Differentiated Security Architecture for Secure and Efficient Infotainment Data Communication in IoV Networks

被引:6
作者
Fan, Jiani [1 ]
Shar, Lwin Khin [2 ]
Guo, Jiale [1 ]
Yang, Wenzhuo [1 ]
Niyato, Dusit [1 ]
Lam, Kwok-Yan [1 ]
机构
[1] Nanyang Technol Univ, 50 Nanyang Ave, Singapore, Singapore
[2] Singapore Management Univ, 81 Victoria St, Singapore, Singapore
来源
NETWORK AND SYSTEM SECURITY, NSS 2022 | 2022年 / 13787卷
关键词
Internet-of-Vehicles; Key-policy attributed-based encryption; Communication security; Cryptography; Named data networking; Blockchain; AUTHENTICATION; INTERNET; BLOCKCHAIN; MANAGEMENT; SCHEMES;
D O I
10.1007/978-3-031-23020-2_16
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper aims to provide differentiated security protection for infotainment data communication in Internet-of-Vehicle (IoV) networks. The IoV is a network of vehicles that uses various sensors, software, built-in hardware, and communication technologies to enable information exchange between pedestrians, cars, and urban infrastructure. Negligence on the security of infotainment data communication in IoV networks can unintentionally open an easy access point for social engineering attacks. The attacker can spread false information about traffic conditions, mislead drivers in their directions, and interfere with traffic management. Such attacks can also cause distractions to the driver, which has a potential implication for the safety of driving. The existing literature on IoV communication and network security focuses mainly on generic solutions. In a heterogeneous communication network where different types of communication coexist, we can improve the efficiency of security solutions by considering the different security and efficiency requirements of data communications. Hence, we propose a differentiated security mechanism for protecting infotainment data communication in IoV networks. In particular, we first classify data communication in the IoV network, examine the security focus of each data communication, and then develop a differentiated security architecture to provide security protection on a file-to-file basis. Our architecture leverages Named Data Networking (NDN) so that infotainment files can be efficiently circulated throughout the network where any node can own a copy of the file, thus improving the hit ratio for user file requests. In addition, we propose a time-sensitive Key-Policy AttributeBased Encryption (KP-ABE) scheme for sharing subscription-based infotainment data. Coupled with our NDN network, any node in the network can own the file, but only those with a valid subscription can decrypt the file, thus achieving the security of infotainment data distribution while optimizing content distribution efficiency.
引用
收藏
页码:283 / 304
页数:22
相关论文
共 35 条
  • [1] Authentication and privacy schemes for vehicular ad hoc networks (VANETs): A survey
    Ali, Ikram
    Hassan, Alzubair
    Li, Fagen
    [J]. VEHICULAR COMMUNICATIONS, 2019, 16 : 45 - 61
  • [2] Authentication Protocols in Internet of Vehicles: Taxonomy, Analysis, and Challenges
    Bagga, Palak
    Das, Ashok Kumar
    Wazid, Mohammad
    Rodrigues, Joel J. P. C.
    Park, Youngho
    [J]. IEEE ACCESS, 2020, 8 : 54314 - 54344
  • [3] Survey on the Internet of Vehicles: Network Architectures and Applications
    Ji B.
    Zhang X.
    Mumtaz S.
    Han C.
    Li C.
    Wen H.
    Wang D.
    [J]. IEEE Communications Standards Magazine, 2020, 4 (01): : 34 - 41
  • [4] Barrachina J, 2013, IFIP WIREL DAY
  • [5] Caching in Vehicular Named Data Networking: Architecture, Schemes and Future Directions
    Chen, Chen
    Wang, Cong
    Qiu, Tie
    Atiquzzaman, Mohammed
    Wu, Dapeng Oliver
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (04): : 2378 - 2407
  • [6] Datta Pratish, 2016, Progress in Cryptology (AFRICACRYPT 2016). 8th International Conference in Cryptology. Proceedings: LNCS 9646, P325, DOI 10.1007/978-3-319-31517-1_17
  • [7] Deng X., 2022, LNNS, V496, P65, DOI [10.1007/978- 3- 031-08819-3_7, DOI 10.1007/978-3-031-08819-3_7]
  • [8] Fan JN, 2022, Arxiv, DOI arXiv:2202.05023
  • [9] Guo J., 2019, Information Security and Cryptology, V11449, P274, DOI [10.1007/978-3-030-14234-6_15, DOI 10.1007/978-3-030-14234-615]
  • [10] Irvine Cynthia., 2000, NSPW 00 P 2000 WORKS, P91, DOI [10.1145/366173.366195, DOI 10.1145/366173.366195]