An Enhanced Elliptic Curve Cryptography Scheme for Secure Data Transmission to Evade Entailment of Fake Vehicles in VANET

被引:2
|
作者
Patil, Mayur Jagdish [1 ]
Adhiya, Krishnakant P. [2 ]
机构
[1] RC Patel Inst Technol, Dept Comp Engn, Shirpur, Maharashtra, India
[2] SSBTs Coll Engn & Technol, Dept Comp Engn, Jalgaon, Maharashtra, India
关键词
Adaptive horse herd optimization algorithm; enhanced elliptic curve cryptography; evade fake vehicles; key generation; road side unit; secure data transmission; vehicular Ad-hoc networks; PRIVACY-PRESERVING AUTHENTICATION;
D O I
10.1080/01969722.2022.2157601
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Vehicular Ad-hoc Networks (VANET) help to increase traffic safety, manageability, and efficiency. VANET facilitates effective communication in the vehicular nodes. Here, the network attack is one of the significant consequences of VANET, which may affect network security. The high mobility of the nodes may become difficult to transfer the data through the vehicle. In this article, a novel method of Elliptic Curve Cryptography (ECC) is proposed. The key is generated by Key Generation Unit (KGU), and also the key is fed into the Road Side Unit (RSU). The keys in Enhanced ECC (EECC) are optimized using the Adaptive Horse herd Optimization Algorithm (AHOA). During decryption, the key of source node K1 is to be taken from RSU, where the key is processed by the Digital Signature method to obtain EECC key K2. With the generated K2, the destination node can retrieve the data by the proposed model. Thus, the simulation analysis of the proposed AHOA-EECC method has attained less time complexity which was compared against the high value of 5%, 12.4%, 50%, and 13.7% for GWO-EECC, PSO-EECC, AOA-EECC, and HOA-EECC. Finally, the outcome of the proposed system enhances the security level and performs better data transmission.
引用
收藏
页码:2405 / 2439
页数:35
相关论文
共 50 条
  • [41] A secure and efficient identity-based mutual authentication scheme with smart card using elliptic curve cryptography
    Luo, Min
    Zhang, Yunru
    Khan, Muhammad Khurram
    He, Debiao
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (16)
  • [42] A Secure and Robust Smartcard-Based Authentication Scheme for Session Initiation Protocol Using Elliptic Curve Cryptography
    Mishra, Dheerendra
    Das, Ashok Kumar
    Mukhopadhyay, Sourav
    Wazid, Mohammad
    WIRELESS PERSONAL COMMUNICATIONS, 2016, 91 (03) : 1361 - 1391
  • [43] A secure energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography
    Zhang, Yuanyuan
    Kumar, Neeraj
    Chen, Jianhua
    Rodrigues, Joel J. P. C.
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 3944 - 3951
  • [44] A secure and privacy preserving lightweight authentication scheme for smart-grid communication using elliptic curve cryptography
    Sadhukhan, Dipanwita
    Ray, Sangram
    Obaidat, Mohammad S.
    Dasgupta, Mou
    JOURNAL OF SYSTEMS ARCHITECTURE, 2021, 114
  • [45] Design of a secure anonymity-preserving authentication scheme for session initiation protocol using elliptic curve cryptography
    Saru Kumari
    Marimuthu Karuppiah
    Ashok Kumar Das
    Xiong Li
    Fan Wu
    Vidushi Gupta
    Journal of Ambient Intelligence and Humanized Computing, 2018, 9 : 643 - 653
  • [46] Enhanced Secure Data Authentication and Transmission Using RDHSS Scheme
    Abhijith, S.
    Viswanath, N.
    PROCEEDINGS OF 2016 ONLINE INTERNATIONAL CONFERENCE ON GREEN ENGINEERING AND TECHNOLOGIES (IC-GET), 2016,
  • [47] EGCrypto: A Low-Complexity Elliptic Galois Cryptography Model for Secure Data Transmission in IoT
    Kaur, Manjit
    Alzubi, Ahmad Ali
    Walia, Tarandeep Singh
    Yadav, Vaishali
    Kumar, Naresh
    Singh, Dilbag
    Lee, Heung-No
    IEEE ACCESS, 2023, 11 : 90739 - 90748
  • [48] Improved authentication and computation of medical data transmission in the secure IoT using hyperelliptic curve cryptography
    B. Prasanalakshmi
    K. Murugan
    Karthik Srinivasan
    S. Shridevi
    Shermin Shamsudheen
    Yu-Chen Hu
    The Journal of Supercomputing, 2022, 78 : 361 - 378
  • [49] Enhanced image hash using cellular automata with sponge construction and elliptic curve cryptography for secure image transaction
    M. Mohammed Ibrahim
    R. Venkatesan
    Nasir Ali
    Muhammad Imran Qureshi
    Hafiz Muhammad Afzal Siddiqui
    Fikadu Tesgera Tolasa
    Suhad Ali Osman Abdallah
    Scientific Reports, 15 (1)
  • [50] Improved authentication and computation of medical data transmission in the secure IoT using hyperelliptic curve cryptography
    Prasanalakshmi, B.
    Murugan, K.
    Srinivasan, Karthik
    Shridevi, S.
    Shamsudheen, Shermin
    Hu, Yu-Chen
    JOURNAL OF SUPERCOMPUTING, 2022, 78 (01): : 361 - 378