Abstract
The contemporary development in vehicular ad hoc network (VANET) has delivered an emergent field for entrepreneurs and academician. VANET supports inter and intracommunication between vehicles and infrastructure. Just because of wireless medium, the secure and efficient data/messages transmission from hop to hop in VANET is a foremost challenges because it is exposed to many attacks. Subsequently, the attacks deceived the operation of network, and therefore, safety is mandatory for effective deployment of such technology. Therefore, this paper proposes a steganography-based multi-agent approach to transmit data or message securely from terminal to terminal. The agents are mounted on terminal to transmit/receive messages. The agent at one terminal performs encryption/decryption of messages with appropriate encryption scheme of steganography and effectively transmits the messages/data to other terminal. This scheme improves the proficiency of VANET communication.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Abbreviations
- GPS:
-
Global Positioning System
- ITS:
-
Intelligent Transportation System
- IBS:
-
ID-Based Signature
- LSB:
-
Least-significant bit
- MSU:
-
Message Steganography Unit
- MPU:
-
Message Processing Unit
- OBU:
-
On Board Unit
- RGB:
-
Red, Green and Blue
- RSUs:
-
Roadside Units
- SSA:
-
Steganography Security Algorithm
- VANET:
-
Vehicular Adhoc Network
- VARS:
-
Vehicle Adhoc Reputation System
- V2V:
-
Vehicle to Vehicle
- V2I:
-
Vehicle to Infrastucture
References
Kawashima H (1990) Japanese perspective of driver information systems. Transportation 17(3):263–284
Harsch C, Andreas F, Panos P (2007) Secure position-based routing for VANETs. In: 66th IEEE vehicular technology conference. IEEE, pp 26–30
Sun JCZ, Yuguang F (2007) An id-based framework achieving privacy and non-repudiation in vehicular ad hoc networks. In: IEEE military communications conference, MILCOM. IEEE, pp 1–7
Zeadally S, Hunt R, Chen Y-S, Irwin A, Hassan A (2010) Vehicular ad hoc networks (VANETs): status, results, and challenges. J Telecommun Syst
Raya M, Hubaux J (2005) The security of vehicular ad hoc networks. In: Proceedings of the 3rd ACM workshop on security of ad hoc and sensor networks, pp 1–11
Sumra IA et al (2011) Classes of attacks in VANET. In: Electronics, communications and photonics conference, SIECPC. IEEE, pp 1–5
Fuentes et al (2010) Overview of security issues in vehicular ad-hoc networks
Nai-Wei L, Hsiao-Chien T (2009) A reputation system for traffic safety event on vehicular ad hoc networks. EURASIP J Wireless Commun Netw
Dotzer F et al (2005) VARS: a vehicle ad-hoc network reputation system. In: Symposium on a world of wireless mobile and multimedia networks, pp 454–456
Raya M et al (2008) On data-centric trust establishment in ephemeral ad hoc networks. In: INFOCOM—conference on computer communications. IEEE, pp 1238–1246
Chen TM (2005) Dempster Shafer theory for intrusion detection in ad hoc networks. IEEE Internet Comput 9(6):35–41
Lu H, Li J, Guizani M (2012) A novel ID-based authentication framework with adaptive privacy preservation for VANETs. In: Computing, communications and applications conference (ComAp). IEEE, pp 345–350
Wu Q, Domingo-Ferrer J, Gonzalez NU (2010) Balanced trustworthiness, safety, and privacy in vehicle-to-vehicle communications. IEEE Trans Veh Technol 59(2):559–573
Wei Y, Chen Y (2012) An efficient trust management system for balancing the safety and location privacy in VANETs. TrustCom:393–400
Sun J et al (2010) An identity-based security system for user privacy in vehicular ad hoc networks. IEEE Trans Parallel Distrib Syst 21(9):1227–1239
Wang NW, Huang YM, Chen WM (2008) A novel secure communication scheme in vehicular ad hoc networks. J Comput Commun 31(12):2827–2837
Albert W, Shen X (2009) EDR-efficient decentralized revocation protocol for vehicular ad hoc networks. IEEE Trans Veh Technol 58(9):5214–5224
Wang X, Liu T, Xiao G (2012) Certificate-based anonymous authentication protocol for vehicular ad-hoc network. IETE Tech Rev 29
S-Tools. https://digitalforensics.champlain.edu/download/s-tools4.zip
Chandramouli R, Memon N (2001) Analysis of LSB based image steganography techniques. In: Proceedings of ICIP. Thessaloniki, Greece
Dumitrescu S, Xiaolin W, Wang Z (2003) Detection of LSB steganography via sample pair analysis, vol 2578. LNCS, Springer-Verlag, New York, pp 355–372
Ahn LV, Hopper NJ (2004) Public-key steganography. In: Lecture notes in computer science, vol 3027/2004 of advances in cryptology—EUROCRYPT. Springer-Verlag Heidelberg, pp 323–341
Pang, H.H., K.L. Tan and X. Zhou. : Stenographic schemes for file system and b-tree, IEEE Trans. on Knowledge and Data Engineering, 16: 701–713, (2004).
Dobsicek M (2004) Extended Stegano-graphic system. In: 8th international student conference on electrical engineering. FEE CTU
Mittal U, Phamdo N (2002) Hybrid digital analog joint source-channel codes for broadcasting and robust communications. IEEE Trans Info Theory 48:1082–1102
Pavan S, Gangadharpalli S, Sridhar V (2005) Multivariate entropy detector based hybrid image registration algorithm. In: IEEE international conference on acoustics, speech and signal processing, pp 18-30
Yee P-L, Kiah M-L-M (2010) Shoulder surfing resistance using Penup event and neighboring connectivity manipulation. Malaysian J Comput Sci 23(2):121–140
Por L-Y (2012) Frequency of occurrence analysis attack and its countermeasure. Int Arab J Inf Technol 10(1,2):4143–4147. Advance online publication, available at https://www.ccis2k.org/iajit/PDF/. Last Visited (2012)
Por L-Y, Wong K-S, Chee K-O (2012) UniSpaCh: a text based data hiding method using unicode space characters. J Syst Softw 85(5):1075–1082
Abassi R (2019) VANET security and forensics: challenges and opportunities, Wires Forensic Science. Willy
Wang B, Wang Y, Chen R (2019) A practical authentication framework for VANETs. In: Hindawi security and communication networks
Erskine SK, Elleithy KM (2019) Secure intelligent vehicular network using fog computing. J MDPI
Pan J et al (2019) Secure data sharing scheme for VANETs based on edge computing. EURASIP J Wireless Commun Netw
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Gautam, V. (2021). MASSS—Multi-agent-Based Steganography Security System for VANET. In: Abraham, A., Castillo, O., Virmani, D. (eds) Proceedings of 3rd International Conference on Computing Informatics and Networks. Lecture Notes in Networks and Systems, vol 167. Springer, Singapore. https://doi.org/10.1007/978-981-15-9712-1_14
Download citation
DOI: https://doi.org/10.1007/978-981-15-9712-1_14
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-9711-4
Online ISBN: 978-981-15-9712-1
eBook Packages: EngineeringEngineering (R0)