Verification of an Evolving Security Scheme in the Internet of Vehicles

The security scheme of the Internet of Vehicles (IoV) protects the vehicles from network attacks. However, during the experimental deployment of the IoV, people usually pay attention to its function and performance, and only develop a security scheme empirically when security defects are found. When...

Full description

Bibliographic Details
Main Authors: Weiyang Xin, Hanning Zhang, Chunxiang Xu, Jiangyuan Yao, Deshun Li, Ting Jin
Format: Article
Language:English
Published: MDPI AG 2023-10-01
Series:Electronics
Subjects:
Online Access:https://www.mdpi.com/2079-9292/12/21/4438
_version_ 1797632023552065536
author Weiyang Xin
Hanning Zhang
Chunxiang Xu
Jiangyuan Yao
Deshun Li
Ting Jin
author_facet Weiyang Xin
Hanning Zhang
Chunxiang Xu
Jiangyuan Yao
Deshun Li
Ting Jin
author_sort Weiyang Xin
collection DOAJ
description The security scheme of the Internet of Vehicles (IoV) protects the vehicles from network attacks. However, during the experimental deployment of the IoV, people usually pay attention to its function and performance, and only develop a security scheme empirically when security defects are found. When a security scheme becomes very complex, it is very difficult to find the security vulnerability and to modify it. In view of this, we propose a verification method to verify the security of an evolving security scheme. This method uses formal methods to verify the evolving security scheme, actively finds the security problems of the security scheme, and promotes the evolution of the security scheme accordingly. This method is applied to the scenario of the IoV and its security scheme—the method evolves the Internet of Vehicles configuration and the security properties, establishes a corresponding formal model, and then iteratively verifies this using a formal method. The approach can fully simulate the evolution process of a security scheme in the IoV during deployment, and can effectively find the corresponding security vulnerabilities, to promote the evolving security scheme in the IoV, which supports the feasibility and usability of the method.
first_indexed 2024-03-11T11:32:01Z
format Article
id doaj.art-bfef0e4c1e1b4e7aa1c3045d96b8a32f
institution Directory Open Access Journal
issn 2079-9292
language English
last_indexed 2024-03-11T11:32:01Z
publishDate 2023-10-01
publisher MDPI AG
record_format Article
series Electronics
spelling doaj.art-bfef0e4c1e1b4e7aa1c3045d96b8a32f2023-11-10T15:01:26ZengMDPI AGElectronics2079-92922023-10-011221443810.3390/electronics12214438Verification of an Evolving Security Scheme in the Internet of VehiclesWeiyang Xin0Hanning Zhang1Chunxiang Xu2Jiangyuan Yao3Deshun Li4Ting Jin5School of Computer Science and Technology, Hainan University, Haikou 570228, ChinaChina Unicom (Hainan) Innovation Research Institute, Hainan Branch, China Unicom, Haikou 570100, ChinaSchool of Computer Science and Technology, Hainan University, Haikou 570228, ChinaSchool of Computer Science and Technology, Hainan University, Haikou 570228, ChinaSchool of Computer Science and Technology, Hainan University, Haikou 570228, ChinaSchool of Computer Science and Technology, Hainan University, Haikou 570228, ChinaThe security scheme of the Internet of Vehicles (IoV) protects the vehicles from network attacks. However, during the experimental deployment of the IoV, people usually pay attention to its function and performance, and only develop a security scheme empirically when security defects are found. When a security scheme becomes very complex, it is very difficult to find the security vulnerability and to modify it. In view of this, we propose a verification method to verify the security of an evolving security scheme. This method uses formal methods to verify the evolving security scheme, actively finds the security problems of the security scheme, and promotes the evolution of the security scheme accordingly. This method is applied to the scenario of the IoV and its security scheme—the method evolves the Internet of Vehicles configuration and the security properties, establishes a corresponding formal model, and then iteratively verifies this using a formal method. The approach can fully simulate the evolution process of a security scheme in the IoV during deployment, and can effectively find the corresponding security vulnerabilities, to promote the evolving security scheme in the IoV, which supports the feasibility and usability of the method.https://www.mdpi.com/2079-9292/12/21/4438Internet of Vehiclesevolving security schemesecurity property
spellingShingle Weiyang Xin
Hanning Zhang
Chunxiang Xu
Jiangyuan Yao
Deshun Li
Ting Jin
Verification of an Evolving Security Scheme in the Internet of Vehicles
Electronics
Internet of Vehicles
evolving security scheme
security property
title Verification of an Evolving Security Scheme in the Internet of Vehicles
title_full Verification of an Evolving Security Scheme in the Internet of Vehicles
title_fullStr Verification of an Evolving Security Scheme in the Internet of Vehicles
title_full_unstemmed Verification of an Evolving Security Scheme in the Internet of Vehicles
title_short Verification of an Evolving Security Scheme in the Internet of Vehicles
title_sort verification of an evolving security scheme in the internet of vehicles
topic Internet of Vehicles
evolving security scheme
security property
url https://www.mdpi.com/2079-9292/12/21/4438
work_keys_str_mv AT weiyangxin verificationofanevolvingsecurityschemeintheinternetofvehicles
AT hanningzhang verificationofanevolvingsecurityschemeintheinternetofvehicles
AT chunxiangxu verificationofanevolvingsecurityschemeintheinternetofvehicles
AT jiangyuanyao verificationofanevolvingsecurityschemeintheinternetofvehicles
AT deshunli verificationofanevolvingsecurityschemeintheinternetofvehicles
AT tingjin verificationofanevolvingsecurityschemeintheinternetofvehicles