Skip to main content
Erschienen in: Telecommunication Systems 3/2017

08.03.2017

ESSPR: an efficient secure routing scheme based on searchable encryption with vehicle proxy re-encryption for vehicular peer-to-peer social network

verfasst von: Mohamed Amine Ferrag, Ahmed Ahmim

Erschienen in: Telecommunication Systems | Ausgabe 3/2017

Einloggen

Aktivieren Sie unsere intelligente Suche um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this paper, we propose an Efficient Secure routing Scheme based on searchable encryption with vehicle Proxy Re-encryption, called ESSPR, for achieving privacy preservation of message in vehicular peer-to-peer social network (VP2PSN). Specifically, the proposed ESSPR scheme consists of six phases: system initializations phase, peer registration phase, document generation phase, document forwarding phase, vehicle proxy re-encryption phase, and document receiving phase. Based on rationale of QoS-based clustering strategy, public key encryption with keyword search, identity based aggregate signature, and proxy re-encryption, ESSPR provides privacy for keyword, privacy for resources, and authentication and data integrity of the demand’s source. In addition, ESSPR is robust against eavesdropping attack, wormhole attack, packet analysis attack, packet tracing attack, and replay attack. Through performance evaluation, we demonstrate the effectiveness of ESSPR in terms of delivery ratio, average delay, average fairness, and detection ratio under malicious peers proportions in VP2PSN.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Lu, R., Lin, X., Liang, X., & Shen, X. (2010). Sacrificing the plum tree for the peach tree: A socialspot tactic for protecting receiver-location privacy in VANET. In GLOBECOM-IEEE global telecommunications conference. doi:10.1109/GLOCOM.2010.5683313. Lu, R., Lin, X., Liang, X., & Shen, X. (2010). Sacrificing the plum tree for the peach tree: A socialspot tactic for protecting receiver-location privacy in VANET. In GLOBECOM-IEEE global telecommunications conference. doi:10.​1109/​GLOCOM.​2010.​5683313.
3.
Zurück zum Zitat Gerla, M., Lee, E.K., Pau, G., & Lee, U. (2014). Internet of vehicles: From intelligent grid to autonomous cars and vehicular clouds. In Internet of things (WF-IoT), 2014 IEEE World Forum on, IEEE, pp. 241–246. Gerla, M., Lee, E.K., Pau, G., & Lee, U. (2014). Internet of vehicles: From intelligent grid to autonomous cars and vehicular clouds. In Internet of things (WF-IoT), 2014 IEEE World Forum on, IEEE, pp. 241–246.
4.
Zurück zum Zitat Jiau, M.-K., Huang, S.-C., Hwang, J.-N., & Vasilakos, A. V. (2015). Multimedia services in cloud-based vehicular networks. IEEE Intelligent Transportation Systems Magazine, 7(3), 62–79.CrossRef Jiau, M.-K., Huang, S.-C., Hwang, J.-N., & Vasilakos, A. V. (2015). Multimedia services in cloud-based vehicular networks. IEEE Intelligent Transportation Systems Magazine, 7(3), 62–79.CrossRef
5.
Zurück zum Zitat Han, W., & Xiao, Y. (2016). Privacy preservation for v2g networks in smart grid: A survey. Computer Communications, 91, 17–28.CrossRef Han, W., & Xiao, Y. (2016). Privacy preservation for v2g networks in smart grid: A survey. Computer Communications, 91, 17–28.CrossRef
7.
Zurück zum Zitat Liang, X., Barua, M., Lu, R., Lin, X., & Shen, X. (2012). HealthShare: Achieving secure and privacy-preserving health information sharing through health social networks. Computer Communications, 35(15), 1910–1920. doi:10.1016/j.comcom.2012.01.009.CrossRef Liang, X., Barua, M., Lu, R., Lin, X., & Shen, X. (2012). HealthShare: Achieving secure and privacy-preserving health information sharing through health social networks. Computer Communications, 35(15), 1910–1920. doi:10.​1016/​j.​comcom.​2012.​01.​009.CrossRef
8.
