INFORMATION CHANGE THE WORLD

International Journal of Computer Network and Information Security(IJCNIS)

ISSN: 2074-9090 (Print), ISSN: 2074-9104 (Online)

Published By: MECS Press

IJCNIS Vol.13, No.2, Apr. 2021

Secured Message Broadcasting in VANET using Blowfish Algorithm with Oppositional Deer Hunting Optimization

Full Text (PDF, 631KB), PP.39-52


Views:2   Downloads:0

Author(s)

M. Selvi, B. Ramakrishnan

Index Terms

VANET;Security;Active and Passive attacks;Deer Hunting Optimization (DHO);Oppositional behaviour learning (OBL)

Abstract

Emergency Message broadcasting is an important process in VANET. Security and reliable transmission are the two major concerns in message broadcasting. VANET is open to unauthorized nodes, hackers, misbehaving vehicles, malicious attackers etc without security. Without valid confirmation of authorized vehicles, these types of attacks may occur. To enhance the reliability in message broadcasting, some existing techniques are used. They transmit the data without much delay but they didn’t provide any trusted authentication. So hackers, malicious nodes, unauthorized vehicles may easily interrupt the emergency messages. Also Brute force attack, Man in Middle attack are not identified and eliminated. In this research, a trust based secured broadcasting mechanism is developed which ensures the metrics such as security, privacy, integrity, trust etc. The major intension of this research is to reduce latency and provide high reliable, secure and efficient communication over the vehicles. The data such as vehicle position, location, speed, and other traffic information’s are generated and stored in a separate table. A network is created with varying densities. A path is generated for message broadcasting between source and destination based on the specific gateway estimated.  Here, Optimal Wireless Access in Vanet (OWAV) Protocol is employed to gather vehicle related information to reduce the delay. Blowfish encryption algorithm along with Oppositional Deer Hunting Optimization (ODHO) is used to store the trusted vehicles location to avoid unauthorized tracking. The performance of the proposed research is analyzed with various metrics such as Packet delivery ratio (PDR), transmission delay, encryption time, throughput, computational overhead etc. The efficiency of the research is compared with other existing methods. 

Cite This Paper

M. Selvi, B. Ramakrishnan, "Secured Message Broadcasting in VANET using Blowfish Algorithm with Oppositional Deer Hunting Optimization", International Journal of Computer Network and Information Security(IJCNIS), Vol.13, No.2, pp.39-52, 2021. DOI: 10.5815/ijcnis.2021.02.04

Reference

[1]Muhammad Awais Javed, Duy Trong Ngo and Jamil Yusuf Khan, "A multi-hop broadcast protocol design for emergency warning notification in highway VANETs.” EURASIP Journal on Wireless Communications and Networking 179(2014):pp. 1-15.

[2]Manivannan, Shafika Showkat Moni,  Sherali Zeadally,"Secure authentication and privacy-preserving techniques in Vehicular Ad-hoc NETworks (VANETs).” Vehicular Communications 25(2020):pp.1-18.

[3]Salim Bitam, Abdelhamid Mellouk, Sherali Zeadally, “VANET-cloud: generic cloud computing model for vehicular Ad Hoc networks.” IEEE Wirel. Commun  22 (2015): pp. 96–102.

[4]Mohamed Nidhal Mejri,Jalel Ben-Othman, Mohamed Hamdi, “Survey on VANET security challenges and possible crypto-graphic solutions.” Veh. Commun. 1.2 (2014):pp. 53–66.

[5]Wenshuang Liang, Zhuorong Li, Hongyang Zhang, Shenling Wang, Rongfang Bie , “Vehicular ad hoc networks: architectures, research issues, methodologies, challenges, and trends.” Int. J. Distrib. Sens. Netw. 11.8 (2015):pp. 1-11.

[6]Vaibhav, Dilendra Shukla, Sanjoy Das, Subrata Sahana, “Security challenges, authentication, application and trust models for vehicular ad hoc network—a survey.” Int. J. Wirel. Microw. Technol. 3 (2017):pp. 36–48.

[7]Fengzhong Qu, Zhihui Wu, Fei-Yue Wang, Woong Cho, “A security and privacy review of VANETs.” IEEE Trans. Intell. Transp. Syst. 16 (2015):pp.2985–2996.

[8]Bingyi Liu, Dongyao Jia Jianping Wang, Kejie Lu, Libing Wu, “Cloud-assisted safety message dissemination in VANET—cellular heterogeneous wireless network.” IEEE Syst. J. 11.1 (2017):pp.128-139.

[9]Richard Gilles Engoulou, Martine Bellaïche,Samuel Pierre, Alejandro Quintero, ”VANET security surveys.” Comput. Commun. 44 (2014):pp.1–13.

[10]R. Raiya, S. Gandhi, Survey of various security techniques in VANET, Int. J. Adv. Res. Comput. Sci. Softw. Eng. 4 (2014).

[11]Y. L. Morgan, “Managing DSRC and WAVE standards operations in a V2V scenario.” International Journal of Vehicular Technology (2010):pp.1-18.

