4.7 Article

Broadcast Encryption Scheme for V2I Communication in VANETs

Journal

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
Volume 71, Issue 3, Pages 2749-2760

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TVT.2021.3113660

Keywords

Encryption; Receivers; Servers; Redundancy; Costs; Task analysis; Public key; Broadcast encryption; vehicle to infrastructure (V2I); multi-receiver; proxy server

Funding

  1. National Natural Science Foundation of China [62011530046, 61872001, U1936220]
  2. Excellent Youth Foundation of Anhui Scientific Committee [2108085J31]
  3. Special Fund for Key Program of Science and Technology of Anhui Province, China [202003A05020043]

Ask authors/readers for more resources

This research proposes a solution for addressing the problem of information redundancy in VANETs. The proposed scheme adopts identity-based broadcast encryption technology, allowing the TA to generate fixed-length ciphertext for multiple vehicles with only one encryption, thereby improving work efficiency significantly.
Information dissemination in vehicular ad hoc networks (VANETs) is inseparable from the interaction between vehicles and infrastructure. The trust authority (TA) often plays a pivotal role in VANETs and requires interaction with multiple vehicles. However, when the TA sends the same message to multiple vehicles, there are many redundancies, as it needs to negotiate with each vehicle and send them different ciphertexts. This greatly reduces the work efficiency of the TA. To the best of our knowledge, there is no research on the problem of redundancy that occurs when the same message is sent to multiple vehicles in VANETs. The proposed scheme adopts identity-based broadcast encryption (IBBE) technology, which is a secure data-sharing scheme suitable for the vehicle-to-infrastructure communication mode, in VANETs for the first time. Thus, with only one encryption, the TA can generate a fixed-length ciphertext for a group of vehicles. When there are new vehicles that subsequently request a service, the TA can assign encryption tasks to the proxy server. In terms of security, our scheme meets the particular requirements of VANETs. The encryption overhead of the sender and the length of the ciphertext were comparatively analyzed. The results demonstrated that the performance of the scheme improved significantly. Thus, our scheme can prevent redundancies and effectively improve the work efficiency of TA.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available