{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T06:50:33Z","timestamp":1777704633874,"version":"3.51.4"},"reference-count":26,"publisher":"SAGE Publications","issue":"6","license":[{"start":{"date-parts":[[2018,8,1]],"date-time":"2018-08-01T00:00:00Z","timestamp":1533081600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"published-print":{"date-parts":[[2018,12,24]]},"abstract":"<jats:p>With the development of intelligent vehicles, in-vehicle security and privacy receive considerable attention from researchers and drivers. The data stored in a vehicle control unit (VCU) may contain privacy-sensitive content, which may be exposed to unauthorized devices or attackers due to the structural problems of the in-vehicle network. To overcome this problem, data can be encrypted with the target module\u2019s key before being transmitted to the in-vehicle network. However, this may lead to another efficiency problem.<\/jats:p>\n                  <jats:p>In this study, we propose a model that adopts the proxy re-encryption (PRE) scheme to the in-vehicle network. This is called privacy-enhancing in-vehicle network key management (PINK). In the proposed model, the data stored in the VCU is encrypted with a master key. In addition, when the stored data is requested by a node, it is transformed into a ciphertext that can only be decrypted with the node\u2019s key using the PRE scheme. Moreover, for the case in which a special group of nodes request the data several times, simultaneously, a group-based key management scheme i provided. Further it is demonstrated using simulations that the proposed PINK scheme can be efficiently applied to the in-vehicle network.<\/jats:p>","DOI":"10.3233\/jifs-169848","type":"journal-article","created":{"date-parts":[[2018,8,5]],"date-time":"2018-08-05T06:38:26Z","timestamp":1533451106000},"page":"6079-6087","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":2,"title":["Key management and data re-encryption schemes for secure in-vehicle network"],"prefix":"10.1177","volume":"35","author":[{"given":"Young-Hoon","family":"Park","sequence":"first","affiliation":[{"name":"Division of Computer Science, Sookmyung Women\u2019s University, Seoul, South Korea"}]}],"member":"179","published-online":{"date-parts":[[2018,8]]},"reference":[{"key":"e_1_3_2_2_2","doi-asserted-by":"crossref","unstructured":"KimmH. and HamH.S. Integrated fault tolerant system for automotive bus networks in Computer Engineering and Applications (ICCEA) 2010 Second International Conference on vol. 1 2010 pp. 486\u2013490.","DOI":"10.1109\/ICCEA.2010.100"},{"key":"e_1_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2521642"},{"key":"e_1_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2013.40"},{"key":"e_1_3_2_5_2","unstructured":"ParkY.-H. Data encryption and key management for secure in-vehicle networks based on proxy re-encryption in International Conference on Green and Human Interface Technology (ICGHIT 2018) Chiang Mai Thailand 2018 pp. 192\u2013195."},{"key":"e_1_3_2_6_2","doi-asserted-by":"crossref","unstructured":"KoscherK. CzeskisA. RoesnerF. PatelS. KohnoT. CheckowayS. McCoyD. KantorB. AndersonD. ShachamH. and SavageS. Experimental security analysis of a modern automobile in 2010 IEEE Symposium on Security and Privacy (2010) pp. 447\u2013462.","DOI":"10.1109\/SP.2010.34"},{"key":"e_1_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2011.5940525"},{"key":"e_1_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2017.1600257"},{"key":"e_1_3_2_9_2","first-page":"993","article-title":"A practical wireless attack on the connected car and security protocol for in-vehicle can","volume":"16","author":"Woo S.","year":"2015","unstructured":"WooS., JoH.J. and LeeD.H., A practical wireless attack on the connected car and security protocol for in-vehicle can, IEEE Transactions on Intelligent Transportation Systems, 16 (2015), 993\u20131006.","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"key":"e_1_3_2_10_2","doi-asserted-by":"crossref","unstructured":"HoppeT. KiltzS. and DittmannJ. Security threats to auto- motive can networks \u2014 practical examples and selected short-term countermeasures in Proceedings of the 27th International Conference on Computer Safety Reliability and Security SAFECOMP \u201908 Berlin Heidelberg Springer-Verlag 2008 pp. 235\u2013248.","DOI":"10.1007\/978-3-540-87698-4_21"},{"key":"e_1_3_2_11_2","unstructured":"EnckW. GilbertP. ChunB.-G. CoxL.P. JungJ. Mc-DanielP. and ShethA.N. Taintdroid: An information- flow tracking system for realtime privacy monitoring on smartphones in Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation OSDI\u201910 Berkeley CA USA 2010 pp. 393\u2013407 USENIX Association."},{"key":"e_1_3_2_12_2","unstructured":"RoufI. MillerR. MustafaH. TaylorT. OhS. XuW. GruteserM. TrappeW. and SeskarI. Security and pri- vacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study in Proceedings of the 19th USENIX Conference on Security USENIX Secu- rity\u201910 Berkeley CA USA 2010 pp. 21\u201321 USENIX Association."