Abstract
Effective communication between smart transportation and smart vehicles is carried out using Vehicular Ad-Hoc Networks (VANETs). Here, the VANET systems that exist nowadays have issues regarding user privacy and authentication. In internal vehicles, the fake message broadcasting should be stopped to protect the vulnerability of these vehicles from privacy issues. Additionally, the traditional manner of storing transmitted data lacks a decentralized and distributed security system, making it easily vulnerable for third parties to provoke malicious activities within the VANET system. VANET is an autonomous and open-access network, so, privacy and security are the main issues. Hence, it is essential to rectify the complications that are present in the traditional security and privacy preservation models in the VANET system. Thus, an innovative privacy preservation and security scheme with fog enabled VANET system is implemented by considering the complications in the existing models. The major that take place in the recommended framework are (a) Node Authentication, (b) Privacy Preservation, and (c) Message Verification. Initially, the node authentication is performed in the recommended framework using an Adaptive Deep Bayesian network (ADBN) in order to ensure an enhanced permissibility rate in the vehicular node. Then, messages are authenticated to protect the virtue of the messages. The parameters in the ADBN are tuned using the aid of Integrated Fire Hawk with Tunicate Swarm Algorithm (IFHTSA). Next, the privacy preservation procedure in the VANET model is carried out using Hybrid Attribute-Based Advanced Encryption Standard (HABAES) encryption techniques. The keys obtained on the encryption of the messages are signed digitally. Moreover, the suggested model utilized the fog node for the analysis instead of Road-Side Units (RSUs), because of its effectiveness in minimizing the latency rate with an increased throughput rate. In the message verification node, once the Fog Edge Node (FEN) receives the signed message from the vehicles, then it checks the validity of the vehicle node by comparing it with the signed messages. Finally, the experimentation is done based on various standard performance metrics. However, the developed model achieves 94% and 93% in terms of accuracy and precision. Hence, the suggested technique offers minimal computation and communication overhead in different experimental observations over the classical technique.
















Similar content being viewed by others
Data availability
The required data for the Privacy Preservation and Security in VANET is collected manually.
Abbreviations
- \(L{F}_{D}^{SK}\) :
-
Collected Data
- \(om\left(t\right)\) :
-
Output and Input
- \(M\) :
-
Network Weight
- \(G\left(v=b|y,M\right)\) :
-
Label’s probability
- \(X\) :
-
Time
- \({\widehat{M}}_{x}\) :
-
Dropout function
- \(I\) :
-
Training data
- \(X\) :
-
Precision
- \(X{I}_{H}^{adb}\) :
-
Optimized steps per epoch in ADBN
- \(LN\) :
-
Objective Function
- \(N{L}_{R}^{adb}\) :
-
Hidden neuron count
- \(O\) :
-
Accuracy
- \(T{Y}_{I}^{adb}\) :
-
Epoch in ADBN
- \(Fpv\) and \(Tpv\) :
-
False and true positive values
- \(Tgv\) and \(Fgv\) :
-
True and false negative values
- \(VD\) :
-
Standard deviation
- \({Y}_{t}^{NP}\) :
-
FHO position
- \(DN\) :
-
Median value
- \(\overrightarrow{FS}\) :
-
TSO position
- \(I\) :
-
New position
- \(a\) :
-
Random number
- \({f}_{r,MX}^{s}\) and \({f}_{r,MN}^{s}\) :
-
Maximum and minimum bounds
- \(T\) :
-
Total count of candidate solution
- \(D\) :
-
Candidate solution dimension
- \(B\) :
-
Total count of fire hawks
- \(j\) :
-
Total count of prey
- \(\left({a}_{1,}{b}_{1}\right)\) and \(\left({a}_{2,}{b}_{2}\right)\) :
-
Coordinate of prey and fire hawks
- \({L}_{h}^{i}\) :
-
Distance among prey and fire hawk
- \({a}_{1}\) and \({a}_{2}\) :
-
Random variables
- \({B}_{Cl}\) :
-
Fire hawks neighbor
- \({B}_{i}^{NP}\) :
-
New position of fire hawk
- \(H{S}_{i}\) :
-
Hiding place for prey
- \({Y}_{t}^{NP}\) :
-
Prey’s new position
- \({B}_{OB}\) :
-
Fire hawks
- \({d}_{1},{d}_{2}\) and \({d}_{3}\) :
-
Random values
- \(\overrightarrow{W}\) :
-
