Privacy-Preserved Pseudonym Scheme for Fog Computing Supported Internet of Vehicles
As a promising branch of Internet of Things, Internet of Vehicles (IoV) is envisioned to serve as an essential data sensing and processing platform for intelligent transportation systems. In this paper, we aim to address location privacy issues in IoV. In traditional pseudonym systems, the pseudonym...
Gespeichert in:
Veröffentlicht in: | IEEE transactions on intelligent transportation systems 2018-08, Vol.19 (8), p.2627-2637 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 2637 |
---|---|
container_issue | 8 |
container_start_page | 2627 |
container_title | IEEE transactions on intelligent transportation systems |
container_volume | 19 |
creator | Kang, Jiawen Yu, Rong Huang, Xumin Zhang, Yan |
description | As a promising branch of Internet of Things, Internet of Vehicles (IoV) is envisioned to serve as an essential data sensing and processing platform for intelligent transportation systems. In this paper, we aim to address location privacy issues in IoV. In traditional pseudonym systems, the pseudonym management is carried out by a centralized way resulting in big latency and high cost. Therefore, we present a new paradigm named Fog computing supported IoV (F-IoV) to exploit resources at the network edge for effective pseudonym management. By utilizing abundant edge resources, a privacy-preserved pseudonym ( P^{3} ) scheme is proposed in F-IoV. The pseudonym management in this scheme is shifted to specialized fogs at the network edge named pseudonym fogs, which are composed of roadside infrastructures and deployed in close proximity of vehicles. P^{3} scheme has following advantages: 1) context-aware pseudonym changing; 2) timely pseudonym distribution; and 3) reduced pseudonym management overhead. Moreover, a hierarchical architecture for P^{3} scheme is introduced in F-IoV. Enabled by the architecture, a context-aware pseudonym changing game and secure pseudonym management communication protocols are proposed. The security analysis shows that P^{3} scheme provides secure communication and privacy preservation for vehicles. Numerical results indicate that P^{3} scheme effectively enhances location privacy and reduces communication overhead for the vehicles. |
doi_str_mv | 10.1109/TITS.2017.2764095 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_ieee_primary_8103347</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>8103347</ieee_id><sourcerecordid>2083983455</sourcerecordid><originalsourceid>FETCH-LOGICAL-c157t-1a3b0bbf32d549369f1305726426cbf1db1584daa574f2450e974aa9010459263</originalsourceid><addsrcrecordid>eNotzk9Lw0AQBfBFFNTqBxAPLnhOndk_SfYoxWqhYCHVa9gkkzalzcbdpNBvb6Se3vD4MTzGHhCmiGBe1ot1NhWAyVQksQKjL9gNap1GABhf_t1CRQY0XLPbEHZjqzTiDctWvjna8hStPAXyR6r4KtBQufZ04Fm5pQPx2nk-dxs-c4du6Jt2w7Oh65zvR7xoe_It9dzV_Ju2TbmncMeuarsPdP-fE_Y1f1vPPqLl5_ti9rqMStRJH6GVBRRFLUWllZGxqVGCTkSsRFwWNVYF6lRV1upE1UJpIJMoaw0gKG1ELCfs6fy39E0Yd-Wt8zZHSLXIE4xRjOL5LDrvfgYKfb5zg2_HUbmAVJpUKq1H9XhWDRHlnW8O1p_yFEFKlchf0VJkOA</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2083983455</pqid></control><display><type>article</type><title>Privacy-Preserved Pseudonym Scheme for Fog Computing Supported Internet of Vehicles</title><source>IEEE Electronic Library (IEL)</source><creator>Kang, Jiawen ; Yu, Rong ; Huang, Xumin ; Zhang, Yan</creator><creatorcontrib>Kang, Jiawen ; Yu, Rong ; Huang, Xumin ; Zhang, Yan</creatorcontrib><description><![CDATA[As a promising branch of Internet of Things, Internet of Vehicles (IoV) is envisioned to serve as an essential data sensing and processing platform for intelligent transportation systems. In this paper, we aim to address location privacy issues in IoV. In traditional pseudonym systems, the pseudonym management is carried out by a centralized way resulting in big latency and high cost. Therefore, we present a new paradigm named Fog computing supported IoV (F-IoV) to exploit