Research and implementation of safety authentication technology in Internet of vehicles
Nowadays, safety certification technology for Internet of vehicles (IoV) cannot well defend the various attacks, and there are also many shortcomings when considering the balance between safety and performance.Based on the in-depth analysis of the research status and security threats for IoV, a hier...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
China InfoCom Media Group
2021-09-01
|
Series: | 物联网学报 |
Subjects: | |
Online Access: | http://www.wlwxb.com.cn/zh/article/doi/10.11959/j.issn.2096-3750.2021.00212/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841531158407413760 |
---|---|
author | Manzhu WANG Ziqi LI Yifei CHEN Gaofeng HONG Wei SU |
author_facet | Manzhu WANG Ziqi LI Yifei CHEN Gaofeng HONG Wei SU |
author_sort | Manzhu WANG |
collection | DOAJ |
description | Nowadays, safety certification technology for Internet of vehicles (IoV) cannot well defend the various attacks, and there are also many shortcomings when considering the balance between safety and performance.Based on the in-depth analysis of the research status and security threats for IoV, a hierarchical vehicle-to-vehicle (V2V) safety authentication scheme was proposed.Furthermore, an L-type safety authentication scheme which based on more than one trusted third parties was proposed.Aimed at ensuring the information safety of the communication process and preventing the communication data from being stolen, the schemes were more suitable to IoV. |
format | Article |
id | doaj-art-48de43532a6042c68ad67005fc177f4a |
institution | Kabale University |
issn | 2096-3750 |
language | zho |
publishDate | 2021-09-01 |
publisher | China InfoCom Media Group |
record_format | Article |
series | 物联网学报 |
spelling | doaj-art-48de43532a6042c68ad67005fc177f4a2025-01-15T02:53:20ZzhoChina InfoCom Media Group物联网学报2096-37502021-09-01510611459648284Research and implementation of safety authentication technology in Internet of vehiclesManzhu WANGZiqi LIYifei CHENGaofeng HONGWei SUNowadays, safety certification technology for Internet of vehicles (IoV) cannot well defend the various attacks, and there are also many shortcomings when considering the balance between safety and performance.Based on the in-depth analysis of the research status and security threats for IoV, a hierarchical vehicle-to-vehicle (V2V) safety authentication scheme was proposed.Furthermore, an L-type safety authentication scheme which based on more than one trusted third parties was proposed.Aimed at ensuring the information safety of the communication process and preventing the communication data from being stolen, the schemes were more suitable to IoV.http://www.wlwxb.com.cn/zh/article/doi/10.11959/j.issn.2096-3750.2021.00212/IoVsecurity certificationV2V safety authentication schemeL-type safety authentication scheme |
spellingShingle | Manzhu WANG Ziqi LI Yifei CHEN Gaofeng HONG Wei SU Research and implementation of safety authentication technology in Internet of vehicles 物联网学报 IoV security certification V2V safety authentication scheme L-type safety authentication scheme |
title | Research and implementation of safety authentication technology in Internet of vehicles |
title_full | Research and implementation of safety authentication technology in Internet of vehicles |
title_fullStr | Research and implementation of safety authentication technology in Internet of vehicles |
title_full_unstemmed | Research and implementation of safety authentication technology in Internet of vehicles |
title_short | Research and implementation of safety authentication technology in Internet of vehicles |
title_sort | research and implementation of safety authentication technology in internet of vehicles |
topic | IoV security certification V2V safety authentication scheme L-type safety authentication scheme |
url | http://www.wlwxb.com.cn/zh/article/doi/10.11959/j.issn.2096-3750.2021.00212/ |
work_keys_str_mv | AT manzhuwang researchandimplementationofsafetyauthenticationtechnologyininternetofvehicles AT ziqili researchandimplementationofsafetyauthenticationtechnologyininternetofvehicles AT yifeichen researchandimplementationofsafetyauthenticationtechnologyininternetofvehicles AT gaofenghong researchandimplementationofsafetyauthenticationtechnologyininternetofvehicles AT weisu researchandimplementationofsafetyauthenticationtechnologyininternetofvehicles |