[12]Tzeng, Shiang-Feng, et al, “Enhancing security and privacy for identity-based batch verification scheme in VANETs.” IEEE Transactions on Vehicular Technology 66.4 (2017): pp.3235-3248.

[13]Tangade, S. Manvi S. S and Lorenz, P, “Decentralized and Scalable Privacy-Preserving Authentication Scheme in VANETs.” IEEE Transactions on Vehicular Technology, (2018): pp.1-10.

[14]Muthumeenakshi, R., T. R. Reshmi, and K. Murugan, “Extended 3PAKE authentication scheme for value-added services in VANETs.” Computers & Electrical Engineering l. 59 (2017): pp. 27-38.

[15]Dressler, F., Klingler, F., Sommer C., and Cohen, R, “Not All VANET Broadcasts Are the Same: Context-Aware Class Based Broadcast.” IEEE/ACM Transactions on Networking  26.1 (2018): pp. 17-30.

[16]Feukeu, E.A., Zuva, T, “Dynamic Broadcast Storm Mitigation Approach for VANETs.” Future Generation Computer Systems ( 2014):pp.1-8.

[17]Daxin Tian,Chao Liu, Xuting Duan, Zhengguo Sheng, Qiang Ni,Min Chen,and Victor C.M. Leung, “A Distributed Position-Based Protocol for Emergency Messages Broadcasting in Vehicular Ad Hoc Networks.” IEEE Internet of Things Journal 5.2 (2014):pp. 1218-1227.

[18]Brammya, G, Praveena, S., Ninu Preetha, N.S., Ramya, R.,  Rajakumar B.R., and Binu, D, “Deer Hunting Optimization Algorithm: A New Nature-Inspired Meta-heuristic Paradigm”  The Computer Journal (2018):pp.1-20.

[19]Mirjalili S, Mirjalili SM, Lewis A., “Grey Wolf Optimizer.” Advances in Engineering Software 69.3 (2014): pp. 46-61.

[20]Sathya Narayanan P.S.V, “A sensor enabled secure vehicular communication for emergency message dissemination using cloud services.” Digital Signal Processing 85 (2019): pp. 10-16.

[21]Yuanguo Bi, Hangguan Shan, Xuemin Sherman Shen, Ning Wang, Hai Zhao, “A Multi-Hop Broadcast Protocol for Emergency Message Dissemination in Urban Vehicular Ad Hoc Networks.” IEEE Transactions on Intelligent Transportation Systems 17.3 (2016).

[22]S. Zeadally, R. Hunt, Y.-S. Chen, A. Irwin, and A. Hassan, “Vehicular ad hoc networks (VANETS): status, results, and challenges.” Telecommunication Systems 50.4 (2012):pp. 217–241.

[23]F. Qu, Z. Wu, F. Wang, and W. Cho, “A security and privacy review of VANETs.” IEEE Transactions on Intelligent Transportation Systems 16.6 (2015):pp. 2985–2996.

[24]R. Mishra, A. Singh, and R. Kumar, “VANET security: issues, challenges and solutions.” in Proceedings of the International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), pp. 1050–1055, Chennai, India, March 2016.

[25]J. Cui, L. Wei, J. Zhang, Y. Xu, and H. Zhong, “An efficient message-authentication scheme based on edge computing for vehicular ad hoc networks.” IEEE Transactions on Intelligent Transportation Systems 20.5 (2019):pp. 1621–1632.

[26]R. Akalu, “Privacy, consent and vehicular ad hoc networks (VANETs).” Computer Law & Security Review 34.1 (2018): pp. 37–46.

[27]K. Bylykbashi, D. Elmazi, K. Matsuo, M. Ikeda, and L. Barolli, “Effect of security and trustworthiness for a fuzzy cluster management system in VANETs.” Cognitive Systems Research l. 55, pp. 153–163, 2019.

[28]J. P. Hubaux, S. Capkun, and J. Jun Luo, “The security and privacy of smart vehicles.” IEEE Security & Privacy Magazine 2.3(2004):pp. 49–55.

[29]M. Azees, L. Jegatha Deborah, and P. Vijayakumar, “Comprehensive survey on security services in vehicular adhoc networks.” IET Intelligent Transport Systems 10.6 (2016):pp. 379–388.

[30]Sivaraj C, Alphonse P J A, Janakiraman T N,"Energy-efficient and Load Distributed Clustering Algorithm for Dense Wireless Sensor Networks", International Journal of Intelligent Systems and Applications(IJISA), Vol.9, No.5, pp.34-42, 2017. DOI: 10.5815/ijisa.2017.05.05

[31]Hamdy M. Mousa, "Bat-Genetic Encryption Technique", International Journal of Intelligent Systems and Applications(IJISA), Vol.11, No.11, pp.1-15, 2019. DOI: 10.5815/ijisa.2019.11.01

[32]Krishna S.R.M., Seeta Ramanath M.N., Kamakshi Prasad V.,"Optimal Reliable Routing Path Selection in MANET through Novel Approach in GA", International Journal of Intelligent Systems and Applications(IJISA), Vol.9, No.2, pp.35-41, 2017. DOI: 10.5815/ijisa.2017.02.05