skip to main content

Privacy-Preserved Pseudonym Scheme for Fog Computing Supported Internet of Vehicles

Kang, Jiawen ; Yu, Rong ; Huang, Xumin ; Zhang, Yan

IEEE transactions on intelligent transportation systems, 2018-08, Vol.19 (8), p.2627-2637 [Periódico revisado por pares]

New York: IEEE

Texto completo disponível

Citações Citado por
  • Título:
    Privacy-Preserved Pseudonym Scheme for Fog Computing Supported Internet of Vehicles
  • Autor: Kang, Jiawen ; Yu, Rong ; Huang, Xumin ; Zhang, Yan
  • Assuntos: Ambient intelligence ; Architecture ; Cloud computing ; Communication ; Computer architecture ; Computer security ; Computing costs ; Edge computing ; fog computing ; game theory ; Intelligent transportation systems ; Internet ; Internet of vehicles ; Local government ; location privacy ; Privacy ; Protocol (computers) ; pseudonym management ; Resource management ; Safety ; Vehicles
  • É parte de: IEEE transactions on intelligent transportation systems, 2018-08, Vol.19 (8), p.2627-2637
  • Descrição: As a promising branch of Internet of Things, Internet of Vehicles (IoV) is envisioned to serve as an essential data sensing and processing platform for intelligent transportation systems. In this paper, we aim to address location privacy issues in IoV. In traditional pseudonym systems, the pseudonym management is carried out by a centralized way resulting in big latency and high cost. Therefore, we present a new paradigm named Fog computing supported IoV (F-IoV) to exploit resources at the network edge for effective pseudonym management. By utilizing abundant edge resources, a privacy-preserved pseudonym (<inline-formula> <tex-math notation="LaTeX">P^{3} </tex-math></inline-formula>) scheme is proposed in F-IoV. The pseudonym management in this scheme is shifted to specialized fogs at the network edge named pseudonym fogs, which are composed of roadside infrastructures and deployed in close proximity of vehicles. <inline-formula> <tex-math notation="LaTeX">P^{3} </tex-math></inline-formula> scheme has following advantages: 1) context-aware pseudonym changing; 2) timely pseudonym distribution; and 3) reduced pseudonym management overhead. Moreover, a hierarchical architecture for <inline-formula> <tex-math notation="LaTeX">P^{3} </tex-math></inline-formula> scheme is introduced in F-IoV. Enabled by the architecture, a context-aware pseudonym changing game and secure pseudonym management communication protocols are proposed. The security analysis shows that <inline-formula> <tex-math notation="LaTeX">P^{3} </tex-math></inline-formula> scheme provides secure communication and privacy preservation for vehicles. Numerical results indicate that <inline-formula> <tex-math notation="LaTeX">P^{3} </tex-math></inline-formula> scheme effectively enhances location privacy and reduces communication overhead for the vehicles.
  • Editor: New York: IEEE
  • Idioma: Inglês;Norueguês

Buscando em bases de dados remotas. Favor aguardar.