CPSS: CP-ABE based Platoon Secure Sensing Scheme against Cyber-Attacks

被引:0
|
作者
Jiang, Feng [1 ]
Qi, Buren [1 ]
Wu, Tianhao [1 ]
Zhu, Konglin [1 ]
Zhang, Lin [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Informat & Commun Engn, Beijing 100876, Peoples R China
基金
国家重点研发计划;
关键词
ATTRIBUTE-BASED-ENCRYPTION; KEY MANAGEMENT;
D O I
暂无
中图分类号
U [交通运输];
学科分类号
08 ; 0823 ;
摘要
Platoon is one of cooperative driving applications where a set of vehicles can collaboratively sense each other for driving safety and traffic efficiency. However, platoon without security insurance makes the cooperative vehicles vulnerable to cyber-attacks, which may cause life-threatening accidents. In this paper, we introduce malicious attacks in platoon maneuvers. To defend against these attacks, we propose a Cyphertext-Policy Attribute-Based Encryption (CP-ABE) based Platoon Secure Sensing scheme, named CPSS. In the CPSS, platoon key is encapsulated in the access control structure in the key distribution process, so that interference messages sending by attackers without the platoon key could be ignored. Therefore, the sensing data which contains speed and position information can be protected. In this way, speed and distance fluctuations caused by attacks can be mitigated even eliminated thereby avoiding the collisions and ensuring the overall platoon stability. Time complexity analysis shows that the CPSS is more efficient than that of the polynomial time solutions. Finally, to evaluate capabilities of the CPSS, we integrate a LTE-V2X with platoon maneuvers based on Veins platform. The evaluation results show that the CPSS outperforms the baseline algorithm by 25% in terms of distance variations.
引用
收藏
页码:3218 / 3223
页数:6
相关论文
共 50 条
  • [41] CHTDS: A CP-ABE Access Control Scheme Based on Hash Table and Data Segmentation in NDN
    Wu, Zhijun
    Xu, Enzhong
    Liu, Liang
    Yue, Meng
    2019 18TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS/13TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (TRUSTCOM/BIGDATASE 2019), 2019, : 843 - 848
  • [42] A CP-ABE and IOTA-Based Lightweight Sensitive Data Access Control Scheme for IoT
    Yao, Xuanxia
    Zhou, Jinyuan
    Du, Xiaojiang
    Zhang, Shurong
    IEEE Internet of Things Journal, 2024, 11 (24) : 40831 - 40844
  • [43] A Multi-authority CP-ABE Scheme based on Cloud-Chain Fusion for SWIM
    Wang, Qing
    Zhang, Lizhe
    Lu, Xin
    Wang, Kenian
    2022 IEEE INTL CONF ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, BIG DATA & CLOUD COMPUTING, SUSTAINABLE COMPUTING & COMMUNICATIONS, SOCIAL COMPUTING & NETWORKING, ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM, 2022, : 213 - 219
  • [44] Asynchronous secure control for singular nonhomogeneous Markov jump cyber-physical systems against dual cyber-attacks
    Zhang, Shuyu
    Wang, Yanqian
    Zhuang, Guangming
    Lv, Chengxing
    OPTIMAL CONTROL APPLICATIONS & METHODS, 2024, 45 (01): : 106 - 137
  • [45] Secure Control of DC Microgrids under Cyber-Attacks based on Recurrent Neural Networks
    Habibi, Mohammad Reza
    Dragicevic, Tomislav
    Blaabjerg, Frede
    2020 IEEE 11TH INTERNATIONAL SYMPOSIUM ON POWER ELECTRONICS FOR DISTRIBUTED GENERATION SYSTEMS (PEDG), 2020, : 517 - 521
  • [46] Secure dynamic-event-based filtering for descriptor nonhomogeneous Markovian jump cyber-physical systems against hybrid cyber-attacks
    Wang, Yanqian
    Zhang, Shuyu
    Zhuang, Guangming
    Shao, Mingwei
    INTERNATIONAL JOURNAL OF ADAPTIVE CONTROL AND SIGNAL PROCESSING, 2024, 38 (10) : 3422 - 3455
  • [47] An efficient access control scheme based on CP-ABE with supporting attribute change in cloud storage systems
    Ye T.
    Cai Y.
    Zhao X.
    Yang Y.
    Wang W.
    Zhu Y.
    International Journal of Wireless and Mobile Computing, 2019, 16 (01) : 41 - 49
  • [48] Observer-based adaptive ISMC for connected vehicles against cyber-attacks
    Yue, Wei
    Shen, Hongxia
    Guo, Xiangjun
    Wang, Liyuan
    MEASUREMENT & CONTROL, 2023, 56 (3-4): : 638 - 653
  • [49] The Countermeasure Strategy Based on Big Data against North Korean Cyber-attacks
    Lee, Yong-joon
    Kwon, Hyuk-jin
    Lee, Jae-il
    Shin, Dong-kyoo
    KOREAN JOURNAL OF DEFENSE ANALYSIS, 2018, 30 (03): : 437 - 454
  • [50] Multivariate Gaussian-Based False Data Detection Against Cyber-Attacks
    An, Yu
    Liu, Dong
    IEEE ACCESS, 2019, 7 : 119804 - 119812