Abstract
With the development of the internet of vehicles, the safety of the wireless network communication in the internet of vehicles and the privacy protection of users are in need of an immediate solution. In order to address the interception and tampering by an attacker of the contents among the vehicle mobile terminals, and their consequence of the privacy leakage of the location, and the user’s activity tracks and also the consequence of the user’s receiving the wrong information due to the tampering of the message, this essay comes up with a solution of tamper-proof ciphertext of the revised ciphertext policy attribute-based encryption, which to some degree has reduced the risk of the leakage of the user’s information. This solution realize the encryption protection of the contents of the vehicle mobile terminals by destroying the structure extension of the ciphertext, achieves the goal of non-extensibility security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Chang, W., Zheng, H., Wu, J.: On the RSU-based secure distinguishability among vehicular flows. In: IEEE/ACM 25th International Symposium on Quality of Service (IWQoS), pp. 1–6. IEEE (2017)
Peng, X., Shen, Q., Li, W., et al.: Data dissemination based on trajectory for sparse VANETs. J. Softw. 27(Suppl.(1)), 59–70 (2016)
Wang, D., Li, D., Li, X., et al.: An analysis of anonymity on capacity finite social spots based pseudonym changing for location privacy in VANETs. In: 2015 12th International Conference on Fuzzy Systems and Knowledge Discovery, Zhangjiajie, pp. 763–767 (2015)
Bttner, C., Bartels, F., Huss, S.A.: Real-world evaluation of an anonymous authenticated key agreement protocol for vehicular ad-hoc networks. In: IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications, Abu Dhabi, pp. 651–658 (2015)
Rajput, U., Abbas, F., Oh, H.A.: A hierarchical privacy preserving pseudonymous authentication protocol for VANET. IEEE Access PP(99), 1 (2016)
Tyagi, A.K., Sreenath, N.: Location privacy preserving techniques for location based services over road networks. In: International Conference on Communications and Signal Processing, Melmaruvathur, pp. 1319–1326 (2015)
Emara, K.: Location privacy in vehicular networks. In: 2013 IEEE 14th International Symposium on A World of Wireless, Mobile and Multimedia Networks, Madrid, pp. 1–2 (2013)
Li, J., Lu, H., Guizani, M.: ACPN: a novel authentication framework with conditional privacy-preservation and non-repudiation for VANETs. IEEE Trans. Parallel Distrib. Syst. 26(4), pp. 938–948 (2015)
Xie, Y., Wu, L., Zhang, Y., et al.: Anonymous mutual authentication and key agreement protocol in multi-server architecture for VANETs. J. Comput. Res. Dev. 10, 2323–2333 (2016)
Yeh, L.Y., Huang, J.L.: PBS: a portable billing scheme with fine-grained access control for service-oriented vehicular networks. IEEE Trans. Mob. Comput. 13(11), 2606–2619 (2014)
Wang, S., Liang, K., Liu, J.K., et al.: Attribute-based data sharing scheme revisited in cloud computing. IEEE Trans. Inform. Forensics Secur. 11(8), 1 (2016)
Luo, E., Liu, Q., Wang, G.: Hierarchical multi-authority and attribute-based encryption friend discovery scheme in mobile social networks. IEEE Commun. Lett. 20(9), 1772–1775 (2016)
Yadav, U.C., Ali, S.T.: Ciphertext policy-hiding attribute-based encryption. In: International Conference on Advances in Computing, Communications and Informatics (ICACCI), Kochi, pp. 2067–2071 (2015)
Ning, J., Dong, X., Cao, Z., et al.: White-box traceable ciphertext-policy attribute-based encryption supporting flexible attributes. IEEE Trans. Inform. Forensics Secur. 10(6), 1 (2015)
Zhou, Z., Huang, D., Wang, Z.: Efficient privacy-preserving ciphertext-policy attribute-based encryption and broadcast encryption. IEEE Trans. Comput. 64(1), 126–138 (2013)
Wei, J., Liu, W., Hu, X.: Provable secure attribute based authenticated key exchange protocols in the standard model. J. Softw. 25(10), 2397–2408 (2014)
Zhang, S., Wang, G., Liu, Q., et al.: A trajectory privacy-preserving scheme based on query exchange in mobile social networks. Soft. Comput. (2017). https://doi.org/10.1007/s00500-017-2676-6
Phuong, T.V.X., Yang, G., Susilo, W.: Hidden ciphertext policy attribute-based encryption under standard assumptions. IEEE Trans. Inform. Forensics Secur. 11(1), 1 (2015)
Luo, E., Liu, Q., Abawajy, J.H., et al.: Privacy-preserving multi-hop profile-matching protocol for proximity mobile social networks. Future Gener. Comput. Syst. 68, 222–233 (2017)
Zhang, S., Choo Raymond, K.W., Liu, Q., et al.: Enhancing privacy through uniform grid and caching in location-based services. In: Future Generation Computer Systems (2017). https://doi.org/10.1016/j.future.2017.06.022
Xu, J., Wen, Q., Li, W., et al.: Circuit ciphertext-policy attribute-based hybrid encryption with verifiable delegation in cloud computing. IEEE Trans. Parallel Distrib. Syst. 27(1), 119–129 (2016)
Choi, H., Kim, I., Yoo, J.: Secure and efficient protocol for vehicular ad hoc network with privacy preservation. EURASIP J. Wirel. Commun. Netw. 2011(1), 1–15 (2011)
Acknowledgments
This work is supported in part by the National Natural Science Foundation of China under Grants 61632009, 61472451 and 61772194, in part by the Guangdong Provincial Natural Science Foundation under Grant 2017A030308006 and High-Level Talents Program of Higher Education in Guangdong Province under Grant 2016ZJ01.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Wang, Q., Duan, G., Luo, E., Wang, G. (2017). Research on Internet of Vehicles’ Privacy Protection Based on Tamper-Proof with Ciphertext. In: Wang, G., Atiquzzaman, M., Yan, Z., Choo, KK. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2017. Lecture Notes in Computer Science(), vol 10656. Springer, Cham. https://doi.org/10.1007/978-3-319-72389-1_4
Download citation
DOI: https://doi.org/10.1007/978-3-319-72389-1_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-72388-4
Online ISBN: 978-3-319-72389-1
eBook Packages: Computer ScienceComputer Science (R0)