{"title":"Toward Blockchain-Enabled IoV with Edge Computing: Efficient and Privacy-Preserving Vehicular Communication and Dynamic Updating","authors":"Qian Mei, H. Xiong, Yanan Zhao, Kuo-Hui Yeh","doi":"10.1109/DSC49826.2021.9346240","DOIUrl":null,"url":null,"abstract":"By virtue of intelligent data processing and vehicular network, Internet of Vehicle (IoV) provides the transport system with real-time traffic information, which greatly improves the traffic conditions of the city. Moreover, to ease the computing and storage burden of the increasing number of the vehicle, edge computing is introduced to offload computing tasks on the local with low latency. But it still suffers from data integrity and privacy concerns. To meet these challenges, this paper proposes an efficient and conditional privacy-preserving authentication protocol using blockchain-enabled IoV with edge computing. Specifically, edge computing and consortium blockchains are combined to support efficient computation and storage capabilities with low communication delay while providing data auditability. Also, a pseudonym mechanism and identity-based signature are utilized to achieve identity privacy-preserving conditionally and messages authentication of vehicles, respectively. Moreover, for the dynamic change of vehicles, a clustering selection algorithm and a key updating algorithm based on Chinese remainder theorem are given, which guarantees the forward and backward security of transmission information. Security analysis and experiment evaluation with respect of communication and computation cost demonstrate the effectiveness of the proposed protocol.","PeriodicalId":184504,"journal":{"name":"2021 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE Conference on Dependable and Secure Computing (DSC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/DSC49826.2021.9346240","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8
Abstract
By virtue of intelligent data processing and vehicular network, Internet of Vehicle (IoV) provides the transport system with real-time traffic information, which greatly improves the traffic conditions of the city. Moreover, to ease the computing and storage burden of the increasing number of the vehicle, edge computing is introduced to offload computing tasks on the local with low latency. But it still suffers from data integrity and privacy concerns. To meet these challenges, this paper proposes an efficient and conditional privacy-preserving authentication protocol using blockchain-enabled IoV with edge computing. Specifically, edge computing and consortium blockchains are combined to support efficient computation and storage capabilities with low communication delay while providing data auditability. Also, a pseudonym mechanism and identity-based signature are utilized to achieve identity privacy-preserving conditionally and messages authentication of vehicles, respectively. Moreover, for the dynamic change of vehicles, a clustering selection algorithm and a key updating algorithm based on Chinese remainder theorem are given, which guarantees the forward and backward security of transmission information. Security analysis and experiment evaluation with respect of communication and computation cost demonstrate the effectiveness of the proposed protocol.
车联网(Internet of Vehicle, IoV)通过智能数据处理和车联网,为交通系统提供实时交通信息,极大地改善了城市交通状况。此外,为了减轻日益增加的车辆数量带来的计算和存储负担,引入了边缘计算,将计算任务以低延迟的方式卸载到本地。但它仍然受到数据完整性和隐私问题的困扰。为了应对这些挑战,本文提出了一种高效的、有条件的隐私保护认证协议,该协议使用具有边缘计算的区块链支持的车联网。具体来说,边缘计算和联盟区块链相结合,以低通信延迟支持高效的计算和存储能力,同时提供数据可审计性。利用假名机制和基于身份的签名分别实现车辆的有条件身份隐私保护和消息认证。针对车辆的动态变化,给出了基于中国剩余定理的聚类选择算法和密钥更新算法,保证了传输信息的前向和后向安全性。从通信和计算成本两方面对协议进行了安全性分析和实验评估,验证了协议的有效性。