Abstract
1. Introduction
2. Related work
3. System models and design goals
4. Preliminaries
5. Proposed protocol
6. Security and performance analysis
7. Conclusion
Acknowledgments
References
Abstract
Current avoidance systems mainly focus on the safety of the car occupants. The surrounding entities including the pedestrians, the cyclists are assumed to use a different avoidance system for their safety. Vehicle speed is reported as one of the major factors that causes such severe road accidents that affect other entities on the road. In response, several solutions have been implemented to control the causalities of over speeding ranging from speed camera, speed detectors to car avoidance systems. However, those solutions have not significantly improved the rate of traffic accidents and their impact. Additionally, the current solutions do not ensure timely notification of all the road users (surrounding vehicle drivers, pedestrians or others) that can alleviate crash causalities in case of fatal traffic accidents. The fifth generation (5G) cellular network is predicted to overcome the current limitations of Internet-of-Vehicles (IoV) by offering fast, low latency and reliable connections to enable IoV based applications. Fog computing has also been proposed to complement IoV by bringing computational entities in nearby proximity of the vehicles. 5G based fog vehicular networks is a new paradigm that empower real-time and low latency services for Intelligent Transportation System (ITS). In this paper we proposed a secure and privacy-preserving collision avoidance system in 5G fog based IoV. The fog devices are used to collect speed violation report (TVR) sent by the vehicles’ speed sensors. The fog nodes aggregate multiple TVRs, verify the signatures on the TVRs and broadcast anonymous notifications to other entities in the vicinity. The protocol makes use of certificateless aggregate signcryption coupled with pseudonymous technique as the building blocks to ensure authentication, integrity, confidentiality and privacy preservation respectively. The batch verification technique is used by the fog devices to allow simultaneous TVRs signature verification for a timely response. The authorization of reporting speed sensors is both guaranteed by the location-based information along with the digital signature to discard all the bogus TVRs. The analysis of the protocol confirms its lightweightness and efficiency.