A dynamic integrity and data confidentiality based wireless N2N data communication and security protocol on large networks
DOI:
https://doi.org/10.22399/ijcesen.720Keywords:
Security, integrity, VANET, data confidentialityAbstract
WANET is a network built in an ad hoc network where various connecting devices and moving wireless nodes make connection with the exchange valuable information and wireless medium to one another. As the size of the wireless networks and internet architectures are increasing, there is an exponential demand for data processing and sharing resources in the WANETs. Most of the traditional node authentication models in WANET’s require high computational memory and resource constraints for data security and node authentication. In order to overcome these problems in the traditional models, a novel non-linear integrity-based intrusion detection models is designed and implemented in WANETs. In this work, a hybrid security protocol is designed and developed for the node-to-node communication system. In the proposed security protocol, a hybrid integrity approach and encryption framework is implemented on N2N communication process. Experimental results show that the present security protocol has better improvement on different metrics over traditional security approaches.
References
H. Abualola, H. Otrok, R. Mizouni, and S. Singh, (2022). A N2N charging allocation protocol for electric wireless nodes in VANET, Vehicular Communications, 33;100427, doi: 10.1016/j.vehcom.2021.100427.
B. Alaya, (2021). Efficient privacy-preservation scheme for securing urban P2P WANET networks, Egyptian Informatics Journal, 22(3);317–328, doi: 10.1016/j.eij.2020.12.002.
B. Alaya and L. Sellami, (2021). Clustering method and symmetric/asymmetric cryptography scheme adapted to securing urban WANET networks, Journal of Information Security and Applications, 58;102779, doi: 10.1016/j.jisa.2021.102779.
I. Ali, A. Hassan, and F. Li, (2019) Authentication and privacy schemes for vehicular ad hoc networks (WANETs): A survey, Vehicular Communications, 16;45–61, doi: 10.1016/j.vehcom.2019.02.002.
B. Amar Bensaber, C. G. Pereira Diaz, and Y. Lahrouni, (2020). Design and modeling an Adaptive Neuro-Fuzzy Inference System (ANFIS) for the prediction of a security index in VANET, Journal of Computational Science, 47;101234, doi: 10.1016/j.jocs.2020.101234.
R. Amin, I. Pali, and V. Sureshkumar, (2021). Software-Defined Network enabled Wireless node to Wireless node secured data transmission protocol in WANETs, Journal of Information Security and Applications, 58;102729, doi: 10.1016/j.jisa.2020.102729.
D. Antolino Rivas, J. M. Barceló-Ordinas, M. Guerrero Zapata, and J. D. Morillo-Pozo, (2011). Security on WANETs: Privacy, misbehaving nodes, false information and secure data aggregation, Journal of Network and Computer Applications, 34(6);1942–1955, doi: 10.1016/j.jnca.2011.07.006.
M. Arif, G. Wang, V. E. Balas, O. Geman, A. Castiglione, and J. Chen, (2020). SDN based communications privacy-preserving architecture for WANETs using fog computing, Vehicular Communications, 26;100265, doi: 10.1016/j.vehcom.2020.100265.
M. Arif, G. Wang, M. Zakirul Alam Bhuiyan, T. Wang, and J. Chen, (2019). A survey on security attacks in WANETs: Communication, applications and challenges, Vehicular Communications, 19;100179, doi: 10.1016/j.vehcom.2019.100179.
H. Bangui, M. Ge, and B. Buhnova, (2021). A Hybrid Data-driven Model for Intrusion Detection in VANET, Procedia Computer Science, 184;516–523, doi: 10.1016/j.procs.2021.03.065.
B. Baruah and S. Dhal, (2021). A secure road condition monitoring scheme in cloud based VANET, Computer Communications, 174;131–142, doi: 10.1016/j.comcom.2021.04.027.
W. Ben Jaballah, M. Conti, and C. Lal, (2020). Security and design requirements for software-defined WANETs, Computer Networks, 169;107099, doi: 10.1016/j.comnet.2020.107099.
S. Bouakkaz and F. Semchedine, (2020). A certificateless ring signature scheme with batch verification for applications in VANET, Journal of Information Security and Applications, 55;102669, doi: 10.1016/j.jisa.2020.102669.
