Skip to main content

Differentiated Security Architecture for Secure and Efficient Infotainment Data Communication in IoV Networks

  • Conference paper
  • First Online:
Network and System Security (NSS 2022)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13787))

Included in the following conference series:

Abstract

This paper aims to provide differentiated security protection for infotainment data communication in Internet-of-Vehicle (IoV) networks. The IoV is a network of vehicles that uses various sensors, software, built-in hardware, and communication technologies to enable information exchange between pedestrians, cars, and urban infrastructure. Negligence on the security of infotainment data communication in IoV networks can unintentionally open an easy access point for social engineering attacks. The attacker can spread false information about traffic conditions, mislead drivers in their directions, and interfere with traffic management. Such attacks can also cause distractions to the driver, which has a potential implication for the safety of driving. The existing literature on IoV communication and network security focuses mainly on generic solutions. In a heterogeneous communication network where different types of communication coexist, we can improve the efficiency of security solutions by considering the different security and efficiency requirements of data communications. Hence, we propose a differentiated security mechanism for protecting infotainment data communication in IoV networks. In particular, we first classify data communication in the IoV network, examine the security focus of each data communication, and then develop a differentiated security architecture to provide security protection on a file-to-file basis. Our architecture leverages Named Data Networking (NDN) so that infotainment files can be efficiently circulated throughout the network where any node can own a copy of the file, thus improving the hit ratio for user file requests. In addition, we propose a time-sensitive Key-Policy Attribute-Based Encryption (KP-ABE) scheme for sharing subscription-based infotainment data. Coupled with our NDN network, any node in the network can own the file, but only those with a valid subscription can decrypt the file, thus achieving the security of infotainment data distribution while optimizing content distribution efficiency.

This work was supported by Alibaba Group through Alibaba Innovative Research (AIR) Program and Alibaba-NTU Singapore Joint Research Institute (JRI), Nanyang Technological University, Singapore.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
eBook
USD 89.00
Price excludes VAT (USA)
Softcover Book
USD 119.99
Price excludes VAT (USA)

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    \(\mathcal {M}\) is generally the 256 bits AES key used to encrypt the actual content because the size of the actual content is generally larger than the maximum size of the message that can be encrypted by ABE schemes.

  2. 2.

    They cannot break this game in polynomial time [18].

References

  1. Ali, I., Hassan, A., Li, F.: Authentication and privacy schemes for vehicular ad hoc networks (VANETs): a survey. Veh. Commun. 16, 45–61 (2019)

    Google Scholar 

  2. Bagga, P., Das, A.K., Wazid, M., Rodrigues, J.J.P.C., Park, Y.: Authentication protocols in internet of vehicles: Taxonomy, analysis, and challenges. IEEE Access 8, 54314–54344 (2020). https://doi.org/10.1109/ACCESS.2020.2981397

    Article  Google Scholar 

  3. Barrachina, J., et al.: V2X-d: a vehicular density estimation system that combines V2V and V2I communications. In: 2013 IFIP Wireless Days (WD), pp. 1–6. IEEE (2013)

    Google Scholar 

  4. Chen, C., Wang, C., Qiu, T., Atiquzzaman, M., Wu, D.O.: Caching in vehicular named data networking: architecture, schemes and future directions. IEEE Commun. Surv. Tutor. 22(4), 2378–2407 (2020)

    Article  Google Scholar 

  5. Datta, P., Dutta, R., Mukhopadhyay, S.: Adaptively secure unrestricted attribute-based encryption with subset difference revocation in bilinear groups of prime order. In: Pointcheval, D., Nitaj, A., Rachidi, T. (eds.) AFRICACRYPT 2016. LNCS, vol. 9646, pp. 325–345. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-31517-1_17

    Chapter  Google Scholar 

  6. Deng, X., Gao, T., Guo, N., Xie, K.: A secure data sharing scheme based on CP-ABE in VANETs. In: Barolli, L. (ed.) Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2022. LNNS, vol. 496, pp. 65–74. Springer, Cham (2022). https://doi.org/10.1007/978-3-031-08819-3_7

