A Secure Message Authentication Method in the Internet of Vehicles Using Cloud-Edge-Client Architecture
Yuan Zhang,
Zihan Zhou (),
Chang Jiang,
Wei Huang,
Yifei Zheng,
Tianli Tang and
Khadka Anish
Additional contact information
Yuan Zhang: Network and Information Center, Southeast University, Nanjing 211189, China
Zihan Zhou: School of Cyber Science and Engineering, Southeast University, Nanjing 211189, China
Chang Jiang: School of Cyber Science and Engineering, Southeast University, Nanjing 211189, China
Wei Huang: School of Cyber Science and Engineering, Southeast University, Nanjing 211189, China
Yifei Zheng: School of Cyber Science and Engineering, Southeast University, Nanjing 211189, China
Tianli Tang: School of Civil and Transportation Engineering, Guangdong University of Technology, Guangzhou 510006, China
Khadka Anish: Department of Civil & Environmental Engineering, University of Auckland, Auckland 1142, New Zealand
Mathematics, 2025, vol. 13, issue 21, 1-26
Abstract:
With the rapid deployment of intelligent transportation systems (ITS), the Internet of Vehicles (IoV) has become an increasingly vital component in the development of smart cities. However, the openness of IoV also gives rise to critical issues such as message security and identity privacy. Consequently, addressing message authentication in the IoV environment is a fundamental requirement for ensuring its sustainable and stable evolution. Firstly, this paper proposes an adaptive traffic authentication strategy (ATAS) By integrating traffic flow dynamics evaluation, traffic status scoring, time sensitivity assessment, and comprehensive strategy decision-making, the scheme achieves an effective balance between authentication efficiency and security in IoV scenarios. Secondly, to tackle the high overhead and security issues caused by multiple message transmissions in large-scale IoV application scenarios, this paper proposes a secure message transmission and authentication method based on the cloud-edge-client collaborative architecture. Leveraging aggregate message authentication code (AMAC) technology, this method validates both the authenticity and integrity of messages, effectively reducing communication overhead while maintaining reliable authenticated transmission. Finally, this paper builds an IoV co-simulation experimental environment using the SUMO 1.19.0, OMNeT++ 6.0.3, and Veins 5.0.0 software platforms. It simulates the interactive authentication process among vehicles, Road Side Units (RSUs), and the cloud platform, as well as the effects of traffic response strategies under different scenarios. The results demonstrate the potential of IoV authentication technology in improving traffic management efficiency, optimizing road resource utilization, and enhancing traffic safety, providing strong support for the secure communication and efficient management of IoV.
Keywords: internet of vehicles; message security; message authentication; cloud-edge-client collaboration; internet of vehicles simulation (search for similar items in EconPapers)
JEL-codes: C (search for similar items in EconPapers)
Date: 2025
References: Add references at CitEc
Citations:
Downloads: (external link)
https://www.mdpi.com/2227-7390/13/21/3446/pdf (application/pdf)
https://www.mdpi.com/2227-7390/13/21/3446/ (text/html)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:gam:jmathe:v:13:y:2025:i:21:p:3446-:d:1782130
Access Statistics for this article
Mathematics is currently edited by Ms. Emma He
More articles in Mathematics from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().