Attribute and User Trust Score-Based Zero Trust Access Control Model in IoV
The Internet of Vehicles (IoV) is an innovative area of interest in modern mobility that is rapidly evolving while facing complex challenges. Traditional IoV networks are susceptible to intrusion threats, which can lead to data leakage and seizure of vehicle control by attackers, thereby endangering...
Gespeichert in:
Veröffentlicht in: | Electronics (Basel) 2023-12, Vol.12 (23), p.4825 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | 23 |
container_start_page | 4825 |
container_title | Electronics (Basel) |
container_volume | 12 |
creator | Wang, Jiuru Wang, Zhiyuan Song, Jingcheng Cheng, Hongyuan |
description | The Internet of Vehicles (IoV) is an innovative area of interest in modern mobility that is rapidly evolving while facing complex challenges. Traditional IoV networks are susceptible to intrusion threats, which can lead to data leakage and seizure of vehicle control by attackers, thereby endangering vehicle users’ privacy and personal safety. An Attribute and User Trust Score-based Zero Trust Access Control Model (AU-ZTAC) is proposed, combining the zero-trust and attribute-based access control models to meet network protection requirements while achieving fine-grained dynamic access control and incorporating trust evaluation in the access control process to better reflect users’ intent. Experimental results demonstrate the effectiveness and feasibility of trust assessment through the proposed model. A comparison with the classical schemes illustrates that AU-ZTAC allows for more flexible and fine-grained access control in complex access control environments while improving IoV security. |
doi_str_mv | 10.3390/electronics12234825 |
format | Article |
fullrecord | <record><control><sourceid>gale_proqu</sourceid><recordid>TN_cdi_proquest_journals_2899398321</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><galeid>A775889311</galeid><sourcerecordid>A775889311</sourcerecordid><originalsourceid>FETCH-LOGICAL-c311t-82bbd64679265b13e1c04c93fe7af1c688d75df44f47f7dd37210a600d000a6c3</originalsourceid><addsrcrecordid>eNptUD1PwzAQtRBIVKW_gMUSc4o_ktgeS8VHRREDLQNL5NhnlCqNi-0M_HuM2oGBu-FOT-_dPT2ErimZc67ILfRgUvBDZyJljJeSVWdowohQhWKKnf_ZL9Esxh3JpSiXnEzQ8yKl0LVjAqwHi7cRAt6EMSb8ZnyA4k5HsPgDgj_BC2MgRrz0Q_7Z4xdvocfdgFf-_QpdON1HmJ3mFG0f7jfLp2L9-rhaLtaF4ZSmQrK2tXVZC8XqqqUcqCGlUdyB0I6aWkorKuvK0pXCCWu5YJTomhCbfeva8Cm6Od49BP81QkzNzo9hyC8bJpXiSnJGM2t-ZH3qHppucD4FbXJb2HfGD-C6jC-EqKRU2VgW8KPABB9jANccQrfX4buhpPlNuvknaf4DUtxyjA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2899398321</pqid></control><display><type>article</type><title>Attribute and User Trust Score-Based Zero Trust Access Control Model in IoV</title><source>MDPI - Multidisciplinary Digital Publishing Institute</source><source>EZB-FREE-00999 freely available EZB journals</source><creator>Wang, Jiuru ; Wang, Zhiyuan ; Song, Jingcheng ; Cheng, Hongyuan</creator><creatorcontrib>Wang, Jiuru ; Wang, Zhiyuan ; Song, Jingcheng ; Cheng, Hongyuan</creatorcontrib><description>The Internet of Vehicles (IoV) is an innovative area of interest in modern mobility that is rapidly evolving while facing complex challenges. Traditional IoV networks are susceptible to intrusion threats, which can lead to data leakage and seizure of vehicle control by attackers, thereby endangering vehicle users’ privacy and personal safety. An Attribute and User Trust Score-based Zero Trust Access Control Model (AU-ZTAC) is proposed, combining the zero-trust and attribute-based access control models to meet network protection requirements while achieving fine-grained dynamic access control and incorporating trust evaluation in the access control process to better reflect users’ intent. Experimental results demonstrate the effectiveness and feasibility of trust assessment through the proposed model. A comparison with the classical schemes illustrates that AU-ZTAC allows for more flexible and fine-grained access control in complex access control environments while improving IoV security.