Skip to main content
Top
Published in: Telecommunication Systems 3/2017

08-03-2017

ESSPR: an efficient secure routing scheme based on searchable encryption with vehicle proxy re-encryption for vehicular peer-to-peer social network

Authors: Mohamed Amine Ferrag, Ahmed Ahmim

Published in: Telecommunication Systems | Issue 3/2017

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In this paper, we propose an Efficient Secure routing Scheme based on searchable encryption with vehicle Proxy Re-encryption, called ESSPR, for achieving privacy preservation of message in vehicular peer-to-peer social network (VP2PSN). Specifically, the proposed ESSPR scheme consists of six phases: system initializations phase, peer registration phase, document generation phase, document forwarding phase, vehicle proxy re-encryption phase, and document receiving phase. Based on rationale of QoS-based clustering strategy, public key encryption with keyword search, identity based aggregate signature, and proxy re-encryption, ESSPR provides privacy for keyword, privacy for resources, and authentication and data integrity of the demand’s source. In addition, ESSPR is robust against eavesdropping attack, wormhole attack, packet analysis attack, packet tracing attack, and replay attack. Through performance evaluation, we demonstrate the effectiveness of ESSPR in terms of delivery ratio, average delay, average fairness, and detection ratio under malicious peers proportions in VP2PSN.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Lu, R., Lin, X., Liang, X., & Shen, X. (2010). Sacrificing the plum tree for the peach tree: A socialspot tactic for protecting receiver-location privacy in VANET. In GLOBECOM-IEEE global telecommunications conference. doi:10.1109/GLOCOM.2010.5683313. Lu, R., Lin, X., Liang, X., & Shen, X. (2010). Sacrificing the plum tree for the peach tree: A socialspot tactic for protecting receiver-location privacy in VANET. In GLOBECOM-IEEE global telecommunications conference. doi:10.​1109/​GLOCOM.​2010.​5683313.
3.
go back to reference Gerla, M., Lee, E.K., Pau, G., & Lee, U. (2014). Internet of vehicles: From intelligent grid to autonomous cars and vehicular clouds. In Internet of things (WF-IoT), 2014 IEEE World Forum on, IEEE, pp. 241–246. Gerla, M., Lee, E.K., Pau, G., & Lee, U. (2014). Internet of vehicles: From intelligent grid to autonomous cars and vehicular clouds. In Internet of things (WF-IoT), 2014 IEEE World Forum on, IEEE, pp. 241–246.
4.
go back to reference Jiau, M.-K., Huang, S.-C., Hwang, J.-N., & Vasilakos, A. V. (2015). Multimedia services in cloud-based vehicular networks. IEEE Intelligent Transportation Systems Magazine, 7(3), 62–79.CrossRef Jiau, M.-K., Huang, S.-C., Hwang, J.-N., & Vasilakos, A. V. (2015). Multimedia services in cloud-based vehicular networks. IEEE Intelligent Transportation Systems Magazine, 7(3), 62–79.CrossRef
5.
go back to reference Han, W., & Xiao, Y. (2016). Privacy preservation for v2g networks in smart grid: A survey. Computer Communications, 91, 17–28.CrossRef Han, W., & Xiao, Y. (2016). Privacy preservation for v2g networks in smart grid: A survey. Computer Communications, 91, 17–28.CrossRef
7.
8.
go back to reference Lu, R., Lin, X., & Shen, X. (2010) SPRING: A social-based privacy-preserving packet forwarding protocol for vehicular delay tolerant networks. In Proceedings-IEEE INFOCOM. doi:10.1109/INFCOM.2010.5462161. Lu, R., Lin, X., & Shen, X. (2010) SPRING: A social-based privacy-preserving packet forwarding protocol for vehicular delay tolerant networks. In Proceedings-IEEE INFOCOM. doi:10.​1109/​INFCOM.​2010.​5462161.