  7. Fan, J., et al.: Understanding security in smart city domains from the ant-centric perspective. arXiv (2022). https://doi.org/10.48550/ARXIV.2202.05023. https://arxiv.org/abs/2202.05023

  8. Guo, J., Yang, W., Lam, K.-Y., Yi, X.: Using blockchain to control access to cloud data. In: Guo, F., Huang, X., Yung, M. (eds.) Inscrypt 2018. LNCS, vol. 11449, pp. 274–288. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-14234-6_15

    Chapter  Google Scholar 

  9. Irvine, C., Levin, T.: Quality of security service. In: Proceedings of the 2000 Workshop on New Security Paradigms, February 2001. https://doi.org/10.1145/366173.366195

  10. Ji, B., et al.: Survey on the internet of vehicles: network architectures and applications. IEEE Commun. Stand. Mag. 4(1), 34–41 (2020). https://doi.org/10.1109/MCOMSTD.001.1900053

    Article  Google Scholar 

  11. Kang, J., Xiong, Z., Niyato, D., Ye, D., Kim, D.I., Zhao, J.: Toward secure blockchain-enabled internet of vehicles: Optimizing consensus management using reputation and contract theory. IEEE Trans. Veh. Technol. 68(3), 2906–2920 (2019)

    Article  Google Scholar 

  12. Khelifi, H., Luo, S., Nour, B., Moungla, H., Ahmed, S.H., Guizani, M.: A blockchain-based architecture for secure vehicular named data networks. Comput. Electr. Eng. 86, 106715 (2020)

    Article  Google Scholar 

  13. Khelifi, H., et al.: Named data networking in vehicular ad hoc networks: state-of-the-art and challenges. IEEE Commun. Surv. Tutor. 22(1), 320–351 (2019)

    Article  Google Scholar 

  14. Lam, K.Y., Mitra, S., Gondesen, F., Yi, X.: Ant-centric IoT security reference architecture-security-by-design for satellite-enabled smart cities. IEEE Internet Things J. 9(8), 5895–5908 (2022). https://doi.org/10.1109/JIOT.2021.3073734

    Article  Google Scholar 

  15. Lei, A., et al.: A blockchain based certificate revocation scheme for vehicular communication systems. Futur. Gener. Comput. Syst. 110, 892–903 (2020)

    Article  Google Scholar 

  16. Li, F., Lam, K.Y., Ni, Z., Niyato, D., Liu, X., Wang, L.: Cognitive carrier resource optimization for internet-of-vehicles in 5g-enhanced smart cities. IEEE Netw., 1–7 (2021). https://doi.org/10.1109/MNET.211.2100340

  17. Lin, C., He, D., Huang, X., Kumar, N., Choo, K.K.R.: BCPPA: a blockchain-based conditional privacy-preserving authentication protocol for vehicular ad hoc networks. IEEE Trans. Intell. Transp. Syst. 22(12), 7408–7420 (2020)

    Article  Google Scholar 

  18. Liu, J.K., Yuen, T.H., Zhang, P., Liang, K.: Time-based direct revocable ciphertext-policy attribute-based encryption with short revocation list. In: Preneel, B., Vercauteren, F. (eds.) ACNS 2018. LNCS, vol. 10892, pp. 516–534. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-93387-0_27

    Chapter  Google Scholar 

  19. Liu, Y., Wang, Y., Chang, G.: Efficient privacy-preserving dual authentication and key agreement scheme for secure V2V communications in an IoV paradigm. IEEE Trans. Intell. Transp. Syst. 18(10), 2740–2749 (2017). https://doi.org/10.1109/TITS.2017.2657649

    Article  Google Scholar 

  20. Liu, Z., Wang, F., Chen, K., Tang, F.: A new user revocable ciphertext-policy attribute-based encryption with ciphertext update. Secur. Commun. Netw. 2020 (2020)

    Google Scholar 

  21. Mollah, M.B., et al.: Blockchain for the internet of vehicles towards intelligent transportation systems: a survey. IEEE Internet Things J. 8(6), 4157–4185 (2020)

    Article  Google Scholar 

  22. Ren, Y., Zhu, F., Wang, J., Sharma, P.K., Ghosh, U.: Novel vote scheme for decision-making feedback based on blockchain in internet of vehicles. IEEE Trans. Intell. Transp. Syst. 23(2), 1639–1648 (2021)

