Journal of Computer Applications ›› 2023, Vol. 43 ›› Issue (6): 1870-1877.DOI: 10.11772/j.issn.1001-9081.2022050734
Special Issue: 网络空间安全
• Cyber security • Previous Articles Next Articles
Ruiqi FENG1,2, Leilei WANG1,2, Xiang LIN1,2, Jinbo XIONG1,2()
Received:
2022-05-23
Revised:
2022-06-14
Accepted:
2022-06-20
Online:
2022-06-30
Published:
2023-06-10
Contact:
Jinbo XIONG
About author:
FENG Ruiqi, born in 1999, M. S. candidate. Her research interests include secure deep learning, privacy protection.Supported by:
冯睿琪1,2, 王雷蕾1,2, 林翔1,2, 熊金波1,2()
通讯作者:
熊金波
作者简介:
冯睿琪(1999—),女,内蒙古包头人,硕士研究生,CCF会员,主要研究方向:安全深度学习、隐私保护基金资助:
CLC Number:
Ruiqi FENG, Leilei WANG, Xiang LIN, Jinbo XIONG. Software Guard Extensions-based secure data processing framework for traffic monitoring of internet of vehicles[J]. Journal of Computer Applications, 2023, 43(6): 1870-1877.
冯睿琪, 王雷蕾, 林翔, 熊金波. 基于软件防护扩展的车联网路况监测安全数据处理框架[J]. 《计算机应用》唯一官方网站, 2023, 43(6): 1870-1877.
Add to citation manager EndNote|Ris|BibTeX
URL: https://www.joca.cn/EN/10.11772/j.issn.1001-9081.2022050734
RID | 分类 | 限速/(km·h-1) | 监控范围 | 拥堵下限辆数 |
---|---|---|---|---|
RG*** | 高速路 | 120 | 500 m×2 | 70 |
RK*** | 快速路 | 100 | 350 m×2 | 50 |
RM*** | 主干路 | 80 | 250 m×2 | 30 |
RC*** | 次干路 | 60 | 200 m×2 | 30 |
RZ*** | 支路 | 30 | 100 m×2 | 15 |
Tab. 1 RSU parameter setting
RID | 分类 | 限速/(km·h-1) | 监控范围 | 拥堵下限辆数 |
---|---|---|---|---|
RG*** | 高速路 | 120 | 500 m×2 | 70 |
RK*** | 快速路 | 100 | 350 m×2 | 50 |
RM*** | 主干路 | 80 | 250 m×2 | 30 |
RC*** | 次干路 | 60 | 200 m×2 | 30 |
RZ*** | 支路 | 30 | 100 m×2 | 15 |
表KEY | 表DATA | ||
---|---|---|---|
列名 | 含义 | 列名 | 含义 |
MID | ME标识符 | MID | ME标识符 |
grm* | 临时会话密钥 | plate* | 车牌号 |
PKM | ME公钥 | sT | 时速与记录时间 |
cnt* | 消息计数 | ||
last* | 上次发送时间 |
Tab. 2 RSU database setting
表KEY | 表DATA | ||
---|---|---|---|
列名 | 含义 | 列名 | 含义 |
MID | ME标识符 | MID | ME标识符 |
grm* | 临时会话密钥 | plate* | 车牌号 |
PKM | ME公钥 | sT | 时速与记录时间 |
cnt* | 消息计数 | ||
last* | 上次发送时间 |
表REPO | 表TRAFFIC | 表PKEY | |||
---|---|---|---|---|---|
列名 | 含义 | 列名 | 含义 | 列名 | 含义 |
serial | 报告编号 | rn | 道路名 | ID | ME/RSU标识符 |
MID | ME标识符 | tc | 路况 | PK | 对应公钥 |
cipher | 密文报告 |
Tab. 3 CS database setting
表REPO | 表TRAFFIC | 表PKEY | |||
---|---|---|---|---|---|
列名 | 含义 | 列名 | 含义 | 列名 | 含义 |
serial | 报告编号 | rn | 道路名 | ID | ME/RSU标识符 |
MID | ME标识符 | tc | 路况 | PK | 对应公钥 |
cipher | 密文报告 |
方案 | ME与RSU的双向认证 | 假冒CS | 假冒ME |
---|---|---|---|
PFCF[ | 存在数据泄露风险 | 不可感知 | 不可感知 |
PPVF[ | 需可信第三方 | 不可感知 | 可感知 |
SDPF | 安全实现 | 可感知 | 可感知 |
Tab. 4 Security comparison of different schemes
方案 | ME与RSU的双向认证 | 假冒CS | 假冒ME |
---|---|---|---|
PFCF[ | 存在数据泄露风险 | 不可感知 | 不可感知 |
PPVF[ | 需可信第三方 | 不可感知 | 可感知 |
SDPF | 安全实现 | 可感知 | 可感知 |
操作 | 含义 | 平均耗时/ms |
---|---|---|
远程认证验证耗时 | 39.000 0 | |
RSA签名信息耗时(0.1 KB) | 0.640 0 | |
RSA验证签名耗时(0.1 KB) | 1.320 0 | |
RSA加密信息耗时(0.1 KB) | 0.070 0 | |
RSA解密信息耗时(0.1 KB) | 0.090 0 | |
AES加密信息耗时(0.1 KB) | 0.001 1 | |
AES解密信息耗时(0.1 KB) | 0.001 7 | |
