skip to main content
research-article

Token-Based Authorization and Authentication for Secure Internet of Vehicles Communication

Authors Info & Claims
Published:03 March 2023Publication History
Skip Abstract Section

Abstract

The Internet of Vehicles (IoV) communication platform provides seamless information exchange facilities in a dynamic mobile city environment. Heterogeneous communication is a common medium for information exchange through autonomous resources distributed and accessed using infrastructure units. Cyber-security is a primary concern in accessing autonomous information from the distributed resources due to anonymity and different types of targeted adversaries. This article proposes token-based authorization and authentication (TAA) for securing IoV communications. The proposed method relies on blockchain technology and random forest learning for authorization and key management for authentication, respectively. In this process, frequent change in tokens and key update features are restricted in a view to maximize the seamlessness in information exchange. Authentication is preceded by knowledge of the data classification without errors to prevent additional overhead. Blockchain-based authorization helps to update specific fields of the tokens to retain the communication ratio by reducing vehicle-to-vehicle losses. The performance of the proposed method is assessed using appropriate simulations for these metrics by varying vehicle density, error rate, and classification sets.

REFERENCES

  1. [1] Sharma S. and Kaushik B.. 2019. A survey on Internet of Vehicles: Applications, cyber-security issues & solutions. Vehicular Communications 20 (2019), 100182.Google ScholarGoogle ScholarCross RefCross Ref
  2. [2] Butt T. A., Iqbal R., Shah S. C., and Umar T.. 2018. Social Internet of Vehicles: architecture and enabling technologies. Computers & Electrical Engineering 69 (2018), 6884.Google ScholarGoogle ScholarCross RefCross Ref
  3. [3] Abbas M. T., Muhammad A., and Song W.-C.. 2019. Road-aware estimation model for path duration in Internet of Vehicles (IoV). Wireless Personal Communications 109, 2 (2019), 715738.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. [4] Atzori L., Floris A., Girau R., Nitti M., and Pau G.. 2018. Towards the implementation of the social Internet of Vehicles. Computer Networks 147 (2018), 132145.Google ScholarGoogle ScholarCross RefCross Ref
  5. [5] Contreras-Castillo J., Zeadally S., and Guerrero-Ibanez J. A.. 2018. Internet of Vehicles: architecture, protocols, and cyber-security. IEEE Internet of Things Journal 5, 5 (2018), 37013709.Google ScholarGoogle ScholarCross RefCross Ref
  6. [6] Fan K., Jiang W., Luo Q., Li H., and Yang Y.. 2019. Cloud-based RFID mutual authentication scheme for efficient privacy preserving in IoV. Journal of the Franklin Institute (2019).Google ScholarGoogle Scholar
  7. [7] Qian Y., Chen M., Chen J., Hossain M. S., and Alamri A.. 2018. Secure enforcement in cognitive Internet of Vehicles. IEEE Internet of Things Journal 5, 2 (2018), 12421250.Google ScholarGoogle ScholarCross RefCross Ref
  8. [8] P. Hu, Y. Wang, B. Gong, Y. Wang, Y. Li, R. Zhao, and B. Li. 2020. A secure and lightweight privacy-preserving data aggregation scheme for internet of vehicles. Peer-to-Peer Networking and Applications 13 (2020), 1002--1013.Google ScholarGoogle Scholar
  9. [9] P. Zhao, G. Zhang, S. Wan, G. Liu, and T. Umer. 2020. A survey of local differential privacy for securing internet of vehicles. The Journal of Supercomputing 76 (2020), 8391--8412.Google ScholarGoogle Scholar
  10. [10] Yin B., Wu Y., Hu T., Dong J., and Jiang Z.. 2020. An efficient collaboration and incentive mechanism for Internet of Vehicles (IoV) with secured information exchange based on blockchains. IEEE Internet of Things Journal 7, 3 (2020), 15821593.Google ScholarGoogle ScholarCross RefCross Ref
  11. [11] Alnasser A., Sun H., and Jiang J.. 2019. Cyber security challenges and solutions for V2X communications: A survey. Computer Networks 151 (2019), 5267.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. [12] Sheehan B., Murphy F., Mullins M., and Ryan C.. 2019. Connected and autonomous vehicles: A cyber-risk classification framework. Transportation Research Part A: Policy and Practice 124 (2019), 523536.Google ScholarGoogle ScholarCross RefCross Ref
  13. [13] Butt T. A., Iqbal R., Salah K., Aloqaily M. and Jararweh Y.. 2019. Privacy management in social Internet of Vehicles: review, challenges and blockchain based solutions. In IEEE Access 7 (2019), 7969479713.Google ScholarGoogle ScholarCross RefCross Ref
