{"title":"一种基于雾的轻量级车联网认证方案","authors":"Jamal Alotaibi, Lubna K. Alazzawi","doi":"10.1109/UEMCON53757.2021.9666603","DOIUrl":null,"url":null,"abstract":"The advancement of the Internet-of-Vehicles (IoV) innovation aids the development of intelligent transportation systems (ITS). There are several interoperability challenges in today’s IoV networks, such as security and privacy issues, information irregularity, and so on. Because vehicle data is private and sensitive, it necessitates extra caution. Authentication of communicating devices is one such technique for securing data. The information sent via public channels is secured using authentication. Many protocols have been developed; however, traditional authentication models cannot be applied directly to circumstances needing low latency in particular. Furthermore, they are ineffective for two primary reasons: first, they are unable to adapt to the growing volume of data collected, and second, they are prone to cyber-attacks. As a result, in this paper, we attempt to propose a viable solution that is fully robust and overcomes the aforementioned problems. To protect IoV devices data during communication, we designed a lightweight and fog-based authentication scheme. Our approach ensures minimal communication cost and complies with high-security standards. Finally, we assess and compare our method’s performance in terms of network parameters such as throughput, end-to-end delay, and the rate of packet loss. Results indicate that our method scale well with the increasing number of vehicles while maintaining a minimal communication cost.","PeriodicalId":127072,"journal":{"name":"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"A Lightweight and Fog-based Authentication Scheme for Internet-of-Vehicles\",\"authors\":\"Jamal Alotaibi, Lubna K. Alazzawi\",\"doi\":\"10.1109/UEMCON53757.2021.9666603\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The advancement of the Internet-of-Vehicles (IoV) innovation aids the development of intelligent transportation systems (ITS). There are several interoperability challenges in today’s IoV networks, such as security and privacy issues, information irregularity, and so on. Because vehicle data is private and sensitive, it necessitates extra caution. Authentication of communicating devices is one such technique for securing data. The information sent via public channels is secured using authentication. Many protocols have been developed; however, traditional authentication models cannot be applied directly to circumstances needing low latency in particular. Furthermore, they are ineffective for two primary reasons: first, they are unable to adapt to the growing volume of data collected, and second, they are prone to cyber-attacks. As a result, in this paper, we attempt to propose a viable solution that is fully robust and overcomes the aforementioned problems. To protect IoV devices data during communication, we designed a lightweight and fog-based authentication scheme. Our approach ensures minimal communication cost and complies with high-security standards. Finally, we assess and compare our method’s performance in terms of network parameters such as throughput, end-to-end delay, and the rate of packet loss. Results indicate that our method scale well with the increasing number of vehicles while maintaining a minimal communication cost.\",\"PeriodicalId\":127072,\"journal\":{\"name\":\"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)\",\"volume\":\"63 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/UEMCON53757.2021.9666603\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/UEMCON53757.2021.9666603","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Lightweight and Fog-based Authentication Scheme for Internet-of-Vehicles
The advancement of the Internet-of-Vehicles (IoV) innovation aids the development of intelligent transportation systems (ITS). There are several interoperability challenges in today’s IoV networks, such as security and privacy issues, information irregularity, and so on. Because vehicle data is private and sensitive, it necessitates extra caution. Authentication of communicating devices is one such technique for securing data. The information sent via public channels is secured using authentication. Many protocols have been developed; however, traditional authentication models cannot be applied directly to circumstances needing low latency in particular. Furthermore, they are ineffective for two primary reasons: first, they are unable to adapt to the growing volume of data collected, and second, they are prone to cyber-attacks. As a result, in this paper, we attempt to propose a viable solution that is fully robust and overcomes the aforementioned problems. To protect IoV devices data during communication, we designed a lightweight and fog-based authentication scheme. Our approach ensures minimal communication cost and complies with high-security standards. Finally, we assess and compare our method’s performance in terms of network parameters such as throughput, end-to-end delay, and the rate of packet loss. Results indicate that our method scale well with the increasing number of vehicles while maintaining a minimal communication cost.