Three-Tier approach to fortifying secure communication in Internet of vehicles networks

被引:1
|
作者
Karthikeyan, N. [1 ]
Shanthi, S. [2 ]
机构
[1] Govt Coll Engn, Dept Comp Sci & Engn, Thanjavur, Tamil Nadu, India
[2] Kongu Engn Coll, Dept Comp Sci & Engn, Erode, Tamil Nadu, India
关键词
Internet of Vehicles; Data security; Encryption; RSA algorithm; IMAGE STEGANOGRAPHY; BEARINGS;
D O I
10.1016/j.asej.2024.103087
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
In the recent era, the high speed networking technologies plays a vital role in Internet of Vehicles (IoV) is increasingly prevalent in numerous real-time applications. In IoV network, the communication between different vehicles are rapidly increased by sharing essential information such as traffic conditions, pathways, vehicle details, and position which enables to enhancing traffic safety and optimizing vehicle efficiency. The secure exchange of highly sensitive IoT network details among the vehicles is of paramount importance. Establishing robust security measures is essential to safeguard the integrity and confidentiality of this critical data exchange mechanism. The proposed model introduces a novel approach that leverages both steganography and encryption techniques to bolster the confidentiality and integrity of sensitive information exchanged among the vehicles in the IoV network. Initially, the sensitive information undergoes encryption using the Improved RSA (IRSA) algorithm. Subsequently, the data bits within the encrypted messages are subjected to binary flipping, and these altered bits are then embedded into a cover image using Pixel Value Differencing (PVD) and Pixel Value Indicator (PVI) steganography methods. This triple-layered security approach ensures the confidentiality and integrity of shared information in IoV, bolstering the security of sensitive messages and providing superior imperceptibility along with a high embedding capacity. The Experimental results shows that the proposed method produces an average PSNR of 41.5862 dB for 512x512 images and an embedding capacity of 1,028,455 bits, suitable for secret messages of 31,982 characters in size compare to the various existing methods.
引用
收藏
页数:16
相关论文
共 50 条
  • [31] Three-Tier Computing Platform Optimization: A Deep Reinforcement Learning Approach
    Chidume, Chidiebere Sunday
    Okopi, Solomon Inalegwu
    Sesay, Taiwo
    Materu, Irene Simon
    Asenso, Theophilus Quachie
    MOBILE INFORMATION SYSTEMS, 2022, 2022
  • [32] A THREE-TIER STATISTICAL APPROACH TO VERIFYING SUSPECTED COPYING OF SPATIAL DATA
    Pun-Cheng, L. S. C.
    Li, Z. I.
    SURVEY REVIEW, 2008, 40 (310) : 318 - 327
  • [33] Visible Light Secure Communication Method for Internet of Vehicles
    Gu, Caipeng
    Cai, Jijing
    Wen, Zhihao
    Qiu, Jiefan
    Wang, Wei
    Lv, Meilei
    Fang, Kai
    PROCEEDINGS OF THE 2024 27 TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, CSCWD 2024, 2024, : 139 - 144
  • [34] MeLSeC: A Method for Lightweight and Secure Communication in Internet of Vehicles
    Brighente, Alessandro
    Conti, Mauro
    Vasudev, Harsha
    2022 IEEE INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, INTL CONF ON CLOUD AND BIG DATA COMPUTING, INTL CONF ON CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/CBDCOM/CYBERSCITECH), 2022, : 186 - 193
  • [35] A Three-Tier Incremental Approach for Development of Smart Corridor Digital Twins
    Saroj, Abhilasha J.
    Roy, Somdut
    Guin, Angshuman
    Hunter, Michael
    2023 IEEE 26TH INTERNATIONAL SYMPOSIUM ON REAL-TIME DISTRIBUTED COMPUTING, ISORC, 2023, : 214 - 219
  • [36] DHA-RL: three-tier hybrid offloading network optimisation for the Internet of Things
    He, Sili
    Zhang, Zhenjiang
    Zeng, Qing-An
    International Journal of Mobile Network Design and Innovation, 2024, 11 (02) : 76 - 87
  • [37] Cooperative Task Offloading in Three-Tier Mobile Computing Networks: An ADMM Framework
    Wang, Yue
    Tao, Xiaofeng
    Zhang, Xuefei
    Zhang, Ping
    Hou, Y. Thomas
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2019, 68 (03) : 2763 - 2776
  • [38] Secure and efficient anonymous authentication scheme for three-tier mobile healthcare systems with wearable sensors
    Xiong Li
    Maged Hamada Ibrahim
    Saru Kumari
    Rahul Kumar
    Telecommunication Systems, 2018, 67 : 323 - 348
  • [39] Joint Resource Allocation and User Association in Downlink Three-tier Heterogeneous Networks
    Liu, Chunshan
    Whiting, Philip
    Hanly, Stephen V.
    2014 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2014), 2014, : 4232 - 4238
  • [40] Modeling and Minimizing Latency in Three-tier V2X Networks
    Phi Le Nguyen
    Hwang, Ren-Hung
    Pham Minh Khiem
    Kien Nguyen
    Lin, Ying-Dar
    2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2020,