  14. [14] Hu W., Hu Y., Yao W., and Li H.. 2019. A blockchain-based byzantine consensus algorithm for information authentication of the Internet of Vehicles. IEEE Access 7 (2019), 139703139711.Google ScholarGoogle ScholarCross RefCross Ref
  15. [15] Tolba A. and Altameem A.. 2019. A three-tier architecture for securing IoV communications using vehicular dependencies. IEEE Access 7 (2019), 6133161341.Google ScholarGoogle ScholarCross RefCross Ref
  16. [16] Wang X., Zeng P., Patterson N., Jiang F., and Doss R.. 2019. An improved authentication scheme for Internet of Vehicles based on blockchain technology. IEEE Access 7 (2019), 4506145072.Google ScholarGoogle ScholarCross RefCross Ref
  17. [17] Wang L. and Liu X.. 2018. NOTSA: Novel OBU with three-level cyber-security architecture for Internet of Vehicles. IEEE Internet of Things Journal 5, 5 (2018), 35483558.Google ScholarGoogle ScholarCross RefCross Ref
  18. [18] Sun G., Sun S., Sun J., Yu H., Du X., and Guizani M.. 2019. Cyber-security and privacy preservation in fog-based crowd sensing on the Internet of Vehicles. Journal of Network and Computer Applications 134 (2019), 8999.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. [19] Chen Z., Zhou K., and Liao Q.. 2018. Quantum identity authentication scheme of vehicular ad-hoc networks. International Journal of Theoretical Physics 58, 1 (Oct. 2018), 4057.Google ScholarGoogle ScholarCross RefCross Ref
  20. [20] A. Bonadio, F. Chiti, and R. Fantacci. 2018. An Integrated Framework for Fog Communications and Computing in Internet of Vehicles. In OMNeT++. 84--92.Google ScholarGoogle Scholar
  21. [21] Fan K., Wang W., Jiang W., Li H., and Yang Y.. 2017. Secure ultra-lightweight RFID mutual authentication protocol based on transparent computing for IoV. Peer-to-Peer Networking and Applications 11, 4 (Aug. 2017), 723734.Google ScholarGoogle ScholarCross RefCross Ref
  22. [22] Vasudev H., Das D., and Vasilakos A. V.. 2020. Secure message propagation protocols for IoVs communication components. Computers & Electrical Engineering 82 (2020), 106555.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. [23] Chen W., Chen Y., Chen X., and Zheng Z.. 2019. Toward secure data sharing for the IoV: A quality-driven incentive mechanism with On-Chain and Off-Chain guarantees. IEEE Internet of Things Journal (2019), 1–1.Google ScholarGoogle Scholar
  24. [24] Li J., Ji Y., Choo K. -K. R., and Hogrefe D.. 2019. CL-CPPA: Certificate-less conditional privacy-preserving authentication protocol for the Internet of Vehicles. IEEE Internet of Things Journal 6, 6 (2019), 1033210343.Google ScholarGoogle ScholarCross RefCross Ref
  25. [25] Chen C. M., Xiang B., Liu Y., and Wang K. H.. 2019. A secure authentication protocol for Internet of Vehicles. IEEE Access 7 (2019), 1204712057.Google ScholarGoogle ScholarCross RefCross Ref
  26. [26] Wazid M., Bagga P., Das A. K., Shetty S., Rodrigues J. J. P. C., and Park Y.. 2019. AKM-IoV: Authenticated key management protocol in fog computing-based Internet of Vehicles deployment. IEEE Internet of Things Journal 6, 5 (2019), 88048817.Google ScholarGoogle ScholarCross RefCross Ref
  27. [27] F. Fu, Y. Kang, Z. Zhang, F. R. Yu, and T. Wu. 2020. Soft actor.critic DRL for live transcoding and streaming in vehicular fog-computing-enabled IoV. IEEE Internet of Things Journal 8, 3 (2020), 1308--1321.Google ScholarGoogle Scholar

Index Terms

  1. Token-Based Authorization and Authentication for Secure Internet of Vehicles Communication

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM Transactions on Internet Technology
        ACM Transactions on Internet Technology  Volume 22, Issue 4
        November 2022
        642 pages
        ISSN:1533-5399
        EISSN:1557-6051
        DOI:10.1145/3561988
        Issue’s Table of Contents

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 3 March 2023
        • Online AM: 16 August 2022
        • Accepted: 6 October 2021
        • Revised: 21 October 2020
        • Received: 2 May 2020
        Published in toit Volume 22, Issue 4

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
      • Article Metrics

        • Downloads (Last 12 months)318
        • Downloads (Last 6 weeks)34

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Full Text

      View this article in Full Text.

      View Full Text

      HTML Format

      View this article in HTML Format .

      View HTML Format
      About Cookies On This Site

      We use cookies to ensure that we give you the best experience on our website.

      Learn more

      Got it!