RSU验证时间戳与MID等内容 | 1.030 0 | |
密封耗时(0.1 KB) | 0.015 0 | |
解封耗时(0.1 KB) | 0.010 0 |
Tab. 5 Average time taken to perform each operation
操作 | 含义 | 平均耗时/ms |
---|---|---|
远程认证验证耗时 | 39.000 0 | |
RSA签名信息耗时(0.1 KB) | 0.640 0 | |
RSA验证签名耗时(0.1 KB) | 1.320 0 | |
RSA加密信息耗时(0.1 KB) | 0.070 0 | |
RSA解密信息耗时(0.1 KB) | 0.090 0 | |
AES加密信息耗时(0.1 KB) | 0.001 1 | |
AES解密信息耗时(0.1 KB) | 0.001 7 | |
RSU验证时间戳与MID等内容 | 1.030 0 | |
密封耗时(0.1 KB) | 0.015 0 | |
解封耗时(0.1 KB) | 0.010 0 |
协议 | ME | RSU | CS |
---|---|---|---|
CS-RE初始化 | — | ||
ME-RE初始化 | — | ||
定期报告协议 |
Tab. 6 Time complexity of security protocols
协议 | ME | RSU | CS |
---|---|---|---|
CS-RE初始化 | — | ||
ME-RE初始化 | — | ||
定期报告协议 |
协议 | ME | RSU | CS |
---|---|---|---|
CS-RE初始化 | — | 0.74 | 40.41 |
ME-RE初始化 | 39.13 | 1.22 | — |
定期报告协议 | ≈0 | 0.97 | 1.40 |
Tab. 7 Running time of security protocols
协议 | ME | RSU | CS |
---|---|---|---|
CS-RE初始化 | — | 0.74 | 40.41 |
ME-RE初始化 | 39.13 | 1.22 | — |
定期报告协议 | ≈0 | 0.97 | 1.40 |
协议 | 网络复杂度 |
---|---|
CS-RE初始化 | 3 |
ME-RE初始化 | 5 |
定期报告协议 |
Tab. 8 Network complexity of security protocols
协议 | 网络复杂度 |
---|---|
CS-RE初始化 | 3 |
ME-RE初始化 | 5 |
定期报告协议 |
方案 | 单会话消息长度/b | 单车辆计算开销/ms |
---|---|---|
PFCF[ | 561 | 320.00 |
PPVF[ | 720 | 1.16 |
SDPF | 54 | 0.97 |
Tab. 9 Performance comparison
方案 | 单会话消息长度/b | 单车辆计算开销/ms |
---|---|---|
PFCF[ | 561 | 320.00 |
PPVF[ | 720 | 1.16 |
SDPF | 54 | 0.97 |
1 | 中国信息通信研究院. 车联网白皮书(2017年)[R]. 北京:中国信息通信研究院, 2017:2. |
China Academy of Information and Communications Technology. Internet of Vehicles white paper (2017)[R]. Beijing: China Academy of Information and Communications Technology, 2017: 2. | |
2 | 中国联合网络通信集团有限公司. 中国联通智能路侧单元白皮书[R]. 北京:中国联合网络通信集团有限公司, 2019:4-8. 10.18690/actageotechslov.15.2.38-46.2018 |
China United Communications Group Company Limited. China Unicom intelligent road side unit white paper [R]. Beijing: China United Communications Group Company Limited, 2019: 4-8. 10.18690/actageotechslov.15.2.38-46.2018 | |
3 | 中国信息通信研究院. 车联网网络安全白皮书: No.202128[R]. 北京:中国信息通信研究院, 2021:18-19. 10.47037/2021.aces.j.36094 |
China Academy of Information and Communications Technology. Cybersecurity white paper for Internet of Vehicles: No.202128 [R]. Beijing: China Academy of Information and Communications Technology, 2021: 18-19. 10.47037/2021.aces.j.36094 | |
4 | LU R X, LIN X D, SHI Z G, et al. A lightweight conditional privacy-preservation protocol for vehicular traffic-monitoring systems[J]. IEEE Intelligent Systems, 2013, 28(3): 62-65. 10.1109/mis.2013.56 |
5 | HOH B, GRUTESER M, HERRING R, et al. Virtual trip lines for distributed privacy-preserving traffic monitoring [C]// Proceedings of the 6th International Conference on Mobile Systems, Applications, and Services. New York: ACM, 2008: 15-28. 10.1145/1378600.1378604 |
