Ajou University repository

Three Byte-Based Mutual Authentication Scheme for Autonomous Internet of Vehicles
  • Adil, Muhammad ;
  • Ali, Jehad ;
  • Attique, Muhammad ;
  • Jadoon, Muhammad Mohsin ;
  • Abbas, Safia ;
  • Alotaibi, Sattam Rabia ;
  • Menon, Varun G. ;
  • Farouk, Ahmed
Citations

SCOPUS

27

Citation Export

Publication Year
2022-07-01
Publisher
Institute of Electrical and Electronics Engineers Inc.
Citation
IEEE Transactions on Intelligent Transportation Systems, Vol.23, pp.9358-9369
Keyword
Autonomous Internet of Vehiclesdevice-to-device authenticationrouting protocolssecurity and data preservation
Mesh Keyword
Autonomous internet of vehicleData preservationsDevice authenticationsDevice-to-device authentication.Media access control addressRegisterRouting-protocolSecuritySecurity and data preservationVehicular Adhoc Networks (VANETs)
All Science Classification Codes (ASJC)
Automotive EngineeringMechanical EngineeringComputer Science Applications
Abstract
In this paper, we present a three-byte-based Media Access Control (MAC) protocol to resolve the mutual authentication problem in an Autonomous Internet of Vehicles (AIoV) network. Initially, the network architecture is divided into two chains, i.e. the local and public chain, wherein the local chain the authentication and communication process is controlled by Cluster head (CH), while in the public chain it is controlled by the base station (BS). The proposed paradigm uses the 48-bit MAC address of the vehicle's embedded sensors for authentication, with the ability to alter the authentication parameters by triggering the last three bytes (24 bits) of the MAC address with a predetermined time interval. Persistent triggering of the last three bytes of an AIoV's MAC address guarantees its integrity in the network because only legal vehicles are capable of initiating and validating the authentication request with the other vehicles in the network. Initially, the MAC addresses of all AIoVs are registered with the BS in the public chain through the concerned CH. Likewise, the MAC-address triggering of registered AIoVs is carried out in the BS with a defined time period and broadcasted in the public chain, which is further distributed through CHs in the local chain. Most of the computation is supervised by BS and CH in the public and local chains respectively, which minimize the client-side authentication complexity and enhances network efficiency in terms of authentication with 98.3% detection rate, communications, and computing costs, along with 11% improvement in the latency, 15% improvement in packet loss ratio (PLR), and throughput.
Language
eng
URI
https://dspace.ajou.ac.kr/dev/handle/2018.oak/32360
DOI
https://doi.org/10.1109/tits.2021.3114507
Fulltext

Type
Article
Show full item record

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

ALI JEHAD Image
ALI JEHADJEHAD, ALI
Department of Software and Computer Engineering
Read More

Total Views & Downloads

File Download

  • There are no files associated with this item.