VC with the public key, this will result in a nonexis-
tent DID. As a result, the eNb RAN rejects the mes-
sage content, and it does not reach the ADAS applica-
tion server, thus avoiding future decision-making er-
rors that the server could cause.
伀甀琀ⴀ漀昀ⴀ挀漀瘀攀爀愀最攀
䤀渀ⴀ挀漀瘀攀爀愀最攀
Figure 3: Authentication scheme in SSI-based IoV ecosys-
tem for ADAS.
Although this is an open study, some research on
the use of SSI in the IoV ecosystem has already been
carried out, even if not in the context of authentica-
tion. (Theodouli et al., 2020) proposes an identity and
trust management framework based on SSI to authen-
ticate a software vendor API with the vehicle, aiming
to improve the software update of IoT devices em-
bedded in the vehicle. Even though it is not a study
directly related to vehicular authentication in the IoV
ecosystem, the research proves the possibility of us-
ing all of this framework in the context of vehicular
networks.
7 CONCLUSION & FUTURE
WORK
In brief, while the Internet of Vehicles (IoV) ecosys-
tem is commonly regarded as secure, it contains au-
thentication vulnerabilities that expose users to poten-
tial malicious attacks. Although researchers have de-
veloped authentication mechanisms and protocol so-
lutions to address these concerns, none of the evalu-
ated solutions effectively tackle the issue of maintain-
ing vehicle trust when out of network coverage, nor
address the centralized nature of the default authen-
tication mechanism. These factors introduce risks of
authentication failures, as detailed in the threat model.
To confront this challenge, we proposed to apply
the Self-Sovereign Identity (SSI) decentralized iden-
tity model in conjunction with the Trust Over IP ar-
chitecture. This integration offers a compelling ap-
proach for implementing decentralized identification
in diverse contexts. Additionally, we have discussed a
proposed solution that incorporates an SSI-based au-
thentication scheme within the IoV ecosystem, with a
particular focus on ADAS applications. This solution
provides a foundation for future research endeavors to
explore and enhance.
REFERENCES
3rd Generation Partnership Project (2017).
Release 14 - 3gpp. Available in:
https://www.3gpp.org/specifications-
technologies/releases/release-14. Access in:
07/09/2023.
Alladi, T., Chakravarty, S., Chamola, V., and Guizani,
M. (2020). A lightweight authentication and at-
testation scheme for in-transit vehicles in iov sce-
nario. IEEE Transactions on Vehicular Technology,
69(12):14188–14197.
Bagga, P., Das, A. K., Wazid, M., Rodrigues, J. J., and Park,
Y. (2020). Authentication protocols in internet of ve-
hicles: Taxonomy, analysis, and challenges. Ieee Ac-
cess, 8:54314–54344.
Cui, J., Wen, J., Han, S., and Zhong, H. (2018). Efficient
privacy-preserving scheme for real-time location data
in vehicular ad-hoc network. IEEE Internet of Things
Journal, 5(5):3491–3498.
Davie, M., Gisolfi, D., Hardman, D., Jordan, J., O’Donnell,
D., and Reed, D. (2019). The trust over ip stack. IEEE
Communications Standards Magazine, 3(4):46–51.
Gayathri, N., Thumbur, G., Reddy, P. V., and Rahman, M.
Z. U. (2018). Efficient pairing-free certificateless au-
thentication scheme with batch verification for vehic-
ular ad-hoc networks. IEEE Access, 6:31808–31819.
Islam, S. H., Obaidat, M. S., Vijayakumar, P., Abdulhay,
E., Li, F., and Reddy, M. K. C. (2018). A robust
and efficient password-based conditional privacy pre-
serving authentication and group-key agreement pro-
tocol for vanets. Future Generation Computer Sys-
tems, 84:216–227.
Musleh, A. S., Yao, G., and Muyeen, S. (2019). Blockchain
applications in smart grid–review and frameworks.
Ieee Access, 7:86746–86757.
Soltani, R., Nguyen, U. T., and An, A. (2021). A survey of
self-sovereign identity ecosystem. Security and Com-
munication Networks, 2021:1–26.
Theodouli, A., Moschou, K., Votis, K., Tzovaras, D.,
Lauinger, J., and Steinhorst, S. (2020). Towards
A Decentralized Authentication Model for Internet of Vehicles Using SSI
551