Next Article in Journal
Point-of-Care Diagnostics in Coagulation Management
Previous Article in Journal
Smart Contract Centric Inference Engine For Intelligent Electric Vehicle Transportation System
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Review

A Survey on Secure Computation Based on Homomorphic Encryption in Vehicular Ad Hoc Networks

1
The Guangdong Key Laboratory of Intelligent Information Processing, College of Electronics and Information Engineering, Shenzhen University, Shenzhen 518060, China
2
Key Laboratory of Optoelectronic Devices and Systems of Ministry of Education and Guangdong Province, College of Physics and Optoelectronic Engineering, Shenzhen University, Shenzhen 518060, China
3
Department of Systems and Computer Engineering, Carleton University, Ottawa, ON K1S 5B6, Canada
*
Author to whom correspondence should be addressed.
Sensors 2020, 20(15), 4253; https://doi.org/10.3390/s20154253
Submission received: 17 June 2020 / Revised: 24 July 2020 / Accepted: 27 July 2020 / Published: 30 July 2020
(This article belongs to the Section Sensor Networks)

Abstract

:
In vehicular ad hoc networks (VANETs), the security and privacy of vehicle data are core issues. In order to analyze vehicle data, they need to be computed. Encryption is a common method to guarantee the security of vehicle data in the process of data dissemination and computation. However, encrypted vehicle data cannot be analyzed easily and flexibly. Because homomorphic encryption supports computations of the ciphertext, it can completely solve this problem. In this paper, we provide a comprehensive survey of secure computation based on homomorphic encryption in VANETs. We first describe the related definitions and the current state of homomorphic encryption. Next, we present the framework, communication domains, wireless access technologies and cyber-security issues of VANETs. Then, we describe the state of the art of secure basic operations, data aggregation, data query and other data computation in VANETs. Finally, several challenges and open issues are discussed for future research.

1. Introduction

With the help of many different technologies, vehicular ad hoc networks (VANETs) [1,2,3,4,5] are expected to enhance transportation efficiency, reduce accidents, offer great mobility service options and alleviate environmental damage [6,7,8,9]. In the next decade, VANETs will continue to develop steadily and progressively because of improved infrastructure, wireless sensors and communication technologies. The global market of VANETs is one of biggest markets in the world; it is expected to reach $1.5 trillion in 2030. Many countries and large-scale automotive manufacturers are speeding up the design of practical VANETs.
In VANETs, vehicle data are first collected from various sensors. Because these collected data are raw and rough, they cannot be used directly by users. Thus, they must be calculated by a third party with a powerful computation ability. The final computation result can be used in several applications; for example, according to the query requirements, some useful vehicle data may be returned back to the user. Another application is data aggregation, which is helpful to compress, filter and transmit vehicle data.
Vehicle data [10,11,12] include users’ original and real data, such as location, biometric information and so on. The handling of the data usually involves personal privacy, safety of property and even the security of human life. In order to analyze vehicle data, there is a need for a mathematical model to be developed. In addition, vehicle data are disseminated to an untrusted third party for computation; thus, it is likely that vehicle data will be illegally accessed, forged, tampered or discarded in the process of data dissemination [13,14,15] and computation.
In order to protect user privacy, we can encrypt vehicle data by a traditional encryption algorithm. Unfortunately, encrypted vehicle data cannot be analyzed easily and flexibly. Homomorphic encryption [16] makes it possible for encrypted user data to be analyzed by an untrusted Cloud server without decryption. In addition, the communication cost between the user and the Cloud server is low. Homomorphic encryption is helpful for securing precision in medicine, the secure distribution of power in smart grids, the secure prediction of teenagers’ dropout risks and the secure analysis of vehicle data.
Thus, an untrusted third party can analyze encrypted vehicle data perfectly using homomorphic encryption without leaking users’ private data. Finally, the encrypted result is returned to the user. The result of the analysis can be obtained by the user with their own secret key. To analyze vehicle data securely, the key point is to construct a secure and efficient homomorphic encryption scheme. However, the efficiency of homomorphic operations is too low; there is no efficient method for the construction of an efficient secure computation method based on homomorphic encryption. Furthermore, an exploration of several types of secure computation is required.
In this paper, we provide a brief survey of some of the works that have already been done regarding the construction and analysis of secure computation based on homomorphic encryption in VANETs, as well as the open issues in this field. The taxonomy graph of this paper is presented in Figure 1. As shown in this figure, we identify three aspects of secure computation based on homomorphic encryption in VANETs. These aspects consist of homomorphic encryption, the overview of VANETs and secure computation based on homomorphic encryption in VANETs. At present, there are several surveys [17,18] on traditional homomorphic encryption schemes. To the best of our knowledge, there is no survey on secure computation based on homomorphic encryption in VANETs. We believe that our discussion and exploration can give readers an overall understanding of this important field and will encourage more subsequent studies on the open issues.
The rest of the article is organized as follows. In Section 2, we provide the related definitions and current state of homomorphic encryption. Section 3 introduces the related framework, communication domains, wireless access technologies and cyber-security issues in VANETs. Furthermore, Section 4 presents the state of the art of secure basic operations, data aggregation, data query, other data computation in VANETs and several open issues. Finally, Section 5 concludes the article.

2. Homomorphic Encryption

Homomorphic encryption is an encryption technique that supports a particular time-consuming evaluation algorithm. This algorithm allows certain types of operations to be carried out on the ciphertext without requiring access to a secret key. In addition, this algorithm generates an encrypted result in which the decryption matches the result of the computation on the plaintext. For example, there are two plaintexts x and y; we want to compute 3 x y + x without leaking x and y. Thus, we first use the homomorphic encryption algorithm E n c to encrypt x and y. E n c ( x ) and E n c ( y ) are ciphertexts of x and y, respectively. Then, we compute E n c ( 3 x y + x ) = 3 × E n c ( x ) × E n c ( y ) + E n c ( x ) , where 3 × E n c ( x ) × E n c ( y ) + E n c ( x ) denotes homomorphic operations. The final ciphertext is E n c ( 3 x y + x ) , and the plaintext is 3 x y + x . In order to obtain a better understanding of homomorphic encryption, we present related definitions and the current state of homomorphic encryption in this section.

2.1. Definition

Definition 1 
(Homomorphic Encryption [19]). A homomorphic encryption scheme H E = ( K e y G e n , E n c , D e c , E v a l ) consists of four probabilistic polynomial algorithms. The detailed definition of homomorphic encryption is described as follows:
  • H E . K e y G e n ( 1 λ ) : The security parameter λ is taken as an input. Output parameters include a public key p k , a secret key s k and an evaluation key e v k , namely ( p k , s k , e v k ) H E . K e y G e n ( 1 λ ) .
  • H E . E n c ( p k , m ) : The public key p k and a plaintext m are taken as inputs. Then, the ciphertext c is output, namely c H E . E n c ( p k , m ) .
  • H E . D e c ( s k , c ) : The secret key s k and the ciphertext c are taken as inputs. The decryption result m * is output, namely m * H E . D e c ( s k , c ) .
  • H E . E v a l ( e v k , f , c 0 , , c l 1 ) : Input parameters include the evaluation key e v k , a function f and ciphertexts c 0 , , c l 1 , where the plaintext of c i is m i , i = 0 , , l 1 , l is the number of ciphertexts. Then, the final ciphertext c f is output, namely c f H E . E v a l ( e v k , f , c 0 , , c l 1 ) , where H E . D e c ( s k , c f ) = f ( m 0 , , m l 1 ) , f is an operational circuit over the plaintext space.
Definition 2 
(Leveled FHE [20]). Let H E be a homomorphic encryption scheme. If the depth of the circuit is at most L, then H E is a leveled fully homomorphic encryption (FHE) scheme, where the computational complexity of H E is polynomial, and the upper bound of the ciphertext size of c must be independent of L.
For a family of homomorphic encryption schemes { ε d } with different depths, they have the same decryption circuit. In addition, ε d computes all the circuits compactly. In most cases, the bit-length of the evaluation key e v k is the only parameter which depends on the leveled FHE scheme with L.
Definition 3 
(Semantic Security). Let H E be a homomorphic encryption scheme. There is a probabilistic polynomial-time adversary, if
A d v [ A ] = P r [ A ( p k , e v k , H E . E n c ( p k , 0 ) ) = 1 ] P r [ A ( p k , e v k , H E . E n c ( p k , 1 ) ) = 1 ] = n e g l ( k ) ,
H E is semantic security, where ( p k , s k , e v k ) H E . K e y G e n ( 1 λ ) . It can resist a chosen plaintext attack (CPA).
Homomorphic encryption originates from privacy homomorphism, which was proposed by Rivest et al. [16] for banking applications in 1978. Homomorphic encryption outputs a final ciphertext, the decryption of which is equivalent to the result of the same operations on the plaintext. According to the types and numbers of homomorphic operations, there are three different kinds of homomorphic encryption. As the earliest type of homomorphic encryption, partial homomorphic encryption only supports homomorphic addition or homomorphic multiplication. Somewhat homomorphic encryption supports a finite number of homomorphic addition and homomorphic multiplication operations. Then, fully homomorphic encryption (FHE) supports an infinite number of homomorphic addition and homomorphic multiplication operations. These variants are described as follows.

2.2. Partial Homomorphic Encryption

There are several partial homomorphic encryption schemes, which are described as follows. In 1978, Rivest et al. [21] proposed the RSA cryptographic algorithm, which supports homomorphic multiplication. Its security is based on the factorization of a large integer. In 1982, Goldwasser and Micali [22] constructed the GM probabilistic encryption algorithm, which supports homomorphic addition. Its security is based on the assumption of quadratic residue. In 1985, the ElGamal cryptographic algorithm [23], which supports homomorphic multiplication, was constructed based on the problem of the discrete logarithm. In 1999, based on the assumption of decisional composite residuosity, Paillier [24] constructed a cryptographic algorithm that supported homomorphic addition. In 2005, Boneh et al. [25] first proposed a cryptographic algorithm that supported an infinite amount of homomorphic addition and one homomorphic multiplication operation.

2.3. Fully and Somewhat Homomorphic Encryption

In 2009, based on the theory of ideal lattices, Gentry [19] first constructed a FHE scheme, the security of which was based on problems of bounded distance decoding and sparse subset sums. In Gentry’s scheme, the construction was divided into two parts: the author first proposed a somewhat homomorphic encryption scheme, which could execute low-degree polynomial operations on the ciphertext; then, bootstrapping was realized by the technique of squashing the decryption circuit. The somewhat homomorphic encryption scheme was then converted to a FHE scheme. After that work, FHE became a research hotspot. Numerous experts and scholars around the world have focused on research into FHE. However, the construction of FHE based on the theory of ideal lattices is overly complicated; the sizes of the ciphertext, public keys and private keys are excessively large. Currently, the research into FHE mainly focuses on the techniques of the approximate greatest common divisor (APGCD), relinearization and the approximate eigenvector. The development of FHE is shown in Figure 2, which is described as follows.

2.3.1. FHE Based on APGCD

In 2010, based on the APGCD problem, Dijk et al. [26] first proposed the DGHV10 FHE scheme over integers. Their method only uses trivial operations over integers. In [27], based on the DGHV10 scheme, the proposed somewhat homomorphic encryption scheme, called the CMNT11 scheme, transformed the number of integers from τ to τ in the public key. In the CNT12 FHE scheme [28], Coron et al. used the technique of public key compression [27] to reduce the size of the public key. In [20], the technique of squashing the decryption circuit was replaced by the technique of modulus reduction. The computational complexity would increase if the technique of modulus reduction were applied for the DGHV10 scheme. In 2013, Cheon et al. [29] first proposed the batch CCKM+13 FHE scheme over integers by using the Chinese remainder theorem. In 2014, Coron et al. [30] proposed the improved CLT14 FHE scheme over integers, which is scale-invariant, which means that the noise of ciphertexts increases linearly after each homomorphic multiplication. The assumption of learning with errors (LWE) is secure against an attack by a quantum computer. In 2015, Cheon et al. [31] reduced the LWE assumption to the APGCD problem, which means that the hardness of the APGCD problem is not easier than that of the LWE assumption. Based on the improved APGCD problem, Cheon et al. [31] constructed the CS15 FHE scheme without the technique of squashing the decryption circuit. Its ciphertext size is only O ( λ log λ ) , where λ is the security parameter. In 2017, based on the decisional APGCD problem, Benarroch et al. [32] constructed the BBL17 FHE scheme by the technique of approximate eigenvector. The proposed scheme does not require the noise-free component or the assumption of a sparse subset sum.

