1. Introduction
The safety research of complex systems has always been a hot topic [
1,
2]. Complex traffic system is the foundation to ensure the smooth operation of the city [
3,
4], and it is necessary to focus on its safety research [
5]. The Internet of Vehicles (IoV) is one of the important research contents in complex traffic system, and it is also one of the research fields that researchers focus on in recent years. The Internet of Vehicles is a key component of the Internet of Things (IoT), with vehicles serving as primary sensors [
6,
7]. It leverages cutting-edge information and communication technologies to establish efficient networks that connect vehicles and infrastructure [
8]. Its main goal is to enhance vehicular intelligence using communication technologies, thereby enhancing driving experiences, improving the quality of transportation services [
9], and fostering the development of safe and efficient transportation systems [
10]. However, such developments in the automotive industry have introduced a range of complex security challenges, mainly concerning the safety of vehicle operations, data protection, and network security [
11].
By analyzing the security vulnerabilities and attack methods of the IoV system, our research aims to propose security measures that can effectively safeguard the IoV system. Furthermore, the research offers practical suggestions and guidance to automobile manufacturers and technology developers on improving the security of the IoV system [
12,
13]. Ultimately, this work contributes to the broader objective of advancing intelligent transportation systems and smart city initiatives by ensuring the secure and reliable operation of IoV networks.
  1.1. Literature Review
  1.1.1. Message Authentication in IoV
As a crucial part of the modern transportation system, ensuring the security of wireless communication within IoV is vital [
14]. However, this wireless communication method is highly vulnerable to attacks, including detection, interception, modification, and replay. These security risks may lead to the transmission of false messages, potentially resulting in severe outcomes such as traffic crashes [
15]. To avoid these security attacks and ensure the integrity and reliability of messages, researchers have applied message signing and authentication technology to IoV. To protect intelligent connected vehicles from spoofing attacks, researchers have proposed a variety of lightweight message authentication protocols for vehicle-mounted Controller-Area Networks (CAN) [
16]. Jo, Kim [
17] proposed an improved authentication protocol, Message Authentication-CAN, which eliminated the need to modify the CAN controller hardware, reduced the load of the CAN bus, and defended against DoS attacks. Subsequently, Kang [
18] proposed a lightweight authentication protocol that could be easily deployed on CAN by executing electronic control units (ECU) firmware updates. It was found to attain high security and authentication efficiency. Kim, Jo [
19] proposed a formalized CAN model that could capture the timing behavior of CAN at the Media Access Control (MAC) layer of the data link layer and be used to verify the security of other CAN applications. At present, lightweight message authentication protocols are designed with high real-time performance to support fast data processing and transmission. While ensuring the security and integrity of the message, it can also adapt to the environment with limited vehicle network resources. Considering the current bandwidth resources and message response time requirements of vehicular networks, the existing research fails to address three key questions: (i). how security can be enhanced without significantly increasing computational burden, (ii). how to address advanced network attack techniques, and (iii). how can standardization and interoperability be achieved while maintaining lightweight characteristics?
To further address the issues of computational and communication overhead, building on solutions proposed by Zhang, Ho [
20] and Huang, Yeh [
21], Lee and Lai [
22] proposed a vehicular network message authentication scheme based on elliptic curve signatures. The scheme maintained efficiency while improving security. Bayat, Barmshoory [
23] analyzed and proved that the scheme proposed by Lee and Lai [
22] was vulnerable to masquerading attacks. Subsequently, they proposed an improved solution and demonstrated its security and correctness. Ali, Chen [
24] proposed an elliptic curve cryptosystem-based hybrid signcryption (ECCHSC) protocol. Implementing smart cities while leveraging IoV would also increase security threats that arise due to insecure communication between entities. To solve this problem, Bagga, Sutrala [
25] proposed a new blockchain batch authentication scheme, BBAS-IoV, to register vehicles and RSUs before vehicle deployment. Moreover, as many existing IoV message authentication schemes lack support for mutual authentication between nodes, Qureshi, Sandila [
26] proposed an efficient security application authentication scheme for IoV messages. This scheme constructed a lightweight authentication protocol utilizing Radio-Frequency Identification Devices (RFID) while employing a mutual message authentication mechanism between drones and vehicle nodes to ensure robust security and authentication within IoV.
  1.1.2. Cloud-Edge-Client Collaborative Architecture
Cloud computing is a technology that uses the Internet to provide computing resources and data storage [
27]. It enables users and enterprises to access software, storage services, and processing power via the Internet without purchasing or managing physical servers [
28]. This model provides elasticity, scalability, and cost efficiency, and users can instantly increase or decrease resources according to demand, thereby, optimizing the cost structure [
29]. With the advancement of technology, cloud computing has become an infrastructure that supports advanced applications such as remote work, data analysis, artificial intelligence, and machine learning [
30].
Edge computing is a distributed computing architecture that transfers data processing tasks from central servers to clients at the edge of the network, that is, close to the location where data is generated or collected, which can significantly reduce data transmission delays and improve response speed and system efficiency [
31]. After a large amount of data is processed locally, only part of the necessary information needs to be sent to the central server, thereby easing the pressure on the central cloud server, improving bandwidth utilization, and enhancing data security and privacy protection [
32]. Edge computing has become an ideal choice for applications with high real-time data processing requirements, such as the Internet of Things, smart cities, and autonomous vehicles [
33,
34,
35,
36]. Cui, Wei [
37] proposed a security privacy protection authentication scheme that incorporates edge computing concepts to the message authentication process of vehicular ad hoc networks (VANETs). Subsequently, Cui, Zhang [
38] proposed a secure vehicle network authentication scheme using a cloud broker (
CB) as an intermediary in a multi-cloud environment. They proposed a new vehicle network architecture suitable for a multi-cloud environment. The CB, managed by a trusted authority (
TA), selects a suitable cloud service provider (CSP) for the vehicle. To address the authentication challenge in a multi-cloud environment, Zhang, Zhong [
39] proposed a many-to-many authentication and key agreement scheme between vehicles and CSPs. This approach ensures data security and user privacy by establishing session keys in multi-party mutual authentication.
