Article
Computer Science, Theory & Methods
Xia Feng, Qichen Shi, Qingqing Xie, Liangmin Wang
Summary: This paper proposes a novel privacy-preserving authentication protocol in bilinear groups, where registered vehicles sign traffic-related messages and send them to nearby Roadside Units (RSUs) along with blinded certificates to reduce computation time and storage overhead. The protocol provides privacy properties such as anonymity and unlinkability, showing improved performance in terms of computation overhead and latency compared to existing schemes.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
(2021)
Article
Computer Science, Information Systems
Alireza Aghabagherloo, Mahshid Delavar, Javad Mohajeri, Mahmoud Salmasizadeh, Bart Preneel
Summary: Vehicular ad-hoc networks (VANETs) play a crucial role in enhancing traffic safety and efficiency by providing a communication platform for real-time information sharing. This paper proposes a secure and efficient Conditional Privacy-Preserving Authentication (CPPA) scheme to address the security requirements of data authentication and privacy preservation in VANETS, with improved performance compared to existing schemes.
Article
Computer Science, Information Systems
Hong Zhong, Lei Chen, Jie Cui, Jing Zhang, Irina Bolodurina, Lu Liu
Summary: This paper proposes a lightweight conditional privacy-preserving authentication (CPPA) scheme based on elliptic curve cryptography, where vehicles generate pseudonyms and public/private key pairs by themselves to avoid key escrow issues. It also utilizes a fog computing model that supports mobility, low latency, and location awareness to improve vehicular communication efficiency and reduce storage overhead efficiently.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Engineering, Electrical & Electronic
Quanrun Li, Debiao He, Zhichao Yang, Qi Xie, Kim-Kwang Raymond Choo
Summary: This paper proposes a lattice-based conditional privacy-preserving authentication protocol for VANETs, aiming to achieve mutual authentication and privacy protection simultaneously. The potential utility of the protocol is demonstrated by evaluating its performance.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
(2022)
Article
Computer Science, Information Systems
L. Ellen Funderburg, Huimin Ren, Im-Yeong Lee
Summary: VANETs are a type of Internet of Things system where vehicles communicate with each other and infrastructure to improve safety and quality of life. Security in VANETs requires vehicles to be accountable for accurate reporting and quick message security. The paper introduces a pairing-free signature scheme for VANETs to prevent identity forgery.
Article
Computer Science, Information Systems
Yuhan Yang, Lijun Wei, Jing Wu, Chengnian Long, Bo Li
Summary: This article proposes a multi-domain vehicular authentication architecture by introducing blockchain technology to establish distributed trust and share cross-domain information among multiple administrative domains. To guarantee anonymity and traceability, a pseudonym-based privacy-preserving authentication method is proposed. The scheme designs a two-phase pseudonym distribution mechanism with the assistance of a roadside unit (RSU) proxy.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Engineering, Civil
Chao Lin, Debiao He, Xinyi Huang, Neeraj Kumar, Kim-Kwang Raymond Choo
Summary: While VANETs have the potential to improve driver safety and traffic management efficiency, security and privacy issues persist. This paper proposes a novel BCPPA protocol based on Ethereum blockchain to address these challenges, providing effective certificate management and reducing the need for storing a large number of private keys. The protocol supports batch verification and meets security requirements, demonstrated through implementation in the Ethereum test network and simulations showing feasibility in milliseconds.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
(2021)
Article
Chemistry, Analytical
Xingyu He, Xianhua Niu, Yangpeng Wang, Ling Xiong, Zhizhong Jiang, Cheng Gong
Summary: In this paper, a novel hierarchical blockchain-assisted authentication scheme is proposed, achieving unlinkability through a dynamic key derivation algorithm. The scheme reduces processing delay, queuing delay, and deployment costs through hierarchical Vehicle Fog Computing. Cross-region authentication is achieved by leveraging the properties of blockchain. Security analysis and simulations demonstrate the scheme's effectiveness and superiority over earlier methods.
Article
Telecommunications
Fahiem Altaf, Soumyadev Maity
Summary: The paper proposes a novel authentication scheme for vehicular ad hoc networks to address scalability issues in high-density and safety-critical environments. By distributing key management tasks to reduce centralized dependency, and utilizing an efficient certificate-less signature scheme to authenticate outgoing messages, the scheme aims to protect long-term keys from potential attacks.
