Privacy Preserving Lightweight Cryptography Scheme for Clustered Vehicular Adhoc Networks

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
© 2022 by IJETT Journal
Volume-70 Issue-7
Year of Publication : 2022
Authors : Shaji K.A.Theodore, K. Rajiv Gandhi, V. Palanisamy
DOI : 10.14445/22315381/IJETT-V70I7P203

How to Cite?

Shaji K.A.Theodore, K. Rajiv Gandhi, V. Palanisamy , "Privacy Preserving Lightweight Cryptography Scheme for Clustered Vehicular Adhoc Networks" International Journal of Engineering Trends and Technology, vol. 70, no. 7, pp. 24-31, 2022. Crossref,

Vehicular ad hoc network (VANET) is typically used in intelligent transportation systems (ITS), which permits the interchange of traffic information amongst close atmosphere and vehicles to establish an efficient driving experience. Security and privacy are becoming a difficult problem that prevails from the safety requirements of the VANET. Some of the specific leakage of vehicle details like route data may lead to severe effects, and thus, privacy-preserving protocols were required to improve security in VANET. This article introduces a novel Sunflower Optimization with Privacy Preserving Lightweight Cryptography (SFO-PPLWC) scheme for Clustered VANET. The major goal of the SFO-PPLWC technique is to cluster the vehicles and enable secure data transmission using the LWC approach. The proposed SFO-PPLWC model comprises a threestage process: weighted cluster scheme, encryption, and optimal key generation. Primarily, the presented SFO-PPLWC model comprises a weighted clustering scheme (WCS) model to group the vehicles. Besides, the Tiny Encryption Algorithm (TEA) is employed to transmit the data securely. Moreover, the SFO algorithm is exploited to choose the keys related to the TEA model optimally. The experimental outcome analysis of the SFO-PPLWC model is tested and compared with existing models. The simulation results highlighted the enhancements of the SFO-PPLWC model over recent models.

VANET, Clustering, Privacy preserving, Lightweight cryptography, Security, Metaheuristics.

[1] D. Manivannan, S. S. Moni and S. Zeadally, “Secure Authentication and Privacy-Preserving Techniques in Vehicular Ad-Hoc Networks (VANETs),” Vehicular Communications, vol. 25, pp. 100247, 2020.
[2] K. Rabieh, M. M. Mahmoud, and M. Younis, “Privacy-Preserving Route Reporting Scheme for Traffic Management in VANETs,” In 2015 IEEE International Conference on Communications (ICC), pp. 7286-7291, 2015.
[3] C. T. Li, M. S. Hwang, and Y. P. Chu, “A Secure and Efficient Communication Scheme with Authenticated Key Establishment and Privacy Preserving for Vehicular Ad Hoc Networks,” Computer Communications, vol. 31, no. 12, pp. 2803-2814, 2008.
[4] P. Vijayakumar, M. Azees, V. Chang, J. Deborah, and B. Balusamy, “Computationally Efficient Privacy Preserving Authentication and Key Distribution Techniques for Vehicular Ad Hoc Networks,” cluster computing, vol. 20, no. 3U , pp. 2439-2450, 2017.
[5] U. Rajput, F. Abbas, and H. Oh, “A Hierarchical Privacy Preserving Pseudonymous Authentication Protocol for VANET,” IEEE Access, vol. 4, pp. 7770-7784, 2016.
[6] P. Mundhe, S. Verma, and S. Venkatesan, “A Comprehensive Survey on Authentication and Privacy-Preserving Schemes in VANETs,” Computer Science Review, vol. 41, pp. 100411, 2021.
[7] S. Gavaskar, E. Ramaraj, R. Surendiran, “A compressed anti IP spoofing mechanism using cryptography,” IJCSNS International Journal of Computer Science and Network Security, vol. 12, no. 11, pp.137-140, 2012.
[8] J. Cui, L. Wei, H. Zhong, J. Zhang, Y. Xu, and L. Liu, “Edge computing in VANETs-An Efficient and Privacy-Preserving Cooperative Downloading Scheme,” IEEE Journal on Selected Areas in Communications, vol. 38, no. 6, pp. 1191-1204, 2020.
[9] S. O. Ogundoyin and I. A. Kamil, “An Efficient Authentication Scheme with Strong Privacy Preservation for Fog-Assisted Vehicular Ad Hoc Networks Based on Blockchain and Neuro-Fuzzy,” Vehicular Communications, vol. 31, pp. 100384, 2021.
[10] T. Nandy, M.Y.I. Idris, R.M. Noor, A.W.A. Wahab, S. Bhattacharyya, R. Kolandaisamy, and M. Yahuza, “A Secure, PrivacyPreserving, and Lightweight Authentication Scheme for VANETs,” IEEE Sensors Journal, vol. 21, no. 18, pp. 20998-21011, 2021.
[11] A. Abdallah, and X. Shen, “Lightweight Security and Privacy Preserving Scheme for Smart Grid Customer-Side Networks,” IEEE Transactions on Smart Grid, vol. 8, no. 3, pp. 1064-1074, 2015.
[12] P. Gope, R. Amin, S. H. Islam, N. Kumar, and V. K. Bhalla, “Lightweight and Privacy-Preserving RFID Authentication Scheme for Distributed Iot Infrastructure with Secure Localization Services for Smart City Environment,” Future Generation Computer Systems, vol. 83, pp. 629-637, 2018.
[13] C. P. Navdeti, I. Banerjee, and C. Giri, “Privacy Preservation and Secure Data Sharing Scheme in Fog Based Vehicular Ad-Hoc Network,” Journal of Information Security and Applications, vol. 63, pp. 103014, 2021.
[14] K. Prateek, F. Altaf, R. Amin, and S. Maity, “A Privacy Preserving Authentication Protocol Using Quantum Computing for V2I Authentication in Vehicular Ad Hoc Networks,” Security and Communication Networks, 2022.
[15] P. Manickam, K. Shankar, E. Perumal, M. Ilayaraja, and K. Sathesh Kumar, “Secure Data Transmission Through Reliable Vehicles in VANET Using Optimal Lightweight Cryptography,” in Cybersecurity and secure information systems, Springer, Cham, pp. 193-204, 2019.
[16] L. Wei, J. Cui, H. Zhong, I. Bolodurina, and L. Liu, “A Lightweight and Conditional Privacy-Preserving Authenticated Key Agreement Scheme with Multi-TA Model for Fog-based VANETs,” IEEE Transactions on Dependable and Secure Computing, 2021.
[17] K. M. Rajashekarappa, K. A. SunjivSoyjaudah, Sumithra Devi, ”Study on Cryptanalysis of the Tiny Encryption Algorithm,” International Journal of Innovative Technology and Exploring Engineering, vol. 2, no. 3, pp. 88-91, 2013.
[18] N .Krishnaraj, and S.Sangeetha, “A Study of Data Privacy in Internet of Things Using Privacy Preserving Techniques with Its Management,” International Journal of Engineering Trends and Technology, vol. 70, no. 2, pp. 43-52, 2022.
[19] G. F. Gomes, S. S. da Cunha, and A. C. Ancelotti, “A Sunflower Optimization (SFO) Algorithm Applied to Damage Identification on Laminated Composite Plates,” Engineering with Computers, vol. 35, no. 2, pp. 619-626, 2019.
[20] S. K. Theodore, K. R. Gandhi, and V. Palanisamy, “A Novel Lightweight Authentication and Privacy-Preserving Protocol for Vehicular Ad Hoc Networks,” Complex & Intelligent Systems, pp. 1-11, 2021