I. Introduction 1 1.1 Background 1 1.2 Research Outlines and Contributions 2 1.2.1 Chapter II 2 1.2.2 Chapter III 3 1.2.3 Chapter IV 3 1.2.4 Chapter V 4 II. EC-SVC: Secure CAN Bus In-Vehicle Communications with Fine-grained Access Control Based on Edge Computing 5 2.1 Introduction 5 2.1.1 Related Work 6 2.1.2 Motivation and Contribution 7 2.2 System and Security Models 8 2.2.1 System Model 9 2.2.2 Attack Model and Security Requirements 9 2.2.3 Security Definitions of Enhanced Attribute-based Encryption with Hidden Policy and Credential 11 2.2.4 Security Definitions of Secure In-Vehicle Communications with Access Control 12 2.3 System Preliminaries 14 2.3.1 Pseudorandom Function and Permutations 14 2.3.2 Enhanced Attribute-based Encryption with Hidden Policy and Credential 15 2.4 Proposed Secure In-Vehicle Communications with Fine-grained Access Control based on Edge Computing (EC-SVC) 18 2.4.1 Key Management 18 2.4.2 In-vehicle Security Protocol 19 2.5 Security Analysis 22 2.5.1 Security Analysis of Enhanced Attribute-based Encryption with Hidden Policy and Credential 22 2.5.2 Security Analysis of EC-SVC Protocol 24 2.6 Performance Analysis 29 2.6.1 Cryptographic Algorithm Evaluation 29 2.6.2 Security Protocol Evaluation 31 2.7 Conclusion 34 III.Ensuring End-to-End Security with Fine-grained Access Control for Connected and Autonomous Vehicles 36 3.1 Introduction 36 3.2 System and Security Models 38 3.2.1 System Model 39 3.2.2 Attack Model and Security Requirements 41 3.2.3 Security Definitions of OEEP-ABE and OE-IBS 42 3.2.4 Security Definitions of PS-E2EID 43 3.3 Preliminaries 45 3.3.1 Outsourcing-Enabled and Enhanced Privacy-preserving ABE (OEEP-ABE) 45 3.3.2 Outsourcing-Enabled IBS (OE-IBS) 48 3.4 Practical and Secure Vehicular Communication Protocol for End-to-End Security to In- vehicle End-devices (PS-E2EID) 49 3.4.1 System Initialization and Key Management 50 3.4.2 Initial Authentication and Preliminary 50 3.4.3 Attribute-based Data Sharing (ABDS) 53 3.4.4 Encryption Material Update 55 3.5 Security Analysis 55 3.5.1 Security Analysis of OEEP-ABE and OE-IBS 55 3.5.2 Security Analysis of PS-E2EID 56 3.6 Performance Analysis 61 3.6.1 Cryptographic Algorithm Execution time 61 3.6.2 Security Protocol Evaluation 62 3.6.3 Performance Comparison with Related Works 63 3.7 Conclusions 65 IV.Location-encapsulated Access Control for Location-based Services in 6G Networks 66 4.1 Introduction 66 4.2 Preliminaries 67 4.2.1 Bilinear Pairing 67 4.2.2 Segment Tree 68 4.2.3 Pseudorandom Function 68 4.2.4 Assumption 68 4.3 Location-encapsulated Attribute-based Encryption (LeABE) 69 4.3.1 Function Definitions 70 4.3.2 Security Definitions 71 4.3.3 Construction 72 4.4 Security and Performance Analysis 75 4.4.1 Security Analysis 75 4.4.2 Performance Analysis 76 4.5 Conclusions 77 V. Conclusions 79 References 81