2.3.2. FHE Based on Relinearization

Based on the LWE assumption, Brakerski et al. [33] constructed the BV11 FHE scheme by the relinearization technique. This scheme abandoned the technique of squashing the decryption circuit and the problem of the sparse subset sum. It could execute one homomorphic multiplication without increasing the ciphertext size. Based on the assumption of binary LWE [34], Chen et al. [35] proposed the CWZS14 FHE scheme, the concrete parameters of which are analyzed as follows. In this scheme, the secret key is generated from { 0 , 1 } l randomly, where l is the dimension. Compared with Brakerski’s FHE scheme [36], in Chen’s scheme, the sizes of the public key and secret key are log q times smaller, the size of tensor ciphertext is log 2 q times smaller and the key switching matrix is log 3 q times smaller, where q is the modulus. In [37], Chen’s scheme [35] was extended to the batch CSZ16 FHE scheme. Compared with the LWE assumption, the assumption of learning with errors over rings (RLWE) has the advantage that its polynomial multiplication can be implemented by the technique of the fast Fourier transform. Thus, it can be used to construct more efficient FHE schemes, which are described as follows.
In 2012, Brakerski et al. [20] constructed the leveled BGV12 FHE scheme, which uses the technique of modulus reduction to reduce the noise of ciphertext without bootstrapping. In addition, the dimension of ciphertext is reduced by the technique of key switching. The BGV12 scheme supports the technique of single instruction multiple data (SIMD). Based on the variant BGV12 scheme, Helevi [38] built a software library (HElib) that implements FHE by Gentry’s optimization [39]. Brakerski [36] proposed the Bra12 FHE scheme by a new tensoring technique without modulus reduction. This scheme is scale-invariant, which means the same modulus is used in the evaluation process. In 2013, based on [40], Bos et al. [41] constructed the BLLN13 FHE scheme, which supports the SIMD technique. In this scheme, the ciphertext only consists of a single ring element. The ciphertext size is constant after each homomorphic multiplication. Based on the BGV12 scheme, the CZ17 FHE scheme [42] is proposed by using an efficient bootstrapping method, which incurs only polynomial noise O ( n 3 ) · B , where n is the dimension of the lattice and B is the upper bound of the noise. Based on the FHE scheme in [41], Dowlin et al. [43] implemented a simple homomorphic encryption library (SEAL),which can be used for the secure computation of biological information, genetic data, etc. In the CH18 FHE scheme, Chen et al. [44] improved the homomorphic digit extraction algorithm. Then, the algorithm was applied for the bootstrapping process in the BGV12 scheme. The depth of the bootstrapping process is reduced from log h + 2 log t to log h + log t , where h is the 1-norm s 1 of the secret key s and t is the plaintext modulus.
However, the above schemes do not support approximate computation on the ciphertext. Thus, based on the BGV12 scheme, Cheon et al. [45] constructed the CKKS17 homomorphic encryption scheme, which supports approximate homomorphic addition and homomorphic multiplication on the ciphertext. In this scheme, the predetermined precision of message in the ciphertext can be guaranteed by the rescaling procedure. The ciphertext size is decreased significantly. Then, in the CHKK+18 scheme, Cheon et al. [46] proposed an approximate bootstrapping method for the CKKS17 scheme. Next, in the CCS19 scheme, Chen et al. [47] proposed an improved bootstrapping method for the CHKK+18 scheme.

2.3.3. FHE Based on Approximate Eigenvectors

In 2013, Gentry et al. [48] first proposed the simple GSW13 FHE scheme, which was constructed based on the technique of approximate eigenvectors. In the GSW13 scheme, homomorphic addition and homomorphic multiplication are reduced to only addition and multiplication on the matrix. The noise of the ciphertext increases linearly after each homomorphic operation. However, the GSW13 scheme does not support the SIMD technique. Then, based on the GSW13 scheme, some improved FHE schemes were developed, which are described as follows.
In the AP14 FHE scheme [49], Alperin-Sheriff and Peikert improved the GSW13 scheme by symmetric groups and permutation matrices. In this scheme, the speed of bootstrapping is faster than that of the GSW13 scheme. The noise of the ciphertext increases linearly after each homomorphic multiplication. Based on the GSW13 scheme, Berkoff and Liu [50] proposed the leakage-resilient BL14 FHE scheme. The proposed scheme is homomorphic for circuits for which the depth is less than the pre-defined maximum set in the procedure of key generation. In 2015, the DM15 FHE scheme [51] was constructed based on the GSW13 scheme. Ducas and Micciancio used a new method to compute the NAND of two ciphertexts homomorphically. It only takes about 0.5 s to execute the algorithm of bootstrapping on a personal computer. In order to restrict the noise of ciphertext during the procedure of key switching, the DM15 scheme used the binary LWE assumption, where ensuring security proved to be as difficult as the standard LWE assumption. In the CGGI16 FHE scheme [52], Chillotti et al. showed that the internal product can be replaced by a simple external product which consists of ciphertexts which are generated by the GSW13 scheme and the LWE assumption. In this scheme, the time of bootstrapping is reduced to 0.1 s. The size of the bootstrapping public key is decreased from 1 GB to 24 MB under the same security parameter. In the KGV16 FHE scheme [53], Khedr et al. introduced several algorithmic optimizations, which can reduce computational complexity and speed up homomorphic operations for the implementation of the GSW13 scheme. Its parallelism is realized by the GPU platform. The ciphertext size in this scheme is smaller than that of the scheme in HElib. In [54], the proposed LGM16 FHE scheme was made secure against adaptive attacks by a new method. The idea of the method is that a one-time secret key is created each time in the procedure of decryption. Thus, the adversary cannot recover the valid secret key. Based on the GSW13 scheme, Li et al. [55] constructed the multi-bit LMW17 FHE scheme, which could prevent an adversary from obtaining the secret key effectively by a side channel attack.
Unfortunately, in above FHE schemes, ciphertexts are under the same key pair. In order to solve this issue, two kinds of improved FHE schemes—namely multi-key FHE and threshold FHE—have been developed and are described as follows.
Based on the NTRU [56], López-Alt et al. [57] constructed a multi-key FHE scheme. This scheme allows the computation of ciphertexts whose key pairs are different from each other. However, its computational complexity increases exponentially along with the increasing number of key pairs. In 2015, Clear and McGoldrick [58] proposed a multi-key FHE scheme, whose security is based on the LWE assumption in the standard model. Based on the multi-key GSW13 scheme [48], Mukherjeet et al. [59] proposed a multi-key FHE scheme. However, their method only supports homomorphic operations on single-bit plaintext. In this protocol, the ciphertext size grows n 2 times, where n is the number of key pairs. Based on the LWE assumption, Brakerski and Perlman [60] proposed a dynamic multi-key FHE scheme, whose ciphertext size increases linearly along with the increasing number of key pairs. However, the procedure of bootstrapping is needed for the implementation of homomorphic multiplication or homomorphic exclusivity. Based on the LWE assumption, Peikert and Shiehian [61] constructed two kinds of multi-key FHE schemes. The proposed schemes are multi-hop methods for keys, which means that homomorphic operations with other keys can use the former result of homomorphic operations on ciphertexts under a sequence of keys. Besides, the proposed schemes have smaller ciphertext sizes. In the second scheme, ciphertexts are simply GSW13 ciphertexts without any other data. In 2017, based on the RLWE assumption, Chen et al. [62] proposed the first batched multi-hop and multi-key FHE scheme with compact ciphertext expansion. In previous schemes, complicated computations are needed for the expansion algorithm for each ciphertext, whereas Chen’s expansion algorithm only needs to compute evaluation keys. Thus, the complexity of ciphertext expansion only depends on the number of key pairs and has nothing to do with the number of ciphertexts. Based on the GSW13 scheme, Wang et al. [63] proposed a multi-key FHE scheme whose security can be reduced to a some-are-errorless LWE assumption. Based on the LWE assumption, Brakerski et al. [64] proposed a multi-key FHE scheme with a distributed set-up procedure.
Based on the BV11 scheme [33], López-Alt et al. [65] designed a key homomorphic threshold FHE scheme. In this scheme, many key pairs can be combined into a key pair. Based on the GSW13 scheme, Gordon et al. [66] proposed a threshold FHE scheme with flexible and transformed ciphertexts. In this scheme, there is a key pair in the joint key pair; thus, algorithms of encryption and evaluation algorithms need not be changed.
Due to the high efficiency of partial homomorphic encryption and somewhat homomorphic encryption, they have been applied for engineering applications. In FHE, the noise of the ciphertext often increases exponentially after each homomorphic multiplication. Noise reduction is a huge obstacle for the efficiency of FHE. In the FHE schemes over integers, the sizes of the public key and secret key are still excessively large, and homomorphic operations require a great deal of time. Although techniques of modulus reduction and key switching can be avoided in the FHE scheme, which is constructed based on the technique of approximate eigenvector, the speed of homomorphic encryption is effectively improved; however, this scheme only supports homomorphic operation for single-bit plaintext. In the FHE scheme based on the reliearization technique, even the speed of homomorphic encryption is not as fast as that of the FHE scheme based on the technique of approximate eigenvectors, which supports the SIMD technique.
In summary, current research on homomorphic encryption has mainly focused on the design of homomorphic encryption algorithms, the improvement of efficiency for homomorphic encryption and bootstrapping. On the one hand, although homomorphic encryption has developed rapidly in recent years, most homomorphic encryption schemes have been constructed by the technique of relinearization or approximate eigenvectors. New techniques for the construction of FHE have not been created. On the other hand, several experts and scholars have devoted themselves to the study of FHE, but few of them have designed schemes according to the requirements of actual application. Even though the efficiency of FHE is improving, it is still not practical.

3. An Overview of Vehicular Ad Hoc Networks

In this section, we describe the related framework, communication domains, wireless access technologies and safety standards in VANETs.

3.1. Framework

As shown in a framework of VANETs (Figure 3), the existing entities include the on-board unit, application unit and road-side unit [67]. They are described as follows.

3.1.1. On-Board Unit

Based on the IEEE 802.11p radio protocol [68,69,70], the on-board unit is used to exchange messages with road-side units or other on-board units. It is often equipped in a vehicle. In an on-board unit, there is a resource command processor, a user interface, a special interface which can be used to communicate with other on-board units, a network facility which can be used for short distance wireless communication and resources which include random access memory for storing and retrieving data. The on-board unit can provide services including wireless radio access, ad hoc and geographic routing, the regulation of network congestion, dependable message transmission, data safety and internet protocol mobility.

3.1.2. Application Unit

The application unit is usually embedded in a vehicle. It can be a special device that is used for some secure applications; it can also be a general device—for example, a personal digital assistant. The application unit can communicate with the network only through the road-side unit, which is in charge of all mobility and network functions. The communication between the application unit and the road-side unit is based on a wired or wireless channel. It may co-exist with the road-side unit in a physical cell.

3.1.3. Road-Side Unit

As a wave device, the road-side unit is often equipped along two sides of the road or in some special places, such as road junctions or neighboring parking lots. On the one hand, it can be used to expand the communication scope of VANETs by redistributing messages to other on-board units and transmitting messages to other road-side units; on the other hand, it can be used for some secure applications—for example, early warning of traffic accidents or low bridges. Furthermore, it also can be used to connect to the Internet.

3.2. Communication Domains

As shown in Figure 4, there are three kinds of communication domains, namely the in-vehicle domain, ad hoc domain and infrastructural domain. They are described as follows.

3.2.1. In-Vehicle Domain

The on-board unit and application unit are in this domain. The communication can be wired or wireless. The wireless communication is based on the technology of a wireless universal serial bus or ultra-wideband. In addition, the on-board unit offers a communication chain to the application unit.

3.2.2. Ad Hoc Domain

In the ad hoc domain are multiple vehicles that are allocated with on-board units and the road-side unit. In addition, there are two kinds of communications [71] in this domain; they are described as follows.
Inter-vehicle communication [71,72,73,74] is helpful to improve the security of public traffic, increase driving efficiency and enhance the view of on-board devices. Thus, it has attracted attention from academical researchers and companies, especially in the United States, European Union and Japan. In inter-vehicle communication, vehicles are connected by on-board units. If there is an available wireless link between a vehicle and another vehicle, they can communicate with each other. Vehicle-to-vehicle communication is only one-hop. Otherwise, the communication between two vehicles needs a special routing protocol, and then vehicle-to-vehicle communication can be multi-hop.
For the sake of the expansion of communication distance, vehicles are connected with the road-side unit by transmitting, accepting and relaying messages. In addition, with the help of the road-side unit, the vehicle can implement some special applications.

3.2.3. Infrastructural Domain

The road-side unit can be connected with the infrastructural domain. Then, the on-board unit can access the infrastructural domain. In addition, the on-board unit can be connected with some hosts by cellular radio networks, including universal mobile telecommunications system, worldwide interoperability for microwave access (WiMAX), high speed downlink packet access and general packet radio service.

3.3. Wireless Access Technologies

There are currently numerous usable wireless access technologies that can be used for vehicle-to-vehicle and vehicle-to-infrastructure communications. The target of these communication methods is to guarantee secure traffic and efficient transportation. In VANETs, common wireless access technologies include dedicated short range communications, fourth generation (4G)/fifth generation (5G) cellular networks, WLAN and worldwide interoperability for microwave access (WiMAX). These communication technologies are described as follows.

3.3.1. Dedicated Short Range Communications

Most vehicular communications are based on dedicated short range communications (DSRC) [75,76,77]. These are particularly designed for achieving low latency and high reliability in vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications [78,79]. The DSRC protocol stack mainly consists of the IEEE 802.11p family [70,80,81,82], which is called wireless access in vehicular environments (WAVE), and the IEEE 1609 family. Detailed protocols can be found in [83]. In DSRC, there are some characteristics that are different from those of other networks [84,85,86]. These characteristics include a real-time guarantee, high mobility, rapidly changing topology, multi-hop communication, limited bandwidth, etc.

3.3.2. 4G/5G Cellular Networks

Fourth-generation cellular networks [87,88] can provide services for mobile ultra-broadband internet access. Users have access to various networks without changing from one network to another network manually. In order to realize fast transmission in some specified regions, some available technologies include long-term evolution-advanced mobile communication systems and microcell base stations. As supported by Internet protocol version 6, the data transmission speed can be up to 1 gigabit per second for communication with low mobility. In addition, the transmission cost per bit of multimedia service is low. Due to users’ various requirements, the service should be quite differentiated, meaning that users can enjoy the benefits of different kinds of services simultaneously.
In 2018, the organization of the third-generation partnership project defined 5G cellular networks [89,90,91], which are extensions of 4G cellular networks. In 5G cellular networks, a large amount of multi-input multi-output antennas are integrated into base stations. For wireless transmission, the technique of millimeter wave communication is used to offer a bandwidth with a frequency of hundreds of megahertz (MHz). Fifth-generation cellular networks have several characteristics, which are described as follows. The data transmission rate of 5G cellular networks can be up to 10 gigabits per second, which is 100 times faster than that of 4G cellular networks. The latency of 5G cellular networks is less than 1 millisecond, which is less than that of 4G cellular networks. In 5G cellular networks, multi-connectivity [92] enables each user to maintain multiple possible signal paths to different cells. Therefore, it is helpful for coping with link failures and the throughput degradation of cell-edge users. Fifth-generation cellular networks also support network slicing [93], which can be used to provide on-demand tailored services for different application scenarios in the same physical network. Furthermore, 5G cellular networks support service differentiation [94]; for example, 5G cellular networks provide three generic services [95], namely Enhanced Mobile Broadband (eMBB), Ultra Reliable Low Latency Communications (URLLC) and Massive Machine Type Communications (mMTC). eMBB supports stable connections with very high peak data rates, URLLC has a low packet delay and high reliability and mMTC supports a large number of devices from the Internet of Things. Thus, 4G/5G cellular networks are helpful for the construction of VANETs.

