Anonymous-authentication scheme based on fog computing for VANET.

07:00 EST 13th February 2020 | BioPortfolio

Summary of "Anonymous-authentication scheme based on fog computing for VANET."

Privacy protection in vehicular ad hoc networks (VANETs) has always been a research hotspot, especially the issue of vehicle authentication, which is critical to ensure the safe communication of vehicles. However, using the real identity in the process of authentication can easily result in a leak of the privacy information of the vehicles. Therefore, most existing privacy-protection schemes use anonymous authentication and require one-to-one communication between vehicles and the trusted authority (TA). However, when the number of vehicles is too large, network congestion can take place. In addition, the process of updating the anonymous by the TA or the vehicle itself, can result in both poor real-time performance and leakage of the system master key. To solve these problems, this study proposes a fog-computing-based anonymous-authentication scheme for VANETs; the scheme reduces the communication burden of the TA by enabling self-authentication between vehicles and road-side units (RSUs), thus improving the vehicle-authentication efficiency. For updating the anonymous, we design a fog-computing-based pseudonym-updating and -tracking strategy, which guarantees real-time communication and reduces the instances of re-authentication interactions for legitimate vehicles. The experimental results show that the scheme not only meets the privacy-protection requirements of VANETs but also offers better performance than that of the existing anonymous-authentication schemes.


Journal Details

This article was published in the following journal.

Name: PloS one
ISSN: 1932-6203
Pages: e0228319


DeepDyve research library

PubMed Articles [13771 Associated PubMed Articles listed on BioPortfolio]

Certificateless pairing-free authentication scheme for wireless body area network in healthcare management system.

With the current advancement in technology, the use of Wireless Body Area Networks (WBANs) has become popular in the healthcare management. They provide a mechanism to collect and transmit physiologic...

An improved three-factor authentication scheme for patient monitoring using WSN in remote health-care system.

 Wireless sensor network-based remote health-care systems are becoming popular day by day with the rapid growth of Internet technologies and the proliferation of Internet-based application. A remote ...

NPMA: A Novel Privacy-Preserving Mutual Authentication in TMIS for Mobile Edge-Cloud Architecture.

Mobile Edge-Cloud Network is a new network structure after fog-cloud computing, where service and data computing are scattered in the most logical, nearby and efficient place. It provides better servi...

Application of near-infrared spectroscopy and class-modeling to antibiotic authentication.

Nowadays, counterfeit medicines have become very popular due to the extension of the Internet. Broad-spectrum antibiotics with similar effect, but different prices, provide a gold opportunity for ille...

Correction to: Chemometric tools for the authentication of cod liveroil based on nuclear magnetic resonance and infrared spectroscopy data.

The article Chemometric tools for the authentication of cod liver oil based on nuclear magnetic resonance and infrared spectroscopy data, written by Editha Giese, Sascha Rohn and Jan Fritsche.

Clinical Trials [3343 Associated Clinical Trials listed on BioPortfolio]

Evaluation of a Physical Activity Referral Scheme

The study will evaluate the effectiveness of a co-developed exercise referral scheme. Participants will be recruited to one of three groups 1. Co-developed exercise referral scheme, 2. Usu...

Measuring and Understanding the Effects of a Performance Based Financing Scheme Applied to Nutrition Services in Burundi

The government of Burundi is implementing a new financing scheme in health centres. The objective is to provide additional financial compensations to health centres on the basis of their p...

Development and Feasibility of an Incentive Scheme to Promote Walking/Cycling to School

The aim of this study is to investigate whether an incentive scheme is a feasible approach to increase walking/cycling to school.

Effectiveness of A Health Microinsurance Scheme for Private Primary Care in Malaysia

This is the Phase 3 of a 3 phase study to determine the feasibility, acceptability and effectiveness of a health microinsurance scheme in improving health equity and clinical outcomes for ...

Evaluating the Impact of the National Health Insurance Scheme of Ghana on Surgical Care

Ghana, a Low-Middle Income Country (LMIC) situated in the heart of West Africa started a national health insurance scheme in 2003.The scheme was designed to provide a comprehensive benefit...

Medical and Biotech [MESH] Definitions

A scheme which provides reimbursement for the health services rendered, generally by an institution, and which provides added financial rewards if certain conditions are met. Such a scheme is intended to promote and reward increased efficiency and cost containment, with better care, or at least without adverse effect on the quality of the care rendered.

Transferases are enzymes transferring a group, for example, the methyl group or a glycosyl group, from one compound (generally regarded as donor) to another compound (generally regarded as acceptor). The classification is based on the scheme "donor:acceptor group transferase". (Enzyme Nomenclature, 1992) EC 2.

Cell-surface proteins that bind epinephrine and/or norepinephrine with high affinity and trigger intracellular changes. The two major classes of adrenergic receptors, alpha and beta, were originally discriminated based on their cellular actions but now are distinguished by their relative affinity for characteristic synthetic ligands. Adrenergic receptors may also be classified according to the subtypes of G-proteins with which they bind; this scheme does not respect the alpha-beta distinction.

Computer-assisted analysis and processing of problems in a particular area.

Storing and processing data on multiple servers that can be accessed through the Internet.

Quick Search

DeepDyve research library

Searches Linking to this Article