Three Byte-Based Mutual Authentication Scheme for Autonomous Internet of Vehicles

被引:30
|
作者
Adil, Muhammad [1 ]
Ali, Jehad [2 ,3 ]
Attique, Muhammad [4 ]
Jadoon, Muhammad Mohsin [5 ,6 ]
Abbas, Safia [7 ,8 ]
Alotaibi, Sattam Rabia [9 ]
Menon, Varun G. [10 ]
Farouk, Ahmed [11 ]
机构
[1] Virtual Univ Pakistan, Dept Comp Sci, Lahore 54000, Pakistan
[2] Ajou Univ, Dept Comp Engn, Suwon 16499, South Korea
[3] Ajou Univ, Dept AI Convergence Network, Suwon 16499, South Korea
[4] Sejong Univ, Dept Software, Seoul 05006, South Korea
[5] Yale Univ, Dept Radiol & Imaging, New Haven, CT 06520 USA
[6] Int Islamic Univ Islamabad, Dept Elect Engn, Islamabad 44000, Pakistan
[7] Princess Nourah Bint Abdulrahman Univ, Dept Comp Sci, Coll Comp & Informat Sci, Riyadh 11564, Saudi Arabia
[8] Ain Shams Univ, Dept Comp Sci, Coll Comp & Informat Sci, Cairo 11566, Egypt
[9] Taif Univ, Coll Engn, Taif 21974, Saudi Arabia
[10] SCMS Sch Engn & Technol, Dept Comp Sci & Engn, Ernakulam 683576, India
[11] South Valley Univ, Fac Comp & Informat, Dept Comp Sci, Qena 83523, Egypt
关键词
Autonomous Internet of Vehicles; security and data preservation; routing protocols; device-to-device authentication; INDUSTRIAL INTERNET;
D O I
10.1109/TITS.2021.3114507
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
In this paper, we present a three-byte-based Media Access Control (MAC) protocol to resolve the mutual authentication problem in an Autonomous Internet of Vehicles (AIoV) network. Initially, the network architecture is divided into two chains, i.e. the local and public chain, wherein the local chain the authentication and communication process is controlled by Cluster head (CH), while in the public chain it is controlled by the base station (BS). The proposed paradigm uses the 48-bit MAC address of the vehicle's embedded sensors for authentication, with the ability to alter the authentication parameters by triggering the last three bytes (24 bits) of the MAC address with a predetermined time interval. Persistent triggering of the last three bytes of an AIoV's MAC address guarantees its integrity in the network because only legal vehicles are capable of initiating and validating the authentication request with the other vehicles in the network. Initially, the MAC addresses of all AIoVs are registered with the BS in the public chain through the concerned CH. Likewise, the MAC-address triggering of registered AIoVs is carried out in the BS with a defined time period and broadcasted in the public chain, which is further distributed through CHs in the local chain. Most of the computation is supervised by BS and CH in the public and local chains respectively, which minimize the client-side authentication complexity and enhances network efficiency in terms of authentication with 983% detection rate, communications, and computing costs, along with 11% improvement in the latency, 15% improvement in packet lass ratio (PLR), and throughput.
引用
收藏
页码:9358 / 9369
页数:12
相关论文
共 50 条
  • [1] Authentication scheme for Unmanned Aerial Vehicles based Internet of Vehicles networks
    Qureshi, Kashif Naseer
    Sandila, Muhammad Arslan Saleem
    Javed, Ibrahim Tariq
    Margaria, Tiziana
    Aslam, Laeeq
    EGYPTIAN INFORMATICS JOURNAL, 2022, 23 (01) : 83 - 93
  • [2] A payload-based mutual authentication scheme for Internet of Things
    Jan, Mian Ahmad
    Khan, Fazlullah
    Alam, Muhammad
    Usman, Muhammad
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 92 : 1028 - 1039
  • [3] A Lightweight Mutual Authentication Protocol for Internet of Vehicles
    Tabany, Myasar
    Syed, Mohiuddin
    JOURNAL OF ADVANCES IN INFORMATION TECHNOLOGY, 2024, 15 (02) : 155 - 163
  • [4] Mutual Authentication Protocols Based on PUF and Multitrusted Authority for Internet of Vehicles
    Yang, Yuting
    Tan, Weijie
    Li, Zhen
    Chen, Yuling
    Li, Chunguo
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (24): : 40086 - 40099
  • [5] An Efficient Mutual Authentication Scheme for Internet of Things
    Mbarek, Bacem
    Ge, Mouzhi
    Pitner, Tomas
    INTERNET OF THINGS, 2020, 9
  • [6] An Improved Authentication Scheme for Internet of Vehicles Based on Blockchain Technology
    Wang, Xiaoliang
    Zeng, Pengjie
    Patterson, Nick
    Jiang, Frank
    Doss, Robin
    IEEE ACCESS, 2019, 7 : 45061 - 45072
  • [7] Blockchain-Based Batch Authentication Scheme for Internet of Vehicles
    Shen, Huimin
    Wang, Taochun
    Chen, Jian
    Tao, Yuan
    Chen, Fulong
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2024, 73 (06) : 7866 - 7879
  • [8] Lightweight Mutual Authentication Scheme Based on Blockchain for Internet of Medical Things
    Qiu, Shi
    Li, Jinqing
    Di, Xiaoqiang
    Li, Xusheng
    Wu, Yunlong
    Ibrahim, Makram
    IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (07): : 8848 - 8861
  • [9] An Efficient Anonymous Authentication Scheme for Internet of Vehicles
    Liu, Jingwei
    Li, Qingqing
    Sun, Rong
    Du, Xiaojiang
    Guizani, Mohsen
    2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2018,
  • [10] Certificateless Anonymous Authentication Scheme for Internet of Vehicles
    LIU Xueyan
    WANG Li
    HUAN Lijuan
    DU Xiaoni
    NIU Shufen
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2022, 44 (01) : 295 - 304