Abstract
This paper aims to provide differentiated security protection for infotainment data communication in Internet-of-Vehicle (IoV) networks. The IoV is a network of vehicles that uses various sensors, software, built-in hardware, and communication technologies to enable information exchange between pedestrians, cars, and urban infrastructure. Negligence on the security of infotainment data communication in IoV networks can unintentionally open an easy access point for social engineering attacks. The attacker can spread false information about traffic conditions, mislead drivers in their directions, and interfere with traffic management. Such attacks can also cause distractions to the driver, which has a potential implication for the safety of driving. The existing literature on IoV communication and network security focuses mainly on generic solutions. In a heterogeneous communication network where different types of communication coexist, we can improve the efficiency of security solutions by considering the different security and efficiency requirements of data communications. Hence, we propose a differentiated security mechanism for protecting infotainment data communication in IoV networks. In particular, we first classify data communication in the IoV network, examine the security focus of each data communication, and then develop a differentiated security architecture to provide security protection on a file-to-file basis. Our architecture leverages Named Data Networking (NDN) so that infotainment files can be efficiently circulated throughout the network where any node can own a copy of the file, thus improving the hit ratio for user file requests. In addition, we propose a time-sensitive Key-Policy Attribute-Based Encryption (KP-ABE) scheme for sharing subscription-based infotainment data. Coupled with our NDN network, any node in the network can own the file, but only those with a valid subscription can decrypt the file, thus achieving the security of infotainment data distribution while optimizing content distribution efficiency.
This work was supported by Alibaba Group through Alibaba Innovative Research (AIR) Program and Alibaba-NTU Singapore Joint Research Institute (JRI), Nanyang Technological University, Singapore.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
\(\mathcal {M}\) is generally the 256 bits AES key used to encrypt the actual content because the size of the actual content is generally larger than the maximum size of the message that can be encrypted by ABE schemes.
- 2.
They cannot break this game in polynomial time [18].
References
Ali, I., Hassan, A., Li, F.: Authentication and privacy schemes for vehicular ad hoc networks (VANETs): a survey. Veh. Commun. 16, 45–61 (2019)
Bagga, P., Das, A.K., Wazid, M., Rodrigues, J.J.P.C., Park, Y.: Authentication protocols in internet of vehicles: Taxonomy, analysis, and challenges. IEEE Access 8, 54314–54344 (2020). https://doi.org/10.1109/ACCESS.2020.2981397
Barrachina, J., et al.: V2X-d: a vehicular density estimation system that combines V2V and V2I communications. In: 2013 IFIP Wireless Days (WD), pp. 1–6. IEEE (2013)
Chen, C., Wang, C., Qiu, T., Atiquzzaman, M., Wu, D.O.: Caching in vehicular named data networking: architecture, schemes and future directions. IEEE Commun. Surv. Tutor. 22(4), 2378–2407 (2020)
Datta, P., Dutta, R., Mukhopadhyay, S.: Adaptively secure unrestricted attribute-based encryption with subset difference revocation in bilinear groups of prime order. In: Pointcheval, D., Nitaj, A., Rachidi, T. (eds.) AFRICACRYPT 2016. LNCS, vol. 9646, pp. 325–345. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-31517-1_17
Deng, X., Gao, T., Guo, N., Xie, K.: A secure data sharing scheme based on CP-ABE in VANETs. In: Barolli, L. (ed.) Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2022. LNNS, vol. 496, pp. 65–74. Springer, Cham (2022). https://doi.org/10.1007/978-3-031-08819-3_7
Fan, J., et al.: Understanding security in smart city domains from the ant-centric perspective. arXiv (2022). https://doi.org/10.48550/ARXIV.2202.05023. https://arxiv.org/abs/2202.05023
Guo, J., Yang, W., Lam, K.-Y., Yi, X.: Using blockchain to control access to cloud data. In: Guo, F., Huang, X., Yung, M. (eds.) Inscrypt 2018. LNCS, vol. 11449, pp. 274–288. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-14234-6_15
Irvine, C., Levin, T.: Quality of security service. In: Proceedings of the 2000 Workshop on New Security Paradigms, February 2001. https://doi.org/10.1145/366173.366195
Ji, B., et al.: Survey on the internet of vehicles: network architectures and applications. IEEE Commun. Stand. Mag. 4(1), 34–41 (2020). https://doi.org/10.1109/MCOMSTD.001.1900053
Kang, J., Xiong, Z., Niyato, D., Ye, D., Kim, D.I., Zhao, J.: Toward secure blockchain-enabled internet of vehicles: Optimizing consensus management using reputation and contract theory. IEEE Trans. Veh. Technol. 68(3), 2906–2920 (2019)
Khelifi, H., Luo, S., Nour, B., Moungla, H., Ahmed, S.H., Guizani, M.: A blockchain-based architecture for secure vehicular named data networks. Comput. Electr. Eng. 86, 106715 (2020)