K. Bylykbashi, D. Elmazi, K. Matsuo, M. Ikeda, and L. Barolli, (2019). Effect of security and trustworthiness for a fuzzy cluster management system in WANETs, Cognitive Systems Research, 55;153–163, doi: 10.1016/j.cogsys.2019.01.008.
X. Chen, T. Zhang, S. Shen, T. Zhu, and P. Xiong, (2021). An optimized differential privacy scheme with reinforcement learning in VANET, Computers & Security, 110;102446, doi: 10.1016/j.cose.2021.102446.
Y. Chen, J. Yuan, and Y. Zhang, (2021). An improved password-authenticated key exchange protocol for VANET, Vehicular Communications, 27;100286, doi: 10.1016/j.vehcom.2020.100286.
G. S. Chirayil and A. Thomas, (2016). A Study on Cost Effectiveness and Security of WANET Technologies for Future Enhancement, Procedia Technology, 25;356–363, doi: 10.1016/j.protcy.2016.08.118.
E. Diallo, O. Dib, and K. Al Agha, (2022). A scalable blockchain-based scheme for traffic-related data sharing in WANETs, Blockchain: Research and Applications, 100087, doi: 10.1016/j.bcra.2022.100087.
R. G. Engoulou, M. Bellaïche, S. Pierre, and A. Quintero, (2014). WANET security surveys,” Computer Communications, 44;1–13, doi: 10.1016/j.comcom.2014.02.020.
X. Feng, Q. Shi, Q. Xie, and L. Liu, (2021). An Efficient Privacy-preserving Authentication Model based on blockchain for WANETs, Journal of Systems Architecture, 117;102158, doi: 10.1016/j.sysarc.2021.102158.
S. Goudarzi et al., (2022). A privacy-preserving authentication scheme based on Elliptic Curve Cryptography and using Quotient Filter in fog-enabled VANET, Ad Hoc Networks, 128,102782, doi: 10.1016/j.adhoc.2022.102782.
J. Grover, (2022). Security of Vehicular Ad Hoc Networks using blockchain: A comprehensive review, Vehicular Communications, 34;100458, doi: 10.1016/j.vehcom.2022.100458.
H. Hasrouny, A. E. Samhat, C. Bassil, and A. Laouiti, (2017). WANET security challenges and solutions: A survey, Vehicular Communications, 7; 7–20, doi: 10.1016/j.vehcom.2017.01.002.
R. Hussain, F. Hussain, and S. Zeadally, (2019). Integration of WANET and 5G Security: A review of design and implementation issues, Future Generation Computer Systems, 101,843–864, doi: 10.1016/j.future.2019.07.006.
Y. Inedjaren, M. Maachaoui, B. Zeddini, and J.-P. Barbot, (2021). Blockchain-based distributed management system for trust in VANET, Vehicular Communications, 30,100350, doi: 10.1016/j.vehcom.2021.100350.
M. H. Junejo, A. A.-H. Ab Rahman, R. A. Shaikh, K. M. Yusof, D. Kumar, and I. Memon, (2021). Lightweight Trust Model with Machine Learning scheme for secure privacy in VANET, Procedia Computer Science, 194,45–59, doi: 10.1016/j.procs.2021.10.058.
M. H. Junejo, A. A.-H. Ab Rahman, R. A. Shaikh, and K. M. Yusof, (2021). Location Closeness Model for WANETs with Integration of 5G, Procedia Computer Science, 182,71–79, doi: 10.1016/j.procs.2021.02.010.
R. Kaur, R. K. Ramachandran, R. Doss, and L. Pan, (2021). The importance of selecting clustering parameters in WANETs: A survey, Computer Science Review, 40,100392, doi: 10.1016/j.cosrev.2021.100392.
S. Kudva, S. Badsha, S. Sengupta, I. Khalil, and A. Zomaya, (2021). Towards secure and practical consensus for blockchain based VANET, Information Sciences, 545,170–187, doi: 10.1016/j.ins.2020.07.060.
