Privacy-Preserved Pseudonym Scheme for Fog Computing Supported Internet of Vehicles

As a promising branch of Internet of Things, Internet of Vehicles (IoV) is envisioned to serve as an essential data sensing and processing platform for intelligent transportation systems. In this paper, we aim to address location privacy issues in IoV. In traditional pseudonym systems, the pseudonym...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on intelligent transportation systems 2018-08, Vol.19 (8), p.2627-2637
Hauptverfasser: Kang, Jiawen, Yu, Rong, Huang, Xumin, Zhang, Yan
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 2637
container_issue 8
container_start_page 2627
container_title IEEE transactions on intelligent transportation systems
container_volume 19
creator Kang, Jiawen
Yu, Rong
Huang, Xumin
Zhang, Yan
description As a promising branch of Internet of Things, Internet of Vehicles (IoV) is envisioned to serve as an essential data sensing and processing platform for intelligent transportation systems. In this paper, we aim to address location privacy issues in IoV. In traditional pseudonym systems, the pseudonym management is carried out by a centralized way resulting in big latency and high cost. Therefore, we present a new paradigm named Fog computing supported IoV (F-IoV) to exploit resources at the network edge for effective pseudonym management. By utilizing abundant edge resources, a privacy-preserved pseudonym ( P^{3} ) scheme is proposed in F-IoV. The pseudonym management in this scheme is shifted to specialized fogs at the network edge named pseudonym fogs, which are composed of roadside infrastructures and deployed in close proximity of vehicles. P^{3} scheme has following advantages: 1) context-aware pseudonym changing; 2) timely pseudonym distribution; and 3) reduced pseudonym management overhead. Moreover, a hierarchical architecture for P^{3} scheme is introduced in F-IoV. Enabled by the architecture, a context-aware pseudonym changing game and secure pseudonym management communication protocols are proposed. The security analysis shows that P^{3} scheme provides secure communication and privacy preservation for vehicles. Numerical results indicate that P^{3} scheme effectively enhances location privacy and reduces communication overhead for the vehicles.
doi_str_mv 10.1109/TITS.2017.2764095
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_ieee_primary_8103347</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>8103347</ieee_id><sourcerecordid>2083983455</sourcerecordid><originalsourceid>FETCH-LOGICAL-c157t-1a3b0bbf32d549369f1305726426cbf1db1584daa574f2450e974aa9010459263</originalsourceid><addsrcrecordid>eNotzk9Lw0AQBfBFFNTqBxAPLnhOndk_SfYoxWqhYCHVa9gkkzalzcbdpNBvb6Se3vD4MTzGHhCmiGBe1ot1NhWAyVQksQKjL9gNap1GABhf_t1CRQY0XLPbEHZjqzTiDctWvjna8hStPAXyR6r4KtBQufZ04Fm5pQPx2nk-dxs-c4du6Jt2w7Oh65zvR7xoe_It9dzV_Ju2TbmncMeuarsPdP-fE_Y1f1vPPqLl5_ti9rqMStRJH6GVBRRFLUWllZGxqVGCTkSsRFwWNVYF6lRV1upE1UJpIJMoaw0gKG1ELCfs6fy39E0Yd-Wt8zZHSLXIE4xRjOL5LDrvfgYKfb5zg2_HUbmAVJpUKq1H9XhWDRHlnW8O1p_yFEFKlchf0VJkOA</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2083983455</pqid></control><display><type>article</type><title>Privacy-Preserved Pseudonym Scheme for Fog Computing Supported Internet of Vehicles</title><source>IEEE Electronic Library (IEL)</source><creator>Kang, Jiawen ; Yu, Rong ; Huang, Xumin ; Zhang, Yan</creator><creatorcontrib>Kang, Jiawen ; Yu, Rong ; Huang, Xumin ; Zhang, Yan</creatorcontrib><description><![CDATA[As a promising branch of Internet of Things, Internet of Vehicles (IoV) is envisioned to serve as an essential data sensing and processing platform for intelligent transportation systems. In this paper, we aim to address location privacy issues in IoV. In traditional pseudonym systems, the pseudonym management is carried out by a centralized way resulting in big latency and high cost. Therefore, we present a new paradigm named Fog computing supported