Zurück zum Zitat Lu, R., Lin, X., & Shen, X. (2010) SPRING: A social-based privacy-preserving packet forwarding protocol for vehicular delay tolerant networks. In Proceedings-IEEE INFOCOM. doi:10.1109/INFCOM.2010.5462161. Lu, R., Lin, X., & Shen, X. (2010) SPRING: A social-based privacy-preserving packet forwarding protocol for vehicular delay tolerant networks. In Proceedings-IEEE INFOCOM. doi:10.​1109/​INFCOM.​2010.​5462161.
9.
Zurück zum Zitat Ferrag, M. A., Nafa, M., & Ghanemi, S. (2014). SDPP: An intelligent secure detection scheme with strong privacy-preserving for mobile peer-to-peer social network. International Journal of Information and Computer Security, 6(3), 241–269. doi:10.1504/IJICS.2014.066650.CrossRef Ferrag, M. A., Nafa, M., & Ghanemi, S. (2014). SDPP: An intelligent secure detection scheme with strong privacy-preserving for mobile peer-to-peer social network. International Journal of Information and Computer Security, 6(3), 241–269. doi:10.​1504/​IJICS.​2014.​066650.CrossRef
10.
Zurück zum Zitat Ferrag, M. A., Nafa, M., & Ghanemi, S. (2016). EPSA: An efficient and privacy preserving scheme against wormhole attack on reactive routing for mobile ad hoc social networks. International Journal of Security and Networks, 11(3), 107–125. doi:10.1504/IJSN.2016.10000172.CrossRef Ferrag, M. A., Nafa, M., & Ghanemi, S. (2016). EPSA: An efficient and privacy preserving scheme against wormhole attack on reactive routing for mobile ad hoc social networks. International Journal of Security and Networks, 11(3), 107–125. doi:10.​1504/​IJSN.​2016.​10000172.CrossRef
12.
13.
Zurück zum Zitat Lu, R., Lin, X., Liang, X., & Shen, X. (2012). A dynamic privacy-preserving key management scheme for location-based services in VANETs. IEEE Transactions on Intelligent Transportation Systems, 13(1), 127–139. doi:10.1109/TITS.2011.2164068.CrossRef Lu, R., Lin, X., Liang, X., & Shen, X. (2012). A dynamic privacy-preserving key management scheme for location-based services in VANETs. IEEE Transactions on Intelligent Transportation Systems, 13(1), 127–139. doi:10.​1109/​TITS.​2011.​2164068.CrossRef
14.
Zurück zum Zitat Lu, R., Lin, X., Luan, T. H., Liang, X., & Shen, X. (2012). Pseudonym changing at social spots: An effective strategy for location privacy in VANETs. IEEE Transactions on Vehicular Technology, 61(1), 86–96. doi:10.1109/TVT.2011.2162864.CrossRef Lu, R., Lin, X., Luan, T. H., Liang, X., & Shen, X. (2012). Pseudonym changing at social spots: An effective strategy for location privacy in VANETs. IEEE Transactions on Vehicular Technology, 61(1), 86–96. doi:10.​1109/​TVT.​2011.​2162864.CrossRef
16.
Zurück zum Zitat Sun, Y., Lin, X., Lu, R., Shen, X., & Su, J. (2010). Roadside units deployment for efficient short-time certificate updating in VANETs. In IEEE international conference on communications. doi:10.1109/ICC.2010.5502183. Sun, Y., Lin, X., Lu, R., Shen, X., & Su, J. (2010). Roadside units deployment for efficient short-time certificate updating in VANETs. In IEEE international conference on communications. doi:10.​1109/​ICC.​2010.​5502183.
17.
Zurück zum Zitat Hu, H., Lu, R., & Zhang, Z. (2015). TPSQ: Trust-based platoon service query via vehicular communications. Peer-to-Peer Networking and Applications,. doi:10.1007/s12083-015-0425-0. Hu, H., Lu, R., & Zhang, Z. (2015). TPSQ: Trust-based platoon service query via vehicular communications. Peer-to-Peer Networking and Applications,. doi:10.​1007/​s12083-015-0425-0.
18.
Zurück zum Zitat Lin, X., Sun, X., Ho, P. H., & Shen, X. (2007). GSIS: A secure and privacy-preserving protocol for vehicular communications. IEEE Transactions on Vehicular Technology, 56(6 I), 3442–3456. doi:10.1109/TVT.2007.906878. Lin, X., Sun, X., Ho, P. H., & Shen, X. (2007). GSIS: A secure and privacy-preserving protocol for vehicular communications. IEEE Transactions on Vehicular Technology, 56(6 I), 3442–3456. doi:10.​1109/​TVT.​2007.​906878.
19.
