Secure and privacy-preserving schemes in vehicular networks

In the thesis, secure and privacy-preserving schemes are designed in vehicular networks, and the specific details of the completed works are shown as follows. Due to the increasing popularity of intelligent vehicles and the recent flourishing of cloud computing, it becomes a recent research trend of...

Full description

Saved in:
Bibliographic Details
Main Author: Kong, Qinglei
Other Authors: Lu Rong Xing
Format: Theses and Dissertations
Language:English
Published: 2018
Subjects:
Online Access:http://hdl.handle.net/10356/75653
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-75653
record_format dspace
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic DRNTU::Engineering::Electrical and electronic engineering
spellingShingle DRNTU::Engineering::Electrical and electronic engineering
Kong, Qinglei
Secure and privacy-preserving schemes in vehicular networks
description In the thesis, secure and privacy-preserving schemes are designed in vehicular networks, and the specific details of the completed works are shown as follows. Due to the increasing popularity of intelligent vehicles and the recent flourishing of cloud computing, it becomes a recent research trend of extending cloud computing to vehicles by leveraging under-utilized on-board capabilities of vehicles. In vehicular cloud, three security schemes have been designed in this thesis. In the first scheme, a novel location privacy-preserving data query scheme is proposed, with the proposed scheme, a data requester can retrieve the data generated by vehicular sensors from the distributed vehicular on-board storage with high accuracy. Since the majority of intelligent vehicles are generally considered as not fully utilized, these vehicles are candidates to provide distributed data collection and storage services. By exploiting the homomorphic Paillier cryptosystem technique and the structured binary scalars to represent the positions of data requesters and the data generating vehicles, the proposed scheme can achieve the location matching of the involved entities with privacy-preservation. In the second scheme, an efficient data sharing scheme and location privacy-preservation in Internet of vehicles (IoV) is proposed, which enables the collection and distribution of the data captured by vehicular sensors. The data captured by vehicular sensors records a myriad of physical phenomena about the surrounding environments, which enables the data sharing among vehicles and deployed roadside infrastructures to further improve traffic safety and on-board experience in the intelligent transportation system. With the proposed scheme, the multi-dimensional sensory data captured at different locations are first structured by the Chinese Remainder Theorem, then the modified Paillier cryptosystem is exploited to achieve the location privacy-preserving sensory data aggregation. Meanwhile, the proposed scheme exploits the proxy re-encryption technique to achieve the sensory data acquisition at the network edge, without the involvement of the trusted central entity. In the third scheme, a secure request-response based vehicular data dissemination scheme in the parking lot scenario is proposed. The roadside units (RSUs) deployed in vehicular ad hoc networks (VANETs) can act as information servers to provide information to vehicles under their coverage area. The proposed scheme exploits an invertible matrix to structure multiple data requests, and encrypts the data requests with the homomorphic Paillier Cryptosystem technique. Based on the data requests aggregation, the RSU can recover the individual data request while protecting the unlinkability between the data query and its origin. In addition, the RSU can verify the correctness of the recovered data requests without privacy disclosure by exploiting an identity-based batch verification technique. To improve the quality of the vehicle-to-infrastructure (V2I) communications, the LTE-A network is brought to vehicular network for its dense deployment, high bandwidth and high-speed movement support. Specifically, two secure handover key establishment schemes have been designed in this thesis. In the first scheme, a secure handover session key management scheme is designed in mobile relay LTE-A network. To be more specific, a session key between the on-board user equipment (UE) and the Donor evolved Node B (DeNB) is first produced by the UE and then securely delivered to the DeNB. It can achieve the security goal of forward and backward key separations. Meanwhile, to decrease the communication and computational burden of the proposed scheme, the proxy re-encryption technique is also employed, i.e., the session keys are initially encrypted by the public key of the mobility management entity (MME) and then re-encrypted by the mobile relay node (MRN), so that the target DeNB can recover the value of the session key with its private key without involving the core entity MME. In the second scheme, a novel secure coordinated multi-point (CoMP) joint transmission handover key establishment scheme in LTE-A vehicular networks is proposed. Specifically, to achieve the diversity gain brought by the CoMP joint transmission and accommodate to protect the backward/forward key separation, the session key is initially produced by the vehicle and then securely delivered towards the cooperating eNBs, and then decrypted by each cooperating eNB respectively.
author2 Lu Rong Xing
author_facet Lu Rong Xing
Kong, Qinglei
format Theses and Dissertations
author Kong, Qinglei
author_sort Kong, Qinglei
