A New Message Authentication Scheme for Multiple Devices in Intelligent Connected Vehicles Based on Edge Computing

Intelligent connected vehicles are autonomous vehicles. With the increasing degree of automation of autonomous vehicles and the development of open applications in the future, the computing tasks of autonomous vehicles are becoming more and more complex. In practice, the computing resources of vehic...

Full description

Bibliographic Details
Main Authors: Hong Zhong, Lei Pan, Qingyang Zhang, Jie Cui
Format: Article
Language:English
Published: IEEE 2019-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8786821/
Description
Summary:Intelligent connected vehicles are autonomous vehicles. With the increasing degree of automation of autonomous vehicles and the development of open applications in the future, the computing tasks of autonomous vehicles are becoming more and more complex. In practice, the computing resources of vehicles are limited and the processing of data is not always guaranteed to be completed in time. However, the timely processing and integrity of the data are very important for vehicles because it affects the path selection of the traveling vehicle and the passenger experience. Therefore, it is necessary to reduce latency in processing data and verify the integrity of data for vehicles. In this paper, a novel message authentication scheme for multiple mobile devices in intelligent connected vehicles based on edge computing is proposed. The task of processing data in the vehicle is migrated to mobile devices, and tasks are executed utilizing the computing resources of multiple mobile devices in the edge computing model. The vehicle use certificateless ring signature technology to ensure the integrity of data processed by mobile devices. A security analyses show that our proposed schemes are secure in the random oracle model and can resist two types of adversaries under certificateless public key encryption. One type of adversary may be able to replace the mobile device's public key and the other type of adversary has access to the system master key. The results of performance analysis indicate the proposed scheme has high efficiency and applicability in practical intelligent connected vehicles system.
ISSN:2169-3536