3.3.3. WLAN

WLAN [96,97,98] is a wireless communication technology which can provide a link to the wider Internet by access points with high flexibility. In WLAN, the coverage of each access point is about 100 m, which is enough to cover the area of a medical institution. The data transmission rate is tens of million bits per second. With the appearance of IEEE 802.11 standards, WLAN is becoming increasingly popular for the research of VANETs.

3.3.4. WiMAX

WiMAX [99,100,101] is a wireless broadband communication technology which is designed based on the IEEE 802.16 standard [102]. In WiMAX, the coverage range of wireless broadband access is at most 50 kilometres (km) for fixed stations. For mobile stations, the coverage range of wireless broadband access is between 5 km and 15 km. The frequency of WiMAX is between 2 gigahertz (GHz) and 66 GHz. It can offer wireless broadband access for two fixed mobile networks.

3.3.5. Satellite Communication

Satellite communication [103,104,105] can transmit and magnify telecommunication signals. This communication technique usually consists of a satellite, ground stations, smart phones, laptops, etc. It can establish communication channels between signal senders and receivers, which are distributed at different places around the world. In satellite communication, the data rate of the downlink is at most 1000 gigabits per second, and the maximum data rate of the uplink is 1000 mbps. Its coverage range is between 100 km and 6000 km. Satellite communication is helpful for the development of VANETs.

3.4. Cyber-Security Issues

In the environment of VANETs, cyber-security issues can be mainly classified into in-vehicle domain attacks, ad hoc domain attacks, infrastructure domain attacks and insecure data analysis. These attacks and their corresponding solutions are described as follows.
In-vehicle domain attacks mainly include GPS spoofing attacks [106] and close-proximity vulnerability attacks. In GPS spoofing attacks, the adversary broadcasts fake GPS signals whose strength is stronger than that of the true GPS signals. Therefore, GPS receivers will ignore the true signal. These attacks can be detected by various techniques, such as statistical properties [107], a Kalman filter [108] and phase delay measurements [109]. Based on the vulnerabilities in the Bluetooth-enabled system [110] and keyless entry code, close proximity vulnerability attacks can be used to interfere with the vehicle’s engine control units or gain access to a vehicle. In order to defend against these attacks, commercial products often use open-source tools; for example, Bluesniff [111].
Ad hoc domain attacks consist of denial of service attacks [112], impersonation attacks [113], replay attacks [114], routing attacks [115], eavesdropping attacks [116], etc. In DoS attacks, the adversary blocks the whole communication channel with interference signals. Then, authentic users cannot access network services. To resist these attacks, some detection strategies [117,118,119] are performed by the road-side unit or on-board unit. Impersonation attacks are implemented by using another identity or a fake identity. To defend against these attacks, the key is to determine the actual position of the vehicle from which the message originated. Replay attacks may confuse the authorities, mislead the entire traffic or even decrease transportation safety. In order to thwart these attacks, common methods include the session key [120] and proxy signature [121].
In routing attacks, an adversary can disturb the normal routing process or drop passing packets. In order to detect these attacks, there are several available defense strategies, including the watchdog technique [122], trust-based method [123] and self studying [124]. Eavesdropping attacks are implemented by listening to the wireless medium. In these attacks, an adversary can collect a vehicle’s private positions and activities silently. In order to prevent these attacks, encryption is a common method; in addition, the key needs to be constantly changed.
In infrastructure domain attacks, the adversary may take control of a traffic light and signal. Then, a false signal phase will be sent to the vehicle, which will threaten its security. Besides this, VANET applications require interactions with the Cloud server in the infrastructure domain. This will introduce cyber-security concerns, including data protection, cyber attacks and compliance with privacy regulations. In order to detect and mitigate against an infrastructure domain attack, Mashrur et al. [125] utilized a Cloud-based method. In order to provide sufficient levels of protection for the infrastructure of VANETs, software-defined security [126] is used by abstracting security mechanisms from the hardware layer to a software layer.
In VANETs, for the efficient implementation of data analysis, vehicle data should be transmitted to the Cloud server, as the Cloud server is responsible for the computation of vehicle data. Because the Cloud server is untrusted, vehicle data may be illegally accessed, forged, tampered with or discarded in the process of transmission and computation. For example, Qayyum et al. [127] analyzed extant adversarial machine learning attacks in VANETs. In order to defend against insecure data analysis, there are some efficient solutions, which are described as follows. Zhu et al. [128] combined secure multi-party computation and dynamic k-anonymity. The anonymity parameter k is dynamically decided by the vehicle density, anticipated anonymous region and network topology. Riazi et al. [129] presented a novel hybrid framework for secure function evaluation, which enabled two parties to jointly compute a function without disclosing their private inputs.
Besides this, for the security of VANETs, there are several cyber-security and safety standards, including International Organization for Standardization (ISO) 26262, Society of Automotive Engineers (SAE) J3061 and the British Standards Institute’s cyber security standard. Details of these standards can be found in [130,131,132,133,134].

4. Homomorphic Encryption-Based Secure Computation in Vehicular Ad Hoc Networks

Based on homomorphic encryption, we first present the current state of secure basic operations, data aggregation, data query and other data computation methods in VANETs. Then, we present several challenges and open problems for future research.

4.1. Basic Operations

In order to implement homomorphic encryption-based secure computation for VANETs, it is necessary to study basic operations including comparison, division, inner product, set operations, etc. There are some available secure basic operations, which are described as follows.
Dou et al. [135] first proposed an encoding technique which can convert a private set to a private vector. Then, the secure subset problem can be transformed to the computations of private vectors. Based on this encoding technique and the Paillier scheme, the authors designed a novel and efficient private subset computation protocol, which is secure in a semi-honest model or malicious model. Dou et al. [136] first designed a new encoding technique which can convert user data to a special vector. Based on this encoding technique and ElGamal scheme, Dou et al. [136] proposed a secure minimum protocol for the computation of the minimum of several numbers privately. This protocol is secure in the semi-honest model. In addition, this protocol can be used for the secure computation of the maximum and union of sets. Liu et al. [137] designed a vector encoding method which can convert a number to a vector. Then, the comparison problem can be transformed into the computation of the vector. Based on this encoding method and GM algorithm [22], the authors proposed a privacy-preserving comparison protocol for integers. This protocol requires 6 L + 4 modular multiplications, where L is the length of the vector. The communication cost of this protocol is at most two rounds. In order to compare rational numbers securely, the authors designed a protocol which utilized a geometric method. This protocol is information-theoretically secure.
Liu et al. [138] used the vectorization method to transform the greater-than problem into the computation of the vector. Then, based on the Paillier algorithm, the authors designed a secure protocol that could solve the greater-than problem in one execution. This protocol reqzures 2 ( s + 2 ) lg q modular multiplications, where q is the modulus in the Paillier scheme and s is the dimension of vector. The communication cost of this protocol is only one round. Inspired by computational geometry, Li et al. [139] first proposed a method which could transform the comparison problem of two rational numbers into the computation of the area of a triangle, which is formed by three private points. Based on this method and the Paillier algorithm, the authors proposed a secure comparison protocol for rational numbers. This protocol has low computational complexity.
In 2018, Gong et al. [140] proposed an efficient method that could compare two integers a and b by computing the formula ( k a + k 1 ) / ( k b + k 1 ) , where k, k 1 are additional two integers. Then, based on this method and the Paillier algorithm, the authors designed two efficient protocols for secure comparison on integers and fractions, respectively. In order to reduce computational complexity, the proposed protocols outsource the time-consuming exponent calculation to the Cloud server in the phase of data pretreatment. Based on the Paillier algorithm with threshold decryption, Liu et al. [141] designed secure outsourced calculation toolkits for integers and rational numbers. These toolkits consist of basic operations, which include multiplication, division, comparison, sorting, equivalence testing and greatest common divisor. The authors also designed a secure reducing fraction protocol that could securely reduce the greatest common divisor of the numerator and denominator. Security analysis shows that that these protocols are secure in the semi-honest model. Huang et al. [142] first proposed a new, secure, scalar product method, which include four phases: input, calculation, output and proof of correctness. Then, based on this method and the Paillier algorithm, the authors constructed a secure Euclidean distance protocol which satisfied the network delay, computation and communication complexity. This protocol supports rational numbers; in addition, this protocol is secure in the semi-honest model.
For homomorphic encryption-based secure computation in VANETs, there are several available schemes, including data aggregation, data query and other data computation methods. They are compared in Table 1.

4.2. Data Aggregation

In VANETs, data aggregation [163,164,165,166,167] is used to decrease the amount of vehicle data. This is helpful for increasing the efficiency of data transmission. Thus, based on the Paillier algorithm or other homomorphic encryption algorithms, data aggregation is applied in the following schemes.

4.2.1. Paillier Algorithm

In this section, data aggregation based on the Paillier algorithm is implemented in several schemes, which are described as follows.
In order to protect the privacy of vehicles, Rabieh et al. [143] proposed a secure routing report mechanism in VANETs. As shown in the network model (Figure 5) of this mechanism, there are four entities: vehicles, road-side units, the traffic management center and department of motor vehicles. Road-side units are connected with the traffic management center by WiMAX, 4G or another fast communication technology. Encrypted routing data, which are based on segments, are offered to road-side units. In addition, based on the Paillier algorithm, vehicle data are aggregated by road-side units. Then, aggregated data are transmitted to the traffic management center, which will acquire the amount of vehicles in every segment without leaking vehicles’ private information. It has been demonstrated that this mechanism has acceptable costs in terms of communication and computation.
In 2016, based on the Paillier algorithm, Rabieh et al. [144] proposed a secure route-sharing method for VANETs. In this method, there is a vehicle called the leader, and other vehicles are regarded as subleaders. The leader needs to send a request to create a platoon of vehicles. The leader and subleaders create public keys and corresponding secret keys. Then, every vehicle adds a random number to the route secretly. The processed route is encrypted by the public key. The ciphertext is returned to the leader. Next, the same random number is deducted from the route by all the vehicles in the platoon. The encrypted processed route is sent to the subleader. The leader and subleader will aggregate messages and will decrypt the aggregated message. Last but not least, decryptions are exchanged to obtain the aggregated routes. In order to simulate the proposed method, the IEEE 802.11p standard was chosen as the communication technology among vehicles. The experimental results showed that this method has acceptable costs in terms of computation and communication.
In 2018, based on the Paillier algorithm, Zhang et al. [145] constructed a secure communication and power injection scheme which is suitable for autonomous vehicle networks and 5G smart grid slices. As shown in Figure 6, the architecture of this scheme consists of the utility company, the administration center, the road-side unit, the power storage unit and various communities, which include the parking lot and the residential district. In a community, the communication between power storage units relies on the gateway. Each gateway communicates with the utility company by way of the 5G smart grid slice. In addition, the utility company can only obtain the overall quantity of power injected by power storage units. Separate power bids cannot be seen. Based on the hash-then-homomorphic technology and Paillier algorithm, power injection bids, which are related to the time slots, are aggregated and blinded by each electrical vehicle.
In 2018, based on the Paillier algorithm, Wang et al. [146] proposed a secure task recomposition method for crowdsensing in a vehicular fog computing system. As shown in the architecture (Figure 7) of this method, there are vehicles with limited capability of communication and computation, the vehicular fog node, the Cloud service provider and the trusted authority. Dedicated short-range communication and 5G mobile communication systems can be used for the communication among these entities. Hybrid subtasks are aggregated into a ciphertext. Every sensed subtask is encrypted by the Paillier algorithm and advanced encryption standard (AES). Then, it is transmitted to a surrounding vehicular fog node. Next, encrypted subtasks are converted to new ciphertexts, which are only encrypted by the Paillier algorithm. The vehicular fog node will aggregate all the collected subtasks. The aggregated result is sent to the Cloud service provider. Based on the received aggregated results, the Cloud service provider recovers the aggregation of every subtask and tests the reliability. The experimental results show that the proposed method has acceptable costs in terms of computation and communication.
In 2018, in order to protect the security of the intelligent transportation system, Ogundoyin [147] designed a secure and autonomous analysis mechanism for traffic movement. In this mechanism, traffic data, which include the average speed of vehicles, can be acquired without leaking user privacy. Based on the improved Paillier algorithm and Chinese remainder theorem, various roads’ data are aggregated. Then, bandwidth and authentication time will be saved. As shown in Figure 8, the proposed mechanism includes four entities: the trusted authority, the transport management authority, road-side units and vehicles. Furthermore, the communication between the trusted authority and vehicles relies on a secure link; for example, a secure socket layer. Road-side units can communicate with vehicles by the IEEE 802.11p standard. In the node registration, the trusted authority will output the hash chain set and temporary private key. Then, they will be sent to other entities. The road-side unit executes the aggregation of the encrypted speed data report originating from vehicles. Next, the transport management authority can analyze these aggregated data.
In 2019, Kong et al. [148] first proposed a secure data sharing scheme for the Internet of Vehicles; this method can significantly reduce the burdens on system resources. As shown in the architecture of this scheme (Figure 9), the method includes vehicles, road-side units and the traffic management authority. Every vehicle builds a composite data report. Next, the data report is sent to road-side units. Based on a modified Paillier algorithm, road-side units implement the secure data aggregation. Then, the aggregated result is transmitted to the traffic management authority. If road-side units receive a data query from a vehicle, the aggregated result will be shared with the vehicle. In the process of data querying, the wireless communication between road-side units and various vehicles relies on the IEEE 802.11p standard.

