| Literature DB >> 31881766 |
Lewis Nkenyereye1, Bayu Adhi Tama2, Muhammad K Shahzad3, Yoon-Ho Choi4.
Abstract
Basic safety message (BSM) are messages that contain core elements of a vehicle such as vehicle's size, position, speed, acceleration and others. BSM are lightweight messages that can be regularly broadcast by the vehicles to enable a variety of applications. On the other hand, event-driven message (EDM) are messages generated at the time of occurrence such as accidents or roads sliding and can contain much more heavy elements including pictures, audio or videos. Security, architecture and communication solutions for BSM use cases have been largely documented on in the literature contrary to EDM due to several concerns such as the variant size of EDM, the appropriate architecture along with latency, privacy and security. In this paper, we propose a secure and blockchain based EDM protocol for 5G enabled vehicular edge computing. To offer scalability and latency for the proposed scenario, we adopt a 5G cellular architecture due to its projected features compared to 4G tong-term evaluation (LTE) for vehicular communications. We consider edge computing to provide local processing of EDM that can improve the response time of public agencies (ambulances or rescue teams) that may intervene to the scene. We make use of lightweight multi-receiver signcryption scheme without pairing that offers low time consuming operations, security, privacy and access control. EDM records need to be kept into a distributed system which can guarantee reliability and auditability of EDM. To achieve this, we construct a private blockchain based on the edge nodes to store EDM records. The performance analysis of the proposed protocol confirms its efficiency.Entities:
Keywords: 5G cellular networks; blockchain; multi-receiver signcryption; privacy; security; vehicle edge computing
Year: 2019 PMID: 31881766 PMCID: PMC6983214 DOI: 10.3390/s20010154
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1System architecture.
Measurement of cryptographic operations.
|
| Operations | Time (ms) |
|---|---|---|
|
| Bilinear pairing | 4.5 |
|
| Point scalar multiplication | 0.6 |
|
| Point adddition on ECC | 0.047 |
|
| Exponentiation | 3.9 |
|
| Asymmetric decryption | 0.61 |
|
| Symmetric encryption | 0.51 |
|
| Symmetric decryption | 0.55 |
|
| Execution time of a general hash function | 0.0001 |
Computational cost of signcrypt and designcript (n is number of receiver).
| Phase | Operation |
|---|---|
| Signcryp an EDM |
|
| Designcryp an EDM |
|
Comparison Performance of Proposed Work and literature.
| Scheme | Lightweight | Traceability | Tamper Proof | Privacy | Decentralization | IoT Friendly |
|---|---|---|---|---|---|---|
| Liu et al., [ | Low | YES | Low | Yes | NO | NO |
| Proposed Framework | High | YES | HIGH | YES | HIGH | HIGH |
Figure 2Signcryption/Designcryption time versus Number of Attributes (a) and Signcryption/Designcryption time versus Number Emergency Files (b).
Analysis of Edge node made private blockchain (/second).
| Phase | No Trans/Block | No of ED | Initialization | Request | Response | Matching | Updating |
|---|---|---|---|---|---|---|---|
| 1 | 5 | 10 | 0.022 | 0.44 | 0.15 | 1.89 | 0.0022 |
| 2 | 10 | 10 | 0.022 | 0.61 | 0.26 | 2.56 | 0.0089 |
| 3 | 15 | 10 | 0.022 | 0.98 | 0.63 | 2.29 | 0.014 |
| 4 | 20 | 15 | 0.045 | 1.44 | 0.89 | 3.51 | 0.031 |
| 5 | 25 | 15 | 0.045 | 1.79 | 1.25 | 4.01 | 0.056 |
| 6 | 30 | 15 | 0.045 | 2.14 | 1.67 | 4.98 | 0.17 |
| 7 | 35 | 15 | 0.045 | 4.12 | 3.90 | 6.67 | 0.56 |
Setting of simulation parameters.
| Tools/Parameter | Value/Specification |
|---|---|
| Mobility generation tool | VANETSIM 2.02 |
| Network Simulation tool | ns-3 |
| Data Rate | 1.2 GBps |
| Number-of-vehicle | 200 |
| Number-of-edge nodes | 40 |
| Distance between two edge nodes | 150 m |
| Simulation time | 100 min |
| Wireless protocol | 802.11a |
| Departure interval | 180 s |
| RSU/Edge radius | 800 m |
| mobility model | shortest path |
| Range of EDM size | (1–6 GB) |
Figure 3Overall time overhead (a) and signcryption time overhead (b).