An Enhanced Elliptic Curve Cryptography Scheme for Secure Data Transmission to Evade Entailment of Fake Vehicles in VANET

被引:2
|
作者
Patil, Mayur Jagdish [1 ]
Adhiya, Krishnakant P. [2 ]
机构
[1] RC Patel Inst Technol, Dept Comp Engn, Shirpur, Maharashtra, India
[2] SSBTs Coll Engn & Technol, Dept Comp Engn, Jalgaon, Maharashtra, India
关键词
Adaptive horse herd optimization algorithm; enhanced elliptic curve cryptography; evade fake vehicles; key generation; road side unit; secure data transmission; vehicular Ad-hoc networks; PRIVACY-PRESERVING AUTHENTICATION;
D O I
10.1080/01969722.2022.2157601
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Vehicular Ad-hoc Networks (VANET) help to increase traffic safety, manageability, and efficiency. VANET facilitates effective communication in the vehicular nodes. Here, the network attack is one of the significant consequences of VANET, which may affect network security. The high mobility of the nodes may become difficult to transfer the data through the vehicle. In this article, a novel method of Elliptic Curve Cryptography (ECC) is proposed. The key is generated by Key Generation Unit (KGU), and also the key is fed into the Road Side Unit (RSU). The keys in Enhanced ECC (EECC) are optimized using the Adaptive Horse herd Optimization Algorithm (AHOA). During decryption, the key of source node K1 is to be taken from RSU, where the key is processed by the Digital Signature method to obtain EECC key K2. With the generated K2, the destination node can retrieve the data by the proposed model. Thus, the simulation analysis of the proposed AHOA-EECC method has attained less time complexity which was compared against the high value of 5%, 12.4%, 50%, and 13.7% for GWO-EECC, PSO-EECC, AOA-EECC, and HOA-EECC. Finally, the outcome of the proposed system enhances the security level and performs better data transmission.
引用
收藏
页码:2405 / 2439
页数:35
相关论文
共 50 条
  • [31] Enhanced Performance and Data Security using Elliptic Curve Cryptography in Cloud Environment
    Acharya, Shreenath
    Manoj, K.
    Gayana, M. N.
    2021 INTERNATIONAL CONFERENCE ON COMPUTATIONAL PERFORMANCE EVALUATION (COMPE-2021), 2021, : 869 - 873
  • [32] An Improved and Secure Biometric Authentication Scheme for Telecare Medicine Information Systems Based on Elliptic Curve Cryptography
    Chaudhry, Shehzad Ashraf
    Mahmood, Khalid
    Naqvi, Husnain
    Khan, Muhammad Khurram
    JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (11)
  • [33] An Improved and Secure Biometric Authentication Scheme for Telecare Medicine Information Systems Based on Elliptic Curve Cryptography
    Shehzad Ashraf Chaudhry
    Khalid Mahmood
    Husnain Naqvi
    Muhammad Khurram Khan
    Journal of Medical Systems, 2015, 39
  • [34] A new secure e-mail scheme based on Elliptic Curve Cryptography Combined Public Key
    Zhang, Yi
    Cui, Tianxi
    Tang, Hong
    2008 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING, PROCEEDINGS, 2008, : 336 - +
  • [35] A secure and robust elliptic curve cryptography-based mutual authentication scheme for session initiation protocol
    Nikooghadam, Mahdi
    Amintoosi, Haleh
    SECURITY AND PRIVACY, 2020, 3 (01):
  • [36] Provably secure and pairing-free certificateless digital signature scheme using elliptic curve cryptography
    Islam, S. K. Hafizul
    Biswas, G. P.
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2013, 90 (11) : 2244 - 2258
  • [37] Optimal Elliptic Curve Cryptography-Based Effective Approach for Secure Data Storage in Clouds
    Malik, Anju
    Aggarwal, Mayank
    Sharma, Bharti
    Singh, Akansha
    Singh, Krishna Kant
    INTERNATIONAL JOURNAL OF KNOWLEDGE AND SYSTEMS SCIENCE, 2020, 11 (04) : 65 - 81
  • [38] A privacy-preserving authentication scheme based on Elliptic Curve Cryptography and using Quotient Filter in fog-enabled VANET
    Goudarzi, Shidrokh
    Soleymani, Seyed Ahmad
    Anisi, Mohammad Hossein
    Azgomi, Mohammad Abdollahi
    Movahedi, Zeinab
    Kama, Nazri
    Rusli, Hazlifah Mohd
    Khan, Muhammad Khurram
    AD HOC NETWORKS, 2022, 128
  • [39] Design of a secure anonymity-preserving authentication scheme for session initiation protocol using elliptic curve cryptography
    Kumari, Saru
    Karuppiah, Marimuthu
    Das, Ashok Kumar
    Li, Xiong
    Wu, Fan
    Gupta, Vidushi
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2018, 9 (03) : 643 - 653
  • [40] A Secure and Robust Smartcard-Based Authentication Scheme for Session Initiation Protocol Using Elliptic Curve Cryptography
    Dheerendra Mishra
    Ashok Kumar Das
    Sourav Mukhopadhyay
    Mohammad Wazid
    Wireless Personal Communications, 2016, 91 : 1361 - 1391