Water flow direction
- \(\overrightarrow{A}\) :
-
Gravitational force
- \(\overrightarrow{V}\) :
-
Search agent position
- \({e}_{MX}\) and \({e}_{MN}\) :
-
Initial subordinate and subordinate speed
- \({d}_{r}\) :
-
Random value
- \(\overrightarrow{pf}\) :
-
Food position
- \(\overrightarrow{FS}\) :
-
Distance among search agent and food
- \(K{E}^{be}\) :
-
Master key
- \(K\) :
-
Decryption key
- \(A{H}_{S}^{MU}\) :
-
Encrypted data
- \({R}_{n}\) :
-
Total number of rounds
- \(RE\) :
-
Round key
- \(XL\) :
-
Mixcolumns
- \(HW\) :
-
Shiftrows
- \(BY\) :
-
Subbytes
- \(O{F}_{N}^{RE}\) :
-
Final encrypted key
References
Sun Y, Lu R, Lin X, Shen X, Su J (2010) An Efficient Pseudonymous Authentication Scheme With Strong Privacy Preservation for Vehicular Communications. IEEE Trans Veh Technol 59(7):3589–3603
Li J, Lu H, Guizani M (2015) ACPN: A Novel Authentication Framework with Conditional Privacy-Preservation and Non-Repudiation for VANETs. IEEE Trans Parallel Distrib Syst 26(4):938–948
Cheng H, Shojafar M, Alazab M, Tafazolli R, Liu Y (2022) PPVF: Privacy-Preserving Protocol for Vehicle Feedback in Cloud-Assisted VANET. IEEE Trans Intell Transp Syst 23(7):9391–9403
Goudarzi S, Soleymani SA, Anisi MH, Azgomi MA, Movahedi Z, Kama N, Rusli HM, Khan MK (2022) A privacy-preserving authentication scheme based on Elliptic Curve Cryptography and using Quotient Filter in fog-enabled VANET. Ad Hoc Networks 128:102782
Liang Y, Liu Y (2023) Analysis and Improvement of an Efficient Certificateless Aggregate Signature with Conditional Privacy Preservation in VANETs. IEEE Syst J 17(1):664–672
Tzeng SF, Horng SJ, Li T, Wang X, Huang PH, Khan MK (2017) Enhancing Security and Privacy for Identity-Based Batch Verification Scheme in VANETs. IEEE Trans Veh Technol 66(4):3235–3248
Lu R, Lin X, Liang X, Shen X (2012) A Dynamic Privacy-Preserving Key Management Scheme for Location-Based Services in VANETs. IEEE Trans Intell Transp Syst 13(1):127–139
Rajput U, Abbas F, Oh H (2016) A Hierarchical Privacy Preserving Pseudonymous Authentication Protocol for VANET. IEEE Access 4:7770–7784
Cui J, Wen J, Han S, Zhong H (2018) Efficient Privacy-Preserving Scheme for Real-Time Location Data in Vehicular Ad-Hoc Network. IEEE Internet Things J 5(5):3491–3498
Wang F, Xu Y, Zhang H, Zhang Y, Zhu L (2016) 2FLIP: A Two-Factor Lightweight Privacy-Preserving Authentication Scheme for VANET. IEEE Trans Veh Technol 65(2):896–911
Xia Y, Chen W, Liu X, Zhang L, Li X, Xiang Y (2017) Adaptive Multimedia Data Forwarding for Privacy Preservation in Vehicular Ad-Hoc Networks. IEEE Trans Intell Transp Syst 18(10):2629–2641
Tangade S, Manvi SS, Lorenz P (2018) Decentralized and Scalable Privacy-Preserving Authentication Scheme in VANETs. IEEE Trans Veh Technol 67(9):8647–8655
Nandy T, Idris MYI, Md Noor R, Wahab AWA, Bhattacharyy S (2021) A Secure, Privacy-Preserving, and Lightweight Authentication Scheme for VANETs. IEEE Sensors Journal 21(18):20998–21011
Shen J, Liu D, Chen X, Li J, Kumar N, Vijayakumar P (2020) Secure Real-Time Traffic Data Aggregation With Batch Verification for Vehicular Cloud in VANETs. IEEE Trans Veh Technol 69(1):807–817
Peixoto MLM, Maia AHO, Mota E, Rangel E, Costa DG, Turgut D, Villas LA (2021) "A traffic data clustering framework based on fog computing for VANETs. Vehicular Communications 31:100370
Al-Ani R, Baker T, Zhou B, Shi Q (2023) Privacy and safety improvement of VANET data via a safety-related privacy scheme. Int J Inf Secur 22(4):1–21
Hussain R, Rezaeifar Z, Lee Y-H, Oh H (2015) "Secure and privacy-aware traffic information as a service in VANET-based clouds. Pervasive and Mobile Computing 24:194–209
Soleymani SA, Goudarzi S, Mohammad HA, Mahdi Z, Abdul HA, Kama N (2021) A security and privacy scheme based on node and message authentication and trust in fog-enabled VANET. Vehicular Communications 29:100335
Zheng D, Jing C, Guo R, Gao S, Wang L (2019) A Traceable Blockchain-Based Access Authentication System With Privacy Preservation in VANETs. IEEE Access 7:117716–117726
Biswas S, Misic J (2015) "A Cross-Layer Approach to Privacy-Preserving Authentication in Wave-Enabled VANETs. IEEE Trans Vehicular Technol 65:5
