Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.advisor | 이성진 | - |
dc.contributor.author | Donghyun Yu | - |
dc.date.accessioned | 2024-02-29T21:01:07Z | - |
dc.date.available | 2024-02-29T21:01:07Z | - |
dc.date.issued | 2024 | - |
dc.identifier.uri | http://hdl.handle.net/20.500.11750/48032 | - |
dc.identifier.uri | http://dgist.dcollection.net/common/orgView/200000725989 | - |
dc.description | vehicle communication;fine-grained access control;autonomous driving;attribute-based encryption;edge computing;cryptosystem;security protocol;end-to-end security;location-based access control | - |
dc.description.tableofcontents | I. Introduction 1 1.1 Background 1 1.2 Research Outlines and Contributions 2 1.2.1 Chapter II 2 1.2.2 Chapter III 3 1.2.3 Chapter IV 3 1.2.4 Chapter V 4 II. EC-SVC: Secure CAN Bus In-Vehicle Communications with Fine-grained Access Control Based on Edge Computing 5 2.1 Introduction 5 2.1.1 Related Work 6 2.1.2 Motivation and Contribution 7 2.2 System and Security Models 8 2.2.1 System Model 9 2.2.2 Attack Model and Security Requirements 9 2.2.3 Security Definitions of Enhanced Attribute-based Encryption with Hidden Policy and Credential 11 2.2.4 Security Definitions of Secure In-Vehicle Communications with Access Control 12 2.3 System Preliminaries 14 2.3.1 Pseudorandom Function and Permutations 14 2.3.2 Enhanced Attribute-based Encryption with Hidden Policy and Credential 15 2.4 Proposed Secure In-Vehicle Communications with Fine-grained Access Control based on Edge Computing (EC-SVC) 18 2.4.1 Key Management 18 2.4.2 In-vehicle Security Protocol 19 2.5 Security Analysis 22 2.5.1 Security Analysis of Enhanced Attribute-based Encryption with Hidden Policy and Credential 22 2.5.2 Security Analysis of EC-SVC Protocol 24 2.6 Performance Analysis 29 2.6.1 Cryptographic Algorithm Evaluation 29 2.6.2 Security Protocol Evaluation 31 2.7 Conclusion 34 III.Ensuring End-to-End Security with Fine-grained Access Control for Connected and Autonomous Vehicles 36 3.1 Introduction 36 3.2 System and Security Models 38 3.2.1 System Model 39 3.2.2 Attack Model and Security Requirements 41 3.2.3 Security Definitions of OEEP-ABE and OE-IBS 42 3.2.4 Security Definitions of PS-E2EID 43 3.3 Preliminaries 45 3.3.1 Outsourcing-Enabled and Enhanced Privacy-preserving ABE (OEEP-ABE) 45 3.3.2 Outsourcing-Enabled IBS (OE-IBS) 48 3.4 Practical and Secure Vehicular Communication Protocol for End-to-End Security to In- vehicle End-devices (PS-E2EID) 49 3.4.1 System Initialization and Key Management 50 3.4.2 Initial Authentication and Preliminary 50 3.4.3 Attribute-based Data Sharing (ABDS) 53 3.4.4 Encryption Material Update 55 3.5 Security Analysis 55 3.5.1 Security Analysis of OEEP-ABE and OE-IBS 55 3.5.2 Security Analysis of PS-E2EID 56 3.6 Performance Analysis 61 3.6.1 Cryptographic Algorithm Execution time 61 3.6.2 Security Protocol Evaluation 62 3.6.3 Performance Comparison with Related Works 63 3.7 Conclusions 65 IV.Location-encapsulated Access Control for Location-based Services in 6G Networks 66 4.1 Introduction 66 4.2 Preliminaries 67 4.2.1 Bilinear Pairing 67 4.2.2 Segment Tree 68 4.2.3 Pseudorandom Function 68 4.2.4 Assumption 68 4.3 Location-encapsulated Attribute-based Encryption (LeABE) 69 4.3.1 Function Definitions 70 4.3.2 Security Definitions 71 4.3.3 Construction 72 4.4 Security and Performance Analysis 75 4.4.1 Security Analysis 75 4.4.2 Performance Analysis 76 4.5 Conclusions 77 V. Conclusions 79 References 81 |
- |
dc.format.extent | 89 | - |
dc.language | eng | - |
dc.publisher | DGIST | - |
dc.title | Fine-grained Access Control Design for Secure Vehicular Communications | - |
dc.title.alternative | 안전한 차량 통신을 위한 세분화된 접근 제어 설계 | - |
dc.type | Thesis | - |
dc.identifier.doi | 10.22677/THESIS.200000725989 | - |
dc.description.degree | Doctor | - |
dc.contributor.department | Department of Electrical Engineering and Computer Science | - |
dc.contributor.coadvisor | Jemin Lee | - |
dc.date.awarded | 2024-02-01 | - |
dc.publisher.location | Daegu | - |
dc.description.database | dCollection | - |
dc.citation | XT.ID 유25 202402 | - |
dc.date.accepted | 2024-01-30 | - |
dc.contributor.alternativeDepartment | 전기전자컴퓨터공학과 | - |
dc.subject.keyword | vehicle communication | - |
dc.subject.keyword | fine-grained access control | - |
dc.subject.keyword | autonomous driving | - |
dc.subject.keyword | attribute-based encryption | - |
dc.subject.keyword | edge computing | - |
dc.subject.keyword | cryptosystem | - |
dc.subject.keyword | security protocol | - |
dc.subject.keyword | end-to-end security | - |
dc.subject.keyword | location-based access control | - |
dc.contributor.affiliatedAuthor | Donghyun Yu | - |
dc.contributor.affiliatedAuthor | Sungjin Lee | - |
dc.contributor.affiliatedAuthor | Jemin Lee | - |
dc.contributor.alternativeName | 유동현 | - |
dc.contributor.alternativeName | Sungjin Lee | - |
dc.contributor.alternativeName | 이제민 | - |
dc.rights.embargoReleaseDate | 2027-02-28 | - |
There are no files associated with this item.