期刊论文详细信息
Sensors
A Blockchain-Based Multi-Factor Authentication Model for a Cloud-Enabled Internet of Vehicles
Richard A. Ikuesan1  Mohammad Dahman Alshehri2  Victor R. Kebande3  Sadi A. Alawadi4  Feras M. Awaysheh5 
[1] Cyber and Network Security Department, Community College Qatar, Doha 00974, Qatar;Department of Computer Science, College of Computers and Information Technology, Taif University, P.O. Box 11099, Taif 21944, Saudi Arabia;Department of Computer Science, Electrical & Space Engineering, Luleå University of Technology, 97187 Luleå, Sweden;Department of Information Technology, Uppsala University, 75236 Uppsala, Sweden;Institute of Computer Science, Data Systems Research Group, Tartu University, 51009 Tartu, Estonia;
关键词: blockchain;    multi-factor authentication;    access control;    Internet of Vehicles;    cloud-enabled systems;   
DOI  :  10.3390/s21186018
来源: DOAJ
【 摘 要 】

Continuous and emerging advances in Information and Communication Technology (ICT) have enabled Internet-of-Things (IoT)-to-Cloud applications to be induced by data pipelines and Edge Intelligence-based architectures. Advanced vehicular networks greatly benefit from these architectures due to the implicit functionalities that are focused on realizing the Internet of Vehicle (IoV) vision. However, IoV is susceptible to attacks, where adversaries can easily exploit existing vulnerabilities. Several attacks may succeed due to inadequate or ineffective authentication techniques. Hence, there is a timely need for hardening the authentication process through cutting-edge access control mechanisms. This paper proposes a Blockchain-based Multi-Factor authentication model that uses an embedded Digital Signature (MFBC_eDS) for vehicular clouds and Cloud-enabled IoV. Our proposed MFBC_eDS model consists of a scheme that integrates the Security Assertion Mark-up Language (SAML) to the Single Sign-On (SSO) capabilities for a connected edge to cloud ecosystem. MFBC_eDS draws an essential comparison with the baseline authentication scheme suggested by Karla and Sood. Based on the foundations of Karla and Sood’s scheme, an embedded Probabilistic Polynomial-Time Algorithm (ePPTA) and an additional Hash function for the Pi generated during Karla and Sood’s authentication were proposed and discussed. The preliminary analysis of the proposition shows that the approach is more suitable to counter major adversarial attacks in an IoV-centered environment based on the Dolev–Yao adversarial model while satisfying aspects of the Confidentiality, Integrity, and Availability (CIA) triad.

【 授权许可】

Unknown   

  文献评价指标  
  下载次数:0次 浏览次数:0次