Secure Separation of the Infrastructure in Software-defined Overlay-enabled Internet of Vehicles (IoV)
Subject Areas : Multimedia Processing, Communications Systems, Intelligent Systems
Shaharm Bahrak
1
,
Mani Zarei
2
1 - MSc, Department of Computer Engineering, ShQ.C., Islamic Azad University, Shahr-e Qods, Iran
2 - Assistant Professor, Department of Computer Engineering, ShQ.C., Islamic Azad University, Shahr-e Qods, Iran
Keywords: Internet of Vehicles (IoV), Overlay model, software-defined networking,
Abstract :
The Internet of Vehicles (IoV) is becoming increasingly popular in both academic communities and modern industrial ecosystems. The shared communication substrate of IoV networks with other communication networks, such as mobile networks and mobile data networks, can impose significant security risks on neglecting security upgrading of this infrastructure and the absence of a proper policy for selecting the key elements of the network can readily disrupt the Intelligent transportation system (ITS). Software-defined networking (SDN), with ITS intrinsic capabilities, can render IoV networks more secure and scalable. SDN provides advantages such as improved traffic control, smart routing, quality of service, and road-aware decision making. One effective SDN approach is to employ a coverage model. The overlay model enables the creation of a virtual network consisting of authorized nodes atop the physical network to realize the decoupling of the physical layer, which can be regarded as the first line of defense for network security. In this paper, an SDN overlay model for the IoV is proposed to enable a secure communication infrastructure. The model consists of establishing a virtual and geographically partitioned network over the underlying physical network, along with the creation of communication tunnels and encryption of information packets, thereby forming a multi-path mesh connectivity. Simulation results show that the proposed model can improve end-to-end delay, resource utilization, and average response times compared to both other SDN networking approaches and traditional models. The proposed model creates a suitable roadmap for improving security concerns in this field.
[1] X. Hou et al., "Reliable computation offloading for edge-computing-enabled software-defined IoV," (in eng), IEEE Internet of Things Journal, vol. 7, no. 8, pp. 7097-7111, 2020. doi: 10.1109/JIOT.2020.2982292
[2] A. J. Kadhim, S. A. H. Seno, J. I. Naser, and J. Hajipour, "DMPFS: Delay-efficient multicasting based on parked vehicles, fog computing and SDN in vehicular networks," Vehicular Communications, vol. 36, p. 100488, 2022. doi: https://doi.org/10.1016/j.vehcom.2022.100488
[3] B. Cao, Z. Sun, J. Zhang, and Y. Gu, "Resource allocation in 5G IoV architecture based on SDN and fog-cloud computing," IEEE transactions on intelligent transportation systems, vol. 22, no. 6, pp. 3832-3840, 2021, doi: 10.1109/TCSS.2023.3343084
[4] A. Hemmati and M. J. A. I. Zarei, "UFC3: UAV-aided fog computing based congestion control strategy for emergency message dissemination in 5G internet of vehicles," vol. 7, no. 3, pp. 456-472, 2024, https://doi.org/10.1007/s42154-024-00284-1
[5] A. Hemmati, M. Zarei, A. M. Rahmani, "Big data challenges and opportunities in Internet of Vehicles: a systematic review," vol. 20, no. 2, pp. 308-342, 2024. https://doi.org/10.1108/IJPCC-09-2023-0250
[6] P. K. Tiwari et al., "A Secure and Robust Machine Learning Model for Intrusion Detection in Internet of Vehicles," IEEE Access, 2025, doi: 10.1109/ACCESS.2025.3532716
[7] M. M. A. Muslam, "Enhancing security in vehicle-to-vehicle communication: A comprehensive review of protocols and techniques," (in eng), Vehicles, vol. 6, no. 1, pp. 450-467, 2024, doi: 10.3390/vehicles6010020
[8] Y. Wang, A. Mahmood, M. F. Mohd Sabri, and H. Zen, "Towards distinguishing trust based attacks in an IoV network," Journal of King Saud University Computer and Information Sciences, vol. 37, no. 4, pp. 1-15, 2025, doi: https://doi.org/10.1007/s44443-025-00037-y
