Open Access

ARTICLE

A Novel Anonymous Authentication Scheme Based on Edge Computing in Internet of Vehicles

Xiaoliang Wang1, Xinhui She1, Liang Bai2,*, Yang Qing1, Frank Jiang3
1 Hunan University of Science and Technology, Xiangtan, 411201, China
2 Hunan University, Changsha, 410006, China
3 School of Information Technology, Deakin University, Geelong, 3220, Australia
* Corresponding Author: Liang Bai. Email:

Computers, Materials & Continua 2021, 67(3), 3349-3361. https://doi.org/10.32604/cmc.2021.012454

Received 30 August 2020; Accepted 19 November 2020; Issue published 01 March 2021

Abstract

The vehicular cloud computing is an emerging technology that changes vehicle communication and underlying traffic management applications. However, cloud computing has disadvantages such as high delay, low privacy and high communication cost, which can not meet the needs of real-time interactive information of Internet of vehicles. Ensuring security and privacy in Internet of Vehicles is also regarded as one of its most important challenges. Therefore, in order to ensure the user information security and improve the real-time of vehicle information interaction, this paper proposes an anonymous authentication scheme based on edge computing. In this scheme, the concept of edge computing is introduced into the Internet of vehicles, which makes full use of the redundant computing power and storage capacity of idle edge equipment. The edge vehicle nodes are determined by simple algorithm of defining distance and resources, and the improved RSA encryption algorithm is used to encrypt the user information. The improved RSA algorithm encrypts the user information by reencrypting the encryption parameters . Compared with the traditional RSA algorithm, it can resist more attacks, so it is used to ensure the security of user information. It can not only protect the privacy of vehicles, but also avoid anonymous abuse. Simulation results show that the proposed scheme has lower computational complexity and communication overhead than the traditional anonymous scheme.

Keywords

Cloud computing; anonymous authentication; edge computing; anonymity abuse

Cite This Article

X. Wang, X. She, L. Bai, Y. Qing and F. Jiang, "A novel anonymous authentication scheme based on edge computing in internet of vehicles," Computers, Materials & Continua, vol. 67, no.3, pp. 3349–3361, 2021.

Citations




This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1286

    View

  • 925

    Download

  • 0

    Like

Share Link

WeChat scan