VEHICULAR COMMUNICATIONS
(2021)
Article
Computer Science, Artificial Intelligence
Shaji K. A. Theodore, K. Rajiv Gandhi, V Palanisamy
Summary: Vehicular ad hoc network (VANET) is a commonly used network in intelligent transportation systems (ITS) that enables the exchange of traffic data between vehicles and their surrounding environment for improved driving experience. This paper proposes a new lightweight authentication and privacy-preserving protocol to enhance safety in VANET.
COMPLEX & INTELLIGENT SYSTEMS
(2023)
Article
Engineering, Civil
Muhammad Asad Saleem, Xiong Li, Muhammad Faizan Ayub, Salman Shamshad, Fan Wu, Haider Abbas
Summary: The popularity of vehicles has led to the development of smart cities, making vehicular ad-hoc network (VANET) a widely used communication method for obtaining information about road conditions, speed, vehicle location, and traffic congestion. However, the security of private data in VANET is a critical task due to various security threats. In this article, a lightweight and secure privacy-preserving key agreement protocol for VANETs is proposed, which utilizes hashing technique for efficient and secure data transmission.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
(2023)
Article
Engineering, Civil
Sanjeev Kumar Dwivedi, Ruhul Amin, Satyanarayana Vollala, Ashok Kumar Das
Summary: This paper presents a decentralized blockchain-based batch authentication protocol using Elliptic Curve Cryptography, where Roadside Units (RSU) can authenticate a group of vehicles. The protocol has been verified to be secure and achieves more functionality and security compared to other schemes.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
(2023)
Article
Computer Science, Theory & Methods
Mohammad Sadegh Azhdari, Ali Barati, Hamid Barati
Summary: This paper proposes a fuzzy logic-based routing method with authentication capability in vehicular ad hoc networks. The method achieves superior performance in terms of end-to-end delay, packet collision, packet delivery rate, but slightly increases routing overhead.
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING
(2022)
Article
Computer Science, Theory & Methods
Deepak Choudhary, Roop Pahuja
Summary: This study proposes a solution for improving the performance of Transmission Control Protocols (TCP) in Vehicle Ad hoc Networks (VANETs) by introducing zone-based routing with consideration for mobility. A hybrid optimization algorithm (ABC) is used, which combines Ant Colony Optimization (ACO) and Artificial Bee Colony Optimization (ABCO), with link stability and residual energy as the basis of the fitness function. The effectiveness of the proposed method is evaluated using measures such as delivery ratio, time, and overhead, and compared with other algorithms.
JOURNAL OF BIG DATA
(2023)
Article
Engineering, Electrical & Electronic
Jiangwei Xu, Liangliang Wang, Mi Wen, Yu Long, Kefei Chen
Summary: This study proposes a novel low-latency message authentication scheme based on distributed authentication and message priority. It achieves the minimum verification latency of messages through cooperation between RSU and cooperative vehicles and designs a message priority strategy to prioritize the verification of urgent messages. The scheme works well in high-density traffic scenarios and is more suitable for securing emergency messages with ultra-low latency requirements.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
(2023)
Article
Engineering, Electrical & Electronic
Xuewen Dong, Zhichao You, Liangmin Wang, Sheng Gao, Yulong Shen, Jianfeng Ma
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS
(2020)
Article
Computer Science, Information Systems
Fawad Khan, Hui Li, Yinghui Zhang, Haider Abbas, Tahreem Yaqoob
Summary: The Internet of Things (IoT) integrates various technologies to provide technological enhancements. A new CP-ABE scheme has been proposed to address the challenge of access control in IoT environments, which employs a Repeated Attributes Optimization algorithm to manage attributes more effectively. Security and performance analysis demonstrate that the proposed construction achieves desired security goals with low communication overhead and computational cost for resource-constrained devices.
INTERNATIONAL JOURNAL OF INFORMATION SECURITY
(2021)
Article
Computer Science, Information Systems
Wenjing Zhang, Bo Jiang, Ming Li, Ravi Tandon, Qiao Liu, Hui Li
COMPUTERS & SECURITY
(2020)
Article
Computer Science, Information Systems
Yu'e Jiang, Liangmin Wang, Hui Zhao, Hsiao-Hwa Chen
IEEE SYSTEMS JOURNAL
(2020)
Article
Automation & Control Systems
Liangmin Wang, Hantao Mei, Victor S. Sheng
Summary: The article proposes a Tor traffic identification and multilevel classification framework based on network flow features, realizing the identification of anonymous traffic, traffic types of anonymous traffic, and applications. Differences between mobile and PC platforms are analyzed, with the conclusion that it is more challenging to identify and classify Tor types and specific Tor applications on mobile platforms. Solutions for this challenge are also discussed.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2021)
Article
Engineering, Electrical & Electronic
Yiliang Liu, Wei Wang, Hsiao-Hwa Chen, Feng Lyu, Liangmin Wang, Weixiao Meng, Xuemin Shen
Summary: The proposed SCOS in ICV networks aims to minimize overall latency by offloading computational tasks to nearby servers in SBSs and securing the information through physical layer security. The scheme utilizes ergodic secrecy rate to determine task offloading, proposes adaptive wiretap code rates, secure beamforming, and artificial noise to improve secrecy rates, showing shorter system delay compared to strategies neglecting time-varying characteristics.
