Cited time in webofscience Cited time in scopus

Fine-grained Access Control Design for Secure Vehicular Communications

Title
Fine-grained Access Control Design for Secure Vehicular Communications
Alternative Title
안전한 차량 통신을 위한 세분화된 접근 제어 설계
Author(s)
Donghyun Yu
DGIST Authors
Donghyun YuSungjin LeeJemin Lee
Advisor
이성진
Co-Advisor(s)
Jemin Lee
Issued Date
2024
Awarded Date
2024-02-01
Type
Thesis
Description
vehicle communication;fine-grained access control;autonomous driving;attribute-based encryption;edge computing;cryptosystem;security protocol;end-to-end security;location-based access control
Table Of Contents
I. Introduction 1
1.1 Background 1
1.2 Research Outlines and Contributions 2
1.2.1 Chapter II 2
1.2.2 Chapter III 3
1.2.3 Chapter IV 3
1.2.4 Chapter V 4
II. EC-SVC: Secure CAN Bus In-Vehicle Communications with Fine-grained Access
Control Based on Edge Computing 5
2.1 Introduction 5
2.1.1 Related Work 6
2.1.2 Motivation and Contribution 7
2.2 System and Security Models 8
2.2.1 System Model 9
2.2.2 Attack Model and Security Requirements 9
2.2.3 Security Definitions of Enhanced Attribute-based Encryption with Hidden Policy
and Credential 11
2.2.4 Security Definitions of Secure In-Vehicle Communications with Access Control 12
2.3 System Preliminaries 14
2.3.1 Pseudorandom Function and Permutations 14
2.3.2 Enhanced Attribute-based Encryption with Hidden Policy and Credential 15
2.4 Proposed Secure In-Vehicle Communications with Fine-grained Access Control based on
Edge Computing (EC-SVC) 18
2.4.1 Key Management 18
2.4.2 In-vehicle Security Protocol 19
2.5 Security Analysis 22
2.5.1 Security Analysis of Enhanced Attribute-based Encryption with Hidden Policy and
Credential 22
2.5.2 Security Analysis of EC-SVC Protocol 24
2.6 Performance Analysis 29
2.6.1 Cryptographic Algorithm Evaluation 29
2.6.2 Security Protocol Evaluation 31
2.7 Conclusion 34
III.Ensuring End-to-End Security with Fine-grained Access Control for Connected and
Autonomous Vehicles 36
3.1 Introduction 36
3.2 System and Security Models 38
3.2.1 System Model 39
3.2.2 Attack Model and Security Requirements 41
3.2.3 Security Definitions of OEEP-ABE and OE-IBS 42
3.2.4 Security Definitions of PS-E2EID 43
3.3 Preliminaries 45
3.3.1 Outsourcing-Enabled and Enhanced Privacy-preserving ABE (OEEP-ABE) 45
3.3.2 Outsourcing-Enabled IBS (OE-IBS) 48
3.4 Practical and Secure Vehicular Communication Protocol for End-to-End Security to In-
vehicle End-devices (PS-E2EID) 49
3.4.1 System Initialization and Key Management 50
3.4.2 Initial Authentication and Preliminary 50
3.4.3 Attribute-based Data Sharing (ABDS) 53
3.4.4 Encryption Material Update 55
3.5 Security Analysis 55
3.5.1 Security Analysis of OEEP-ABE and OE-IBS 55
3.5.2 Security Analysis of PS-E2EID 56
3.6 Performance Analysis 61
3.6.1 Cryptographic Algorithm Execution time 61
3.6.2 Security Protocol Evaluation 62
3.6.3 Performance Comparison with Related Works 63
3.7 Conclusions 65
IV.Location-encapsulated Access Control for Location-based Services in 6G Networks 66
4.1 Introduction 66
4.2 Preliminaries 67
4.2.1 Bilinear Pairing 67
4.2.2 Segment Tree 68
4.2.3 Pseudorandom Function 68
4.2.4 Assumption 68
4.3 Location-encapsulated Attribute-based Encryption (LeABE) 69
4.3.1 Function Definitions 70
4.3.2 Security Definitions 71
4.3.3 Construction 72
4.4 Security and Performance Analysis 75
4.4.1 Security Analysis 75
4.4.2 Performance Analysis 76
4.5 Conclusions 77
V. Conclusions 79
References 81
URI
http://hdl.handle.net/20.500.11750/48032

http://dgist.dcollection.net/common/orgView/200000725989
DOI
10.22677/THESIS.200000725989
Degree
Doctor
Department
Department of Electrical Engineering and Computer Science
Publisher
DGIST
Related Researcher
  • 이성진 Lee, Sungjin
  • Research Interests Computer System; System Software; Storage System; Non-volatile Memory; Flash-based SSD; Distributed Storage Systems
Files in This Item:

There are no files associated with this item.

Appears in Collections:
Department of Electrical Engineering and Computer Science Theses Ph.D.

qrcode

  • twitter
  • facebook
  • mendeley

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.

BROWSE