Due to the ongoing increase in data volume and computing demand, the collaboration between cloud computing and edge computing has become the key to improving application performance. It can not only reduce data transmission delay but also reduce energy consumption and improve user experience. However, the development of cloud-edge-client collaboration is still in the exploratory stage, and research is mainly focused on areas such as the Internet of Things and the Industrial Internet that particularly require fast response and efficient data processing capabilities. Ren, He [
40] proved that the collaboration between cloud computing and edge computing can effectively improve latency performance. Ding, Zhou [
41] proposed a cloud-edge collaboration framework for deep learning models of cognitive services, which has faster response and higher accuracy. Zhang, Chen [
42] proposed a device management service system based on cloud-edge collaboration, which not only improved the system’s response speed but also reduced the data transmission pressure of the central cloud server.
  1.2. Main Contributions
Message authentication in IoV has been proven to be a crucial means to address security issues. The core objective of existing research is to ensure the security and authenticity of communications among vehicles and between vehicles and infrastructure. The broader focus is on preventing various attacks, optimizing system scalability, reducing computational and communication overhead to adapt to high-speed and high-volume vehicular environments, and providing privacy protection for vehicle data. These measures aim to ensure the efficient and reliable operation of intelligent transportation systems. However, current research still exhibits some limitations regarding security and efficiency.
Moreover, the existing cloud-edge-client technology of the Internet of Vehicles proposes an architectural model in which multiple cloud devices are organized hierarchically from the end devices upward. It generally adopts the traditional top-down control and instruction processing method and fails to emphasize and apply cloud computing architecture and cloud control technology.
To address the security issues in IoV, this paper analyzes and studies the existing message authentication schemes and proposes an improved solution algorithm. The contributions of this research are as follows:
(1) An efficient and secure adaptive traffic flow authentication strategy (ATAS) is proposed based on the ECDSA and Ed25519 digital signature algorithms with high authentication efficiency. The introduction of this scheme makes the security authentication process in IoV more efficient and reliable while ensuring the information exchange between vehicles and infrastructure is secure.
(2) Leveraging Message Authentication Code (MAC) technology, the aggregated MAC technology is adopted to propagate data in large-scale IoV scenarios. Additionally, a cloud platform is established to monitor RSUs and report security issues to vehicles in a timely manner. Also, an IoV authentication model is developed based on a cloud-edge-client collaborative architecture. The model effectively reduces network latency and load, enhances data security and privacy, and provides a new solution for secure communications in IoV.
(3) We proposed traffic response strategies for incidents using a simulation platform, analyzing IoV incident scenarios with different connected vehicle rates, congestion levels, and locations. The effectiveness of post-incident IoV message authentication was assessed, and the potential of IoV authentication to boost traffic management, optimize road use, and enhance safety was analyzed.
  2. Materials and Methods
  2.1. Security Message Authentication Scheme for IoV
Considering the variability of IoV under different traffic flow conditions, safety message authentication schemes must consider safety, efficiency, and adaptability. To address these requirements, this paper proposes an Adaptive Traffic Authentication Strategy (ATAS), which combines the security and efficiency advantages of the Elliptic Curve Digital Signature Algorithm (ECDSA) [
43] and Edwards-curve Digital Signature Algorithm (EdDSA) [
44] with the dynamic characteristics of IoV, taking into account the dynamic changes in traffic flow. ATAS intelligently selects the most appropriate digital signature algorithm by analyzing real-time traffic flow data, e.g., vehicle count, average speed, and detector occupancy, allowing it to adjust the authentication process dynamically. This ensures optimal efficiency and response speed, providing an efficient, reliable, and adaptable solution for safety authentication while maintaining acceptable safety levels.
To meet the complex and evolving demands of IoV environments, the ATAS (See 
Figure 1) is designed to maintain prompt communication in high-traffic scenarios. The strategy also enhances security measures in low-traffic situations by utilizing additional computational resources. This adaptive approach allows the system to optimize performance without compromising safety.
By leveraging the characteristics of the IoV environment, such as high dynamics and uncertainty, ATAS makes full use of real-time traffic flow information to implement intelligent and adaptive authentication strategies that improve overall system performance and user experience. This method ensures robust communication security and supports the ongoing advancement of intelligent transportation systems.
(i) Decision Model
The parameters used in the ATAS are defined in 
Table 1.
(a) Traffic flow dynamics evaluation
To evaluate the dynamics of traffic flow, the changing rate of traffic flow between the current and previous time intervals can be calculated as:
(b) Traffic State Score (TSS)
TSS is calculated by considering both the dynamic changes and the current state of traffic flow.
(c) Time Sensitivity Score (TSSe)
To account for the impact of time, TSSe is introduced. TSSe incorporates the time since the last detection and the detection range of the detector:
        where 
 and 
 are weight coefficients.
(d) Comprehensive Authentication Strategy (CAS)
The final CAS is formulated by integrating the TSS and the TSSe.
