scispace - formally typeset
Open AccessJournal ArticleDOI

SEMD: Secure and efficient message dissemination with policy enforcement in VANET☆

TLDR
A secure and efficient message dissemination scheme (SEMD) with policy enforcement in VANET is proposed, and an outsourcing decryption of ciphertext-policy attribute-based encryption (CP-ABE) to provide differentiated access control services, which makes the vehicles delegate most of the decryption computation to nearest roadside unit (RSU).
About
This article is published in Journal of Computer and System Sciences.The article was published on 2016-12-01 and is currently open access. It has received 39 citations till now. The article focuses on the topics: Encryption & Vehicular ad hoc network.

read more

Citations
More filters
Journal ArticleDOI

A comparative classification of information dissemination approaches in vehicular ad hoc networks from distinctive viewpoints: A survey

TL;DR: A comprehensive survey on information dissemination in vehicular networks by focusing on some critical issues such as security and privacy, adaptability, scalability and so on, and classify the existing information dissemination solutions into eight new classes based on their design and optimization objectives.
Journal ArticleDOI

Adaptive Multimedia Data Forwarding for Privacy Preservation in Vehicular Ad-Hoc Networks

TL;DR: Experimental results thoroughly demonstrate that the proposed CP-ABE delegation scheme is effective and efficient for multimedia data forwarding in vehicular ad-hoc networks with privacy preservation.
Journal ArticleDOI

A Privacy-Preserving and Verifiable Querying Scheme in Vehicular Fog Data Dissemination

TL;DR: A secure querying scheme in vehicular fog data dissemination, in which the roadside units act as fog storage devices to cache data at network edge and disseminate data upon querying, can achieve the security goals of unlinkability, confidentiality, and verifiability.
Journal ArticleDOI

Computation Offloading and Retrieval for Vehicular Edge Computing: Algorithms, Models, and Classification

TL;DR: By reviewing and analyzing literature, it is found that vehicular edge computing is feasible and a viable option to address the increasing volume of data traffic and the open challenges and future directions that must be addressed towards efficient and effective computation offloading and retrieval from mobile users to vehicle edge computing.
Journal ArticleDOI

Resource Allocation for SVC Streaming Over Cooperative Vehicular Networks

TL;DR: This paper forms a joint optimization problem to answer questions about the number of video layers that should be transmitted for each vehicle, the selection of relay vehicles to assist destination vehicles, and the assignment of radio resources to direct and cooperative communications.
References
More filters
Proceedings ArticleDOI

Ciphertext-Policy Attribute-Based Encryption

TL;DR: A system for realizing complex access control on encrypted data that is conceptually closer to traditional access control methods such as role-based access control (RBAC) and secure against collusion attacks is presented.
Book ChapterDOI

Fuzzy identity-based encryption

TL;DR: In this article, a new type of identity-based encryption called Fuzzy Identity-Based Encryption (IBE) was introduced, where an identity is viewed as set of descriptive attributes, and a private key for an identity can decrypt a ciphertext encrypted with an identity if and only if the identities are close to each other as measured by the set overlap distance metric.
Posted Content

Fuzzy Identity Based Encryption.

TL;DR: In this paper, a new type of identity-based encryption called Fuzzy Identity-Based Encryption (IBE) was introduced, where an identity is viewed as set of descriptive attributes, and a private key for an identity can decrypt a ciphertext encrypted with an identity if and only if the identities are close to each other as measured by the set overlap distance metric.
Book ChapterDOI

Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization

TL;DR: A new methodology for realizing Ciphertext-Policy Attribute Encryption (CP-ABE) under concrete and noninteractive cryptographic assumptions in the standard model is presented.
Posted Content

Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization.

TL;DR: In this article, the authors present a new methodology for realizing Ciphertext-Policy Attribute Encryption (CP-ABE) under concrete and noninteractive cryptographic assumptions in the standard model.
Related Papers (5)