4.2.2. Other Algorithms

In this section, based on other homomorphic encryption algorithms, data aggregation is implemented in several schemes, which are described as follows.
In 2016, for the security of data aggregation and data publication in smart grid vehicle-to-grid networks (Figure 10), Han et al. [149] proposed a secure data management framework based on Ozdemir’s homomorphic encryption scheme [150]. As shown in the architecture of this framework (Figure 11), the method includes clients, a database proxy, a central database server and an embedded database. The embedded database is helpful for storing the encrypted data of electrical vehicles. Then, local aggregation is implemented on these encrypted data. Next, based on these local aggregation results, the central database server calculates the final aggregation result. If the client sends a query to the central database server, the database proxy will hide private information in the query. The central database server executes the processed query, and the encrypted query result is returned to the client. Furthermore, the security of this framework was analyzed under some classical cyber attacks, including the replay attack, interface attack, known plaintext attack, etc. The experimental results showed that the proposed framework is efficient.
In 2019, Prema [151] first proposed a modified FHE scheme. In this scheme, re-encryption is used to reduce the computational cost. Compared with the Paillier algorithm, this scheme requires less communication overhead to transmit messages. Then, the author used this scheme to construct an efficient and secure aggregation protocol which is helpful for aggregating data in VANETs. In this protocol, mutual authentication is used for the utilization of the data service and access server in VANETs. Furthermore, a self-generated pseudonym is created in the process of authentication. Next, the road-side unit can broadcast a self-generated pseudonym; this protocol can avoid leaking distance estimation by other nodes. In addition, it can avoid being attacked by malicious nodes.

4.3. Data Query

According to the special requirements of users, data query [168,169,170,171,172] is used to search appropriate vehicle data from a database table in VANETs. Thus, data query has been applied in several schemes, which are described as follows.
In 2016, with the aim of searching through data of location-based services securely, Zhu et al. [152] proposed a secure polygon spatial query scheme, which is based on an improved 2-DNF algorithm [25]. As shown in the architecture of this scheme (Figure 12), the participating entities include the authority, location-based services provider, Cloud server and location-based services user. The authority first initializes the entire scheme by generating parameters that are transmitted to the Cloud server and location-based service provider individually. Next, the location-based services provider’s data are encrypted. In addition, ciphertexts are outsourced to the Cloud server. Then, a location-based services user can search any polygonal area to obtain accurate results. In order to evaluate the performance of the proposed scheme, it was implemented on a mobile phone and three workstations. They could communicate with each other by IEEE 802.11g WLAN technology. The experimental results demonstrated the efficiency of the proposed scheme.
In 2017, Kong et al. [153] designed a secure range query method from distributed on-board storage in VANETs. In this method, the secure computation of scalar products is based on the Paillier algorithm. In addition, every multi-dimensional scale is structured into one dimension. As shown in Figure 13, the method includes vehicles, the data requester, the data server, the trusted authority and road-side units in the architecture of this query method. The wireless communication between vehicles and road-side units relies on the IEEE 802.11p standard. If the data server receives a data query, it will be forwarded to all vehicles by road-side units. When the data server receives a data report, it will execute the process of data filtering. Then, the data query result is returned to the data requester. Simulation results show that the proposed method can significantly reduce the costs of communication and computation.
In 2019, based on the fog computing technology, Sun et al. [154] designed a new synthetic vehicle crowdsensing scheme for the security of data collection. As shown in the architecture of this scheme (Figure 14), the method includes data requesters, participating vehicles, fog buses, upper-tier fog and the Cloud data center. Task assignment and data outsourcing are carried out between data requesters and the Cloud data center. The implementation of the secure query, joint traceability and secure revocation requires a trusted authority. A data support service can be provided by participating vehicles, fog buses and upper-tier fog. Participating vehicles have a wireless communication module that relies on device-to-device communication technologies such as WiFi and dedicated short-range communication. For the security of participating vehicles and data requesters, the authors used a two-tier fog architecture with a secure data aggregation scheme, which was based on the Paillier algorithm and 2-DNF algorithm [25]. Then, this aggregation scheme was simulated by IEEE 802.11p communication technology. Evaluation metrics included throughput, the participation ratio and the successful participation ratio. In addition, the simulation results showed that the proposed aggregation scheme is suitable for urban districts.
In 2018, based on the Paillier algorithm, He et al. [155] constructed a secure three-step ride-matching scheme in ride-sharing services. In this scheme, the authors first proposed a secure selection method based on spatial regions. Next, the ride-sharing server chooses possible ride-sharing partners with the aim of saving travel time and improving the practicability of time arrangement. Then, in order to maximize the system-wide travel time savings, the ride-sharing server selects suitable ride-sharing partners. In the final experiment, the proposed scheme was implemented on several Nexus 5 mobile phones, the operating system of which was Android 6.0. In addition, the communication technique relied on Bluetooth 4.0 [173,174], the transmission rate of which is more than 900 kilobyte per second. Thus, the communication overhead had less impact on the execution time. The simulation results showed that the proposed scheme is efficient and practical without leaking private data.
In order to protect sensitive data of electrical vehicle drivers, based on the Paillier scheme, Yucel first et al. [156] proposed a secure bichromatic mutual nearest neighbor computation method using peer-to-peer communication technology; for example, dedicated short-range communication technology. Then, the authors designed an efficient and secure distributed online matching system by the proposed computation method. As shown in Figure 15, the method includes electrical vehicles and charge suppliers, which include a public charging station, private charging station, residential charging station and vehicle-to-vehicle charge supplier. The electrical vehicle first starts a local query to check whether there are surrounding charge suppliers. If there are available charge suppliers nearby, the electrical vehicle will send a charging request. In order to match the charging request in a distributed way, these charge suppliers will reply to the electrical vehicle in a reasonable time.
In the process of sharing autonomous vehicles, private data of vehicles may be leaked [175]. In order to avoid this issue, Hadian et al. [157] proposed a secure time-sharing method based on the Paillier algorithm. In this method, a secure matching task can be executed without leaking the vehicle’s location information and route data. In order to rent a vehicle, the requesters upload their encrypted requests to the server, where the encrypted requests include the travel time, pickup location and drop-off location. According to the requested locations and time, the server calculates the corresponding cost values. Next, they are transmitted to vehicle owners. Based on cost values, the vehicle owner chooses the requester with the minimum cost value. Finally, the server creates a direct communication channel between the vehicle owner and the chosen requester.
In 2018, for the security of vehicle-to-everything communications, Ulybyshev et al. [158] designed a secure data exchange mechanism which offers access control, which is based on roles and attributes. This method can detect and prevent data leakage caused by insiders. Then, based on partial homomorphic encryption, the authors proposed an encrypted search method which can query the ciphertexts of vehicle records, which are usually stored on an untrustworthy Cloud server. In addition, this method supports the subset of structured query language queries on the ciphertexts. This kind of query can be utilized to filter-out related vehicle records in the early stage of the data request. Next, the data request is transmitted to related vehicle records. In the final experiment, the communication between two vehicular nodes is based on the transmission control protocol/Internet protocol. The time interval of the data transaction implemented between two vehicular nodes is 152 milliseconds.

4.4. Other Data Computation

In VANETs, other types of data computation include verification [176,177,178], tendering mechanism, etc. They have been studied in several schemes, which are described as follows.
In order to protect drivers’ privacy, Rabieh et al. [159] proposed a secure chatting mechanism. In this mechanism, attribute-based encryption is used to verify common interests anonymously. In addition, partial homomorphic encryption technology is used to verify the degree of interest anonymously. As shown in Figure 16, the network model of this mechanism includes three entities: vehicles, the centralized authority and road-side units. The centralized authority is used to generate secret keys, update the interests of drivers and revoke the keys of interests. Road-side units are connected with the centralized authority by WiMAX, 4G or other communication technology. Furthermore, the authors designed a secure search scheme that is helpful for checking vehicles’ common interests. This scheme has low costs in terms of communication and computation.
In 2017, based on fully homomorphic encryption, Alamer et al. [160] designed a secure tendering mechanism in the vehicular Cloud. As shown in Figure 17, a tendering framework is used to model the interaction between the Cloud server and vehicles. In addition, the Cloud server selects vehicles to collaborate in the implementation of announced tasks. If there is a task, the Cloud server will advertise it to a road-side unit. Based on the task, the road-side unit broadcasts the packet of resource procurement to the vehicles under its scope. If some vehicles want to participate in the task, their tenders will be used for reply. Based on the tenders, the Cloud server and road-side unit choose vehicles and their rewards. Then, the chosen vehicles execute the task and offer corresponding resources to the Cloud server. Each vehicle is rewarded for its tender. Finally, the properties of this mechanism are evaluated by extensive simulations.
Vehicle-to-grid technology, which is based on the communication between electrical vehicles and the smart grid, can provide demand response services by delivering electrical energy to the smart grid. In order to protect user privacy, based on Boneh’s algorithm [25], Li et al. [161] designed a secure double auction scheme for the demand response of electrical vehicles in microgrid outages. As shown in Figure 18, the architecture of this scheme includes the Cloud server and the auctioneer. The auctioneer can be used to solve the problem of maximizing social welfare. Energy transactions can be negotiated between purchasers and sellers. The Cloud server is regarded as a middleman between bidders and the auctioneer. In this scheme, electrical vehicles that have redundant electrical energy are regarded as sellers. They can release their electrical energy by vehicle-to-grid technology. If electrical vehicles do not have sufficient electrical energy, they will act as purchasers. This scheme can be executed whenever there are both purchasers and sellers. In addition, it has acceptable costs in terms ofof computation and communication.
In 2018, Magaia et al. [162] designed a secure opportunistic routing protocol. In this protocol, vehicular delay-tolerant networks (Figure 19) [179] are modeled as time-varying neighborhood graphs, where edges are regarded as the relationship of two neighboring vehicles. This protocol consists of the generation and anonymization of the neighborhood graph, routing algorithm, etc. In the routing algorithm, the exchange of messages is based on the Paillier algorithm and the process of routing decisions. Finally, this protocol is simulated by the opportunistic network environment simulator in various simulation cases, which include synthetic mobility models and real mobility tracing. In synthetic mobility models, all the nodes are supposed to use interfaces of Bluetooth and IEEE 802.11a WiFi; however, the nodes use the interface of IEEE 802.11p WiFi in real mobility tracing. The simulation results showed that the cryptographical cost of this protocol is low in most cases.

4.5. Challenges and Future Research Directions

The idea of homomorphic encryption-based secure computation has been widely accepted. Several secure computation methods based on homomorphic encryption for VANETs have been developed; these methods are helpful for the research of the secure computation of vehicle data. In this field, the research has mainly focused on the achievement of complicated operations by consuming fewer computing resources. Moreover, secure computation should support multiple types of datasets. There are still some problems in the research into the secure computation of vehicle data; these problems are described as follows.
Most of the above schemes adopted general homomorphic encryption schemes. In addition, they seldom considered the precision of vehicle data and the depth of multiplicative homomorphic methods. Thus, corresponding parameters of schemes cannot be set up. This is not helpful for the realization of an efficient secure computation method for vehicle data.
With the aim of constructing a secure computation method for vehicle data, most protocols have been built based on partial homomorphic encryption or FHE. Partial homomorphic encryption only supports homomorphic addition or homomorphic multiplication; it requires additional rounds of interaction to implement homomorphic addition or homomorphic multiplication. Although FHE supports an infinite number of homomorphic addition and homomorphic multiplication operations, the running time of homomorphic multiplication is excessively long. Thus, it is difficult to guarantee real-time communication in VANETs. Furthermore, due to the large sizes of public keys and ciphertext, their transmission may occupy the limited bandwidth in VANETs.
In the secure computation of vehicle data, data aggregation and data searching are commonly used methods. In order to implement these methods, vehicle data should first be encoded. The current usual encoding methods only support integers and floats; thus, attention should be paid to new encoding methods for other complicated data types. Homomorphic encryption only supports homomorphic addition and homomorphic multiplication; thus, the efficient realization of these methods by homomorphic addition and homomorphic multiplication is a challenge. In these algorithms, some complicated operations such as exponentiation and logarithms can be expressed as addition and multiplication by the technique of the Fourier series. Then, they can be implemented by homomorphic operations. However, the efficiency of homomorphic operations cannot be guaranteed if the precision of messages is high.
In the secure computation of vehicle data, multi-user data are encrypted into ciphertexts, which are usually under the same secret key. However, the security of multi-user data may be affected. With the help of extra rounds of interaction, partial homomorphic encryption can support operations on the ciphertexts with different secret keys. We can also use the technique of secure multiparty computation [180] to solve this issue. Multi-key FHE and threshold FHE can be used to design a secure multiparty computation protocol. Although multi-key FHE supports operations on the ciphertexts with different secret keys, unfortunately, its efficiency of homomorphic operations and ciphertext conversion decreases with the increasing depth of homomorphic multiplication and the number of parties. The efficiency of threshold FHE is more efficient than that of multi-key FHE. But threshold FHE requires additional rounds of interaction.

5. Conclusions

Homomorphic encryption supports computations on the ciphertext without decryption. In view of the advantage of homomorphic encryption, it is used to construct the secure computation method. Thus, homomorphic encryption-based secure computation is studied in VANETs. In this article, we have presented a survey of secure computation based on homomorphic encryption in VANETs. To begin with, we described the related definitions and the current state of partial homomorphic encryption, fully and somewhat homomorphic encryption. Then, we introduced the framework, communication domains, wireless access technologies and cyber-security issues of VANETs. Finally, we presented the state of the art of secure basic operations, data aggregation, data query and other data computation methods in VANETs. In addition, several challenges and open academic problems have been presented.
In summary, research on homomorphic encryption-based secure computation in VANETs is quite broad, and many challenges lay ahead. Nevertheless, it will be advantageous for the community to swiftly address these challenges and move beyond them. This article attempts to briefly explore how homomorphic encryption-based secure computation works and when it should be used to solve problems in VANETs. We also discuss future research directions that may benefit the pursuit of this goal. We hope that our discussion and exploration here may open a new avenue for the development of homomorphic encryption and shed light on secure computation in VANETs.