    Article  Google Scholar 

  23. Salahdine, F., Kaabouch, N.: Social engineering attacks: a survey. Future Internet 11(4) (2019). https://doi.org/10.3390/fi11040089. https://www.mdpi.com/1999-5903/11/4/89

  24. Sharma, S., Kaushik, B.: A survey on internet of vehicles: applications, security issues & solutions. Veh. Commun. 20, 100182 (2019). https://doi.org/10.1016/j.vehcom.2019.100182. https://www.sciencedirect.com/science/article/pii/S2214209619302293

  25. Shi, K., Zhu, L., Zhang, C., Xu, L., Gao, F.: Blockchain-based multimedia sharing in vehicular social networks with privacy protection. Multimedia Tools Appl. 79(11), 8085–8105 (2020)

    Google Scholar 

  26. Son, S., Lee, J., Park, Y., Park, Y., Das, A.K.: Design of blockchain-based lightweight V2I handover authentication protocol for VANET. IEEE Trans. Netw. Sci. Eng. 9, 1346–1358 (2022)

    Article  MathSciNet  Google Scholar 

  27. Taha, M.B., Talhi, C., Ould-Slimanec, H.: A cluster of CP-ABE microservices for VANET. Procedia Comput. Sci. 155, 441–448 (2019)

    Article  Google Scholar 

  28. Tan, H., Chung, I.: Secure authentication and key management with blockchain in VANETs. IEEE Access 8, 2482–2498 (2019)

    Article  Google Scholar 

  29. Wang, X., Zhang, J., Schooler, E.M., Ion, M.: Performance evaluation of attribute-based encryption: toward data privacy in the IoT. In: 2014 IEEE International Conference on Communications (ICC), pp. 725–730 (2014). https://doi.org/10.1109/ICC.2014.6883405

  30. Yan, Z., Zeadally, S., Park, Y.J.: A novel vehicular information network architecture based on named data networking (NDN). IEEE Internet Things J. 1(6), 525–532 (2014)

    Article  Google Scholar 

  31. Yang, Y., Wei, L., Wu, J., Long, C., Li, B.: A blockchain-based multidomain authentication scheme for conditional privacy preserving in vehicular ad-hoc network. IEEE Internet Things J. 9(11), 8078–8090 (2021)

    Article  Google Scholar 

  32. Zhang, J., Li, T., Obaidat, M.S., Lin, C., Ma, J.: Enabling efficient data sharing with auditable user revocation for IoV systems. IEEE Syst. J. 16(1), 1355–1366 (2021)

    Article  Google Scholar 

  33. Zhang, L., et al.: Named data networking. ACM SIGCOMM Comput. Commun. Rev. 44(3), 66–73 (2014)

    Article  Google Scholar 

  34. Zhao, Y., Zhang, X., Xie, X., Ding, Y., Kumar, S.: A verifiable hidden policy CP-ABE with decryption testing scheme and its application in VANET. Trans. Emerg. Telecommun. Technol. 33(5), e3785 (2022)

    Google Scholar 

  35. Zhou, H., Xu, W., Chen, J., Wang, W.: Evolutionary V2X technologies toward the internet of vehicles: challenges and opportunities. Proc. IEEE 108(2), 308–323 (2020). https://doi.org/10.1109/JPROC.2019.2961937

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jiani Fan .

Editor information

Editors and Affiliations

A Summary of Math Notation and Symbols

A Summary of Math Notation and Symbols

See Table 3.

Table 3. A summary of math notation and symbols.

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Fan, J., Shar, L.K., Guo, J., Yang, W., Niyato, D., Lam, KY. (2022). Differentiated Security Architecture for Secure and Efficient Infotainment Data Communication in IoV Networks. In: Yuan, X., Bai, G., Alcaraz, C., Majumdar, S. (eds) Network and System Security. NSS 2022. Lecture Notes in Computer Science, vol 13787. Springer, Cham. https://doi.org/10.1007/978-3-031-23020-2_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-23020-2_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-23019-6

  • Online ISBN: 978-3-031-23020-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics