A Two-Phase Authentication Mechanism for Enhancing Security in Internet of Vehicles (IoV)
Keywords:
Internet-of-Vehicles, VANET, Authentication Mechanism, security.Abstract
The vehicular ad hoc network is the decentralized form of network in which malicious user can join the network which can trigger a variety of active and passive attacks. The denial of service is an active type of intrusion that is triggered by the malicious nodes present in the network. This research work introduces a new two-phase methodology for authentication and certificate distribution. In first phase, the vehicles nodes will be successfully authenticated using mutual authentication procedure. In the second phase the Vehicle-to-Vehicle Authentication method is implemented which will distribute certificate among the vehicles. NS2 is applied to stimulate proposed technique and certain metrics are considered to compute the results.
Downloads
References
S. K. Datta, R. P. F. Da Costa, J. Härri and C. Bonnet, "Integrating connected vehicles in Internet of Things ecosystems: Challenges and solutions," 2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM), Coimbra, Portugal, 2016, pp. 1-6, doi: 10.1109/WoWMoM.2016.7523574
S. K. Datta, J. Haerri, C. Bonnet and R. Ferreira Da Costa, "Vehicles as Connected Resources: Opportunities and Challenges for the Future," in IEEE Vehicular Technology Magazine, vol. 12, no. 2, pp. 26-35, June 2017, doi: 10.1109/MVT.2017.2670859.
K. Bian, G. Zhang and L. Song, "Security in Use Cases of Vehicle-to-Everything Communications," 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall), Toronto, ON, Canada, 2017, pp. 1-5, doi: 10.1109/VTCFall.2017.8288208
M. Hasan, S. Mohan, T. Shimizu and H. Lu, "Securing Vehicle-to-Everything (V2X) Communication Platforms," in IEEE Transactions on Intelligent Vehicles, vol. 5, no. 4, pp. 693-713, Dec. 2020, doi: 10.1109/TIV.2020.2987430.
J. Huang, D. Fang, Y. Qian and R. Q. Hu, "Recent Advances and Challenges in Security and Privacy for V2X Communications," in IEEE Open Journal of Vehicular Technology, vol. 1, pp. 244-266, 2020, doi: 10.1109/OJVT.2020.2999885.
Talpur and M. Gurusamy, "Machine Learning for Security in Vehicular Networks: A Comprehensive Survey," in IEEE Communications Surveys & Tutorials, vol. 24, no. 1, pp. 346-379, Firstquarter 2022, doi: 10.1109/COMST.2021.3129079.
S. Khan, F. Luo, Z. Zhang, M. A. Rahim, M. Ahmad and K. Wu, "Survey on Issues and Recent Advances in Vehicular Public-Key Infrastructure (VPKI)," in IEEE Communications Surveys & Tutorials, vol. 24, no. 3, pp. 1574-1601, thirdquarter 2022, doi: 10.1109/COMST.2022.3178081.
P. Moya Osorio et al., "Towards 6G-Enabled Internet of Vehicles: Security and Privacy," in IEEE Open Journal of the Communications Society, vol. 3, pp. 82-105, 2022, doi: 10.1109/OJCOMS.2022.3143098.
X. Shen, R. Fantacci and S. Chen, "Internet of Vehicles [Scanning the Issue]," in Proceedings of the IEEE, vol. 108, no. 2, pp. 242-245, Feb. 2020, doi: 10.1109/JPROC.2020.2964107.
O. Kaiwartya et al., "Internet of Vehicles: Motivation, Layered Architecture, Network Model, Challenges, and Future Aspects," in IEEE Access, vol. 4, pp. 5356-5373, 2016, doi: 10.1109/ACCESS.2016.2603219.
L. Li, Y. Li and R. Hou, "A Novel Mobile Edge Computing-Based Architecture for Future Cellular Vehicular Networks," 2017 IEEE Wireless Communications and Networking Conference (WCNC), San Francisco, CA, USA, 2017, pp. 1-6, doi: 10.1109/WCNC.2017.7925830.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.