Khelifi, H., et al.: Named data networking in vehicular ad hoc networks: state-of-the-art and challenges. IEEE Commun. Surv. Tutor. 22(1), 320–351 (2019)
Lam, K.Y., Mitra, S., Gondesen, F., Yi, X.: Ant-centric IoT security reference architecture-security-by-design for satellite-enabled smart cities. IEEE Internet Things J. 9(8), 5895–5908 (2022). https://doi.org/10.1109/JIOT.2021.3073734
Lei, A., et al.: A blockchain based certificate revocation scheme for vehicular communication systems. Futur. Gener. Comput. Syst. 110, 892–903 (2020)
Li, F., Lam, K.Y., Ni, Z., Niyato, D., Liu, X., Wang, L.: Cognitive carrier resource optimization for internet-of-vehicles in 5g-enhanced smart cities. IEEE Netw., 1–7 (2021). https://doi.org/10.1109/MNET.211.2100340
Lin, C., He, D., Huang, X., Kumar, N., Choo, K.K.R.: BCPPA: a blockchain-based conditional privacy-preserving authentication protocol for vehicular ad hoc networks. IEEE Trans. Intell. Transp. Syst. 22(12), 7408–7420 (2020)
Liu, J.K., Yuen, T.H., Zhang, P., Liang, K.: Time-based direct revocable ciphertext-policy attribute-based encryption with short revocation list. In: Preneel, B., Vercauteren, F. (eds.) ACNS 2018. LNCS, vol. 10892, pp. 516–534. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-93387-0_27
Liu, Y., Wang, Y., Chang, G.: Efficient privacy-preserving dual authentication and key agreement scheme for secure V2V communications in an IoV paradigm. IEEE Trans. Intell. Transp. Syst. 18(10), 2740–2749 (2017). https://doi.org/10.1109/TITS.2017.2657649
Liu, Z., Wang, F., Chen, K., Tang, F.: A new user revocable ciphertext-policy attribute-based encryption with ciphertext update. Secur. Commun. Netw. 2020 (2020)
Mollah, M.B., et al.: Blockchain for the internet of vehicles towards intelligent transportation systems: a survey. IEEE Internet Things J. 8(6), 4157–4185 (2020)
Ren, Y., Zhu, F., Wang, J., Sharma, P.K., Ghosh, U.: Novel vote scheme for decision-making feedback based on blockchain in internet of vehicles. IEEE Trans. Intell. Transp. Syst. 23(2), 1639–1648 (2021)
Salahdine, F., Kaabouch, N.: Social engineering attacks: a survey. Future Internet 11(4) (2019). https://doi.org/10.3390/fi11040089. https://www.mdpi.com/1999-5903/11/4/89
Sharma, S., Kaushik, B.: A survey on internet of vehicles: applications, security issues & solutions. Veh. Commun. 20, 100182 (2019). https://doi.org/10.1016/j.vehcom.2019.100182. https://www.sciencedirect.com/science/article/pii/S2214209619302293
Shi, K., Zhu, L., Zhang, C., Xu, L., Gao, F.: Blockchain-based multimedia sharing in vehicular social networks with privacy protection. Multimedia Tools Appl. 79(11), 8085–8105 (2020)
Son, S., Lee, J., Park, Y., Park, Y., Das, A.K.: Design of blockchain-based lightweight V2I handover authentication protocol for VANET. IEEE Trans. Netw. Sci. Eng. 9, 1346–1358 (2022)
Taha, M.B., Talhi, C., Ould-Slimanec, H.: A cluster of CP-ABE microservices for VANET. Procedia Comput. Sci. 155, 441–448 (2019)
Tan, H., Chung, I.: Secure authentication and key management with blockchain in VANETs. IEEE Access 8, 2482–2498 (2019)
Wang, X., Zhang, J., Schooler, E.M., Ion, M.: Performance evaluation of attribute-based encryption: toward data privacy in the IoT. In: 2014 IEEE International Conference on Communications (ICC), pp. 725–730 (2014). https://doi.org/10.1109/ICC.2014.6883405
Yan, Z., Zeadally, S., Park, Y.J.: A novel vehicular information network architecture based on named data networking (NDN). IEEE Internet Things J. 1(6), 525–532 (2014)
Yang, Y., Wei, L., Wu, J., Long, C., Li, B.: A blockchain-based multidomain authentication scheme for conditional privacy preserving in vehicular ad-hoc network. IEEE Internet Things J. 9(11), 8078–8090 (2021)
Zhang, J., Li, T., Obaidat, M.S., Lin, C., Ma, J.: Enabling efficient data sharing with auditable user revocation for IoV systems. IEEE Syst. J. 16(1), 1355–1366 (2021)
Zhang, L., et al.: Named data networking. ACM SIGCOMM Comput. Commun. Rev. 44(3), 66–73 (2014)
Zhao, Y., Zhang, X., Xie, X., Ding, Y., Kumar, S.: A verifiable hidden policy CP-ABE with decryption testing scheme and its application in VANET. Trans. Emerg. Telecommun. Technol. 33(5), e3785 (2022)
Zhou, H., Xu, W., Chen, J., Wang, W.: Evolutionary V2X technologies toward the internet of vehicles: challenges and opportunities. Proc. IEEE 108(2), 308–323 (2020). https://doi.org/10.1109/JPROC.2019.2961937
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
A Summary of Math Notation and Symbols
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Fan, J., Shar, L.K., Guo, J., Yang, W., Niyato, D., Lam, KY. (2022). Differentiated Security Architecture for Secure and Efficient Infotainment Data Communication in IoV Networks. In: Yuan, X., Bai, G., Alcaraz, C., Majumdar, S. (eds) Network and System Security. NSS 2022. Lecture Notes in Computer Science, vol 13787. Springer, Cham. https://doi.org/10.1007/978-3-031-23020-2_16
Download citation
DOI: https://doi.org/10.1007/978-3-031-23020-2_16
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-23019-6
Online ISBN: 978-3-031-23020-2
eBook Packages: Computer ScienceComputer Science (R0)