Skip to main content

Secure Data Transmission Through Reliable Vehicles in VANET Using Optimal Lightweight Cryptography

  • Chapter
  • First Online:
Cybersecurity and Secure Information Systems

Abstract

Vehicular Ad Hoc Networks (VANETs) is an important communication paradigm in modern mobile computing for transferring message for either condition, road conditions. A protected data can be transmitted through VANET, LEACH protocol based clustering and Light Weight cryptographically Model is considered. At first, grouping the vehicles into clusters and sorting out the network by clusters are a standout amongst the most comprehensive and most adequate ways. This in mechanism gives a solution to control the assaults over the VANET security. Improve the security dimension of data transmission through network framework the inspired Random Firefly (RFF) enhancement used to discover the reliable vehicles in created VNET topology. Once it’s identified the Lightweight Cryptography (LWC) with a Hash function which is used to secure the information in sender to receiver. The procedure utilized for encryption in which plain data is changed over into a cipher data alongside private and public keys. This security demonstrates it actualized in NS2 simulator with a simulation parameter, and furthermore, our proposed secure data transmission contrasted with existing security methods.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 159.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Hwang RJ, Hsiao YK, Liu YF (2011) Secure communication scheme of VANET with privacy preserving. In: 2011 IEEE 17th International conference on parallel and distributed systems (ICPADS). IEEE, pp 654–659

    Google Scholar 

  2. Papadimitratos P, Calandriello G, Hubaux JP, Lioy A (2008) Impact of vehicular communications security on transportation safety. In: INFOCOM workshops 2008, IEEE. IEEE, pp 1–6

    Google Scholar 

  3. Mokhtar B, Azab M (2015) Survey on security issues in vehicular ad hoc networks. Alexandria Eng J 54(4):1115–1126

    Article  Google Scholar 

  4. Raman PandiSelvam, Shankar K, Ilayaraja (2018) Securing cluster based routing against cooperative black hole attack in mobile ad hoc network. J Eng Technol 7:6–9

    Google Scholar 

  5. Hosmani S, Mathpati B (2017) Survey on cluster based routing protocol in VANET. In: 2017 International conference on electrical, electronics, communication, computer, and optimization techniques (ICEECCOT). IEEE, pp 1–6

    Google Scholar 

  6. Patel NJ, Jhaveri RH (2015) Trust based approaches for secure routing in VANET: a survey. Procedia Comput Sci 45:592–601

    Article  Google Scholar 

  7. Raw RS, Kumar M, Singh N (2013) Security challenges, issues and their solutions for VANET. Int J Netw Secur Appl 5(5):95

    Google Scholar 

  8. Singh A, Kad S (2016) A secure clustering based approach in vehicular adhoc network. In: 2016 International conference on signal processing, communication, power and embedded system (SCOPES). IEEE, pp 1127–1133

    Google Scholar 

  9. Sharma V, Vidwans A, Gupta M (2016) AES based security clustering routing for VANET. In: 2016 International conference on signal processing, communication, power and embedded system (SCOPES). IEEE, pp 332–336

    Google Scholar 

  10. Hasrouny H, Samhat AE, Bassil C, Laouiti A. Trust model for secure group leader-based communications in VANET. Wirel Netw 1–23

    Google Scholar 

  11. Bouabdellah M, El Bouanani F, Ben-Azza H (2016) A secure cooperative transmission model in VANET using attribute based encryption. In: International conference on advanced communication systems and information security (ACOSIS). IEEE, pp 1–6

    Google Scholar 

  12. Kaur R, Singh TP, Khajuria V (2018) Security issues in vehicular ad-hoc network (VANET). In: 2018 2nd international conference on trends in electronics and informatics (ICOEI). IEEE, pp 884–889

    Google Scholar 

  13. Pereira J, Ricardo L, Luís M, Senna C, Sargento S (2019) Assessing the reliability of fog computing for smart mobility applications in VANETs. Future Gener Comput Syst 94:317–332

    Article  Google Scholar 

  14. Chhabra S, Kumar RG (2016) Efficient routing in vehicular ad-hoc networks using firefly optimization. Doctoral dissertation

    Google Scholar 

  15. Ozera K, Bylykbashi K, Liu Y, Barolli L (2018) A security-aware fuzzy-based cluster head selection system for VANETs. In: International conference on innovative mobile and internet services in ubiquitous computing. Springer, Cham, pp 505–516

    Google Scholar 

  16. Mejri MN, Ben-Othman J, Hamdi M (2014) Survey on VANET security challenges and possible cryptographic solutions. Veh Commun 1(2):53–66

    Google Scholar 

  17. Gupta D, Khanna A, Shankar K, Furtado V, Rodrigues JJ (2018) Efficient artificial fish swarm based clustering approach on mobility aware energy-efficient for MANET. Trans Emerg Telecommun Technol e3524

    Google Scholar 

  18. Manickam P et al (2015) A highly adaptive fault tolerant source routing protocol for energy constrained mobile ad hoc networks. Int J Appl Eng Res 10(7):16885–16897. ISSN 0973-4562

    Google Scholar 

  19. Manickam P et al (2013) A highly adaptive fault tolerant routing protocol for energy constrained mobile ad hoc networks. J Theor Appl Inf Technol 57(3). ISSN: 1992-8645, E-ISSN: 1817-3195

    Google Scholar 

  20. Shankar K, Eswaran P (2015) ECC based image encryption scheme with aid of optimization technique using differential evolution algorithm. Int J Appl Eng Res 10(5):1841–1845

    Google Scholar 

  21. Elhoseny M, Shankar K, Lakshmanaprabu SK, Maseleno A, Arunkumar N (2018) Hybrid optimization with cryptography encryption for medical image security in Internet of Things. Neural Comput Appl 1–15. https://doi.org/10.1007/s00521-018-3801-x

  22. Shankar K, Elhoseny M, Kumar RS, Lakshmanaprabu SK, Yuan X (2018) Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique. J Ambient Intell Humanized Comput 1–13. https://doi.org/10.1007/s12652-018-1161-0

  23. Shankar K, Elhoseny M, Dhiravida Chelvi E, Lakshmanaprabu SK, Wu W (2018) IEEE Access 6(1):77145–77154. https://doi.org/10.1109/ACCESS.2018.2874026

    Article  Google Scholar 

  24. Shankar K, Elhoseny M, Lakshmanaprabu SK, Ilayaraja M, Vidhyavathi RM, Elsoud MA, Alkhambashi M (2018) Optimal feature level fusion based ANFIS classifier for brain MRI image classification. Concurrency Comput Pract Experience e4887. https://doi.org/10.1002/cpe.4887

  25. Wu W, Wu S, Zhang L, Zou J, Dong L (2013) LHash: a lightweight hash function (full version). IACR Cryptology ePrint Archive, 2013, p 867

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. Shankar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Manickam, P., Shankar, K., Perumal, E., Ilayaraja, M., Sathesh Kumar, K. (2019). Secure Data Transmission Through Reliable Vehicles in VANET Using Optimal Lightweight Cryptography. In: Hassanien, A., Elhoseny, M. (eds) Cybersecurity and Secure Information Systems. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-030-16837-7_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-16837-7_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-16836-0

  • Online ISBN: 978-3-030-16837-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics