Skip to main content
Top
Published in: Wireless Personal Communications 2/2023

05-10-2022

Improved Security of the Data Communication in VANET Environment Using ASCII-ECC Algorithm

Authors: S. Sajini, E. A. Mary Anita, J. Janet

Published in: Wireless Personal Communications | Issue 2/2023

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Now-a-days, with the augmenting accident statistics, the Vehicular Ad-hoc Networks (VANET) are turning out to be more popular, helping in prevention of accidents in addition to damage to the vehicles together with populace. In VANET, message can well be transmitted within a pre-stated region to attain system’s safety and also improve its efficacy. Ensuring authenticity of messages’ is a challenge in such dynamic environment. Though few researchers worked on this, security level is very less. Hence enhanced communication security on the VANET environment utilizing the American Standard Code for Information Interchange centred Elliptic Curve Cryptography (ASCII-ECC) is proposed in this paper. The network design is defined initially. Subsequently, the entire vehicles get registered to the Trusted Authority (TA); similarly, all vehicle users are registered with their On-Board Unit (OBU). This is followed by Median-centred K-Means (MKM) performs the cluster formation together with Cluster Head Selection (CHS). Next, TA takes care of the verification procedure. Modified Cockroach Swarm Optimization (MCSO) calculates the shortest path and the ASCII-ECC carries out the secure data communication if the vehicle is an authorized one. If not, TA sends the alert message for discarding the request. The system renders better performance when it was weighed against the top-notch methods.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Zhou, H., Wang, H., Chen, X., Li, X., & Shouzhi, Xu. (2018). Data offloading techniques through vehicular ad hoc networks: A survey. IEEE Access, 6, 65250–65259.CrossRef Zhou, H., Wang, H., Chen, X., Li, X., & Shouzhi, Xu. (2018). Data offloading techniques through vehicular ad hoc networks: A survey. IEEE Access, 6, 65250–65259.CrossRef
3.
go back to reference Garg, S., Singh, A., Kaur, K., Aujla, G. S., Batra, S., Kumar, N., & Obaidat, M. S. (2019). Edge computing-based security framework for big data analytics in VANETs. IEEE Network, 33(2), 72–81.CrossRef Garg, S., Singh, A., Kaur, K., Aujla, G. S., Batra, S., Kumar, N., & Obaidat, M. S. (2019). Edge computing-based security framework for big data analytics in VANETs. IEEE Network, 33(2), 72–81.CrossRef
4.
go back to reference Arif, M., Guojun Wang, Md., Bhuiyan, Z. A., Wang, T., & Chen, J. (2019). A survey on security attacks in VANETs: Communication, applications and challenges. Vehicular Communications, 19, 100179.CrossRef Arif, M., Guojun Wang, Md., Bhuiyan, Z. A., Wang, T., & Chen, J. (2019). A survey on security attacks in VANETs: Communication, applications and challenges. Vehicular Communications, 19, 100179.CrossRef
6.
go back to reference Hussain, R., Bouk, S. H., Javaid, N., Khan, A. M., & Lee, J. (2018). Realization of VANET-based cloud services through named data networking. IEEE Communications Magazine, 56(8), 168–175.CrossRef Hussain, R., Bouk, S. H., Javaid, N., Khan, A. M., & Lee, J. (2018). Realization of VANET-based cloud services through named data networking. IEEE Communications Magazine, 56(8), 168–175.CrossRef
8.
go back to reference Liu, L., Chen, C., Qiu, T., Zhang, M., Li, S., & Zhou, B. (2018). A data dissemination scheme based on clustering and probabilistic broadcasting in VANETs. Vehicular Communications, 13, 78–88.CrossRef Liu, L., Chen, C., Qiu, T., Zhang, M., Li, S., & Zhou, B. (2018). A data dissemination scheme based on clustering and probabilistic broadcasting in VANETs. Vehicular Communications, 13, 78–88.CrossRef
9.
go back to reference Khattak, H. A., Islam, S. U., Din, I. U., & Guizani, M. (2019). Integrating fog computing with VANETs: A consumer perspective. IEEE Communications Standards Magazine, 3(1), 19–25.CrossRef Khattak, H. A., Islam, S. U., Din, I. U., & Guizani, M. (2019). Integrating fog computing with VANETs: A consumer perspective. IEEE Communications Standards Magazine, 3(1), 19–25.CrossRef
10.
go back to reference Wan, C., & Zhang, J. (2018). Efficient identity-based data transmission for VANET. Journal of Ambient Intelligence and Humanized Computing, 9(6), 1861–1871.CrossRef Wan, C., & Zhang, J. (2018). Efficient identity-based data transmission for VANET. Journal of Ambient Intelligence and Humanized Computing, 9(6), 1861–1871.CrossRef
