Back to Search Start Over

Anonymous and Traceable Authentication for Securing Data Sharing in Parking Edge Computing

Authors :
Feng Zhao
Chunhai Li
Xiaohuan Li
Yujue Wang
Ding Yong
Source :
Peer-to-Peer Networking and Applications. 14:2099-2114
Publication Year :
2021
Publisher :
Springer Science and Business Media LLC, 2021.

Abstract

In parking edge computing, the service providers can engage the parking vehicles to provide computing services. The requesting vehicles can enjoy the advantages of the parking computing services with no need to build expensive equipment locally, whereas the parking vehicles can sell the computing resources to gain benefits. However, in an open parking computing system, the identity of each entity is easy to be counterfeited by other malicious entities, which may cause the leakage of privacy data of honest entities and the waste of parking computing resources. To address this issue, we propose an efficient authentication protocol between vehicle and roadside unit near the parking lot, which also allows two verified entities to generate a common key to enjoy the parking computing service confidentially. The protocol is extended to allow anonymous authentication so that the true identity would not be leaked to RSU during the authentication process, and malicious vehicle tracing if some forged or illegal authentication message is submitted to cheat the service provider or roadside unit. The security and efficiency analysis demonstrate that the proposed authentication protocols are secure and practical in applications.

Details

ISSN :
19366450 and 19366442
Volume :
14
Database :
OpenAIRE
Journal :
Peer-to-Peer Networking and Applications
Accession number :
edsair.doi...........4f8b0879f664d3c82e602bb8ebfca7e6