An Enhanced Elliptic Curve Cryptography Scheme for Secure Data Transmission to Evade Entailment of Fake Vehicles in VANET

被引:2
|
作者
Patil, Mayur Jagdish [1 ]
Adhiya, Krishnakant P. [2 ]
机构
[1] RC Patel Inst Technol, Dept Comp Engn, Shirpur, Maharashtra, India
[2] SSBTs Coll Engn & Technol, Dept Comp Engn, Jalgaon, Maharashtra, India
关键词
Adaptive horse herd optimization algorithm; enhanced elliptic curve cryptography; evade fake vehicles; key generation; road side unit; secure data transmission; vehicular Ad-hoc networks; PRIVACY-PRESERVING AUTHENTICATION;
D O I
10.1080/01969722.2022.2157601
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Vehicular Ad-hoc Networks (VANET) help to increase traffic safety, manageability, and efficiency. VANET facilitates effective communication in the vehicular nodes. Here, the network attack is one of the significant consequences of VANET, which may affect network security. The high mobility of the nodes may become difficult to transfer the data through the vehicle. In this article, a novel method of Elliptic Curve Cryptography (ECC) is proposed. The key is generated by Key Generation Unit (KGU), and also the key is fed into the Road Side Unit (RSU). The keys in Enhanced ECC (EECC) are optimized using the Adaptive Horse herd Optimization Algorithm (AHOA). During decryption, the key of source node K1 is to be taken from RSU, where the key is processed by the Digital Signature method to obtain EECC key K2. With the generated K2, the destination node can retrieve the data by the proposed model. Thus, the simulation analysis of the proposed AHOA-EECC method has attained less time complexity which was compared against the high value of 5%, 12.4%, 50%, and 13.7% for GWO-EECC, PSO-EECC, AOA-EECC, and HOA-EECC. Finally, the outcome of the proposed system enhances the security level and performs better data transmission.
引用
收藏
页码:2405 / 2439
页数:35
相关论文
共 50 条
  • [1] Secure Data Transmission Scheme Based on Elliptic Curve Cryptography for Internet of Things
    Harbi, Yasmine
    Aliouat, Zibouda
    Harous, Saad
    Bentaleb, Abdelhak
    MODELLING AND IMPLEMENTATION OF COMPLEX SYSTEMS, 2019, 64 : 34 - 46
  • [2] Secure Image Transmission Using Chaotic-Enhanced Elliptic Curve Cryptography
    Abdelfatah, Roayat Ismail
    IEEE ACCESS, 2020, 8 : 3875 - 3890
  • [3] A secure authenticated image encryption scheme based on elliptic curve cryptography
    Jnana Ramakrishna C.
    Bharath Kalyan Reddy D.
    Amritha P.P.
    Lakshmy K.V.
    Sachnev V.
    International Journal of Computers and Applications, 2024, 46 (03) : 184 - 193
  • [4] Elliptic Curve Cryptography-Based Scheme for Secure Signaling and Data Exchanges in Precision Agriculture
    Abduljabbar, Zaid Ameen
    Nyangaresi, Vincent Omollo
    Jasim, Hend Muslim
    Ma, Junchao
    Hussain, Mohammed Abdulridha
    Hussien, Zaid Alaa
    Aldarwish, Abdulla J. Y.
    SUSTAINABILITY, 2023, 15 (13)
  • [5] A Secure Key Predistribution Scheme for WSN Using Elliptic Curve Cryptography
    Rajendiran, Kishore
    Sankararajan, Radha
    Palaniappan, Ramasamy
    ETRI JOURNAL, 2011, 33 (05) : 791 - 801
  • [6] Secure Data Access in Hadoop Using Elliptic Curve Cryptography
    Diaz, Antonio F.
    Blokhin, Ilia
    Ortega, Julio
    Palacios, Raul H.
    Rodriguez-Quintana, Cristina
    Diaz-Garcia, Juan
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2016 COLLOCATED WORKSHOPS, 2016, 10049 : 136 - 145
  • [7] A secure and enhanced elliptic curve cryptography-based dynamic authentication scheme using smart card
    Madhusudhan, R.
    Hegde, Manjunath
    Memon, Imran
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (11)
  • [8] New Proxy Blind Signcryption Scheme for Secure Multiple Digital Messages Transmission Based on Elliptic Curve Cryptography
    Su, Pin-Chang
    Tsai, Chien-Hua
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (11): : 5537 - 5555
  • [9] Efficient and secure e-voting scheme using elliptic curve cryptography
    Chatterjee, Uddalak
    Ray, Sangram
    Adhikari, Sharmistha
    Khan, Muhammad Khurram
    Dasgupta, Mou
    SECURITY AND PRIVACY, 2023, 6 (03)
  • [10] A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers
    Kumari, Saru
    Karuppiah, Marimuthu
    Das, Ashok Kumar
    Li, Xiong
    Wu, Fan
    Kumar, Neeraj
    JOURNAL OF SUPERCOMPUTING, 2018, 74 (12): : 6428 - 6453