Anonymous and Traceable Authentication for Securing Data Sharing in Parking Edge Computing

PEER-TO-PEER NETWORKING AND APPLICATIONS(2021)

引用 1|浏览12
暂无评分
摘要
In parking edge computing, the service providers can engage the parking vehicles to provide computing services. The requesting vehicles can enjoy the advantages of the parking computing services with no need to build expensive equipment locally, whereas the parking vehicles can sell the computing resources to gain benefits. However, in an open parking computing system, the identity of each entity is easy to be counterfeited by other malicious entities, which may cause the leakage of privacy data of honest entities and the waste of parking computing resources. To address this issue, we propose an efficient authentication protocol between vehicle and roadside unit near the parking lot, which also allows two verified entities to generate a common key to enjoy the parking computing service confidentially. The protocol is extended to allow anonymous authentication so that the true identity would not be leaked to RSU during the authentication process, and malicious vehicle tracing if some forged or illegal authentication message is submitted to cheat the service provider or roadside unit. The security and efficiency analysis demonstrate that the proposed authentication protocols are secure and practical in applications.
更多
查看译文
关键词
Parking edge computing,Vehicle authentication,Anonymous authentication,Vehicle traceability
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要