Based on the CAS value, an appropriate authentication policy can be dynamically selected according to a predetermined threshold.
For lower CAS values, indicating a lower current security message authentication load within the IoV, more computational resources are available. In such cases, a more complex but secure authentication method, combining the ECDSA digital signature algorithm with the Ed25519 digital signature algorithm, may be selected. For higher CAS values, indicating a larger current security message authentication load and fewer available resources, the system may opt for a simpler authentication method using only the Ed25519 digital signature algorithm. The algorithm is suitable for high traffic flow and high time sensitivity scenarios.
(ii) System initialization (Algorithm 1)
        
| Algorithm 1 System Initialization | 
| Step 1: | The TA randomly selects two large prime numbers p and q and a non-singular elliptic curve E defined over a finite field , described as . A generator point P is randomly selected from the elliptic curve group. | 
| Step 2: | The TA randomly selects a system private key  and calculates the system public key . | 
| Step 3: | The TA randomly selects  as the private key for the RSU and calculates the corresponding RSU public key: . | 
| Step 4: | The TA selects a secure hash function h: . | 
| Step 5: | The TA securely transmits the private key  to the RSU. | 
| Step 6: | The TA publishes the system’s public parameters  to the RSU and all vehicles. | 
(iii) Key generation
Given the use of both ECDSA and Ed25519 in the ATAS, the key generation processes for both algorithms are outlined below (Algorithms 2 and 3).
        
| Algorithm 2 ECDSA key generation | 
| Step 1: | Select the elliptic curve and the base point. Vehicle V selects a base point  on the elliptic curve E with order n. | 
| Step 2: | Generate the private key. Vehicle V randomly generate  as its ECDSA private key. | 
| Step 3: | Calculate the public key. Vehicle V calculates its ECDSA public key . | 
| Algorithm 3 Ed25519 key generation | 
| Step 1: | Select the elliptic curve and the base point. Vehicle V uses the predefined base point  of Ed25519, with order l. | 
| Step 2: | Generate private key. Vehicle V generates a 256-bit random number  as its Ed25519 private key. | 
| Step 3: | Calculate the public key. Vehicle V calculates its Ed25519 public key . | 
(iv) Message Signature
When vehicle 
V enters the range of RSU, the RSU uses the ATAS to analyze the relevant traffic detection parameters and decide on the appropriate authentication method. If the decision results in a lower CAS value, a combination of the ECDSA and Ed25519 digital signature algorithm is employed (Algorithm 4).
        
| Algorithm 4 Combination of ECDSA and Ed25519 | 
| Step 1: | Select a random number k, . | 
| Step 2: | Calculate the solution point  and set . If , reselect k. | 
| Step 3: | Calculate the signature value s: . If , reselect k. | 
| Step 4: | Calculate the random number . | 
| Step 5: | Calculate the temporary solution point . | 
| Step 6: | Calculate the final signature value : .
 | 
| Step 7: | Transmit the signature value s, the final signature value , the message m, and the related publicly available parameters to the RSU. | 
If the decision results in a higher CAS value, only the Ed25519 digital signature algorithm is used (Algorithm 5).
        
| Algorithm 5 Ed25519 Digital Signature | 
| Step 1: | Calculate the random number . | 
| Step 2: | Calculate the temporary solution point . | 
| Step 3: | Calculate the final signature value : .
 | 
| Step 4: | Transmit the signature value , message m, and related publicly available parameters to the RSU. | 
(v) Message Verification
Upon receiving the message, the RSU verifies the message signature from the combination of the ECDSA and Ed25519 digital signature algorithm as follows (Algorithm 6).
        
| Algorithm 6 Message Verification of Combination | 
| Step 1: | Calculate . | 
| Step 2: | Verify that if , it indicates a failure in the Ed25519 digital signature authentication, and the message is discarded. Verify that if , it indicates that the Ed25519 digital signature authentication is successful, and then proceed to the next step.
 | 
| Step 3: | Verify whether r and s are within the interval . | 
| Step 4: | Calculate . | 
| Step 5: | Calculate the solution point . | 
| Step 6: | Verify that if  (not equal to the point at infinity) and , it indicates that both digital signature authentications are successful, and the message is accepted. | 
When only the Ed25519 digital signature algorithm is employed, the RSU performs the following verification process upon receiving the message (Algorithm 7).
        
| Algorithm 7 Message Verification of Ed25519 | 
| Step 1: | Calculate . | 
| Step 2: | Verify that if , it indicates a failure in the Ed25519 digital signature authentication, and the message is discarded. Verify that if , it indicates that the Ed25519 digital signature authentication is successful, and the message is accepted.
 | 
  2.2. Internet of Vehicles Authentication Based on Cloud-Edge-Client Collaborative Architecture
To solve the transmission speed and overhead problems in message authentication, this paper proposes a secure message transmission and authentication method based on the cloud-edge-client collaborative architecture. This method employs aggregated message authentication code (MAC) technology to verify the authenticity and integrity of messages, reducing communication overhead. Within this framework (shown in 
Figure 2), the cloud platform functions as a “cloud” endpoint overseeing RSU message broadcast, the RSUs serve as the “edge” endpoints, and vehicles act as the “client” endpoints. This structure ensures the accuracy and security of authenticated message transmission.
