Secure and Efficient Data Sharing in Dynamic Vehicular Networks

被引:15
作者
Shen, Jian [1 ,2 ,3 ]
Zhou, Tianqi [4 ]
Lai, Jinfeng [5 ]
Li, Pan [6 ]
Moh, Sangman [7 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Jiangsu Engn Ctr Network Monitoring, Nanjing 210044, Peoples R China
[2] State Key Lab Cryptol, Beijing 100878, Peoples R China
[3] Peng Cheng Lab, Cyberspace Secur Res Ctr, Shenzhen 518000, Peoples R China
[4] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing 210044, Peoples R China
[5] Univ Elect Sci & Technol China, Sch Informat & Commun Engn, Chengdu 611731, Peoples R China
[6] Case Western Reserve Univ, Dept Elect Engn & Comp Sci, Cleveland, OH 44106 USA
[7] Chosun Univ, Dept Comp Engn, Gwangju 61452, South Korea
基金
中国国家自然科学基金;
关键词
Shift registers; Vehicle dynamics; Wireless communication; Encryption; Topology; Public key; Data sharing; key updating; shift register; symmetric balanced incomplete block design (SBIBD); vehicular ad hoc networks (VANETs); AUTHENTICATION; FRAMEWORK;
D O I
10.1109/JIOT.2020.2985324
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of wireless communication and the pervasive Internet of Things, vehicular ad hoc networks (VANETs) have attracted much attention in recent years. As a platform for vehicular communication and management, VANETs require the guarantee of security and efficiency for the resources constrained and unreliable networks. In this article, a data-sharing scheme is proposed for VANETs where both efficient key updating and dynamic property of VANETs are supported. In particular, the symmetric balanced incomplete block design (SBIBD) in combinatorics is introduced to ensure secure and efficient VANETs while the concept of indistinguishability obfuscation is employed to support efficient key updating. In order to simultaneously satisfy the resources constrained and real-time requirements of VANETs, both serial and parallel construction of the SBIBD is implemented by the shift register. Taking advantage of this efficient sequential logical circuit, we eliminate the complicated construction of the SBIBD, thereby, making it effective for the resource-constrained environment. Theoretical and experimental analyses indicate that the proposed scheme is practical for VANETs with high security and efficiency.
引用
收藏
页码:8208 / 8217
页数:10
相关论文
共 37 条
[1]   Vehicular Networks for a Greener Environment: A Survey [J].
Alsabaan, Maazen ;
Alasmary, Waleed ;
Albasir, Abdurhman ;
Naik, Kshirasagar .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (03) :1372-1388
[2]   A Holistic Approach to the Integration of Safety Applications: The INSAFES Subproject Within the European Framework Programme 6 Integrating Project PReVENT [J].
Amditis, Angelos ;
Bertolazzi, Enrico ;
Bimpas, Matthaios ;
Biral, Francesco ;
Bosetti, Paolo ;
Da Lio, Mauro ;
Danielsson, Lars ;
Gallione, Alessandro ;
Lind, Henrik ;
Saroldi, Andrea ;
Sjogren, Agneta .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2010, 11 (03) :554-566
[3]   On the (Im)possibility of Obfuscating Programs [J].
Barak, Boaz ;
Goldreich, Oded ;
Impagliazzo, Russell ;
Rudich, Steven ;
Sahai, Amit ;
Vadhan, Salil ;
Yang, Ke .
JOURNAL OF THE ACM, 2012, 59 (02)
[4]  
Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122
[5]  
Blum J., 2004, IT Professional, V6, P24, DOI 10.1109/MITP.2004.1265539
[6]   Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection [J].
Chen, Xiao ;
Li, Chaoran ;
Wang, Derui ;
Wen, Sheng ;
Zhang, Jun ;
Nepal, Surya ;
Xiang, Yang ;
Ren, Kui .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 :987-1001
[7]   Verifiable Computation over Large Database with Incremental Updates [J].
Chen, Xiaofeng ;
Li, Jin ;
Weng, Jian ;
Ma, Jianfeng ;
Lou, Wenjing .
IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (10) :3184-3195
[8]  
Colbourn C. J., 2006, Handbook of Combinatorial Designs, Discrete Mathematics and Its Applications, Vsecond edn.
[9]   Data-Driven Cyber Security in Perspective-Intelligent Traffic Analysis [J].
Coulter, Rory ;
Han, Qing-Long ;
Pan, Lei ;
Zhang, Jun ;
Xiang, Yang .
IEEE TRANSACTIONS ON CYBERNETICS, 2020, 50 (07) :3081-3093
[10]   Key-aggregate authentication cryptosystem for data sharing in dynamic cloud storage [J].
Guo, Cheng ;
Luo, Ningqi ;
Bhuiyan, Md Zakirul Alam ;
Jie, Yingmo ;
Chen, Yuanfang ;
Feng, Bin ;
Alam, Muhammad .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 84 :190-199