Author Contributions

Conceptualization, F.R.Y., P.Z., W.X.; writing—original draft preparation, X.S.; writing—review and editing, X.S., X.P. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Acknowledgments

We thank the reviewers for their detailed reviews and constructive comments, which have helped to greatly improve the quality of this paper. This work is supported by the National Natural Science Foundation of China (61702342, 61702341), the Science and Technology Innovation Projects of Shenzhen (JCYJ20190809152003992) and China Postdoctoral Science Foundation (2019M653042).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Haider, S.; Abbas, G.; Abbas, Z.H.; Boudjit, S.; Halim, Z. P-DACCA: A probabilistic direction-aware cooperative collision avoidance scheme for VANETs. Future Gener. Comput. Syst. 2020, 103, 1–13. [Google Scholar] [CrossRef]
  2. Liang, W.; Li, Z.; Zhang, H.; Wang, S.; Bie, R. Vehicular ad hoc networks: Architectures, research issues, methodologies, challenges, and trends. Int. J. Distrib. Sens. Netw. 2015, 11, 745303. [Google Scholar] [CrossRef]
  3. Zeadally, S.; Hunt, R.; Chen, Y.S.; Irwin, A.; Hassan, A. Vehicular ad hoc networks (VANETs): Status, results, and challenges. Telecommun. Syst. 2012, 50, 217–241. [Google Scholar] [CrossRef]
  4. Dua, A.; Kumar, N.; Bawa, S. A systematic review on routing protocols for vehicular ad hoc networks. Veh. Commun. 2014, 1, 33–52. [Google Scholar] [CrossRef]
  5. Eze, E.C.; Zhang, S.; Liu, E. Vehicular ad hoc networks (VANETs): Current state, challenges, potentials and way forward. In Proceedings of the 2014 20th International Conference on Automation and Computing, Cranfield, UK, 12–13 September 2014; pp. 176–181. [Google Scholar]
  6. Virdi, N.; Grzybowska, H.; Waller, S.T.; Dixit, V. A safety assessment of mixed fleets with connected and autonomous vehicles using the surrogate safety assessment module. Accid. Anal. Prev. 2019, 131, 95–111. [Google Scholar] [CrossRef]
  7. Liu, Y.; Tight, M.; Sun, Q.; Kang, R. A systematic review: Road infrastructure requirement for connected and autonomous vehicles (CAVs). J. Phys. Conf. Ser. 2019, 1187, 1–13. [Google Scholar] [CrossRef]
  8. Ma, K.; Wang, H. Influence of exclusive lanes for connected and autonomous vehicles on freeway traffic flow. IEEE Access 2019, 7, 50168–50178. [Google Scholar] [CrossRef]
  9. Rathee, G.; Sharma, A.; Iqbal, R.; Aloqaily, M.; Jaglan, N.; Kumar, R. A blockchain framework for securing connected and autonomous vehicles. Sensors 2019, 19, 3165. [Google Scholar] [CrossRef] [Green Version]
  10. Zheng, J.; Liu, H.X. Estimating traffic volumes for signalized intersections using connected vehicle data. Transp. Res. Part C Emerg. Technol. 2017, 79, 347–362. [Google Scholar] [CrossRef] [Green Version]
  11. Kaiser, C.; Steger, M.; Dorri, A.; Festl, A.; Stocker, A.; Fellmann, M.; Kanhere, S. Towards a privacy-preserving way of vehicle data sharing—A case for blockchain technology? In Proceedings of the International Forum on Advanced Microsystems for Automotive Applications; Springer: Cham, Switzerland, 2018; pp. 111–122. [Google Scholar]
  12. Brousmiche, K.L.; Durand, A.; Heno, T.; Poulain, C.; Dalmieres, A.; Hamida, E.B. Hybrid cryptographic protocol for secure vehicle data sharing over a consortium blockchain. In Proceedings of the 2018 IEEE International Conference on Internet of Things and IEEE Green Computing and Communications and IEEE Cyber, Physical and Social Computing and IEEE Smart Data, Halifax, NS, Canada, 30 July–3 August 2018; pp. 1281–1286. [Google Scholar]
  13. Spadaccino, P.; Cuomo, F.; Baiocchi, A. Epidemic and timer-based message dissemination in VANETs: A performance comparison. Electronics 2020, 9, 595. [Google Scholar] [CrossRef] [Green Version]
  14. Dai, P.; Liu, K.; Wu, X.; Yu, Z.; Xing, H.; Lee, V.C.S. Cooperative temporal data dissemination in SDN-based heterogeneous vehicular networks. IEEE Internet Things J. 2019, 6, 72–83. [Google Scholar] [CrossRef]
  15. Chaqfeh, M.; Elsayed, H.; Lakas, A. Efficient data dissemination for urban vehicular environments. IEEE Trans. Intell. Transp. Syst. 2019, 20, 1226–1236. [Google Scholar] [CrossRef]
  16. Rivest, R.L.; Adleman, L.; Dertouzos, M.L. On data banks and privacy homomorphisms. Found. Secur. Comput. 1978, 4, 169–180. [Google Scholar]
  17. Acar, A.; Aksu, H.; Uluagac, A.S.; Conti, M. A survey on homomorphic encryption schemes: Theory and implementation. ACM Comput. Surv. 2018, 51, 1–35. [Google Scholar] [CrossRef]
  18. Moore, C.; O’Neill, M.; O’Sullivan, E.; Doröz, Y.; Sunar, B. Practical homomorphic encryption: A survey. In Proceedings of the 2014 IEEE International Symposium on Circuits and Systems, Melbourne VIC, Australia, 1–5 June 2014; pp. 2792–2795. [Google Scholar]
  19. Gentry, C. Fully homomorphic encryption using ideal lattices. In Proceedings of the 41st Annual ACM Symposium on Theory of Computing (STOC), Washington, DC, USA, 31 May–2 June 2009; pp. 169–178. [Google Scholar]
  20. Brakerski, Z.; Gentry, C.; Vaikuntanathan, V. (Leveled) fully homomorphic encryption without bootstrapping. In Proceedings of the 3rd Innovations in Theoretical Computer Science Conference, Cambridge, MA, USA, 8–10 January 2012; pp. 309–325. [Google Scholar]
  21. Rivest, R.L.; Shamir, A.; Adleman, L. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 1978, 21, 120–126. [Google Scholar] [CrossRef]
  22. Goldwasser, S.; Micali, S. Probabilistic encryption. J. Comput. Syst. Sci. 1984, 28, 270–299. [Google Scholar] [CrossRef] [Green Version]
  23. ElGamal, T. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 1985, 31, 469–472. [Google Scholar] [CrossRef]
  24. Paillier, P. Public-key cryptosystems based on composite degree residuosity classes. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, Prague, Czech Republic, 2–6 May 1999; pp. 223–238. [Google Scholar]
  25. Boneh, D.; Goh, E.J.; Nissim, K. Evaluating 2-DNF formulas on ciphertexts. In Proceedings of the Theory of Cryptography Conference, Cambridge, MA, USA, 10–12 February 2005; pp. 325–341. [Google Scholar]
  26. Van Dijk, M.; Gentry, C.; Halevi, S.; Vaikuntanathan, V. Fully homomorphic encryption over the integers. In Proceedings of the Advances in Cryptology—EUROCRYPT 2010, Monaco and Nice, France, 30 May–3 June 2010; pp. 24–43. [Google Scholar]
  27. Coron, J.S.; Mandal, A.; Naccache, D.; Tibouchi, M. Fully homomorphic encryption over the integers with shorter public keys. In Proceedings of the Advances in Cryptology—CRYPTO 2011, Santa Barbara, CA, USA, 14–18 August 2011; pp. 487–504. [Google Scholar]
  28. Coron, J.S.; Naccache, D.; Tibouchi, M. Public key compression and modulus switching for fully homomorphic encryption over the integers. In Proceedings of the Advances in Cryptology—EUROCRYPT 2012, Cambridge, UK, 15–19 April 2012; pp. 446–464. [Google Scholar]
  29. Cheon, J.H.; Coron, J.S.; Kim, J.; Lee, M.S.; Lepoint, T.; Tibouchi, M.; Yun, A. Batch fully homomorphic encryption over the integers. In Proceedings of the Advances in Cryptology—EUROCRYPT 2013, Athens, Greece, 26–30 May 2013; pp. 315–335. [Google Scholar]
  30. Coron, J.S.; Lepoint, T.; Tibouchi, M. Scale-invariant fully homomorphic encryption over the integers. In Proceedings of the Public-Key Cryptography—PKC 2014, Buenos Aires, Argentina, 26–28 March 2014; pp. 311–328. [Google Scholar]
  31. Cheon, J.H.; Stehlé, D. Fully homomophic encryption over the integers revisited. In Proceedings of the Advances in Cryptology—EUROCRYPT 2015, Sofia, Bulgaria, 26–30 April 2015; pp. 513–536. [Google Scholar]
  32. Benarroch, D.; Brakerski, Z.; Lepoint, T. FHE over the integers: Decomposed and batched in the post-quantum regime. In Proceedings of the Public-Key Cryptography—PKC 2017, Amsterdam, The Netherlands, 28–31 March 2017; pp. 271–301. [Google Scholar]
  33. Brakerski, Z.; Vaikuntanathan, V. Efficient fully homomorphic encryption from (standard) LWE. In Proceedings of the IEEE 52nd Annual Symposium on Foundations of Computer Science, Palm Springs, CA, USA, 22–25 October 2011; pp. 97–106. [Google Scholar]
  34. Micciancio, D.; Peikert, C. Hardness of SIS and LWE with small parameters. In Proceedings of the Advances in Cryptology—CRYPTO 2013, Santa Barbara, CA, USA, 18–22 August 2013; pp. 21–39. [Google Scholar]
  35. Chen, Z.; Wang, J.; Zhang, Z.; Song, X. A fully homomorphic encryption scheme with better key size. China Commun. 2014, 11, 82–92. [Google Scholar] [CrossRef]
  36. Brakerski, Z. Fully homomorphic encryption without modulus switching from classical GapSVP. In Proceedings of the Advances in Cryptology— CRYPTO 2012, Santa Barbara, CA, USA, 19–23 August 2012; pp. 868–886. [Google Scholar]
  37. Chen, Z.; Song, X.; Zhao, X. A multi-bit fully homomorphic encryption with better key size from LWE. J. Comput. Res. Dev. 2016, 53, 2216–2223. [Google Scholar]
  38. Halevi, S.; Shoup, V. An Implementation of Homomorphic Encryption. 2014. Available online: Https://github.com/shaih/HElib (accessed on 1 February 2014).
  39. Gentry, C.; Halevi, S.; Smart, N.P. Homomorphic evaluation of the AES circuit. In Proceedings of the Advances in Cryptology—CRYPTO 2012, Santa Barbara, CA, USA, 19–23 August 2012; pp. 850–867. [Google Scholar]
  40. Stehlé, D.; Steinfeld, R. Making NTRU as secure as worst-case problems over ideal lattices. In Proceedings of the Advances in Cryptology—EUROCRYPT 2011, Tallinn, Estonia, 15–19 May 2011; pp. 27–47. [Google Scholar]
  41. Bos, J.W.; Lauter, K.; Loftus, J.; Naehrig, M. Improved security for a ring-based fully homomorphic encryption scheme. In Proceedings of the IMA International Conference on Cryptography and Coding, Oxford, UK, 17–19 December 2013; pp. 45–64. [Google Scholar]
  42. Chen, L.; Zhang, Z. Bootstrapping fully homomorphic encryption with ring plaintexts within polynomial noise. In Proceedings of the International Conference on Provable Security, Xi’an, China, 23–25 October 2017; pp. 285–304. [Google Scholar]
  43. Dowlin, N.; Gilad-Bachrach, R.; Laine, K.; Lauter, K.; Naehrig, M.; Wernsing, J. Manual for using homomorphic encryption for bioinformatics. Proc. IEEE 2017, 105, 552–567. [Google Scholar] [CrossRef]
  44. Chen, H.; Han, K. Homomorphic lower digits removal and improved FHE bootstrapping. In Proceedings of the Advances in Cryptology—EUROCRYPT 2018, Tel Aviv, Israel, 29 April–3 May 2018; pp. 315–337. [Google Scholar]
  45. Cheon, J.H.; Kim, A.; Kim, M.; Song, Y. Homomorphic encryption for arithmetic of approximate numbers. In Proceedings of the Advances in Cryptology—ASIACRYPT 2017, Hong Kong, China, 3–7 December 2017; pp. 409–437. [Google Scholar]
  46. Cheon, J.H.; Han, K.; Kim, A.; Kim, M.; Song, Y. Bootstrapping for approximate homomorphic encryption. In Proceedings of the Advances in Cryptology—EUROCRYPT 2018, Tel Aviv, Israel, 29 April–3 May 2018; pp. 360–384. [Google Scholar]
  47. Chen, H.; Chillotti, I.; Song, Y. Improved bootstrapping for approximate homomorphic encryption. In Proceedings of the Advances in Cryptology—EUROCRYPT 2019, Darmstadt, Germany, 19–23 May 2019; pp. 34–54. [Google Scholar]
  48. Gentry, C.; Sahai, A.; Waters, B. Homomorphic encryption from learning with errors: Conceptually-simpler, asymptotically-faster, attribute-based. In Proceedings of the Advances in Cryptology—CRYPTO 2013, Santa Barbara, CA, USA, 18–22 August 2013; pp. 75–92. [Google Scholar]
  49. Alperin-Sheriff, J.; Peikert, C. Faster Bootstrapping with Polynomial Error. In Proceedings of the Advances in Cryptology—CRYPTO 2014, Santa Barbara, CA, USA, 17–21 August 2014; pp. 297–314. [Google Scholar]
  50. Berkoff, A.; Liu, F.H. Leakage resilient fully homomorphic encryption. In Proceedings of the Theory of Cryptography Conference, San Diego, CA, USA, 24–26 February 2014; pp. 515–539. [Google Scholar]
  51. Ducas, L.; Micciancio, D. FHEW: Bootstrapping Homomorphic Encryption in Less Than a Second. In Proceedings of the Advances in Cryptology—EUROCRYPT 2015, Sofia, Bulgaria, 26–30 April 2015; pp. 617–640. [Google Scholar]
