Skip to main content

Approximation Algorithm and Linear Congruence: A State-of-Art Approach in Information Security Issues Towards Internet of Vehicles

  • Chapter
  • First Online:
Internet of Vehicles and its Applications in Autonomous Driving

Part of the book series: Unmanned System Technologies ((UST))

Abstract

Nowadays vehicles have been used at a large scale in the modern society. But in many countries the current traffic-safety statistics is very terrifying. Many people are killed and injured in road accident. To reduce this problem government and manufacturers of countries have launched different initiatives like use of safety belt, airbags, antiblocking brake system, and smart vehicular transportation system. Upcoming traffic safety initiatives in smart transportation system depend on information technology and this technology also helps to authenticate and traceable the vehicles in the system. Recently, the smart vehicular system uses different types of networks like VANETs, AI based applications, etc. that aims to provide a safer, coordinated, smooth, and smart mode of transportation. This article focuses on the communication security issues in smart vehicular applications or IoV. Transmitting messages efficiently and honestly among vehicles is the key issues in this system. At present, the communication in smart transportation system is vulnerable to various types of security attacks because it uses an open wireless connection. The different types of attacks are secrecy attack, routing attack, data authenticity attack, attack on authentication besides this in the dense environment, the vehicle may receive multiple messages at the same time. Therefore, how to complete the authentication of multiple messages in a short time is an urgent problem. To address these problems, here we have introduced some technique using the concept of approximation algorithm and linear congruence. The different types of experiments on our technique and their results conform that our scheme is very secure, robust, and efficient for data transmission in smart vehicular or IoV.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Yong, X., Libing, W., Yubo, Z., & Jian, S. (2016). Efficient and secure authentication scheme with conditional privacy-preserving for VANETs. Chinese Journal of Electron Devices, 25(5), 950–956.

    Article  Google Scholar 

  2. Kahate, A. (2008). Cryptography and network security. New Delhi: Tata McGraw-Hill.

    Google Scholar 

  3. Hao, Y., Tang, J., & Cheng, Y. (2013). Secure cooperative data downloading in vehicular ad hoc networks. IEEE Journal on Selected Areas in Communications, 31(9), 523–537.

    Article  Google Scholar 

  4. Buchmann, J. (2004). Introduction to cryptography (2nd ed.). Springer.

    Google Scholar 

  5. Stinson, D. (2006). Cryptography: Theory and practice (3rd ed.). Boca Raton, FL: Chapman & Hall/CRC.

    MATH  Google Scholar 

  6. Das, A., & Veni Madhavan, C. E. (2009). Public-key cryptography: Theory and practice. Upper Saddle River, NJ: Pearson Education.

    Google Scholar 

  7. Boneh, D., & Franklin, M. (2001). Identity-based encryption from the Weil pairing. In J. Kilian (Ed.), CRYPTO 2001. LNCS (Vol. 2139, pp. 213–229). Heidelberg: Springer.

    Chapter  Google Scholar 

  8. Stallings, W. (2003). Cryptography and network security: Principles and practice (3rd ed.). Prentice Hall.

    Google Scholar 

  9. Agrawal, A., Gorbunov, S., Vaikuntanathan, V., & Wee, H. (2013). Functional encryption: New perspectives and lower bounds. In R. Canetti & J. A. Garay (Eds.), CRYPTO 2013, Part II. LNCS (Vol. 8043, pp. 500–518). Heidelberg: Springer.

    Google Scholar 

  10. Chakravorty, J. G., & Ghosh, P. R. (2018). Advanced higher algebra. Kolkata: U.N. Dhur and Sons Private Ltd. ISBN 978-3-80673-67-7.

    Google Scholar 

  11. Jcobson, M. J., & Williams, H. C., Jr. (2009). Solving the Pell equation. New York: Springer. ISBN-13: 978-0387849225.

    Book  Google Scholar 

  12. Vijayakumar, P., Azees, M., Kannan, A., & Jegatha Deborah, L. (2016). Dual authentication and key management techniques for secure data transmission in vehicular ad hoc networks. IEEE Transactions on Intelligent Transportation Systems, 17(4), 1015–1028.

