Abstract
Message dissemination between the infrastructures and vehicles is the most common operation in the vehicular ad hoc network (VANET). However, only some specific vehicles can access the disseminated message with keys. When other vehicles do need to access this message, they have to send requests to the infrastructures like the trusted authority (TA). TA negotiates with this vehicles and may produce many encryption redundancies for the same message, which costs extra communication and computation overhead. Thus, the proposed scheme adopts attribute-based proxy re-encryption (ABPRE) with privacy protection, which is suitable for one-to-many communication mode in VANET. By shifting the re-encryption work to roadside units (RSUs) and cloud servers, the computation overhead of the trusted authority (TA) is significant reduced. Besides, pseudonym and batch verification are introduced in authentication work to ensure the security. The security analysis shows that our scheme meets the secure requirements of VANET. The simulation evaluates the cost of each phase, which demonstrated that the scheme has a low computation cost and reduces the redundancy work.
Supported by Natural Science Foundation of Jiangxi Province (Grant No. 20202BAB212003), Science and technology project of Jiangxi Provincial Department of Education(GJJ210853).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Lieira, D.D., Quessada, M.S., Cristiani, A.L., De Grande, R.E., Meneguette, R.I.: Mechanism for optimizing resource allocation in VANETs based on the PSO bio-inspired algorithm. In: 2022 18th International Conference on Distributed Computing in Sensor Systems (DCOSS), pp. 283–290 (2022)
Goudarzi, S., et al.: A privacy-preserving authentication scheme based on elliptic curve cryptography and using quotient filter in fog-enabled vanet. Ad Hoc Netw. 128, 102782 (2022)
Zhong, H., Han, S., Cui, J., Zhang, J., Xu, Y.: Privacy-preserving authentication scheme with full aggregation in VANET. Inf. Sci. 476, 211–221 (2019)
Shafiq, M., Tian, Z., Bashir, A.K., Du, X., Guizani, M.: IoT malicious traffic identification using wrapper-based feature selection mechanisms. Comput. Secur. 94, 101863 (2020)
Shafiq, M., Tian, Z., Bashir, A.K., Du, X., Guizani, M.: CorrAUC: a malicious bot-IoT traffic detection method in IoT network using machine-learning techniques. IEEE Internet Things J. 8(5), 3242–3254 (2020)
Chen, L., Li, J., Zhang, Y.: Anonymous certificate-based broadcast encryption with personalized messages. IEEE Trans. Broadcast. 66(4), 867–881 (2020)
Cui, J., Wu, D., Zhang, J., Xu, Y., Zhong, H.: An efficient authentication scheme based on semi-trusted authority in VANETs. IEEE Trans. Veh. Technol. 68(3), 2972–2986 (2019)
Liu, X., Xia, Y., Chen, W., Xiang, Y., Hassan, M.M., Alelaiwi, A.: SEMD: secure and efficient message dissemination with policy enforcement in VANET. J. Comput. Syst. Sci. 82(8), 1316–1328 (2016)
Huang, Q., Li, N., Zhang, Z., Yang, Y.: Secure and privacy-preserving warning message dissemination in cloud-assisted internet of vehicles. In: 2019 IEEE Conference on Communications and Network Security (CNS), pp. 1–8 (2019)
Horng, S.J., Lu, C.C., Zhou, W.: An identity-based and revocable data-sharing scheme in VANETs. IEEE Trans. Veh. Technol. 69(12), 15933–15946 (2020)
Zhong, H., Zhang, S., Cui, J., Wei, L., Liu, L.: Broadcast encryption scheme for v2i communication in VANETs. IEEE Trans. Veh. Technol. 71(3), 2749–2760 (2021)
Liu, X., Chen, W., Xia, Y.: Security-aware information dissemination with fine-grained access control in cooperative multi-RSU of VANETs. IEEE Trans. Intell. Transp. Syst. 23, 2170–2179 (2020)
Ge, C., Susilo, W., Baek, J., Liu, Z., Xia, J., Fang, L.: A verifiable and fair attribute-based proxy re-encryption scheme for data sharing in clouds. IEEE Trans. Dependable Secure Comput. 19, 2907–2919 (2021)
Huang, J.L., Yeh, L.Y., Chien, H.Y.: ABAKA: an anonymous batch authenticated and key agreement scheme for value-added services in vehicular ad hoc networks. IEEE Trans. Veh. Technol. 60(1), 248–262 (2011)
Lewko, A., Okamoto, T., Sahai, A., Takashima, K., Waters, B.: Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 62–91. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-13190-5_4
Jianhong, Z., Min, X., Liying, L.: On the security of a secure batch verification with group testing for VANET. Int. J. Netw. Secur. 16(5), 351–358 (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Liu, Q., Yao, Z., Wu, Z., Xu, Z. (2023). Attribute-Based Proxy Re-encryption with Privacy Protection for Message Dissemination in VANET. In: Goel, S., Gladyshev, P., Nikolay, A., Markowsky, G., Johnson, D. (eds) Digital Forensics and Cyber Crime. ICDF2C 2022. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 508. Springer, Cham. https://doi.org/10.1007/978-3-031-36574-4_23
Download citation
DOI: https://doi.org/10.1007/978-3-031-36574-4_23
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-36573-7
Online ISBN: 978-3-031-36574-4
eBook Packages: Computer ScienceComputer Science (R0)