%0 Journal Article %A HAN Ning %A SONG Cheng %A PENG Weiping %T Certificateless Identity Authentication Scheme for Internet of Vehicles in Edge Computing Environment %D 2022 %R 10.13190/j.jbupt.2021-070 %J Journal of Beijing University of Posts and Telecommunications %P 46-51 %V 45 %N 1 %X In order to solve the problem of privacy leakage in the internet of vehicles identity authentication in the current edge computing environment, a new type of internet of vehicles identity authentication scheme is proposed based on bilinear pairing theory. Based on Voronoi diagram, the scheme divides the regional road network and determines the generator coordinates. According to the distance between the generator and the edge node in the area where the vehicle is located and the current load of the edge node, the most suitable edge node is selected for authentication, or it is certified by the cloud edge collaboration technology and the cloud computing center. The scheme uses certificateless authentication method to realize two-way anonymous authentication, and share key generation between vehicles and edge nodes or cloud computing center, vehicles and vehicles. If the authentication process is abnormal, cloud computing center can trace and revoke malicious nodes quickly through the abnormal data. Security analysis verfies that the scheme can satisfy anonymity, unforgeability and traceability. Simulation results show that the proposed scheme can harvest performance in term of computation, communication overhead and rate of arrival. %U https://journal.bupt.edu.cn/EN/10.13190/j.jbupt.2021-070