title Secure and privacy-preserving schemes in vehicular networks
title_short Secure and privacy-preserving schemes in vehicular networks
title_full Secure and privacy-preserving schemes in vehicular networks
title_fullStr Secure and privacy-preserving schemes in vehicular networks
title_full_unstemmed Secure and privacy-preserving schemes in vehicular networks
title_sort secure and privacy-preserving schemes in vehicular networks
publishDate 2018
url http://hdl.handle.net/10356/75653
_version_ 1772825935395946496
spelling sg-ntu-dr.10356-756532023-07-04T17:31:11Z Secure and privacy-preserving schemes in vehicular networks Kong, Qinglei Lu Rong Xing Ma Maode School of Electrical and Electronic Engineering DRNTU::Engineering::Electrical and electronic engineering In the thesis, secure and privacy-preserving schemes are designed in vehicular networks, and the specific details of the completed works are shown as follows. Due to the increasing popularity of intelligent vehicles and the recent flourishing of cloud computing, it becomes a recent research trend of extending cloud computing to vehicles by leveraging under-utilized on-board capabilities of vehicles. In vehicular cloud, three security schemes have been designed in this thesis. In the first scheme, a novel location privacy-preserving data query scheme is proposed, with the proposed scheme, a data requester can retrieve the data generated by vehicular sensors from the distributed vehicular on-board storage with high accuracy. Since the majority of intelligent vehicles are generally considered as not fully utilized, these vehicles are candidates to provide distributed data collection and storage services. By exploiting the homomorphic Paillier cryptosystem technique and the structured binary scalars to represent the positions of data requesters and the data generating vehicles, the proposed scheme can achieve the location matching of the involved entities with privacy-preservation. In the second scheme, an efficient data sharing scheme and location privacy-preservation in Internet of vehicles (IoV) is proposed, which enables the collection and distribution of the data captured by vehicular sensors. The data captured by vehicular sensors records a myriad of physical phenomena about the surrounding environments, which enables the data sharing among vehicles and deployed roadside infrastructures to further improve traffic safety and on-board experience in the intelligent transportation system. With the proposed scheme, the multi-dimensional sensory data captured at different locations are first structured by the Chinese Remainder Theorem, then the modified Paillier cryptosystem is exploited to achieve the location privacy-preserving sensory data aggregation. Meanwhile, the proposed scheme exploits the proxy re-encryption technique to achieve the sensory data acquisition at the network edge, without the involvement of the trusted central entity. In the third scheme, a secure request-response based vehicular data dissemination scheme in the parking lot scenario is proposed. The roadside units (RSUs) deployed in vehicular ad hoc networks (VANETs) can act as information servers to provide information to vehicles under their coverage area. The proposed scheme exploits an invertible matrix to structure multiple data requests, and encrypts the data requests with the homomorphic Paillier Cryptosystem technique. Based on the data requests aggregation, the RSU can recover the individual data request while protecting the unlinkability between the data query and its origin. In addition, the RSU can verify the correctness of the recovered data requests without privacy disclosure by exploiting an identity-based batch verification technique. To improve the quality of the vehicle-to-infrastructure (V2I) communications, the LTE-A network is brought to vehicular network for its dense deployment, high bandwidth and high-speed movement support. Specifically, two secure handover key establishment schemes have been designed in this thesis. In the first scheme, a secure handover session key management scheme is designed in mobile relay LTE-A network. To be more specific, a session key between the on-board user equipment (UE) and the Donor evolved Node B (DeNB) is first produced by the UE and then securely delivered to the DeNB. It can achieve the security goal of forward and backward key separations. Meanwhile, to decrease the communication and computational burden of the proposed scheme, the proxy re-encryption technique is also employed, i.e., the session keys are initially encrypted by the public key of the mobility management entity (MME) and then re-encrypted by the mobile relay node (MRN), so that the target DeNB can recover the value of the session key with its private key without involving the core entity MME. In the second scheme, a novel secure coordinated multi-point (CoMP) joint transmission handover key establishment scheme in LTE-A vehicular networks is proposed. Specifically, to achieve the diversity gain brought by the CoMP joint transmission and accommodate to protect the backward/forward key separation, the session key is initially produced by the vehicle and then securely delivered towards the cooperating eNBs, and then decrypted by each cooperating eNB respectively. Doctor of Philosophy (EEE) 2018-06-06T06:45:17Z 2018-06-06T06:45:17Z 2018 Thesis Kong, Q. (2018). Secure and privacy-preserving schemes in vehicular networks. Doctoral thesis, Nanyang Technological University, Singapore. http://hdl.handle.net/10356/75653 10.32657/10356/75653 en 196 p. application/pdf