A Blockchain-Based Proxy Re-Encryption Scheme with Cryptographic Reverse Firewall for IoV

  • Conference paper
  • First Online:
Frontiers in Cyber Security (FCS 2023)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1992))

Included in the following conference series:

  • 371 Accesses

Abstract

As the Internet of vehicles (IoV) technology develops, it promotes the intelligent interaction among vehicles, road side instrument, and the environment. Nevertheless, it also brings vehicle information security challenges. In recent years, vehicle data sharing is suffering to Algorithm Substitution Attacks (ASA), which means backdoor adversaries can carry out filtering attacks through data sharing. Therefore, this paper designs a blockchain-based proxy re-encryption scheme with a cryptographic reverse firewall (BIBPR-CRF) for IoV. In our proposal, the CRF can promise the internal safety of vehicle units. More specifically, it can prevent ASA attacks while ensuring chosen plaintext attack (CPA)-security. Meanwhile, the proxy re-encryption (PRE) algorithm can provide the confidential sharing and secure operation of data. Moreover, we use a consortium blockchain service center (CBSC) to store the first ciphertext and re-encrypt it with smart contracts on the blockchain, which can avoid single point of failure and achieve higher efficiency compared to proxy servers. Finally, we evaluate the performance of our scheme in terms of communication cost, computational cost, and energy consumption. Compared with the other three schemes, our proposal has the highest efficiency and is the most suitable for the IoV application.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 71.50
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 89.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Alam, K.M., Saini, M., Saddik, A.E.: Toward social internet of vehicles: concept, architecture, and applications. IEEE Access 3, 343–357 (2015). https://doi.org/10.1109/ACCESS.2015.2416657

    Article  Google Scholar 

  2. Alouache, L., Nguyen, N., Aliouat, M., Chelouah, R.: Survey on IoV routing protocols: security and network architecture. Int. J. Commun Syst 32(2), e3849 (2019)

    Article  Google Scholar 

  3. Elkhalil, A., zhang, J., Elhabob, R., Eltayieb, N.: An efficient signcryption of heterogeneous systems for internet of vehicles. J. Syst. Archit. 113, 101885 (2021). https://doi.org/10.1016/j.sysarc.2020.101885, https://www.sciencedirect.com/science/article/pii/S1383762120301594

  4. Hussain, S.M., Yusof, K.M.: Dynamic Q-learning and fuzzy CNN based vertical handover decision for integration of DSRC, mmWave 5G and LTE in internet of vehicles (IoV). J. Commun. 16(5), 155–166 (2021)

    Article  Google Scholar 

  5. Das, M., Tao, X., Cheng, J.C.: BIM security: a critical review and recommendations using encryption strategy and blockchain. Autom. Constr. 126, 103682 (2021). https://doi.org/10.1016/j.autcon.2021.103682, https://www.sciencedirect.com/science/article/pii/S0926580521001333

  6. Manzoor, A., Liyanage, M., Braeke, A., Kanhere, S.S., Ylianttila, M.: Blockchain based proxy re-encryption scheme for secure IoT data sharing. In: 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), pp. 99–103 (2019). https://doi.org/10.1109/BLOC.2019.8751336

  7. Cui, Z., et al.: A hybrid blockchain-based identity authentication scheme for multi-WSN. IEEE Trans. Serv. Comput. 13(2), 241–251 (2020). https://doi.org/10.1109/TSC.2020.2964537

    Article  Google Scholar 

  8. Yang, Y.T., Chou, L.D., Tseng, C.W., Tseng, F.H., Liu, C.C.: Blockchain-based traffic event validation and trust verification for VANETs. IEEE Access 7, 30868–30877 (2019). https://doi.org/10.1109/ACCESS.2019.2903202

    Article  Google Scholar 

  9. Tang, Q., Yung, M.: Cliptography: Post-snowden cryptography. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, pp. 2615–2616. Association for Computing Machinery, New York (2017). https://doi.org/10.1145/3133956.3136065

  10. Bellare, M., Paterson, K.G., Rogaway, P.: Security of symmetric encryption against mass surveillance. In: Garay, J.A., Gennaro, R. (eds.) CRYPTO 2014. LNCS, vol. 8616, pp. 1–19. Springer, Berlin (2014). https://doi.org/10.1007/978-3-662-44371-2_1

    Chapter  Google Scholar 

  11. Mironov, I., Stephens-Davidowitz, N.: Cryptographic reverse firewalls. In: Oswald, E., Fischlin, M. (eds.) EUROCRYPT 2015. LNCS, vol. 9057, pp. 657–686. Springer, Berlin (2015). https://doi.org/10.1007/978-3-662-46803-6_22