6 | JOLFAEI A, KANT K. Privacy and security of connected vehicles in intelligent transportation system [C]// Proceedings of 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume. Piscataway: IEEE, 2019: 9-10. 10.1109/dsn-s.2019.00010 |
7 | IVANOV I, MAPLE C, WATSON T, et al. Cyber security standards and issues in V2X communications for Internet of Vehicles[C]// Living in the Internet of Things: Cybersecurity of the IoT 2018, IET Conference Publications 740. Stevenage: Institution of Engineering and Technology, 2018: 374-379. 10.1049/cp.2018.0046 |
8 | SINGH M, KIM S. Security analysis of intelligent vehicles: challenges and scope [C]// Proceedings of 2017 International SoC Design Conference. Piscataway: IEEE, 2017: 13-14. 10.1109/isocc.2017.8368805 |
9 | WEI J N, WANG X J, LI N, et al. A privacy-preserving fog computing framework for vehicular crowdsensing networks[J]. IEEE Access, 2018, 6: 43776-43784. 10.1109/access.2018.2861430 |
10 | 陈葳葳,曹利,邵长虹. 基于区块链技术的车联网高效匿名认证方案[J]. 计算机应用, 2020, 40(10):2992-2999. |
CHEN W W, CAO L, SHAO C H. Blockchain based efficient anonymous authentication scheme for IOV[J]. Journal of Computer Applications, 2020, 40(10): 2992-2999. | |
11 | KARIM H, RAWAT D B. TollsOnly please — homomorphic encryption for toll transponder privacy in internet of vehicles [J]. IEEE Internet of Things Journal, 2022, 9(4): 2627-2636. 10.1109/jiot.2021.3056240 |
12 | ABBES S, REKHIS S. A blockchain-based solution for reputation management in IoV[C]// Proceedings of 2021 International Wireless Communications and Mobile Computing. Piscataway: IEEE, 2021: 1129-1134. 10.1109/iwcmc51323.2021.9498940 |
13 | LIU J, LI X H, JIANG Q, et al. BUA: a blockchain-based unlinkable authentication in VANETs [C]// Proceedings of 2020 IEEE International Conference on Communications. Piscataway: IEEE, 2020: 1-6. 10.1109/icc40277.2020.9148863 |
14 | CHENG H Y, SHOJAFAR M, ALAZAB M, et al. PPVF: privacy-preserving protocol for vehicle feedback in cloud-assisted VANET[J]. IEEE Transactions on Intelligent Transportation Systems, 2022, 23(7): 9391-9403. 10.1109/tits.2021.3117950 |
15 | LI S H, XUE K P, WEI D S L, et al. SecGrid: a secure and efficient SGX-enabled smart grid system with rich functionalities[J]. IEEE Transactions on Information Forensics and Security, 2020, 15: 1318-1330. 10.1109/tifs.2019.2938875 |
16 | VALADARES D C G, M S L da SILVA, BRITO A E M, et al. Achieving data dissemination with security using FIWARE and Intel Software Guard Extensions (SGX) [C]// Proceedings of 2018 IEEE Symposium on Computers and Communications. Piscataway: IEEE, 2018: 1-7. 10.1109/iscc.2018.8538590 |
17 | DURAND A, GREMAUD P, PASQUIER J, et al. Trusted lightweight communication for IoT systems using hardware security[C]// Proceedings of the 9th International Conference on the Internet of Things. New York: ACM, 2019: No.5. 10.1145/3365871.3365876 |
18 | AYOADE G, EL-GHAMRY A, KARANDE V, et al. Secure data processing for IoT middleware systems[J]. The Journal of Supercomputing, 2019, 75(8): 4684-4709. 10.1007/s11227-018-2686-x |
