Skip to content
2000
Volume 18, Issue 4
  • ISSN: 2352-0965
  • E-ISSN: 2352-0973

Abstract

Background

Smart vehicles are connected to the Internet of Things (IoT), bringing with them the potential to transform human existence in so-called “smart cities.” Intelligent vehicle architecture revolves around the Vehicular-AdhocNetwork (VANET). The goal of a VANET is to make driving more pleasant. VANETs' message-sharing capabilities contribute to improved traffic management, reduced congestion, and safer driving. However, VANETs' usefulness could be diminished by the spread of fraudulent or erroneous messages.

Methods

For better road safety and less congestion, it guarantees secure and accurate communication between vehicles and between vehicles and infrastructure. The security and privacy of a VANET, however, can be compromised by threats, including denial-of-service (DoS), replay, and Sybil attacks. These problems can cause a rogue node to send out faulty data throughout the system. We introduce a biometrics-blockchain (BBC) approach to ensure the safety of information exchanged between vehicles in a VANET and to preserve archival data in a tried-and-true environment. To protect the anonymity of users, the suggested framework makes use of biometric data to verify the identity of the sender.

Results

As a result, the proposed BBC scheme creates a safe and reliable environment for vehicles in VANET, with the added benefit of identity tracing capabilities. To prove the effectiveness of the proposed framework, simulations were run in the urban mobility models OMNeT++, veins, and SUMO. Packet-delivery-rate (PDR), packet-loss-rate (PLR), and computing cost (CC) were used to assess the framework's efficiency.

Conclusion

The outcomes highlighted the superiority of our innovative model over conventional methods, such as PDR slightly increased to 8-10%, PLR decreased to 20-25%, and CC also reduced to 15-20% compared to state-of-art models.

Loading

Article metrics loading...

/content/journals/raeeng/10.2174/0123520965281391231212045852
2024-01-05
2025-11-05
Loading full text...

Full text loading...

