Attribute and User Trust Score-Based Zero Trust Access Control Model in IoV

The Internet of Vehicles (IoV) is an innovative area of interest in modern mobility that is rapidly evolving while facing complex challenges. Traditional IoV networks are susceptible to intrusion threats, which can lead to data leakage and seizure of vehicle control by attackers, thereby endangering...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Electronics (Basel) 2023-12, Vol.12 (23), p.4825
Hauptverfasser: Wang, Jiuru, Wang, Zhiyuan, Song, Jingcheng, Cheng, Hongyuan
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue 23
container_start_page 4825
container_title Electronics (Basel)
container_volume 12
creator Wang, Jiuru
Wang, Zhiyuan
Song, Jingcheng
Cheng, Hongyuan
description The Internet of Vehicles (IoV) is an innovative area of interest in modern mobility that is rapidly evolving while facing complex challenges. Traditional IoV networks are susceptible to intrusion threats, which can lead to data leakage and seizure of vehicle control by attackers, thereby endangering vehicle users’ privacy and personal safety. An Attribute and User Trust Score-based Zero Trust Access Control Model (AU-ZTAC) is proposed, combining the zero-trust and attribute-based access control models to meet network protection requirements while achieving fine-grained dynamic access control and incorporating trust evaluation in the access control process to better reflect users’ intent. Experimental results demonstrate the effectiveness and feasibility of trust assessment through the proposed model. A comparison with the classical schemes illustrates that AU-ZTAC allows for more flexible and fine-grained access control in complex access control environments while improving IoV security.
doi_str_mv 10.3390/electronics12234825
format Article
fullrecord <record><control><sourceid>gale_proqu</sourceid><recordid>TN_cdi_proquest_journals_2899398321</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><galeid>A775889311</galeid><sourcerecordid>A775889311</sourcerecordid><originalsourceid>FETCH-LOGICAL-c311t-82bbd64679265b13e1c04c93fe7af1c688d75df44f47f7dd37210a600d000a6c3</originalsourceid><addsrcrecordid>eNptUD1PwzAQtRBIVKW_gMUSc4o_ktgeS8VHRREDLQNL5NhnlCqNi-0M_HuM2oGBu-FOT-_dPT2ErimZc67ILfRgUvBDZyJljJeSVWdowohQhWKKnf_ZL9Esxh3JpSiXnEzQ8yKl0LVjAqwHi7cRAt6EMSb8ZnyA4k5HsPgDgj_BC2MgRrz0Q_7Z4xdvocfdgFf-_QpdON1HmJ3mFG0f7jfLp2L9-rhaLtaF4ZSmQrK2tXVZC8XqqqUcqCGlUdyB0I6aWkorKuvK0pXCCWu5YJTomhCbfeva8Cm6Od49BP81QkzNzo9hyC8bJpXiSnJGM2t-ZH3qHppucD4FbXJb2HfGD-C6jC-EqKRU2VgW8KPABB9jANccQrfX4buhpPlNuvknaf4DUtxyjA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2899398321</pqid></control><display><type>article</type><title>Attribute and User Trust Score-Based Zero Trust Access Control Model in IoV</title><source>MDPI - Multidisciplinary Digital Publishing Institute</source><source>EZB-FREE-00999 freely available EZB journals</source><creator>Wang, Jiuru ; Wang, Zhiyuan ; Song, Jingcheng ; Cheng, Hongyuan</creator><creatorcontrib>Wang, Jiuru ; Wang, Zhiyuan ; Song, Jingcheng ; Cheng, Hongyuan</creatorcontrib><description>The Internet of Vehicles (IoV) is an innovative area of interest in modern mobility that is rapidly evolving while facing complex challenges. Traditional IoV networks are susceptible to intrusion threats, which can lead to data leakage and seizure of vehicle control by attackers, thereby endangering vehicle users’ privacy and personal safety. An Attribute and User Trust Score-based Zero Trust Access Control Model (AU-ZTAC) is proposed, combining the zero-trust and attribute-based access control models to meet network protection requirements while achieving fine-grained dynamic access control and incorporating trust evaluation in the access control process to better reflect users’ intent. Experimental results demonstrate the effectiveness and feasibility of trust assessment through the proposed model. A comparison with the classical schemes illustrates that AU-ZTAC allows for more flexible and fine-grained access control in complex access control environments while improving IoV security.