resources at the network edge for effective pseudonym management. By utilizing abundant edge resources, a privacy-preserved pseudonym (<inline-formula> <tex-math notation="LaTeX">P^{3} </tex-math></inline-formula>) scheme is proposed in F-IoV. The pseudonym management in this scheme is shifted to specialized fogs at the network edge named pseudonym fogs, which are composed of roadside infrastructures and deployed in close proximity of vehicles. <inline-formula> <tex-math notation="LaTeX">P^{3} </tex-math></inline-formula> scheme has following advantages: 1) context-aware pseudonym changing; 2) timely pseudonym distribution; and 3) reduced pseudonym management overhead. Moreover, a hierarchical architecture for <inline-formula> <tex-math notation="LaTeX">P^{3} </tex-math></inline-formula> scheme is introduced in F-IoV. Enabled by the architecture, a context-aware pseudonym changing game and secure pseudonym management communication protocols are proposed. The security analysis shows that <inline-formula> <tex-math notation="LaTeX">P^{3} </tex-math></inline-formula> scheme provides secure communication and privacy preservation for vehicles. Numerical results indicate that <inline-formula> <tex-math notation="LaTeX">P^{3} </tex-math></inline-formula> scheme effectively enhances location privacy and reduces communication overhead for the vehicles.]]></description><identifier>ISSN: 1524-9050</identifier><identifier>EISSN: 1558-0016</identifier><identifier>DOI: 10.1109/TITS.2017.2764095</identifier><identifier>CODEN: ITISFG</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Ambient intelligence ; Architecture ; Cloud computing ; Communication ; Computer architecture ; Computing costs ; Cybersecurity ; Edge computing ; fog computing ; game theory ; Intelligent transportation systems ; Internet ; Internet of Things ; Internet of Vehicles ; Local government ; location privacy ; Privacy ; Protocol (computers) ; pseudonym management ; Resource management ; Safety</subject><ispartof>IEEE transactions on intelligent transportation systems, 2018-08, Vol.19 (8), p.2627-2637</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2018</rights><rights>info:eu-repo/semantics/openAccess</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/8103347$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>230,314,777,781,793,882,26548,27905,27906,54739</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/8103347$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Kang, Jiawen</creatorcontrib><creatorcontrib>Yu, Rong</creatorcontrib><creatorcontrib>Huang, Xumin</creatorcontrib><creatorcontrib>Zhang, Yan</creatorcontrib><title>Privacy-Preserved Pseudonym Scheme for Fog Computing Supported Internet of Vehicles</title><title>IEEE transactions on intelligent transportation systems</title><addtitle>TITS</addtitle><description><![CDATA[As a promising branch of Internet of Things, Internet of Vehicles (IoV) is envisioned to serve as an essential data sensing and processing platform for intelligent transportation systems. In this paper, we aim to address location privacy issues in IoV. In traditional pseudonym systems, the pseudonym management is carried out by a centralized way resulting in big latency and high cost. Therefore, we present a new paradigm named Fog computing supported IoV (F-IoV) to exploit resources at the network edge for effective pseudonym management. By utilizing abundant edge resources, a privacy-preserved pseudonym (<inline-formula> <tex-math notation="LaTeX">P^{3} </tex-math></inline-formula>) scheme is proposed in F-IoV. The pseudonym management in this scheme is shifted to specialized fogs at the network edge named pseudonym fogs, which are composed of roadside infrastructures and deployed in close proximity of vehicles. <inline-formula> <tex-math notation="LaTeX">P^{3} </tex-math></inline-formula> scheme has following advantages: 1) context-aware pseudonym changing; 2) timely pseudonym distribution; and 3) reduced pseudonym management overhead. Moreover, a hierarchical architecture for <inline-formula> <tex-math notation="LaTeX">P^{3} </tex-math></inline-formula> scheme is introduced in F-IoV. Enabled by the architecture, a context-aware pseudonym changing game and secure pseudonym management communication protocols are proposed. The security analysis shows that <inline-formula> <tex-math notation="LaTeX">P^{3} </tex-math></inline-formula> scheme provides secure communication and privacy preservation for vehicles. Numerical results indicate that <inline-formula> <tex-math notation="LaTeX">P^{3} </tex-math></inline-formula> scheme effectively enhances location privacy and reduces communication overhead for the vehicles.]]></description><subject>Ambient intelligence</subject><subject>Architecture</subject><subject>Cloud computing</subject><subject>Communication</subject><subject>Computer architecture</subject><subject>Computing costs</subject><subject>Cybersecurity</subject><subject>Edge computing</subject><subject>fog computing</subject><subject>game theory</subject><subject>Intelligent transportation systems</subject><subject>Internet</subject><subject>Internet of Things</subject><subject>Internet of Vehicles</subject><subject>Local government</subject><subject>location privacy</subject><subject>Privacy</subject><subject>Protocol (computers)</subject><subject>pseudonym management</subject><subject>Resource management</subject><subject>Safety</subject><issn>1524-9050</issn><issn>1558-0016</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2018</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><sourceid>3HK</sourceid><recordid>eNotzk9Lw0AQBfBFFNTqBxAPLnhOndk_SfYoxWqhYCHVa9gkkzalzcbdpNBvb6Se3vD4MTzGHhCmiGBe1ot1NhWAyVQksQKjL9gNap1GABhf_t1CRQY0XLPbEHZjqzTiDctWvjna8hStPAXyR6r4KtBQufZ04Fm5pQPx2nk-dxs-c4du6Jt2w7Oh65zvR7xoe_It9dzV_Ju2TbmncMeuarsPdP-fE_Y1f1vPPqLl5_ti9rqMStRJH6GVBRRFLUWllZGxqVGCTkSsRFwWNVYF6lRV1upE1UJpIJMoaw0gKG1ELCfs6fy39E0Yd-Wt8zZHSLXIE4xRjOL5LDrvfgYKfb5zg2_HUbmAVJpUKq1H9XhWDRHlnW8O1p_yFEFKlchf0VJkOA</recordid><startdate>20180801</startdate><enddate>20180801</enddate><creator>Kang, Jiawen</creator><creator>Yu, Rong</creator><creator>Huang, Xumin</creator><creator>Zhang, Yan</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>FR3</scope><scope>JQ2</scope><scope>KR7</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>3HK</scope></search><sort><creationdate>20180801</creationdate><title>Privacy-Preserved Pseudonym Scheme for Fog Computing Supported Internet of Vehicles</title><author>Kang, Jiawen ; Yu, Rong ; Huang, Xumin ; Zhang, Yan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c157t-1a3b0bbf32d549369f1305726426cbf1db1584daa574f2450e974aa9010459263</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2018</creationdate><topic>Ambient intelligence</topic><topic>Architecture</topic><topic>Cloud computing</topic><topic>Communication</topic><topic>Computer architecture</topic><topic>Computing costs</topic><topic>Cybersecurity</topic><topic>Edge computing</topic><topic>fog computing</topic><topic>game theory</topic><topic>Intelligent transportation systems</topic><topic>Internet</topic><topic>Internet of Things</topic><topic>Internet of Vehicles</topic><topic>Local government</topic><topic>location privacy</topic><topic>Privacy</topic><topic>Protocol (computers)</topic><topic>pseudonym management</topic><topic>Resource management</topic><topic>Safety</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Kang, Jiawen</creatorcontrib><creatorcontrib>Yu, Rong</creatorcontrib><creatorcontrib>Huang, Xumin</creatorcontrib><creatorcontrib>Zhang, Yan</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>Engineering Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Civil Engineering Abstracts</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>NORA - Norwegian Open Research Archives</collection><jtitle>IEEE transactions on intelligent transportation systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Kang, Jiawen</au><au>Yu, Rong</au><au>Huang, Xumin</au><au>Zhang, Yan</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Privacy-Preserved Pseudonym Scheme for Fog Computing Supported Internet of Vehicles</atitle><jtitle>IEEE transactions on intelligent transportation systems</jtitle><stitle>TITS</stitle><date>2018-08-01</date><risdate>2018</risdate><volume>19</volume><issue>8</issue><spage>2627</spage><epage>2637</epage><pages>2627-2637</pages><issn>1524-9050</issn><eissn>1558-0016</eissn><coden>ITISFG</coden><abstract><![CDATA[As a promising branch of Internet of Things, Internet of Vehicles (IoV) is envisioned to serve as an essential data sensing and processing platform for intelligent transportation systems. In this paper, we aim to address location privacy issues in IoV. In traditional pseudonym systems, the pseudonym management is carried out by a centralized way resulting in big latency and high cost. Therefore, we present a new paradigm named Fog computing supported IoV (F-IoV) to exploit resources at the network edge for effective pseudonym management. By utilizing abundant edge resources, a privacy-preserved pseudonym (<inline-formula> <tex-math notation="LaTeX">P^{3} </tex-math></inline-formula>) scheme is proposed in F-IoV. The pseudonym management in this scheme is shifted to specialized fogs at the network edge named pseudonym fogs, which are composed of roadside infrastructures and deployed in close proximity of vehicles. <inline-formula> <tex-math notation="LaTeX">P^{3} </tex-math></inline-formula> scheme has following advantages: 1) context-aware pseudonym changing; 2) timely pseudonym distribution; and 3) reduced pseudonym management overhead. Moreover, a hierarchical architecture for <inline-formula> <tex-math notation="LaTeX">P^{3} </tex-math></inline-formula> scheme is introduced in F-IoV. Enabled by the architecture, a context-aware pseudonym changing game and secure pseudonym management communication protocols are proposed. The security analysis shows that <inline-formula> <tex-math notation="LaTeX">P^{3} </tex-math></inline-formula> scheme provides secure communication and privacy preservation for vehicles. Numerical results indicate that <inline-formula> <tex-math notation="LaTeX">P^{3} </tex-math></inline-formula> scheme effectively enhances location privacy and reduces communication overhead for the vehicles.]]></abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TITS.2017.2764095</doi><tpages>11</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1524-9050 |
ispartof | IEEE transactions on intelligent transportation systems, 2018-08, Vol.19 (8), p.2627-2637 |
issn | 1524-9050 1558-0016 |
language | eng |
recordid | cdi_ieee_primary_8103347 |
source | IEEE Electronic Library (IEL) |
subjects | Ambient intelligence Architecture Cloud computing Communication Computer architecture Computing costs Cybersecurity Edge computing fog computing game theory Intelligent transportation systems Internet Internet of Things Internet of Vehicles Local government location privacy Privacy Protocol (computers) pseudonym management Resource management Safety |
title | Privacy-Preserved Pseudonym Scheme for Fog Computing Supported Internet of Vehicles |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-19T22%3A00%3A07IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Privacy-Preserved%20Pseudonym%20Scheme%20for%20Fog%20Computing%20Supported%20Internet%20of%20Vehicles&rft.jtitle=IEEE%20transactions%20on%20intelligent%20transportation%20systems&rft.au=Kang,%20Jiawen&rft.date=2018-08-01&rft.volume=19&rft.issue=8&rft.spage=2627&rft.epage=2637&rft.pages=2627-2637&rft.issn=1524-9050&rft.eissn=1558-0016&rft.coden=ITISFG&rft_id=info:doi/10.1109/TITS.2017.2764095&rft_dat=%3Cproquest_RIE%3E2083983455%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2083983455&rft_id=info:pmid/&rft_ieee_id=8103347&rfr_iscdi=true |