IoV (F-IoV) to exploit resources at the network edge for effective pseudonym management. By utilizing abundant edge resources, a privacy-preserved pseudonym (<inline-formula> <tex-math notation="LaTeX">P^{3} </tex-math></inline-formula>) scheme is proposed in F-IoV. The pseudonym management in this scheme is shifted to specialized fogs at the network edge named pseudonym fogs, which are composed of roadside infrastructures and deployed in close proximity of vehicles. <inline-formula> <tex-math notation="LaTeX">P^{3} </tex-math></inline-formula> scheme has following advantages: 1) context-aware pseudonym changing; 2) timely pseudonym distribution; and 3) reduced pseudonym management overhead. Moreover, a hierarchical architecture for <inline-formula> <tex-math notation="LaTeX">P^{3} </tex-math></inline-formula> scheme is introduced in F-IoV. Enabled by the architecture, a context-aware pseudonym changing game and secure pseudonym management communication protocols are proposed. The security analysis shows that <inline-formula> <tex-math notation="LaTeX">P^{3} </tex-math></inline-formula> scheme provides secure communication and privacy preservation for vehicles. Numerical results indicate that <inline-formula> <tex-math notation="LaTeX">P^{3} </tex-math></inline-formula> scheme effectively enhances location privacy and reduces communication overhead for the vehicles.]]></description><identifier>ISSN: 1524-9050</identifier><identifier>EISSN: 1558-0016</identifier><identifier>DOI: 10.1109/TITS.2017.2764095</identifier><identifier>CODEN: ITISFG</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Ambient intelligence ; Architecture ; Cloud computing ; Communication ; Computer architecture ; Computing costs ; Cybersecurity ; Edge computing ; fog computing ; game theory ; Intelligent transportation systems ; Internet ; Internet of Things ; Internet of Vehicles ; Local government ; location privacy ; Privacy ; Protocol (computers) ; pseudonym management ; Resource management ; Safety</subject><ispartof>IEEE transactions on intelligent transportation systems, 2018-08, Vol.19 (8), p.2627-2637</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2018</rights><rights>info:eu-repo/semantics/openAccess</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/8103347$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>230,314,777,781,793,882,26548,27905,27906,54739</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/8103347$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Kang, Jiawen</creatorcontrib><creatorcontrib>Yu, Rong</creatorcontrib><creatorcontrib>Huang, Xumin</creatorcontrib><creatorcontrib>Zhang, Yan</creatorcontrib><title>Privacy-Preserved Pseudonym Scheme for Fog Computing Supported Internet of Vehicles</title><title>IEEE transactions on intelligent transportation systems</title><addtitle>TITS</addtitle><description><![CDATA[As a promising branch of Internet of Things, Internet of Vehicles (IoV) is envisioned to serve as an essential data sensing and processing platform for intelligent transportation systems. In this paper, we aim to address location privacy issues in IoV. In traditional pseudonym systems, the pseudonym management is carried out by a centralized way resulting in big latency and high cost. Therefore, we present a new paradigm named Fog computing supported IoV (F-IoV) to exploit resources at the network edge for effective pseudonym management. By utilizing abundant edge resources, a privacy-preserved pseudonym (<inline-formula> <tex-math notation="LaTeX">P^{3} </tex-math></inline-formula>) scheme is proposed in F-IoV. The pseudonym management in this scheme is shifted to specialized fogs at the network edge named pseudonym fogs, which are composed of roadside infrastructures and deployed in close proximity of vehicles. <inline-formula> <tex-math notation="LaTeX">P^{3} </tex-math></inline-formula> scheme has following advantages: 1) context-aware pseudonym