•We use pseudonym to realize conditional privacy preserving and a trace authority (TRA) is responsible for generating pseudonym and tracking the real identity during the communication if it is ...necessary.•The technique of aggregate signature can achieve message authentication and greatly save the bandwidth and computation resources.•The length of aggregated signature is constant which reduces the communication and storage overhead.
Vehicular Ad-hoc Network (VANET) is the fundamental of intelligent transportation systems. Security and privacy are the important issues needed to be addressed. Existing schemes for privacy-preserving vehicular communications face many challenges, such as strong assumption on ideal tamper-proof device (TPD) and reducing the cost of computation and communication. In order to overcome the challenge, we propose a privacy-preserving authentication scheme with full aggregation in VANET, using certificateless aggregate signature to achieve secure vehicle-to-infrastructure (V2I) communications. The technique of aggregate signature can achieve message authentication and greatly save the bandwidth and computation resources. In addition, we use pseudonym to realize conditional privacy preserving and a trace authority (TRA) is responsible for generating pseudonym and tracking the real identity during the communication if it is necessary. When a vehicle enters an area under a new road side unit (RSU)’s coverage, we pre-calculate some data for once, thus the computation cost in sign phase can be reduced. The length of aggregated signature is constant which reduces the communication and storage overhead.
In recent years, the growing popularity of Internet of Things (IoT) is providing a promising opportunity not only for the development of various home automation systems but also for different ...industrial applications. By leveraging these benefits, automation is brought about in the industries giving rise to the Industrial Internet of Things (IIoT). IoT is prone to several cyberattacks and needs challenging approaches to achieve the desired security. Moreover, with the emergence of IIoT, the security vulnerabilities posed by it are even more devastating. Therefore, in order to provide a guideline to researchers, this survey primarily attempts to classify the attacks based on the objects of vulnerability. Subsequently, each of the individual attacks is mapped to one or more layers of the generalized IoT/IIoT architecture followed by a discussion on the countermeasures proposed in literature. Some relevant real-life attacks for each of these categories are also discussed. We further discuss the countermeasures proposed for the most relevant security threats in IIoT. A case study on two of the most important industrial IoT applications is also highlighted. Next, we explore the challenges brought by the centralized IoT/IIoT architecture and how blockchain can effectively be used towards addressing such challenges. In this context, we also discuss in detail one IoT specific Blockchain design known as Tangle, its merits and demerits. We further highlight the most relevant Blockchain-based solutions provided in recent times to counter the challenges posed by the traditional cloud-centered applications. The blockchain-related solutions provided in the context of two of the most relevant applications for each of IoT and IIoT is also discussed. Subsequently, we design a taxonomy of the security research areas in IoT/IIoT along with their corresponding solutions. Finally, several open research directions relevant to the focus of this survey are identified.
The goal of intelligent transport systems (ITSs) is to enhance the network performance of vehicular ad hoc networks (VANETs). Even though it presents new opportunities to the Internet of Vehicles ...(IoV) environment, there are some security concerns including the need to establish trust among the connected peers. The fifth-generation (5G) communication system, which provides reliable and low-latency communication services, is seen as the technology to cater for the challenges in VANETs. The incorporation of software-defined networks (SDNs) also ensures an effective network management. However, there should be monitoring and reporting services provided in the IoV. Blockchain, which has decentralization, transparency, and immutability as some of its properties, is designed to ensure trust in networking platforms. In that regard, this article analyzes the combination of blockchain and SDN for the effective operation of the VANET systems in 5G and fog computing paradigms. With managerial responsibilities shared between the blockchain and the SDN, it helps to relieve the pressure off the controller due to the ubiquitous processing that occurs. A trust-based model that curbs malicious activities in the network is also presented. The simulation results substantially guarantee an efficient network performance, while also ensuring that there is trust among the entities.
Autonomous vehicles (AVs) attract a lot of attention recently. They are expected to assist/replace the human drivers in maneuvering the vehicle, thereby reducing the likelihood of road accidents ...caused by human error, as a means to improve the road traffic safety. However, AVs have their inherent safety and security challenges, which have to be addressed before they are ready for wide adoption. This paper presents an overview of recent research on AV safety failures and security attacks, as well as the available safety and security countermeasures.
