2020
DOI: 10.1109/jiot.2019.2953188
|View full text |Cite
|
Sign up to set email alerts
|

SPIR: A Secure and Privacy-Preserving Incentive Scheme for Reliable Real-Time Map Updates

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
19
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 43 publications
(19 citation statements)
references
References 37 publications
0
19
0
Order By: Relevance
“…In the charging(recharging) phase, since CP only compares the received Token with the already saved Token, the time taken can be ignored; in the transaction phase, the detail of computation cost has been analyzed in [20], so we do not discuss these two phases. We will use the calculated time for each cryptography operation that has been measured in [35], where the time used for RSA signature is T Sig = 3.85ms, the time used for RSA verification is T V er = 0.19ms, the time used for public key encryption and decryption is T P E = 3.85ms, T P D = 3.85ms, the time used for encryption and decryption is T Enc = 0.0046ms, T Dec = 0.0046ms, the time used for selecting random number is T RN = 0.539ms, the time used for point multiplication is T P M = 2.226ms, the time used for hash based message authentication is T M AC = 0.0046 and the time used for hash mapping T H 2 = 12.42ms. As shown is Fig.3, during registration the PSS and the EV totally cost 4T P M +3T Sig +3T P E +3T V er +3T P D +2T RN = 45.202ms, of which the PSS costs 2T Sig + 2T P E + 2T P M + T V er + T P D + T RN = 24.431 and the the EV costs 2T V er + 2T P D + T P E + T Sig + T RN + T P M = 20.771ms.…”
Section: A Computation Costmentioning
confidence: 99%
“…In the charging(recharging) phase, since CP only compares the received Token with the already saved Token, the time taken can be ignored; in the transaction phase, the detail of computation cost has been analyzed in [20], so we do not discuss these two phases. We will use the calculated time for each cryptography operation that has been measured in [35], where the time used for RSA signature is T Sig = 3.85ms, the time used for RSA verification is T V er = 0.19ms, the time used for public key encryption and decryption is T P E = 3.85ms, T P D = 3.85ms, the time used for encryption and decryption is T Enc = 0.0046ms, T Dec = 0.0046ms, the time used for selecting random number is T RN = 0.539ms, the time used for point multiplication is T P M = 2.226ms, the time used for hash based message authentication is T M AC = 0.0046 and the time used for hash mapping T H 2 = 12.42ms. As shown is Fig.3, during registration the PSS and the EV totally cost 4T P M +3T Sig +3T P E +3T V er +3T P D +2T RN = 45.202ms, of which the PSS costs 2T Sig + 2T P E + 2T P M + T V er + T P D + T RN = 24.431 and the the EV costs 2T V er + 2T P D + T P E + T Sig + T RN + T P M = 20.771ms.…”
Section: A Computation Costmentioning
confidence: 99%
“…Some privacy-preserving incentive mechanisms (PPIMs) have been proposed for protecting vehicles' privacy in VCS. However, these schemes either rely on a central platform [4] or lack of considering the fairness of the incentive mechanism [5], leading to collusion attack [6], potential privacy disclosure, or inadequate incentive. As the most popular distributed technology, blockchain has enabled incentive mechanism in VCS for secured authentication and collusion attack resistance.…”
Section: Introductionmentioning
confidence: 99%
“…To be specific, smart contracts running on the blockchain take the place of the centralized platform to run the incentive mechanisms, which handles all interactions and overcomes the challenges of centralized execution, e.g., collusions between TA and RSUs, RSUs and vehicles. Although a few blockchain-based PPIMs [4,5,7] have been proposed, they either need a trusted third party to assist the privacy protection [4,7] or lack the fairness of the payments [5].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Although cloud computing seems to be a potential solution to address the resources shortage problem, it suffers high communication expenses and high transmission delay due to the involvement of the core network [2]. In order to reduce the transmission delay, the concept of mobile edge computing (MEC) was investigated extensively in recent years with the main idea of moving the computation resources from the cloud to the edge of the network [1, 3, 4]. Although the computing capability of a single edge server is not as powerful as that of the cloud server, the low communication delay and the large number of cooperatively working edge servers make the total delay lower than the cloud computing.…”
Section: Introductionmentioning
confidence: 99%