  52. Chillotti, I.; Gama, N.; Georgieva, M.; Izabachène, M. Faster Fully Homomorphic Encryption: Bootstrapping in Less Than 0.1 Seconds. In Proceedings of the Advances in Cryptology—ASIACRYPT 2016, Hanoi, Vietnam, 4–8 December 2016; pp. 3–33. [Google Scholar]
  53. Khedr, A.; Gulak, G.; Vaikuntanathan, V. SHIELD: Scalable homomorphic implementation of encrypted data-classifiers. IEEE Trans. Comput. 2016, 65, 2848–2858. [Google Scholar] [CrossRef] [Green Version]
  54. Li, Z.; Galbraith, S.D.; Ma, C. Preventing adaptive key recovery attacks on the GSW levelled homomorphic encryption scheme. In Proceedings of the International Conference on Provable Security, Nanjing, China, 10–11 November 2016; pp. 373–383. [Google Scholar]
  55. Li, Z.; Ma, C.; Wang, D. Leakage resilient leveled FHE on multiple bit message. IEEE Trans. Big Data 2017, 1. [Google Scholar] [CrossRef]
  56. Hoffstein, J.; Pipher, J.; Silverman, J.H. NTRU: A ring-based public key cryptosystem. In Proceedings of the International Algorithmic Number Theory Symposium; Springer: Berlin, Germany, 1998; pp. 267–288. [Google Scholar]
  57. López-Alt, A.; Tromer, E.; Vaikuntanathan, V. On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption. In Proceedings of the Forty-Fourth Annual ACM Symposium on Theory of Computing, New York, NY, USA, 20–22 May 2012; pp. 1219–1234. [Google Scholar]
  58. Clear, M.; McGoldrick, C. Multi-identity and multi-key leveled FHE from learning with errors. In Proceedings of the Advances in Cryptology—CRYPTO 2015, Santa Barbara, CA, USA, 16–20 August 2015; pp. 630–656. [Google Scholar]
  59. Mukherjee, P.; Wichs, D. Two round multiparty computation via multi-key FHE. In Proceedings of the Advances in Cryptology—EUROCRYPT 2016, Vienna, Austria, 8–12 May 2016; pp. 735–763. [Google Scholar]
  60. Brakerski, Z.; Perlman, R. Lattice-based fully dynamic multi-key FHE with short ciphertexts. In Proceedings of the Advances in Cryptology—CRYPTO 2016, Santa Barbara, CA, USA, 14–18 August 2016; pp. 190–213. [Google Scholar]
  61. Peikert, C.; Shiehian, S. Multi-key FHE from LWE, revisited. In Proceedings of the Theory of Cryptography Conference, Beijing, China, 31 October–3 November 2016; pp. 217–238. [Google Scholar]
  62. Chen, L.; Zhang, Z.; Wang, X. Batched multi-hop multi-key FHE from ring-LWE with compact ciphertext extension. In Proceedings of the Theory of Cryptography Conference, Baltimore, MD, USA, 12–15 November 2017; pp. 597–627. [Google Scholar]
  63. Wang, H.; Feng, Y.; Ding, Y.; Tang, S. A multi-key SMC protocol and multi-key FHE based on some-are- errorless LWE. Soft Comput. 2017, 23, 1735–1744. [Google Scholar] [CrossRef]
  64. Brakerski, Z.; Halevi, S.; Polychroniadou, A. Four round secure computation without setup. In Proceedings of the Theory of Cryptography Conference, Baltimore, MD, USA, 12–15 November 2017; pp. 645–677. [Google Scholar]
  65. López-Alt, A.; Tromer, E.; Vaikuntanathan, V. Cloud-Assisted Multiparty Computation from Fully Homomorphic Encryption. Available online: https://eprint.iacr.org/2011/663.pdf (accessed on 1 January 2011).
  66. Gordon, S.D.; Liu, F.H.; Shi, E. Constant-round MPC with fairness and guarantee of output delivery. In Proceedings of the Advances in Cryptology—CRYPTO 2015, Santa Barbara, CA, USA, 16–20 August 2015; pp. 63–82. [Google Scholar]
  67. Al-Sultan, S.; Al-Doori, M.M.; Al-Bayatti, A.H.; Zedan, H. A comprehensive survey on vehicular ad hoc network. J. Netw. Comput. Appl. 2014, 37, 380–392. [Google Scholar] [CrossRef]
  68. Heinovski, J.; Klingler, F.; Dressler, F.; Sommer, C. A simulative analysis of the performance of IEEE 802.11 p and ARIB STD-T109. Comput. Commun. 2018, 122, 84–92. [Google Scholar] [CrossRef]
  69. Vukadinovic, V.; Bakowski, K.; Marsch, P.; Garcia, I.D.; Xu, H.; Sybis, M.; Sroka, P.; Wesolowski, K.; Lister, D.; Thibault, I. 3GPP C-V2X and IEEE 802.11 p for Vehicle-to-Vehicle communications in highway platooning scenarios. Ad Hoc Netw. 2018, 74, 17–29. [Google Scholar] [CrossRef]
  70. Bazzi, A.; Masini, B.M.; Zanella, A.; Pasolini, G. IEEE 802.11 p for cellular offloading in vehicular sensor networks. Comput. Commun. 2015, 60, 97–108. [Google Scholar] [CrossRef]
  71. Sichitiu, M.L.; Kihl, M. Inter-vehicle communication systems: A survey. IEEE Commun. Surv. Tutor. 2008, 10, 88–105. [Google Scholar] [CrossRef] [Green Version]
  72. Willke, T.L.; Tientrakool, P.; Maxemchuk, N.F. A survey of inter-vehicle communication protocols and their applications. IEEE Commun. Surv. Tutor. 2009, 11, 3–20. [Google Scholar] [CrossRef]
  73. Jin, W.L.; Recker, W.W. An analytical model of multihop connectivity of inter-vehicle communication systems. IEEE Trans. Wirel. Commun. 2010, 9, 106–112. [Google Scholar] [CrossRef]
  74. Ou, H.; Tang, T.Q. An extended two-lane car-following model accounting for inter-vehicle communication. Phys. A Stat. Mech. Appl. 2018, 495, 260–268. [Google Scholar] [CrossRef]
  75. Chen, S.; Hu, J.; Shi, Y.; Zhao, L. LTE-V: A TD-LTE based V2X solution for future vehicular network. IEEE Internet Things J. 2016, 3, 997–1005. [Google Scholar] [CrossRef]
  76. Tian, H.; Shiraishi, Y.; Mohri, M.; Morii, M. CCN-Based Vehicle-to-Vehicle Communication in DSRC for Content Distribution in Urban Environments. IEICE Trans. Inf. Syst. 2019, 102, 1653–1664. [Google Scholar] [CrossRef]
  77. Zhao, X.; Jing, S.; Hui, F.; Liu, R.; Khattak, A.J. DSRC-based rear-end collision warning system—An error-component safety distance model and field test. Transp. Res. Part C Emerg. Technol. 2019, 107, 92–104. [Google Scholar] [CrossRef]
  78. Jiang, D.; Taliwal, V.; Meier, A.; Holfelder, W.; Herrtwich, R. Design of 5.9 GHz DSRC-based vehicular safety communication. IEEE Wirel. Commun. 2006, 13, 36–43. [Google Scholar] [CrossRef]
  79. Morgan, Y.L. Notes on DSRC & WAVE standards suite: Its architecture, design, and characteristics. IEEE Commun. Surv. Tutor. 2010, 12, 504–518. [Google Scholar]
  80. Mir, Z.H.; Filali, F. LTE and IEEE 802.11 p for vehicular networking: A performance evaluation. EURASIP J. Wirel. Commun. Netw. 2014, 2014, 89. [Google Scholar]
  81. Ucar, S.; Ergen, S.C.; Ozkasap, O. Multihop-cluster-based IEEE 802.11 p and LTE hybrid architecture for VANET safety message dissemination. IEEE Trans. Veh. Technol. 2015, 65, 2621–2636. [Google Scholar] [CrossRef] [Green Version]
  82. Teixeira, F.A.; e Silva, V.F.; Leoni, J.L.; Macedo, D.F.; Nogueira, J.M. Vehicular networks using the IEEE 802.11 p standard: An experimental analysis. Veh. Commun. 2014, 1, 91–96. [Google Scholar]
  83. Li, Y.J. An overview of the DSRC/WAVE technology. In Proceedings of the International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, Houston, TX, USA, 17–19 November 2010; pp. 544–558. [Google Scholar]
  84. Samara, G.; Al-Salihy, W.A.; Sures, R. Security issues and challenges of vehicular ad hoc networks (VANET). In Proceedings of the International Conference on New Trends in Information Science and Service Science, Gyeongju, Korea, 11–13 May 2010; pp. 393–398. [Google Scholar]
  85. Engoulou, R.G.; Bellaïche, M.; Pierre, S.; Quintero, A. VANET security surveys. Comput. Commun. 2014, 44, 1–13. [Google Scholar] [CrossRef]
  86. Thilak, K.D.; Amuthan, A. DoS attack on VANET routing and possible defending solutions-a survey. In Proceedings of the International Conference on Information Communication and Embedded Systems, Chennai, India, 25–26 February 2016. [Google Scholar]
  87. Campos, R.S. Evolution of positioning techniques in cellular networks, from 2G to 4G. Wirel. Commun. Mob. Comput. 2017, 2017, 2315036. [Google Scholar] [CrossRef] [Green Version]
  88. Deb, S.; Monogioudis, P. Learning-based uplink interference management in 4G LTE cellular systems. IEEE/ACM Trans. Netw. 2015, 23, 398–411. [Google Scholar] [CrossRef]
  89. Li, R.; Zhao, Z.; Zhou, X.; Ding, G.; Chen, Y.; Wang, Z.; Zhang, H. Intelligent 5G: When cellular networks meet artificial intelligence. IEEE Wirel. Commun. 2017, 24, 175–183. [Google Scholar] [CrossRef]
  90. Cao, Y.; Jiang, T.; Wang, C. Cooperative device-to-device communications in cellular networks. IEEE Wirel. Commun. 2015, 22, 124–129. [Google Scholar] [CrossRef]
  91. Aijaz, A.; Dohler, M.; Aghvami, A.H.; Friderikos, V.; Frodigh, M. Realizing the tactile Internet: Haptic communications over next generation 5G cellular networks. IEEE Wirel. Commun. 2016, 24, 82–89. [Google Scholar] [CrossRef] [Green Version]
  92. Giordani, M.; Mezzavilla, M.; Rangan, S.; Zorzi, M. Multi-connectivity in 5G mmWave cellular networks. In Proceedings of the Ad Hoc Networking Workshop, Vilanova i la Geltru, Spain, 20–22 June 2016. [Google Scholar]
  93. Zhang, H.; Liu, N.; Chu, X.; Long, K.; Aghvami, A.H.; Leung, V.C.M. Network Slicing Based 5G and Future Mobile Networks: Mobility, Resource Management, and Challenges. IEEE Commun. Mag. 2017, 55, 138–145. [Google Scholar] [CrossRef]
  94. Ghatak, G.; Koirala, R.; De Domenico, A.; Denis, B.; Dardari, D.; Uguen, B. Positioning data-rate trade-off in mm-wave small cells and service differentiation for 5G networks. In Proceedings of the 2018 IEEE 87th Vehicular Technology Conference, Porto, Portugal, 3–6 June 2018. [Google Scholar]
  95. Popovski, P.; Trillingsgaard, K.F.; Simeone, O.; Durisi, G. 5G Wireless Network Slicing for eMBB, URLLC, and mMTC: A Communication-Theoretic View. IEEE Access 2018, 6, 55765–55779. [Google Scholar] [CrossRef]
  96. Deng, J.; Li, J.; Zhao, L.; Guo, L. A dual-band inverted-F MIMO antenna with enhanced isolation for WLAN applications. IEEE Antennas Wirel. Propag. Lett. 2017, 16, 2270–2273. [Google Scholar] [CrossRef]
  97. Soltani, S.; Lotfi, P.; Murch, R.D. A port and frequency reconfigurable MIMO slot antenna for WLAN applications. IEEE Trans. Antennas Propag. 2016, 64, 1209–1217. [Google Scholar] [CrossRef]
  98. Inaba, T.; Sakamoto, S.; Oda, T.; Ikeda, M.; Barolli, L. A testbed for admission control in WLAN: A fuzzy approach and its performance evaluation. In Proceedings of the International Conference on Broadband and Wireless Computing, Communication and Applications, Asan, Korea, 5–7 November 2016; pp. 559–571. [Google Scholar]
  99. Aalamifar, F.; Lampe, L. Optimized WiMAX profile configuration for smart grid communications. IEEE Trans. Smart Grid 2016, 8, 2723–2732. [Google Scholar] [CrossRef]
  100. More, A.S. A Survey Paper on WiMAX Technology. Int. J. Innov. Res. Sci. Technol. 2016, 2, 447–450. [Google Scholar]
  101. Malankar, N.R.; Shah, R. QoS Analysis over WiMax Network with Varying Modulation Schemes and Efficiency Modes. Int. J. Comput. Appl. 2017, 162, 9–16. [Google Scholar]
  102. New, W.K.; Chow, C.O.; Ma, M. Resource management for symmetrical applications over heterogeneous services in IEEE 802.16. Wirel. Netw. 2017, 23, 2601–2616. [Google Scholar] [CrossRef]
  103. Colantonio, P.; Cipriani, E.; Giofré, R.; Giannini, F. Solid state power amplifiers for satellite communication: A feasible solution. In Proceedings of the 2018 International Conference on IC Design & Technology, Otranto, Italy, 4–6 June 2018; pp. 85–88. [Google Scholar]
  104. Jia, M.; Liu, X.; Yin, Z.; Guo, Q.; Gu, X. Joint cooperative spectrum sensing and spectrum opportunity for satellite cluster communication networks. Ad Hoc Netw. 2017, 58, 231–238. [Google Scholar] [CrossRef]
  105. Luo, Z.; Pei, Z.; Zou, B. Directional polarization modulation for secure dual-polarized satellite communication. In Proceedings of the 2019 International Conference on Communications, Information System and Computer Engineering, Haikou, China, 5–7 July 2019; pp. 270–275. [Google Scholar]
  106. Nunez, J.; Tran, V.; Katangur, A. Protecting the unmanned aerial vehicle from cyberattacks. In Proceedings of the International Conference on Security and Management, Las Vegas, NV, USA, 29 July– 1 August 2019; pp. 154–157. [Google Scholar]
  107. Jovanovic, A.; Botteron, C.; Fariné, P.A. Multi-test detection and protection algorithm against spoofing attacks on GNSS receivers. In Proceedings of the IEEE/ION Position, Location and Navigation Symposium, Monterey, CA, USA, 5–8 May 2014; pp. 1258–1271. [Google Scholar]
