Verification of an Evolving Security Scheme in the Internet of Vehicles

被引:0
|
作者
Xin, Weiyang [1 ]
Zhang, Hanning [2 ]
Xu, Chunxiang [1 ]
Yao, Jiangyuan [1 ]
Li, Deshun [1 ]
Jin, Ting [1 ]
机构
[1] Hainan Univ, Sch Comp Sci & Technol, Haikou 570228, Peoples R China
[2] China Unicom, China Unicom Hainan Innovat Res Inst, Hainan Branch, Haikou 570100, Peoples R China
关键词
Internet of Vehicles; evolving security scheme; security property; COMPUTING-BASED INTERNET; KEY MANAGEMENT PROTOCOL; COMMUNICATION;
D O I
10.3390/electronics12214438
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The security scheme of the Internet of Vehicles (IoV) protects the vehicles from network attacks. However, during the experimental deployment of the IoV, people usually pay attention to its function and performance, and only develop a security scheme empirically when security defects are found. When a security scheme becomes very complex, it is very difficult to find the security vulnerability and to modify it. In view of this, we propose a verification method to verify the security of an evolving security scheme. This method uses formal methods to verify the evolving security scheme, actively finds the security problems of the security scheme, and promotes the evolution of the security scheme accordingly. This method is applied to the scenario of the IoV and its security scheme-the method evolves the Internet of Vehicles configuration and the security properties, establishes a corresponding formal model, and then iteratively verifies this using a formal method. The approach can fully simulate the evolution process of a security scheme in the IoV during deployment, and can effectively find the corresponding security vulnerabilities, to promote the evolving security scheme in the IoV, which supports the feasibility and usability of the method.
引用
收藏
页数:17
相关论文
共 50 条
  • [1] A Participatory Verification Security Scheme for the Internet of Things
    Chifor, Bogdan-Cosmin
    Bica, Ion
    Patriciu, Victor-Valeriu
    [J]. 2016 INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM 2016), 2016, : 267 - 270
  • [2] THE APPLICATION OF CLOUD DATA INTEGRITY VERIFICATION SCHEME IN INTERNET OF THINGS SECURITY
    Sai, Wei
    Zhang, Xinpeng
    Xie, Chengyang
    Li, Hong
    Zhang, Hui
    [J]. 2017 14TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2017, : 268 - 273
  • [3] An Efficient Lightweight Authentication and Batch Verification Scheme for Universal Internet of Vehicles (UIoV)
    Sikarwar, Himani
    Das, Debasis
    [J]. 2020 16TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE, IWCMC, 2020, : 1266 - 1271
  • [4] A service-categorized security scheme with physical unclonable functions for internet of vehicles
    Nadhir Ben Halima
    Ala Saleh Alluhaidan
    Mohammad Zunnun Khan
    Mohd Shahid Husain
    Mohammad Ayoub Khan
    [J]. Journal of Big Data, 10
  • [5] A service-categorized security scheme with physical unclonable functions for internet of vehicles
    Halima, Nadhir Ben
    Alluhaidan, Ala Saleh
    Khan, Mohammad Zunnun
    Husain, Mohd Shahid
    Khan, Mohammad Ayoub
    [J]. JOURNAL OF BIG DATA, 2023, 10 (01)
  • [6] Improving Security in the Internet of Vehicles: A Blockchain-Based Data Sharing Scheme
    Wang, Lianhai
    Guan, Chenxi
    [J]. ELECTRONICS, 2024, 13 (04)
  • [7] On the Security of a Secure and Computationally Efficient Authentication and Key Agreement Scheme for Internet of Vehicles
    Park, Kisung
    Kim, Myeonghyun
    Park, Youngho
    [J]. ELECTRONICS, 2024, 13 (16)
  • [8] Security Issues in the Internet of Vehicles
    Gafencu, Lucian
    Scripcariu, Luminita
    [J]. 2018 12TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), 2018, : 441 - 446
  • [9] Security and Privacy in the Internet of Vehicles
    Sun, Yunchuan
    Wu, Lei
    Wu, Shizhong
    Li, Shoupeng
    Zhang, Tao
    Zhang, Li
    Xu, Junfeng
    Xiong, Yongping
    [J]. 2015 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION, AND KNOWLEDGE IN THE INTERNET OF THINGS (IIKI), 2015, : 116 - 121
  • [10] Security-Enhanced Data Sharing Scheme With Location Privacy Preservation for Internet of Vehicles
    Hu, Peng
    Chu, Xixi
    Zuo, Kaizhong
    Ni, Tianjiao
    Xie, Dong
    Shen, Zhangyi
    Chen, Fulong
    Luo, Yonglong
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2024, 73 (09) : 13751 - 13764