In this architecture, vehicles communicate with each other or RSUs through the dedicated short-range communication (DSRC) protocol. The system model comprises four primary entities: the cloud platform (
C), the trusted authority (
TA), the road side unit (RSU), and on-board units (OBUs). The 
TA is responsible for registering RSUs and OBUs, generating public–private key pairs, and managing the privacy of all vehicles, including the driver’s identity information. RSUs, fixed along the roadside, verify the authenticity and integrity of the message and forward the authentic message to vehicles within their coverage area or beyond via interconnected RSUs. RSUs also manage the privacy information of all vehicles within their communication range, including the identity, public key, shared key, and timestamp. OBUs, installed in vehicles, are responsible for sensing the road conditions. However, compared to RSUs, OBUs have shorter communication distances and limited computing power. The cloud platform supervises the correctness of message broadcasts by synchronizing authentication and decryption processes with RSUs and monitoring RSU activities. This collaborative effort culminates in a cloud-edge-client collaboration authentication model. In this model, the 
TA is assumed to be a trusted entity, while RSUs are considered potentially untrustworthy. We summarize in 
Table 2 the parameter definitions that will be used in the future.
(i) Establishing a Shared Key
When the vehicle 
 enters the communication range of an 
, both parties initiate the process to establish a shared key. This process utilizes the Diffie-Hellman key exchange protocol [
45] for mutual authentication and shared key establishment, as illustrated in 
Figure 3.
In this protocol,  and  are two parameters of the Diffie-Hellman key exchange protocol, through which the shared key  of vehicle  and  can be calculated. On receiving the first message from vehicle ,  decrypts the message using its private key  to extract the vehicle identifier , parameter , and timestamp Ts. It then uses the public key  to authenticate vehicle . If the authentication is successful,  assigns a pseudo-identity  to vehicle , which is associated with the shared key . This pseudo-identity allows  to find the vehicles sending messages. Similarly, vehicle  decrypts the second message and authenticates . If successful, vehicle  signs  using its private key  and sends the signature to .
(ii) Aggregate Message Authentication Code
After establishing the shared key, when vehicle 
 detects an event 
M and wants to communicate it to other vehicles, it first encrypts the event 
M using the shared key 
 with 
 to obtain the message 
. Vehicle 
 then generates an aggregate authentication tag for 
.
Finally, vehicle 
 sends 
, 
, 
 and 
 to 
. The process is shown in 
Figure 4.
During the transmission, if vehicle  moves beyond the communication range of , the aggregate authentication tag  of vehicle  must be forwarded to  using an appropriate routing protocol. To prevent the forwarding node from forging or tampering with the message and reduce the additional communication overhead, this method employs an aggregate message authentication code to verify the authenticity and integrity of the message.
If vehicle 
 moves out of the communication range of 
, the message must be forwarded by a forwarding node vehicle 
. The process is shown in 
Figure 5 and Algorithm 8.
        
| Algorithm 8 Event message forwarding process | 
| Step 1: | After receiving the message from vehicle , the forwarding node vehicle  uses the shared key  with  to generate an aggregate authentication tag for message : . | 
| Step 2: | XOR with the aggregate verification tag of vehicle  to obtain the aggregate verification tag of forwarding node vehicle : . | 
| Step 3: | Send , and  to the next forwarding node . | 
| Step 4: | Repeat the cycle process Step1~3 until the message reaches . | 
(iii) Message Authentication and Dissemination
Since the 
 has a shared key with each forwarding node, when receiving a message from a forwarding node vehicle 
, an aggregate verification tag can be calculated to verify the authenticity and integrity of the received message (
l is the number of vehicles sending and forwarding information).
If , the message is considered to have not been tampered with, the message integrity can be determined, and the message  is broadcast to other vehicles within the range.
If , the message is considered to have been tampered with or forged during transmission, and  will reject the message.
(iv) Cloud-Edge-Client Collaborative Authentication
In the process of broadcasting messages,  may be used by attackers to spread false information to other vehicles. To further ensure the authenticity and integrity of the message broadcast process, the message forwarded by  to  will be synchronously verified through the cloud platform C. Among them, since the cloud platform C and  are in fixed positions, the two-party communication adopts the commonly used encryption algorithm in China by default to achieve the highest security message transmission efficiency.
In this scheme, if the last forwarding node vehicle 
 sends a message to 
, the synchronous verification process at this time is shown in 
Figure 6 and Algorithm 9.
        
| Algorithm 9 Synchronous verification process | 
| Step 1: | The last forwarding node vehicle  sends , , ,  and  to the cloud platform C at the same time. | 
| Step 2: | Cloud platform C and  perform authentication and decryption operations synchronously to obtain message . At this time, cloud platform C conducts directional monitoring of  through the received . | 
| Step 3: | After receiving the message and verifying the authenticity and integrity of the message,  broadcasts the received message  to the vehicles within the range. | 
| Step 4: | Cloud platform C compares the message  obtained by monitoring  with the message  obtained by authentication and decryption. ① If , no action is taken.
 ② If , the correct message is immediately sent to the vehicle within the range of  for maintenance correction and a prompt warning is issued to the vehicle.
 | 
  3. Results and Discussion
  3.1. Performance Analysis of Adaptive Traffic Authentication Strategy
When evaluating the performance of different security authentication algorithms, the primary focus will be on analyzing the algorithm’s processing time, given the limited system resources and computing power. The evaluation was conducted on a computer with an AMD Ryzen 5 5600X 6-Core Processor at 3.70 GHz, 16 GB RAM, and running Windows 10.
As shown in 
Figure 7, following a series of comparisons of security authentication algorithm efficiency, the performance characteristics observed are as follows.
