Improved Recurrent Neural Network Schema for Validating Digital Signatures in VANET

Vehicular ad hoc networks (VANETs) allow communication between stationary or moving vehicles with the assistance of wireless technology. Among various existing issues in smart VANETs, secure communication is the key challenge in VANETs with a 5G network. Smart vehicles must communicate with a broad range of advanced road systems including traffic control and smart payment systems. Many security mechanisms are used in VANETs to ensure safe transmission; one such mechanism is cryptographic digital signatures based on public key infrastructure (PKI). In this mechanism, secret private keys are used for digital signatures to validate the identity of the message along with the sender. However, the validation of the digital signatures in fast-moving vehicles is extremely difficult. Based on an improved perceptron model of an artificial neural network (ANN), this paper proposes an efficient technique for digital signature verification. Still, manual signatures are extensively used for authentication across the world. However, manual signatures are still not employed for security in automotive and mobile networks. The process of converting manual signatures to pseudo-digital-signatures was simulated using the improved Elman backpropagation (I-EBP) model. A digital signature was employed during network connection to authenticate the legitimacy of the sender’s communications. Because it contained information about the vehicle on the road, there was scope for improvement in protecting the data from attackers. Compared to existing schemes, the proposed technique achieved significant gains in computational overhead, aggregate verification delay, and aggregate signature size.

[1]  Hong Liu,et al.  Hybrid and Hierarchical Aggregation-Verification Scheme for VANET , 2022, IEEE Transactions on Vehicular Technology.

[2]  A. Nayyar,et al.  An enhanced energy-efficient fuzzy-based cognitive radio scheme for IoT , 2022, Neural Computing and Applications.

[3]  Victor C. M. Leung,et al.  Resource Allocation of Video Streaming Over Vehicular Networks: A Survey, Some Research Issues and Challenges , 2022, IEEE Transactions on Intelligent Transportation Systems.

[4]  K. Pradeep Kumar,et al.  Secure Authenticated Communication Via Digital Signature and Clear List in VANETs , 2022, ECS Transactions.

[5]  Premkumar Chithaluru,et al.  MTCEE-LLN: Multilayer Threshold Cluster-Based Energy-Efficient Low-Power and Lossy Networks for Industrial Internet of Things , 2022, IEEE Internet of Things Journal.

[6]  F. Al-turjman,et al.  BAIV: An Efficient Blockchain-Based Anonymous Authentication and Integrity Preservation Scheme for Secure Communication in VANETs , 2022, Electronics.

[7]  Abderrahim Benslimane,et al.  An Energy-Efficient Routing Scheduling Based on Fuzzy Ranking Scheme for Internet of Things , 2021, IEEE Internet of Things Journal.

[8]  Jinguo Li,et al.  A Conditional Privacy-Preserving Certificateless Aggregate Signature Scheme in the Standard Model for VANETs , 2022, IEEE Access.

[9]  M. Kaur,et al.  Design and Simulation of Ring Network-on-Chip for Different Configured Nodes , 2022, Computers, Materials & Continua.

[10]  Shams Tabrez Siddiqui,et al.  SDSWSN—A Secure Approach for a Hop-Based Localization Algorithm Using a Digital Signature in the Wireless Sensor Network , 2021, Electronics.

[11]  Ibtihal Ahmed,et al.  Authentication and Billing for Dynamic Wireless EV Charging in an Internet of Electric Vehicles , 2021, Future Internet.

[12]  A. Rövid,et al.  Towards Cooperative Perception Services for ITS: Digital Twin in the Automotive Edge Cloud , 2021, Energies.

[13]  Arpit Jain,et al.  Image smog restoration using oblique gradient profile prior and energy minimization , 2021, Frontiers of Computer Science.

[14]  Premkumar Chithaluru,et al.  ETH‐LEACH: An energy enhanced threshold routing protocol for WSNs , 2021, Int. J. Commun. Syst..

[15]  P. Vasudeva Reddy,et al.  Efficient and Secure Certificateless Aggregate Signature-Based Authentication Scheme for Vehicular Ad Hoc Networks , 2021, IEEE Internet of Things Journal.

[16]  Ashok Kumar,et al.  Desmogging of still smoggy images using a novel channel prior , 2020, J. Ambient Intell. Humaniz. Comput..

[17]  Muhammad Khurram Khan,et al.  Efficient Certificateless Aggregate Signature With Conditional Privacy Preservation in IoV , 2020, IEEE Systems Journal.

[18]  Zhiguang Qin,et al.  Certificateless-Based Anonymous Authentication and Aggregate Signature Scheme for Vehicular Ad Hoc Networks , 2021, Wirel. Commun. Mob. Comput..

[19]  Mohiuddin Ahmed,et al.  A Secured Privacy-Preserving Multi-Level Blockchain Framework for Cluster Based VANET , 2021 .

[20]  Premkumar Chithaluru,et al.  Organization Security Policies and Their After Effects , 2020 .

[21]  Huajie Xu,et al.  Certificateless Aggregate Signature Scheme with High Efficencicy in Vehicular Ad-hoc Network , 2020 .

[22]  Premkumar Chithaluru,et al.  Eyeblink Robot Control Using Brain-Computer Interface for Healthcare Applications , 2019, International Journal of Mobile Devices, Wearable Technology, and Flexible Electronics.

[23]  Rakesh Kumar Dwivedi,et al.  A High Capacity PDF Text Steganography Technique Based on Hashing Using Quadratic Probing , 2019, International Journal of Intelligent Engineering and Systems.

[24]  Arpit Jain,et al.  Synthesis of 2D and 3D NoC Mesh Router Architecture in HDL Environment , 2019 .

[25]  Nabil Benamar,et al.  OF-EC: A novel energy consumption aware objective function for RPL based on fuzzy logic , 2018, J. Netw. Comput. Appl..

[26]  Yue Dong,et al.  A kind of effective data aggregating method based on compressive sensing for wireless sensor network , 2018, EURASIP Journal on Wireless Communications and Networking.

[27]  Adnan Shahid Khan,et al.  A Review of Vehicle to Vehicle Communication Protocols for VANETs in the Urban Environment , 2018, Future Internet.

[28]  Yuan Tian,et al.  Improving Vehicular Authentication in VANET using Cryptography , 2018 .

[29]  Zhihua Xia,et al.  A vehicular ad hoc network privacy protection scheme without a trusted third party , 2017, Int. J. Distributed Sens. Networks.

[30]  Garrick Hileman,et al.  Cryptocurrency and Blockchain , 2017, From Traditional Fault Tolerance to Blockchain.

[31]  Anis Laouiti,et al.  VANet security challenges and solutions: A survey , 2017, Veh. Commun..

[32]  M. Nithya,et al.  OVERVIEW OF VANET WITH ITS FEATURES AND SECURITY ATTACKS , 2016 .

[33]  Yiqing Zhou,et al.  Heterogeneous Vehicular Networking: A Survey on Architecture, Challenges, and Solutions , 2015, IEEE Communications Surveys & Tutorials.

[34]  Apdullah Yayik,et al.  NEURAL NETWORK BASED CRYPTOGRAPHY , 2014 .

[35]  Li He,et al.  Mitigating DoS attacks against signature-based authentication in VANETs , 2012, 2012 IEEE International Conference on Computer Science and Automation Engineering (CSAE).

[36]  Hung-Yu Chien,et al.  SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity , 2007, IEEE Transactions on Dependable and Secure Computing.

[37]  N. Koblitz Elliptic curve cryptosystems , 1987 .