A Two-Phase Authentication Mechanism for Enhancing Security in Internet of Vehicles (IoV)

Authors

  • Ram Niwash Nitharwal, Rohit Sharma

Keywords:

Internet-of-Vehicles, VANET, Authentication Mechanism, security.

Abstract

The vehicular ad hoc network is the decentralized form of network in which malicious user can join the network which can trigger a variety of active and passive attacks. The denial of service is an active type of intrusion that is triggered by the malicious nodes present in the network. This research work introduces a new two-phase methodology for authentication and certificate distribution. In first phase, the vehicles nodes will be successfully authenticated using mutual authentication procedure. In the second phase the Vehicle-to-Vehicle Authentication method is implemented which will distribute certificate among the vehicles. NS2 is applied to stimulate proposed technique and certain metrics are considered to compute the results.

Downloads

Download data is not yet available.

References

S. K. Datta, R. P. F. Da Costa, J. Härri and C. Bonnet, "Integrating connected vehicles in Internet of Things ecosystems: Challenges and solutions," 2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM), Coimbra, Portugal, 2016, pp. 1-6, doi: 10.1109/WoWMoM.2016.7523574

S. K. Datta, J. Haerri, C. Bonnet and R. Ferreira Da Costa, "Vehicles as Connected Resources: Opportunities and Challenges for the Future," in IEEE Vehicular Technology Magazine, vol. 12, no. 2, pp. 26-35, June 2017, doi: 10.1109/MVT.2017.2670859.

K. Bian, G. Zhang and L. Song, "Security in Use Cases of Vehicle-to-Everything Communications," 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall), Toronto, ON, Canada, 2017, pp. 1-5, doi: 10.1109/VTCFall.2017.8288208

M. Hasan, S. Mohan, T. Shimizu and H. Lu, "Securing Vehicle-to-Everything (V2X) Communication Platforms," in IEEE Transactions on Intelligent Vehicles, vol. 5, no. 4, pp. 693-713, Dec. 2020, doi: 10.1109/TIV.2020.2987430.

J. Huang, D. Fang, Y. Qian and R. Q. Hu, "Recent Advances and Challenges in Security and Privacy for V2X Communications," in IEEE Open Journal of Vehicular Technology, vol. 1, pp. 244-266, 2020, doi: 10.1109/OJVT.2020.2999885.

Talpur and M. Gurusamy, "Machine Learning for Security in Vehicular Networks: A Comprehensive Survey," in IEEE Communications Surveys & Tutorials, vol. 24, no. 1, pp. 346-379, Firstquarter 2022, doi: 10.1109/COMST.2021.3129079.

S. Khan, F. Luo, Z. Zhang, M. A. Rahim, M. Ahmad and K. Wu, "Survey on Issues and Recent Advances in Vehicular Public-Key Infrastructure (VPKI)," in IEEE Communications Surveys & Tutorials, vol. 24, no. 3, pp. 1574-1601, thirdquarter 2022, doi: 10.1109/COMST.2022.3178081.

P. Moya Osorio et al., "Towards 6G-Enabled Internet of Vehicles: Security and Privacy," in IEEE Open Journal of the Communications Society, vol. 3, pp. 82-105, 2022, doi: 10.1109/OJCOMS.2022.3143098.

X. Shen, R. Fantacci and S. Chen, "Internet of Vehicles [Scanning the Issue]," in Proceedings of the IEEE, vol. 108, no. 2, pp. 242-245, Feb. 2020, doi: 10.1109/JPROC.2020.2964107.

O. Kaiwartya et al., "Internet of Vehicles: Motivation, Layered Architecture, Network Model, Challenges, and Future Aspects," in IEEE Access, vol. 4, pp. 5356-5373, 2016, doi: 10.1109/ACCESS.2016.2603219.

L. Li, Y. Li and R. Hou, "A Novel Mobile Edge Computing-Based Architecture for Future Cellular Vehicular Networks," 2017 IEEE Wireless Communications and Networking Conference (WCNC), San Francisco, CA, USA, 2017, pp. 1-6, doi: 10.1109/WCNC.2017.7925830.

Downloads

Published

06.11.2024

How to Cite

Ram Niwash Nitharwal. (2024). A Two-Phase Authentication Mechanism for Enhancing Security in Internet of Vehicles (IoV). International Journal of Intelligent Systems and Applications in Engineering, 12(23s), 2731 –. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/7450

Issue

Section

Research Article