Sun C, Liu J, Xu X, Ma J (2017) A Privacy-Preserving Mutual Authentication Resisting DoS Attacks in VANETs. IEEE Access 5:24012–24022
Alharthi A, Ni Q, Jiang R (2021) A Privacy-Preservation Framework Based on Biometrics Blockchain (BBC) to Prevent Attacks in VANET. IEEE Access 9:87299–87309
Feng X, Shi Q, Xie Q, Liu L (2021) An Efficient Privacy-preserving Authentication Model based on blockchain for VANETs. J Systems Architecture 117:102158
Wang M, Liu D, Zhu L, Yongjun X, Wang F (2016) "LESPP: lightWeight and efficient strong privacy preserving authentication scheme for secure VANET communication. Computing 98:685–708
Moni SS, Manivannan D (2021) "A scalable and distributed architecture for secure and privacy-preserving authentication and message dissemination in VANETs. Internet of Things 13:100330
Tanveer M, Alkhayyat A, Naushad A, Khan AU, Kumar N, Alharbi AG (2022) RUAM-IoD: A Robust User Authentication Mechanism for the Internet of Drones. IEEE Access 10:19836–19851
Tanveer M, Alasmary H, Kumar N, Nayak A (2023) SAAF-IoD: Secure and Anonymous Authentication Framework for the Internet of Drones. IEEE Trans Veh Technol (Early Access) 1–13
Tanveer M, Khan AU, Kumar N, Hassan MM (2022) RAMP-IoD: A Robust Authenticated Key Management Protocol for the Internet of Drones. IEEE Internet Things J 99:1–1
Arif M, Wang G, Balas VE, Geman O, Castiglione A, Chen J (2020) SDN based communications privacy-preserving architecture for VANETs using fog computing. Vehicular Communications 26:100265
Bodenstedt S, Rivoir D, Jenke A, Wagner M, Breucha M, Müller-Stich B, Mees ST, Weitz J, Speidel S (2019) Active learning using deep Bayesian networks for surgical workflow analysis. Computer Vision and Pattern Recognition 14:1079–1087
Azizi M, Talatahari S, Gandomi AH (2022) Fire hawk optimizer: a novel metaheuristic algorithm. Artif Intell Rev 56(1):1–77
Kaur S, Awasthi LK, Sangal AL, Dhiman G (2020) Tunicate swarm algorithm: a new bio-inspired based metaheuristic paradigm for global optimization. Eng Appl Artificial Intel 90
Jason Hinek M, Jiang S, Safavi-Naini R, Shahandashti Siamak F (2012) Attribute-based encryption without key cloning. Int J Appl Cryptography 2(3)
Tezcan C (2021) Optimization of advanced encryption standard on graphics processing units 9: 67315–67326
De Vita F, Bruneo D (2019) On the use of LSTM networks for Predictive Maintenance in Smart Industries 241–248
Sherstinsky A (2020) Fundamentals of Recurrent Neural Network (RNN) and Long Short-Term Memory (LSTM) network. Physica D 404:132306
Kumar V, Arora H, Sisodia J (2020) ResNet-based approach for detection and classification of plant leaf diseases 495–502
Umucu EH (2022) Elliptic curve cryptography in blockchain technology, FINRA
Zhong C, Li G, Meng Z (2022) Beluga whale optimization: a novel nature-inspired metaheuristic algorithm. Knowl-Based Syst 251:109215
Giernacki W, Espinoza Fraire T, Kozierski P (2017) Cuttlefish optimization algorithm in autotuning of altitude controller of Unmanned Aerial Vehicle (UAV)
Funding
This research did not receive any specific funding.
Author information
Authors and Affiliations
Contributions
All authors have made substantial contributions to conception and design, revising the manuscript, and the final approval of the version to be published. Also, all authors agreed to be accountable for all aspects of the work in ensuring that questions related to the accuracy or integrity of any part of the work are appropriately investigated and resolved.
Corresponding author
Ethics declarations
Ethical approval
Not Applicable.
Consent to publish
Not Applicable.
Competing interests
The authors declare no competing interests.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Supplementary Information
Below is the link to the electronic supplementary material.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Minu, M.S., Rani, P.J.I., Sonthi, V.K. et al. An innovative privacy preservation and security framework with fog nodes in enabled vanet system using hybrid encryption techniques. Peer-to-Peer Netw. Appl. 17, 2065–2089 (2024). https://doi.org/10.1007/s12083-024-01672-4
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-024-01672-4