changing; 2) timely pseudonym distribution; and 3) reduced pseudonym management overhead. Moreover, a hierarchical architecture for <inline-formula> <tex-math notation="LaTeX">P^{3} </tex-math></inline-formula> scheme is introduced in F-IoV. Enabled by the architecture, a context-aware pseudonym changing game and secure pseudonym management communication protocols are proposed. The security analysis shows that <inline-formula> <tex-math notation="LaTeX">P^{3} </tex-math></inline-formula> scheme provides secure communication and privacy preservation for vehicles. Numerical results indicate that <inline-formula> <tex-math notation="LaTeX">P^{3} </tex-math></inline-formula> scheme effectively enhances location privacy and reduces communication overhead for the vehicles.]]></description><subject>Ambient intelligence</subject><subject>Architecture</subject><subject>Cloud computing</subject><subject>Communication</subject><subject>Computer architecture</subject><subject>Computing costs</subject><subject>Cybersecurity</subject><subject>Edge computing</subject><subject>fog computing</subject><subject>game theory</subject><subject>Intelligent transportation systems</subject><subject>Internet</subject><subject>Internet of Things</subject><subject>Internet of Vehicles</subject><subject>Local government</subject><subject>location privacy</subject><subject>Privacy</subject><subject>Protocol (computers)</subject><subject>pseudonym management</subject><subject>Resource management</subject><subject>Safety</subject><issn>1524-9050</issn><issn>1558-0016</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2018</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><sourceid>3HK</sourceid><recordid>eNotzk9Lw0AQBfBFFNTqBxAPLnhOndk_SfYoxWqhYCHVa9gkkzalzcbdpNBvb6Se3vD4MTzGHhCmiGBe1ot1NhWAyVQksQKjL9gNap1GABhf_t1CRQY0XLPbEHZjqzTiDctWvjna8hStPAXyR6r4KtBQufZ04Fm5pQPx2nk-dxs-c4du6Jt2w7Oh65zvR7xoe_It9dzV_Ju2TbmncMeuarsPdP-fE_Y1f1vPPqLl5_ti9rqMStRJH6GVBRRFLUWllZGxqVGCTkSsRFwWNVYF6lRV1upE1UJpIJMoaw0gKG1ELCfs6fy39E0Yd-Wt8zZHSLXIE4xRjOL5LDrvfgYKfb5zg2_HUbmAVJpUKq1H9XhWDRHlnW8O1p_yFEFKlchf0VJkOA</recordid><startdate>20180801</startdate><enddate>20180801</enddate><creator>Kang, Jiawen</creator><creator>Yu, Rong</creator><creator>Huang, Xumin</creator><creator>Zhang, Yan</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>FR3</scope><scope>JQ2</scope><scope>KR7</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>3HK</scope></search><sort><creationdate>20180801</creationdate><title>Privacy-Preserved Pseudonym Scheme for Fog Computing Supported Internet of Vehicles</title><author>Kang, Jiawen ; Yu, Rong ; Huang, Xumin ; Zhang, Yan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c157t-1a3b0bbf32d549369f1305726426cbf1db1584daa574f2450e974aa9010459263</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2018</creationdate><topic>Ambient intelligence</topic><topic>Architecture</topic><topic>Cloud computing</topic><topic>Communication</topic><topic>Computer architecture</topic><topic>Computing costs</topic><topic>Cybersecurity</topic><topic>Edge computing</topic><topic>fog computing</topic><topic>game theory</topic><topic>Intelligent transportation systems</topic><topic>Internet</topic><topic>Internet of Things</topic><topic>Internet of Vehicles</topic><topic>Local government</topic><topic>location privacy</topic><topic>Privacy</topic><topic>Protocol (computers)</topic><topic>pseudonym management</topic><topic>Resource management</topic><topic>Safety</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Kang, Jiawen</creatorcontrib><creatorcontrib>Yu, Rong</creatorcontrib><creatorcontrib>Huang, Xumin</creatorcontrib><creatorcontrib>Zhang, Yan</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>Engineering Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Civil Engineering Abstracts</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>NORA - Norwegian Open Research Archives</collection><jtitle>IEEE transactions