References

  1. FengQ. HeD. ZeadallyS. LiangK. BPAS: Blockchain-assisted privacy-preserving authentication system for vehicular ad hoc networks.IEEE Trans. Industr. Inform.20201664146415510.1109/TII.2019.2948053
    [Google Scholar]
  2. ManivannanD. MoniS.S. ZeadallyS. Secure authentication and privacy-preserving techniques in Vehicular Ad-hoc NETworks (VANETs).Vehicular Communications20202510024710.1016/j.vehcom.2020.100247
    [Google Scholar]
  3. ZhangJ. JiangY. CuiJ. HeD. BolodurinaI. ZhongH. DBCPA: Dual blockchain-assisted conditional privacy-preserving authentication framework and protocol for vehicular ad hoc networks.IEEE Trans. Mobile Comput.202211510.1109/TMC.2022.3230853
    [Google Scholar]
  4. VelliangiriS. ManoharnR. RamachandranS. VenkatesanK. RajasekarV. KarthikeyanP. KumarP. KumarA. DhanabalanS.S. An efficient lightweight privacy-preserving mechanism for industry 4.0 based on elliptic curve cryptography.IEEE Trans. Industr. Inform.20221896494650210.1109/TII.2021.3139609
    [Google Scholar]
  5. SunC. LiuJ. XuX. MaJ. A privacy-preserving mutual authentication resisting DoS attacks in VANETs.IEEE Access20175240122402210.1109/ACCESS.2017.2768499
    [Google Scholar]
  6. NandyT. IdrisM.Y.I. NoorR.M. WahabA.W.A. BhattacharyyaS. KolandaisamyR. YahuzaM. A secure, privacy-preserving, and lightweight Authentication scheme for VANETs.IEEE Sens. J.20212118209982101110.1109/JSEN.2021.3097172
    [Google Scholar]
  7. MiyachiK. MackeyT.K. hOCBS: A privacy-preserving blockchain framework for healthcare data leveraging an on-chain and off-chain system design.Inf. Process. Manage.202158310253510.1016/j.ipm.2021.102535
    [Google Scholar]
  8. ShanmugarajaP. BhardwajM. MehbodniyaA. An efficient clustered m-path sinkhole attack detection (MSAD) algorithm for wireless sensor networks.Ad Hoc Sens. Wirel. Netw.202355
    [Google Scholar]
  9. SağlamE.T. BahtiyarŞ. September. A survey: Security and privacy in 5G vehicular networks.In 2019 4th International Conference on Computer Science and Engineeringyear.2019 (pp. 108-112). IEEE.
    [Google Scholar]
  10. SonS. KwonD. LeeJ. YuS. JhoN.S. ParkY. On the design of a privacy-preserving communication scheme for cloud-based digital twin environments using blockchain.IEEE Access202210753657537510.1109/ACCESS.2022.3191414
    [Google Scholar]
  11. ChaiH. LengS. HeJ. ZhangK. ChengB. CyberChain: Cybertwin empowered blockchain for lightweight and privacy-preserving authentication in Internet of Vehicles.IEEE Trans. Vehicular Technol.20227154620463110.1109/TVT.2021.3132961
    [Google Scholar]
  12. KalogeropoulosP. PapanikasD. KotzanikolaouP. A distributed model for privacy preserving V2I communication with strong unframeability and efficient revocation.Journal of Cybersecurity and Privacy20222477879910.3390/jcp2040040
    [Google Scholar]
  13. VasudevH. DasD. P-SHARP: Privacy Preserving Secure Hash based Authentication and Revelation Protocol in IoVs.Comput. Netw.202119110798910.1016/j.comnet.2021.107989
    [Google Scholar]
  14. CostantinoG. De VincenziM. MartinelliF. MatteucciI. A Privacy-Preserving Solution for Intelligent Transportation Systems: Private Driver DNA.IEEE Trans. Intell. Transp. Syst.202324125827310.1109/TITS.2022.3217358
    [Google Scholar]
  15. Shaker ReddyP.C. SucharithaY. A design and challenges in energy optimizing cr-wireless sensor networks.Recent Advances in Computer Science and Communications20231658292
    [Google Scholar]
  16. WANGC.H. ZHANGQ. WANGH.M. XUX. Reputation model for VANETs with privacy-preserving under blockchain architecture.J. Zhejiang Univ. Eng. Sci.574760772
    [Google Scholar]
  17. ReddyP.C.S. PradeepaM. VenkatakiranS. WaliaR. SaravananM. Image and signal processing in the underwater environment.J Nucl Ene Sci Power Generat Techno20211092
    [Google Scholar]
  18. FangY. ZhaoY. YuY. ZhuH. DuX. GuizaniM. Blockchain‐based privacy‐preserving valet parking for self‐driving vehicles.Trans. Emerg. Telecommun. Technol.2021324e423910.1002/ett.4239
    [Google Scholar]
  19. AkilM. IslamiL. Fischer-HübnerS. MartucciL.A. ZuccatoA. Privacy-preserving identifiers for IoT: A systematic literature review.IEEE Access2020816847016848510.1109/ACCESS.2020.3023659
    [Google Scholar]