</description><identifier>ISSN: 2079-9292</identifier><identifier>EISSN: 2079-9292</identifier><identifier>DOI: 10.3390/electronics12234825</identifier><language>eng</language><publisher>Basel: MDPI AG</publisher><subject>Access control ; Ad hoc networks (Computer networks) ; Autonomous vehicles ; Blockchain ; Communication ; Data integrity ; Data security ; Digital signatures ; Internet of Things ; Internet of Vehicles ; Methods ; Network security ; Roles ; Sensors ; Traffic ; Trustworthiness</subject><ispartof>Electronics (Basel), 2023-12, Vol.12 (23), p.4825</ispartof><rights>COPYRIGHT 2023 MDPI AG</rights><rights>2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c311t-82bbd64679265b13e1c04c93fe7af1c688d75df44f47f7dd37210a600d000a6c3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>Wang, Jiuru</creatorcontrib><creatorcontrib>Wang, Zhiyuan</creatorcontrib><creatorcontrib>Song, Jingcheng</creatorcontrib><creatorcontrib>Cheng, Hongyuan</creatorcontrib><title>Attribute and User Trust Score-Based Zero Trust Access Control Model in IoV</title><title>Electronics (Basel)</title><description>The Internet of Vehicles (IoV) is an innovative area of interest in modern mobility that is rapidly evolving while facing complex challenges. Traditional IoV networks are susceptible to intrusion threats, which can lead to data leakage and seizure of vehicle control by attackers, thereby endangering vehicle users’ privacy and personal safety. An Attribute and User Trust Score-based Zero Trust Access Control Model (AU-ZTAC) is proposed, combining the zero-trust and attribute-based access control models to meet network protection requirements while achieving fine-grained dynamic access control and incorporating trust evaluation in the access control process to better reflect users’ intent. Experimental results demonstrate the effectiveness and feasibility of trust assessment through the proposed model. A comparison with the classical schemes illustrates that AU-ZTAC allows for more flexible and fine-grained access control in complex access control environments while improving IoV security.</description><subject>Access control</subject><subject>Ad hoc networks (Computer networks)</subject><subject>Autonomous vehicles</subject><subject>Blockchain</subject><subject>Communication</subject><subject>Data integrity</subject><subject>Data security</subject><subject>Digital signatures</subject><subject>Internet of Things</subject><subject>Internet of Vehicles</subject><subject>Methods</subject><subject>Network security</subject><subject>Roles</subject><subject>Sensors</subject><subject>Traffic</subject><subject>Trustworthiness</subject><issn>2079-9292</issn><issn>2079-9292</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><recordid>eNptUD1PwzAQtRBIVKW_gMUSc4o_ktgeS8VHRREDLQNL5NhnlCqNi-0M_HuM2oGBu-FOT-_dPT2ErimZc67ILfRgUvBDZyJljJeSVWdowohQhWKKnf_ZL9Esxh3JpSiXnEzQ8yKl0LVjAqwHi7cRAt6EMSb8ZnyA4k5HsPgDgj_BC2MgRrz0Q_7Z4xdvocfdgFf-_QpdON1HmJ3mFG0f7jfLp2L9-rhaLtaF4ZSmQrK2tXVZC8XqqqUcqCGlUdyB0I6aWkorKuvK0pXCCWu5YJTomhCbfeva8Cm6Od49BP81QkzNzo9hyC8bJpXiSnJGM2t-ZH3qHppucD4FbXJb2HfGD-C6jC-EqKRU2VgW8KPABB9jANccQrfX4buhpPlNuvknaf4DUtxyjA</recordid><startdate>20231201</startdate><enddate>20231201</enddate><creator>Wang, Jiuru</creator><creator>Wang, Zhiyuan</creator><creator>Song, Jingcheng</creator><creator>Cheng, Hongyuan</creator><general>MDPI AG</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>HCIFZ</scope><scope>L7M</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope></search><sort><creationdate>20231201</creationdate><title>Attribute and User Trust Score-Based Zero Trust Access Control Model in IoV</title><author>Wang, Jiuru ; Wang, Zhiyuan ; Song, Jingcheng ; Cheng, Hongyuan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c311t-82bbd64679265b13e1c04c93fe7af1c688d75df44f47f7dd37210a600d000a6c3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Access control</topic><topic>Ad hoc networks (Computer networks)</topic><topic>Autonomous vehicles</topic><topic>Blockchain</topic><topic>Communication</topic><topic>Data integrity</topic><topic>Data security</topic><topic>Digital signatures</topic><topic>Internet of Things</topic><topic>Internet of Vehicles</topic><topic>Methods</topic><topic>Network security</topic><topic>Roles</topic><topic>Sensors</topic><topic>Traffic</topic><topic>Trustworthiness</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Wang, Jiuru</creatorcontrib><creatorcontrib>Wang, Zhiyuan</creatorcontrib><creatorcontrib>Song, Jingcheng</creatorcontrib><creatorcontrib>Cheng, Hongyuan</creatorcontrib><collection>CrossRef</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>SciTech Premium Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><jtitle>Electronics (Basel)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Wang, Jiuru</au><au>Wang, Zhiyuan</au><au>Song, Jingcheng</au><au>Cheng, Hongyuan</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Attribute and User Trust Score-Based Zero Trust Access Control Model in IoV</atitle><jtitle>Electronics (Basel)</jtitle><date>2023-12-01</date><risdate>2023</risdate><volume>12</volume><issue>23</issue><spage>4825</spage><pages>4825-</pages><issn>2079-9292</issn><eissn>2079-9292</eissn><abstract>The Internet of Vehicles (IoV) is an innovative area of interest in modern mobility that is rapidly evolving while facing complex challenges. Traditional IoV networks are susceptible to intrusion threats, which can lead to data leakage and seizure of vehicle control by attackers, thereby endangering vehicle users’ privacy and personal safety. An Attribute and User Trust Score-based Zero Trust Access Control Model (AU-ZTAC) is proposed, combining the zero-trust and attribute-based access control models to meet network protection requirements while achieving fine-grained dynamic access control and incorporating trust evaluation in the access control process to better reflect users’ intent. Experimental results demonstrate the effectiveness and feasibility of trust assessment through the proposed model. A comparison with the classical schemes illustrates that AU-ZTAC allows for more flexible and fine-grained access control in complex access control environments while improving IoV security.</abstract><cop>Basel</cop><pub>MDPI AG</pub><doi>10.3390/electronics12234825</doi><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2079-9292 |
ispartof | Electronics (Basel), 2023-12, Vol.12 (23), p.4825 |
issn | 2079-9292 2079-9292 |
language | eng |
recordid | cdi_proquest_journals_2899398321 |
source | MDPI - Multidisciplinary Digital Publishing Institute; EZB-FREE-00999 freely available EZB journals |
subjects | Access control Ad hoc networks (Computer networks) Autonomous vehicles Blockchain Communication Data integrity Data security Digital signatures Internet of Things Internet of Vehicles Methods Network security Roles Sensors Traffic Trustworthiness |
title | Attribute and User Trust Score-Based Zero Trust Access Control Model in IoV |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-04T06%3A31%3A04IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-gale_proqu&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Attribute%20and%20User%20Trust%20Score-Based%20Zero%20Trust%20Access%20Control%20Model%20in%20IoV&rft.jtitle=Electronics%20(Basel)&rft.au=Wang,%20Jiuru&rft.date=2023-12-01&rft.volume=12&rft.issue=23&rft.spage=4825&rft.pages=4825-&rft.issn=2079-9292&rft.eissn=2079-9292&rft_id=info:doi/10.3390/electronics12234825&rft_dat=%3Cgale_proqu%3EA775889311%3C/gale_proqu%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2899398321&rft_id=info:pmid/&rft_galeid=A775889311&rfr_iscdi=true |