9.
go back to reference Ferrag, M. A., Nafa, M., & Ghanemi, S. (2014). SDPP: An intelligent secure detection scheme with strong privacy-preserving for mobile peer-to-peer social network. International Journal of Information and Computer Security, 6(3), 241–269. doi:10.1504/IJICS.2014.066650.CrossRef Ferrag, M. A., Nafa, M., & Ghanemi, S. (2014). SDPP: An intelligent secure detection scheme with strong privacy-preserving for mobile peer-to-peer social network. International Journal of Information and Computer Security, 6(3), 241–269. doi:10.​1504/​IJICS.​2014.​066650.CrossRef
10.
go back to reference Ferrag, M. A., Nafa, M., & Ghanemi, S. (2016). EPSA: An efficient and privacy preserving scheme against wormhole attack on reactive routing for mobile ad hoc social networks. International Journal of Security and Networks, 11(3), 107–125. doi:10.1504/IJSN.2016.10000172.CrossRef Ferrag, M. A., Nafa, M., & Ghanemi, S. (2016). EPSA: An efficient and privacy preserving scheme against wormhole attack on reactive routing for mobile ad hoc social networks. International Journal of Security and Networks, 11(3), 107–125. doi:10.​1504/​IJSN.​2016.​10000172.CrossRef
13.
go back to reference Lu, R., Lin, X., Liang, X., & Shen, X. (2012). A dynamic privacy-preserving key management scheme for location-based services in VANETs. IEEE Transactions on Intelligent Transportation Systems, 13(1), 127–139. doi:10.1109/TITS.2011.2164068.CrossRef Lu, R., Lin, X., Liang, X., & Shen, X. (2012). A dynamic privacy-preserving key management scheme for location-based services in VANETs. IEEE Transactions on Intelligent Transportation Systems, 13(1), 127–139. doi:10.​1109/​TITS.​2011.​2164068.CrossRef
14.
go back to reference Lu, R., Lin, X., Luan, T. H., Liang, X., & Shen, X. (2012). Pseudonym changing at social spots: An effective strategy for location privacy in VANETs. IEEE Transactions on Vehicular Technology, 61(1), 86–96. doi:10.1109/TVT.2011.2162864.CrossRef Lu, R., Lin, X., Luan, T. H., Liang, X., & Shen, X. (2012). Pseudonym changing at social spots: An effective strategy for location privacy in VANETs. IEEE Transactions on Vehicular Technology, 61(1), 86–96. doi:10.​1109/​TVT.​2011.​2162864.CrossRef
16.
go back to reference Sun, Y., Lin, X., Lu, R., Shen, X., & Su, J. (2010). Roadside units deployment for efficient short-time certificate updating in VANETs. In IEEE international conference on communications. doi:10.1109/ICC.2010.5502183. Sun, Y., Lin, X., Lu, R., Shen, X., & Su, J. (2010). Roadside units deployment for efficient short-time certificate updating in VANETs. In IEEE international conference on communications. doi:10.​1109/​ICC.​2010.​5502183.
17.
18.
go back to reference Lin, X., Sun, X., Ho, P. H., & Shen, X. (2007). GSIS: A secure and privacy-preserving protocol for vehicular communications. IEEE Transactions on Vehicular Technology, 56(6 I), 3442–3456. doi:10.1109/TVT.2007.906878. Lin, X., Sun, X., Ho, P. H., & Shen, X. (2007). GSIS: A secure and privacy-preserving protocol for vehicular communications. IEEE Transactions on Vehicular Technology, 56(6 I), 3442–3456. doi:10.​1109/​TVT.​2007.​906878.
19.
go back to reference Lin, X., Sun, X., Wang, X., Zhang, C., Ho, P. H., & Shen, X. (2008). TSVC: Timed efficient and secure vehicular communications with privacy preserving. IEEE Transactions on Wireless Communications, 7(12), 4987–4998. doi:10.1109/T-WC.2008.070773.CrossRef Lin, X., Sun, X., Wang, X., Zhang, C., Ho, P. H., & Shen, X. (2008). TSVC: Timed efficient and secure vehicular communications with privacy preserving. IEEE Transactions on Wireless Communications, 7(12), 4987–4998. doi:10.​1109/​T-WC.​2008.​070773.CrossRef
20.