  20. FerragM.A. DerdourM. MukherjeeM. DerhabA. MaglarasL. JanickeH. Blockchain technologies for the internet of things: Research issues and challenges.IEEE Internet Things J.2019622188220410.1109/JIOT.2018.2882794
    [Google Scholar]
  21. GaoS. SuQ. ZhangR. ZhuJ. SuiZ. WangJ. A privacy-preserving identity authentication scheme based on the blockchain.Secur. Commun. Netw.2021202111010.1155/2021/9992353
    [Google Scholar]
  22. AkramM.A. AhmadH. MianA.N. JurcutA.D. KumariS. Blockchain-based privacy-preserving authentication protocol for UAV networks.Comput. Netw.202322410963810.1016/j.comnet.2023.109638
    [Google Scholar]
  23. NyangaresiV.O. RodriguesA.J. TahaN.K. Mutual authentication protocol for secure VANET data exchanges.International Conference on Future Access Enablers of Ubiquitous and Intelligent Infrastructures20215876.10.1007/978‑3‑030‑78459‑1_5
    [Google Scholar]
  24. SucharithaY. ReddyP.C.S. ChittiT.N. Deep learning based framework for crop yield prediction. AIP Conference Proceedings, 2023, Vol. 2548, pp. 05001810.1063/5.0118526
    [Google Scholar]
  25. LyuC. PandeA. ZhangY. GuD. MohapatraP. Enabling fast and privacy-preserving broadcast authentication with efficient revocation for inter-vehicle connections.IEEE Trans. Mobile Comput.202311810.1109/TMC.2023.3275218
    [Google Scholar]
  26. ReddyP.C. NachiyappanS. RamakrishnaV. SenthilR. Sajid AnwerM.D. Hybrid model using scrum methodology for softwar development system.J. Nucl. Ene. Sci. Power Generat Techno20211092
    [Google Scholar]
  27. ShashidharaR. BojjaganiS. MauryaA.K. KumariS. XiongH. A Robust user authentication protocol with privacy-preserving for roaming service in mobility environments.Peer-to-Peer Netw. Appl.20201361943196610.1007/s12083‑020‑00929‑y
    [Google Scholar]
  28. SucharithaY. ReddyP.C.S. SuryanarayanaG. Network intrusion detection of drones using recurrent neural networks.Drone Technology: Future Trends and Practical Applications,2023375392
    [Google Scholar]
  29. ZhangX. ZhongH. FanC. BolodurinaI. CuiJ. CBACS: A privacy-preserving and efficient cache-based access control scheme for Software defined vehicular networks.IEEE Trans. Inf. Forensics Security2022171930194510.1109/TIFS.2022.3174389
    [Google Scholar]
  30. KebandeV.R. AwayshehF.M. IkuesanR.A. AlawadiS.A. AlshehriM.D. A blockchain-based multi-factor authentication model for a cloud-enabled internet of vehicles.Sensors20212118601810.3390/s2118601834577224
    [Google Scholar]
  31. KumarK. PandeS.V. KumarT.C.A. SainiP. ChaturvediA. ReddyP.C.S. ShahK.B. Intelligent controller design and fault prediction using machine learning model.Int. Trans. Electr. Energy Syst.202320231910.1155/2023/1056387
    [Google Scholar]
  32. Sripathi Venkata NagaS.K. YesurajR. MunuswamyS. ArputharajK. A comprehensive survey on certificate-less authentication schemes for vehicular ad hoc networks in intelligent transportation systems.Sensors2023235268210.3390/s2305268236904886
    [Google Scholar]
  33. KumarG.R. ReddyR.V. JayarathnaM. PughazendiN. VidyullathaS. ReddyP.C.S. Web application based Diabetes prediction using Machine Learning.2023 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI)2023. pp.1-7. IEEE10.1109/ACCAI58221.2023.10200323
    [Google Scholar]
  34. YuS. LeeJ. ParkK. DasA.K. ParkY. IoV-SMAP: Secure and efficient message authentication protocol for IoV in smart city environment.IEEE Access2020816787516788610.1109/ACCESS.2020.3022778
    [Google Scholar]
  35. TanH. KimP. ChungI. Practical homomorphic authentication in cloud-assisted vanets with blockchain-based healthcare monitoring for pandemic control.Electronics2020910168310.3390/electronics9101683
    [Google Scholar]
  36. VivekanandanM. Blockchain based privacy preserving user authentication protocol for distributed mobile cloud environment.Peer-to-Peer Netw. Appl.2021141572159510.1007/s12083‑020‑01065‑3
    [Google Scholar]
  37. ChillakuruP. MadiajaganM. PrashanthK.V. AmbalaS. Shaker ReddyP.C. PavanJ. Enhancing wind power monitoring through motion deblurring with modified GoogleNet algorithm.Soft Comput.2023202311110.1007/s00500‑023‑08358‑8
    [Google Scholar]