Zurück zum Zitat Lin, X., Sun, X., Wang, X., Zhang, C., Ho, P. H., & Shen, X. (2008). TSVC: Timed efficient and secure vehicular communications with privacy preserving. IEEE Transactions on Wireless Communications, 7(12), 4987–4998. doi:10.1109/T-WC.2008.070773.CrossRef Lin, X., Sun, X., Wang, X., Zhang, C., Ho, P. H., & Shen, X. (2008). TSVC: Timed efficient and secure vehicular communications with privacy preserving. IEEE Transactions on Wireless Communications, 7(12), 4987–4998. doi:10.​1109/​T-WC.​2008.​070773.CrossRef
20.
Zurück zum Zitat Liang, X., Lin, X., & Shen, X. S. (2014). Enabling trustworthy service evaluation in service-oriented mobile social networks. IEEE Transactions on Parallel and Distributed Systems, 25(2), 310–320. doi:10.1109/TPDS.2013.37.CrossRef Liang, X., Lin, X., & Shen, X. S. (2014). Enabling trustworthy service evaluation in service-oriented mobile social networks. IEEE Transactions on Parallel and Distributed Systems, 25(2), 310–320. doi:10.​1109/​TPDS.​2013.​37.CrossRef
21.
Zurück zum Zitat Zhang, K., Liang, X., Lu, R., Yang, K., & Shen, X. S. (2015). Exploiting mobile social behaviors for Sybil detection. In Proceedings-IEEE INFOCOM, Vol. 26, pp. 271–279. doi:10.1109/INFOCOM.2015.7218391. Zhang, K., Liang, X., Lu, R., Yang, K., & Shen, X. S. (2015). Exploiting mobile social behaviors for Sybil detection. In Proceedings-IEEE INFOCOM, Vol. 26, pp. 271–279. doi:10.​1109/​INFOCOM.​2015.​7218391.
22.
Zurück zum Zitat Ferrag, M. A., Nafa, M., & Ghanemi, S. (2013). ECPDR: An efficient conditional privacy-preservation scheme with demand response for secure ad hoc social communications. International Journal of Embedded and Real-Time Communication Systems (IJERTCS), 4(3), 43–71. doi:10.4018/ijertcs.2013070103.CrossRef Ferrag, M. A., Nafa, M., & Ghanemi, S. (2013). ECPDR: An efficient conditional privacy-preservation scheme with demand response for secure ad hoc social communications. International Journal of Embedded and Real-Time Communication Systems (IJERTCS), 4(3), 43–71. doi:10.​4018/​ijertcs.​2013070103.CrossRef
23.
24.
Zurück zum Zitat Ferrag, M. A., Maglaras, L., & Ahmim, A. Privacy-preserving schemes for ad hoc social networks: A survey, arXiv preprint arXiv:1610.06095. Ferrag, M. A., Maglaras, L., & Ahmim, A. Privacy-preserving schemes for ad hoc social networks: A survey, arXiv preprint arXiv:​1610.​06095.
25.
Zurück zum Zitat Li, J., Lu, H., & Guizani, M. (2015). ACPN: A novel authentication framework with conditional privacy-preservation and non-repudiation for VANETs. IEEE Transactions on Parallel and Distributed Systems, 26(4), 938–948. doi:10.1109/TPDS.2014.2308215.CrossRef Li, J., Lu, H., & Guizani, M. (2015). ACPN: A novel authentication framework with conditional privacy-preservation and non-repudiation for VANETs. IEEE Transactions on Parallel and Distributed Systems, 26(4), 938–948. doi:10.​1109/​TPDS.​2014.​2308215.CrossRef
26.
Zurück zum Zitat Lo, N.-W., & Tsai, J.-L. (2016). An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks without pairings. IEEE Transactions on Intelligent Transportation Systems, 17(5), 1319–1328. doi:10.1109/TITS.2015.2502322.CrossRef Lo, N.-W., & Tsai, J.-L. (2016). An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks without pairings. IEEE Transactions on Intelligent Transportation Systems, 17(5), 1319–1328. doi:10.​1109/​TITS.​2015.​2502322.CrossRef
27.
Zurück zum Zitat Du, S., Zhu, H., Li, X., Ota, K., & Dong, M. (2013). Mixzone in motion: Achieving dynamically cooperative location privacy protection in delay-tolerant networks. IEEE Transactions on Vehicular Technology, 62(9), 4565–4575. doi:10.1109/TVT.2013.2266347.CrossRef Du, S., Zhu, H., Li, X., Ota, K., & Dong, M. (2013). Mixzone in motion: Achieving dynamically cooperative location privacy protection in delay-tolerant networks. IEEE Transactions on Vehicular Technology, 62(9), 4565–4575. doi:10.​1109/​TVT.​2013.​2266347.CrossRef
28.
Zurück zum Zitat Hu, H., Lu, R., Huang, C., & Zhang, Z. (2016). PTRS: A privacy-preserving trust-based relay selection scheme in VANETs. Peer-to-Peer Networking and Applications,. doi:10.1007/s12083-016-0473-0. Hu, H., Lu, R., Huang, C., & Zhang, Z. (2016). PTRS: A privacy-preserving trust-based relay selection scheme in VANETs. Peer-to-Peer Networking and Applications,. doi:10.​1007/​s12083-016-0473-0.
29.
Zurück zum Zitat Wang, F., Xu, Y., Zhang, H., Zhang, Y., & Zhu, L. (2016). 2FLIP: A two-factor lightweight privacy-preserving authentication scheme for VANET. IEEE Transactions on Vehicular Technology, 65(2), 896–911. doi:10.1109/TVT.2015.2402166.CrossRef Wang, F., Xu, Y., Zhang, H., Zhang, Y., & Zhu, L. (2016). 2FLIP: A two-factor lightweight privacy-preserving authentication scheme for VANET. IEEE Transactions on Vehicular Technology, 65(2), 896–911. doi:10.​1109/​TVT.​2015.​2402166.CrossRef
30.
Zurück zum Zitat Zeng, S., Chen, Y., Tan, S., & He, M. (2016). Concurrently deniable ring authentication and its application to LBS in VANETs. Peer-to-Peer Networking and Applications,. doi:10.1007/s12083-016-0433-8. Zeng, S., Chen, Y., Tan, S., & He, M. (2016). Concurrently deniable ring authentication and its application to LBS in VANETs. Peer-to-Peer Networking and Applications,. doi:10.​1007/​s12083-016-0433-8.
31.
Zurück zum Zitat Ferrag, M.A., Maglaras, L. A., Janicke, H., & Jiang, J. Authentication protocols for internet of things: A comprehensive survey, arXiv preprint arXiv:1612.07206. Ferrag, M.A., Maglaras, L. A., Janicke, H., & Jiang, J. Authentication protocols for internet of things: A comprehensive survey, arXiv preprint arXiv:​1612.​07206.
32.
Zurück zum Zitat Ferrag, M.A., Maglaras, L.A., Janicke, H., & Jiang, J. A survey on privacy-preserving schemes for smart grid communications, arXiv preprint arXiv:1611.07722. Ferrag, M.A., Maglaras, L.A., Janicke, H., & Jiang, J. A survey on privacy-preserving schemes for smart grid communications, arXiv preprint arXiv:​1611.​07722.
33.
Zurück zum Zitat Calandriello, G., Papadimitratos, P., Hubaux, J.-P., & Lioy, A. (2007). Efficient and robust pseudonymous authentication in vanet. In Proceedings of the fourth ACM international workshop on vehicular ad hoc networks, ACM, pp. 19–28. Calandriello, G., Papadimitratos, P., Hubaux, J.-P., & Lioy, A. (2007). Efficient and robust pseudonymous authentication in vanet. In Proceedings of the fourth ACM international workshop on vehicular ad hoc networks, ACM, pp. 19–28.
34.
Zurück zum Zitat Shim, K.-A. (2012). Cpas: An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks. IEEE Transactions on Vehicular Technology, 61(4), 1874–1883.CrossRef Shim, K.-A. (2012). Cpas: An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks. IEEE Transactions on Vehicular Technology, 61(4), 1874–1883.CrossRef
35.
Zurück zum Zitat Zhang, C., Lu, R., Lin, X., Ho, P.-H., & Shen, X. (2008). An efficient identity-based batch verification scheme for vehicular sensor networks. In INFOCOM 2008. The 27th conference on computer communications. IEEE, IEEE, pp. 246–250. Zhang, C., Lu, R., Lin, X., Ho, P.-H., & Shen, X. (2008). An efficient identity-based batch verification scheme for vehicular sensor networks. In INFOCOM 2008. The 27th conference on computer communications. IEEE, IEEE, pp. 246–250.
36.
Zurück zum Zitat Vegni, A. M., & Loscri, V. (2015). A survey on vehicular social networks. IEEE Communications Surveys and Tutorials, 17(4), 2397–2419.CrossRef Vegni, A. M., & Loscri, V. (2015). A survey on vehicular social networks. IEEE Communications Surveys and Tutorials, 17(4), 2397–2419.CrossRef
37.
Zurück zum Zitat Hu, X., Chu, T. H., Leung, V. C., Ngai, E. C.-H., Kruchten, P., & Chan, H. C. (2015). A survey on mobile social networks: Applications, platforms, system architectures, and future research directions. IEEE Communications Surveys and Tutorials, 17(3), 1557–1581.CrossRef Hu, X., Chu, T. H., Leung, V. C., Ngai, E. C.-H., Kruchten, P., & Chan, H. C. (2015). A survey on mobile social networks: Applications, platforms, system architectures, and future research directions. IEEE Communications Surveys and Tutorials, 17(3), 1557–1581.CrossRef
38.
Zurück zum Zitat Maglaras, L. A., Al-Bayatti, A. H., He, Y., Wagner, I., & Janicke, H. (2016). Social internet of vehicles for smart cities. Journal of Sensor and Actuator Networks, 5(1), 3.CrossRef Maglaras, L. A., Al-Bayatti, A. H., He, Y., Wagner, I., & Janicke, H. (2016). Social internet of vehicles for smart cities. Journal of Sensor and Actuator Networks, 5(1), 3.CrossRef
39.
Zurück zum Zitat Lu, R., Lin, X., Liang, X., & Shen, X. (2011). A secure handshake scheme with symptoms-matching for mHealthcare social network. Mobile Networks and Applications, 16(6), 683–694. doi:10.1007/s11036-010-0274-2.CrossRef Lu, R., Lin, X., Liang, X., & Shen, X. (2011). A secure handshake scheme with symptoms-matching for mHealthcare social network. Mobile Networks and Applications, 16(6), 683–694. doi:10.​1007/​s11036-010-0274-2.CrossRef
40.
Zurück zum Zitat Maglaras, L. A., & Katsaros, D. (2016). Social clustering of vehicles based on semi-markov processes. IEEE Transactions on Vehicular Technology, 65(1), 318–332.CrossRef Maglaras, L. A., & Katsaros, D. (2016). Social clustering of vehicles based on semi-markov processes. IEEE Transactions on Vehicular Technology, 65(1), 318–332.CrossRef
45.
Zurück zum Zitat Gentry, C., & Ramzan, Z. (2006). Identity-based aggregate signatures. In International workshop on public key cryptography (pp. 257–273). Springer. Gentry, C., & Ramzan, Z. (2006). Identity-based aggregate signatures. In International workshop on public key cryptography (pp. 257–273). Springer.
46.
Zurück zum Zitat Park, D. J., Cha, J., & Lee, P. J. (2005). Searchable keyword-based encryption. IACR Cryptology ePrint Archive, 2005, 367. Park, D. J., Cha, J., & Lee, P. J. (2005). Searchable keyword-based encryption. IACR Cryptology ePrint Archive, 2005, 367.
50.
Zurück zum Zitat Wang, X. A., Huang, X., Yang, X., Liu, L., & Wu, X. (2012). Further observation on proxy re-encryption with keyword search. Journal of Systems and Software, 85(3), 643–654. doi:10.1016/j.jss.2011.09.035. Wang, X. A., Huang, X., Yang, X., Liu, L., & Wu, X. (2012). Further observation on proxy re-encryption with keyword search. Journal of Systems and Software, 85(3), 643–654. doi:10.​1016/​j.​jss.​2011.​09.​035.
54.
Zurück zum Zitat Wen, M., Lu, R., Lei, J., Li, H., Liang, X., & Shen, X. S. (2014). Sesa: An efficient searchable encryption scheme for auction in emerging smart grid marketing. Security and Communication Networks, 7(1), 234–244.CrossRef Wen, M., Lu, R., Lei, J., Li, H., Liang, X., & Shen, X. S. (2014). Sesa: An efficient searchable encryption scheme for auction in emerging smart grid marketing. Security and Communication Networks, 7(1), 234–244.CrossRef
56.
Zurück zum Zitat He, D., Zeadally, S., Xu, B., & Huang, X. (2015). An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Transactions on Information Forensics and Security, 10(12), 2681–2691. doi:10.1109/TIFS.2015.2473820.CrossRef He, D., Zeadally, S., Xu, B., & Huang, X. (2015). An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Transactions on Information Forensics and Security, 10(12), 2681–2691. doi:10.​1109/​TIFS.​2015.​2473820.CrossRef
Metadaten
Titel
ESSPR: an efficient secure routing scheme based on searchable encryption with vehicle proxy re-encryption for vehicular peer-to-peer social network
verfasst von
Mohamed Amine Ferrag
Ahmed Ahmim
Publikationsdatum
08.03.2017
Verlag
Springer US
Erschienen in
Telecommunication Systems / Ausgabe 3/2017
Print ISSN: 1018-4864
Elektronische ISSN: 1572-9451
DOI
https://doi.org/10.1007/s11235-017-0299-y

Weitere Artikel der Ausgabe 3/2017

Telecommunication Systems 3/2017 Zur Ausgabe

Neuer Inhalt