Verification of an Evolving Security Scheme in the Internet of Vehicles
The security scheme of the Internet of Vehicles (IoV) protects the vehicles from network attacks. However, during the experimental deployment of the IoV, people usually pay attention to its function and performance, and only develop a security scheme empirically when security defects are found. When...
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2023-10-01
|
Series: | Electronics |
Subjects: | |
Online Access: | https://www.mdpi.com/2079-9292/12/21/4438 |
_version_ | 1797632023552065536 |
---|---|
author | Weiyang Xin Hanning Zhang Chunxiang Xu Jiangyuan Yao Deshun Li Ting Jin |
author_facet | Weiyang Xin Hanning Zhang Chunxiang Xu Jiangyuan Yao Deshun Li Ting Jin |
author_sort | Weiyang Xin |
collection | DOAJ |
description | The security scheme of the Internet of Vehicles (IoV) protects the vehicles from network attacks. However, during the experimental deployment of the IoV, people usually pay attention to its function and performance, and only develop a security scheme empirically when security defects are found. When a security scheme becomes very complex, it is very difficult to find the security vulnerability and to modify it. In view of this, we propose a verification method to verify the security of an evolving security scheme. This method uses formal methods to verify the evolving security scheme, actively finds the security problems of the security scheme, and promotes the evolution of the security scheme accordingly. This method is applied to the scenario of the IoV and its security scheme—the method evolves the Internet of Vehicles configuration and the security properties, establishes a corresponding formal model, and then iteratively verifies this using a formal method. The approach can fully simulate the evolution process of a security scheme in the IoV during deployment, and can effectively find the corresponding security vulnerabilities, to promote the evolving security scheme in the IoV, which supports the feasibility and usability of the method. |
first_indexed | 2024-03-11T11:32:01Z |
format | Article |
id | doaj.art-bfef0e4c1e1b4e7aa1c3045d96b8a32f |
institution | Directory Open Access Journal |
issn | 2079-9292 |
language | English |
last_indexed | 2024-03-11T11:32:01Z |
publishDate | 2023-10-01 |
publisher | MDPI AG |
record_format | Article |
series | Electronics |
spelling | doaj.art-bfef0e4c1e1b4e7aa1c3045d96b8a32f2023-11-10T15:01:26ZengMDPI AGElectronics2079-92922023-10-011221443810.3390/electronics12214438Verification of an Evolving Security Scheme in the Internet of VehiclesWeiyang Xin0Hanning Zhang1Chunxiang Xu2Jiangyuan Yao3Deshun Li4Ting Jin5School of Computer Science and Technology, Hainan University, Haikou 570228, ChinaChina Unicom (Hainan) Innovation Research Institute, Hainan Branch, China Unicom, Haikou 570100, ChinaSchool of Computer Science and Technology, Hainan University, Haikou 570228, ChinaSchool of Computer Science and Technology, Hainan University, Haikou 570228, ChinaSchool of Computer Science and Technology, Hainan University, Haikou 570228, ChinaSchool of Computer Science and Technology, Hainan University, Haikou 570228, ChinaThe security scheme of the Internet of Vehicles (IoV) protects the vehicles from network attacks. However, during the experimental deployment of the IoV, people usually pay attention to its function and performance, and only develop a security scheme empirically when security defects are found. When a security scheme becomes very complex, it is very difficult to find the security vulnerability and to modify it. In view of this, we propose a verification method to verify the security of an evolving security scheme. This method uses formal methods to verify the evolving security scheme, actively finds the security problems of the security scheme, and promotes the evolution of the security scheme accordingly. This method is applied to the scenario of the IoV and its security scheme—the method evolves the Internet of Vehicles configuration and the security properties, establishes a corresponding formal model, and then iteratively verifies this using a formal method. The approach can fully simulate the evolution process of a security scheme in the IoV during deployment, and can effectively find the corresponding security vulnerabilities, to promote the evolving security scheme in the IoV, which supports the feasibility and usability of the method.https://www.mdpi.com/2079-9292/12/21/4438Internet of Vehiclesevolving security schemesecurity property |
spellingShingle | Weiyang Xin Hanning Zhang Chunxiang Xu Jiangyuan Yao Deshun Li Ting Jin Verification of an Evolving Security Scheme in the Internet of Vehicles Electronics Internet of Vehicles evolving security scheme security property |
title | Verification of an Evolving Security Scheme in the Internet of Vehicles |
title_full | Verification of an Evolving Security Scheme in the Internet of Vehicles |
title_fullStr | Verification of an Evolving Security Scheme in the Internet of Vehicles |
title_full_unstemmed | Verification of an Evolving Security Scheme in the Internet of Vehicles |
title_short | Verification of an Evolving Security Scheme in the Internet of Vehicles |
title_sort | verification of an evolving security scheme in the internet of vehicles |
topic | Internet of Vehicles evolving security scheme security property |
url | https://www.mdpi.com/2079-9292/12/21/4438 |
work_keys_str_mv | AT weiyangxin verificationofanevolvingsecurityschemeintheinternetofvehicles AT hanningzhang verificationofanevolvingsecurityschemeintheinternetofvehicles AT chunxiangxu verificationofanevolvingsecurityschemeintheinternetofvehicles AT jiangyuanyao verificationofanevolvingsecurityschemeintheinternetofvehicles AT deshunli verificationofanevolvingsecurityschemeintheinternetofvehicles AT tingjin verificationofanevolvingsecurityschemeintheinternetofvehicles |