Secure Incentive Mechanism for Advertisement Dissemination in Internet of Vehicles
管理學院 - 資訊管理系
Department of Information Management
|Thesis Publication Year:||2018|
|Graduation Academic Year:||106|
|Keywords (in Chinese):||商業廣告 、車聯網 、獎勵機制 、憑單配送|
|Keywords (in other languages):||Commercial Advertisement, Internet of Vehicles, Incentive mechanism, Voucher Dissemination|
|Reference times:||Clicks: 63 Downloads: 0|
|School Collection Retrieve National Library Collection Retrieve Error Report|
智慧型運輸系統(Intelligent Transportation Systems, ITS)之技術日趨成熟，加快了車聯網(Internet of Vehicles, IoV)的發展腳步。然而，隨著行動電子商務爆炸性的成長，車聯網也成為了下一代行動電子商務運用場景的淺力之星，如何於車聯網環境中推播產品廣告及刺激消費買氣便成了一個有趣的議題。對於商家來說，一個有效率的推銷產品方法便是透過廣告投放來吸引消費者目光，若是這個廣告投放的方式具有獎勵制度，那麼便能吸引人加入推播的行列，進而得到更多廣告曝光的機會。由於車聯網中所有的獎勵兌換皆為電子化，故如何確保憑單(Voucher)不會被有心人士非法的複製及重複利用，便為車聯網應用中一個很重要的課題。在本研究中，我們提出了一個廣告配送安全獎勵機制，該機制會給予幫忙轉傳廣告的駕駛者相對應之憑單，再藉由這些憑攤來兌換相符之獎勵。本機制除了能夠保護訊息傳輸之安全性，還能避免有心人士之共謀行為發生，進而換取原本就不屬於自己的獎勵。另外，投放廣告的公司還能根據本機制所設計之機制來得知廣告投放成本效益如何。最後，安全性分析能說明本機制之設計所能防範之常見攻擊。
Technologies for intelligent transportation systems built on Internet of Vehicles (IoV) networks are getting mature in the past couple of years. Along with the bursting demand and success of mobile commerce all over the world in recent years, how to utilize IoV networks to promote products and sales has become an interesting topic for next-generation mobile commerce. One of the most cost-saving, effective and efficient ways for sales promotion is to adopt the tactics of electronic advertisement dissemination with voucher incentives in IoV environments. Since all vouchers will be given in digital format within IoV, how to make sure that illegal copies of digital vouchers cannot be redeemed by malicious voucher receivers (vehicle drivers) is a critical requirement for voucher dissemination mechanisms. In this paper, a new secure voucher dissemination mechanism is introduced to give incentives among vehicle drivers to forward electronic advertisements they received to other vehicles. Our mechanism provides secure advertisement and voucher transmission in IoV environments. In addition, the proposed mechanism can prevent vehicle drivers from redeeming false vouchers or getting extra vouchers through collusion among vehicle drivers. Our mechanism also embeds cost control scheme inside for advertisers. Security analysis is conducted to evaluate the security strength of the proposed mechanism.
 Z. Li, C. Liu, C. Chigan. “GPAS: A general-purpose automatic survey system based on vehicular ad hoc networks,” IEEE Wireless Communications, vol.18, 2011, pp. 61-66.
 S. Panichpapiboon, W. Pattara-atikom. “A review of information dissemination protocols for vehicular ad hoc networks,” IEEE Communications Surveys & Tutorials, vol.14, 2012, pp. 784-798.
 A. Busson. “Analysis and simulation of a message dissemination algorithm for VANET,” International Journal of Communication Systems, 2011, pp. 1212-1229.
 S . Buchegger, J.Y. Le-Boudec. “Nodes bearing grudges: Towards routing security, fairness, and robustness in mobile ad hoc networks,” Processing 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing, 2002, pp. 403-410.
 S . Buchegger, J.Y. Le-Boudec. “Performance analysis of the CONFIDANT Protocol: Cooperation of nodes — Fairness in dynamic ad-hoc networks,” Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing, 2002, pp. 226-236.
 I. Khalil, S. Bagchi, N.B. Shroff. “LITEWORP: A lightweight countermeasure for the wormhole attack in multihop wireless networks,” International Conference on Dependable Systems and Networks(DSN’05), 2005, pp. 612-621.
 Y. Liu, Y.R. Yang. “Reputation propagation and agreement in mobile ad-hoc networks,” IEEE Wireless Communications and Networking Conference(WCNC), 2003, pp. 1510-1515.
 S. Bansal, M. Baker. “Observation-based cooperation enforcement in ad hoc networks,” CoRR 2003.
 Q. He, D. Wu, P.K. Khosla. “A secure incentive architecture for ad hoc networks,” Wireless Communications and Mobile Computing, 2006, pp. 333-346.
 L. Chen, Q. Li, K.M. Martin, S.L. Ng. “Private reputation retrieval in public – a privacy-aware announcement scheme for VANETs,” IET Information Security, vol.11, 2017, pp. 204-210.
 H. Hu, R. Lu, Z. Zhang, J. Shao. “REPLACE: A Reliable Trust-Based Platoon Service Recommendation Scheme in VANET,” IEEE Transactions on Vehicular Technology, vol. 66, 2016, pp. 1786-1797.
 C.F. Wang, J.W. Ding, T.C. Chen. “A routing protocol for mobile ad-hoc networks using the profit optimization model,” International Journal of Communication Systems, vol.27, 2013, pp.2851-2869.
