A Robust Authentication and Trust Detection With Privacy Preservation of Data for Fog Computing in VANET Using Adaptive Deep Neural Network

被引:0
作者
Jia, Jia [1 ]
Kumarasamy, Sathiya Sekar [2 ]
Pokkuluri, Kiran Sree [3 ]
Kumar, K. Suresh [4 ]
Priyanka, Thella Preethi [5 ]
Wang, Feng [6 ]
机构
[1] Dongguan City Univ, Sch Artificial Intelligence, Dongguan 523000, Guangdong, Peoples R China
[2] K S R Coll Engn, Dept Elect & Elect Engn, Tiruchengode 637215, Tamil Nadu, India
[3] Shri Vishnu Engn Coll Women, Dept Comp Sci & Engn, Bhimavaram 534202, India
[4] Saveetha Engn Coll Autonomous, Dept Informat Technol, Chennai 602105, Tamil Nadu, India
[5] Koneru Lakshmaiah Educ Fdn, Dept Comp Sci Engn, Guntur 522502, Andhra Prades, India
[6] Hainan Normal Univ, Sch Econ & Management, Haikou 570100, Peoples R China
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Authentication; Edge computing; Computational modeling; Vehicular ad hoc networks; Privacy; Security; Data privacy; Safety; Automobiles; Deep learning; Vehicular ad-hoc networks; node authentication; trust detection; adaptive deep neural networks; optimal key-based data sanitization; enhanced garter snake optimization algorithm; SCHEME; MODEL; LIGHTWEIGHT; EFFICIENT; SYSTEMS;
D O I
10.1109/ACCESS.2024.3486811
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Trust detection and node authentication within fog computing for the Vehicle Ad-hoc Networks (VANETs) are used to determine whether the automobiles and other infrastructure elements including Roadside Units (RSUs) are valid and secure before permitting them to function on the system. It is essential for ensuring the privacy and authenticity of automobile networks, particularly for systems that require safety-critical communication. However, the distributed and decentralized design of fog computing increases difficulties in establishing security measures and coordination between various nodes that are responsible for trust detection and authentication. In fog-enabled VANETs, trust and privacy remain a key challenge. To overcome the existing challenges, a new system for node authentication and trust detection in fog computing for VANETs is developed. Initially, node authentication and trust detection in vehicular networks is conducted using Adaptive Deep Neural Networks (ADNN). Verification of the node's authenticity and evaluating its trust scores will considerably minimize the chance of cyber attacks and fraudulent behavior across the system, thus enhancing the security of the entire system. Node authentication on the VANET model promotes safe interaction between vehicles. Trust detection in VANET guarantees the integrity of information transferred between vehicles. The parameters of the ADNN are optimally tuned with the help of an Enhanced Garter Snake Optimization Algorithm (EGSOA) to enhance the performance. Some of the models focus only on node authentication and do not consider privacy issues. Thus, it affects the users' identities and personal information. So, in our model after completing the node authentication and trust detection, privacy preservation of data is performed using Optimal Key-aided Data Sanitization (OPDS). Here, the same EGSOA strategy is employed to get the sanitized key to increase security. The effectiveness of this newly developed fog computing framework for VANETs is evaluated against traditional models, with an expectation of achieving superior accuracy.
引用
收藏
页码:161227 / 161246
页数:20
相关论文
共 49 条
  • [1] Abdullah A., 2017, Cryptogr. Netw. Secur., V16, P11
  • [2] Blockchain-based secure information sharing for supply chain management: Optimization assisted data sanitization process
    Abidi, Mustufa Haider
    Alkhalefah, Hisham
    Umer, Usama
    Mohammed, Muneer Khan
    [J]. INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2021, 36 (01) : 260 - 290
  • [3] Privacy and safety improvement of VANET data via a safety-related privacy scheme
    Al-ani, Ruqayah
    Baker, Thar
    Zhou, Bo
    Shi, Qi
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (04) : 763 - 783
  • [4] Realization of a Robust Fog-Based Green VANET Infrastructure
    Ali, Qutaiba I.
    [J]. IEEE SYSTEMS JOURNAL, 2023, 17 (02): : 2465 - 2476
  • [5] FC-LSR: Fog Computing-Based Lightweight Sybil Resistant Scheme in 5G-Enabled Vehicular Networks
    Almazroi, Abdulwahab Ali
    Alkinani, Monagi H.
    Al-Shareeda, Mahmood A.
    Alqarni, Mohammed A.
    Almazroey, Alaa Atallah
    Gaber, Tarek
    [J]. IEEE ACCESS, 2024, 12 : 30101 - 30112
  • [6] Amounas F., 2012, Appl. Math. Sci., V6, P5039
  • [7] Squid Game Optimizer (SGO): a novel metaheuristic algorithm
    Azizi, Mahdi
    Shishehgarkhaneh, Milad Baghalzadeh
    Basiri, Mahla
    Moehler, Robert C.
    [J]. SCIENTIFIC REPORTS, 2023, 13 (01)
  • [8] A decision-support framework for data anonymization with application to machine learning processes
    Caruccio, Loredana
    Desiato, Domenico
    Polese, Giuseppe
    Tortora, Genoveffa
    Zannone, Nicola
    [J]. INFORMATION SCIENCES, 2022, 613 : 1 - 32
  • [9] Catalbas MC., 2022, HDB INTELL COMPUT OP, P461, DOI [10.1002/9781119792642.ch23, DOI 10.1002/9781119792642.CH23]
  • [10] THE DATA ENCRYPTION STANDARD (DES) AND ITS STRENGTH AGAINST ATTACKS
    COOPERSMITH, D
    [J]. IBM JOURNAL OF RESEARCH AND DEVELOPMENT, 1994, 38 (03) : 243 - 250