    Article  Google Scholar 

  13. Chuang, M.-C., & Chen, M. C. (2014). An anonymous multi-server authenticated key agreement scheme based on trust com putting using smart cards and biometrics. Expert Systems with Applications, 41(4), 1411–1418.

    Article  Google Scholar 

  14. Kumari, S., Karuppiah, M., Li, X., Wu, F., Das, A. K., & Odelu, V. (2016). An enhanced and secure trust-extended authentication mechanism for vehicular ad-hoc networks. Security and Communication Networks, 9(17), 4255–4271.

    Article  Google Scholar 

  15. Li, J., Lu, H., & Guizani, M. (2015). ACPN: A novel authentication framework with conditional privacy-preservation and non-repudiation for VANETs. IEEE Transactions on Parallel and Distributed Systems, 26(4), 938–948.

    Article  Google Scholar 

  16. Wang, F., Xu, Y., Zhang, H., Zhang, Y., & Zhu, L. (2016). 2FLIP: A two-factor lightweight privacy-preserving authentication scheme for VANET. IEEE Transactions on Vehicular Technology, 65(2), 896–911.

    Article  Google Scholar 

  17. Joshi, C., & Singh, U. K. (2015). A review on taxonomies of attacks and vulnerability in computer and network system. International Journal of Advanced Research in Computer Science and Software Engineering (IJRCSSE), 5(1), 742–747.

    Google Scholar 

  18. Ghansela, S. (2013). Network security: Attacks, tools and techniques. IJARCSSE, 3(6), 1–11.

    Google Scholar 

  19. Oladipupo, E. T., & Alade, O. A. (2014). An approach to improve data security using modified XOR encryption algorithm. International Journal of Core Research in Communication Engineering, 1(2), 1834–1838.

    Google Scholar 

  20. Delfs, H., & Knebl, H. (2002). Introduction to cryptography: Principles and applications. Berlin: Springer.

    Book  Google Scholar 

  21. Kak, A. (2015). Lecture notes on computer and network security. Purdue University [Online]. Retrieved from https://engineering.purdue.edu/kak/compsec/Lectures.html

  22. Zaidan, B., Zaidan, A., Al-Frajat, A., & Jalab, H. (2010). On the differences between hiding information and cryptography techniques: An overview. Journal of Applied Sciences, 10, 1650–1655.

    Article  Google Scholar 

  23. Chaudhry, S. A., et al. (2017). An improved and provably secure privacy preserving authentication protocol for SIP. Peer-to-Peer Networking and Applications., 10(1), 1–15.

    Article  Google Scholar 

  24. Gaigole, M. S., & Kalyankar, M. A. (2015). The study of network security with its penetrating attacks and possible security mechanisms. International Journal of Computer Science and Mobile Computing, 4(5), 728–735.

    Google Scholar 

  25. Yaling, H. (2013). Research on computer network security analysis model. Computer CD Software and Applications, 2013(z), 1–152.

    Google Scholar 

  26. Ye, H., Li, G. Y., & Juang, B.-H. (2018). Deep reinforcement learning for resource allocation in V2V communication. In Proceedings of IEEE ICC. pp. 1–5.

    Google Scholar 

  27. Pawer, M. V., & Anuradha, J. (2015). Network security and types of attacks in network. Procedia Computer Science, 48, 503–506. https://doi.org/10.1016/j.procs.2015.04.126.

    Article  Google Scholar 

Download references

Conflict of Interest

The authors declare that they have no conflict of interest.

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Bhowmik, A., Karforma, S., Dey, J., Sarkar, A. (2021). Approximation Algorithm and Linear Congruence: A State-of-Art Approach in Information Security Issues Towards Internet of Vehicles. In: Gupta, N., Prakash, A., Tripathi, R. (eds) Internet of Vehicles and its Applications in Autonomous Driving. Unmanned System Technologies. Springer, Cham. https://doi.org/10.1007/978-3-030-46335-9_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-46335-9_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-46334-2

  • Online ISBN: 978-3-030-46335-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics