北京邮电大学学报

  • EI核心期刊

北京邮电大学学报 ›› 2022, Vol. 45 ›› Issue (1): 46-51.doi: 10.13190/j.jbupt.2021-070

• 论文 • 上一篇    下一篇

边缘计算环境下无证书车联网身份认证方案

彭维平, 韩宁, 宋成   

  1. 河南理工大学 计算机科学与技术学院, 焦作 454000
  • 收稿日期:2021-04-21 出版日期:2022-02-28 发布日期:2021-12-16
  • 作者简介:彭维平(1979—),男,副教授,硕士生导师,邮箱:pwp9999@hpu.edu.cn
  • 基金资助:
    国家重点研发计划项目(2018YFC0604502);河南省青年骨干教师计划项目(2019GGJS061)

Certificateless Identity Authentication Scheme for Internet of Vehicles in Edge Computing Environment

PENG Weiping, HAN Ning, SONG Cheng   

  1. College of Computer Science and Technology, Henan Polytechnic University, Jiaozuo 454000, China
  • Received:2021-04-21 Online:2022-02-28 Published:2021-12-16

摘要: 针对当前边缘计算环境下车联网身份认证中的隐私泄露问题,基于双线性对理论,提出了一种新型的车联网身份认证方案。该方案基于泰森多边形,划分区域路网并确定生成元坐标,依据车辆当前位置所属区域的生成元与边缘节点之间距离以及边缘节点当前负载为决策依据,选择最合适边缘节点认证,或通过"云-边协同"技术与云计算中心认证。该方案采用无证书的认证方式,实现车辆与边缘节点或云计算中心、车辆与车辆之间的双向匿名认证和共享密钥的生成。若认证过程出现异常,云计算中心可通过异常数据进行恶意节点的快速追溯和撤销。通过安全分析,证明所提方案能够满足匿名性、不可伪造性和可追溯性。仿真实验表明,所提方案在计算、通信开销和达到率方面具有一定的优势。

关键词: 车联网, 身份认证, 隐私, 边缘计算, 双线性对

Abstract: In order to solve the problem of privacy leakage in the internet of vehicles identity authentication in the current edge computing environment, a new type of internet of vehicles identity authentication scheme is proposed based on bilinear pairing theory. Based on Voronoi diagram, the scheme divides the regional road network and determines the generator coordinates. According to the distance between the generator and the edge node in the area where the vehicle is located and the current load of the edge node, the most suitable edge node is selected for authentication, or it is certified by the cloud edge collaboration technology and the cloud computing center. The scheme uses certificateless authentication method to realize two-way anonymous authentication, and share key generation between vehicles and edge nodes or cloud computing center, vehicles and vehicles. If the authentication process is abnormal, cloud computing center can trace and revoke malicious nodes quickly through the abnormal data. Security analysis verfies that the scheme can satisfy anonymity, unforgeability and traceability. Simulation results show that the proposed scheme can harvest performance in term of computation, communication overhead and rate of arrival.

Key words: internet of vehicles, identity authentication, privacy, edge computing, bilinear pairing

中图分类号: