ZTE Communications ›› 2017, Vol. 15 ›› Issue (S2): 47-51.DOI: 10.3969/j.issn.1673-5188.2017.S2.008
• Review • Previous Articles Next Articles
MENG Ziqian1, GUAN Zhi2,3, WU Zhengang4, LI Anran1, CHEN Zhong1
Received:
2017-06-17
Online:
2017-12-25
Published:
2020-04-16
About author:
MENG Ziqian (markmzq@pku.edu.cn) is a Ph.D. candidate of Ministry of Education (MoE) Key Laboratory of Network and Software Security Assurance of Peking University, China. He received his bachelor degree in computer science from Peking University in 2013. He visited Carnegie Mellon University, USA as a visiting scholar for one year in 2016. His current research interests include future Internet architecture, network security, mobility, congestion control and the IoV.|GUAN Zhi (guan@pku.edu.cn) received his Ph.D. degree in computer science from Peking University, China in 2009. He is a faculty member of MoE Key Laboratory of Network and Software Security Assurance of Peking University since 2009. He is an associate professor and his current research interests include cryptography engineering, crypto-currency and cloud security. He gives lectures “Introduction to Information Security” and “Recent Advances in Information Technology” to undergraduates and “Network and Information Security” to master students. He will give the lecture “Practical Applications of Cryptography” to master students of Mannheim University.|WU Zhengang (markzgwu@163.com) received his Bachelor’s degree in engineering from Beijing Institute of Technology, China in 2003. He received his Master’s degree in software engineering and Ph.D. in computer software and theory from Peking University, China in 2015 and 2006 respectively. He is a research engineer at The Third Research Institute of China Electronics Technology Group Corporation (CETC), focusing on computer science and technology. His research interests include mobile Internet security, software engineering and enterprise information system. He has published 7 academic papers as the first author, on security and privacy protection of the mobile Internet.|LI Anran (lianran@pku.edu.cn) obtained B.S. from Beijing Normal University, China and is a graduate student of Information Security Lab., Peking University, China in the third year. His research interests include information security and blockchain. Over the first two years in Information Security Lab., his research focused on cryptology and blockchain technology, and have applied a patent on managing bitcoin address efficient.|CHEN Zhong (zhongchen@pku.edu.cn) received the B.S., M.S. and Ph.D. degrees in computer science from Peking University, China. He is the director of MoE Key Laboratory of Network and Software Security Assurance of Peking University. His research interests include software engineering, information security and future Internet architecture. He is also a member of the IEEE, senior member of China Institute of Electronics, deputy director of China Software Industry Association, fellow and co-chair of professional committee of Information Security and Privacy of China Computer Federation.
Supported by:
MENG Ziqian, GUAN Zhi, WU Zhengang, LI Anran, CHEN Zhong. Security Enhanced Internet of Vehicles with Cloud-Fog-Dew Computing[J]. ZTE Communications, 2017, 15(S2): 47-51.
Security requirement | Description |
---|---|
Data authentication | When data is transferred, the identities of vehicles must be verified |
Data integrity | Transmitted and received data must be checked to ensure that data is delivered correctly |
Data confidentiality | Data must be protected to ensure secret data transmission occurs between different vehicles participating in the IoV |
Access control | In the IoV, vehicles should only access available services that they are entitled to |
Data non-repudiation | A vehicle cannot deny the authenticity of another vehicle |
Availability | The communication between different vehicles should be ensured |
Anti-jamming | Mechanisms should be built to prevent malicious vehicles from sending interfering messages to interrupt the normal communication between vehicles |
Table 1 Security requirements of the IoV
Security requirement | Description |
---|---|
Data authentication | When data is transferred, the identities of vehicles must be verified |
Data integrity | Transmitted and received data must be checked to ensure that data is delivered correctly |
Data confidentiality | Data must be protected to ensure secret data transmission occurs between different vehicles participating in the IoV |
Access control | In the IoV, vehicles should only access available services that they are entitled to |
Data non-repudiation | A vehicle cannot deny the authenticity of another vehicle |
Availability | The communication between different vehicles should be ensured |
Anti-jamming | Mechanisms should be built to prevent malicious vehicles from sending interfering messages to interrupt the normal communication between vehicles |
[1] | K. Golestan, R. Soua, F. Karray, M. S. Kamel , “Situation awareness within the context of connected cars: A comprehensive review and recent trends,” Information Fusion, vol. 29, pp. 68-83, May 2016. doi: 10.1016/j.inffus.2015.08.001. |
[2] | F. Bonomi , “The smart and connected vehicle and the internet of things,” Invited Talk, Workshop on Synchronization in Telecommunication Systems, 2013. |
[3] | J. Contreras, S. Zeadally, J. A. Guerrero-Ibanez , “Internet of vehicles: architecture, protocols, and security,” IEEE Internet of Things Journal, vol. PP, no. 99, pp. 1-1, Apr. 2017. doi: 10.1109/JIOT.2017.2690902. |
[4] | R. Chellappa , “Intermediaries in cloud-computing: a new computing paradigm,” in INFORMS Annual Meeting, Dallas, USA, Oct. 1997. |
[5] | F. Bonomi, R. Milito, J. Zhu, S. Addepalli , “Fog computing and its role in the internet of things,” in Proc. First Edition of MCC workshop on Mobile cloud computing, Helsinki, Finland, 2012, pp. 13-16. doi: 10.1145/2342509.2342513. |
[6] | K. Shenoy, P. Bhokare, U. Pai , “Fog computing future of cloud computing,” International Journal of Science and Research, vol. 4, no. 6, pp. 55-56, Jun. 2015. |
[7] | W. Shi, J. Cao, Q. Zhang, Y. Li, L. Xu , “Edge computing: vision and challenges,” IEEE Internet of Things Journal, vol. 3, no. 5 pp. 637-646, Oct. 2016. doi: 10.1109/JIOT.2016.2579198. |
[8] | J. Cheng, J. Cheng, M. Zhou , et al., “Routing in internet of vehicles: a review,” IEEE Transactions on Intelligent Transportation Systems, vol. 16, no. 5, pp. 2339-2352, Oct. 2015. doi: 10.1109/TITS.2015.2423667. |
[9] | A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, M. Ayyash , “Internet of things: a survey on enabling technologies, protocols, and applications,” IEEE Communications Surveys & Tutorials, vol. 17, no. 4, pp. 2347-2376, 2015. doi: 10.1109/COMST.2015.2444095. |
[10] | B. Mokhtar, M. Azab , “Survey on security issues in vehicular ad hoc networks,” Alexandria Engineering Journal, vol. 54, no. 4, pp. 1115-1126, Dec. 2015. doi: 10.1016/j.aej.2015.07.011. |
[11] | C. Chen, X. Wang, W. Han, B. Zang , “A robust detection of the sybil attack in urban vanets,” in 29th IEEE International Conference on Distributed Computing Systems Workshops, Montreal, Canada, 2009. doi: 10.1109/ICDCSW.2009.48. |
[12] | S. Park, B. Aslam, D. Turgut, C. C. Zou , “Defense against sybil attack in vehicular ad hoc network based on roadside unit support,” in IEEE Military Communications Conference, Boston, USA, 2009. doi: 10.1109/MILCOM.2009.5379844. |
[13] | S. Chang, Y. Qi, H. Zhu, J. Zhao, X. Shen , “Footprint: Detecting sybil attacks in urban vehicular networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 6, pp. 1103-1114, Jun. 2012. doi: 10.1109/TPDS.2011.263. |
[14] | Z. Zhang , et al., “Study on location privacy protection technology of VANET,” Journal on Communications, vol. 33, no. 8, pp. 180-189, 2012. |
[15] | A. R. Beresford and F. Stajano , “Mix zones: user privacy in location-aware services,” in Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, Orlando, USA, 2004. doi: 10.1109/PERCOMW.2004.1276918. |
[16] | H. Xiong, Z. Chen, F. Li , “Efficient and multi-level privacy-preserving communication protocol for VANET,” Computers & Electrical Engineering, vol. 38, no. 3, pp. 573-581, May 2012. doi: 10.1016/j.compeleceng.2011.11.009. |
[17] | J. Chen, M. S. I. Mamun, and A. Miyaji , “An efficient batch verification system and its effect in a real time VANET environment,” Security and Communication Networks, vol. 8, no. 2, pp. 298-310, 2015. doi: 10.1002/sec.980. |
[18] | Lin Xiaodong , et al. “GSIS: a secure and privacy-preserving protocol for vehicular communications,” IEEE Transactions on vehicular technology, vol. 56, no. 6, pp. 3442-3456, Nov. 2007. doi: 10.1109/TVT.2007.906878. |
[19] | J. Zhang and Y. Xu , “Privacy- preserving authentication protocols with efficient verification in VANETs,” International Journal of Communication Systems, vol. 27, no. 12, pp. 3676-3692, 2014. doi: 10.1002/dac.2566. |
[20] | G. Yan, D. Wen, S. Olariu, M. C. Weigle , “Security challenges in vehicular cloud computing,” IEEE Transactions on Intelligent Transportation Systems, vol. 14, no. 1, pp. 284-294, Mar. 2013. doi: 10.1109/TITS.2012.2211870. |
[21] | J. P. Hubaux, S. Capkun, J. Luo , “The security and privacy of smart vehicles,” IEEE Security & Privacy, vol. 2, no. 3, pp. 49-55, May-Jun. 2004. doi: 10.1109/MSP.2004.26. |
[22] | K. Skala, D. Davidovic, E. Afgan, I. Sovic, Z. Sojat , “Scalable distributed computing hierarchy: cloud, fog and dew computing,” Open Journal of Cloud Computing , vol. 2, no. 1, pp. 16-24, 2015. |
[23] | T. Bhatia and A. K. Verma , “Data security in mobile cloud computing paradigm: a survey, taxonomy and open research issues,” The Journal of Supercomputing, vol. 73, no. 6, pp. 2558-2631, Jun. 2017. doi: 10.1007/s11227-016-1945-y. |
[24] | A. Alrawais, A. Alhothaily, C. Hu, X. Cheng , “Fog computing for the internet of things: security and privacy issues,” IEEE Internet Computing, vol. 21, no. 2, pp. 34-42, Mar.-Apr. 2017. doi: 10.1109/MIC.2017.37. |
[25] | A. Rindos and Y. Wang . “Dew computing: the complementary piece of cloud computing,” IEEE International Conferences on Big Data and Cloud Computing (BDCloud), Social Computing and Networking (SocialCom), Sustainable Computing and Communications (SustainCom), Atlanta, USA, 2016. doi: 10.1109/BDCloud-SocialCom-SustainCom.2016.14. |
[1] | YAN Yuna, LIU Ying, NI Tao, LIN Wensheng, LI Lixin. Content Popularity Prediction via Federated Learning in Cache-Enabled Wireless Networks [J]. ZTE Communications, 2023, 21(2): 18-24. |
[2] | ZHANG Weiting, LIANG Haotian, XU Yuhua, ZHANG Chuan. Reliable and Privacy-Preserving Federated Learning with Anomalous Users [J]. ZTE Communications, 2023, 21(1): 15-24. |
[3] | CAO Yinfeng, CAO Jiannong, WANG Yuqin, WANG Kaile, LIU Xun. Security in Edge Blockchains: Attacks and Countermeasures [J]. ZTE Communications, 2022, 20(4): 3-14. |
[4] | TONG Ze, DENG Bowen, ZHENG Lele, ZHANG Tao. Utility-Improved Key-Value Data Collection with Local Differential Privacy for Mobile Devices [J]. ZTE Communications, 2022, 20(4): 15-21. |
[5] | LU Haitao, YAN Xincheng, ZHOU Qiang, DAI Jiulong, LI Rui. Key Intrinsic Security Technologies in 6G Networks [J]. ZTE Communications, 2022, 20(4): 22-31. |
[6] | WANG Pengfei, SONG Wei, SUN Geng, WEI Zongzheng, ZHANG Qiang. Air-Ground Integrated Low-Energy Federated Learning for Secure 6G Communications [J]. ZTE Communications, 2022, 20(4): 32-40. |
[7] | HE Miao, LI Xiangman, NI Jianbing. Physical Layer Security for MmWave Communications: Challenges and Solutions [J]. ZTE Communications, 2022, 20(4): 41-51. |
[8] | LIU Qinbo, JIN Zhihao, WANG Jiabo, LIU Yang, LUO Wenjian. MSRA-Fed: A Communication-Efficient Federated Learning Method Based on Model Split and Representation Aggregate [J]. ZTE Communications, 2022, 20(3): 35-42. |
[9] | TANG Bo, ZHANG Chengming, WANG Kewen, GAO Zhengguang, HAN Bingtao. Neursafe-FL: A Reliable, Efficient, Easy-to- Use Federated Learning Framework [J]. ZTE Communications, 2022, 20(3): 43-53. |
[10] | YAN Xincheng, TENG Huiyun, PING Li, JIANG Zhihong, ZHOU Na. Study on Security of 5G and Satellite Converged Communication Network [J]. ZTE Communications, 2021, 19(4): 79-89. |
[11] | LIU Junyu, YANG Yongjian, WANG En. BPPF: Bilateral Privacy-Preserving Framework for Mobile Crowdsensing [J]. ZTE Communications, 2021, 19(2): 20-28. |
[12] | YANG Howard H., ZHAO Zhongyuan, QUEK Tony Q. S.. Enabling Intelligence at Network Edge:An Overview of Federated Learning [J]. ZTE Communications, 2020, 18(2): 2-10. |
[13] | TANG Kai. Risk Analysis of Industrial InternetIdentity System [J]. ZTE Communications, 2020, 18(1): 44-48. |
[14] | MA Baoluo, CHEN Wenqu, CHI Cheng. Security Risk Analysis Model for Identification and Resolution System of Industrial Internet [J]. ZTE Communications, 2020, 18(1): 49-54. |
[15] | ZHANG Yunyong, XU Lei, TAO Ye. SDN Based Security Services [J]. ZTE Communications, 2018, 16(4): 9-14. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||