At a relatively low number of authenticated vehicles (100 vehicles), the ECDSA digital signature algorithm exhibits the best processing time performance. However, as the number of authenticated vehicles increases, its processing time increases linearly from 2.19 milliseconds to 2.55 milliseconds. This indicates that ECDSA may encounter performance bottlenecks when processing large amounts of data.
In all tests, Ed25519 shows relatively consistent processing time and outperforms ECDSA. Although its processing time increases under high load (500 vehicles authenticated), the overall increase is small, up to 1.13 milliseconds. This reflects the scalability advantage of the Ed25519 digital signature scheme.
When the ECDSA and Ed25519 algorithms are used in simple combination (ECDSA+Ed25519), the processing time is significantly higher than when either algorithm is used individually. Especially when there are a large number of vehicles, the processing time increases from 2.41 milliseconds to 2.48 milliseconds, which is almost twice as long as when Ed25519 is used alone.
After introducing the Adaptive Traffic Flow Authentication Strategy (ATAS), the performance of the combined algorithm was significantly improved. ATAS effectively reduces the processing time, especially in the case of a high number of vehicle authentication, from 1.59 milliseconds to 1.17 milliseconds, showing the significant role of ATAS in performance optimization.
Overall, the Ed25519 digital signature algorithm excelled in the single algorithm test, and the ATAS further improved the performance when the number of vehicles is large. When selecting an appropriate vehicle network security authentication scheme, it is crucial to consider multiple factors such as the algorithm’s computational complexity, system resources, and processing time.
  3.2. Security Analysis of IoV Authentication Based on Cloud-Edge-Client Collaborative Architecture
  3.2.1. Message Integrity and Traceability
In the Internet of Vehicles, ensuring the integrity and traceability of messages is crucial to ensuring the security of the network. Attackers may try to tamper with messages in transit or insert forged messages into the network in order to mislead the receiver or disrupt the normal operation of the system. For example, attackers may tamper with traffic information or forge emergency notifications, causing serious traffic chaos or safety accidents, which not only threatens the correctness of the decision-making of the message receiver, but also poses a direct threat to personnel safety; and the lack of traceability will make it extremely difficult to track the source of the attack, thereby increasing the challenges of network management and security maintenance. Therefore, the Internet of Vehicles security authentication scheme must ensure that the message has not been tampered with during transmission and can be accurately traced back to the sender.
In this scheme, when the RSU receives a message, it will find the shared key k of the sender and all forwarding nodes based on the vehicle pseudo-identity 
PID, and use the shared key 
k to calculate the aggregate message authentication code 
AMAC for the received message 
M, 
PID, etc.:
Subsequently, the RSU compares the calculated aggregate message authentication code AMAC with the received aggregate message authentication code  for verification:
(1) If , the message is considered to have not been tampered with and the message integrity can be determined.
(2) If , the message is considered to have been tampered with or forged during transmission and the RSU will reject the message.
In addition, each vehicle has an independent shared key with the RSU. If the RSU can find a shared key, the RSU can obtain the identity of the message sender through a decryption operation, thereby authenticating the message source and preventing identity forgery. 
 is the decryption function and 
 is the operation function for querying the mapping table.
  3.2.2. Identity Privacy Protection
Identity privacy protection is another important security issue in the Internet of Vehicles. In the Internet of Vehicles, the communication of vehicles is public, and attackers can track the action patterns of specific vehicles and even identify the real identity of the vehicle by analyzing the exchanged messages. This attack on personal information not only violates the privacy rights of users, but may also be used for illegal purposes, such as targeted attacks or fraud. If the attacker can forge the identity of the vehicle, it may also send false information to interfere with the operation of the network or conduct malicious attacks. Therefore, while ensuring the efficiency and accuracy of Internet of Vehicles communication, it is also necessary to pay attention to the effective protection of the identity privacy of the vehicle.
In this scheme, in order to better protect the identity privacy of the vehicle, a new pseudo-identity is generated every time the vehicle enters the communication range of an RSU, so as to avoid the identity being tracked due to the long-term use of the same pseudo-identity. The RSU maintains a mapping table from pseudo-identity to real identity, and only when necessary (for example, when the vehicle spreads false information) can the real identity of the vehicle be queried through the pseudo-identity . In this process, the RSU uses the shared key k to decrypt the mapping result, ensuring that even if the mapping table is leaked, the attacker cannot directly obtain the real identity information of the vehicle from it, thereby further enhancing the privacy protection of the vehicle.
  3.2.3. Internal Attack Protection
Internal attacks refer to attacks launched after legitimate nodes within the network are controlled by attackers. In the Internet of Vehicles, internal attacks are particularly dangerous. Attackers can use the vehicle’s own communication capabilities and network permissions to launch more covert and effective attacks. For example, a vehicle controlled by an attacker can send false traffic reports, mislead other vehicles, or spread malware in the network. The concealment of internal attacks makes them particularly difficult to detect and defend against. Conventional defense mechanisms based on trust management and behavioral analysis are often limited in effectiveness when facing the highly dynamic and large-scale Internet of Vehicles.
In this scheme, the Diffie-Hellman public key protocol is used in the symmetric key establishment process. When establishing the symmetric key, private key information does not need to be sent, which reduces the risk of internal attacks. At the same time, since the shared key is updated every time, the vehicle enters the communication range of an RSU, even if some information of the vehicle is obtained by the attacker, the key has been updated, and the new communication content cannot be decrypted using this information.
Through this solution, attackers cannot obtain the communication content of each message during the forwarding process, effectively preventing the impact of internal attacks on the Internet of Vehicles.