  108. Fan, Y.; Zhang, Z.; Trinkle, M.; Dimitrovski, A.D.; Song, J.B.; Li, H. A cross-layer defense mechanism against GPS spoofing attacks on PMUs in smart grids. IEEE Trans. Smart Grid 2014, 6, 2659–2668. [Google Scholar] [CrossRef]
  109. Magiera, J.; Katulski, R. Detection and mitigation of GPS spoofing based on antenna array processing. J. Appl. Res. Technol. 2015, 13, 45–57. [Google Scholar] [CrossRef] [Green Version]
  110. Dardanelli, A.; Maggi, F.; Tanelli, M.; Zanero, S.; Savaresi, S.M.; Kochanek, R.; Holz, T. A security layer for smartphone-to-vehicle communication over bluetooth. IEEE Embed. Syst. Lett. 2013, 5, 34–37. [Google Scholar] [CrossRef]
  111. Spill, D.; Bittau, A. BlueSniff: Eve meets alice and bluetooth. In Proceedings of the 1st USENIX Workshop on Offensive Technologies, Boston, MA, USA, 6 August 2007; pp. 1–10. [Google Scholar]
  112. Kumar, S.; Mann, K.S. Detection of multiple malicious nodes using entropy for mitigating the effect of denial of service attack in VANETs. In Proceedings of the 4th International Conference on Computing Sciences, Jalandhar, India, 30–31 August 2018; pp. 72–79. [Google Scholar]
  113. Appathurai, A.; Manogaran, G.; Chilamkurti, N. Trusted FPGA-based transport traffic inject, impersonate (I2) attacks beaconing in the Internet of Vehicles. IET Netw. 2018, 8, 106–115. [Google Scholar] [CrossRef]
  114. Mondal, A.; Jana, M. Detection of fabrication, replay and suppression attack in VANET-a database approach. In Proceedings of the Conference on Advancement in Computation, Communication and Electronics Paradigm, Majitar, Sikkim, India, 25–28 February 2019; pp. 38–42. [Google Scholar]
  115. Albalas, F.; Yaseen, M.B.; Nassar, A. Detecting black hole attacks in MANET using relieff classification algorithm. In Proceedings of the 5th International Conference on Engineering and MIS, Astana, Kazakhstan, 6–8 June 2019; pp. 1–6. [Google Scholar]
  116. Balakrishnan, S.; Wang, P.; Bhuyan, A.; Sun, Z. Modeling and Analysis of Eavesdropping Attack in 802.11 ad mmWave Wireless Networks. IEEE Access 2019, 7, 70355–70370. [Google Scholar] [CrossRef]
  117. RoselinMary, S.; Maheshwari, M.; Thamaraiselvan, M. Early detection of DoS attacks in VANET using attacked packet detection algorithm (APDA). In Proceedings of the International Conference on Information Communication and Embedded Systems, Chennai, Tamil Nadu, India, 21–22 February 2013; pp. 237–240. [Google Scholar]
  118. Gandhi, U.D.; Keerthana, R. Request response detection algorithm for detecting DoS attack in VANET. In Proceedings of the International Conference on Reliability Optimization and Information Technology, Faridabad, India, 6–8 February 2014; pp. 192–194. [Google Scholar]
  119. Lyamin, N.; Vinel, A.; Jonsson, M.; Loo, J. Real-time detection of denial-of-service attacks in IEEE 802.11p vehicular networks. IEEE Commun. Lett. 2014, 18, 110–113. [Google Scholar] [CrossRef]
  120. Chuang, M.C.; Lee, J.F. TEAM: Trust-extended authentication mechanism for vehicular ad hoc networks. IEEE Syst. J. 2014, 8, 749–758. [Google Scholar] [CrossRef]
  121. Mambo, M.; Usuda, K.; Okamoto, E. Proxy signatures for delegating signing operation. In Proceedings of the 3rd ACM Conference on Computer and Communications Security, New Delhi, India, 14–16 March 1996; pp. 48–57. [Google Scholar]
  122. Patcha, A.; Mishra, A. Collaborative security architecture for black hole attack prevention in mobile ad hoc networks. In Proceedings of the 2003 Radio and Wireless Conference, Boston, MA, USA, 10–13 August 2003; pp. 75–78. [Google Scholar]
  123. Almutairi, H.; Chelloug, S.; Alqarni, H.; Aljaber, R.; Alshehri, A.; Alotaish, D. A new black hole detection scheme for VANETs. In Proceedings of the 6th International Conference on Management of Emergent Digital EcoSystems, Buraidah Al Qassim, Saudi Arabia, 15–17 September 2014; pp. 133–138. [Google Scholar]
  124. Alheeti, K.M.A.; Gruebler, A.; McDonald-Maier, K.D. An intrusion detection system against black hole attacks on the communication network of self-driving cars. In Proceedings of the 6th International Conference on Emerging Security Technologies, Braunschweig, Germany, 3–5 September 2015; pp. 86–91. [Google Scholar]
  125. Chowdhury, M.; Islam, M.; Khan, Z. Security of Connected and Automated Vehicles. Fall Issue Bridge Cybersecur. 2019, 49, 46–56. [Google Scholar]
  126. Benkhelifa, E.; Darabseh, A.; Alayyoub, M.; Jararweh, Y.; Vouk, M.; Rindos, A. SDSecurity: A software defined security experimental framework. In Proceedings of the IEEE ICC 2015 Workshop on Cloud Computing Systems, Networks, and Applications, London, UK, 8–12 June 2015; pp. 1871–1876. [Google Scholar]
  127. Qayyum, A.; Usama, M.; Qadir, J.; Alfuqaha, A. Securing future autonomous & connected vehicles: Challenges posed by adversarial machine learning and the way forward. IEEE Commun. Surv. Tutor. 2020, 10, 998–1026. [Google Scholar]
  128. Zhu, X.; Hu, D.; Hou, Z.; Ding, L. A location privacy preserving solution to resist passive and active attacks in VANET. China Commun. 2014, 11, 60–67. [Google Scholar] [CrossRef]
  129. Riazi, M.S.; Weinert, C.; Tkachenko, O.; Songhori, E.M.; Koushanfar, F. Chameleon: A hybrid secure computation framework for machine learning applications. In Proceedings of the ACM Asia Conference on Information, Computer and Communications Security, Incheon, Korea, 4–8 June 2018; pp. 707–721. [Google Scholar]
  130. Sinha, P. Architectural design and reliability analysis of a fail-operational brake-by-wire system from ISO 26262 perspectives. Reliab. Eng. Syst. Saf. 2011, 96, 1349–1359. [Google Scholar] [CrossRef]
  131. Birch, J.; Rivett, R.; Habli, I.; Bradshaw, B.; Botham, J.; Higham, D.; Jesty, P.; Monkhouse, H.; Palin, R. Safety cases and their role in ISO 26262 functional safety assessment. In Proceedings of the International Conference on Computer Safety, Reliability, and Security, Toulouse, France, 24–27 September 2013; pp. 154–165. [Google Scholar]
  132. Dittel, T.; Aryus, H.J. How to “Survive” a safety case according to ISO 26262. In Proceedings of the International Conference on Computer Safety, Reliability, and Security, Vienna, Austria, 14–17 September 2010; pp. 97–111. [Google Scholar]
  133. Schmittner, C.; Ma, Z.; Reyes, C.; Dillinger, O.; Puschner, P. Using SAE J3061 for automotive security requirement engineering. In Proceedings of the International Conference on Computer Safety, Reliability, and Security, Trondheim, Norway, 20–23 September 2016; pp. 157–170. [Google Scholar]
  134. Principles of Cyber Security for Connected and Automated Vehicles. 2017. Available online: https://www.gov.uk/government/publications/principles-of-cyber-security-for-connected-and-automated-vehicles/the-key-principles-of-vehicle-cyber-security-for-connected-and-automated-vehicles (accessed on 6 August 2017).
  135. Dou, J.; Gong, L.; Li, S.; Li, M. Efficient private subset computation. Secur. Commun. Netw. 2016, 9, 5965–5976. [Google Scholar] [CrossRef]
  136. Dou, J.W.; Ma, L.; Li, S.D. Secure Multi-Party Computation for Minimum and Its Applications. Acta Electron. Sin. 2017, 45, 1715–1721. [Google Scholar]
  137. Liu, X.; Li, S.; Liu, J.; Chen, X.; Xu, G. Secure multiparty computation of a comparison problem. SpringerPlus 2016, 5, 1489. [Google Scholar] [CrossRef] [Green Version]
  138. Liu, X.; Li, S.; Chen, X.; Xu, G.; Zhang, X.; Zhou, Y. Efficient solutions to two-party and multiparty millionaires’ problem. Secur. Commun. Netw. 2017, 2017, 5207386. [Google Scholar] [CrossRef] [Green Version]
  139. Li, S.; Guo, Y.; Zhou, S.; Dou, J.; Wang, D. Efficient Protocols for the General Millionaires’ Problem. Chin. J. Electron. 2017, 26, 696–702. [Google Scholar] [CrossRef]
  140. Gong, L.; Li, S.; Wu, C.; Wang, D. Secure “Ratio” Computation and Efficient Protocol for General Secure Two-Party Comparison. IEEE Access 2018, 6, 25532–25542. [Google Scholar] [CrossRef]
  141. Liu, X.; Choo, K.K.R.; Deng, R.H.; Lu, R.; Weng, J. Efficient and privacy-preserving outsourced calculation of rational numbers. IEEE Trans. Dependable Secur. Comput. 2018, 15, 27–39. [Google Scholar] [CrossRef]
  142. Huang, H.; Gong, T.; Chen, P.; Malekian, R.; Chen, T. Secure two-party distance computation protocol based on privacy homomorphism and scalar product in wireless sensor networks. Tsinghua Sci. Technol. 2016, 21, 385–396. [Google Scholar] [CrossRef]
  143. Rabieh, K.; Mahmoud, M.M.; Younis, M. Privacy-preserving route reporting scheme for traffic management in VANETs. In Proceedings of the 2015 IEEE International Conference on Communications, London, UK, 8–12 June 2015; pp. 7286–7291. [Google Scholar]
  144. Rabieh, K.; Mahmoud, M.M.; Younis, M. Privacy-preserving route reporting schemes for traffic management systems. IEEE Trans. Veh. Technol. 2016, 66, 2703–2713. [Google Scholar] [CrossRef]
  145. Zhang, Y.; Li, J.; Zheng, D.; Li, P.; Tian, Y. Privacy-preserving communication and power injection over vehicle networks and 5G smart grid slice. J. Netw. Comput. Appl. 2018, 122, 50–60. [Google Scholar] [CrossRef]
  146. Wang, B.; Chang, Z.; Zhou, Z.; Ristaniemi, T. Reliable and privacy-preserving task recomposition for crowdsensing in vehicular fog computing. In Proceedings of the 2018 IEEE 87th Vehicular Technology Conference, Porto, Portugal, 3–6 June 2018. [Google Scholar]
  147. Ogundoyin, S.O. An anonymous and privacy-preserving scheme for efficient traffic movement analysis in intelligent transportation system. Secur. Priv. 2018, 1, e50. [Google Scholar] [CrossRef] [Green Version]
  148. Kong, Q.; Lu, R.; Ma, M.; Bao, H. A privacy-preserving sensory data sharing scheme in Internet of Vehicles. Future Gener. Comput. Syst. 2019, 92, 644–655. [Google Scholar] [CrossRef]
  149. Han, W.; Xiao, Y. IP2DM: Integrated privacy-preserving data management architecture for smart grid V2G networks. Wirel. Commun. Mob. Comput. 2016, 16, 2956–2974. [Google Scholar] [CrossRef]
  150. Ozdemir, S.; Xiao, Y. Integrity protecting hierarchical concealed data aggregation for wireless sensor networks. Comput. Netw. 2011, 55, 1735–1746. [Google Scholar] [CrossRef]
  151. Prema, N. Efficient Secure Aggregation in VANETs Using Fully Homomorphic Encryption (FHE). Mob. Netw. Appl. 2019, 24, 434–442. [Google Scholar] [CrossRef]
  152. Zhu, H.; Liu, F.; Li, H. Efficient and privacy-preserving polygons spatial query framework for location-based services. IEEE Internet Things J. 2016, 4, 536–545. [Google Scholar] [CrossRef]
  153. Kong, Q.; Lu, R.; Ma, M.; Bao, H. Achieve location privacy-preserving range query in vehicular sensing. Sensors 2017, 17, 1829. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  154. Sun, G.; Sun, S.; Sun, J.; Yu, H.; Du, X.; Guizani, M. Security and privacy preservation in fog-based crowd sensing on the Internet of Vehicles. J. Netw. Comput. Appl. 2019, 134, 89–99. [Google Scholar] [CrossRef]
  155. He, Y.; Ni, J.; Wang, X.; Niu, B.; Li, F.; Shen, X. Privacy-preserving partner selection for ride-sharing services. IEEE Trans. Veh. Technol. 2018, 67, 5994–6005. [Google Scholar] [CrossRef]
  156. Yucel, F.; Akkaya, K.; Bulut, E. Efficient and privacy preserving supplier matching for electric vehicle charging. Ad Hoc Netw. 2019, 90, 101730. [Google Scholar] [CrossRef]
  157. Hadian, M.; Altuwaiyan, T.; Liang, X. Privacy-preserving time-sharing services for autonomous vehicles. In Proceedings of the 2017 IEEE 86th Vehicular Technology Conference, Toronto, ON, Canada, 24–27 September 2017. [Google Scholar]
  158. Ulybyshev, D.; Alsalem, A.O.; Bhargava, B.; Savvides, S.; Mani, G.; Othmane, L.B. Secure data communication in autonomous v2x systems. In Proceedings of the 2018 IEEE International Congress on Internet of Things, San Francisco, CA, USA, 2–7 July 2018; pp. 156–163. [Google Scholar]
  159. Rabieh, K.; Mahmoud, M.; Siraj, A.; Misic, J. Efficient privacy-preserving chatting scheme with degree of interest verification for vehicular social networks. In Proceedings of the 2015 IEEE Global Communications Conference, San Diego, Afghanistan, 6–10 December 2015. [Google Scholar]
