Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2022 Jul 7;22(14):5119.
doi: 10.3390/s22145119.

Game Theory-Based Authentication Framework to Secure Internet of Vehicles with Blockchain

Affiliations

Game Theory-Based Authentication Framework to Secure Internet of Vehicles with Blockchain

Manik Gupta et al. Sensors (Basel). .

Abstract

The Internet of Vehicles (IoV) is a new paradigm for vehicular networks. Using diverse access methods, IoV enables vehicles to connect with their surroundings. However, without data security, IoV settings might be hazardous. Because of the IoV's openness and self-organization, they are prone to malevolent attack. To overcome this problem, this paper proposes a revolutionary blockchain-enabled game theory-based authentication mechanism for securing IoVs. Here, a three layer multi-trusted authorization solution is provided in which authentication of vehicles can be performed from initial entry to movement into different trusted authorities' areas without any delay by the use of Physical Unclonable Functions (PUFs) in the beginning and later through duel gaming, and a dynamic Proof-of-Work (dPoW) consensus mechanism. Formal and informal security analyses justify the framework's credibility in more depth with mathematical proofs. A rigorous comparative study demonstrates that the suggested framework achieves greater security and functionality characteristics and provides lower transaction and computation overhead than many of the available solutions so far. However, these solutions never considered the prime concerns of physical cloning and side-channel attacks. However, the framework in this paper is capable of handling them along with all the other security attacks the previous work can handle. Finally, the suggested framework has been subjected to a blockchain implementation to demonstrate its efficacy with duel gaming to achieve authentication in addition to its capability of using lower burdened blockchain at the physical layer, which current blockchain-based authentication models for IoVs do not support.

Keywords: Internet of Vehicles; authentication; blockchain; duel game; game theory; physical unclonable functions; security; stochastic duel game.

PubMed Disclaimer

Conflict of interest statement

The authors declare no conflict of interest.

Figures

Figure 1
Figure 1
Three-layer blockchain-enabled and game theory-based authentication setup for IoVs.
Figure 2
Figure 2
Relational Structure among Network Components.
Figure 3
Figure 3
Branched Blockchain for Layer 1 Nodes.
Figure 4
Figure 4
Layer wise Authentication Mechanisms.
Figure 5
Figure 5
Authentication Using Physical Unclonable Functions.
Figure 6
Figure 6
Success percentage in the attacks with respect to the number of controllers.
Figure 7
Figure 7
Packet flow comparison with baseline based on number of controller nodes.
Figure 8
Figure 8
Energy consumption in baseline model and proposed framework at different instances.
Figure 9
Figure 9
End-to-End Latency Time in the proposed framework for IEEE 802.11a vs. IEEE 802.11p.
Figure 10
Figure 10
Jitter Time in the proposed framework for IEEE 802.11a vs. IEEE 802.11p.
Figure 11
Figure 11
Packet Delivery Ratio in the proposed framework for IEEE 802.11a vs. IEEE 802.11p.
Figure 12
Figure 12
Packet Error Rate in the proposed framework for IEEE 802.11a vs. IEEE 802.11p.
Figure 13
Figure 13
Computation Overhead Relative Comparison.
Figure 14
Figure 14
Transaction Overhead Relative Comparison.

Similar articles

Cited by

References

    1. Liang W., Long J., Weng T.H., Chen X., Li K.C., Zomaya A.Y. TBRS: A trust based recommendation scheme for vehicular CPS network. Future Gener. Comput. Syst. 2019;92:383–398. doi: 10.1016/j.future.2018.09.002. - DOI
    1. Kenney J.B. Dedicated short-range communications (DSRC) standards in the United States. Proc. IEEE. 2011;99:1162–1182. doi: 10.1109/JPROC.2011.2132790. - DOI
    1. Dhaou I.B., Tenhunen H. A High-Throughput Architecture for the SHA-256/224 Compliant with the DSRC Standard. Int. J. Embed. Real-Time Commun. Syst. 2019;10:98–118. doi: 10.4018/IJERTCS.2019010106. - DOI
    1. Zhou H., Xu W., Chen J., Wang W. Evolutionary V2X technologies toward the Internet of vehicles: Challenges and opportunities. Proc. IEEE. 2020;108:308–323. doi: 10.1109/JPROC.2019.2961937. - DOI
    1. Alouache L., Nguyen N., Aliouat M., Chelouah R. Survey on IoV routing protocols: Security and network architecture. Int. J. Commun. Syst. 2019;32:e3849. doi: 10.1002/dac.3849. - DOI

Grants and funding

This research received no external funding.

LinkOut - more resources