4.6 Article

Game Theory-Based Authentication Framework to Secure Internet of Vehicles with Blockchain

期刊

SENSORS
卷 22, 期 14, 页码 -

出版社

MDPI
DOI: 10.3390/s22145119

关键词

Internet of Vehicles; security; authentication; game theory; physical unclonable functions; duel game; stochastic duel game; blockchain

向作者/读者索取更多资源

This paper proposes a blockchain-enabled game theory-based authentication mechanism for securing the Internet of Vehicles (IoV). It provides a three-layer multi-trusted authorization solution using Physical Unclonable Functions (PUFs) and duel gaming, thereby achieving greater security and functionality characteristics with lower transaction and computation overhead compared to existing solutions. The framework can handle physical cloning and side-channel attacks, and supports authentication using lower burdened blockchain at the physical layer, unlike current blockchain-based authentication models for IoVs.
The Internet of Vehicles (IoV) is a new paradigm for vehicular networks. Using diverse access methods, IoV enables vehicles to connect with their surroundings. However, without data security, IoV settings might be hazardous. Because of the IoV's openness and self-organization, they are prone to malevolent attack. To overcome this problem, this paper proposes a revolutionary blockchain-enabled game theory-based authentication mechanism for securing IoVs. Here, a three layer multi-trusted authorization solution is provided in which authentication of vehicles can be performed from initial entry to movement into different trusted authorities' areas without any delay by the use of Physical Unclonable Functions (PUFs) in the beginning and later through duel gaming, and a dynamic Proof-of-Work (dPoW) consensus mechanism. Formal and informal security analyses justify the framework's credibility in more depth with mathematical proofs. A rigorous comparative study demonstrates that the suggested framework achieves greater security and functionality characteristics and provides lower transaction and computation overhead than many of the available solutions so far. However, these solutions never considered the prime concerns of physical cloning and side-channel attacks. However, the framework in this paper is capable of handling them along with all the other security attacks the previous work can handle. Finally, the suggested framework has been subjected to a blockchain implementation to demonstrate its efficacy with duel gaming to achieve authentication in addition to its capability of using lower burdened blockchain at the physical layer, which current blockchain-based authentication models for IoVs do not support.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据