on intelligent transportation systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Kang, Jiawen</au><au>Yu, Rong</au><au>Huang, Xumin</au><au>Zhang, Yan</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Privacy-Preserved Pseudonym Scheme for Fog Computing Supported Internet of Vehicles</atitle><jtitle>IEEE transactions on intelligent transportation systems</jtitle><stitle>TITS</stitle><date>2018-08-01</date><risdate>2018</risdate><volume>19</volume><issue>8</issue><spage>2627</spage><epage>2637</epage><pages>2627-2637</pages><issn>1524-9050</issn><eissn>1558-0016</eissn><coden>ITISFG</coden><abstract><![CDATA[As a promising branch of Internet of Things, Internet of Vehicles (IoV) is envisioned to serve as an essential data sensing and processing platform for intelligent transportation systems. In this paper, we aim to address location privacy issues in IoV. In traditional pseudonym systems, the pseudonym management is carried out by a centralized way resulting in big latency and high cost. Therefore, we present a new paradigm named Fog computing supported IoV (F-IoV) to exploit resources at the network edge for effective pseudonym management. By utilizing abundant edge resources, a privacy-preserved pseudonym (<inline-formula> <tex-math notation="LaTeX">P^{3} </tex-math></inline-formula>) scheme is proposed in F-IoV. The pseudonym management in this scheme is shifted to specialized fogs at the network edge named pseudonym fogs, which are composed of roadside infrastructures and deployed in close proximity of vehicles. <inline-formula> <tex-math notation="LaTeX">P^{3} </tex-math></inline-formula> scheme has following advantages: 1) context-aware pseudonym changing; 2) timely pseudonym distribution; and 3) reduced pseudonym management overhead. Moreover, a hierarchical architecture for <inline-formula> <tex-math notation="LaTeX">P^{3} </tex-math></inline-formula> scheme is introduced in F-IoV. Enabled by the architecture, a context-aware pseudonym changing game and secure pseudonym management communication protocols are proposed. The security analysis shows that <inline-formula> <tex-math notation="LaTeX">P^{3} </tex-math></inline-formula> scheme provides secure communication and privacy preservation for vehicles. Numerical results indicate that <inline-formula> <tex-math notation="LaTeX">P^{3} </tex-math></inline-formula> scheme effectively enhances location privacy and reduces communication overhead for the vehicles.]]></abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TITS.2017.2764095</doi><tpages>11</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1524-9050
ispartof IEEE transactions on intelligent transportation systems, 2018-08, Vol.19 (8), p.2627-2637
issn 1524-9050
1558-0016
language eng
recordid cdi_ieee_primary_8103347
source IEEE Electronic Library (IEL)
subjects Ambient intelligence
Architecture
Cloud computing
Communication
Computer architecture
Computing costs
Cybersecurity
Edge computing
fog computing
game theory
Intelligent transportation systems
Internet
Internet of Things
Internet of Vehicles
Local government
location privacy
Privacy
Protocol (computers)
pseudonym management
Resource management
Safety
title Privacy-Preserved Pseudonym Scheme for Fog Computing Supported Internet of Vehicles
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-19T22%3A00%3A07IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Privacy-Preserved%20Pseudonym%20Scheme%20for%20Fog%20Computing%20Supported%20Internet%20of%20Vehicles&rft.jtitle=IEEE%20transactions%20on%20intelligent%20transportation%20systems&rft.au=Kang,%20Jiawen&rft.date=2018-08-01&rft.volume=19&rft.issue=8&rft.spage=2627&rft.epage=2637&rft.pages=2627-2637&rft.issn=1524-9050&rft.eissn=1558-0016&rft.coden=ITISFG&rft_id=info:doi/10.1109/TITS.2017.2764095&rft_dat=%3Cproquest_RIE%3E2083983455%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2083983455&rft_id=info:pmid/&rft_ieee_id=8103347&rfr_iscdi=true