Abstract
Vehicular Ad Hoc Networks (VANETs) is an important communication paradigm in modern mobile computing for transferring message for either condition, road conditions. A protected data can be transmitted through VANET, LEACH protocol based clustering and Light Weight cryptographically Model is considered. At first, grouping the vehicles into clusters and sorting out the network by clusters are a standout amongst the most comprehensive and most adequate ways. This in mechanism gives a solution to control the assaults over the VANET security. Improve the security dimension of data transmission through network framework the inspired Random Firefly (RFF) enhancement used to discover the reliable vehicles in created VNET topology. Once it’s identified the Lightweight Cryptography (LWC) with a Hash function which is used to secure the information in sender to receiver. The procedure utilized for encryption in which plain data is changed over into a cipher data alongside private and public keys. This security demonstrates it actualized in NS2 simulator with a simulation parameter, and furthermore, our proposed secure data transmission contrasted with existing security methods.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Hwang RJ, Hsiao YK, Liu YF (2011) Secure communication scheme of VANET with privacy preserving. In: 2011 IEEE 17th International conference on parallel and distributed systems (ICPADS). IEEE, pp 654–659
Papadimitratos P, Calandriello G, Hubaux JP, Lioy A (2008) Impact of vehicular communications security on transportation safety. In: INFOCOM workshops 2008, IEEE. IEEE, pp 1–6
Mokhtar B, Azab M (2015) Survey on security issues in vehicular ad hoc networks. Alexandria Eng J 54(4):1115–1126
Raman PandiSelvam, Shankar K, Ilayaraja (2018) Securing cluster based routing against cooperative black hole attack in mobile ad hoc network. J Eng Technol 7:6–9
Hosmani S, Mathpati B (2017) Survey on cluster based routing protocol in VANET. In: 2017 International conference on electrical, electronics, communication, computer, and optimization techniques (ICEECCOT). IEEE, pp 1–6
Patel NJ, Jhaveri RH (2015) Trust based approaches for secure routing in VANET: a survey. Procedia Comput Sci 45:592–601
Raw RS, Kumar M, Singh N (2013) Security challenges, issues and their solutions for VANET. Int J Netw Secur Appl 5(5):95
Singh A, Kad S (2016) A secure clustering based approach in vehicular adhoc network. In: 2016 International conference on signal processing, communication, power and embedded system (SCOPES). IEEE, pp 1127–1133
Sharma V, Vidwans A, Gupta M (2016) AES based security clustering routing for VANET. In: 2016 International conference on signal processing, communication, power and embedded system (SCOPES). IEEE, pp 332–336
Hasrouny H, Samhat AE, Bassil C, Laouiti A. Trust model for secure group leader-based communications in VANET. Wirel Netw 1–23
Bouabdellah M, El Bouanani F, Ben-Azza H (2016) A secure cooperative transmission model in VANET using attribute based encryption. In: International conference on advanced communication systems and information security (ACOSIS). IEEE, pp 1–6
Kaur R, Singh TP, Khajuria V (2018) Security issues in vehicular ad-hoc network (VANET). In: 2018 2nd international conference on trends in electronics and informatics (ICOEI). IEEE, pp 884–889
Pereira J, Ricardo L, LuĂs M, Senna C, Sargento S (2019) Assessing the reliability of fog computing for smart mobility applications in VANETs. Future Gener Comput Syst 94:317–332
Chhabra S, Kumar RG (2016) Efficient routing in vehicular ad-hoc networks using firefly optimization. Doctoral dissertation
Ozera K, Bylykbashi K, Liu Y, Barolli L (2018) A security-aware fuzzy-based cluster head selection system for VANETs. In: International conference on innovative mobile and internet services in ubiquitous computing. Springer, Cham, pp 505–516
Mejri MN, Ben-Othman J, Hamdi M (2014) Survey on VANET security challenges and possible cryptographic solutions. Veh Commun 1(2):53–66
Gupta D, Khanna A, Shankar K, Furtado V, Rodrigues JJ (2018) Efficient artificial fish swarm based clustering approach on mobility aware energy-efficient for MANET. Trans Emerg Telecommun Technol e3524
Manickam P et al (2015) A highly adaptive fault tolerant source routing protocol for energy constrained mobile ad hoc networks. Int J Appl Eng Res 10(7):16885–16897. ISSN 0973-4562
Manickam P et al (2013) A highly adaptive fault tolerant routing protocol for energy constrained mobile ad hoc networks. J Theor Appl Inf Technol 57(3). ISSN: 1992-8645, E-ISSN: 1817-3195
Shankar K, Eswaran P (2015) ECC based image encryption scheme with aid of optimization technique using differential evolution algorithm. Int J Appl Eng Res 10(5):1841–1845
Elhoseny M, Shankar K, Lakshmanaprabu SK, Maseleno A, Arunkumar N (2018) Hybrid optimization with cryptography encryption for medical image security in Internet of Things. Neural Comput Appl 1–15. https://doi.org/10.1007/s00521-018-3801-x
Shankar K, Elhoseny M, Kumar RS, Lakshmanaprabu SK, Yuan X (2018) Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique. J Ambient Intell Humanized Comput 1–13. https://doi.org/10.1007/s12652-018-1161-0
Shankar K, Elhoseny M, Dhiravida Chelvi E, Lakshmanaprabu SK, Wu W (2018) IEEE Access 6(1):77145–77154. https://doi.org/10.1109/ACCESS.2018.2874026
Shankar K, Elhoseny M, Lakshmanaprabu SK, Ilayaraja M, Vidhyavathi RM, Elsoud MA, Alkhambashi M (2018) Optimal feature level fusion based ANFIS classifier for brain MRI image classification. Concurrency Comput Pract Experience e4887. https://doi.org/10.1002/cpe.4887
Wu W, Wu S, Zhang L, Zou J, Dong L (2013) LHash: a lightweight hash function (full version). IACR Cryptology ePrint Archive, 2013, p 867
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Manickam, P., Shankar, K., Perumal, E., Ilayaraja, M., Sathesh Kumar, K. (2019). Secure Data Transmission Through Reliable Vehicles in VANET Using Optimal Lightweight Cryptography. In: Hassanien, A., Elhoseny, M. (eds) Cybersecurity and Secure Information Systems. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-030-16837-7_9
Download citation
DOI: https://doi.org/10.1007/978-3-030-16837-7_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-16836-0
Online ISBN: 978-3-030-16837-7
eBook Packages: Computer ScienceComputer Science (R0)