Secure Data Provenance in Internet of Vehicles with Verifiable Credentials for Security and Privacy

被引:0
|
作者
Nepal, Anuj [1 ]
Doss, Robin [1 ]
Jiang, Frank [1 ]
机构
[1] Deakin Univ, Deakin Cyber Res & Innovat Ctr Deakin Cyber, Geelong, Vic, Australia
关键词
Verifiable Credentials; Secure Data Provenance; Data Plausibility; Location Verification; Source Authentication; Data Privacy; Internet of Vehicles; Data Integrity; AUTHENTICATION;
D O I
10.1109/DSN-S60304.2024.00025
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The emergence of the Internet of Vehicles (IoVs) has also exposed security challenges that require advanced strategies to maintain secure data provenance (SDP) and ensure data credibility and anomaly detection. This paper introduces an innovative framework tailored for the dynamic and distributed nature of IoVs that enables the secure tracing of data origins and ensures the reliability of data through plausibility checks. Our approach leverages the principles of decentralized SDP using Verifiable Credentials (VCs) and distributed ledger technology (DLT) to establish a traceable and tamper-evident data lineage, enhancing the integrity and authenticity of vehicular communications. To address the complexities of anomaly detection, we integrate checks that scrutinize data streams for abnormal patterns, enabling the timely identification and mitigation of potential security breaches. We also propose a robust mechanism to assess data plausibility, ensuring that only credible and verifiable data influence the decision-making processes in the IoVs ecosystem. Through detailed experimentation and analysis, our methodology demonstrates significant improvements in securing IoVs against common threats such as impersonation, data tampering, and privacy breaches. This fosters a trustworthy and resilient vehicular network environment.
引用
收藏
页码:59 / 61
页数:3
相关论文
共 50 条
  • [31] Internet of Vehicles and Autonomous Connected Car - Privacy and Security Issues
    Joy, Joshua
    Gerla, Mario
    2017 26TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN 2017), 2017,
  • [32] Security, Trust, and Privacy for the Internet of Vehicles: A Deep Learning Approach
    Muhammad, Ghulam
    Alhussein, Musaed
    IEEE CONSUMER ELECTRONICS MAGAZINE, 2022, 11 (06) : 49 - 55
  • [33] Data provenance to audit compliance with privacy policy in the Internet of Things
    Thomas Pasquier
    Jatinder Singh
    Julia Powles
    David Eyers
    Margo Seltzer
    Jean Bacon
    Personal and Ubiquitous Computing, 2018, 22 : 333 - 344
  • [34] Data provenance to audit compliance with privacy policy in the Internet of Things
    Pasquier, Thomas
    Singh, Jatinder
    Powles, Julia
    Eyers, David
    Seltzer, Margo
    Bacon, Jean
    PERSONAL AND UBIQUITOUS COMPUTING, 2018, 22 (02) : 333 - 344
  • [35] Lightweight Authenticated Privacy-Preserving Secure Framework for the Internet of Vehicles
    Jamjoom, Mona
    Abulkasim, Hussein
    Abbas, Safia
    Security and Communication Networks, 2022, 2022
  • [36] Secure Blockchain-Enabled Internet of Vehicles Scheme with Privacy Protection
    Zhang, Jiansheng
    Xin, Yang
    Wang, Yuyan
    Lei, Xiaohui
    Yang, Yixian
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 75 (03): : 6185 - 6199
  • [37] Prevoke: Privacy-Preserving Configurable Method for Revoking Verifiable Credentials
    Manimaran, Praveensankar
    da Conceicao, Arlindo F.
    Garrett, Thiago
    Raikwar, Mayank
    Vitenberg, Roman
    2024 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN, BLOCKCHAIN 2024, 2024, : 354 - 361
  • [38] An Efficient and Secure Data Transmission Mechanism for Internet of Vehicles Considering Privacy Protection in Fog Computing Environment
    Zhang, Wenjuan
    Li, Gang
    IEEE ACCESS, 2020, 8 (08): : 64461 - 64474
  • [39] Blockchain-cloud privacy-enhanced distributed industrial data trading based on verifiable credentials
    Fang, Junli
    Feng, Tao
    Guo, Xian
    Ma, Rong
    Lu, Ye
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2024, 13 (01):
  • [40] Blockchain-cloud privacy-enhanced distributed industrial data trading based on verifiable credentials
    Junli Fang
    Tao Feng
    Xian Guo
    Rong Ma
    Ye Lu
    Journal of Cloud Computing, 13