19 | Corporation Intel. Intel® software guard extensions (Intel® SGX)[EB/OL]. [2022-05-15].. |
20 | YANG Z, LI X D, WEI L B, et al. SGX-ICN: a secure and privacy-preserving information-centric networking with SGX enclaves [C]// Proceedings of 3rd International Conference on Hot Information-Centric Networking. Piscataway: IEEE, 2020: 142-147. 10.1109/hoticn50779.2020.9350832 |
21 | SCHUSTER F, COSTA M, FOURNET C, et al. VC3: trustworthy data analytics in the cloud using SGX [C]// Proceedings of 2015 IEEE Symposium on Security and Privacy. Piscataway: IEEE, 2015: 38-54. 10.1109/sp.2015.10 |
22 | 巫光福,王影军. 基于区块链与云-边缘计算混合架构的车联网数据安全存储与共享方案[J]. 计算机应用, 2021, 41(10):2885-2892. 10.11772/j.issn.1001-9081.2020121938 |
WU G F, WANG Y J. Secure storage and sharing scheme of internet of vehicles data based on hybrid architecture of blockchain and cloud-edge computing[J]. Journal of Computer Applications, 2021, 41(10): 2885-2892. 10.11772/j.issn.1001-9081.2020121938 | |
23 | ZHANG Y Y, XIONG J B, LIU X M. Privacy-preserving traffic violation image filtering and searching via crowdsensing[J]. Mobile Networks and Applications, 2022, 27(6): 2374-2390. 10.1007/s11036-021-01882-7 |
24 | LIU B, ZHOU W L, ZHU T Q, et al. Silence is golden: enhancing privacy of location-based services by content broadcasting and active caching in wireless vehicular networks[J]. IEEE Transactions on Vehicular Technology, 2016, 65(12): 9942-9953. 10.1109/tvt.2016.2531185 |
25 | 中华人民共和国住房和城乡建设部. 城市综合交通体系规划标准: [S]. 北京:中国建筑工业出版社, 2019:30-37. 10.1093/oso/9780198829225.003.0004 |
Ministry of Housing and Urban-Rural Development of the People’s Republic of China. Standard for urban comprehensive transport system planning: [S]. Beijing: China Architecture & Building Press, 2019: 30-37. 10.1093/oso/9780198829225.003.0004 | |
26 | RAWAT D B, GARUBA M, CHEN L, et al. On the security of information dissemination in the Internet-of-Vehicles[J]. Tsinghua Science and Technology, 2017, 22(4): 438-445. 10.23919/tst.2017.7986946 |
27 | 中华人民共和国交通运输部. 道路运输车辆卫星定位系统 终端通信协议及数据格式: [S]. 北京:人民交通出版社, 2019:3-10. |
Ministry of Transport of the People’s Republic of China. Global navigation satellite system for vehicles engaged in road transport - general specifications for vehicle terminal communication protocol and data format: [S]. Beijing: China Communications Press, 2019: 3-10. | |
28 | 赵波,袁安琪,安杨. SGX在可信计算中的应用分析[J]. 网络与信息安全学报, 2021, 7(6):126-142. 10.11959/j.issn.2096-109x.2021066 |
ZHAO B, YUAN A Q, AN Y. Application progress of SGX in trusted computing area[J]. Chinese Journal of Network and Information Security, 2021, 7(6): 126-142. 10.11959/j.issn.2096-109x.2021066 |
[1] | Jiepo FANG, Chongben TAO. Hybrid internet of vehicles intrusion detection system for zero-day attacks [J]. Journal of Computer Applications, 2024, 44(9): 2763-2769. |
[2] | Xiaoyan ZHAO, Wei HAN, Junna ZHANG, Peiyan YUAN. Collaborative offloading strategy in internet of vehicles based on asynchronous deep reinforcement learning [J]. Journal of Computer Applications, 2024, 44(5): 1501-1510. |
[3] | Xin LI, Liyong BAO, Hongwei DING, Zheng GUAN. MAC layer scheduling strategy of roadside units based on MEC server priority service [J]. Journal of Computer Applications, 2024, 44(4): 1227-1235. |
[4] | Meihong CHEN, Lingyun YUAN, Tong XIA. Data classified and graded access control model based on master-slave multi-chain [J]. Journal of Computer Applications, 2024, 44(4): 1148-1157. |
[5] | Jinbo LI, Ping ZHANG, Ji ZHANG, Muhua LIU. Identity-based ring signature scheme on number theory research unit lattice [J]. Journal of Computer Applications, 2023, 43(9): 2798-2805. |
[6] | Jieqin WANG, Shihyang LIN, Shiming PENG, Shuo JIA, Miaohui YANG. Hierarchical resource allocation mechanism of cooperative mobile edge computing [J]. Journal of Computer Applications, 2022, 42(8): 2501-2510. |
[7] | Zhi LI, Jianbin XUE. Task offloading and resource allocation based on simulated annealing algorithm in C-V2X internet of vehicles [J]. Journal of Computer Applications, 2022, 42(10): 3140-3147. |
[8] | Dong ZHU, Xinchun YIN, Jianting NING. Certificateless signature scheme with strong privacy protection for internet of vehicles [J]. Journal of Computer Applications, 2022, 42(10): 3091-3101. |
[9] | SHEN Yumin, WANG Jinlong, HU Diankai, LIU Xingyu. Multi-person collaborative creation system of building information modeling drawings based on blockchain [J]. Journal of Computer Applications, 2021, 41(8): 2338-2345. |
[10] | CHEN Weiwei, CAO Li, GU Xiang. E-forensics model for internet of vehicles based on blockchain [J]. Journal of Computer Applications, 2021, 41(7): 1989-1995. |
[11] | WANG Jiarui, TAN Guoping, ZHOU Siyuan. Clustered wireless federated learning algorithm in high-speed internet of vehicles scenes [J]. Journal of Computer Applications, 2021, 41(6): 1546-1550. |
[12] | QIN Jing, AN Wen, JI Changqing, WANG Zumin. Review of privacy protection mechanisms in wireless body area network [J]. Journal of Computer Applications, 2021, 41(4): 970-975. |
[13] | GAO Haoyu, LI Leixiao, LIN Hao, LI Jie, DENG Dan, LI Shaoxu. Research and application progress of blockchain in area of data integrity protection [J]. Journal of Computer Applications, 2021, 41(3): 745-755. |
[14] | WU Guangfu, WANG Yingjun. Secure storage and sharing scheme of internet of vehicles data based on hybrid architecture of blockchain and cloud-edge computing [J]. Journal of Computer Applications, 2021, 41(10): 2885-2892. |
[15] | CHEN Jinyu, LIU Zhaowei. Internet of vehicles system based on improved proof of vote consensus protocol [J]. Journal of Computer Applications, 2021, 41(1): 170-176. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||