Abstract
VANET is a prominent way to provide road security and prevent vehicles from collision by using various methods, such as message dissemination, traffic management, etc. However, the traditional vehicular network faces some problems related to high latency, low bandwidth, and communication in open wireless environment. Thus, some researchers have attempted to combine fog computing with vehicular ad hoc networks to overcome these problems. In this paper, we design an efficient and conditional privacy preserving collision warning system for fog-based vehicular ad hoc networks without using bilinear pairing. The fog nodes collect the speed violation reports from the speed sensor of vehicles. This protocol achieves privacy protection, message authentication, and revocate malicious vehicles. We also provide strict security proof and illustrate how to reach the security requirements in the proposed protocol. Moreover, the experiment demonstrates that the proposed protocol provides better efficiency in computation overhead and communication overhead, and makes it more applicable for adoption in the VANET collision warning systems.
Similar content being viewed by others
References
Ale, L., Zhang, N., Wu, H., Chen, D., Han, T.: Online proactive caching in mobile edge computing using bidirectional deep recurrent neural network. IEEE Internet Things J. 6(3), 5520–5530 (2019)
Bonomi, F., Milito, R., Zhu, J., Addepalli, S.: Fog computing and its role in the internet of things. In: Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, pp. 13–16 (2012)
Cao, X., Liu, L., Cheng, Y., Cai, L.X., Sun, C.: On optimal device-to-device resource allocation for minimizing end-to-end delay in VANETs. IEEE Trans. Veh. Technol. 65(10), 7905–7916 (2016)
Chen, D., Zhang, N., Qin, Z., Mao, X., Qin, Z., Shen, X., Li, X.Y.: S2M: a lightweight acoustic fingerprints-based wireless device authentication protocol. IEEE Internet Things J. 4(1), 88–100 (2016)
Chen, D., Zhang, N., Cheng, N., Zhang, K., Qin, Z., Shen, X.S.: Physical layer based message authentication with secure channel codes. IEEE Trans. Dependable Secure Comput. 17(5), 1079–1093 (2018a)
Chen, D., Zhang, N., Lu, R., et al.: An LDPC Code based Physical layer Message Authentication Scheme with Prefect Security. IEEE J. Sel. Areas Commun. 36(4), 748–761 (2018b)
Cui, J., Zhang, X., Zhong, H., Ying, Z., Liu, L.: RSMA: reputation system-based lightweight message authentication framework and protocol for 5G-enabled vehicular networks. IEEE Internet Things J. 6(4), 6417–6428 (2019)
Han, M., Liu, S., Ma, S., Wan, A.: Anonymous-authentication scheme based on fog computing for VANET. PLoS One 15(2), e0228319 (2020)
He, D., Zeadally, S., Xu, B., Huang, X.: An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Trans. Inf. Forensics Secur. 10(12), 2681–2691 (2015)
Jang, J.A., Choi, K., Cho, H.: A Fixed Sensor-based intersection collision warning system in vulnerable line-of-sight and/or traffic-violation-prone environment. IEEE Trans. Intell. Transp. Syst. 13(4), 1880–1890 (2012)
Jiang, D., Taliwal, V., Meier, A., Holfelder, W., Herrtwich, R.: Design of 5.9 GHz DSRC-based vehicular safety communication. IEEE Wirel. Commun. 13(5), 36–43 (2006)
Kenney, J.B.: Dedicated short-range communications (DSRC) standards in the United States. Proc. IEEE 99(7), 1162–1182 (2011). https://doi.org/10.1109/JPROC.2011.2132790
Koblitz, N., Menezes, A., Vanstone, S.: The state of elliptic curve cryptography. Des. Codes Cryptogr. 19(2–3), 173–193 (2000)
Lee, J.K., Jeong, Y.S., Park, J.H.: s-ITSF: a service based intelligent transportation system framework for smart accident management. Human-centric Computing and Information Sciences 5(1), 34 (2015)
Li, J., Choo, K.K.R., Zhang, W., Kumari, S., Rodrigues, J.J., Khan, M.K., Hogrefe, D.: EPA-CPPA: an efficient, provably-secure and anonymous conditional privacy-preserving authentication scheme for vehicular ad hoc networks. Veh. Commun. 13, 104–113 (2018)
Liu, J., Ren, J., Dai, W., Zhang, D., Zhou, P., Zhang, Y., Najjari, N., et al.: Online multi-workflow scheduling under uncertain task execution time in IaaS clouds. IEEE Transactions on Cloud Computing, vol. 1, pp. 1–10 (2019)
Liu, J.K., Yuen, T.H., Au, M.H., Susilo, W.: Improvements on an authentication scheme for vehicular sensor networks. Expert Syst. Appl. 41(5), 2559–2564 (2014)