A. Jeneba Mary, K. Kuppusamy, & A. Senthilrajan. (2025). Multi-layer access control for cloud data using improved DBSCAN, AES, homomorphic encryption, and RMAAC for text, image, and video. International Journal of Computational and Experimental Science and Engineering, 11(1). https://doi.org/10.22399/ijcesen.837
N. Vidhya, & C. Meenakshi. (2025). Blockchain-Enabled Secure Data Aggregation Routing (BSDAR) Protocol for IoT-Integrated Next-Generation Sensor Networks for Enhanced Security. International Journal of Computational and Experimental Science and Engineering, 11(1). https://doi.org/10.22399/ijcesen.722
MOHAMED, N. N., Yulianta SIREGAR, Nur Arzilawati MD YUNUS, & Fazlina MOHD ALI. (2024). Modelling the Hybrid Security Approach for Secure Data Exchange: A Proof of Concept. International Journal of Computational and Experimental Science and Engineering, 10(4). https://doi.org/10.22399/ijcesen.344
Sushma Polasi, & Hara Gopal Venkata Vajjha. (2024). Secure Drone Communications using MQTT protocol. International Journal of Computational and Experimental Science and Engineering, 10(4). https://doi.org/10.22399/ijcesen.685
Rahul SHANDILYA, & R.K. SHARMA. (2024). ProTECT: A Programmable Threat Evaluation and Control Unit for Zero Trust Networks. International Journal of Computational and Experimental Science and Engineering, 10(4). https://doi.org/10.22399/ijcesen.673
M. Swetha, & G. Appa Rao. (2024). Hybrid Ensemble Lightweight Cryptosystem for Internet of Medical Things Security. International Journal of Computational and Experimental Science and Engineering, 10(4). https://doi.org/10.22399/ijcesen.625
Guven, M. (2024). A Comprehensive Review of Large Language Models in Cyber Security. International Journal of Computational and Experimental Science and Engineering, 10(3). https://doi.org/10.22399/ijcesen.469
Alkhatib, A., Albdor , L., Fayyad, S., & Ali, H. (2024). Blockchain-Enhanced Multi-Factor Authentication for Securing IoT Children’s Toys: Securing IoT Children’s Toys. International Journal of Computational and Experimental Science and Engineering, 10(4). https://doi.org/10.22399/ijcesen.417
Vutukuru, S. R., & Srinivasa Chakravarthi Lade. (2025). CoralMatrix: A Scalable and Robust Secure Framework for Enhancing IoT Cybersecurity. International Journal of Computational and Experimental Science and Engineering, 11(1). https://doi.org/10.22399/ijcesen.825
V. Ananthakrishna, & Chandra Shekhar Yadav. (2025). QP-ChainSZKP: A Quantum-Proof Blockchain Framework for Scalable and Secure Cloud Applications. International Journal of Computational and Experimental Science and Engineering, 11(1). https://doi.org/10.22399/ijcesen.718
OZER, E., & AYDOS, H. (2024). Performance and Security of AES, DES, and RSA in Hybrid Systems: An Empirical Analysis of Triple Encryption. International Journal of Computational and Experimental Science and Engineering, 10(4). https://doi.org/10.22399/ijcesen.694
Kosaraju Chaitanya, & Gnanasekaran Dhanabalan. (2024). Precise Node Authentication using Dynamic Session Key Set and Node Pattern Analysis for Malicious Node Detection in Wireless Sensor Networks. International Journal of Computational and Experimental Science and Engineering, 10(4). https://doi.org/10.22399/ijcesen.613
Godavarthi, S., & G., D. V. R. (2024). Federated Learning’s Dynamic Defense Against Byzantine Attacks: Integrating SIFT-Wavelet and Differential Privacy for Byzantine Grade Levels Detection. International Journal of Computational and Experimental Science and Engineering, 10(4). https://doi.org/10.22399/ijcesen.538
guven, mesut. (2024). Dynamic Malware Analysis Using a Sandbox Environment, Network Traffic Logs, and Artificial Intelligence. International Journal of Computational and Experimental Science and Engineering, 10(3). https://doi.org/10.22399/ijcesen.460
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 International Journal of Computational and Experimental Science and Engineering
This work is licensed under a Creative Commons Attribution 4.0 International License.