Visible to the public A New Zero-Trust Aided Smart Key Authentication Scheme in IoV

TitleA New Zero-Trust Aided Smart Key Authentication Scheme in IoV
Publication TypeConference Paper
Year of Publication2022
AuthorsSong, Yangxu, Jiang, Frank, Ali Shah, Syed Wajid, Doss, Robin
Conference Name2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops)
Date Publishedmar
Keywordsauthentication, Buildings, cloud computing, Conferences, Continuous Authentication, human factors, Internet of Vehicle (IoV), Metrics, Pervasive computing, Pervasive Computing Security, Protocols, Prototypes, pubcrawl, resilience, Resiliency, Scalability, Smart car key
AbstractWith the development of 5G networking technology on the Internet of Vehicle (IoV), there are new opportunities for numerous cyber-attacks, such as in-vehicle attacks like hijacking occurrences and data theft. While numerous attempts have been made to protect against the potential attacks, there are still many unsolved problems such as developing a fine-grained access control system. This is reflected by the granularity of security as well as the related data that are hosted on these platforms. Among the most notable trends is the increased usage of smart devices, IoV, cloud services, emerging technologies aim at accessing, storing and processing data. Most popular authentication protocols rely on knowledge-factor for authentication that is infamously known to be vulnerable to subversions. Recently, the zero-trust framework has drawn huge attention; there is an urgent need to develop further the existing Continuous Authentication (CA) technique to achieve the zero-trustiness framework. In this paper, firstly, we develop the static authentication process and propose a secured protocol to generate the smart key for user to unlock the vehicle. Then, we proposed a novel and secure continuous authentication system for IoVs. We present the proof-of-concept of our CA scheme by building a prototype that leverages the commodity fingerprint sensors, NFC, and smartphone. Our evaluations in real-world settings demonstrate the appropriateness of CA scheme and security analysis of our proposed protocol for digital key suggests its enhanced security against the known attack-vector.
DOI10.1109/PerComWorkshops53856.2022.9767534
Citation Keysong_new_2022