Three-Tier approach to fortifying secure communication in Internet of vehicles networks

被引:1
|
作者
Karthikeyan, N. [1 ]
Shanthi, S. [2 ]
机构
[1] Govt Coll Engn, Dept Comp Sci & Engn, Thanjavur, Tamil Nadu, India
[2] Kongu Engn Coll, Dept Comp Sci & Engn, Erode, Tamil Nadu, India
关键词
Internet of Vehicles; Data security; Encryption; RSA algorithm; IMAGE STEGANOGRAPHY; BEARINGS;
D O I
10.1016/j.asej.2024.103087
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
In the recent era, the high speed networking technologies plays a vital role in Internet of Vehicles (IoV) is increasingly prevalent in numerous real-time applications. In IoV network, the communication between different vehicles are rapidly increased by sharing essential information such as traffic conditions, pathways, vehicle details, and position which enables to enhancing traffic safety and optimizing vehicle efficiency. The secure exchange of highly sensitive IoT network details among the vehicles is of paramount importance. Establishing robust security measures is essential to safeguard the integrity and confidentiality of this critical data exchange mechanism. The proposed model introduces a novel approach that leverages both steganography and encryption techniques to bolster the confidentiality and integrity of sensitive information exchanged among the vehicles in the IoV network. Initially, the sensitive information undergoes encryption using the Improved RSA (IRSA) algorithm. Subsequently, the data bits within the encrypted messages are subjected to binary flipping, and these altered bits are then embedded into a cover image using Pixel Value Differencing (PVD) and Pixel Value Indicator (PVI) steganography methods. This triple-layered security approach ensures the confidentiality and integrity of shared information in IoV, bolstering the security of sensitive messages and providing superior imperceptibility along with a high embedding capacity. The Experimental results shows that the proposed method produces an average PSNR of 41.5862 dB for 512x512 images and an embedding capacity of 1,028,455 bits, suitable for secret messages of 31,982 characters in size compare to the various existing methods.
引用
收藏
页数:16
相关论文
共 50 条
  • [1] The secure Three-Tier Architecture pattern
    Fernandez, Eduardo B.
    Fonoage, Mihai
    VanHilst, Michael
    Marta, Mirela
    CISIS 2008: THE SECOND INTERNATIONAL CONFERENCE ON COMPLEX, INTELLIGENT AND SOFTWARE INTENSIVE SYSTEMS, PROCEEDINGS, 2008, : 555 - 560
  • [2] Three-tier approach to exotics
    不详
    VETERINARY RECORD, 2003, 153 (25) : 765 - 765
  • [3] Secure Multi-Antenna Transmission in Three-Tier Wireless Sensor Networks
    Deng, Yansha
    Wang, Lifeng
    Elkashlan, Maged
    Nallanathan, Arumugam
    Mallik, Ranjan K.
    2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2015,
  • [4] A Three-tier Structured Model of Overlay Networks
    Wu, Mei
    Wu, Chanle
    Collier, Martin
    INTERNATIONAL CONFERENCE ON KNOWLEDGE AND SYSTEMS ENGINEERING (KSE 2009), 2009, : 185 - +
  • [5] Secure mHealth IoT Data Transfer from the Patient to the Hospital: A Three-Tier Approach
    Yaacoub, Elias
    Abualsaud, Khalid
    Khattab, Tamer
    Guizani, Mohsen
    Chehab, Ali
    IEEE WIRELESS COMMUNICATIONS, 2019, 26 (05) : 70 - 76
  • [6] Computers and the Internet as a job assisted tool: based on the three-tier use model approach
    Liaw, Shu-Sheng
    COMPUTERS IN HUMAN BEHAVIOR, 2007, 23 (01) : 399 - 414
  • [7] Optimal Offloading of Kubernetes Pods in Three-Tier Networks
    Carmona-Cejudo, Estela
    Iadanza, Francesco
    Siddiqui, Muhammad Shuaib
    2022 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2022, : 280 - 285
  • [8] Physical Layer Security in Three-Tier Wireless Sensor Networks: A Stochastic Geometry Approach
    Deng, Yansha
    Wang, Lifeng
    Elkashlan, Maged
    Nallanathan, Arumugam
    Mallik, Ranjan K.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (06) : 1128 - 1138
  • [9] Three-Tier Authentication and Secure Key Exchange Over Insecure Channel
    Ahmad, Muzammil M.
    Khan, Sibghatullah I.
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON BIG DATA ANALYTICS AND COMPUTATIONAL INTELLIGENCE (ICBDAC), 2017, : 134 - 137
  • [10] Active software replication through a three-tier approach
    Baldoni, R
    Marchetti, C
    Termini, A
    21ST IEEE SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS, PROCEEDINGS, 2002, : 109 - 118