Abstract:
Cloud-assisted vehicular delay tolerant networks (DTNs) have been utilized in wide-ranging applications where a continuous end-to-end connection is unavailable, the messa...Show MoreMetadata
Abstract:
Cloud-assisted vehicular delay tolerant networks (DTNs) have been utilized in wide-ranging applications where a continuous end-to-end connection is unavailable, the message transmission is fulfilled by the cooperation among vehicular nodes and follows a store-carry-and-forward manner, and the complex computational work can be delegated to the disengaged vehicles in the parking lots which constitute the potential vehicular cloud. Nevertheless, the existing incentive schemes as well as the packet forwarding protocols cannot well model continuous vehicle collaboration, resist vehicle compromise attacks and collusion attacks, leaving the privacy preservation issues untouched. In this paper, a novel threshold credit-based incentive mechanism (TCBI) is proposed based on the modified model of population dynamics to efficiently resist the node compromise attacks, stimulate the cooperation among intermediate nodes, maximize vehicular nodes’ interest, and realize the fairness of possessing the same opportunity of transmitting packets for credits. Then, a TCBI-based privacy-preserving packet forwarding protocol is proposed to solve the open problem of resisting layer-adding attack by outsourcing the privacy-preserving aggregated transmission evidence generation for multiple resource-constrained vehicles to the cloud side from performing any one-way trapdoor function only once. The vehicle privacy is well protected from both the cloud and transportation manager. Finally, formal security proof and the extensive simulation show the effectiveness of our proposed TCBI in resisting the sophisticated attacks and the efficiency in terms of high reliability, high delivery ratio, and low average delay in cloud-assisted vehicular DTNs.
Published in: IEEE Transactions on Information Forensics and Security ( Volume: 10, Issue: 6, June 2015)
Funding Agency:

Shanghai Key Laboratory for Trustworthy Computing, East China Normal University, Shanghai, China
Jun Zhou is currently pursuing the Ph.D. degree in computer science with the Trusted Digital Technology Laboratory, Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China. He has been with East China Normal University since 2014. His research interests mainly include secure e-healthcare systems, and privacy preserving outsourcing computation in cryptography and information security.
Jun Zhou is currently pursuing the Ph.D. degree in computer science with the Trusted Digital Technology Laboratory, Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China. He has been with East China Normal University since 2014. His research interests mainly include secure e-healthcare systems, and privacy preserving outsourcing computation in cryptography and information security.View more

Shanghai Key Laboratory for Trustworthy Computing, East China Normal University, Shanghai, China
Xiaolei Dong is a Distinguished Professor in East China Normal University. After her graduation with a doctorate degree from Harbin Institute of Technology in 2001, she pursued her post-doctoral study in SJTU from September 2001 to July 2003. She joined the Department of Computer Science and Engineering, SJTU, in 2003. In 2014, she joined East China Normal University, where she is currently a Distinguished Professor. Her ...Show More
Xiaolei Dong is a Distinguished Professor in East China Normal University. After her graduation with a doctorate degree from Harbin Institute of Technology in 2001, she pursued her post-doctoral study in SJTU from September 2001 to July 2003. She joined the Department of Computer Science and Engineering, SJTU, in 2003. In 2014, she joined East China Normal University, where she is currently a Distinguished Professor. Her ...View more

Shanghai Key Laboratory for Trustworthy Computing, East China Normal University, Shanghai, China
Zhenfu Cao (SM’10) received the B.Sc. degree in computer science and technology and the Ph.D. degree in mathematics from the Harbin Institute of Technology, Harbin, China, in 1983 and 1999, respectively. He was exceptionally promoted to Associate Professor in 1987, became a Professor in 1991, and is currently a Distinguished Professor with East China Normal University, China. Since 1981, over 400 academic papers have been...Show More
Zhenfu Cao (SM’10) received the B.Sc. degree in computer science and technology and the Ph.D. degree in mathematics from the Harbin Institute of Technology, Harbin, China, in 1983 and 1999, respectively. He was exceptionally promoted to Associate Professor in 1987, became a Professor in 1991, and is currently a Distinguished Professor with East China Normal University, China. Since 1981, over 400 academic papers have been...View more

Department of Electrical and Computer Engineering, National Technical University of Athens, Athens, Greece
Athanasios V. Vasilakos is currently a Visiting Professor with the National Technical University of Athens, Greece. He served as an Editor of many technical journals, such as the IEEE Transactions on Network and Service Management, the IEEE Transactions on Systems, Man, and Cybernetics—Part B, the IEEE Transactions on Information Technology in Biomedicine, the ACM Transactions on Autonomous and Adaptive Systems, and the I...Show More
Athanasios V. Vasilakos is currently a Visiting Professor with the National Technical University of Athens, Greece. He served as an Editor of many technical journals, such as the IEEE Transactions on Network and Service Management, the IEEE Transactions on Systems, Man, and Cybernetics—Part B, the IEEE Transactions on Information Technology in Biomedicine, the ACM Transactions on Autonomous and Adaptive Systems, and the I...View more

Shanghai Key Laboratory for Trustworthy Computing, East China Normal University, Shanghai, China
Jun Zhou is currently pursuing the Ph.D. degree in computer science with the Trusted Digital Technology Laboratory, Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China. He has been with East China Normal University since 2014. His research interests mainly include secure e-healthcare systems, and privacy preserving outsourcing computation in cryptography and information security.
Jun Zhou is currently pursuing the Ph.D. degree in computer science with the Trusted Digital Technology Laboratory, Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China. He has been with East China Normal University since 2014. His research interests mainly include secure e-healthcare systems, and privacy preserving outsourcing computation in cryptography and information security.View more

Shanghai Key Laboratory for Trustworthy Computing, East China Normal University, Shanghai, China
Xiaolei Dong is a Distinguished Professor in East China Normal University. After her graduation with a doctorate degree from Harbin Institute of Technology in 2001, she pursued her post-doctoral study in SJTU from September 2001 to July 2003. She joined the Department of Computer Science and Engineering, SJTU, in 2003. In 2014, she joined East China Normal University, where she is currently a Distinguished Professor. Her primary research interests include number theory, cryptography, and trusted computing. Her Number Theory and Modern Cryptographic Algorithms project received the first prize of the China University Science and Technology Award in 2002. Her New Theory of Cryptography and Some Basic Problems project received the second prize of the Shanghai Nature Science Award in 2007. Her Formal Security Theory of Complex Cryptographic System and Applications project received the second prize of the Ministry of Education Natural Science Progress Award in 2008. She hosts a number of research projects supported by the National Basic Research Program of China (973 Program), and the special funds on information security of the National Development and Reform Commission, and the National Natural Science Foundation of China.
Xiaolei Dong is a Distinguished Professor in East China Normal University. After her graduation with a doctorate degree from Harbin Institute of Technology in 2001, she pursued her post-doctoral study in SJTU from September 2001 to July 2003. She joined the Department of Computer Science and Engineering, SJTU, in 2003. In 2014, she joined East China Normal University, where she is currently a Distinguished Professor. Her primary research interests include number theory, cryptography, and trusted computing. Her Number Theory and Modern Cryptographic Algorithms project received the first prize of the China University Science and Technology Award in 2002. Her New Theory of Cryptography and Some Basic Problems project received the second prize of the Shanghai Nature Science Award in 2007. Her Formal Security Theory of Complex Cryptographic System and Applications project received the second prize of the Ministry of Education Natural Science Progress Award in 2008. She hosts a number of research projects supported by the National Basic Research Program of China (973 Program), and the special funds on information security of the National Development and Reform Commission, and the National Natural Science Foundation of China.View more

Shanghai Key Laboratory for Trustworthy Computing, East China Normal University, Shanghai, China
Zhenfu Cao (SM’10) received the B.Sc. degree in computer science and technology and the Ph.D. degree in mathematics from the Harbin Institute of Technology, Harbin, China, in 1983 and 1999, respectively. He was exceptionally promoted to Associate Professor in 1987, became a Professor in 1991, and is currently a Distinguished Professor with East China Normal University, China. Since 1981, over 400 academic papers have been published in journals or conferences. His research interests mainly include number theory, cryptography, and information security. He serves as a member of the Expert Panel of the National Nature Science Fund of China. He has received a number of awards, including the Youth Research Fund Award of the Chinese Academy of Science in 1986, the Ying-Tung Fok Young Teacher Award in 1989, the National Outstanding Youth Fund of China in 2002, and the Special Allowance by the State Council in 2005. He was a corecipient of the 2007 IEEE International Conference on Communications-Computer and Communications Security Symposium Best Paper Award in 2007. He is the Leader of the Asia 3 Foresight Program (61161140320), and the key project (61033014) of the National Natural Science Foundation of China.
Zhenfu Cao (SM’10) received the B.Sc. degree in computer science and technology and the Ph.D. degree in mathematics from the Harbin Institute of Technology, Harbin, China, in 1983 and 1999, respectively. He was exceptionally promoted to Associate Professor in 1987, became a Professor in 1991, and is currently a Distinguished Professor with East China Normal University, China. Since 1981, over 400 academic papers have been published in journals or conferences. His research interests mainly include number theory, cryptography, and information security. He serves as a member of the Expert Panel of the National Nature Science Fund of China. He has received a number of awards, including the Youth Research Fund Award of the Chinese Academy of Science in 1986, the Ying-Tung Fok Young Teacher Award in 1989, the National Outstanding Youth Fund of China in 2002, and the Special Allowance by the State Council in 2005. He was a corecipient of the 2007 IEEE International Conference on Communications-Computer and Communications Security Symposium Best Paper Award in 2007. He is the Leader of the Asia 3 Foresight Program (61161140320), and the key project (61033014) of the National Natural Science Foundation of China.View more

Department of Electrical and Computer Engineering, National Technical University of Athens, Athens, Greece
Athanasios V. Vasilakos is currently a Visiting Professor with the National Technical University of Athens, Greece. He served as an Editor of many technical journals, such as the IEEE Transactions on Network and Service Management, the IEEE Transactions on Systems, Man, and Cybernetics—Part B, the IEEE Transactions on Information Technology in Biomedicine, the ACM Transactions on Autonomous and Adaptive Systems, and the IEEE Journal on Selected Areas in Communications Special Issues in 2009 and 2011. He is the Chairman of the Council of Computing of the European Alliances for Innovation.
Athanasios V. Vasilakos is currently a Visiting Professor with the National Technical University of Athens, Greece. He served as an Editor of many technical journals, such as the IEEE Transactions on Network and Service Management, the IEEE Transactions on Systems, Man, and Cybernetics—Part B, the IEEE Transactions on Information Technology in Biomedicine, the ACM Transactions on Autonomous and Adaptive Systems, and the IEEE Journal on Selected Areas in Communications Special Issues in 2009 and 2011. He is the Chairman of the Council of Computing of the European Alliances for Innovation.View more