[9] K. N. Tripathi, A. M. Yadav, S. Nagar, and S. Sharma, "ReTrust: reliability and recommendation trust-based scheme for secure data sharing among internet of vehicles (IoV)," Wireless Networks, vol. 29, no. 6, pp. 2551-2575, 2023, doi: 10.1007/s11276-023-03336-2
[10] H. Cui and X. Yi, "Secure Internet of Things in cloud computing via puncturable attribute-based encryption with user revocation," IEEE Internet of Things Journal, vol. 11, no. 2, pp. 3662-3670, 2023, doi: 10.1109/JIOT.2023.3297997
[11] T. Cao, J. Yi, X. Wang, H. Xiao, and C. Xu, "Interaction trust-driven data distribution for vehicle social networks: A matching theory approach," IEEE Transactions on Computational Social Systems, vol. 11, no. 3, pp. 4071-4086, 2024, doi: 10.1109/TITS.2020.3048844
[12] D. Das, S. Banerjee, W. Mansoor, U. Biswas, P. Chatterjee, and U. Ghosh, "Design of a secure blockchain-based smart iov architecture," in 2020 3rd International Conference on Signal Processing and Information Security (ICSPIS), 2020, pp. 1-4: IEEE, doi: 10.1109/ICSPIS51252.2020.9340142
[13] M. Shahzad, L. Liu, A. Kaushik, I. Bibi, and N. E. Belkout, "Fair switch selection for large scale software defined networks in next generation internet of things," (in eng), Telecommunication Systems, vol. 88, no. 2, pp. 1-14, 2025, doi: https://doi.org/10.1007/s11235-025-01290-2
[14] E. Khezri, H. Hassanzadeh, R. O. Yahya, and M. Mir, "Security challenges in internet of vehicles (IoV) for ITS: A survey," (in eng), Tsinghua Science and Technology, vol. 30, no. 4, pp. 1700-1723, 2025, doi: 10.26599/TST.2024.9010083
[15] S. R. Pokhrel, "Software defined internet of vehicles for automation and orchestration," (in eng), IEEE Transactions on Intelligent Transportation Systems, vol. 22, no. 6, pp. 3890-3899, 2021, doi: 10.1109/TITS.2021.3077363
[16] A. Akbar, M. Ibrar, M. A. Jan, L. Wang, N. Shah, and H. H. Song, "SeAC: SDN-enabled adaptive clustering technique for social-aware internet of vehicles," (in eng), IEEE Transactions on Intelligent Transportation Systems, vol. 24, no. 5, pp. 4827-4835, 2023, doi: 10.1109/TITS.2023.3237321
[17] M. T. Abbas, A. Muhammad, and W.-C. Song, "SD-IoV: SDN enabled routing for internet of vehicles in road-aware approach," Journal of Ambient Intelligence and Humanized Computing, vol. 11, no. 3, pp. 1265-1280, 2020, doi: https://doi.org/10.1007/s12652-019-01319-w
[18] L.-A. Phan, D.-T. Nguyen, M. Lee, D.-H. Park, and T. Kim, "Dynamic fog-to-fog offloading in SDN-based fog computing systems," (in eng), Future Generation Computer Systems, vol. 117, pp. 486-497, 2021, doi: https://doi.org/10.1016/j.future.2020.12.021
[19] A. J. Kadhim and S. A. H. Seno, "Maximizing the utilization of fog computing in internet of vehicle using SDN," (in eng), IEEE Communications Letters, vol. 23, no. 1, pp. 140-143, 2018, doi: 10.1109/LCOMM.2018.2878710
[20] B. Alaya and L. Sellami, "Toward the design of an efficient and secure system based on the software-defined network paradigm for vehicular networks," (in eng), IEEE Access, vol. 11, pp. 43333-43348, 2023, doi: 10.1109/ACCESS.2023.3264808
[21] A. A. Khadir and S. A. H. Seno, "SDN-based offloading policy to reduce the delay in fog-vehicular networks," (in eng), Peer-to-Peer Networking and Applications, vol. 14, no. 3, pp. 1261-1275, 2021, doi: https://doi.org/10.1007/s12083-021-01111-8
[22] R. Kait, S. Kaur, P. Sharma, C. Ankita, T. Kumar, and X. Cheng, "Fuzzy logic‐based trusted routing protocol using vehicular cloud networks for smart cities," Expert Systems, vol. 42, no. 1, p. e13561, 2025, doi: https://doi.org/10.1111/exsy.13561
[23] H. M. Islam et al., "Revisiting ONE Simulator in IoV Research: Seeing the Forest Through the Trees," IEEE Access, 2025, doi: 10.1109/ACCESS.2025.3552026
[24] S. R. Pappu and K. C. Chilukuri, "SDN controller selection and secure resource allocation," (in eng), IEEE Access, 2025, doi: 10.1109/ACCESS.2025.3565117