go back to reference Liang, X., Lin, X., & Shen, X. S. (2014). Enabling trustworthy service evaluation in service-oriented mobile social networks. IEEE Transactions on Parallel and Distributed Systems, 25(2), 310–320. doi:10.1109/TPDS.2013.37.CrossRef Liang, X., Lin, X., & Shen, X. S. (2014). Enabling trustworthy service evaluation in service-oriented mobile social networks. IEEE Transactions on Parallel and Distributed Systems, 25(2), 310–320. doi:10.​1109/​TPDS.​2013.​37.CrossRef
21.
go back to reference Zhang, K., Liang, X., Lu, R., Yang, K., & Shen, X. S. (2015). Exploiting mobile social behaviors for Sybil detection. In Proceedings-IEEE INFOCOM, Vol. 26, pp. 271–279. doi:10.1109/INFOCOM.2015.7218391. Zhang, K., Liang, X., Lu, R., Yang, K., & Shen, X. S. (2015). Exploiting mobile social behaviors for Sybil detection. In Proceedings-IEEE INFOCOM, Vol. 26, pp. 271–279. doi:10.​1109/​INFOCOM.​2015.​7218391.
22.
go back to reference Ferrag, M. A., Nafa, M., & Ghanemi, S. (2013). ECPDR: An efficient conditional privacy-preservation scheme with demand response for secure ad hoc social communications. International Journal of Embedded and Real-Time Communication Systems (IJERTCS), 4(3), 43–71. doi:10.4018/ijertcs.2013070103.CrossRef Ferrag, M. A., Nafa, M., & Ghanemi, S. (2013). ECPDR: An efficient conditional privacy-preservation scheme with demand response for secure ad hoc social communications. International Journal of Embedded and Real-Time Communication Systems (IJERTCS), 4(3), 43–71. doi:10.​4018/​ijertcs.​2013070103.CrossRef
24.
go back to reference Ferrag, M. A., Maglaras, L., & Ahmim, A. Privacy-preserving schemes for ad hoc social networks: A survey, arXiv preprint arXiv:1610.06095. Ferrag, M. A., Maglaras, L., & Ahmim, A. Privacy-preserving schemes for ad hoc social networks: A survey, arXiv preprint arXiv:​1610.​06095.
25.
go back to reference Li, J., Lu, H., & Guizani, M. (2015). ACPN: A novel authentication framework with conditional privacy-preservation and non-repudiation for VANETs. IEEE Transactions on Parallel and Distributed Systems, 26(4), 938–948. doi:10.1109/TPDS.2014.2308215.CrossRef Li, J., Lu, H., & Guizani, M. (2015). ACPN: A novel authentication framework with conditional privacy-preservation and non-repudiation for VANETs. IEEE Transactions on Parallel and Distributed Systems, 26(4), 938–948. doi:10.​1109/​TPDS.​2014.​2308215.CrossRef
26.
go back to reference Lo, N.-W., & Tsai, J.-L. (2016). An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks without pairings. IEEE Transactions on Intelligent Transportation Systems, 17(5), 1319–1328. doi:10.1109/TITS.2015.2502322.CrossRef Lo, N.-W., & Tsai, J.-L. (2016). An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks without pairings. IEEE Transactions on Intelligent Transportation Systems, 17(5), 1319–1328. doi:10.​1109/​TITS.​2015.​2502322.CrossRef
27.
go back to reference Du, S., Zhu, H., Li, X., Ota, K., & Dong, M. (2013). Mixzone in motion: Achieving dynamically cooperative location privacy protection in delay-tolerant networks. IEEE Transactions on Vehicular Technology, 62(9), 4565–4575. doi:10.1109/TVT.2013.2266347.CrossRef Du, S., Zhu, H., Li, X., Ota, K., & Dong, M. (2013). Mixzone in motion: Achieving dynamically cooperative location privacy protection in delay-tolerant networks. IEEE Transactions on Vehicular Technology, 62(9), 4565–4575. doi:10.​1109/​TVT.​2013.​2266347.CrossRef
28.
go back to reference Hu, H., Lu, R., Huang, C., & Zhang, Z. (2016). PTRS: A privacy-preserving trust-based relay selection scheme in VANETs. Peer-to-Peer Networking and Applications,. doi:10.1007/s12083-016-0473-0. Hu, H., Lu, R., Huang, C., & Zhang, Z. (2016). PTRS: A privacy-preserving trust-based relay selection scheme in VANETs. Peer-to-Peer Networking and Applications,. doi:10.​1007/​s12083-016-0473-0.
