inf. Forensics Secur. 10(12), 2681–2691 (2015)

    Article  Google Scholar 

  • Jang, J.A., Choi, K., Cho, H.: A Fixed Sensor-based intersection collision warning system in vulnerable line-of-sight and/or traffic-violation-prone environment. IEEE Trans. Intell. Transp. Syst. 13(4), 1880–1890 (2012)

    Article  Google Scholar 

  • Jiang, D., Taliwal, V., Meier, A., Holfelder, W., Herrtwich, R.: Design of 5.9 GHz DSRC-based vehicular safety communication. IEEE Wirel. Commun. 13(5), 36–43 (2006)

    Article  Google Scholar 

  • Kenney, J.B.: Dedicated short-range communications (DSRC) standards in the United States. Proc. IEEE 99(7), 1162–1182 (2011). https://doi.org/10.1109/JPROC.2011.2132790

    Article  Google Scholar 

  • Koblitz, N., Menezes, A., Vanstone, S.: The state of elliptic curve cryptography. Des. Codes Cryptogr. 19(2–3), 173–193 (2000)

    Article  MathSciNet  Google Scholar 

  • Lee, J.K., Jeong, Y.S., Park, J.H.: s-ITSF: a service based intelligent transportation system framework for smart accident management. Human-centric Computing and Information Sciences 5(1), 34 (2015)

    Article  Google Scholar 

  • Li, J., Choo, K.K.R., Zhang, W., Kumari, S., Rodrigues, J.J., Khan, M.K., Hogrefe, D.: EPA-CPPA: an efficient, provably-secure and anonymous conditional privacy-preserving authentication scheme for vehicular ad hoc networks. Veh. Commun. 13, 104–113 (2018)

    Google Scholar 

  • Liu, J., Ren, J., Dai, W., Zhang, D., Zhou, P., Zhang, Y., Najjari, N., et al.: Online multi-workflow scheduling under uncertain task execution time in IaaS clouds. IEEE Transactions on Cloud Computing, vol. 1, pp. 1–10 (2019)

  • Liu, J.K., Yuen, T.H., Au, M.H., Susilo, W.: Improvements on an authentication scheme for vehicular sensor networks. Expert Syst. Appl. 41(5), 2559–2564 (2014)

    Article  Google Scholar 

  • Lyu, F., Ren, J., Yang, P., Cheng, N., Tang, W., Zhang, Y., Shen, X.S.: Fine-grained TDMA MAC design toward ultra-reliable broadcast for autonomous driving. IEEE Wirel. Commun. 26(4), 46–53 (2019)

    Article  Google Scholar 

  • Lyu, F., Ren, J., Cheng, N., Yang, P., Li, M., Zhang, Y., Shen, X.: LEAD: large-scale edge cache deployment based on spatio-temporal WiFi traffic statistics. IEEE Trans. Mob. Comput. (2020) https://doi.org/10.1109/TMC.2020.2984261

  • Ma, M., He, D., Wang, H., Kumar, N., Choo, K.K.R.: An efficient and provably secure authenticated key agreement protocol for fog-based vehicular ad-hoc networks. IEEE Internet Things J. 6(5), 8065–8075 (2019)

    Article  Google Scholar 

  • Martens, M. H., Van Den Beukel, A. P.: The road to automated driving: Dual mode and human factors considerations. In:16th International IEEE Conference on Intelligent Transportation Systems (ITSC 2013). pp. 2262–2267 (2013)

  • Nkenyereye, L., Liu, C.H., Song, J.: Towards secure and privacy preserving collision avoidance system in 5G fog based Internet of Vehicles. Future Gener. Comput. Syst. 95, 488–499 (2019)

    Article  Google Scholar 

  • Pointcheval, D., Stern, J.: Security arguments for digital signatures and blind signatures. J. Cryptol. 13(3), 361–396 (2000)

    Article  Google Scholar 

  • Pournaghi, S.M., Zahednejad, B., Bayat, M., Farjami, Y.: NECPPA: a novel and efficient conditional privacy-preserving authentication scheme for VANET. Comput. Netw. 134, 78–92 (2018)