</description><identifier>ISSN: 2079-9292</identifier><identifier>EISSN: 2079-9292</identifier><identifier>DOI: 10.3390/electronics12234825</identifier><language>eng</language><publisher>Basel: MDPI AG</publisher><subject>Access control ; Ad hoc networks (Computer networks) ; Autonomous vehicles ; Blockchain ; Communication ; Data integrity ; Data security ; Digital signatures ; Internet of Things ; Internet of Vehicles ; Methods ; Network security ; Roles ; Sensors ; Traffic ; Trustworthiness</subject><ispartof>Electronics (Basel), 2023-12, Vol.12 (23), p.4825</ispartof><rights>COPYRIGHT 2023 MDPI AG</rights><rights>2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c311t-82bbd64679265b13e1c04c93fe7af1c688d75df44f47f7dd37210a600d000a6c3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>Wang, Jiuru</creatorcontrib><creatorcontrib>Wang, Zhiyuan</creatorcontrib><creatorcontrib>Song, Jingcheng</creatorcontrib><creatorcontrib>Cheng, Hongyuan</creatorcontrib><title>Attribute and User Trust Score-Based Zero Trust Access Control Model in IoV</title><title>Electronics (Basel)</title><description>The Internet of Vehicles (IoV) is an innovative area of interest in modern mobility that is rapidly evolving while facing complex challenges. Traditional IoV networks are susceptible to intrusion threats, which can lead to data leakage and seizure of vehicle control by attackers, thereby endangering vehicle users’ privacy and personal safety. An Attribute and User Trust Score-based Zero Trust Access Control Model (AU-ZTAC) is proposed, combining the zero-trust and attribute-based access control models to meet network protection requirements while achieving fine-grained dynamic access control and incorporating trust evaluation in the access control process to better reflect users’ intent. Experimental results demonstrate the effectiveness and feasibility of trust assessment through the proposed model. A comparison with the classical schemes illustrates that AU-ZTAC allows for more flexible and fine-grained access control in complex access control environments while improving IoV security.</description><subject>Access control</subject><subject>Ad hoc networks (Computer networks)</subject><subject>Autonomous vehicles</subject><subject>Blockchain</subject><subject>Communication</subject><subject>Data integrity</subject><subject>Data security</subject><subject>Digital signatures</subject><subject>Internet of Things</subject><subject>Internet of Vehicles</subject><subject>Methods</subject><subject>Network security</subject><subject>Roles</subject><subject>Sensors</subject><subject>Traffic</subject><subject>Trustworthiness</subject><issn>2079-9292</issn><issn>2079-9292</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><recordid>eNptUD1PwzAQtRBIVKW_gMUSc4o_ktgeS8VHRREDLQNL5NhnlCqNi-0M_HuM2oGBu-FOT-_dPT2ErimZc67ILfRgUvBDZyJljJeSVWdowohQhWKKnf_ZL9Esxh3JpSiXnEzQ8yKl0LVjAqwHi7cRAt6EMSb8ZnyA4k5HsPgDgj_BC2MgRrz0Q_7Z4xdvocfdgFf-_QpdON1HmJ3mFG0f7jfLp2L9-rhaLtaF4ZSmQrK2tXVZC8XqqqUcqCGlUdyB0I6aWkorKuvK0pXCCWu5YJTomhCbfeva8Cm6Od49BP81QkzNzo9hyC8bJpXiSnJGM2t-ZH3qHppucD4FbXJb2HfGD-C6jC-EqKRU2VgW8KPABB9jANccQrfX4buhpPlNuvknaf4DUtxyjA</recordid><startdate>20231201</startdate><enddate>20231201</enddate><creator>Wang, Jiuru</creator><creator>Wang, Zhiyuan</creator><creator>Song, Jingcheng</creator><creator>Cheng, Hongyuan</creator><general>MDPI AG</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>HCIFZ</scope><scope>L7M</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope></search><sort><creationdate>20231201</creationdate><title>Attribute and User Trust Score-Based Zero Trust Access Control Model in IoV</title><author>Wang, Jiuru ; Wang, Zhiyuan ; Song, Jingcheng ; Cheng, Hongyuan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c311t-82bbd64679265b13e1c04c93fe7af1c688d75df44f47f7dd37210a600d000a6c3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Access control</topic><topic>Ad hoc networks (Computer networks)</topic><topic>Autonomous vehicles</topic><topic>Blockchain</topic><topic>Communication</topic><topic>Data integrity</topic><topic>Data security</topic><topic>Digital signatures</topic><topic>Internet of Things</topic><topic>Internet of Vehicles</topic><topic>Methods</topic><topic>Network security</topic><topic>Roles</topic><topic>Sensors</topic><topic>Traffic</topic><topic>Trustworthiness</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Wang, Jiuru</creatorcontrib><creatorcontrib>Wang, Zhiyuan</creatorcontrib><creatorcontrib>Song, Jingcheng</creatorcontrib><creatorcontrib>Cheng, Hongyuan</creatorcontrib><collection>CrossRef</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>SciTech Premium Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><jtitle>Electronics (Basel)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Wang, Jiuru</au><au>Wang, Zhiyuan</au><au>Song, Jingcheng</au><au>Cheng, Hongyuan</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Attribute and User Trust Score-Based Zero Trust Access Control Model in IoV</atitle><jtitle>Electronics (Basel)</jtitle><date>2023-12-01</date><risdate>2023</risdate><volume>12</volume><issue>23</issue><spage>4825</spage><pages>4825-</pages><issn>2079-9292</issn><eissn>2079-9292</eissn><abstract>The Internet of Vehicles (IoV) is an innovative area of interest in modern mobility that is rapidly evolving while facing complex challenges. Traditional IoV networks are susceptible to intrusion threats, which can lead to data leakage and seizure of vehicle control by attackers, thereby endangering vehicle users’ privacy and personal safety. An Attribute and User Trust Score-based Zero Trust Access Control Model (AU-ZTAC) is proposed, combining the zero-trust and attribute-based access control models to meet network protection requirements while achieving fine-grained dynamic access control and incorporating trust evaluation in the access control process to better reflect users’ intent. Experimental results demonstrate the effectiveness and feasibility of trust assessment through the proposed model. A comparison with the classical schemes illustrates that AU-ZTAC allows for more flexible and fine-grained access control in complex access control environments while improving IoV security.</abstract><cop>Basel</cop><pub>MDPI AG</pub><doi>10.3390/electronics12234825</doi><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 2079-9292
ispartof Electronics (Basel), 2023-12, Vol.12 (23), p.4825
issn 2079-9292
2079-9292
language eng
recordid cdi_proquest_journals_2899398321
source MDPI - Multidisciplinary Digital Publishing Institute; EZB-FREE-00999 freely available EZB journals
subjects Access control
Ad hoc networks (Computer networks)
Autonomous vehicles
Blockchain
Communication
Data integrity
Data security
Digital signatures
Internet of Things
Internet of Vehicles
Methods
Network security
Roles
Sensors
Traffic
Trustworthiness
title Attribute and User Trust Score-Based Zero Trust Access Control Model in IoV
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-04T06%3A31%3A04IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-gale_proqu&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Attribute%20and%20User%20Trust%20Score-Based%20Zero%20Trust%20Access%20Control%20Model%20in%20IoV&rft.jtitle=Electronics%20(Basel)&rft.au=Wang,%20Jiuru&rft.date=2023-12-01&rft.volume=12&rft.issue=23&rft.spage=4825&rft.pages=4825-&rft.issn=2079-9292&rft.eissn=2079-9292&rft_id=info:doi/10.3390/electronics12234825&rft_dat=%3Cgale_proqu%3EA775889311%3C/gale_proqu%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2899398321&rft_id=info:pmid/&rft_galeid=A775889311&rfr_iscdi=true