Abstract
As the Internet of vehicles (IoV) technology develops, it promotes the intelligent interaction among vehicles, road side instrument, and the environment. Nevertheless, it also brings vehicle information security challenges. In recent years, vehicle data sharing is suffering to Algorithm Substitution Attacks (ASA), which means backdoor adversaries can carry out filtering attacks through data sharing. Therefore, this paper designs a blockchain-based proxy re-encryption scheme with a cryptographic reverse firewall (BIBPR-CRF) for IoV. In our proposal, the CRF can promise the internal safety of vehicle units. More specifically, it can prevent ASA attacks while ensuring chosen plaintext attack (CPA)-security. Meanwhile, the proxy re-encryption (PRE) algorithm can provide the confidential sharing and secure operation of data. Moreover, we use a consortium blockchain service center (CBSC) to store the first ciphertext and re-encrypt it with smart contracts on the blockchain, which can avoid single point of failure and achieve higher efficiency compared to proxy servers. Finally, we evaluate the performance of our scheme in terms of communication cost, computational cost, and energy consumption. Compared with the other three schemes, our proposal has the highest efficiency and is the most suitable for the IoV application.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Alam, K.M., Saini, M., Saddik, A.E.: Toward social internet of vehicles: concept, architecture, and applications. IEEE Access 3, 343–357 (2015). https://doi.org/10.1109/ACCESS.2015.2416657
Alouache, L., Nguyen, N., Aliouat, M., Chelouah, R.: Survey on IoV routing protocols: security and network architecture. Int. J. Commun Syst 32(2), e3849 (2019)
Elkhalil, A., zhang, J., Elhabob, R., Eltayieb, N.: An efficient signcryption of heterogeneous systems for internet of vehicles. J. Syst. Archit. 113, 101885 (2021). https://doi.org/10.1016/j.sysarc.2020.101885, https://www.sciencedirect.com/science/article/pii/S1383762120301594
Hussain, S.M., Yusof, K.M.: Dynamic Q-learning and fuzzy CNN based vertical handover decision for integration of DSRC, mmWave 5G and LTE in internet of vehicles (IoV). J. Commun. 16(5), 155–166 (2021)
Das, M., Tao, X., Cheng, J.C.: BIM security: a critical review and recommendations using encryption strategy and blockchain. Autom. Constr. 126, 103682 (2021). https://doi.org/10.1016/j.autcon.2021.103682, https://www.sciencedirect.com/science/article/pii/S0926580521001333
Manzoor, A., Liyanage, M., Braeke, A., Kanhere, S.S., Ylianttila, M.: Blockchain based proxy re-encryption scheme for secure IoT data sharing. In: 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), pp. 99–103 (2019). https://doi.org/10.1109/BLOC.2019.8751336
Cui, Z., et al.: A hybrid blockchain-based identity authentication scheme for multi-WSN. IEEE Trans. Serv. Comput. 13(2), 241–251 (2020). https://doi.org/10.1109/TSC.2020.2964537
Yang, Y.T., Chou, L.D., Tseng, C.W., Tseng, F.H., Liu, C.C.: Blockchain-based traffic event validation and trust verification for VANETs. IEEE Access 7, 30868–30877 (2019). https://doi.org/10.1109/ACCESS.2019.2903202
Tang, Q., Yung, M.: Cliptography: Post-snowden cryptography. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, pp. 2615–2616. Association for Computing Machinery, New York (2017). https://doi.org/10.1145/3133956.3136065
Bellare, M., Paterson, K.G., Rogaway, P.: Security of symmetric encryption against mass surveillance. In: Garay, J.A., Gennaro, R. (eds.) CRYPTO 2014. LNCS, vol. 8616, pp. 1–19. Springer, Berlin (2014). https://doi.org/10.1007/978-3-662-44371-2_1
Mironov, I., Stephens-Davidowitz, N.: Cryptographic reverse firewalls. In: Oswald, E., Fischlin, M. (eds.) EUROCRYPT 2015. LNCS, vol. 9057, pp. 657–686. Springer, Berlin (2015). https://doi.org/10.1007/978-3-662-46803-6_22
Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127–144. Springer, Berlin (1998). https://doi.org/10.1007/bfb0054122
Green, M., Ateniese, G.: Identity-based proxy re-encryption. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 288–306. Springer, Berlin (2007). https://doi.org/10.1007/978-3-540-72738-5_19
Manikandan, G., Perumal, R., Muthukumaran, V.: Secure data sharing based on proxy re-encryption for internet of vehicles using seminearring. J. Comput. Theor. Nanosci. 18(1–2), 516–521 (2021)
Cohen, A.: What about bob? the inadequacy of CPA security for proxy reencryption. In: Lin, D., Sako, K. (eds.) PKC 2019. LNCS, vol. 11443, pp. 287–316. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-17259-6_10
Susilo, W., Dutta, P., Duong, D.H., Roy, P.S.: Lattice-based HRA-secure attribute-based proxy re-encryption in standard model. In: Bertino, E., Shulman, H., Waidner, M. (eds.) Computer Security - ESORICS 2021. LNCS, vol. 12973, pp. 169–191. Springer, Heidelberg (2021). https://doi.org/10.1007/978-3-030-88428-4_9
Fan, K., Ren, Y., Wang, Y., Li, H., Yang, Y.: Blockchain-based efficient privacy preserving and data sharing scheme of content-centric network in 5G. IET Commun. 12(5), 527–532 (2018)
Singh, M., Kim, S.: Branch based blockchain technology in intelligent vehicle. Comput. Netw. 145, 219–231 (2018). https://doi.org/10.1016/j.comnet.2018.08.016, https://www.sciencedirect.com/science/article/pii/S1389128618308399
Zhou, Y., Guo, J., Li, F.: Certificateless public key encryption with cryptographic reverse firewalls. J. Syst. Archit. 109, 101754 (2020)
Zhou, Y., Zhao, L., **, Y., Li, F.: Backdoor-resistant identity-based proxy re-encryption for cloud-assisted wireless body area networks. Inf. Sci. 604, 80–96 (2022)
Swan, M.: Blockchain: Blueprint for a New Economy. O’Reilly Media Inc, Sebastopol (2015)
Szabo, N.: Formalizing and securing relationships on public networks. First monday (1997)
Wang, S., Yuan, Y., Wang, X., Li, J., Qin, R., Wang, F.Y.: An overview of smart contract: architecture, applications, and future trends. In: 2018 IEEE Intelligent Vehicles Symposium (IV), pp. 108–113. IEEE (2018)
Maiti, S., Misra, S.: P2b: privacy preserving identity-based broadcast proxy re-encryption. IEEE Trans. Veh. Technol. 69(5), 5610–5617 (2020)
Sun, M., Ge, C., Fang, L., Wang, J.: A proxy broadcast re-encryption for cloud data sharing. Multimed. Tools Appl. 77, 10455–10469 (2018)
Genç, Y., Afacan, E.: Implementation of new message encryption using elliptic curve cryptography over finite fields. In: 2021 International Congress of Advanced Technology and Engineering (ICOTEN), pp. 1–6. IEEE (2021)
Shim, K.A.: CPAS: an efficient conditional privacy-preserving authentication scheme for vehicular sensor networks. IEEE Trans. Veh. Technol. 61(4), 1874–1883 (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
**, C., Chen, Z., Qin, W., Sun, K., Chen, G. (2024). A Blockchain-Based Proxy Re-Encryption Scheme with Cryptographic Reverse Firewall for IoV. In: Yang, H., Lu, R. (eds) Frontiers in Cyber Security. FCS 2023. Communications in Computer and Information Science, vol 1992. Springer, Singapore. https://doi.org/10.1007/978-981-99-9331-4_2
Download citation
DOI: https://doi.org/10.1007/978-981-99-9331-4_2
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-9330-7
Online ISBN: 978-981-99-9331-4
eBook Packages: Computer ScienceComputer Science (R0)