Enhanced Adaptive Multimedia Data Forwarding for Privacy Preservation in Vehicular Ad-Hoc Networks Using Authentication Group Key

Abstract

The vehicular ad-hoc networks (VANETs) are expected to support the diverse infrastructure based commercial services, including internet access, real-time traffic concerns, video streaming and content distribution. It also enables a wide range of promising applications and services. It has brought new security challenges due to their mobile and infrastructure less nature. In particular, confidentiality and location privacy are regarded as the most critical security concerns for securing service-oriented vehicular networks. Forwarded messages in vehicular ad-hoc networks are primarily multimedia data, including structured data, plain text, sound, and video which require access control with efficient privacy preservation. In this project, Ciphertext-policy attribute-based encryption (CP-ABE) delegation scheme is proposed, which allows road side units (RSUs) to perform most of the computation for the purpose of improving the decryption efficiency of the vehicles. In addition to that, proposed a novel Sybil attack detection mechanism, Footprint, using the trajectories of vehicles for identification while still preserving their location privacy. More specifically, when a vehicle approaches a road-side unit (RSU), it actively demands an authorized message from the RSU as the proof of the appearance time at this RSU. A location-hidden authorized message generation scheme is designed for two objectives: first, RSU signatures on messages are signer ambiguous so that the RSU location information is concealed from the resulted authorized message; Second, two authorized messages signed by the same RSU within the same given period of time are recognizable so that they can be used for identification. If the RSU is found to be failure but not updated with Trusted Authority, the current RSU which reads the records from the vehicle, queries the Trusted Authority about all the nearest nodes of missed RSU (second hop) from current RSU, and calculate the two hop timings and suspect the vehicle if the messages are not matched.

Authors and Affiliations

Poongodi R. K, Sivakumar T

Keywords

--

Related Articles

A Study of Data Storage Security Issues in Cloud Computing

Cloud computing provides on demand services to its purchasers. Knowledge storage is among one in every of the first services provided by cloud computing. Cloud service supplier hosts the information of knowledge owner on...

Optimization of Milling Operation Using Genetic and PSO Algorithm

Metal cutting is one of the important and widely used manufacturing processes in engineering industries. Optimizing the machining parameters has become an essential one in order to be competitive and to meet customer dem...

Enhanced Secure Big Data in Distributed Mobile Cloud Computing Using Fuzzy Encryption Model

This paper proposes a novel architecture for adaptive encryption of public cloud databases that offers a proxy-free alternative to the system. cloud system is difficult to synchronize login and authentication data betwee...

An Improved Compiler Directed Power Optimization for Disk Based Systems using Back Propagation Neural Networks

The performance of the parallel disk systems is highly affected by excessive power consumption. Hence, various researches are being done in the areas of energy optimization of such systems. Because of the extensive growt...

Topic Categorization based on User behaviour in Random Social Networks Using Firefly Algorithm

During an intercommunication period in social network participants either upgrade the interest in a topic through their positive inputs, catchy comments, tag lines or they simply do not show any interest. The activity of...

Download PDF file
  • EP ID EP405019
  • DOI 10.9756/BIJSESC.8385
  • Views 122
  • Downloads 0

How To Cite

Poongodi R. K, Sivakumar T (2018). Enhanced Adaptive Multimedia Data Forwarding for Privacy Preservation in Vehicular Ad-Hoc Networks Using Authentication Group Key. Bonfring International Journal of Software Engineering and Soft Computing, 8(1), 26-30. https://europub.co.uk/articles/-A-405019