29.
go back to reference Wang, F., Xu, Y., Zhang, H., Zhang, Y., & Zhu, L. (2016). 2FLIP: A two-factor lightweight privacy-preserving authentication scheme for VANET. IEEE Transactions on Vehicular Technology, 65(2), 896–911. doi:10.1109/TVT.2015.2402166.CrossRef Wang, F., Xu, Y., Zhang, H., Zhang, Y., & Zhu, L. (2016). 2FLIP: A two-factor lightweight privacy-preserving authentication scheme for VANET. IEEE Transactions on Vehicular Technology, 65(2), 896–911. doi:10.​1109/​TVT.​2015.​2402166.CrossRef
30.
go back to reference Zeng, S., Chen, Y., Tan, S., & He, M. (2016). Concurrently deniable ring authentication and its application to LBS in VANETs. Peer-to-Peer Networking and Applications,. doi:10.1007/s12083-016-0433-8. Zeng, S., Chen, Y., Tan, S., & He, M. (2016). Concurrently deniable ring authentication and its application to LBS in VANETs. Peer-to-Peer Networking and Applications,. doi:10.​1007/​s12083-016-0433-8.
31.
go back to reference Ferrag, M.A., Maglaras, L. A., Janicke, H., & Jiang, J. Authentication protocols for internet of things: A comprehensive survey, arXiv preprint arXiv:1612.07206. Ferrag, M.A., Maglaras, L. A., Janicke, H., & Jiang, J. Authentication protocols for internet of things: A comprehensive survey, arXiv preprint arXiv:​1612.​07206.
32.
go back to reference Ferrag, M.A., Maglaras, L.A., Janicke, H., & Jiang, J. A survey on privacy-preserving schemes for smart grid communications, arXiv preprint arXiv:1611.07722. Ferrag, M.A., Maglaras, L.A., Janicke, H., & Jiang, J. A survey on privacy-preserving schemes for smart grid communications, arXiv preprint arXiv:​1611.​07722.
33.
go back to reference Calandriello, G., Papadimitratos, P., Hubaux, J.-P., & Lioy, A. (2007). Efficient and robust pseudonymous authentication in vanet. In Proceedings of the fourth ACM international workshop on vehicular ad hoc networks, ACM, pp. 19–28. Calandriello, G., Papadimitratos, P., Hubaux, J.-P., & Lioy, A. (2007). Efficient and robust pseudonymous authentication in vanet. In Proceedings of the fourth ACM international workshop on vehicular ad hoc networks, ACM, pp. 19–28.
34.
go back to reference Shim, K.-A. (2012). Cpas: An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks. IEEE Transactions on Vehicular Technology, 61(4), 1874–1883.CrossRef Shim, K.-A. (2012). Cpas: An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks. IEEE Transactions on Vehicular Technology, 61(4), 1874–1883.CrossRef
35.
go back to reference Zhang, C., Lu, R., Lin, X., Ho, P.-H., & Shen, X. (2008). An efficient identity-based batch verification scheme for vehicular sensor networks. In INFOCOM 2008. The 27th conference on computer communications. IEEE, IEEE, pp. 246–250. Zhang, C., Lu, R., Lin, X., Ho, P.-H., & Shen, X. (2008). An efficient identity-based batch verification scheme for vehicular sensor networks. In INFOCOM 2008. The 27th conference on computer communications. IEEE, IEEE, pp. 246–250.