    Article  Google Scholar 

  • Prema, G., Kalpana, C.: Performance evaluation of emergency messaging via wireless collision avoidance systems for improved traffic safety in VANET. Int. J. Comput. Appl. 88(10), 35–41 (2014)

  • Ravi, S., Raghunathan, A., Chakradhar, S.: Tamper resistance mechanisms for secure embedded systems. In: 17th International Conference on VLSI Design. Proceedings, pp. 605–611 (2004)

  • Raya, M., Hubaux, J.P.: Securing vehicular ad hoc networks. J. Comput. Secur. 15(1), 39–68 (2007)

    Article  Google Scholar 

  • Ren, J., Guo, H., Xu, C., Zhang, Y.: Serving at the edge: a scalable IoT architecture based on transparent computing. IEEE Netw. 31(5), 96–105 (2017)

    Article  Google Scholar 

  • Ren, J., Zhang, D., He, S., Zhang, Y., Li, T.: A survey on end-edge-cloud orchestrated network computing paradigms: transparent computing, mobile edge computing, fog computing, and cloudlet. ACM Comput. Surv. (CSUR) 52(6), 1–36 (2019)

    Article  Google Scholar 

  • Sarencheh, A., Asaar, M. R., Salmasizadeh, M., Aref, M. R.: Rapp: an efficient revocation scheme with authentication and privacy preserving for vehicular ad-hoc networks. In: 2017 7th International Conference on Computer and Knowledge Engineering (ICCKE), pp. 359–366 (2017)

  • Shim, K.A.: \({\cal{C}}{\cal{P}}{\cal{A}}{\cal{S}}\): an efficient conditional privacy-preserving authentication scheme for vehicular sensor networks. IEEE Trans. Veh. Technol. 61(4), 1874–1883 (2012)

    Article  Google Scholar 

  • Stojmenovic, I., Wen, S., Huang, X., Luan, H.: An overview of Fog computing and its security issues. Concurr. Comput. Pract. Exp. 28(10), 2991–3005 (2016)

    Article  Google Scholar 

  • Tang, W., Ren, J., Zhang, K., Zhang, D., Zhang, Y., Shen, X.: Efficient and privacy-preserving fog-assisted health data sharing scheme. ACM Trans. Intell. Syst. Technol. (TIST) 10(6), 1–23 (2019)

    Article  Google Scholar 

  • Tang, W., Ren, J., Zhang, Y.: Enabling trusted and privacy-preserving healthcare services in social media health networks. IEEE Trans. Multimed. 21(3), 579–590 (2019)

    Article  Google Scholar 

  • Toroyan, T., Peden, M. M., Iaych, K.: WHO launches second global status report on road safety. Inj Prev. 19(2), 150 (2013). https://doi.org/10.1136/injuryprev-2013-040775

  • Wang, F., Xu, Y., Zhang, H., Zhang, Y., Zhu, L.: 2FLIP: a two-factor lightweight privacy-preserving authentication scheme for VANET. IEEE Trans. Veh. Technol. 65(2), 896–911 (2015)

    Article  Google Scholar 

  • Zhang, C., Lu, R., Lin, X., Ho, P. H., Shen, X.: An efficient identity-based batch verification scheme for vehicular sensor networks. In: IEEE INFOCOM 2008-The 27th Conference on Computer Communications, pp. 246–250 (2008)

  • Zhang, N., Yang, P., Ren, J., Chen, D., Yu, L., Shen, X.: Synergy of big data and 5g wireless networks: opportunities, approaches, and challenges. IEEE Wirel. Commun. 25(1), 12–18 (2018)

    Article  Google Scholar 

Download references

Acknowledgements

Funding was provided by National Science Foundation of China (Grant nos. 61872059, 61502085).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dajiang Chen.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Qin, Z., Li, Y., Ye, X. et al. ECAS: an efficient and conditional privacy preserving collision warning system in fog-based vehicular ad hoc networks. CCF Trans. Netw. 3, 205–217 (2020). https://doi.org/10.1007/s42045-020-00041-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s42045-020-00041-y

Keywords

Navigation