  38. HuangC. LuR. NiJ. ShenX. DAPA: A decentralized, accountable, and privacy-preserving architecture for car sharing services.IEEE Trans. Vehicular Technol.20206954869488210.1109/TVT.2020.2980777
    [Google Scholar]
  39. SunX. YuF.R. ZhangP. A survey on cyber-security of connected and autonomous vehicles (CAVs).IEEE Trans. Intell. Transp. Syst.20222376240625910.1109/TITS.2021.3085297
    [Google Scholar]
  40. SucharithaY. Shaker ReddyP.C. An autonomous adaptive enhancement method based on learning to optimize heterogeneous network selection.Int. J. Sensors Wirel. Commun. Control202212749550910.2174/2210327912666221012154428
    [Google Scholar]
  41. FagbohungbeO. RezaS.R. DongX. QianL. Efficient privacy preserving edge intelligent computing framework for image classification in iot.IEEE Trans. Emerg. Top. Comput. Intell.20226494195610.1109/TETCI.2021.3111636
    [Google Scholar]
  42. AsimJ. KhanA.S. SaqibR.M. AbdullahJ. AhmadZ. HoneyS. AfzalS. AlqahtaniM.S. AbbasM. Blockchain-based multifactor authentication for future 6G cellular networks: A systematic review.Appl. Sci.2022127355110.3390/app12073551
    [Google Scholar]
  43. LiangY. LuoE. LiuY. Physically secure and conditional-privacy authenticated key agreement for VANETs.IEEE Trans. Vehicular Technol.20237267914792510.1109/TVT.2023.3241882
    [Google Scholar]
  44. LiuL. ShafiqM. SonawaneV.R. MurthyM.Y.B. ReddyP.C.S. ReddyK.M.N.C. Spectrum trading and sharing in unmanned aerial vehicles based on distributed blockchain consortium system.Comput. Electr. Eng.202210310825510.1016/j.compeleceng.2022.108255
    [Google Scholar]
  45. AgilandeeswariL. PaliwalS. ChandrakarA. PrabukumarM. A new lightweight conditional privacy preserving authentication and key – agreement protocol in social internet of things for vehicle to smart grid networks.Multimedia Tools Appl.20228119276832771010.1007/s11042‑022‑12946‑5
    [Google Scholar]
  46. WangM. ZhuT. ZhangT. ZhangJ. YuS. ZhouW. Security and privacy in 6G networks: New areas and new challenges.Digital Communications and Networks20206328129110.1016/j.dcan.2020.07.003
    [Google Scholar]
  47. Al-ShareedaM.A. ManickamS. COVID-19 vehicle based on an efficient mutual authentication scheme for 5G-enabled vehicular fog computing.Int. J. Environ. Res. Public Health202219231561810.3390/ijerph19231561836497709
    [Google Scholar]
  48. Al-ShareedaM.A. AnbarM. ManickamS. HasbullahI.H. Se-cppa: A secure and efficient conditional privacy-preserving authentication scheme in vehicular ad-hoc networks.Sensors (Basel)20212124820610.3390/s2124820634960311
    [Google Scholar]
  49. Al-ShareedaM.A. AnbarM. ManickamS. HasbullahI.H. Towards identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks.IEEE Access2021911322611323810.1109/ACCESS.2021.3104148
    [Google Scholar]
  50. MohammedB.A. Al-ShareedaM.A. ManickamS. Al-MekhlafiZ.G. AlreshidiA. AlazmiM. AlshudukhiJ.S. AlsaffarM. FC-PA: Fog computing-based pseudonym authentication scheme in 5G-enabled vehicular networks.IEEE Access202311185711858110.1109/ACCESS.2023.3247222
    [Google Scholar]
  51. Al-ShareedaM.A. ManickamS. Msr-dos: Modular square root-based scheme to resist denial of service (dos) attacks in 5g-enabled vehicular networks.IEEE Access20221012060612061510.1109/ACCESS.2022.3222488
    [Google Scholar]
  52. BaggaP. DasA.K. RodriguesJ.J.P.C. Bilinear pairing-based access control and key agreement scheme for smart transportation.Cyber Security and Applications2023110000110.1016/j.csa.2022.100001
    [Google Scholar]
  53. YingB. NayakA. Anonymous and lightweight authentication for secure vehicular networks.IEEE Trans. Vehicular Technol.20176612106261063610.1109/TVT.2017.2744182
    [Google Scholar]
  54. KhanA.S. BalanK. JavedY. TarmiziS. AbdullahJ. Secure trust-based blockchain architecture to prevent attacks in VANET.Sensors20191922495410.3390/s1922495431739437
    [Google Scholar]
/content/journals/raeeng/10.2174/0123520965281391231212045852
Loading
/content/journals/raeeng/10.2174/0123520965281391231212045852
Loading

Data & Media loading...

This is a required field
Please enter a valid email address
Approval was a Success
Invalid data
An Error Occurred
Approval was partially successful, following selected items could not be processed due to error
Please enter a valid_number test