36.
go back to reference Vegni, A. M., & Loscri, V. (2015). A survey on vehicular social networks. IEEE Communications Surveys and Tutorials, 17(4), 2397–2419.CrossRef Vegni, A. M., & Loscri, V. (2015). A survey on vehicular social networks. IEEE Communications Surveys and Tutorials, 17(4), 2397–2419.CrossRef
37.
go back to reference Hu, X., Chu, T. H., Leung, V. C., Ngai, E. C.-H., Kruchten, P., & Chan, H. C. (2015). A survey on mobile social networks: Applications, platforms, system architectures, and future research directions. IEEE Communications Surveys and Tutorials, 17(3), 1557–1581.CrossRef Hu, X., Chu, T. H., Leung, V. C., Ngai, E. C.-H., Kruchten, P., & Chan, H. C. (2015). A survey on mobile social networks: Applications, platforms, system architectures, and future research directions. IEEE Communications Surveys and Tutorials, 17(3), 1557–1581.CrossRef
38.
go back to reference Maglaras, L. A., Al-Bayatti, A. H., He, Y., Wagner, I., & Janicke, H. (2016). Social internet of vehicles for smart cities. Journal of Sensor and Actuator Networks, 5(1), 3.CrossRef Maglaras, L. A., Al-Bayatti, A. H., He, Y., Wagner, I., & Janicke, H. (2016). Social internet of vehicles for smart cities. Journal of Sensor and Actuator Networks, 5(1), 3.CrossRef
39.
40.
go back to reference Maglaras, L. A., & Katsaros, D. (2016). Social clustering of vehicles based on semi-markov processes. IEEE Transactions on Vehicular Technology, 65(1), 318–332.CrossRef Maglaras, L. A., & Katsaros, D. (2016). Social clustering of vehicles based on semi-markov processes. IEEE Transactions on Vehicular Technology, 65(1), 318–332.CrossRef
45.
go back to reference Gentry, C., & Ramzan, Z. (2006). Identity-based aggregate signatures. In International workshop on public key cryptography (pp. 257–273). Springer. Gentry, C., & Ramzan, Z. (2006). Identity-based aggregate signatures. In International workshop on public key cryptography (pp. 257–273). Springer.
46.
go back to reference Park, D. J., Cha, J., & Lee, P. J. (2005). Searchable keyword-based encryption. IACR Cryptology ePrint Archive, 2005, 367. Park, D. J., Cha, J., & Lee, P. J. (2005). Searchable keyword-based encryption. IACR Cryptology ePrint Archive, 2005, 367.
50.
go back to reference Wang, X. A., Huang, X., Yang, X., Liu, L., & Wu, X. (2012). Further observation on proxy re-encryption with keyword search. Journal of Systems and Software, 85(3), 643–654. doi:10.1016/j.jss.2011.09.035. Wang, X. A., Huang, X., Yang, X., Liu, L., & Wu, X. (2012). Further observation on proxy re-encryption with keyword search. Journal of Systems and Software, 85(3), 643–654. doi:10.​1016/​j.​jss.​2011.​09.​035.
54.
go back to reference Wen, M., Lu, R., Lei, J., Li, H., Liang, X., & Shen, X. S. (2014). Sesa: An efficient searchable encryption scheme for auction in emerging smart grid marketing. Security and Communication Networks, 7(1), 234–244.CrossRef Wen, M., Lu, R., Lei, J., Li, H., Liang, X., & Shen, X. S. (2014). Sesa: An efficient searchable encryption scheme for auction in emerging smart grid marketing. Security and Communication Networks, 7(1), 234–244.CrossRef
56.
go back to reference He, D., Zeadally, S., Xu, B., & Huang, X. (2015). An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Transactions on Information Forensics and Security, 10(12), 2681–2691. doi:10.1109/TIFS.2015.2473820.CrossRef He, D., Zeadally, S., Xu, B., & Huang, X. (2015). An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Transactions on Information Forensics and Security, 10(12), 2681–2691. doi:10.​1109/​TIFS.​2015.​2473820.CrossRef
Metadata
Title
ESSPR: an efficient secure routing scheme based on searchable encryption with vehicle proxy re-encryption for vehicular peer-to-peer social network
Authors
Mohamed Amine Ferrag
Ahmed Ahmim
Publication date
08-03-2017
Publisher
Springer US
Published in
Telecommunication Systems / Issue 3/2017
Print ISSN: 1018-4864
Electronic ISSN: 1572-9451
DOI
https://doi.org/10.1007/s11235-017-0299-y

Other articles of this Issue 3/2017

Telecommunication Systems 3/2017 Go to the issue