Optimized security algorithm for connected vehicular network

被引:2
|
作者
Choudhary, Deepak [1 ]
机构
[1] NITK, Dept ECE, Surathkal, India
关键词
Privacy; Security; Internet of Things; Public salient cryptosystem component; Vehicular networks; TRANSMISSION; EFFICIENT; SCHEME;
D O I
10.1108/IJPCC-12-2021-0300
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
PurposeAs the number of devices that connect to the Internet of Things (IoT) has grown, privacy and security issues have come up. Because IoT devices collect so much sensitive information, like user names, locations, phone numbers and even how they usually use energy, it is very important to protect users' privacy and security. IoT technology will be hard to use on the client side because IoT-enabled devices do not have clear privacy and security controls. Design/methodology/approachIoT technology would be harder to use on the client side if the IoT did not offer enough well-defined ways to protect users' privacy and security. The goal of this research is to protect people's privacy in the IoT by using the oppositional artificial flora optimization (EGPKC-OAFA) algorithm to generate the best keys for the ElGamal public key cryptosystem (EGPKC). The EGPKC-OAFA approach puts the most weight on the IEEE 802.15.4 standard for MAC, which is the most important part of the standard. The security field is part of the MAC header of this standard. In addition, the MAC header includes EGPKC, which makes it possible to make authentication keys as quickly as possible. FindingsWith the proliferation of IoT devices, privacy and security have become major concerns in the academic world. Security and privacy are of the utmost importance due to the large amount of personally identifiable information acquired by IoT devices, such as name, location, phone numbers and energy use. Client-side deployment of IoT technologies will be hampered by the absence of well-defined privacy and security solutions afforded by the IoT. The purpose of this research is to present the EGPKC with optimum key generation using the EGPKC-OAFA algorithm for the purpose of protecting individual privacy within the context of the IoT. The EGPKC-OAFA approach is concerned with the MAC standard defined by the IEEE 802.15.4 standard, which includes the security field in its MAC header. Also, the MAC header incorporates EGPKC, which enables the fastest possible authentication key generation. In addition, the best methodology award goes to the OAFA strategy, which successfully implements the optimum EGPKC selection strategy by combining opposition-based (OBL) and standard AFA ideas. The EGPKC-OAFA method has been proved to effectively analyze performance in a number of simulations, with the results of various functions being identified. Originality/valueIn light of the growing prevalence of the IoT, an increasing number of people are becoming anxious about the protection and confidentiality of the personal data that they save online. This is especially true in light of the fact that more and more things are becoming connected to the internet. The IoT is capable of gathering personally identifiable information such as names, addresses and phone numbers, as well as the quantity of energy that is used. It will be challenging for customers to adopt IoT technology because of worries about the security and privacy of the data generated by users. In this work, the EGPKC is paired with adversarial artificial flora, which leads in an increase to the privacy security provided by EGPKC for the IoT (EGPKC-OAFA). The MAC security field that is part of the IEEE 802.15.4 standard is one of the areas that the EGPKC-OAFA protocol places a high focus on. The Authentication Key Generation Protocol Key Agreement, also known as EGPKCA, is used in MAC headers. The abbreviation for this protocol is EGPKCA. The OAFA technique, also known as the combination of OBL and AFA, is the most successful method for selecting EGPKCs. This method is recognized by its acronym, OAFA. It has been shown via a variety of simulations that the EGPKC-OAFA technique is a very useful instrument for carrying out performance analysis.
引用
收藏
页码:799 / 817
页数:19
相关论文
共 50 条
  • [31] Design and Modelling of hybrid network security method for increasing security in vehicular ad-hoc network
    Zabeeulla M.
    singh A.
    Sharma S.K.
    Chauhan S.P.S.
    Measurement: Sensors, 2023, 29
  • [32] An Optimized Link Duration-Based Mobility Management Scheme for Connected Vehicular Networks
    Aljeri, Noura
    Boukerche, Azzedine
    PE-WASUN'19: PROCEEDINGS OF THE 16TH ACM INTERNATIONAL SYMPOSIUM ON PERFORMANCE EVALUATION OF WIRELESS AD HOC, SENSOR, & UBIQUITOUS NETWORKS, 2019, : 7 - 14
  • [33] Evolutionary Algorithm Based Optimized Relay Vehicle Selection in Vehicular Communication
    Jafer, Muhammad
    Khan, M. Arif
    Rehman, Sabih Ur
    Zia, Tanveer A.
    IEEE ACCESS, 2018, 6 : 71524 - 71539
  • [34] A Survey on Recent Advances in Vehicular Network Security, Trust, and Privacy
    Lu, Zhaojun
    Qu, Gang
    Liu, Zhenglin
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2019, 20 (02) : 760 - 776
  • [35] Scheduling the Operation of a Connected Vehicular Network Using Deep Reinforcement Learning
    Atallah, Ribal F.
    Assi, Chadi M.
    Khabbaz, Maurice J.
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2019, 20 (05) : 1669 - 1682
  • [36] A systematic review on security issues in vehicular ad hoc network
    Tanwar, Sudeep
    Vora, Jayneel
    Tyagi, Sudhanshu
    Kumar, Neeraj
    Obaidat, Mohammad S.
    SECURITY AND PRIVACY, 2018, 1 (05):
  • [37] Overview on Vehicular Ad Hoc Network and its Security Issues
    Kumar, Ankit
    Sinha, Madhavi
    2014 INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2014, : 792 - 797
  • [38] Cyber Security Framework for Vehicular Network Based on a Hierarchical Game
    Sedjelmaci, Hichem
    Brahmi, Imane Horiya
    Ansari, Nirwan
    Rehmani, Mubashir Husain
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2021, 9 (01) : 429 - 440
  • [39] A multi-purpose Group Signature for Vehicular Network Security
    Mamun, Mohammad Saiful Islam
    Miyaji, Atsuko
    Takada, Hiroaki
    2014 17TH INTERNATIONAL CONFERENCE ON NETWORK-BASED INFORMATION SYSTEMS (NBIS 2014), 2014, : 509 - 514
  • [40] Security Issues in Vehicular Ad Hoc Network: A Critical Survey
    Arif, Mohammad
    Ahmad, Shish
    INTELLIGENT COMMUNICATION, CONTROL AND DEVICES, ICICCD 2017, 2018, 624 : 527 - 536