scispace - formally typeset
Journal ArticleDOI

On the Elliptic Curve Cryptography for Privacy-Aware Secure ACO-AODV Routing in Intent-Based Internet of Vehicles for Smart Cities

Sunitha Safavat, +1 more
- 01 Aug 2021 - 
- Vol. 22, Iss: 8, pp 5050-5059
TLDR
The Elliptic Curve Cryptography (ECC) based Ant Colony Optimization Ad hoc On-demand Distance Vector (ACO-AODV) routing protocol is proposed which avoids suspicious vehicles during message dissemination in IoV.
Abstract
Internet of Vehicles (IoV) in 5G is regarded as a backbone for intelligent transportation system in smart city, where vehicles are expected to communicate with drivers, with road-side wireless infrastructure, with other vehicles, with traffic signals and different city infrastructure using vehicle-to-vehicle (V2V) and/or vehicle-to-infrastructure (V2I) communications. In IoV, the network topology changes based on drivers’ destination, intent or vehicles’ movements and road structure on which the vehicles travel. In IoV, vehicles are assumed to be equipped with computing devices to process data, storage devices to store data and communication devices to communicate with other vehicles or with roadside infrastructure (RSI). It is vital to authenticate data in IoV to make sure that legitimate data is being propagated in IoV. Thus, security stands as a vital factor in IoV. The existing literature contains some limitations for robust security in IoV such as high delay introduced by security algorithms, security without privacy, unreliable security and reduced overall communication efficiency. To address these issues, this paper proposes the Elliptic Curve Cryptography (ECC) based Ant Colony Optimization Ad hoc On-demand Distance Vector (ACO-AODV) routing protocol which avoids suspicious vehicles during message dissemination in IoV. Specifically, our proposed protocol comprises three components: i) certificate authority (CA) which maps vehicle’s publicly available info such as number plates with cryptographic keys using ECC; ii) malicious vehicle (MV) detection algorithm which works based on trust level calculated using status message interactions; and iii) secure optimal path selection in an adaptive manner based on the intent of communications using ACO-AODV that avoids malicious vehicles. Experimental results illustrate that the proposed approach provides better results than the existing approaches.

read more

Citations
More filters
Journal ArticleDOI

Evolutionary Computation for Intelligent Transportation in Smart Cities: A Survey [Review Article]

TL;DR: In this paper , a two-layer taxonomy is introduced to review the research of evolutionary computation for intelligent transportation in smart cities, and a detailed review of related studies is presented based on the two layer taxonomy.
Journal ArticleDOI

A Novel Pseudonym Assignment and Encryption Scheme for Preserving the Privacy of Military Vehicles

TL;DR: The proposed security scheme is based on a hybrid approach of matrix array symmetric key and the intelligent water drop scheme and provides secure communication and preservation of location privacy of military vehicles but also ensures their security against various attacks.
Journal ArticleDOI

Privacy-Aware Secure Routing through Elliptical Curve Cryptography with Optimal RSU Distribution in VANETs

TL;DR: In this paper , the authors proposed Elliptical Curve Cryptography with Generic Algorithm based Privacy-Aware Secure Routing (ECC-GA-PASR), which is the combination of two methods such as optimal RSU distribution and elliptical curve cryptography based authentication.
Journal ArticleDOI

Agreement-Induced Data Verification Model for Securing Vehicular Communication in Intelligent Transportation Systems

TL;DR: In this article , an Agreement-Induced Data Verification Model (ADVM) is proposed for securing vehicular communication against adversaries. But due to the dynamic environment, communication is interrupted by the adversaries, resulting in non-privacy issues.
Journal ArticleDOI

Journal of Cybersecurity and Privacy: A New Open Access Journal

TL;DR: The Cybersecurity and Privacy field has been one of the most critical parts of the authors' lives and modern society at large and needs to be considered for inclusion in the fabric of modern society.
References
More filters
Book

Guide to Elliptic Curve Cryptography

TL;DR: This guide explains the basic mathematics, describes state-of-the-art implementation methods, and presents standardized protocols for public-key encryption, digital signatures, and key establishment, as well as side-channel attacks and countermeasures.
Proceedings ArticleDOI

A vehicle-to-vehicle communication protocol for cooperative collision warning

TL;DR: Simulation results demonstrate that the proposed protocol achieves low latency in delivering emergency warnings and efficient bandwidth usage in stressful road scenarios.
Proceedings ArticleDOI

Internet of vehicles: From intelligent grid to autonomous cars and vehicular clouds

TL;DR: The evolution from Intelligent Vehicle Grid to Autonomous, Internet-connected Vehicles, and Vehicular Cloud is discussed, the equivalent of Internet cloud for vehicles, providing all the services required by the autonomous vehicles.
Proceedings ArticleDOI

Detecting and correcting malicious data in VANETs

TL;DR: A general approach to evaluating the validity of VANET data, where a node searches for possible explanations for the data it has collected based on the fact that malicious nodes may be present and accepts the data as dictated by the highest scoring explanations.
Reference BookDOI

Vehicular Networks: From Theory to Practice

TL;DR: This guide details key research challenges, offers guidance on developing future standards, and supplies valuable information on existing experimental studies on the feasibility of vehicular networks.
Related Papers (5)