Secure and Privacy Preserving Protocol for Cloud-Based Vehicular DTNs

被引:114
作者
Zhou, Jun [1 ]
Dong, Xiaolei [1 ]
Cao, Zhenfu [1 ]
Vasilakos, Athanasios V. [2 ]
机构
[1] E China Normal Univ, Shanghai Key Lab Trustworthy Comp, Shanghai 200062, Peoples R China
[2] Natl Tech Univ Athens, Dept Elect & Comp Engn, GR-10682 Athens, Greece
基金
中国国家自然科学基金; 高等学校博士学科点专项科研基金;
关键词
Cloud computing; security and privacy; delay tolerant network; VANETs; INCENTIVE PROTOCOL; NETWORKS; SCHEME; GREEN;
D O I
10.1109/TIFS.2015.2407326
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud-assisted vehicular delay tolerant networks (DTNs) have been utilized in wide-ranging applications where a continuous end-to-end connection is unavailable, the message transmission is fulfilled by the cooperation among vehicular nodes and follows a store-carry-and-forward manner, and the complex computational work can be delegated to the disengaged vehicles in the parking lots which constitute the potential vehicular cloud. Nevertheless, the existing incentive schemes as well as the packet forwarding protocols cannot well model continuous vehicle collaboration, resist vehicle compromise attacks and collusion attacks, leaving the privacy preservation issues untouched. In this paper, a novel threshold credit-based incentive mechanism (TCBI) is proposed based on the modified model of population dynamics to efficiently resist the node compromise attacks, stimulate the cooperation among intermediate nodes, maximize vehicular nodes' interest, and realize the fairness of possessing the same opportunity of transmitting packets for credits. Then, a TCBI-based privacy-preserving packet forwarding protocol is proposed to solve the open problem of resisting layer-adding attack by outsourcing the privacy-preserving aggregated transmission evidence generation for multiple resource-constrained vehicles to the cloud side from performing any one-way trapdoor function only once. The vehicle privacy is well protected from both the cloud and transportation manager. Finally, formal security proof and the extensive simulation show the effectiveness of our proposed TCBI in resisting the sophisticated attacks and the efficiency in terms of high reliability, high delivery ratio, and low average delay in cloud-assisted vehicular DTNs.
引用
收藏
页码:1299 / 1314
页数:16
相关论文
共 34 条
[1]  
[Anonymous], 2013, P 8 INT C BOD AR NET, P488, DOI [DOI 10.4108/ICST.BODYNETS.2013.253731, 10.4108/icst.bodynets.2013.253731]
[2]  
[Anonymous], 1993, ACM CCS 1993, DOI DOI 10.1145/168588.168596
[3]  
Barbosa M, 2012, LECT NOTES COMPUT SC, V7178, P296, DOI 10.1007/978-3-642-27954-6_19
[4]  
Boldyreva A, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P276
[5]   VWCA: An efficient clustering algorithm in vehicular ad hoc networks [J].
Daeinabi, Ameneh ;
Rahbar, Akbar Ghaffar Pour ;
Khademzadeh, Ahmad .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (01) :207-222
[6]  
Diffie W., 1992, Designs, Codes and Cryptography, V2, P107, DOI 10.1007/BF00124891
[7]  
Fall K, 2003, ACM SIGCOMM COMP COM, V33, P27
[8]  
Fan P, 2005, LECT NOTES COMPUT SC, V3738, P32, DOI 10.1007/11561354_5
[9]  
Fiore D., 2012, P ACM C COMP COMM SE, P501, DOI 10.1145/2382196.2382250
[10]   Securing m-healthcare social networks: Challenges, countermeasures and future directions [J].
1600, Institute of Electrical and Electronics Engineers Inc., United States (20) :12-21