Token-Based Authorization and Authentication for Secure Internet of Vehicles Communication

被引:4
|
作者
Manogaran, Gunasekaran [1 ,2 ]
Rawal, Bharat S. [3 ]
Saravanan, Vijayalakshmi [4 ]
Priyan, M. K. [5 ]
Xin, Qin [6 ]
Shakeel, P. [7 ]
机构
[1] Howard Univ, Dept Elect Engn & Comp Sci, Coll Engn & Architecture CEA, Washington, Taiwan
[2] Asia Univ, Coll Informat & Elect Engn, Taichung, Taiwan
[3] Gannon Univ, Erie, PA USA
[4] Rochester Inst Technol, Rochester, NY 14623 USA
[5] Middlesex Univ, London, England
[6] Univ Faroe Isl, Fac Sci & Technol, Comp Sci, Torshavn, Faroe Islands
[7] Univ Teknikal Malaysia Melaka UTeM, Fac Informat & Commun Technol, Melaka, Malaysia
关键词
Authentication and authorization; blockchain; cyber-security; Internet of Vehicles; random forest; SOCIAL INTERNET; ARCHITECTURE; CHALLENGES; MANAGEMENT; PROTOCOL;
D O I
10.1145/3491202
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Vehicles (IoV) communication platform provides seamless information exchange facilities in a dynamic mobile city environment. Heterogeneous communication is a common medium for information exchange through autonomous resources distributed and accessed using infrastructure units. Cyber-security is a primary concern in accessing autonomous information from the distributed resources due to anonymity and different types of targeted adversaries. This article proposes token-based authorization and authentication (TAA) for securing IoV communications. The proposed method relies on blockchain technology and random forest learning for authorization and key management for authentication, respectively. In this process, frequent change in tokens and key update features are restricted in a view to maximize the seamlessness in information exchange. Authentication is preceded by knowledge of the data classification without errors to prevent additional overhead. Blockchain-based authorization helps to update specific fields of the tokens to retain the communication ratio by reducing vehicle-to-vehicle losses. The performance of the proposed method is assessed using appropriate simulations for these metrics by varying vehicle density, error rate, and classification sets.
引用
收藏
页数:20
相关论文
共 50 条
  • [1] A Secure Token-Based Communication for Authentication and Authorization Servers
    Kubovy, Jan
    Huber, Christian
    Jaeger, Markus
    Kueng, Josef
    [J]. FUTURE DATA AND SECURITY ENGINEERING, FDSE 2016, 2016, 10018 : 237 - 250
  • [2] Token-Based Lightweight Authentication to Secure IoT Networks
    Dammak, Maissa
    Boudia, Omar Rafik Merad
    Messous, Mohamed Ayoub
    Senouci, Sidi Mohammed
    Gransart, Christophe
    [J]. 2019 16TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2019,
  • [3] Beyond X.509 Token-based authentication and authorization in practice
    Ceccanti, Andrea
    Vianello, Enrico
    Giacomini, Francesco
    [J]. 24TH INTERNATIONAL CONFERENCE ON COMPUTING IN HIGH ENERGY AND NUCLEAR PHYSICS (CHEP 2019), 2020, 245
  • [4] Beyond X.509: token-based authentication and authorization for HEP
    Ceccanti, Andrea
    Vianello, Enrico
    Caberletti, Marco
    Giacomini, Francesco
    [J]. 23RD INTERNATIONAL CONFERENCE ON COMPUTING IN HIGH ENERGY AND NUCLEAR PHYSICS (CHEP 2018), 2019, 214
  • [5] Token-based Authentication for Smartphones
    Koschuch, Manuel
    Hudler, Matthias
    Eigner, Hubert
    Saffer, Zsolt
    [J]. PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON DATA COMMUNICATION NETWORKING (DCNET 2013), 2013, : 49 - 54
  • [6] TBAS: Token-based authorization service architecture in Internet of things scenarios
    Lee, Shih-Hsiung
    Huang, Ko-Wei
    Yang, Chu-Sing
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2017, 13 (07):
  • [7] Token-based authorization in StoRM WebDAV
    Ceccanti, Andrea
    Vianello, Enrico
    Michelotto, Diego
    [J]. 24TH INTERNATIONAL CONFERENCE ON COMPUTING IN HIGH ENERGY AND NUCLEAR PHYSICS (CHEP 2019), 2020, 245
  • [8] MQTT-Auth: a Token-based Solution to Endow MQTT with Authentication and Authorization Capabilities
    Calabretta, Marco
    Pecori, Riccardo
    Vecchio, Massimo
    Veltri, Luca
    [J]. JOURNAL OF COMMUNICATIONS SOFTWARE AND SYSTEMS, 2018, 14 (04) : 320 - 331
  • [9] Token-based graphical password authentication
    John Charles Gyorffy
    Andrew F. Tappenden
    James Miller
    [J]. International Journal of Information Security, 2011, 10 : 321 - 336
  • [10] Token-based graphical password authentication
    Gyorffy, John Charles
    Tappenden, Andrew F.
    Miller, James
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2011, 10 (06) : 321 - 336