Growth of connected vehicles in vehicular social network (VSN) for the ease of driving, route recommendation and infotainment services involve huge exchange of messages between the vehicles. This ...exchange of messages is prone to several security attacks. Also, the messages must be from authentic source for the success of VSN. Thus, VSN attracts industries, researchers and academia for the development and deployment of a network for its secured communication. Vehicular Ad-hoc Network (VANET) can provide a promising solution for connected vehicles. VANET is a framework in the intelligent transportation systems (ITS) which provide communication between vehicles also known as vehicle to vehicle (V2V) and to infrastructure also known as vehicle to infrastructure (V2I) communications using dedicated short range communication (DSRC) and wireless Access for Vehicular Environment (WAVE). Several security and privacy majors have been taken up by the researchers in the literature. Also most of the scheme completely relies on the trusted authority (TA) for all decisions. However, because of the strict time constraints, the delay must be minimum and incurs less computational and communication overhead. In this research work, RSU assisted hash chain based approach has been proposed to mitigate security and privacy attacks. RSU based scheme thus reduces the complete dependency on the TA. Simulation results show the effectiveness of proposed work as compared to existing work mentioned in this paper.
Machine learning is one of the emerging technologies that has grabbed the attention of academicians and industrialists, and is expected to evolve in the near future. Machine learning techniques are ...anticipated to provide pervasive connections for wireless nodes. In fact, machine learning paves the way for the Internet of Things (IoT)—a network that supports communications among various devices without human interactions. Machine learning techniques are being utilized in several fields such as healthcare, smart grids, vehicular communications, and so on. In this paper, we study different IoT-based machine learning mechanisms that are used in the mentioned fields among others. In addition, the lessons learned are reported and the assessments are explored viewing the basic aim machine learning techniques are expected to play in IoT networks.
•Machine learning is one of the emerging technologies that is expected to evolve in the near future.•Machine learning techniques are anticipated to provide pervasive connections for wireless nodes.•Machine learning paves the way for the Internet of Things.•Machine learning techniques are utilized in healthcare, smart grids, vehicular communications, and so on.
Vehicular sensor networks (VSN) provide a new paradigm for transportation technology and demonstrate massive potential to improve the transportation environment due to the unlimited power supply of ...the vehicles and resulting minimum energy constraints. This special issue is focused on the recent developments within the vehicular networks and vehicular sensor networks domain. The papers included in this Special Issue (SI) provide useful insights to the implementation, modelling, and integration of novel technologies, including blockchain, named data networking, and 5G, to name a few, within vehicular networks and VSN.
The security of ad hoc networks continues to pose a major challenge in today's digital age. Threatened by unscrupulous users, especially in decentralized and open architectures, ad-hoc vehicular ...networks make protection against malicious attacks a difficult task. Vehicular networks, a specific subset of ad hoc networks, inherit security vulnerabilities from their parent network. One of the best-documented attacks is the black hole, in which a malicious user attempts to manipulate the routing mechanism to gain unauthorized access to the route, then intercepts and discards data packets. The result is an interruption of service to the intended recipient. In our research, we propose a black hole attack detection system based on the Kolmogorov-Smirnov statistical method. This system is designed to identify communication disruptions caused by such attacks without requiring structural modifications to the routing protocol. The results show that the proposed method can detect the presence of the attack by monitoring network activity. The results are tested and validated using SUMO (Simulation of Urban MObility) to generate microscopic road traffic, and NS-2 (Network Simulator) to generate network communication.
This paper presents a novel framework for enhancing privacy in Vehicular Ad Hoc Networks (VANETs) by integrating homomorphic encryption with machine learning applications. VANETs, essential for ...Intelligent Transport Systems (ITS), face significant challenges in privacy and security due to their highly dynamic and heterogeneous nature. Our framework addresses these challenges by employing a simplified but effective machine learning algorithm, the K-nearest neighbors (KNN), to ensure the security and privacy of the network. The flexibility of the framework allows for the incorporation of other machine learning algorithms, enhancing its adaptability and efficiency in various VANET scenarios.
Key to this framework is the use of homomorphic encryption (HE), a cryptographic technique that enables computations on encrypted data without the need for decryption. This feature preserves data confidentiality and allows for secure third-party computations. Our paper discusses the evolution and types of homomorphic encryption, emphasizing the importance of Fully Homomorphic Encryption (FHE) for its ability to evaluate complex polynomial functions.
The paper also highlights the different domains of cybersecurity concerns in VANETs, including in-vehicle systems, ad-hoc and infrastructure networks, and data analysis. The proposed framework aims to mitigate these vulnerabilities, particularly focusing on preventing common attacks like DoS and location tracking.
A significant advantage of our approach is its general nature, making it applicable to various privacy issues in VANETs. We propose the potential integration of homomorphic encryption with other privacy-preserving techniques, such as differential privacy or secure multi-party computation, to enhance computation times while ensuring robust privacy protection.