An efficient and secure navigation protocol based on vehicular cloud

被引:17
作者
Sur, Chul [1 ]
Park, Youngho [2 ]
Rhee, Kyung Hyune [2 ]
机构
[1] Busan Univ Foreign Studies, Div Digital Media Engn, Busan, South Korea
[2] Pukyong Natl Univ, Dept IT Convergence & Applicat Engn, Busan, South Korea
基金
新加坡国家研究基金会;
关键词
94A60; 94A62; data leakage; privacy preservation; vehicular cloud; secure navigation; insider threats; anonymous credentials; IDENTIFICATION; NETWORKS; VANET;
D O I
10.1080/00207160.2014.934685
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Vehicular cloud is the new paradigm of vehicular ad hoc networks (VANETs), which not only takes the recent advance of vehicular technology, but also keeps up with the trend of cloud computing for big data processing and complicated intelligent analysis over VANET environments. In this paper, we present a model for secure navigation systems based on vehicular cloud, which fully utilizes the advantages of cloud computing. In particular, we make up for the limitations of prior VANET-based secure navigation protocols and provide a stronger notion of security for secure navigation services in terms of insider threats and data leakage points of view. We propose a new secure and privacy-preserving navigation protocol based on vehicular cloud, which resolves the limitations of previous approaches. Moreover, the proposed protocol is highly efficient because it does not rely on bilinear pairing operations unlike prior secure navigation protocols in the literature. We demonstrate comprehensive analysis to confirm the fulfilment of the security objectives and the efficiency of the proposed protocol.
引用
收藏
页码:325 / 344
页数:20
相关论文
共 24 条
[1]  
[Anonymous], 2013, J WIRELESS MOBILE NE
[2]  
[Anonymous], 2001, LNCS
[3]  
Baldimtsi F., 2013, ACM CCS 2013, P1087, DOI DOI 10.1145/2508859.2516687
[4]   On the Performance of Secure Vehicular Communication Systems [J].
Calandriello, Giorgio ;
Papadimitratos, Panos ;
Hubaux, Jean-Pierre ;
Lioy, Antonio .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2011, 8 (06) :898-912
[5]  
Camenisch J, 2001, LECT NOTES COMPUT SC, V2045, P93
[6]  
Camenisch J, 1997, LECT NOTES COMPUT SC, V1294, P410
[7]  
CHAUM D, 1985, COMMUN ACM, V28, P1030, DOI 10.1145/4372.4373
[8]  
Chaum D., 1992, ADV CRYPTOLOGY CRYPT, V740, P89
[9]   VSPN: VANET-Based Secure and Privacy-Preserving Navigation [J].
Chim, T. W. ;
Yiu, S. M. ;
Hui, Lucas C. K. ;
Li, Victor O. K. .
IEEE TRANSACTIONS ON COMPUTERS, 2014, 63 (02) :510-524
[10]   HOW TO PROVE YOURSELF - PRACTICAL SOLUTIONS TO IDENTIFICATION AND SIGNATURE PROBLEMS [J].
FIAT, A ;
SHAMIR, A .
LECTURE NOTES IN COMPUTER SCIENCE, 1987, 263 :186-194