An Enhanced Elliptic Curve Cryptography Scheme for Secure Data Transmission to Evade Entailment of Fake Vehicles in VANET

被引:2
|
作者
Patil, Mayur Jagdish [1 ]
Adhiya, Krishnakant P. [2 ]
机构
[1] RC Patel Inst Technol, Dept Comp Engn, Shirpur, Maharashtra, India
[2] SSBTs Coll Engn & Technol, Dept Comp Engn, Jalgaon, Maharashtra, India
关键词
Adaptive horse herd optimization algorithm; enhanced elliptic curve cryptography; evade fake vehicles; key generation; road side unit; secure data transmission; vehicular Ad-hoc networks; PRIVACY-PRESERVING AUTHENTICATION;
D O I
10.1080/01969722.2022.2157601
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Vehicular Ad-hoc Networks (VANET) help to increase traffic safety, manageability, and efficiency. VANET facilitates effective communication in the vehicular nodes. Here, the network attack is one of the significant consequences of VANET, which may affect network security. The high mobility of the nodes may become difficult to transfer the data through the vehicle. In this article, a novel method of Elliptic Curve Cryptography (ECC) is proposed. The key is generated by Key Generation Unit (KGU), and also the key is fed into the Road Side Unit (RSU). The keys in Enhanced ECC (EECC) are optimized using the Adaptive Horse herd Optimization Algorithm (AHOA). During decryption, the key of source node K1 is to be taken from RSU, where the key is processed by the Digital Signature method to obtain EECC key K2. With the generated K2, the destination node can retrieve the data by the proposed model. Thus, the simulation analysis of the proposed AHOA-EECC method has attained less time complexity which was compared against the high value of 5%, 12.4%, 50%, and 13.7% for GWO-EECC, PSO-EECC, AOA-EECC, and HOA-EECC. Finally, the outcome of the proposed system enhances the security level and performs better data transmission.
引用
收藏
页码:2405 / 2439
页数:35
相关论文
共 50 条
  • [21] An enhanced authentication scheme for Internet of Things and cloud based on elliptic curve cryptography
    Bhuarya, Pallavi
    Chandrakar, Preeti
    Ali, Rifaqat
    Sharaff, Aakanksha
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2021, 34 (10)
  • [22] A security enhanced password authentication and update scheme based on elliptic curve cryptography
    Qiao, Pengshuai
    Tu, Hang
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2014, 6 (02) : 130 - 139
  • [23] Secure anonymous authentication scheme based on elliptic curve and zero-knowledge proof in VANET
    Li, Jin-Guo
    Lin, Ya-Ping
    Li, Rui
    Zhou, Si-Wang
    Tongxin Xuebao/Journal on Communications, 2013, 34 (05): : 52 - 61
  • [24] Secure Data Fusion Analysis on Certificateless Short Signature Scheme Based on Integrated Neural Networks and Elliptic Curve Cryptography
    Zou, Lina
    Wang, Xueying
    Deng, Lifeng
    EAI ENDORSED TRANSACTIONS ON SCALABLE INFORMATION SYSTEMS, 2022, 9 (34)
  • [25] An Enhanced Secure Data Provenance Scheme for the Internet of Vehicles
    Nepal, Anuj
    Doss, Robin
    Jiang, Frank
    2024 6TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND THE INTERNET, ICCCI 2024, 2024, : 156 - 162
  • [26] Combining Elliptic Curve Cryptography and Blockchain Technology to Secure Data Storage in Cloud Environments
    Benmenzer, Faiza
    Beghdad, Rachid
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2022, 16 (01)
  • [27] A secure data routing schema for WSN using Elliptic Curve Cryptography and homomorphic encryption
    Elhoseny, Mohamed
    Elminir, Hamdy
    Riad, Alaa
    Yuan, Xiaohui
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2016, 28 (03) : 262 - 275
  • [28] Secure sharing of data in cloud using MA-CPABE with elliptic curve cryptography
    Sandhia, G. K.
    Raja, S. V. K.
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 13 (8) : 3893 - 3902
  • [29] Secure sharing of data in cloud using MA-CPABE with elliptic curve cryptography
    G. K. Sandhia
    S. V. K. Raja
    Journal of Ambient Intelligence and Humanized Computing, 2022, 13 : 3893 - 3902
  • [30] Enhanced lion swarm optimization and elliptic curve cryptography scheme for secure cluster head selection and malware detection in IoT-WSN
    Rajkumar, D. Udaya Suriya
    Sathiyaraj, D.
    Bharathi, A.
    Mohan, D.
    Pellakuri, Vidyullatha
    SCIENTIFIC REPORTS, 2024, 14 (01):