Abstract
The academic community has placed a lot of emphasis on privacy and security as a result of the expanding use of the internet of things. Security and privacy are crucial given the volume of personally identifiable information collected by Internet of Things devices, such as identification, location, phone numbers, and energy use. The application of Internet of Things technologies on the client side will be hampered by the lack of clearly defined privacy and security solutions afforded by the Internet of Things. In order to secure people's privacy within the framework of the internet of things, this research suggests the ElGamal public key cryptosystem (EGPKC) with optimum key generation utilizing the oppositional artificial flora optimization (EGPKC-OAFA) algorithm. The IEEE 802.15.4 MAC standard, which incorporates the security field as a component of the MAC header, is the main focus of the EGPKC-OAFA technique. Additionally, the MAC header incorporates the EGPKC method, enabling the most effective creation of authentication keys. Additionally, the OAFA technique uses the OAFA approach, with the results of several functions, such as opposition-based and conventional AFA concepts, defined. The best EGPKC applicant screening process, it has been demonstrated through a variety of simulations that the EGPKC- can accurately analyses its performance.








Similar content being viewed by others
Data availability
Data sharing is not applicable to this article.
References
Alaya B, Sellami L (2021) Clustering method and symmetric/asymmetric cryptography scheme adapted to securing urban VANET networks. J Inf Secur Appl 58:102779
Alfadhli SA, Lu S, Chen K, Sebai M (2020) Mfspv: A multi-factor secured and lightweight privacy-preserving authentication scheme for vanets. IEEE Access 8:142858–142874
Al-Shareeda MA, Anbar M, Manickam S, Yassin AA (2020) Vppcs: Vanet based privacy-preserving communication scheme. IEEE Access 8:150914–150928
Benarous L, Kadri B, Bitam S, Mellouk A (2020) Privacy-preserving authentication scheme for on-road on-demand refilling of pseudonym in VANET. Int J Commun Syst 33(10):e4087
Chen JQ, Mao GQ (2018) Capacity of cooperative vehicular networks with infrastructure support: multi-user case. IEEE Trans Vehicular Technol 67(2):1546–1560. https://doi.org/10.1109/TVT.2017.2753772
Cheng L, Wu H, Wang Y (2018) Artificial flora (AF) optimization algorithm. Appl Sci 8(3):329
Chia L and Chen H (2012) Computational complexity analyses on cryptographic algorithms for computer security application. Innov Comput Appl 307–11
Choudhary D, Pahuja R (2022) Two-way emergency message protocol in M-VANETs. Int J Software Innov 10(1):1–16. https://doi.org/10.4018/IJSI.309962
Choudhary D, Pahuja R (2022) Improvement in quality of service against doppelganger attacks for connected network. Int J Interact Multimed Artif Intell 7(5):51. https://doi.org/10.9781/ijimai.2022.08.003
Choudhary D, Pahuja R (2022) Deep learning approach for encryption techniques in vehicular networks. Wireless Personnel Comm. https://doi.org/10.1007/s11277-022-09538-9
Cui J, Wei L, Zhong H, Zhang J, Xu Y, Liu L (2020) Edge computing in VANETs-an efficient and privacy-preserving cooperative downloading scheme. IEEE J Sel Areas Commun 38(6):1191–1204
Esfahani A, Mantas G, Rodriguez J, Neves J (2017) An efficient homomorphic MAC-based scheme against data and tag pollution attacks in network coding-enabled wireless networks. Int J Inf Secur 16:627–639
Feng H, Ni H, Zhao R, Zhu X (2020) An enhanced grasshopper optimization algorithm to the Bin packing problem. J Control Sci Eng 2020:1–19. https://doi.org/10.1155/2020/3894987
Hansen J, Lucani D, Krigslund J, Medard & M., Fitzkee, F. (2015) Network coded software defined networking: enabling 5G transmission and storage networks. IEEE Commun Mag 53:100–107
Haval I, Hussein W, Abduallah M (2019) An efficient ElGamal cryptosystem scheme. Int J Comput Appl 43(10):1088–1094
Khan AS, Balan K, Javed Y, Tarmizi S, Abdullah J (2019) Secure trust-based blockchain architecture to prevent attacks in VANET. Sensors 19(22):4954
Alhassan K (2017) Accelerating secure computations under fully homomorphic encryption Ph.D. Thesis, University of Toronto, Toronto
Li P, Li J, Huang Z, Li T, Gao CZ, Yiu SM, Chen K (2017) Multi-key privacy-preserving deep learning in cloud computing. Future Gener Comput Syst 74:76–85
Mamun A-T et at. (2020) Towards secure and privacy-preserving iot enabled smart home: architecture and experimental study sensor
Muhammad SJ, Zhang S, Dyo V (2015) Network coding for reliable safety message communication in vehicular Ad-Hoc networks: a review. In: Proceedings of the 2015 fourth international conference on future generation communication technology (FGCT), Luton, UK, 29–31 July; pp 1–6
Peralta G, Cid-Fuentes RG, Bilbao J, Crespo PM (2019) Homomorphic encryption and network coding in iot architectures: Advantages and future challenges. Electronics 8(8):827
Sun X, Zhang P, Liu JK, Yu J, Xie W (2019) Private machine learning classification based on fully homomorphic encryption. IEEE Trans Emerg Top Comput
Talha S, Ahmad R, Kiani AK, Alam MM (2017) Network coding for energy efficient transmission in wireless body area networks. Procedia Comput Sci 113:435–440
Wang Y, Zhong H, Xu Y, Cui J, Wu G (2020a) Enhanced security identity-based privacy-preserving authentication scheme supporting revocation for vanets. IEEE Syst J 14(4):5373–5383
Wang S, Mao K, Zhan F, Liu D (2020b) Hybrid conditional privacy-preserving authentication scheme for VANETs. Peer-to-Peer Netw Appl 13:1600–1615
Funding
Not applicable.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Choudhary, D., Pahuja, R. Artificial flora optimization algorithm in connected vehicular network. Int J Syst Assur Eng Manag 14, 323–333 (2023). https://doi.org/10.1007/s13198-022-01798-9
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s13198-022-01798-9