Privacy-preserving proxy re-encryption with decentralized trust management for mec-empowered vanets

X Han, D Tian, J Zhou, X Duan, Z Sheng… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
X Han, D Tian, J Zhou, X Duan, Z Sheng, VCM Leung
IEEE Transactions on Intelligent Vehicles, 2023ieeexplore.ieee.org
Multi-access edge computing (MEC) technology is widely deployed at the edge of Vehicular
Ad hoc Networks (VANETs) to enhance their communication and computational capabilities.
However, existing security and privacy preservation solutions for MEC applications in
VANETs face several challenges, such as the risk of privacy exposure of vehicle
authentication, increased overhead due to cryptographic algorithms, as well as resource
occupation and malicious attacks on edge servers. In this paper, we propose an aggregated …
Multi-access edge computing (MEC) technology is widely deployed at the edge of Vehicular Ad hoc Networks (VANETs) to enhance their communication and computational capabilities. However, existing security and privacy preservation solutions for MEC applications in VANETs face several challenges, such as the risk of privacy exposure of vehicle authentication, increased overhead due to cryptographic algorithms, as well as resource occupation and malicious attacks on edge servers. In this paper, we propose an aggregated security solution for the confidential, efficient, and trustworthy sharing of data while safeguarding the privacy of vehicle identities. Firstly, we present a broadcast proxy re-encryption scheme based on cubic spline interpolation that ensures the security of the VANET system and the identity privacy of large-scale vehicles. The re-encryption system is designed to prioritize the reduction of re-encryption computation time rather than focusing on the sizes of re-encryption keys and ciphertexts. We further model the aggregation overhead in terms of communication and computation. Additionally, we propose an efficient protocol based on Practical Byzantine Fault Tolerant (PBFT) consensus to facilitate decentralized trust management for edge proxy servers. Our security analysis demonstrates that the proposed scheme satisfies the security and confidentiality requirements for data sharing in VANETs. Finally, we provide extensive simulations that reveal the performance and effectiveness of our solution.
ieeexplore.ieee.org
以上显示的是最相近的搜索结果。 查看全部搜索结果