  3.2.4. Replay Attack
Replay attacks are a common type of network attack, where attackers intercept legitimate messages and resend them at different times or contexts to deceive the recipient. In the Internet of Vehicles, replay attacks may cause disruption to traffic flow by replaying outdated traffic information, or replaying old authentication messages to bypass security checks. Due to the high mobility of the Internet of Vehicles, replay attacks become easier to perform and more difficult to detect. Attackers can take advantage of the high-speed movement of vehicles to capture messages from one location and then replay them in another location, causing time and space dislocation of information. And because of the large number of nodes in the Internet of Vehicles, attackers can choose to replay captured messages in different parts of the network, increasing the difficulty of network security defense. Therefore, the most important thing to defend against replay attacks is to design effective mechanisms to ensure the timeliness and context relevance of messages.
In this scheme, each message is accompanied by a timestamp 
Ts to ensure the freshness of the message; each message is also accompanied by a message sequence number 
Sq. The replayed message will be identified and rejected by the RSU because the message sequence number does not match. After receiving the message, the RSU will check the message sequence number and the difference between the timestamp and the current time:
(1) If the difference between the timestamp and the current time is within an acceptable range and the message sequence number matches, the message is considered fresh.
(2) If the time difference is too large, or the message sequence number does not match, the message is considered part of a replay attack and is ignored.
Through the timestamp Ts attached to each message, even if an attacker obtains and attempts to replay old messages, these messages will not be accepted for processing.
  3.2.5. Man-in-the-Middle Attack
Man-in-the-Middle Attack (MitM) is a common attack form in network security. The attacker inserts himself between the two communicating parties to intercept, modify and forward the messages between the two communicating parties. In the Internet of Vehicles environment, the risk of MitM attack is particularly prominent. Attackers can easily put themselves between the two communicating parties by taking advantage of the openness of wireless communication and the frequent message exchange between vehicles. Once the MitM attack is successful, the attacker can not only eavesdrop on the communication content of the two communicating parties, but also tamper with the exchanged information, such as forging traffic instructions or sending false messages by impersonating other vehicles. This attack poses a direct threat to vehicle driving decisions and road safety management.
In this scheme, the communicating parties not only need to verify each other’s identity, but also need to establish a shared session key through a secure key negotiation process:
Since the key negotiation process relies on the private keys of both parties and the negotiation results are unknown to both parties, even if the middleman intercepts the information of the negotiation process, he cannot calculate the session key. At the same time, each message is accompanied by an aggregate message authentication code (AMAC) based on a shared key to verify the integrity and source authenticity of the message, which can fully protect the communication between the vehicle and the RSU.
  3.3. Performance Analysis of IoV Authentication Based on Cloud-Edge-Client Collaborative Architecture
In this section, we evaluate the average processing time required for a vehicle V to send data to an RSU and complete the authentication process under three different scenarios, as defined below.
Scenario 1: Vehicle V remains within the communication range of the RSU and does not need to forward data to other forwarding node vehicles. This scenario is referred to as “No forwarding”.
Scenario 2: Vehicle V has exited the communication range of the RSU while sending data, necessitating the forwarding of data to another vehicle . In this case, Vehicle  remains within the RSU’s communication range, allowing it to send the data including the aggregated message authentication code to the RSU. This scenario is referred to as “1 forwarding”.
Scenario 3: Vehicle V has exited the RSU’s communication range while sending data, requiring the data to be forwarded to vehicle . However, vehicle  also exits the RSU’s communication range during forwarding, necessitating a further forward to vehicle . Vehicle  remains within the RSU’s communication range and sends the data, including the re-aggregated message authentication code, to the RSU. This scenario is referred to as “2 forwarding”.
Mohamed, Ahmed [
46] proposed a new message passing and authentication protocol using an optimized version of the RSA protocol to reduce the total computation time of each forwarding node. In our performance analysis, we compare the proposed scheme with the work of Mohamed, Ahmed [
46] in terms of processing time for no forwarding, 1 forwarding, and 2 forwarding. The analysis results are presented in 
Table 3.
The experimental results show that, as the number of forwarding steps increases, the processing time of the two schemes shows a linear growth trend. In the scenario of no forwarding, our scheme improves the authentication processing efficiency by an average of 24.7% per message. In the scenario of 1 forwarding and 2 forwarding, our scheme achieves an average efficiency improvement of 8.3% and 5.0% per message, respectively.
In the no forwarding scenario, the aggregation of message authentication codes is not required, resulting in significant efficiency improvement due to the inherent characteristics of message authentication codes. In the scenarios involving 1 or 2 forwarding, the use of Diffie-Hellman key exchange protocol to establish a shared key introduces additional computational overhead, leading to a decrease in efficiency improvement. However, the proposed scheme still demonstrates superior overall performance.
Leveraging the cloud-edge-client collaborative architecture, cloud platform C performs synchronous decryption, authentication, and monitoring, improving both the authentication efficiency and security within the vehicle network. This makes the proposed scheme more practical and applicable in real-world IoV scenarios.
  3.4. Traffic Response Strategy Simulation Experiment Under Vehicle Networking Authentication
Due to the complex and dynamic organizational structure of the IoV and the mobile nature of its nodes, accurately validating real vehicle experiments is challenging. Therefore, simulation software is utilized for experimental purposes [
47,
48,
49]. This section presents a simulation experiment designed to evaluate the authentication process within an IoV scenario and assess the impact of message transmission on the traffic system improvements following an accident. Through these simulations, we aim to verify the practical application value of the proposed scheme and offer a novel solution for enhancing urban traffic conditions and improving traffic safety.
