Jin-Feng Lai's research while affiliated with University of Electronic Science and Technology of China and other places

What is this page?


This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.

It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.

If you're a ResearchGate member, you can follow this page to keep up with this author's work.

If you are this author, and you don't want us to display this page anymore, please let us know.

Publications (5)


IMS: An Identity-Based Many-to-Many Subscription Scheme with Efficient Key Management for Wireless Broadcast Systems
  • Article

July 2020

·

34 Reads

·

3 Citations

IEEE Transactions on Services Computing

·

·

Jin-Feng Lai

·

[...]

·

Subscription-based services, where broadcasting companies make profits by providing subscription programs to users, have become a popular application of wireless broadcast systems. Driving by business interests and data security, companies usually encrypt content of programs with session keys, then only authorized users can access the contents of their subscribed programs, respectively. It is challenging to flexibly distribute and update the session key, we are therefore motivated to propose an identity-based many-to-many subscription scheme (IMS) with efficient key management. The IMS scheme possesses three novel advantages: Firstly, it provides a whole set of subscription flow, from the selection of programs of interest to the generation and updating of keys. Secondly, it supports program updating and all subscription behaviors. Thirdly, it employs a signature and authentication mechanism to stipulate that only authorized users can access the programs ciphertext. The theoretical analysis demonstrates that the proposed scheme is secure against Chosen-Ciphertext Attacks (CCA) under the k-bilinear Diffie-Hellman exponent (BDHE) problem, and has a decent performance in storage and computational overhead. The experimental analysis shows the total time cost of the proposed scheme is reduced more than 75.02% compared against the popular peer schemes under the condition of 2500 users.

Share

B-TSCA: Blockchain assisted Trustworthiness Scalable Computation for V2I Authentication in VANETs

March 2020

·

87 Reads

·

84 Citations

IEEE Transactions on Emerging Topics in Computing

The rapid development of 5G networks has made smart driving possible. The vehicular ad-hoc networks (VANETs) are the main environment for smart driving, providing road information, instant communication between vehicle and vehicle (V2V) or vehicle and infrastructure (V2I). The information interaction security of VANETs is critical to the proper functioning of the traffic. Much research in recent years has focused on secure communication in VANETs, especially the secure V2V or V2I communications. However, current security schemes often require complex identity re-authentication when vehicles enter a new infrastructure coverage, which greatly reduces the efficiency of the entire network. In addition, the emergence of blockchain has created opportunities to overcome the challenges in VANETs mentioned above. In this paper, blockchain is utilized to enhance the scalability of the trustworthiness scalable computation. The proposed blockchain assisted trustworthiness scalable computation based V2I authentication (B-TSCA) scheme achieves rapid re-authentication of vehicles through secure ownership transfer between infrastructures. Note that, trustworthiness scalable computation assisted by blockchian technology ensures the decentralization and non tamperability of the scalable computation result. The scheme is proved secure. The time cost of the novel handover authentication phase is half of that of the initial one as is presented in the simulation.


A Flexible and Dynamic Access Control Scheme for Smart Grid

February 2020

·

112 Reads

IET Generation, Transmission & Distribution

IET Generation, Transmission & Distribution

With the rapid development of smart grid, modern power systems are entering into a “data-intensive” era. Owing to the limited storage and computational resources of local servers, the power data monitored by a remote terminal unit (RTU) should be outsourced to the semi-trusted cloud, which may bring serious security issues to the user’s data. To prevent sensitive data from being accessed and utilized by malicious users, a flexible and dynamic access control scheme for smart grid is proposed. For one thing, not only monotone access formula but also non-monotone access formula involving negative constraints is considered in the proposed scheme, which makes the access structure more flexible. For another, given the attributes of each user is not constant, the operations of attribute revocation are considered, which makes the proposed scheme more valuable in real-life scenarios. Thirdly, multiple key distribution centers are employed to overcome the problem of a single-point performance bottleneck. The results of evaluation demonstrate that the proposed scheme ensures the revocation security without sacrificing the computational overhead.


