首页    期刊浏览 2024年07月08日 星期一
登录注册

文章基本信息

  • 标题:Secure VANETs: Trusted Communication Scheme Between Vehicles and Infrastructure Based on Fog Computing
  • 本地全文:下载
  • 作者:Muhammad ARIF ; Guojun WANG ; Valentina Emilia BALAS
  • 期刊名称:Studies in Informatics and Control Journal
  • 印刷版ISSN:1220-1766
  • 出版年度:2018
  • 卷号:27
  • 期号:2
  • 页码:235-246
  • DOI:10.24846/v27i2y201811
  • 出版社:National Institute for R&D in Informatics
  • 摘要:In the Vehicular Ad-hoc Networks (VANETs), a vehicle or the vehicle driver could be recognized and tracked by eavesdropping its queries (e.g., beacons) by an adversary as these contains personal information like location, speed, and communication of the vehicles. This attack leads to threats to the vehicle`s location and leakage of personal information. The current solution, is to use the anonymizer as a third trusted party between the vehicles and the LBS. In this paper we refer to the use of a Fog server with Fog anonymizer to secure the communication among the vehicles and LBS. Our scheme consists of four phases. In first phase, the vehicle driver initiates the communication process and generate the encrypted messages. These messages may contain the sub-messages. In phase 2, the Fog server received the messages via different roots. The Fs combined the messages and decrypt the messages based on the PK received by the vehicle. All the Fog server perform the same task for encryption and decryption. If any of the Fog server was compromised, we still had the link for communication. In Phase 3, the Fog anonymizer receive the messages from the Fog node, anonymize them based on the anonymization process. Thereafter, the Fog anonymizer send these messages to LBS to achieve desired goals. The Fog anonymizer perform the same job for anonymization and de-anonymization, while sending and receiving the messages from the LBS. In the last phase, the LBS received the messages from the Fog anonymizer, understand the communication messages, compile the desired results, and sent them back to the Fog anonymizer. Our analysis shows that the proposed scheme preserved the location privacy based on the queries at low communication and computational cost.
  • 关键词:Privacy; Vehicles; Communication; Infrastructure; RSU; OBU; Encryption; Decryption; Message; Location
国家哲学社会科学文献中心版权所有