Secure and lightweight cloud-assisted video reporting protocol over 5G-enabled vehicular networks

L Nkenyereye, J Kwon, YH Choi - Sensors, 2017 - mdpi.com
Sensors, 2017mdpi.com
In the vehicular networks, the real-time video reporting service is used to send the recorded
videos in the vehicle to the cloud. However, when facilitating the real-time video reporting
service in the vehicular networks, the usage of the fourth generation (4G) long term evolution
(LTE) was proved to suffer from latency while the IEEE 802.11 p standard does not offer
sufficient scalability for a such congested environment. To overcome those drawbacks, the
fifth-generation (5G)-enabled vehicular network is considered as a promising technology for …
In the vehicular networks, the real-time video reporting service is used to send the recorded videos in the vehicle to the cloud. However, when facilitating the real-time video reporting service in the vehicular networks, the usage of the fourth generation (4G) long term evolution (LTE) was proved to suffer from latency while the IEEE 802.11p standard does not offer sufficient scalability for a such congested environment. To overcome those drawbacks, the fifth-generation (5G)-enabled vehicular network is considered as a promising technology for empowering the real-time video reporting service. In this paper, we note that security and privacy related issues should also be carefully addressed to boost the early adoption of 5G-enabled vehicular networks. There exist a few research works for secure video reporting service in 5G-enabled vehicular networks. However, their usage is limited because of public key certificates and expensive pairing operations. Thus, we propose a secure and lightweight protocol for cloud-assisted video reporting service in 5G-enabled vehicular networks. Compared to the conventional public key certificates, the proposed protocol achieves entities’ authorization through anonymous credential. Also, by using lightweight security primitives instead of expensive bilinear pairing operations, the proposed protocol minimizes the computational overhead. From the evaluation results, we show that the proposed protocol takes the smaller computation and communication time for the cryptographic primitives than that of the well-known Eiza-Ni-Shi protocol.
MDPI
以上显示的是最相近的搜索结果。 查看全部搜索结果