Abstract
With the rapid development of communication technology, the optimization of communication protocol, as a new generation of intelligent traffic system technology, has attracted more and more attention, in particular, the communication technology in traffic. In the authentication protocol of this paper, the symmetric cipher algorithm ZUC and the asymmetric cryptographic algorithm RSA are used as the cryptographic algorithms of the protocol. RSA is used to decrypt digital signatures for messages. In the current communication scheme, node communication does not have scalability and communication requirements in different scenarios, and a population key negotiation communication protocol was proposed in this paper. Employing the kana and random key parameters of the nodes in the roadside cell group, 3 communication protocols for group broadcasting, group to vehicle communication, and RSU communication between groups were designed. The results show that the protocol can meet the security requirements of network communication. The results show that the communication protocol in this paper is safe and reliable. At last, the communication efficiency of communication protocol is analyzed using communication overhead and average delay. The proposed protocol is an efficient communication protocol and the scheme is superior to other schemes in terms of communication overhead and average delay.
Similar content being viewed by others
Data Availability
The data used to support the findings of this study are available from the corresponding author upon request.
References
Anwar RW (2015) A survey of wireless sensor network security and routing techniques. Res J Appl Sci Eng Technol 9(11):1016–1026
Athavale VA (2021) Application of artificial intelligence in magnetic resonance imaging to reduce Gadolinium accumulation in patients with multiple sclerosis: a review. SPR 1(4):416–428
Bapat M (2016) Insights to sensor technology and its applications. Int J Adv Trends Comput Sci Eng 167(2):378–468
Bitam S, Zeadally S, Mellouk A (2016) Bio-inspired cybersecurity for wireless sensor networks. IEEE Commun Mag 54(6):68–74
Curiac DI (2016) Wireless sensor network security enhancement using directional antennas: state of the art and research challenges. Sensors 16(4):488–521
Ejaz H, Yousaf MH, Shahid M, Ashiq S, Saharan QM (2021) Role of periodic table elements in advanced energy storage devices. SPR 1(4):220–233
He D, Chan S, Guizani M (2017) Cyber security analysis and protection of wireless sensor networks for smart grid monitoring. IEEE Wirel Commun 178(99):2–7
Ng F (2015) Wireless sensor network security. Int J Distrib Sens Netw 1(13):140–146
Saganowski Ł, Andrysiak T, Kozik R et al (2016) DWT-based anomaly detection method for the cyber security of wireless sensor networks. Secur Commun Netw 9(15):2911–2922
Sari A, Karay M (2015) Reactive data security approach and review of data security techniques in wireless networks. Int J Commun Netw Syst Sci 8(13):567–577
Funding
Natural Science research project of institution of higher education in Anhui Province (Source), Research on the application of cloud computing-based security level protection for data center in higher vocational colleges no. KJ2020A0934.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors have not disclosed any competing interests.
Additional information
Communicated by Irfan Uddin.
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Sun, D. Research on the optimization of communication protocol in network security protocol. Soft Comput 26, 7959–7966 (2022). https://doi.org/10.1007/s00500-022-06855-w
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00500-022-06855-w