Abstract
In the Internet of Vehicles scenario of the Internet of Things, the security of transmission has become a big challenge. In order to deal with such security risks, we add AES encryption mechanism to the classic Ad hoc On-Demand Distance Vector Routing (AODV) routing protocol in mobile sensor networks and design an AODV-AES encrypted communication protocol, which can be applied to wireless sensor networks of Internet of Vehicles. The protocol has the following advantages: low delay, low energy consumption, and high security. The above advantages show that the AODV-AES encryption communication protocol meets the characteristics of low delay, limited memory, and energy storage of mobile sensor nodes. We also compare several protocols through NS2 simulation software, add blackhole attacked in malicious node attacks, and analyze the average end-to-end delay when attacked by different numbers of nodes. In addition, we also analyze the changing trend of source node energy consumption when attacked in different scenarios. The experimental results show that the AODV-AES encryption communication protocol can not only meet the function of encrypting and decrypting privacy information, but also effectively reduce the average end-to-end delay and reduce the energy consumption of the source node when attacked. It shows that the AODV-AES encryption communication protocol can be applied to the wireless mobile sensor network of the Internet of Vehicles, and improve communication security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Agarwal, H.K., Tripathi, M.: OLWS: optimized light weight secure clustering protocol for wireless sensor networks. In: 2019 4th International Conference on Information Systems and Computer Networks (ISCON), pp. 799–804 (2019)
Ajaykumar, N., Sarvagya, M.: Secure and energy efficient routing protocol in wireless sensor network: a survey. In: 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 2313–2322 (2017)
Baroudi, U.: Robot-assisted maintenance of wireless sensor networks using wireless energy transfer. IEEE Sens. J. 17(14), 4661–4671 (2017)
Boakye-Boateng, K., Kuada, E., Antwi-Boasiako, E., Djaba, E.: Encryption protocol for resource-constrained devices in fog-based IOT using one-time pads. IEEE Internet Things J. 6(2), 3925–3933 (2019)
Chakeres, I., Belding-Royer, E.: AODV routing protocol implementation design. In: Proceedings of the 24th International Conference on Distributed Computing Systems Workshops, 2004, pp. 698–703 (2004)
Chu, S.I., Huang, Y.J., Lin, W.C.: Authentication protocol design and low-cost key encryption function implementation for wireless sensor networks. IEEE Syst. J. 11(4), 2718–2725 (2017)
Geetha, B., Monika, R., Thejasvi, R., Vibaasundari, N.: A study of different routing protocols and encryption algorithms in wireless networks. In: 2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI), pp. 1213–1217 (2017)
Gowda, S.N.: Innovative enhancement of the Caesar Cipher algorithm for cryptography. In: International Conference on Advances in Computing, pp. 1–4 (2016)
Hammi, M.T., Livolant, E., Bellot, P., Serhrouchni, A., Minet, P.: A lightweight IOT security protocol. In: 2017 1st Cyber Security in Networking Conference (CSNet), pp. 1–8 (2017)
Jasim, A.A., Idris, M.Y.I.B., Azzuhri, S.R.B., Issa, N.R., Mohamed Noor, N.B.E.A.: Secure and energy-efficient data aggregation method based on an access control model. IEEE Access 7, 164327–164343 (2019)
Kumari, A., Krishnan, S.: Analysis of malicious behavior of blackhole and rushing attack in manet. In: 2019 International Conference on Nascent Technologies in Engineering (ICNTE), pp. 1–6 (2019)
Lee, J., Yu, S., Kim, M., Park, Y., Das, A.K.: On the design of secure and efficient three-factor authentication protocol using honey list for wireless sensor networks. IEEE Access 8, 107046–107062 (2020)
Liang, Y., Wu, X., Meng, X., Zhang, K.: Design and implementation of a 780 mhz wireless sensor network for electric vehicle management system. In: 2019 IEEE 19th International Conference on Communication Technology (ICCT), pp. 967–971 (2019)
Nanda, A., Puthal, D., Rodrigues, J.J.P.C., Kozlov, S.A.: Internet of autonomous vehicles communications security: overview, issues, and directions. IEEE Wirel. Commun. 26(4), 60–65 (2019)
Nazeer, M.I., Mallah, G.A., Memon, R.A.: A hybrid scheme for secure wireless communications in IoT. Intell. Autom. Soft Comput. 29(2), 633–648 (2021)
Piran, M.J., Verma, V.G.M.S., Suh, D.Y.: Energy-efficient transmission range optimization model for WSN-based internet of things. Comput. Mater. Continua 67(3), 2989–3007 (2021)
Singh, A.K., Alshehri, M., Bhushan, S., Kumar, M., et al.: Secure and energy efficient data transmission model for WSN. Intell. Autom. Soft Comput. 27(3), 761–769 (2021)
Butt, T.M., Riaz, R., Paul, A.C.C.S.S.R.: Cogent and energy efficient authentication protocol for WSN in IOT. Comput. Mater. Continua 68(2), 1877–1898 (2021)
Tang, C.: Research and analysis of WSN node location in highway traffic based on priority. J. Quant. Comput. 2(1), 1–9 (2020)
Wang, D., Ren, P., Du, Q., Sun, L., Wang, Y.: Security provisioning for miso vehicular relay networks via cooperative jamming and signal superposition. IEEE Trans. Vehicul. Technol. 66(12), 10732–10747 (2017)
Wu, S.L., Ni, S.Y., Tseng, Y.C., Sheu, J.P.: Route maintenance in a wireless mobile ad hoc network. In: Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, p. 10, vol. 2 (2000)
Yang, L., Lu, Y., Liu, S., Guo, T., Liang, Z.: A dynamic behavior monitoring game-based trust evaluation scheme for clustering in wireless sensor networks. IEEE Access 6, 71404–71412 (2018)
Yassein, M.B., Aljawarneh, S., Qawasmeh, E., Mardini, W., Khamayseh, Y.: Comprehensive study of symmetric key and asymmetric key encryption algorithms. In: 2017 International Conference on Engineering and Technology (ICET), pp. 1–7 (2017)
Zhou, Q., Qin, X., Liu, G., Cheng, H., Zhao, H.: An efficient privacy and integrity preserving data aggregation scheme for multiple applications in wireless sensor networks. In: 2019 IEEE International Conference on Smart Internet of Things (SmartIoT), pp. 291–297 (2019)
Acknowledgements
This work is supported by the Key Project of Hunan Provincial Department of Education (20A191) and Hunan Teaching Research and Reform Project (2019).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Fu, J., Wang, X., Liu, Y., Yang, Q., Jiang, F. (2022). A Scheme to Improve the Security of IoT Communication. In: Sun, X., Zhang, X., Xia, Z., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2022. Lecture Notes in Computer Science, vol 13340. Springer, Cham. https://doi.org/10.1007/978-3-031-06791-4_36
Download citation
DOI: https://doi.org/10.1007/978-3-031-06791-4_36
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-06790-7
Online ISBN: 978-3-031-06791-4
eBook Packages: Computer ScienceComputer Science (R0)