Lyu, F., Ren, J., Yang, P., Cheng, N., Tang, W., Zhang, Y., Shen, X.S.: Fine-grained TDMA MAC design toward ultra-reliable broadcast for autonomous driving. IEEE Wirel. Commun. 26(4), 46–53 (2019)
Lyu, F., Ren, J., Cheng, N., Yang, P., Li, M., Zhang, Y., Shen, X.: LEAD: large-scale edge cache deployment based on spatio-temporal WiFi traffic statistics. IEEE Trans. Mob. Comput. (2020) https://doi.org/10.1109/TMC.2020.2984261
Ma, M., He, D., Wang, H., Kumar, N., Choo, K.K.R.: An efficient and provably secure authenticated key agreement protocol for fog-based vehicular ad-hoc networks. IEEE Internet Things J. 6(5), 8065–8075 (2019)
Martens, M. H., Van Den Beukel, A. P.: The road to automated driving: Dual mode and human factors considerations. In:16th International IEEE Conference on Intelligent Transportation Systems (ITSC 2013). pp. 2262–2267 (2013)
Nkenyereye, L., Liu, C.H., Song, J.: Towards secure and privacy preserving collision avoidance system in 5G fog based Internet of Vehicles. Future Gener. Comput. Syst. 95, 488–499 (2019)
Pointcheval, D., Stern, J.: Security arguments for digital signatures and blind signatures. J. Cryptol. 13(3), 361–396 (2000)
Pournaghi, S.M., Zahednejad, B., Bayat, M., Farjami, Y.: NECPPA: a novel and efficient conditional privacy-preserving authentication scheme for VANET. Comput. Netw. 134, 78–92 (2018)
Prema, G., Kalpana, C.: Performance evaluation of emergency messaging via wireless collision avoidance systems for improved traffic safety in VANET. Int. J. Comput. Appl. 88(10), 35–41 (2014)
Ravi, S., Raghunathan, A., Chakradhar, S.: Tamper resistance mechanisms for secure embedded systems. In: 17th International Conference on VLSI Design. Proceedings, pp. 605–611 (2004)
Raya, M., Hubaux, J.P.: Securing vehicular ad hoc networks. J. Comput. Secur. 15(1), 39–68 (2007)
Ren, J., Guo, H., Xu, C., Zhang, Y.: Serving at the edge: a scalable IoT architecture based on transparent computing. IEEE Netw. 31(5), 96–105 (2017)
Ren, J., Zhang, D., He, S., Zhang, Y., Li, T.: A survey on end-edge-cloud orchestrated network computing paradigms: transparent computing, mobile edge computing, fog computing, and cloudlet. ACM Comput. Surv. (CSUR) 52(6), 1–36 (2019)
Sarencheh, A., Asaar, M. R., Salmasizadeh, M., Aref, M. R.: Rapp: an efficient revocation scheme with authentication and privacy preserving for vehicular ad-hoc networks. In: 2017 7th International Conference on Computer and Knowledge Engineering (ICCKE), pp. 359–366 (2017)
Shim, K.A.: \({\cal{C}}{\cal{P}}{\cal{A}}{\cal{S}}\): an efficient conditional privacy-preserving authentication scheme for vehicular sensor networks. IEEE Trans. Veh. Technol. 61(4), 1874–1883 (2012)
Stojmenovic, I., Wen, S., Huang, X., Luan, H.: An overview of Fog computing and its security issues. Concurr. Comput. Pract. Exp. 28(10), 2991–3005 (2016)
Tang, W., Ren, J., Zhang, K., Zhang, D., Zhang, Y., Shen, X.: Efficient and privacy-preserving fog-assisted health data sharing scheme. ACM Trans. Intell. Syst. Technol. (TIST) 10(6), 1–23 (2019)
Tang, W., Ren, J., Zhang, Y.: Enabling trusted and privacy-preserving healthcare services in social media health networks. IEEE Trans. Multimed. 21(3), 579–590 (2019)
Toroyan, T., Peden, M. M., Iaych, K.: WHO launches second global status report on road safety. Inj Prev. 19(2), 150 (2013). https://doi.org/10.1136/injuryprev-2013-040775
Wang, F., Xu, Y., Zhang, H., Zhang, Y., Zhu, L.: 2FLIP: a two-factor lightweight privacy-preserving authentication scheme for VANET. IEEE Trans. Veh. Technol. 65(2), 896–911 (2015)
Zhang, C., Lu, R., Lin, X., Ho, P. H., Shen, X.: An efficient identity-based batch verification scheme for vehicular sensor networks. In: IEEE INFOCOM 2008-The 27th Conference on Computer Communications, pp. 246–250 (2008)
Zhang, N., Yang, P., Ren, J., Chen, D., Yu, L., Shen, X.: Synergy of big data and 5g wireless networks: opportunities, approaches, and challenges. IEEE Wirel. Commun. 25(1), 12–18 (2018)
Acknowledgements
Funding was provided by National Science Foundation of China (Grant nos. 61872059, 61502085).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Qin, Z., Li, Y., Ye, X. et al. ECAS: an efficient and conditional privacy preserving collision warning system in fog-based vehicular ad hoc networks. CCF Trans. Netw. 3, 205–217 (2020). https://doi.org/10.1007/s42045-020-00041-y
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s42045-020-00041-y