期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
TRE-DSP:A traceable and revocable CP-ABE based data sharing scheme for IoV with partially hidden policy
1
作者 Yousheng Zhou Rundong Peng +2 位作者 yuanni liu Pandi Vijayakumar Brij Gupta 《Digital Communications and Networks》 2025年第2期455-464,共10页
With the popularity of the Internet of Vehicles(IoV),a large amount of data is being generated every day.How to securely share data between the IoV operator and various value-added service providers becomes one of the... With the popularity of the Internet of Vehicles(IoV),a large amount of data is being generated every day.How to securely share data between the IoV operator and various value-added service providers becomes one of the critical issues.Due to its flexible and efficient fine-grained access control feature,Ciphertext-Policy Attribute-Based Encryption(CP-ABE)is suitable for data sharing in IoV.However,there are many flaws in most existing CP-ABE schemes,such as attribute privacy leakage and key misuse.This paper proposes a Traceable and Revocable CP-ABE-based Data Sharing with Partially hidden policy for IoV(TRE-DSP).A partially hidden access structure is adopted to hide sensitive user attribute values,and attribute categories are sent along with the ciphertext to effectively avoid privacy exposure.In addition,key tracking and malicious user revocation are introduced with broadcast encryption to prevent key misuse.Since the main computation task is outsourced to the cloud,the burden of the user side is relatively low.Analysis of security and performance demonstrates that TRE-DSP is more secure and practical for data sharing in IoV. 展开更多
关键词 PRIVACY-PRESERVING Attribute-based encryption Partially hidden policy Traceability User revocation Internet of vehicles
在线阅读 下载PDF
A hierarchical blockchain-enabled security-threat assessment architecture for IoV 被引量:2
2
作者 yuanni liu Ling Pan Shanzhi Chen 《Digital Communications and Networks》 SCIE CSCD 2024年第4期1035-1047,共13页
In Internet of Vehicles(IoV),the security-threat information of various traffic elements can be exploited by hackers to attack vehicles,resulting in accidents,privacy leakage.Consequently,it is necessary to establish ... In Internet of Vehicles(IoV),the security-threat information of various traffic elements can be exploited by hackers to attack vehicles,resulting in accidents,privacy leakage.Consequently,it is necessary to establish security-threat assessment architectures to evaluate risks of traffic elements by managing and sharing securitythreat information.Unfortunately,most assessment architectures process data in a centralized manner,causing delays in query services.To address this issue,in this paper,a Hierarchical Blockchain-enabled Security threat Assessment Architecture(HBSAA)is proposed,utilizing edge chains and global chains to share data.In addition,data virtualization technology is introduced to manage multi-source heterogeneous data,and a metadata association model based on attribute graph is designed to deal with complex data relationships.In order to provide high-speed query service,the ant colony optimization of key nodes is designed,and the HBSAA prototype is also developed and the performance is tested.Experimental results on the large-scale vulnerabilities data gathered from NVD demonstrate that the HBSAA not only shields data heterogeneity,but also reduces service response time. 展开更多
关键词 Internet of vehicles Blockchain Edge computing Data virtualization Data service composition
在线阅读 下载PDF
Participants Recruitment for Coverage Maximization by Mobility Predicting in Mobile Crowd Sensing 被引量:2
3
作者 yuanni liu Xi liu +2 位作者 Xin Li Mingxin Li Yi Li 《China Communications》 SCIE CSCD 2023年第8期163-176,共14页
Mobile Crowd Sensing(MCS)is an emerging paradigm that leverages sensor-equipped smart devices to collect data.The introduction of MCS also poses some challenges such as providing highquality data for upper layer MCS a... Mobile Crowd Sensing(MCS)is an emerging paradigm that leverages sensor-equipped smart devices to collect data.The introduction of MCS also poses some challenges such as providing highquality data for upper layer MCS applications,which requires adequate participants.However,recruiting enough participants to provide the sensing data for free is hard for the MCS platform under a limited budget,which may lead to a low coverage ratio of sensing area.This paper proposes a novel method to choose participants uniformly distributed in a specific sensing area based on the mobility patterns of mobile users.The method consists of two steps:(1)A second-order Markov chain is used to predict the next positions of users,and select users whose next places are in the target sensing area to form a candidate pool.(2)The Average Entropy(DAE)is proposed to measure the distribution of participants.The participant maximizing the DAE value of a specific sensing area with different granular sub-areas is chosen to maximize the coverage ratio of the sensing area.Experimental results show that the proposed method can maximize the coverage ratio of a sensing area under different partition granularities. 展开更多
关键词 data average entropy human mobility prediction markov chain mobile crowd sensing
在线阅读 下载PDF
基于区块链的车联网安全综述 被引量:22
4
作者 刘媛妮 李奕 陈山枝 《中国科学:信息科学》 CSCD 北大核心 2023年第5期841-877,共37页
随着车联网(Internet of vehicles, IoV或vehicle to everything, V2X)技术推动汽车行业和交通行业的智能化、网联化进程加快,车联网安全问题日益严峻.区块链(Blockchain, BC)作为分布式数据存储、点对点传输、共识机制、加密算法等技... 随着车联网(Internet of vehicles, IoV或vehicle to everything, V2X)技术推动汽车行业和交通行业的智能化、网联化进程加快,车联网安全问题日益严峻.区块链(Blockchain, BC)作为分布式数据存储、点对点传输、共识机制、加密算法等技术的集成应用,为车联网安全提供新的解决思路.本文对基于区块链的车联网安全研究展开综述,首先汇总了现有的车联网安全威胁和防护手段;其次梳理了区块链和车联网结合的研究价值;然后分析了当前基于区块链的车联网安全关键技术;接着从通信安全、数据安全、应用安全3个角度重点阐述了现有基于区块链的车联网安全防护手段和方法,并总结了现有的基于区块链的新型车联网安全体系架构;最后展望了基于区块链的车联网安全的未来发展方向和研究重点. 展开更多
关键词 车联网安全 区块链 通信安全 数据安全 应用安全
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部