Security communication model for vehicular clouds based on trusted computing

Wenbo Zhang*, Zhenshan Bao, Jian Li, Jing Zhan

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

1 Citation (Scopus)

Abstract

An security communication model for vehicular clouds (VC) based on trusted computing was proposed. With the help of a trusted third party, at the beginning of communications services process, the model generated a temporary identity for VC users, namely to anonymize the identity of these users in order to protect user's privacy. And then, during the communication process, the user's identity legitimacy and credibility authentication were verified with the bilinear pairings signature algorithm, which used the random number, key and time stamp effectively. The key and the hash function ensure the signature to be unforgeable, the timestamp ensures that the key is valid during a limit period, and the random number prevents replay attacks. Analysis shows that this model has the credibility, security, anonymity, and the characteristics of the resistance to attack.

Original languageEnglish
Pages (from-to)102-105
Number of pages4
JournalHuazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition)
Volume42
Issue number11
DOIs
Publication statusPublished - 23 Nov 2014
Externally publishedYes

Keywords

  • Authentication
  • Cloud computing
  • Security
  • Trusted computer systems
  • Vehicular communication

Fingerprint

Dive into the research topics of 'Security communication model for vehicular clouds based on trusted computing'. Together they form a unique fingerprint.

Cite this