Back to Search Start Over

An attribute-encryption-based cross-chain model in urban internet of vehicles.

Authors :
Chen, Mao
Jiang, Yuan
Huang, Ju
Ou, Wei
Han, Wenbao
Zhang, Qionglu
Source :
Computers & Electrical Engineering. Apr2024, Vol. 115, pN.PAG-N.PAG. 1p.
Publication Year :
2024

Abstract

With the maturity of Internet of Vehicles (IoV) technology and blockchain technology, numerous application scenarios have emerged, including urban Internet of Vehicles, Highway Internet of Vehicles, and Specific Area Internet of Vehicles. However, the urban Internet of Vehicles systems face data security and operational mode discretization challenges. To address these issues, we propose a data security cross-chain model for the urban Internet of Vehicles. Our model utilizes hash time lock contracts to exchange data between vehicles of the same brand and model but located in different urban areas. It also uses trusted relay chains to facilitate data exchange between vehicles of the same brands but varying models within the same urban area, thus solving the problem of difficult inter-system data exchange in the urban Internet of Vehicles. In the urban Internet of Vehicles, the transmitted data encompasses business and general data, which may have varying sensitivities. To ensure data confidentiality, we propose the HR-CP-ABE algorithm, which extends CP-ABE functionalities by incorporating hierarchical decryption and revocable vehicle attributes. And the fine-grained access control by setting different access tree structures and file access validity periods. This guarantees the confidentiality and security of urban data. Finally, experimental results demonstrate that the proposed model effectively satisfies the standards for cross-chain transactions as outlined in the Evaluation Requirements for Blockchain Application Security Technology(DB43/T 1842–2020) and Evaluation Requirements for Blockchain Network Security Technology(DB43/T 1840–2020). Additionally, our model demonstrates enhanced resilience against man-in-the-middle and replay attacks. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
00457906
Volume :
115
Database :
Academic Search Index
Journal :
Computers & Electrical Engineering
Publication Type :
Academic Journal
Accession number :
176010641
Full Text :
https://doi.org/10.1016/j.compeleceng.2024.109136