Skip to main content

Advertisement

Log in

Artificial flora optimization algorithm in connected vehicular network

  • ORIGINAL ARTICLE
  • Published:
International Journal of System Assurance Engineering and Management Aims and scope Submit manuscript

Abstract

The academic community has placed a lot of emphasis on privacy and security as a result of the expanding use of the internet of things. Security and privacy are crucial given the volume of personally identifiable information collected by Internet of Things devices, such as identification, location, phone numbers, and energy use. The application of Internet of Things technologies on the client side will be hampered by the lack of clearly defined privacy and security solutions afforded by the Internet of Things. In order to secure people's privacy within the framework of the internet of things, this research suggests the ElGamal public key cryptosystem (EGPKC) with optimum key generation utilizing the oppositional artificial flora optimization (EGPKC-OAFA) algorithm. The IEEE 802.15.4 MAC standard, which incorporates the security field as a component of the MAC header, is the main focus of the EGPKC-OAFA technique. Additionally, the MAC header incorporates the EGPKC method, enabling the most effective creation of authentication keys. Additionally, the OAFA technique uses the OAFA approach, with the results of several functions, such as opposition-based and conventional AFA concepts, defined. The best EGPKC applicant screening process, it has been demonstrated through a variety of simulations that the EGPKC- can accurately analyses its performance.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Data availability

Data sharing is not applicable to this article.

References

  • Alaya B, Sellami L (2021) Clustering method and symmetric/asymmetric cryptography scheme adapted to securing urban VANET networks. J Inf Secur Appl 58:102779

    Google Scholar 

  • Alfadhli SA, Lu S, Chen K, Sebai M (2020) Mfspv: A multi-factor secured and lightweight privacy-preserving authentication scheme for vanets. IEEE Access 8:142858–142874

    Article  Google Scholar 

  • Al-Shareeda MA, Anbar M, Manickam S, Yassin AA (2020) Vppcs: Vanet based privacy-preserving communication scheme. IEEE Access 8:150914–150928

    Article  Google Scholar 

  • Benarous L, Kadri B, Bitam S, Mellouk A (2020) Privacy-preserving authentication scheme for on-road on-demand refilling of pseudonym in VANET. Int J Commun Syst 33(10):e4087

    Article  Google Scholar 

  • Chen JQ, Mao GQ (2018) Capacity of cooperative vehicular networks with infrastructure support: multi-user case. IEEE Trans Vehicular Technol 67(2):1546–1560. https://doi.org/10.1109/TVT.2017.2753772

    Article  Google Scholar 

  • Cheng L, Wu H, Wang Y (2018) Artificial flora (AF) optimization algorithm. Appl Sci 8(3):329

    Article  Google Scholar 

  • Chia L and Chen H (2012) Computational complexity analyses on cryptographic algorithms for computer security application. Innov Comput Appl 307–11

  • Choudhary D, Pahuja R (2022) Two-way emergency message protocol in M-VANETs. Int J Software Innov 10(1):1–16. https://doi.org/10.4018/IJSI.309962

    Article  Google Scholar 

  • Choudhary D, Pahuja R (2022) Improvement in quality of service against doppelganger attacks for connected network. Int J Interact Multimed Artif Intell 7(5):51. https://doi.org/10.9781/ijimai.2022.08.003

    Article  Google Scholar 

  • Choudhary D, Pahuja R (2022) Deep learning approach for encryption techniques in vehicular networks. Wireless Personnel Comm. https://doi.org/10.1007/s11277-022-09538-9

    Article  Google Scholar 

  • Cui J, Wei L, Zhong H, Zhang J, Xu Y, Liu L (2020) Edge computing in VANETs-an efficient and privacy-preserving cooperative downloading scheme. IEEE J Sel Areas Commun 38(6):1191–1204

    Article  Google Scholar 

  • Esfahani A, Mantas G, Rodriguez J, Neves J (2017) An efficient homomorphic MAC-based scheme against data and tag pollution attacks in network coding-enabled wireless networks. Int J Inf Secur 16:627–639

    Article  Google Scholar 

  • Feng H, Ni H, Zhao R, Zhu X (2020) An enhanced grasshopper optimization algorithm to the Bin packing problem. J Control Sci Eng 2020:1–19. https://doi.org/10.1155/2020/3894987

    Article  MATH  Google Scholar 

  • Hansen J, Lucani D, Krigslund J, Medard & M., Fitzkee, F. (2015) Network coded software defined networking: enabling 5G transmission and storage networks. IEEE Commun Mag 53:100–107

    Article  Google Scholar 

  • Haval I, Hussein W, Abduallah M (2019) An efficient ElGamal cryptosystem scheme. Int J Comput Appl 43(10):1088–1094

    Google Scholar 

  • Khan AS, Balan K, Javed Y, Tarmizi S, Abdullah J (2019) Secure trust-based blockchain architecture to prevent attacks in VANET. Sensors 19(22):4954

    Article  Google Scholar 

  • Alhassan K (2017) Accelerating secure computations under fully homomorphic encryption Ph.D. Thesis, University of Toronto, Toronto

  • Li P, Li J, Huang Z, Li T, Gao CZ, Yiu SM, Chen K (2017) Multi-key privacy-preserving deep learning in cloud computing. Future Gener Comput Syst 74:76–85

    Article  Google Scholar 

  • Mamun A-T et at. (2020) Towards secure and privacy-preserving iot enabled smart home: architecture and experimental study sensor

  • Muhammad SJ, Zhang S, Dyo V (2015) Network coding for reliable safety message communication in vehicular Ad-Hoc networks: a review. In: Proceedings of the 2015 fourth international conference on future generation communication technology (FGCT), Luton, UK, 29–31 July; pp 1–6

  • Peralta G, Cid-Fuentes RG, Bilbao J, Crespo PM (2019) Homomorphic encryption and network coding in iot architectures: Advantages and future challenges. Electronics 8(8):827

    Article  Google Scholar 

  • Sun X, Zhang P, Liu JK, Yu J, Xie W (2019) Private machine learning classification based on fully homomorphic encryption. IEEE Trans Emerg Top Comput

  • Talha S, Ahmad R, Kiani AK, Alam MM (2017) Network coding for energy efficient transmission in wireless body area networks. Procedia Comput Sci 113:435–440

    Article  Google Scholar 

  • Wang Y, Zhong H, Xu Y, Cui J, Wu G (2020a) Enhanced security identity-based privacy-preserving authentication scheme supporting revocation for vanets. IEEE Syst J 14(4):5373–5383

    Article  Google Scholar 

  • Wang S, Mao K, Zhan F, Liu D (2020b) Hybrid conditional privacy-preserving authentication scheme for VANETs. Peer-to-Peer Netw Appl 13:1600–1615

    Article  Google Scholar 

Download references

Funding

Not applicable.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Deepak Choudhary.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Choudhary, D., Pahuja, R. Artificial flora optimization algorithm in connected vehicular network. Int J Syst Assur Eng Manag 14, 323–333 (2023). https://doi.org/10.1007/s13198-022-01798-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s13198-022-01798-9

Keywords