 M.E. Mahmoud, X. Shen. “PIS: A practical incentive system for multihop wireless networks,” IEEE Transaction on Vehicular Technology, vol. 59, 2010, pp. 4012-4025.
 B. Lamparter, K. Paul, D. Westhoff. “Charging support for ad hoc stub networks,” Computer Communications, vol.26, 2003, pp. 1504-1514.
 J.P. Jayapalan, S.D. Magee. “Method and system for providing credit for participation in an ad hoc network,” U.S. Patent 20 070 230 438 2007.
 S.B. Lee, G. Pan, J.S. Park, M. Gerla, S. Lu. “Secure incentives for commercial ad dissemination in vehicular networks,” IEEE Transactions on Vehicular Technology, vol.61, 2012, pp.2715-2728.
 H. Janzadeh, K. Fayazbakhsh, M. Dehghan, M.S. Fallah. “A secure credit-based cooperation stimulating mechanism for manets using hash chains,” Future Generation Computer Systems, vol. 25, 2009, pp.926-934.
 T. Chen, S. Zhong. “INPAC: An enforceable incentive scheme for wireless networks using network codin,” Proceeding IEEE INFOCOM, 2010, pp.1-9.
 M. Felegyhazi, J.P. Hubaux, L. Buttyan. “Nash equilibria of packet forwarding strategies in wireless ad hoc networks,” IEEE Transaction on Mobile Computing, vol. 5, 2006, pp. 463-476.
 J. Kangaharju, A. Heinemann. “Incentives for electronic coupon systems,” Proceeding of the 1st International Workshop on Decentralized Resource Sharing in Mobile Computing and Networking, 2006, pp. 60-62.
 H.Y. Wei, R.D. Gitlin. “Incentive mechanism design for selﬁsh hybrid wireless relay networks,” Mobile Networks and Applications, vol.10, 2005, pp.929-937.
 S. Zhong, J. Chen, Y.R. Yang. “Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks,” IEEE INFOCOM, 2003, pp.1987-1997.
 E. Huang, J. Crowcroft, I. Wassell. “Rethinking incentives for mobile ad hoc networks,” Proceeding of the ACM SIGCOMM Workshop on Practice and Theory of Incentives in Networked Systems, 2004, pp.191-196.
 F. Li, J. Wu. “Frame: An innovative incentive scheme in vehicular networks,” IEEE International Conference on Communications, 2009, pp. 1-6.
 S.B. Lee, G. Pan, J.S. Park, M. Gerla, S. Lu. “Secure incentives for commercial ad dissemination in vehicular networks,” IEEE Transaction on Vehicular Technology, vol. 61, 2012, pp.2715-2728.
 F.K. Tseng, Y.H. Liu, J.S. Hwu, R.J. Chen. “A Secure Reed–Solomon Code Incentive Scheme for Commercial Ad Dissemination Over VANETs,” IEEE Transaction on Vehicular Technology, vol. 60, 2011, pp.4598-4608.
 Z. Li, C. Liu, C. Chigan. “On Secure VANET-Based Ad Dissemination With Pragmatic Cost and Effect Control,” IEEE Transactions on Intelligent Transportation Systems, vol. 14, 2013, pp. 124-135.
 L.Y. Yeh, Y.C. Lin. “A Proxy-Based Authentication and Billing Scheme With Incentive-Aware Multihop Forwarding for Vehicular Networks,” IEEE Transactions on Intelligent Transportation Systems, vol. 15, 2014, pp. 1607-1621.
 C. Lai, K. Zhang, N. Cheng, H. Li, X. Shen. “SIRC: A secure incentive scheme for reliable cooperative downloading in highway VANETs,” IEEE Transactions on Intelligent Transportation Systems, vol. 18, 2017, pp. 1559-1574.
 L. Buttyan, J.P. Hubaux. “Stimulating cooperation in self-organizing mobile ad hoc netwokrks,” Mobile Networks and Applications, vol. 8, 2003, pp.579-592.
 M. Raya, J.P. Hubaux. “Securing vehicular ad hoc networks,” Journal of Computer Security-Special Issue on Security of Ad-hoc and Sensor Networks, vol. 15, 2007, pp.39-68.
 IEEE Standard for Wireless Access in Vehicular Environments (WAVE)— Over-the-Air Electronic Payment Data Exchange Protocol for Intelligent Transportation Systems (ITS). IEEE Vehicular Technology Society, 2011, pp.1-62.
 C. Zhang, R. Lu, X. Lin, H.P. Ho, X. Shen. “An efﬁcient identity-based batch veriﬁcation scheme for vehicular sensor networks,” IEEE INFOCOM, 2008, pp.246-250.
 K.A. Shim. “CPAS: An efﬁcient conditional privacy-preserving authentication scheme for vehicular sensor networks,” IEEE Transactions on Vehicular Technology, vol. 61, 2012, pp.1874-1883.
 J.B. Kenney. “Dedicated short-range communications (DSRC) standards in the United States,” Proceeding of IEEE, 2011, pp. 1162–1182.
 C. Cremers. “Scyther semantics and verification of security protocols,” Ph.D dissertation: Eindhoven University of Technology, 2006.
 C. Cremers. “The Scyther Tool: verification, falsification, and analysis of security protocols,” International Conference on Computer Aided Verification (CAV), 2008, pp.414-418.
 K. Cohn-Gordon, C. Cremers, L. Garrat. “On Post-Compromise Security,” IEEE Computer Security Foundations Symposium (CSF), 2016.