TY - GEN
T1 - Modeling and verifying NDN-based IoV using CSP
AU - Chen, Ningning
AU - Zhu, Huibiao
AU - Yin, Jiaqi
AU - Xiao, Lili
AU - Fei, Yuan
N1 - Publisher Copyright:
© 2020 Knowledge Systems Institute Graduate School. All rights reserved.
PY - 2020
Y1 - 2020
N2 - As a crucial component of intelligent transportation system, Internet of Vehicles (IoV) plays an important role in the smart and intelligent cities. However, current Internet architectures cannot guarantee efficient data delivery and adequate data security for IoV. Therefore, Named Data Networking (NDN), a leading architecture of Information-Centric Networking (ICN), is introduced into IoV. Although problems about data distribution can be resolved effectively, the combination of NDN and IoV causes some new security issues. In this paper, we apply Communicating Sequential Processes (CSP) to formalize NDN-based IoV. We mainly focus on its data access mechanism and model this mechanism in detail. By feeding the formalized model into the model checker Process Analysis Toolkit (PAT), we verify four vital properties including deadlock freedom, data availability, PIT deletion faking and CS caching pollution. According to verification results, the model cannot ensure the security of data with the appearance of intruders. To solve these problems, we adopt a method derived from Blockchain in our improvement. Through the analysis of the improved model, we can truly guarantee the security of NDN-based IoV.
AB - As a crucial component of intelligent transportation system, Internet of Vehicles (IoV) plays an important role in the smart and intelligent cities. However, current Internet architectures cannot guarantee efficient data delivery and adequate data security for IoV. Therefore, Named Data Networking (NDN), a leading architecture of Information-Centric Networking (ICN), is introduced into IoV. Although problems about data distribution can be resolved effectively, the combination of NDN and IoV causes some new security issues. In this paper, we apply Communicating Sequential Processes (CSP) to formalize NDN-based IoV. We mainly focus on its data access mechanism and model this mechanism in detail. By feeding the formalized model into the model checker Process Analysis Toolkit (PAT), we verify four vital properties including deadlock freedom, data availability, PIT deletion faking and CS caching pollution. According to verification results, the model cannot ensure the security of data with the appearance of intruders. To solve these problems, we adopt a method derived from Blockchain in our improvement. Through the analysis of the improved model, we can truly guarantee the security of NDN-based IoV.
KW - Blockchain
KW - CSP
KW - IoV
KW - Modeling Verification
KW - NDN
UR - http://www.scopus.com/inward/record.url?scp=85090506812&partnerID=8YFLogxK
U2 - 10.18293/SEKE2020-066
DO - 10.18293/SEKE2020-066
M3 - 会议稿件
AN - SCOPUS:85090506812
T3 - Proceedings of the International Conference on Software Engineering and Knowledge Engineering, SEKE
SP - 31
EP - 36
BT - SEKE 2020 - Proceedings of the 32nd International Conference on Software Engineering and Knowledge Engineering
PB - Knowledge Systems Institute Graduate School
T2 - 32nd International Conference on Software Engineering and Knowledge Engineering, SEKE 2020
Y2 - 9 July 2020 through 19 July 2020
ER -