Ta Thi Kim Hue, Nguyen Gia Duoc Nguyen Duy Tuan, An Braeken, K. Steenhaut, Kieu-Ha Phung Seee
{"title":"车辆雾基础设施的有效认证机制","authors":"Ta Thi Kim Hue, Nguyen Gia Duoc Nguyen Duy Tuan, An Braeken, K. Steenhaut, Kieu-Ha Phung Seee","doi":"10.1109/ICCE55644.2022.9852081","DOIUrl":null,"url":null,"abstract":"Recently, a tangible vehicular fog computing (VFC) platform based on oneM2M, called oneVFC, has been proposed. This platform enabled federated AI learning, but did not include sufficient attention to security. Therefore, this paper proposes an effective authentication and key agreement protocol based on the Elliptic curve cryptography (ECC) to enhance privacy preservation in an authenticated way in order to ensure safer AI training. Experimental results show that the proposed authentication mechanisms make reliable transmissions in highly-mobile vehicular networks possible, resulting in a desirable quality of service (QoS). The performance and security strength of two authenticated encryption modes of AES, GCM and CCM, are also compared and evaluated.","PeriodicalId":388547,"journal":{"name":"2022 IEEE Ninth International Conference on Communications and Electronics (ICCE)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Effective Authentication Mechanism for Vehicular Fog Infrastructure\",\"authors\":\"Ta Thi Kim Hue, Nguyen Gia Duoc Nguyen Duy Tuan, An Braeken, K. Steenhaut, Kieu-Ha Phung Seee\",\"doi\":\"10.1109/ICCE55644.2022.9852081\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Recently, a tangible vehicular fog computing (VFC) platform based on oneM2M, called oneVFC, has been proposed. This platform enabled federated AI learning, but did not include sufficient attention to security. Therefore, this paper proposes an effective authentication and key agreement protocol based on the Elliptic curve cryptography (ECC) to enhance privacy preservation in an authenticated way in order to ensure safer AI training. Experimental results show that the proposed authentication mechanisms make reliable transmissions in highly-mobile vehicular networks possible, resulting in a desirable quality of service (QoS). The performance and security strength of two authenticated encryption modes of AES, GCM and CCM, are also compared and evaluated.\",\"PeriodicalId\":388547,\"journal\":{\"name\":\"2022 IEEE Ninth International Conference on Communications and Electronics (ICCE)\",\"volume\":\"3 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-07-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 IEEE Ninth International Conference on Communications and Electronics (ICCE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCE55644.2022.9852081\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE Ninth International Conference on Communications and Electronics (ICCE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCE55644.2022.9852081","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Effective Authentication Mechanism for Vehicular Fog Infrastructure
Recently, a tangible vehicular fog computing (VFC) platform based on oneM2M, called oneVFC, has been proposed. This platform enabled federated AI learning, but did not include sufficient attention to security. Therefore, this paper proposes an effective authentication and key agreement protocol based on the Elliptic curve cryptography (ECC) to enhance privacy preservation in an authenticated way in order to ensure safer AI training. Experimental results show that the proposed authentication mechanisms make reliable transmissions in highly-mobile vehicular networks possible, resulting in a desirable quality of service (QoS). The performance and security strength of two authenticated encryption modes of AES, GCM and CCM, are also compared and evaluated.