  160. Alamer, A.; Deng, Y.; Lin, X. A privacy-preserving and truthful tendering framework for vehicle cloud computing. In Proceedings of the 2017 IEEE International Conference on Communications, Paris, France, 21–25 May 2017. [Google Scholar]
  161. Li, D.; Yang, Q.; Yu, W.; An, D.; Yang, X.; Zhao, W. A strategy-proof privacy-preserving double auction mechanism for electrical vehicles demand response in microgrids. In Proceedings of the 2017 IEEE 36th International Performance Computing and Communications Conference, San Diego, CA, USA, 10–12 December 2017. [Google Scholar]
  162. Magaia, N.; Borrego, C.; Pereira, P.R.; Correia, M. ePRIVO: An enhanced privacy-preserving opportunistic routing protocol for vehicular delay-tolerant networks. IEEE Trans. Veh. Technol. 2018, 67, 11154–11168. [Google Scholar] [CrossRef] [Green Version]
  163. Kumar, N.; Chilamkurti, N.; Rodrigues, J.J. Learning automata-based opportunistic data aggregation and forwarding scheme for alert generation in vehicular ad hoc networks. Comput. Commun. 2014, 39, 22–32. [Google Scholar] [CrossRef]
  164. Mohanty, S.; Jena, D. Secure data aggregation in vehicular-adhoc networks: A survey. Procedia Technol. 2012, 6, 922–929. [Google Scholar] [CrossRef] [Green Version]
  165. Freschi, V.; Delpriori, S.; Klopfenstein, L.C.; Lattanzi, E.; Luchetti, G.; Bogliolo, A. Geospatial data aggregation and reduction in vehicular sensing applications: The case of road surface monitoring. In Proceedings of the 2014 International Conference on Connected Vehicles and Expo, Vienna, Austria, 3–7 November 2014; pp. 711–716. [Google Scholar]
  166. Kumar, R.; Dave, M. Mobility models and their affect on data aggregation and dissemination in vehicular networks. Wirel. Pers. Commun. 2014, 79, 2237–2269. [Google Scholar] [CrossRef]
  167. Milojevic, M.; Rakocevic, V. Location aware data aggregation for efficient message dissemination in vehicular ad hoc networks. IEEE Trans. Veh. Technol. 2015, 64, 5575–5583. [Google Scholar] [CrossRef]
  168. Hu, H.; Lu, R.; Zhang, Z. TPSQ: Trust-based platoon service query via vehicular communications. Peer Netw. Appl. 2017, 10, 262–277. [Google Scholar] [CrossRef]
  169. Wang, X.; Guo, L.; Ai, C.; Li, J.; Cai, Z. An urban area-oriented traffic information query strategy in VANETs. In Proceedings of the International Conference on Wireless Algorithms, Systems, and Applications, Zhangjiajie, China, 7–10 August 2013; pp. 313–324. [Google Scholar]
  170. Lai, Y.; Zhang, L.; Yang, F.; Zheng, L.; Wang, T.; Li, K.C. CASQ: Adaptive and cloud-assisted query processing in vehicular sensor networks. Future Gener. Comput. Syst. 2019, 94, 237–249. [Google Scholar] [CrossRef]
  171. Drira, W.; Filali, F. NDN-Q: An NDN query mechanism for efficient V2X data collection. In Proceedings of the 2014 Eleventh Annual IEEE International Conference on Sensing, Communication, and Networking Workshops, Singapore, 30 June–3 July 2014; pp. 13–18. [Google Scholar]
  172. Chiou, B.S.; Lin, Y.J.; Hsu, Y.C.; Wang, S.Y.; Tzeng, S.S.; Huang, J.Y. K-hop search based geographical opportunistic routing for query messages in vehicular networks. In Proceedings of the 2013 International Symposium on Next-Generation Electronics, Kaohsiung, Taiwan, 25–26 February 2013; pp. 279–282. [Google Scholar]
  173. Ensworth, J.F.; Reynolds, M.S. Every smart phone is a backscatter reader: Modulated backscatter compatibility with bluetooth 4.0 low energy (ble) devices. In Proceedings of the 2015 IEEE International Conference on RFID, San Diego, CA, USA, 15–17 April 2015; pp. 78–85. [Google Scholar]
  174. Darroudi, S.M.; Gomez, C. Bluetooth low energy mesh networks: A survey. Sensors 2017, 17, 1467. [Google Scholar] [CrossRef] [Green Version]
  175. Hadian, M.; AlTuwaiyan, T.; Liang, X.; Zhu, H. Privacy-preserving Task Scheduling for Time-sharing Services of Autonomous Vehicles. IEEE Trans. Veh. Technol. 2019, 68, 5260–5270. [Google Scholar] [CrossRef]
  176. Sheet, D.K.; Kaiwartya, O.; Abdullah, A.H.; Cao, Y.; Hassan, A.N.; Kumar, S. Location information verification using transferable belief model for geographic routing in vehicular ad hoc networks. IET Intell. Transp. Syst. 2016, 11, 53–60. [Google Scholar] [CrossRef]
  177. Monteiro, M.E.P.; Rebelatto, J.L.; Souza, R.D. Information-theoretic location verification system with directional antennas for vehicular networks. IEEE Trans. Intell. Transp. Syst. 2015, 17, 93–103. [Google Scholar] [CrossRef]
  178. Kwon, H.Y.; Lee, M.K. Fast signature verification with shared implicit certificates for vehicular communication. In Proceedings of the International Conference on Broadband and Wireless Computing, Communication and Applications, Asan, Korea, 5–7 November 2016; pp. 525–533. [Google Scholar]
  179. Benamar, N.; Singh, K.D.; Benamar, M.; El Ouadghiri, D.; Bonnin, J.M. Routing protocols in vehicular delay tolerant networks: A comprehensive survey. Comput. Commun. 2014, 48, 141–158. [Google Scholar] [CrossRef]
  180. Yao, A.C. Protocols for secure computations. In Proceedings of the 23rd Annual Symposium on Foundations of Computer Science, Chicago, IL, USA, 3–5 November 1982; pp. 160–164. [Google Scholar]
Figure 1. The road map of secure computation based on homomorphic encryption in vehicular ad hoc networks.
Figure 1. The road map of secure computation based on homomorphic encryption in vehicular ad hoc networks.
Sensors 20 04253 g001
Figure 2. The development of fully homomorphic encryption.
Figure 2. The development of fully homomorphic encryption.
Sensors 20 04253 g002
Figure 3. A framework of vehicular ad hoc networks (VANETs).
Figure 3. A framework of vehicular ad hoc networks (VANETs).
Sensors 20 04253 g003
Figure 4. Communication domains in vehicular ad hoc networks.
Figure 4. Communication domains in vehicular ad hoc networks.
Sensors 20 04253 g004
Figure 5. The network model in [143].
Figure 5. The network model in [143].
Sensors 20 04253 g005
Figure 6. The architecture of the secure communication and power injection scheme.
Figure 6. The architecture of the secure communication and power injection scheme.
Sensors 20 04253 g006
Figure 7. The architecture of the secure task recomposition method.
Figure 7. The architecture of the secure task recomposition method.
Sensors 20 04253 g007
Figure 8. The architecture of the secure and autonomous analysis mechanism for traffic movement.
Figure 8. The architecture of the secure and autonomous analysis mechanism for traffic movement.
Sensors 20 04253 g008
Figure 9. The architecture of the secure data sharing scheme.
Figure 9. The architecture of the secure data sharing scheme.
Sensors 20 04253 g009
Figure 10. The architecture of vehicle-to-grid networks in a smart grid.
Figure 10. The architecture of vehicle-to-grid networks in a smart grid.
Sensors 20 04253 g010
Figure 11. The architecture of the secure data management framework.
Figure 11. The architecture of the secure data management framework.
Sensors 20 04253 g011
Figure 12. The architecture of the secure polygon spatial query scheme.
Figure 12. The architecture of the secure polygon spatial query scheme.
Sensors 20 04253 g012
Figure 13. The architecture of the secure range query method.
Figure 13. The architecture of the secure range query method.
Sensors 20 04253 g013
Figure 14. The architecture of the synthetic vehicle crowdsensing scheme.
Figure 14. The architecture of the synthetic vehicle crowdsensing scheme.
Sensors 20 04253 g014
Figure 15. The architecture of the matching system.
Figure 15. The architecture of the matching system.
Sensors 20 04253 g015
Figure 16. The network model in [159].
Figure 16. The network model in [159].
Sensors 20 04253 g016
Figure 17. The architecture of the secure incentive mechanism.
Figure 17. The architecture of the secure incentive mechanism.
Sensors 20 04253 g017
Figure 18. The architecture of the secure double auction scheme.
Figure 18. The architecture of the secure double auction scheme.
Sensors 20 04253 g018
Figure 19. The model of vehicular delay-tolerant networks.
Figure 19. The model of vehicular delay-tolerant networks.
Sensors 20 04253 g019
Table 1. The comparison of homomorphic encryption-based secure computation in vehicular ad hoc networks.
Table 1. The comparison of homomorphic encryption-based secure computation in vehicular ad hoc networks.
YearSchemeSecure Computation
Technology
Application ScenarioFunctionFeature
2015[143]PaillierRouting report mechanismAggregate vehicles’ dataEncrypted routing data, which are based on segment, are offered to road-side units
2016[144]PaillierRoute sharing methodAggregate messagesDecryptions are exchanged to obtain the aggregated routes
2018[145]PaillierCommunication and power
injection scheme
Aggregate power injectiton bidsThe utility company can only obtain the overall quantity of power
2018[146]PaillierTask recomposition methodAggregate collected subtasks, test the reliabilityThe sensed subtask is first encrypted by Paillier algorithm and AES
2018[147]Improved PaillierAnalysis mechanismAnalyze aggregated dataSave bandwidth and the authentication time
2019[148]Modified Paillier schemeData sharing schemeAggregate and share dataSave system resources
2016[149]Ozdemir’s homomorphic
encryption scheme [150]
Data management frameworkAggregate dataCenter database server calculates the final aggregation result
2019[151]Modified FHE schemeAggregation protocolAggregate dataAvoid leaking distance estimation
2016[152]Improved 2-DNF algorithm [25]Polygons spatial query schemeSearch dataThe location-based services user can inquire any polygonal area to obtain accurate results
2017[153]PaillierRange query methodCompute scalar productEvery multi-dimensional scalar is structured into one dimension
2019[154]Paillier, 2-DNFVehicle crowdsensing schemeImplement query, joint traceability and revocationUse a two-tier fog architecture
2018[155]PaillierRide-matching schemeSelect suitable ride-sharing partnersThis scheme is three-step
2019[156]PaillierOnline matching systemMatch the charging requestThis scheme is distributed
2017[157]PaillierTime-sharing methodImplement matching taskThe vehicle owner chooses the requester, which has the minimum cost value
2018[158]Partial homomorphic encryptionSearch methodQuery the ciphertexts of vehicle recordsSupport the subset of structured query language queries on the ciphertexts
2015[159]Partial homomorphic encryptionChatting mechanismVerify common interest and degree of interest,
check vehicles’common interests
Centralized authority is used to generate secret keys, update the interests of drivers and
revoke keys of interests
2017[160]Fully homomorphic encryptionTendering mechanismDecide victorious vehicles and their rewardsThe cloud server and selected vehicles collaborate to implement announced tasks
2017[161]Boneh’s algorithm [25]Double auction schemeSolve the problem of maximizing social welfareThis scheme can be executed whenever there exist both purchasers and sellers
2018[162]PaillierOpportunistic routing protocolGenerate and anonymize the neighborhood graph,
routing algorithm
Edges are regarded as the relationship of two neighboring vehicles

Share and Cite

MDPI and ACS Style

Sun, X.; Yu, F.R.; Zhang, P.; Xie, W.; Peng, X. A Survey on Secure Computation Based on Homomorphic Encryption in Vehicular Ad Hoc Networks. Sensors 2020, 20, 4253. https://doi.org/10.3390/s20154253

AMA Style

Sun X, Yu FR, Zhang P, Xie W, Peng X. A Survey on Secure Computation Based on Homomorphic Encryption in Vehicular Ad Hoc Networks. Sensors. 2020; 20(15):4253. https://doi.org/10.3390/s20154253

Chicago/Turabian Style

Sun, Xiaoqiang, F. Richard Yu, Peng Zhang, Weixin Xie, and Xiang Peng. 2020. "A Survey on Secure Computation Based on Homomorphic Encryption in Vehicular Ad Hoc Networks" Sensors 20, no. 15: 4253. https://doi.org/10.3390/s20154253

APA Style

Sun, X., Yu, F. R., Zhang, P., Xie, W., & Peng, X. (2020). A Survey on Secure Computation Based on Homomorphic Encryption in Vehicular Ad Hoc Networks. Sensors, 20(15), 4253. https://doi.org/10.3390/s20154253

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop