Optimizing Secure Communication in Intelligent Transportation Networks with Certificate-less Authorization in VANETs
DOI:
https://doi.org/10.22399/ijcesen.934Keywords:
VANET, Cloud Environment, security, Certificate less authorizationAbstract
As an outcome of technology progress, among the most widely used design models in intelligent transportation networks is Vehicular Ad-hoc Networks (VANETs). Assistance for Vehicle to Vehicle (V2V) connectivity is offered via VANETs. Automobile access to actual time traffic, weather, and transportation data is made possible via VANETs, which also assure traffic safety and effectiveness. The legitimacy of an organisation providing data is a crucial factor that must be taken seriously in order to ensure secure interaction in VANETs. In regards to safety mutual identification along with safe distribution of keys in VANETs continue to pose certain disadvantages considering that numerous protocols that have been suggested. However, since they depend on the authorised authority, they are susceptible to assaults through the firewall and Reliable Control (RC), which may raise safety issues amongst customers. we provide a certificate less secure authorization system that lessens the load on automobiles' internal storage and satisfies the delay criterion by doing away with certificate. The suggested system is strong and resistant against attacks from malevolent users
References
J. Kar, S. Mukhopadhyay, and K. Naik, (2024) SL-PPCP: Secure and Low-cost Privacy-Preserving Communication Protocol for Vehicular Ad-hoc Networks, IEEE Trans. Veh. Technol., 73(6);8942–8956, doi: 10.1109/TVT.2024.3362152. DOI: https://doi.org/10.1109/TVT.2024.3362152
J. Qi, T. Gao, X. Deng, and C. Zhao, (2022). A pseudonym-based certificateless privacy-preserving authentication scheme for VANETs, Veh. Commun., 38, 100535, doi: 10.1016/j.vehcom.2022.100535. DOI: https://doi.org/10.1016/j.vehcom.2022.100535
H. Su, S. Dong, N. Wang, and T. Zhang, (2024). An efficient privacy-preserving authentication scheme that mitigates TA dependency in VANETs, Veh. Commun., 45,100727, doi: 10.1016/j.vehcom.2024.100727. DOI: https://doi.org/10.1016/j.vehcom.2024.100727
R. Amin, I. Pali, and V. Sureshkumar, (2021). Software-Defined Network enabled Vehicle to Vehicle secured data transmission protocol in VANETs, J. Inf. Secur. Appl., 58,102729, doi: 10.1016/j.jisa.2020.102729. DOI: https://doi.org/10.1016/j.jisa.2020.102729
Yadav, Aashi, and Vijay Kumar Yadav. "Survey on VANET Authentication Scheme Based on Cryptographic Protocols." In International Conference On Innovative Computing And Communication, pp. 85-104. Singapore: Springer Nature Singapore, 2024. DOI: https://doi.org/10.1007/978-981-97-3817-5_6
T. Limbasiya and D. Das, (2021). VCom: Secure and Efficient Vehicle-to-Vehicle Message Communication Protocol, IEEE Trans. Netw. Serv. Manag., 18(2);2365–2376, doi: 10.1109/TNSM.2020.3042526. DOI: https://doi.org/10.1109/TNSM.2020.3042526
Y. Zhou, Z. Wang, Z. Qiao, B. Yang and M. Zhang, (2023). An Efficient and Provably Secure Identity Authentication Scheme for VANET, in IEEE Internet of Things Journal, 10(19),17170-17183, doi: 10.1109/JIOT.2023.3273234 DOI: https://doi.org/10.1109/JIOT.2023.3273234
J. Zhang, Y. Zhao, J. Wu, and B. Chen, (2020). LVPDA: A Lightweight and Verifiable Privacy-Preserving Data Aggregation Scheme for Edge-Enabled IoT, IEEE Internet Things J., 7(5);4016–4027, doi: 10.1109/JIOT.2020.2978286. DOI: https://doi.org/10.1109/JIOT.2020.2978286
H. Fatemidokht and M. Kuchaki Rafsanjani, (2020). QMM-VANET: An efficient clustering algorithm based on QoS and monitoring of malicious vehicles in vehicular ad hoc networks, J. Syst. Softw., 165,1–16, doi: 10.1016/j.jss.2020.110561. DOI: https://doi.org/10.1016/j.jss.2020.110561
H. Fatemidokht, M. K. Rafsanjani, B. B. Gupta, and C. H. Hsu, (2021). Efficient and Secure Routing Protocol Based on Artificial Intelligence Algorithms with UAV-Assisted for Vehicular Ad Hoc Networks in Intelligent Transportation Systems, IEEE Trans. Intell. Transp. Syst., 22(7);4757–4769,doi: 10.1109/TITS.2020.3041746. DOI: https://doi.org/10.1109/TITS.2020.3041746
M. Cui, D. Han, and J. Wang, (2019). An Efficient and Safe Road Condition Monitoring Authentication Scheme Based on Fog Computing, IEEE Internet Things J., 6(5);9076–9084, doi: 10.1109/JIOT.2019.2927497. DOI: https://doi.org/10.1109/JIOT.2019.2927497
Shanthalakshmi M, Ponmagal R S, (2024). An intelligent dynamic cyber physical system threat detection system for ensuring secured communication in 6G autonomous vehicle networks. Sci Rep 14, 20795. https://doi.org/10.1038/s41598-024-70835-3
Z. Gong, T. Gao, and N. Guo, (2023). PCAS: Cryptanalysis and improvement of pairing-free certificateless aggregate signature scheme with conditional privacy-preserving for VANETs, Ad Hoc Networks, 144,103134, doi: 10.1016/j.adhoc.2023.103134. DOI: https://doi.org/10.1016/j.adhoc.2023.103134
M. A. Al-Shareeda, M. Anbar, M. A. Alazzawi, S. Manickam, and A. S. Al-Hiti, (2020). LSWBVM: A lightweight security without using batch verification method scheme for a vehicle Ad Hoc network, IEEE Access, 8, 170507–170518, doi: 10.1109/ACCESS.2020.3024587. DOI: https://doi.org/10.1109/ACCESS.2020.3024587
F. Zhu, X. Yi, A. Abuadbba, I. Khalil, X. Huang and F. Xu, (2023). A Security-Enhanced Certificateless Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks, IEEE Transactions on Intelligent Transportation Systems, 24(10),10456-10466, doi: 10.1109/TITS.2023.3275077. DOI: https://doi.org/10.1109/TITS.2023.3275077
Shanthalakshmi M., Ponmagal R S. (2024). An intelligent dynamic cyber physical system threat detection system for ensuring secured communication in 6G autonomous vehicle networks. Sci Rep 14, 20795. https://doi.org/10.1038/s41598-024-70835-3 DOI: https://doi.org/10.1038/s41598-024-70835-3
M. R. Asaar, M. Salmasizadeh, W. Susilo, and A. Majidi, (2018). A secure and efficient authentication technique for vehicular Ad-Hoc networks, IEEE Trans. Veh. Technol., 67(6);5409–5423, doi: 10.1109/TVT.2018.2822768. DOI: https://doi.org/10.1109/TVT.2018.2822768
Shanthalakshmi, M., Gogoi, D., Chhabra, M., Rana, S., & Thakur, S. (2017). A Distributed Malicious Attack Detection and Prevention Approach Using Honeypots in Ad-hoc Networks, SSRG International Journal of Computer Science and Engineering,
Al-Mekhlafi, Zeyad Ghaleb, Hussam Dheaa Kamel Al-Janabi, Mahmood A. Al-Shareeda, Badiea Abdulkarem Mohammed, Jalawi Sulaiman Alshudukhi, and Kawther A. Al-Dhlan. (2024). Fog computing and blockchain technology based certificateless authentication scheme in 5G-assisted vehicular communication. Peer-to-Peer Networking and Applications 1-19. DOI: https://doi.org/10.1007/s12083-024-01778-9
Sofia, A.S., Selvi, C.P.T., Suganya, S., Selvi, P.F.A., Shanthalakshmi, M. (2025). Machine Learning Based Traffic Congestion and Accident Prevention Analysis. In: Geetha, R., Dao, NN., Khalid, S. (eds) Advances in Artificial Intelligence and Machine Learning in Big Data Processing. AAIMB 2023. Communications in Computer and Information Science, vol 2203. Springer, Cham. https://doi.org/10.1007/978-3-031-73068-9_9 DOI: https://doi.org/10.1007/978-3-031-73068-9_9
Limbasiya, Trupil, Sanjay K. Sahay, and Debasis Das. (2022). Sampark: Secure and lightweight communication protocols for smart parking management. Journal of Information Security and Applications 71;103381. DOI: https://doi.org/10.1016/j.jisa.2022.103381
Ghaleb Al-Mekhlafi, Z., Anwar Lashari, S., Mohammed Hachim Altmemi, J., Al-Shareeda, M.A., Abdulkarem Mohammed, B., Sallam, A.A., Ali Al-Qatab, B., Alshammari, M.T., & Alayba, A.M. (2024). Oblivious Transfer-Based Authentication and Privacy-Preserving Protocol for 5G-Enabled Vehicular Fog Computing. IEEE Access, 12, 100152-100166. DOI:10.1109/ACCESS.2024.3429179 DOI: https://doi.org/10.1109/ACCESS.2024.3429179
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 International Journal of Computational and Experimental Science and Engineering

This work is licensed under a Creative Commons Attribution 4.0 International License.