In this research, we simulate the impact of vehicle networking under varying connected vehicle rates, congestion levels, and networking scenarios in diverse traffic conditions, focusing on authentication and response strategies.
  3.4.1. Simulation Experiment Design
The simulation experiments were conducted using OMNeT++6.0.3, Veins5.0.0 and SUMO1.19.0, as shown in 
Figure 8. The SUMO simulation was first employed to configure the road traffic environment and generate the traffic flow and vehicle motion models. Subsequently, OMNeT++ simulation was used to set up the vehicle network communication environment. Finally, the Veins platform was utilized to integrate SUMO and OMNeT++ and conduct simulation experiments.
  3.4.2. Simulation Results Analysis
(1) Traffic Parameter Analysis under Varying Connected Vehicle Penetration Rates
Intelligent connected vehicles have communication capabilities that allow them to receive and send critical information, such as accident warnings and traffic control instructions. In contrast, non-intelligent connected vehicles lack these functionalities. For the simulation, two main vehicle types were defined: vehicle-to-everything-equipped vehicles (V2X-equipped vehicles) and non-vehicle-to-everything-equipped vehicles (non-V2X-equipped vehicles). By simulating different levels of connected vehicle penetration, we aimed to evaluate the potential effectiveness of the IoV authentication based on the proposed cloud-edge-client collaborative architecture, focusing on its application to future transportation systems.
To control the penetration rate of intelligent connected vehicles, we adjusted the probability values assigned to V2X-equipped and non-V2X-equipped vehicles. The penetration rates were set to 10%, 30%, 50%, 70%, and 90%, as detailed in 
Table 4.
To effectively evaluate the performance of traffic response strategies under different penetration rates of V2X-equipped vehicles, we calculated key traffic parameters, including average vehicle speed, average vehicle waiting time, and accident handling time for each penetration rate scenario. The results are shown in 
Figure 9.
Regarding the average vehicle speed parameter, the results indicate a clear trend that as the penetration rate of V2X-equipped vehicles increases, the average speed first increases, peaks at a 50% penetration rate, and then slightly decreases. The initial increase in speed may be attributed to the fact that non-V2X-equipped vehicles, lacking the ability to receive control speed limit commands, avoid unnecessary deceleration before reaching the accident site. As the penetration rate continues to increase, the slight decrease in speed suggests that a majority of V2X-equipped vehicles have responded to the speed limit control command, thereby reducing their driving speed.
Regarding average waiting time and the accident handling time, results show that both parameters decrease significantly as the penetration rate of non-V2X-equipped vehicles increases from 10% to 50%. However, as the penetration rate increases from 50% to 90%, the reductions in both waiting time and handling time become more gradual and eventually stabilize.
For all three parameters, the scenario with a 50% penetration rate of V2X-equipped vehicles appears to yield the best accident response outcomes under the IoV authentication. However, this result is inconsistent with real-world expectations. The discrepancy may be due to the simplified speed limit strategy used in the simulation and the performance differences between non-V2X-equipped vehicles in simulation versus those in real-world scenarios.
(2) Analysis of Traffic Parameters under Different Congestion Conditions
Examining different congestion scenarios allowed us to demonstrate the adaptability and efficiency of traffic response strategies during peak and off-peak hours under the proposed authentication system. This analysis facilitates the study of optimizing information transmission and accident response strategies across varying traffic densities. In the simulation, traffic flow parameters were configured to represent various traffic environments in the real world, ranging from low to high congestion. The definitions of low, moderate, and high congestion are provided in 
Table 5.
This paper sets up simulation experiments with and without authentication and response control and assesses their impact under different congestion conditions. The results of these simulations are illustrated in 
Figure 10.
(3) Traffic Parameter Analysis at Different Locations
The IoV environment exhibits diverse communication and traffic characteristics across various geographical locations, such as city centers, suburbs, and highways. These differences in road conditions, traffic flow, and accident processing times can significantly impact the effectiveness of IoV authentication and response strategies. Therefore, it is crucial to assess the performance of authentication and traffic accident response solutions in these varied traffic environments. This section focuses on three different road networks: Urban areas, suburbs, and highways, as illustrated in 
Figure 11. The specific attribute characteristics are shown in 
Table 6.
The simulation results at different locations reflect the different traffic characteristics of urban areas, suburbs and highway networks. The specific results are shown in 
Figure 12.
In the urban road network, the average speed of vehicles is 7.44 m/s, the average waiting time of vehicles is 411.43 s, and the accident handling time is 448.06 s. These data show that urban road networks face severe congestion and traffic problems, particularly during accidents. The low average speed and long waiting time are caused by factors such as high road network density, frequent intersections and traffic signal control. Future research could focus on improving the use of infrastructure, such as integrating intelligent traffic signal control systems to adjust signal duration based on real-time traffic conditions to reduce congestion.
In contrast, the traffic conditions in suburban road networks are better than those in urban areas. The average speed is 12.35 m/s, the average waiting time is 212.75 s, and the accident handling time is 262.24 s. It shows that due to the low traffic density, small traffic flow, and wide roads, the traffic flow and accident handling efficiency of suburban road networks in accidents are still high. However, the suburban road network is relatively simple and has less infrastructure, which may lead to traffic pressure concentrated on a few main roads. We can strengthen the information construction of suburban roads and use smart traffic management systems for real-time monitoring and control.