},{"key":"e_1_3_2_13_2","unstructured":"CheckowayS. McCoyD. KantorB. AndersonD. ShachamH. SavageS. KoscherK. CzeskisA. RoesnerF. and KohnoT. Comprehensive experimental analyses of auto motive attack surfaces in Proceedings of the 20th USENIX Conference on Security SEC\u201911 Berkeley CA USA 2011 pp. 6\u20136 USENIX Association."},{"key":"e_1_3_2_14_2","doi-asserted-by":"crossref","unstructured":"SchweppeH. and RoudierY. Security and privacy for invehicle networks in 2012 IEEE 1st International Workshop on Vehicular Communications Sensing and Computing (VCSC) (2012) pp. 12\u201317.","DOI":"10.1109\/VCSC.2012.6281235"},{"key":"e_1_3_2_15_2","doi-asserted-by":"crossref","unstructured":"GrollA. and RulandC. Secure and authentic communication on existing in-vehicle networks in 2009 IEEE Intelligent Vehicles Symposium (2009) pp. 1093\u20131097.","DOI":"10.1109\/IVS.2009.5164434"},{"key":"e_1_3_2_16_2","doi-asserted-by":"crossref","unstructured":"BlazeM. BleumerG. and StraussM. Divertible protocols and atomic proxy cryptography in AdvancesinCryptology\u2014EUROCRYPT\u201998 (NybergK. ed.) Berlin Heidelberg 1998 pp. 127\u2013144 Springer Berlin Heidelberg.","DOI":"10.1007\/BFb0054122"},{"key":"e_1_3_2_17_2","unstructured":"MamboM. and OlamotoE. Olamoto Proxy cryptosystem: Delegation of the power to decrypt cipher-texts vol. 80 011997."},{"key":"e_1_3_2_18_2","article-title":"Proxy cryptography revisited","author":"Ivan A.","year":"2003","unstructured":"IvanA. and DodisY., Proxy cryptography revisited, in Proceedings of the Network and Distributed System Security Symposium (NDSS), 2003.","journal-title":"Proceedings of the Network and Distributed System Security Symposium (NDSS)"},{"key":"e_1_3_2_19_2","unstructured":"ZhouL. MarshM.A. SchneiderF.B. and RedzA. Distributed blinding for distributed elgamal re-encryption in 25th IEEE International Conference on Distributed Computing Systems (ICDCS\u201905)2005. pp. 824\u2013824."},{"key":"e_1_3_2_20_2","doi-asserted-by":"crossref","unstructured":"CanettiR. and HohenbergerS. Chosen-ciphertext secure proxy re-encryption in Proceedings of the 14th ACM Conference on Computer and Communications Security CCS \u201907 New York NY USA ACM 2007 pp. 185\u2013194.","DOI":"10.1145\/1315245.1315269"},{"key":"e_1_3_2_21_2","doi-asserted-by":"crossref","unstructured":"BlazeM. BleumerG. and StraussM. Divertible protocols and atomic proxy cryptography In EUROCRYPT Springer-Verlag 1998 pp. 127\u2013144.","DOI":"10.1007\/BFb0054122"},{"key":"e_1_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1145\/1127345.1127346"},{"key":"e_1_3_2_23_2","doi-asserted-by":"crossref","unstructured":"HohenbergerS. RothblumG.N. ShelatA. and VaikuntanathanV. Securely obfuscating re-encryption in Heidelberg Proceedings of the 4th Conference on Theory of Cryptography TCC\u201907Berlin Heidelberg Springer-Verlag 2007. pp. 233\u2013252BerlinSpringer-Verlag.","DOI":"10.1007\/978-3-540-70936-7_13"},{"key":"e_1_3_2_24_2","doi-asserted-by":"crossref","unstructured":"LibertB. and VergnaudD. Tracing malicious proxies in proxy re-encryption in Pairing-BasedCryptography\u2013Pairing2008 (GalbraithS.D. and PatersonK.G. eds.) Berlin Heidelberg Springer Berlin Heidelberg 2008 pp. 332\u2013353.","DOI":"10.1007\/978-3-540-85538-5_22"},{"key":"e_1_3_2_25_2","doi-asserted-by":"crossref","unstructured":"AtenieseG. BensonK. and HohenbergerS. Key-private proxy re-encryption in Proceedings of the The Cryptog-raphers\u2019 Track at the RSA Conference 2009 on Topics in Cryptology CTRSA \u201909 Berlin Heidelberg Springer-Verlag 2009 pp. 279\u2013294.","DOI":"10.1007\/978-3-642-00862-7_19"},{"key":"e_1_3_2_26_2","doi-asserted-by":"crossref","unstructured":"GreenM. and AtenieseG. Identity-based proxy re-encryption in Proceedings of the 5th International Conference on Applied Cryptography and Network Security ACNS \u201907 Berlin Heidelberg Springer-Verlag 2007 pp. 288\u2013306.","DOI":"10.1007\/978-3-540-72738-5_19"},{"key":"e_1_3_2_27_2","doi-asserted-by":"crossref","unstructured":"ChowS.S.M. WengJ. YangY. and DengR.H. Efficient unidirectional proxy re-encryption in Proceedings of the Third International Conference on Cryptology in Africa AFRICACRYPT\u201910 Berlin Heidelberg Springer-Verlag 2010 pp. 316\u2013332.","DOI":"10.1007\/978-3-642-12678-9_19"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-169848","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.3233\/JIFS-169848","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-169848","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T09:41:40Z","timestamp":1777455700000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/JIFS-169848"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8]]},"references-count":26,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2018,12,24]]}},"alternative-id":["10.3233\/JIFS-169848"],"URL":"https:\/\/doi.org\/10.3233\/jifs-169848","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,8]]}}}