Privacy-Preserved Pseudonym Scheme for Fog Computing Supported Internet of Vehicles

As a promising branch of Internet of Things, Internet of Vehicles (IoV) is envisioned to serve as an essential data sensing and processing platform for intelligent transportation systems. In this paper, we aim to address location privacy issues in IoV. In traditional pseudonym systems, the pseudonym management is carried out by a centralized way resulting in big latency and high cost. Therefore, we present a new paradigm named Fog computing supported IoV (F-IoV) to exploit resources at the network edge for effective pseudonym management. By utilizing abundant edge resources, a privacy-preserved pseudonym (<inline-formula> <tex-math notation="LaTeX">$P^{3}$ </tex-math></inline-formula>) scheme is proposed in F-IoV. The pseudonym management in this scheme is shifted to specialized fogs at the network edge named pseudonym fogs, which are composed of roadside infrastructures and deployed in close proximity of vehicles. <inline-formula> <tex-math notation="LaTeX">$P^{3}$ </tex-math></inline-formula> scheme has following advantages: 1) context-aware pseudonym changing; 2) timely pseudonym distribution; and 3) reduced pseudonym management overhead. Moreover, a hierarchical architecture for <inline-formula> <tex-math notation="LaTeX">$P^{3}$ </tex-math></inline-formula> scheme is introduced in F-IoV. Enabled by the architecture, a context-aware pseudonym changing game and secure pseudonym management communication protocols are proposed. The security analysis shows that <inline-formula> <tex-math notation="LaTeX">$P^{3}$ </tex-math></inline-formula> scheme provides secure communication and privacy preservation for vehicles. Numerical results indicate that <inline-formula> <tex-math notation="LaTeX">$P^{3}$ </tex-math></inline-formula> scheme effectively enhances location privacy and reduces communication overhead for the vehicles.

[1]  Depeng Jin,et al.  Vehicular Fog Computing: A Viewpoint of Vehicles as the Infrastructures , 2016, IEEE Transactions on Vehicular Technology.

[2]  Xiaoyan Zhu,et al.  An Efficient Anonymous Batch Authentication Scheme Based on HMAC for VANETs , 2016, IEEE Transactions on Intelligent Transportation Systems.

[3]  Pin-Han Ho,et al.  ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[4]  Xiaohui Liang,et al.  A Dynamic Privacy-Preserving Key Management Scheme for Location-Based Services in VANETs , 2012, IEEE Transactions on Intelligent Transportation Systems.

[5]  Youngho Park,et al.  Pseudonymous authentication for secure V2I services in cloud-based vehicular networks , 2016, J. Ambient Intell. Humaniz. Comput..

[6]  Frank Kargl,et al.  Pseudonym Schemes in Vehicular Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.

[7]  Yacine Ghamri-Doudane,et al.  Software defined networking-based vehicular Adhoc Network with Fog Computing , 2015, 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM).

[8]  Jelena V. Misic,et al.  Privacy and Anonymity in VANETs: A Contemporary Study , 2010, Ad Hoc Sens. Wirel. Networks.

[9]  Shengli Xie,et al.  MixGroup: Accumulative Pseudonym Exchanging for Location Privacy Enhancement in Vehicular Social Networks , 2016, IEEE Transactions on Dependable and Secure Computing.

[10]  Choong Seon Hong,et al.  A Fog based system model for cooperative IoT node pairing using matching theory , 2015, 2015 17th Asia-Pacific Network Operations and Management Symposium (APNOMS).

[11]  Dan Lin,et al.  Privacy-aware access control for message exchange in vehicular ad hoc networks , 2014, Telecommunication Systems.

[12]  Mahadev Satyanarayanan,et al.  Are Cloudlets Necessary , 2015 .

[13]  Michael Weber,et al.  Pseudonym-On-Demand: A New Pseudonym Refill Strategy for Vehicular Communications , 2008, 2008 IEEE 68th Vehicular Technology Conference.

[14]  Levente Buttyán,et al.  SLOW: A Practical pseudonym changing scheme for location privacy in VANETs , 2009, 2009 IEEE Vehicular Networking Conference (VNC).

[15]  Albert-László Barabási,et al.  Limits of Predictability in Human Mobility , 2010, Science.

[16]  Hassan Artail,et al.  A Pseudonym Management System to Achieve Anonymity in Vehicular Ad Hoc Networks , 2016, IEEE Transactions on Dependable and Secure Computing.

[17]  Xiaohui Liang,et al.  Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in VANETs , 2012, IEEE Transactions on Vehicular Technology.

[18]  Mohsen Guizani,et al.  Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.

[19]  Athanasios V. Vasilakos,et al.  Mobile Crowd Sensing for Traffic Prediction in Internet of Vehicles , 2016, Sensors.

[20]  Maxim Raya,et al.  Mix-Zones for Location Privacy in Vehicular Networks , 2007 .

[21]  David C. Parkes,et al.  On non-cooperative location privacy: a game-theoretic analysis , 2009, CCS.

[22]  Zhiyi Fang,et al.  Securing Vehicular Ad Hoc Networks , 2007, 2007 2nd International Conference on Pervasive Computing and Applications.

[23]  Keke Gai,et al.  Dynamic energy-aware cloudlet-based mobile cloud computing model for green computing , 2016, J. Netw. Comput. Appl..