The highway network has the highest average vehicle speed, reaching 18.03 m/s, the average waiting time is only 1.28 s, and the accident handling time is 21.47 s. This shows that the traffic flow on the highway section is extremely high, the vehicle speed is fast, and the vehicle waiting time and accident handling time are very short. However, the high speed of the highway will also increase the risk and severity of accidents. We can strengthen the construction of smart highways, predict and warn possible accidents, reduce the accident rate and mitigate the consequences of accidents.
  4. Conclusions
This paper addresses IoV security by integrating network security’s message authentication, proposing an adaptive traffic authentication strategy and a cloud-edge-client IoV authentication scheme. Additionally, it utilizes a joint simulation of traffic and network models to validate and analyze the authentication and traffic response strategies.
(1) The performance and characteristics of several key digital signature schemes in the context of vehicle network authentication have been analyzed and tested. Based on the standard elliptic curve ECDSA and Edwards curve EdDSA, and by integrating various parameters of vehicles in the IoV scenario, an adaptive traffic authentication strategy, ATAS, has been proposed. By assessing the dynamics of traffic flow, scoring the traffic state, evaluating time sensitivity, and constructing a comprehensive authentication strategy decision-making process, an authentication scheme has been developed that can automatically balance efficiency and security according to traffic volume. This scheme takes into account both the efficiency and security of message authentication in the IoV scenario. Under different numbers of vehicle authentications, ATAS effectively reduces the processing time. Especially in the case of a high number of vehicle authentications, the processing time decreases from 1.59 milliseconds to 1.17 milliseconds, demonstrating the significant role of ATAS in performance optimization.
(2) In response to the high overhead and security issues associated with multiple message forwarding in large-scale IoV application scenarios, this paper proposes a secure message transmission and authentication scheme based on a cloud-edge-client collaborative architecture. By utilizing the technology of aggregate message authentication codes to verify the authenticity and integrity of messages, communication overhead is reduced. Meanwhile, a cloud platform is set up as a ‘cloud’ end that supervises the broadcasting of RSU messages, the RSU is positioned as the ‘edge’ end in the architecture, and the vehicles are considered as the ‘client’ end within the architecture, ensuring the correctness of the transmission of authenticated messages. This scheme outperforms existing schemes in scenarios with no forwarding, 1 forwarding, and 2 forwarding, demonstrating higher efficiency and lower communication costs. Particularly in the scenario with no forwarding, the average authentication processing efficiency per message is improved by 24.7% when adopting this scheme.
(3) Utilizing the software SUMO, OMNeT++, and the Veins simulation platform, a joint simulation experimental environment for the vehicle network was established. The interactions and authentication processes between vehicles, RSUs, and cloud platforms, as well as the impact of response strategies on traffic parameters after incidents, were simulated under different intelligent connected vehicle penetration rates, varying congestion conditions, and diverse location scenarios. This provides strong support for secure communication and efficient management in the vehicle network. For scenarios with different penetration rates of connected and autonomous vehicles, the accident response effect under Internet of Vehicles (IoV) authentication is optimal when the penetration rate reaches 50%. For scenarios with different congestion levels, particularly in highly congested scenarios, the average vehicle speed increases from 6.1 m/s to 6.43 m/s; the average vehicle waiting time decreases from 398.56 s to 361.38 s, representing an improvement of 9.3%; and the accident handling time drops from 475.26 s to 439.41 s, with an improvement of 7.54%. For scenarios in different locations, this paper explores the impacts of urban road networks, suburban road networks, and highway road networks on IoV authentication and response strategies.
Some of the shortcomings and areas in this research that can be further studied and improved are as follows:
(1) In the ATAS, this paper uses the percentage of detector occupancy by vehicles in the current and previous time intervals, the average vehicle speed, and the number of vehicles for assessment and decision-making. Such decision-making still has a certain degree of one-sidedness. In actual IoV scenarios, traffic characteristic parameters such as vehicle travel paths and speeds are more complex. Therefore, in future research, it should be considered to combine more parameters, such as vehicle travel paths and vehicle locations, or to integrate analysis with multi-source traffic big data from radar and video.
(2) In the security message transmission and authentication scheme based on the cloud-edge-client collaborative architecture, this paper utilizes cloud platform C to authenticate and decrypt the received messages synchronously and monitor the RSU to ensure the correctness and integrity of the RSU’s broadcast messages. However, in real IoV scenarios, the cost is relatively high. Future research could consider using some slow-moving vehicles to replace the functions of the cloud platform or RSU, under the premise of ensuring safety, improving the efficiency of information transmission, reducing the operating costs of the vehicle network, and strengthening the practical recommendations.
(3) In the simulation experiments of traffic response strategies under vehicle network authentication, although different locations of road networks were selected, only one scenario was chosen for each of the three types of road networks. Road traffic conditions at diverse locations may vary significantly. Future research could consider enriching the simulation scenarios, such as conducting simulation experiments in diverse locations, different scales, and other scenarios, to assess the feasibility and guidance of the scheme.
(4) Regarding the conclusion that the optimal response is achieved at a 50% penetration rate of connected and autonomous vehicles, we will integrate multiple measures into the response strategy in future research, such as variable speed limit [
50], ramp control [
51] and emergency lane control [
52].
(5) This paper does not explore the impacts of different types of OBUs. In future research, we will design optimized algorithms specifically for OBUs to ensure the compatibility of the proposed scheme with various types of OBUs.
(6) The current simulation is based on a small-scale scenario and does not fully consider the scalability challenges (e.g., the number of RSUs) in real-world deployments. In subsequent studies, we plan to explore optimized schemes through large-scale simulations.