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS
(2021)
Article
Computer Science, Information Systems
Tao Luo, LiangMin Wang, ShangNan Yin, Hao Shentu, Hui Zhao
Summary: The development and challenges of edge computing and website fingerprinting were discussed, and a novel website fingerprinting defense technology called RBP was proposed, which effectively defended against intelligent fingerprinting attacks.
JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS
(2021)
Article
Computer Science, Hardware & Architecture
Li Feng, Yiru Yao, Liangmin Wang, Geyong Min
Summary: This study introduces a two-stage parameter-rectifying-based selection scheme (TSPRS) for efficient traffic monitoring in SDNs. By establishing the MMLVN model and using the TEMC method, the scheme effectively identifies the smallest subset of switch nodes in two stages, improving monitoring efficiency and accuracy.
Article
Computer Science, Theory & Methods
Tao Jiang, Wenjuan Meng, Xu Yuan, Liangmin Wang, Jianhua Ge, Jianfeng Ma
Summary: This article explores location-aware data backup verification in clouds with the design of a secure framework called ReliableBox, enabling clients to verify data backup at specific geolocations. By leveraging proof-of-storage techniques and geolocation measurement, ReliableBox supports data integrity and backup location verification, preventing attacks like network delay manipulation.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
(2021)
Article
Automation & Control Systems
Liangmin Wang, Fan Wen, Keyang Cheng, Xia Feng, Hao Shen-Tu
Summary: This study proposes a SRv6-based multidomain integrated architecture (SMA) to address the drawbacks in the current Industrial Internet network systems. The SMA utilizes multilayer controllers to achieve high network scalability and efficient data transmission. Through periodic detection and passive feedback, faulty nodes can be quickly and accurately identified, and a hop count constraint helps to avoid long-path forwarding, improving network resource utilization.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2022)
Article
Computer Science, Information Systems
Haiqin Wu, Boris Dudder, Liangmin Wang, Shipu Sun, Guoliang Xue
Summary: This article presents BRPC, a decentralized system based on blockchain for general crowdsourcing, which integrates a confident-aware truth discovery algorithm and a privacy-aware verification protocol. It also defines three user roles and utilizes smart contracts to enforce a comprehensive reputation evaluation model, providing high security and practicality.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Theory & Methods
Xia Feng, Qichen Shi, Qingqing Xie, Liangmin Wang
Summary: This paper proposes a novel privacy-preserving authentication protocol in bilinear groups, where registered vehicles sign traffic-related messages and send them to nearby Roadside Units (RSUs) along with blinded certificates to reduce computation time and storage overhead. The protocol provides privacy properties such as anonymity and unlinkability, showing improved performance in terms of computation overhead and latency compared to existing schemes.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
(2021)
Article
Computer Science, Information Systems
Ke Cheng, Liangmin Wang, Yulong Shen, Hua Wang, Yongzhi Wang, Xiaohong Jiang, Hong Zhong
Summary: This paper proposes a novel scheme for secure k-NN query on encrypted cloud data with multiple keys, which protects data confidentiality and query privacy, and supports offline data owner.
IEEE TRANSACTIONS ON BIG DATA
(2021)
Article
Engineering, Electrical & Electronic
Xuewen Dong, Liangmin Wang, Qingsong Yao, Yongzhi Wang, Junwei Zhang, Yulong Shen
Summary: DSA is a promising platform to solve the spectrum shortage problem caused by wireless applications proliferation, and auction based mechanisms have been extensively studied for their efficiency and fairness. However, existing spectrum auction mechanisms do not consider noncontinuous demands for channels. THIMBLE is proposed as the first truthful incentive mechanism for flexible multichannel allocation, considering bidders' continuous/noncontinuous demands and spatial reusability, achieving truthfulness in both continuous and noncontinuous channel demand cases.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
(2021)
Article
Computer Science, Information Systems
Pei Huang, Kai Fan, Hanzhe Yang, Kuan Zhang, Hui Li, Yintang Yang