11.
go back to reference Malik, N., Nanda. P., Arora, A., He, X., & Puthal, D. (2018) Blockchain based secured identity authentication and expeditious revocation framework for vehicular networks. In 17th IEEE international conference on trust, security and privacy in computing and communications/12th international conference on big data science and engineering (TrustCom/BigDataSE), pp. 674–679, https://doi.org/10.1109/TrustCom/BigDataSE.2018.00099. Malik, N., Nanda. P., Arora, A., He, X., & Puthal, D. (2018) Blockchain based secured identity authentication and expeditious revocation framework for vehicular networks. In 17th IEEE international conference on trust, security and privacy in computing and communications/12th international conference on big data science and engineering (TrustCom/BigDataSE), pp. 674–679, https://​doi.​org/​10.​1109/​TrustCom/​BigDataSE.​2018.​00099.
15.
go back to reference Lyamin, N., Kleyko, D., Delooz, Q., & Vinel, A. (2018). AI-based malicious network traffic detection in VANETs. IEEE Network, 32(6), 15–21.CrossRef Lyamin, N., Kleyko, D., Delooz, Q., & Vinel, A. (2018). AI-based malicious network traffic detection in VANETs. IEEE Network, 32(6), 15–21.CrossRef
16.
go back to reference Boukerche, A., Tao, Y., & Sun, P. (2020). Artificial intelligence-based vehicular traffic flow prediction methods for supporting intelligent transportation systems. Computer Networks, 182, 107484.CrossRef Boukerche, A., Tao, Y., & Sun, P. (2020). Artificial intelligence-based vehicular traffic flow prediction methods for supporting intelligent transportation systems. Computer Networks, 182, 107484.CrossRef
17.
go back to reference Khalid, A., Umer, T., Afzal, M. K., Anjum, S., Sohail, A., & Asif, H. (2018). Autonomous data driven surveillance and rectification system using in-vehicle sensors for intelligent transportation systems (ITS). Computer Networks, 139, 109–118.CrossRef Khalid, A., Umer, T., Afzal, M. K., Anjum, S., Sohail, A., & Asif, H. (2018). Autonomous data driven surveillance and rectification system using in-vehicle sensors for intelligent transportation systems (ITS). Computer Networks, 139, 109–118.CrossRef
18.
go back to reference Manickam P., Shankar, K., Perumal, E., Ilayaraja, M., & Kumar, K.S. (2019) Secure data transmission through reliable vehicles in VANET using optimal lightweight cryptography, Cybersecurity and secure information systems. Springer, Cham, pp. 193–204, https://doi.org/10.1007/978-3-030-16837-7_9. Manickam P., Shankar, K., Perumal, E., Ilayaraja, M., & Kumar, K.S. (2019) Secure data transmission through reliable vehicles in VANET using optimal lightweight cryptography, Cybersecurity and secure information systems. Springer, Cham, pp. 193–204, https://​doi.​org/​10.​1007/​978-3-030-16837-7_​9.
20.
go back to reference Tang, Y., Cheng, N., Wen, Wu., Wang, M., Dai, Y., & Shen, X. (2019). Delay-minimization routing for heterogeneous VANETs with machine learning based mobility prediction. IEEE Transactions on Vehicular Technology, 68(4), 3967–3979.CrossRef Tang, Y., Cheng, N., Wen, Wu., Wang, M., Dai, Y., & Shen, X. (2019). Delay-minimization routing for heterogeneous VANETs with machine learning based mobility prediction. IEEE Transactions on Vehicular Technology, 68(4), 3967–3979.CrossRef
22.
go back to reference Kudva, S., Badsha, S., Sengupta, S., Khalil, I., & Zomaya, A. (2020). Towards secure and practical consensus for blockchain based VANET. Information Sciences, 545, 170–187.CrossRef Kudva, S., Badsha, S., Sengupta, S., Khalil, I., & Zomaya, A. (2020). Towards secure and practical consensus for blockchain based VANET. Information Sciences, 545, 170–187.CrossRef
25.
go back to reference Tyagi, P., & Dembla, D. (2018). Advanced secured routing algorithm of vehicular ad-hoc network. Wireless Personal Communications, 102(1), 41–60.CrossRef Tyagi, P., & Dembla, D. (2018). Advanced secured routing algorithm of vehicular ad-hoc network. Wireless Personal Communications, 102(1), 41–60.CrossRef
Metadata
Title
Improved Security of the Data Communication in VANET Environment Using ASCII-ECC Algorithm
Authors
S. Sajini
E. A. Mary Anita
J. Janet
Publication date
05-10-2022
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 2/2023
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-022-09974-7

Other articles of this Issue 2/2023

Wireless Personal Communications 2/2023 Go to the issue