Three-Tier approach to fortifying secure communication in Internet of vehicles networks

被引:1
|
作者
Karthikeyan, N. [1 ]
Shanthi, S. [2 ]
机构
[1] Govt Coll Engn, Dept Comp Sci & Engn, Thanjavur, Tamil Nadu, India
[2] Kongu Engn Coll, Dept Comp Sci & Engn, Erode, Tamil Nadu, India
关键词
Internet of Vehicles; Data security; Encryption; RSA algorithm; IMAGE STEGANOGRAPHY; BEARINGS;
D O I
10.1016/j.asej.2024.103087
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
In the recent era, the high speed networking technologies plays a vital role in Internet of Vehicles (IoV) is increasingly prevalent in numerous real-time applications. In IoV network, the communication between different vehicles are rapidly increased by sharing essential information such as traffic conditions, pathways, vehicle details, and position which enables to enhancing traffic safety and optimizing vehicle efficiency. The secure exchange of highly sensitive IoT network details among the vehicles is of paramount importance. Establishing robust security measures is essential to safeguard the integrity and confidentiality of this critical data exchange mechanism. The proposed model introduces a novel approach that leverages both steganography and encryption techniques to bolster the confidentiality and integrity of sensitive information exchanged among the vehicles in the IoV network. Initially, the sensitive information undergoes encryption using the Improved RSA (IRSA) algorithm. Subsequently, the data bits within the encrypted messages are subjected to binary flipping, and these altered bits are then embedded into a cover image using Pixel Value Differencing (PVD) and Pixel Value Indicator (PVI) steganography methods. This triple-layered security approach ensures the confidentiality and integrity of shared information in IoV, bolstering the security of sensitive messages and providing superior imperceptibility along with a high embedding capacity. The Experimental results shows that the proposed method produces an average PSNR of 41.5862 dB for 512x512 images and an embedding capacity of 1,028,455 bits, suitable for secret messages of 31,982 characters in size compare to the various existing methods.
引用
收藏
页数:16
相关论文
共 50 条
  • [41] Secure and efficient anonymous authentication scheme for three-tier mobile healthcare systems with wearable sensors
    Li, Xiong
    Ibrahim, Maged Hamada
    Kumari, Saru
    Kumar, Rahul
    TELECOMMUNICATION SYSTEMS, 2018, 67 (02) : 323 - 348
  • [42] Secure Communication For Internet Payment In Heterogeneous Networks
    Abdellaoui, Refka
    Pasquet, Marc
    2010 24TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2010, : 1085 - 1092
  • [43] Hybrid Consensus Networks for Scalable and Secure Internet of Vehicles
    Fardad, Mohammad
    Mianji, Elham Mohammadzadeh
    Muntean, Gabriel-Miro
    Tal, Irina
    2024 IEEE 48TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE, COMPSAC 2024, 2024, : 1671 - 1676
  • [44] Hybrid Consensus Networks for Scalable and Secure Internet of Vehicles
    Fardad, Mohammad (mohammad.fardad2@mail.dcu.ie); Mianji, Elham Mohammadzadeh (elham.mohammadzadehmianji3@mail.dcu.ie); Tal, Irina (irina.tal@dcu.ie), 1671, Institute of Electrical and Electronics Engineers Inc.
  • [45] A Three-Tier Approach for Composition of Real-Time Embedded Software Stacks
    Loiret, Frederic
    Seinturier, Lionel
    Duchien, Laurence
    Servat, David
    COMPONENT-BASED SOFTWARE ENGINEERING, PROCEEDINGS, 2010, 6092 : 37 - +
  • [46] Optimal power efficient management scheme (OPEM): A new power efficient approach for mobile stations in two-tier and three-tier networks
    Abkenar, Forough Shirin
    Rahbar, Akbar Ghaffarpour
    MOBILE INFORMATION SYSTEMS, 2014, 10 (04) : 331 - 346
  • [47] A reactive mitigation approach for managing supply disruption in a three-tier supply chain
    Paul, Sanjoy Kumar
    Sarker, Ruhul
    Essam, Daryl
    JOURNAL OF INTELLIGENT MANUFACTURING, 2018, 29 (07) : 1581 - 1597
  • [48] Three-tier multi-agent approach for solving traveling salesman problem
    Yan, Shi-Liang
    Zhou, Ke-Feng
    PRICAI 2006: TRENDS IN ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2006, 4099 : 813 - 817
  • [49] Generating three-tier applications from relational databases:: a formal and practical approach
    Polo, M
    Gómez, JA
    Piattini, M
    Ruiz, F
    INFORMATION AND SOFTWARE TECHNOLOGY, 2002, 44 (15) : 923 - 941
  • [50] A reactive mitigation approach for managing supply disruption in a three-tier supply chain
    Sanjoy Kumar Paul
    Ruhul Sarker
    Daryl Essam
    Journal of Intelligent Manufacturing, 2018, 29 : 1581 - 1597