A Trustworthiness-Based Time-Efficient V2I Authentication Scheme for VANETs

January 2020

·

25 Reads

·

2 Citations

Many researchers have conducted many researches on secure communication in VANETs, which have focused on secure V2V or V2I communications. However, current security schemes often require complex identity re-authentication when vehicles enter a new infrastructure coverage, which will greatly reduce the efficiency of the entire network. The proposed trustworthiness-based time-efficient vehicle to infrastructure authentication scheme in this paper achieves rapid re-authentication of vehicles through secure ownership transfer between infrastructures.


CATE: Cloud-Aided Trustworthiness Evaluation Scheme for Incompletely Predictable Vehicular Ad Hoc Networks

September 2019

·

52 Reads

·

12 Citations

IEEE Transactions on Vehicular Technology

Incompletely predictable vehicular ad hoc networks (IPNs) are presented for vehicular networks with vehicles moving in particular ranges. A group of vehicles in the same region are required to encrypt and sign the uploaded region information in IPNs. So far, research has not been able to provide an appropriate trustworthiness evaluation system ensuring security and fairness in IPNs. In this paper, we first establish an evaluation system for vehicles in the network for secure and fair trustworthiness evaluation. Various vehicle attributes are utilized to evaluate the trustworthiness level of a vehicle. The novel trustworthiness evaluation can provide a more comprehensive and real-time update of vehicle status. Second, based on the system, we propose a cloudaided trustworthiness evaluation (CATE) scheme. According to the evaluation results provided by the system, the CATE scheme also guarantees lightweight trustworthiness level confirmation with the help of session key generation. Besides, the information upload security is ensured with group signature and encryption. The security proof indicates that the proposed CATE scheme is secure for vehicles in IPNs to interact with trustworthiness. According to quantitative comparative analysis and experimental simulation based on paring-based cryptography (PBC) library, the designed scheme has been proved to be efficient.

Citations (4)


... In socio-meteorological observation, a volunteer will be removed if his devices are failed beyond repair. Meanwhile, there are also new volunteers joining the observation system [9]. From the perspective of data consumers, their attributes are not constant. ...

Reference:

A Dynamic Access Control Scheme with Conditional Anonymity in Socio-Meteorological Observation
IMS: An Identity-Based Many-to-Many Subscription Scheme with Efficient Key Management for Wireless Broadcast Systems
  • Citing Article
  • July 2020

IEEE Transactions on Services Computing

... Meng et al. [31] developed a similar scheme, also potentially increasing the delay with RSU-based transmission. Wang et al. [32] used blockchain to assess vehicle trustworthiness, employing bilinear mapping for authentication, but they overlooked vehicle traceability. Xie et al. [33] enhanced the authentication efficiency by storing information on the blockchain, requiring pseudonym updates through TAs. ...

B-TSCA: Blockchain assisted Trustworthiness Scalable Computation for V2I Authentication in VANETs
  • Citing Article
  • March 2020

IEEE Transactions on Emerging Topics in Computing

... Cryptography focuses on ciphering data to ensure confidentiality and to prevent unauthorized entities from interpreting the information [114]. This subsection discusses, in detail, the recent research employing the notion of trust along with cryptography [26,[115][116][117][118]. ...

A Trustworthiness-Based Time-Efficient V2I Authentication Scheme for VANETs
  • Citing Chapter
  • January 2020

... The reputation-based announcement schemes [11], [12] are presented to assess the reliability of feedback sent by legitimate vehicles, which aggregates the feedback provided by their neighboring vehicles and calculates the reputation with the help of a weighted average technology. To encourage cooperation and punish malicious vehicles, the reputation system is proposed by [13] for reliable cooperative downloading. Then, Cheng et al. [14] designed a cloudassisted vehicle feedback privacy protection protocol, which guarantees the reputation calculation of the target vehicle without revealing the privacy of vehicle. ...

CATE: Cloud-Aided Trustworthiness Evaluation Scheme for Incompletely Predictable Vehicular Ad Hoc Networks
  • Citing Article
  • September 2019

IEEE Transactions on Vehicular Technology