    Chapter  Google Scholar 

  12. Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127–144. Springer, Berlin (1998). https://doi.org/10.1007/bfb0054122

    Chapter  Google Scholar 

  13. Green, M., Ateniese, G.: Identity-based proxy re-encryption. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 288–306. Springer, Berlin (2007). https://doi.org/10.1007/978-3-540-72738-5_19

    Chapter  Google Scholar 

  14. Manikandan, G., Perumal, R., Muthukumaran, V.: Secure data sharing based on proxy re-encryption for internet of vehicles using seminearring. J. Comput. Theor. Nanosci. 18(1–2), 516–521 (2021)

    Google Scholar 

  15. Cohen, A.: What about bob? the inadequacy of CPA security for proxy reencryption. In: Lin, D., Sako, K. (eds.) PKC 2019. LNCS, vol. 11443, pp. 287–316. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-17259-6_10

    Chapter  Google Scholar 

  16. Susilo, W., Dutta, P., Duong, D.H., Roy, P.S.: Lattice-based HRA-secure attribute-based proxy re-encryption in standard model. In: Bertino, E., Shulman, H., Waidner, M. (eds.) Computer Security - ESORICS 2021. LNCS, vol. 12973, pp. 169–191. Springer, Heidelberg (2021). https://doi.org/10.1007/978-3-030-88428-4_9

    Chapter  Google Scholar 

  17. Fan, K., Ren, Y., Wang, Y., Li, H., Yang, Y.: Blockchain-based efficient privacy preserving and data sharing scheme of content-centric network in 5G. IET Commun. 12(5), 527–532 (2018)

    Article  Google Scholar 

  18. Singh, M., Kim, S.: Branch based blockchain technology in intelligent vehicle. Comput. Netw. 145, 219–231 (2018). https://doi.org/10.1016/j.comnet.2018.08.016, https://www.sciencedirect.com/science/article/pii/S1389128618308399

  19. Zhou, Y., Guo, J., Li, F.: Certificateless public key encryption with cryptographic reverse firewalls. J. Syst. Archit. 109, 101754 (2020)

    Article  Google Scholar 

  20. Zhou, Y., Zhao, L., **, Y., Li, F.: Backdoor-resistant identity-based proxy re-encryption for cloud-assisted wireless body area networks. Inf. Sci. 604, 80–96 (2022)

    Article  Google Scholar 

  21. Swan, M.: Blockchain: Blueprint for a New Economy. O’Reilly Media Inc, Sebastopol (2015)

    Google Scholar 

  22. Szabo, N.: Formalizing and securing relationships on public networks. First monday (1997)

    Google Scholar 

  23. Wang, S., Yuan, Y., Wang, X., Li, J., Qin, R., Wang, F.Y.: An overview of smart contract: architecture, applications, and future trends. In: 2018 IEEE Intelligent Vehicles Symposium (IV), pp. 108–113. IEEE (2018)

    Google Scholar 

  24. Maiti, S., Misra, S.: P2b: privacy preserving identity-based broadcast proxy re-encryption. IEEE Trans. Veh. Technol. 69(5), 5610–5617 (2020)

    Article  Google Scholar 

  25. Sun, M., Ge, C., Fang, L., Wang, J.: A proxy broadcast re-encryption for cloud data sharing. Multimed. Tools Appl. 77, 10455–10469 (2018)

    Article  Google Scholar 

  26. Genç, Y., Afacan, E.: Implementation of new message encryption using elliptic curve cryptography over finite fields. In: 2021 International Congress of Advanced Technology and Engineering (ICOTEN), pp. 1–6. IEEE (2021)

    Google Scholar 

  27. Shim, K.A.: CPAS: an efficient conditional privacy-preserving authentication scheme for vehicular sensor networks. IEEE Trans. Veh. Technol. 61(4), 1874–1883 (2012)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chunhua ** .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

**, C., Chen, Z., Qin, W., Sun, K., Chen, G. (2024). A Blockchain-Based Proxy Re-Encryption Scheme with Cryptographic Reverse Firewall for IoV. In: Yang, H., Lu, R. (eds) Frontiers in Cyber Security. FCS 2023. Communications in Computer and Information Science, vol 1992. Springer, Singapore. https://doi.org/10.1007/978-981-99-9331-4_2

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-9331-4_2

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-9330-7

  • Online ISBN: 978-981-99-9331-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

Navigation