TY - JOUR
T1 - Security communication model for vehicular clouds based on trusted computing
AU - Zhang, Wenbo
AU - Bao, Zhenshan
AU - Li, Jian
AU - Zhan, Jing
N1 - Publisher Copyright:
©, 2014, Huazhong University of Science and Technology. All right reserved.
PY - 2014/11/23
Y1 - 2014/11/23
N2 - An security communication model for vehicular clouds (VC) based on trusted computing was proposed. With the help of a trusted third party, at the beginning of communications services process, the model generated a temporary identity for VC users, namely to anonymize the identity of these users in order to protect user's privacy. And then, during the communication process, the user's identity legitimacy and credibility authentication were verified with the bilinear pairings signature algorithm, which used the random number, key and time stamp effectively. The key and the hash function ensure the signature to be unforgeable, the timestamp ensures that the key is valid during a limit period, and the random number prevents replay attacks. Analysis shows that this model has the credibility, security, anonymity, and the characteristics of the resistance to attack.
AB - An security communication model for vehicular clouds (VC) based on trusted computing was proposed. With the help of a trusted third party, at the beginning of communications services process, the model generated a temporary identity for VC users, namely to anonymize the identity of these users in order to protect user's privacy. And then, during the communication process, the user's identity legitimacy and credibility authentication were verified with the bilinear pairings signature algorithm, which used the random number, key and time stamp effectively. The key and the hash function ensure the signature to be unforgeable, the timestamp ensures that the key is valid during a limit period, and the random number prevents replay attacks. Analysis shows that this model has the credibility, security, anonymity, and the characteristics of the resistance to attack.
KW - Authentication
KW - Cloud computing
KW - Security
KW - Trusted computer systems
KW - Vehicular communication
UR - http://www.scopus.com/inward/record.url?scp=84929392298&partnerID=8YFLogxK
U2 - 10.13245/j.hust.141119
DO - 10.13245/j.hust.141119
M3 - Article
AN - SCOPUS:84929392298
SN - 1671-4512
VL - 42
SP - 102
EP - 105
JO - Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition)
JF - Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition)
IS - 11
ER -