Abstract
Nowadays vehicles have been used at a large scale in the modern society. But in many countries the current traffic-safety statistics is very terrifying. Many people are killed and injured in road accident. To reduce this problem government and manufacturers of countries have launched different initiatives like use of safety belt, airbags, antiblocking brake system, and smart vehicular transportation system. Upcoming traffic safety initiatives in smart transportation system depend on information technology and this technology also helps to authenticate and traceable the vehicles in the system. Recently, the smart vehicular system uses different types of networks like VANETs, AI based applications, etc. that aims to provide a safer, coordinated, smooth, and smart mode of transportation. This article focuses on the communication security issues in smart vehicular applications or IoV. Transmitting messages efficiently and honestly among vehicles is the key issues in this system. At present, the communication in smart transportation system is vulnerable to various types of security attacks because it uses an open wireless connection. The different types of attacks are secrecy attack, routing attack, data authenticity attack, attack on authentication besides this in the dense environment, the vehicle may receive multiple messages at the same time. Therefore, how to complete the authentication of multiple messages in a short time is an urgent problem. To address these problems, here we have introduced some technique using the concept of approximation algorithm and linear congruence. The different types of experiments on our technique and their results conform that our scheme is very secure, robust, and efficient for data transmission in smart vehicular or IoV.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Yong, X., Libing, W., Yubo, Z., & Jian, S. (2016). Efficient and secure authentication scheme with conditional privacy-preserving for VANETs. Chinese Journal of Electron Devices, 25(5), 950–956.
Kahate, A. (2008). Cryptography and network security. New Delhi: Tata McGraw-Hill.
Hao, Y., Tang, J., & Cheng, Y. (2013). Secure cooperative data downloading in vehicular ad hoc networks. IEEE Journal on Selected Areas in Communications, 31(9), 523–537.
Buchmann, J. (2004). Introduction to cryptography (2nd ed.). Springer.
Stinson, D. (2006). Cryptography: Theory and practice (3rd ed.). Boca Raton, FL: Chapman & Hall/CRC.
Das, A., & Veni Madhavan, C. E. (2009). Public-key cryptography: Theory and practice. Upper Saddle River, NJ: Pearson Education.
Boneh, D., & Franklin, M. (2001). Identity-based encryption from the Weil pairing. In J. Kilian (Ed.), CRYPTO 2001. LNCS (Vol. 2139, pp. 213–229). Heidelberg: Springer.
Stallings, W. (2003). Cryptography and network security: Principles and practice (3rd ed.). Prentice Hall.
Agrawal, A., Gorbunov, S., Vaikuntanathan, V., & Wee, H. (2013). Functional encryption: New perspectives and lower bounds. In R. Canetti & J. A. Garay (Eds.), CRYPTO 2013, Part II. LNCS (Vol. 8043, pp. 500–518). Heidelberg: Springer.
Chakravorty, J. G., & Ghosh, P. R. (2018). Advanced higher algebra. Kolkata: U.N. Dhur and Sons Private Ltd. ISBN 978-3-80673-67-7.
Jcobson, M. J., & Williams, H. C., Jr. (2009). Solving the Pell equation. New York: Springer. ISBN-13: 978-0387849225.
Vijayakumar, P., Azees, M., Kannan, A., & Jegatha Deborah, L. (2016). Dual authentication and key management techniques for secure data transmission in vehicular ad hoc networks. IEEE Transactions on Intelligent Transportation Systems, 17(4), 1015–1028.
Chuang, M.-C., & Chen, M. C. (2014). An anonymous multi-server authenticated key agreement scheme based on trust com putting using smart cards and biometrics. Expert Systems with Applications, 41(4), 1411–1418.
Kumari, S., Karuppiah, M., Li, X., Wu, F., Das, A. K., & Odelu, V. (2016). An enhanced and secure trust-extended authentication mechanism for vehicular ad-hoc networks. Security and Communication Networks, 9(17), 4255–4271.
Li, J., Lu, H., & Guizani, M. (2015). ACPN: A novel authentication framework with conditional privacy-preservation and non-repudiation for VANETs. IEEE Transactions on Parallel and Distributed Systems, 26(4), 938–948.
Wang, F., Xu, Y., Zhang, H., Zhang, Y., & Zhu, L. (2016). 2FLIP: A two-factor lightweight privacy-preserving authentication scheme for VANET. IEEE Transactions on Vehicular Technology, 65(2), 896–911.
Joshi, C., & Singh, U. K. (2015). A review on taxonomies of attacks and vulnerability in computer and network system. International Journal of Advanced Research in Computer Science and Software Engineering (IJRCSSE), 5(1), 742–747.
Ghansela, S. (2013). Network security: Attacks, tools and techniques. IJARCSSE, 3(6), 1–11.
Oladipupo, E. T., & Alade, O. A. (2014). An approach to improve data security using modified XOR encryption algorithm. International Journal of Core Research in Communication Engineering, 1(2), 1834–1838.
Delfs, H., & Knebl, H. (2002). Introduction to cryptography: Principles and applications. Berlin: Springer.
Kak, A. (2015). Lecture notes on computer and network security. Purdue University [Online]. Retrieved from https://engineering.purdue.edu/kak/compsec/Lectures.html
Zaidan, B., Zaidan, A., Al-Frajat, A., & Jalab, H. (2010). On the differences between hiding information and cryptography techniques: An overview. Journal of Applied Sciences, 10, 1650–1655.
Chaudhry, S. A., et al. (2017). An improved and provably secure privacy preserving authentication protocol for SIP. Peer-to-Peer Networking and Applications., 10(1), 1–15.
Gaigole, M. S., & Kalyankar, M. A. (2015). The study of network security with its penetrating attacks and possible security mechanisms. International Journal of Computer Science and Mobile Computing, 4(5), 728–735.
Yaling, H. (2013). Research on computer network security analysis model. Computer CD Software and Applications, 2013(z), 1–152.
Ye, H., Li, G. Y., & Juang, B.-H. (2018). Deep reinforcement learning for resource allocation in V2V communication. In Proceedings of IEEE ICC. pp. 1–5.
Pawer, M. V., & Anuradha, J. (2015). Network security and types of attacks in network. Procedia Computer Science, 48, 503–506. https://doi.org/10.1016/j.procs.2015.04.126.
Conflict of Interest
The authors declare that they have no conflict of interest.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Bhowmik, A., Karforma, S., Dey, J., Sarkar, A. (2021). Approximation Algorithm and Linear Congruence: A State-of-Art Approach in Information Security Issues Towards Internet of Vehicles. In: Gupta, N., Prakash, A., Tripathi, R. (eds) Internet of Vehicles and its Applications in Autonomous Driving. Unmanned System Technologies. Springer, Cham. https://doi.org/10.1007/978-3-030-46335-9_10
Download citation
DOI: https://doi.org/10.1007/978-3-030-46335-9_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-46334-2
Online ISBN: 978-3-030-46335-9
eBook Packages: EngineeringEngineering (R0)