Optimized security algorithm for connected vehicular network

IF 0.6 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS International Journal of Pervasive Computing and Communications Pub Date : 2023-01-02 DOI:10.1108/ijpcc-12-2021-0300
Deepak Choudhary
{"title":"Optimized security algorithm for connected vehicular network","authors":"Deepak Choudhary","doi":"10.1108/ijpcc-12-2021-0300","DOIUrl":null,"url":null,"abstract":"\nPurpose\nAs the number of devices that connect to the Internet of Things (IoT) has grown, privacy and security issues have come up. Because IoT devices collect so much sensitive information, like user names, locations, phone numbers and even how they usually use energy, it is very important to protect users' privacy and security. IoT technology will be hard to use on the client side because IoT-enabled devices do not have clear privacy and security controls.\n\n\nDesign/methodology/approach\nIoT technology would be harder to use on the client side if the IoT did not offer enough well-defined ways to protect users’ privacy and security. The goal of this research is to protect people's privacy in the IoT by using the oppositional artificial flora optimization (EGPKC-OAFA) algorithm to generate the best keys for the ElGamal public key cryptosystem (EGPKC). The EGPKC-OAFA approach puts the most weight on the IEEE 802.15.4 standard for MAC, which is the most important part of the standard. The security field is part of the MAC header of this standard. In addition, the MAC header includes EGPKC, which makes it possible to make authentication keys as quickly as possible.\n\n\nFindings\nWith the proliferation of IoT devices, privacy and security have become major concerns in the academic world. Security and privacy are of the utmost importance due to the large amount of personally identifiable information acquired by IoT devices, such as name, location, phone numbers and energy use. Client-side deployment of IoT technologies will be hampered by the absence of well-defined privacy and security solutions afforded by the IoT. The purpose of this research is to present the EGPKC with optimum key generation using the EGPKC-OAFA algorithm for the purpose of protecting individual privacy within the context of the IoT. The EGPKC-OAFA approach is concerned with the MAC standard defined by the IEEE 802.15.4 standard, which includes the security field in its MAC header. Also, the MAC header incorporates EGPKC, which enables the fastest possible authentication key generation. In addition, the best methodology award goes to the OAFA strategy, which successfully implements the optimum EGPKC selection strategy by combining opposition-based (OBL) and standard AFA ideas. The EGPKC-OAFA method has been proved to effectively analyze performance in a number of simulations, with the results of various functions being identified.\n\n\nOriginality/value\nIn light of the growing prevalence of the IoT, an increasing number of people are becoming anxious about the protection and confidentiality of the personal data that they save online. This is especially true in light of the fact that more and more things are becoming connected to the internet. The IoT is capable of gathering personally identifiable information such as names, addresses and phone numbers, as well as the quantity of energy that is used. It will be challenging for customers to adopt IoT technology because of worries about the security and privacy of the data generated by users. In this work, the EGPKC is paired with adversarial artificial flora, which leads in an increase to the privacy security provided by EGPKC for the IoT (EGPKC-OAFA). The MAC security field that is part of the IEEE 802.15.4 standard is one of the areas that the EGPKC-OAFA protocol places a high focus on. The Authentication Key Generation Protocol Key Agreement, also known as EGPKCA, is used in MAC headers. The abbreviation for this protocol is EGPKCA. The OAFA technique, also known as the combination of OBL and AFA, is the most successful method for selecting EGPKCs. This method is recognized by its acronym, OAFA. It has been shown via a variety of simulations that the EGPKC-OAFA technique is a very useful instrument for carrying out performance analysis.\n","PeriodicalId":43952,"journal":{"name":"International Journal of Pervasive Computing and Communications","volume":null,"pages":null},"PeriodicalIF":0.6000,"publicationDate":"2023-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Pervasive Computing and Communications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1108/ijpcc-12-2021-0300","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS","Score":null,"Total":0}
引用次数: 1

Abstract

Purpose As the number of devices that connect to the Internet of Things (IoT) has grown, privacy and security issues have come up. Because IoT devices collect so much sensitive information, like user names, locations, phone numbers and even how they usually use energy, it is very important to protect users' privacy and security. IoT technology will be hard to use on the client side because IoT-enabled devices do not have clear privacy and security controls. Design/methodology/approach IoT technology would be harder to use on the client side if the IoT did not offer enough well-defined ways to protect users’ privacy and security. The goal of this research is to protect people's privacy in the IoT by using the oppositional artificial flora optimization (EGPKC-OAFA) algorithm to generate the best keys for the ElGamal public key cryptosystem (EGPKC). The EGPKC-OAFA approach puts the most weight on the IEEE 802.15.4 standard for MAC, which is the most important part of the standard. The security field is part of the MAC header of this standard. In addition, the MAC header includes EGPKC, which makes it possible to make authentication keys as quickly as possible. Findings With the proliferation of IoT devices, privacy and security have become major concerns in the academic world. Security and privacy are of the utmost importance due to the large amount of personally identifiable information acquired by IoT devices, such as name, location, phone numbers and energy use. Client-side deployment of IoT technologies will be hampered by the absence of well-defined privacy and security solutions afforded by the IoT. The purpose of this research is to present the EGPKC with optimum key generation using the EGPKC-OAFA algorithm for the purpose of protecting individual privacy within the context of the IoT. The EGPKC-OAFA approach is concerned with the MAC standard defined by the IEEE 802.15.4 standard, which includes the security field in its MAC header. Also, the MAC header incorporates EGPKC, which enables the fastest possible authentication key generation. In addition, the best methodology award goes to the OAFA strategy, which successfully implements the optimum EGPKC selection strategy by combining opposition-based (OBL) and standard AFA ideas. The EGPKC-OAFA method has been proved to effectively analyze performance in a number of simulations, with the results of various functions being identified. Originality/value In light of the growing prevalence of the IoT, an increasing number of people are becoming anxious about the protection and confidentiality of the personal data that they save online. This is especially true in light of the fact that more and more things are becoming connected to the internet. The IoT is capable of gathering personally identifiable information such as names, addresses and phone numbers, as well as the quantity of energy that is used. It will be challenging for customers to adopt IoT technology because of worries about the security and privacy of the data generated by users. In this work, the EGPKC is paired with adversarial artificial flora, which leads in an increase to the privacy security provided by EGPKC for the IoT (EGPKC-OAFA). The MAC security field that is part of the IEEE 802.15.4 standard is one of the areas that the EGPKC-OAFA protocol places a high focus on. The Authentication Key Generation Protocol Key Agreement, also known as EGPKCA, is used in MAC headers. The abbreviation for this protocol is EGPKCA. The OAFA technique, also known as the combination of OBL and AFA, is the most successful method for selecting EGPKCs. This method is recognized by its acronym, OAFA. It has been shown via a variety of simulations that the EGPKC-OAFA technique is a very useful instrument for carrying out performance analysis.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
互联车辆网络的优化安全算法
目的随着连接物联网(IoT)的设备数量的增长,隐私和安全问题也随之而来。由于物联网设备收集了如此多的敏感信息,如用户名、位置、电话号码,甚至他们通常如何使用能源,因此保护用户的隐私和安全非常重要。物联网技术将很难在客户端使用,因为支持物联网的设备没有明确的隐私和安全控制。如果物联网不能提供足够明确的方式来保护用户的隐私和安全,那么设计/方法/方法物联网技术将更难在客户端使用。本研究的目标是通过使用对立人工菌群优化(EGPKC-OAFA)算法为ElGamal公钥密码系统(EGPKC)生成最佳密钥,来保护人们在物联网中的隐私。EGPKC-OAFA方法最重视MAC的IEEE 802.15.4标准,这是该标准最重要的部分。安全字段是本标准MAC报头的一部分。此外,MAC报头包括EGPKC,这使得可以尽快生成身份验证密钥。发现随着物联网设备的普及,隐私和安全已成为学术界的主要关注点。由于物联网设备获取了大量个人身份信息,如姓名、位置、电话号码和能源使用情况,因此安全和隐私至关重要。物联网技术的客户端部署将因缺乏物联网提供的明确的隐私和安全解决方案而受到阻碍。本研究的目的是使用EGPKC-OAFA算法为EGPKC提供最佳密钥生成,以保护物联网背景下的个人隐私。EGPKC-OAFA方法涉及由IEEE 802.15.4标准定义的MAC标准,该标准在其MAC报头中包括安全字段。此外,MAC标头包含EGPKC,它可以实现尽可能快的身份验证密钥生成。此外,最佳方法论奖授予OAFA策略,该策略通过结合基于反对派的(OBL)和标准AFA思想,成功地实现了最佳EGPKC选择策略。EGPKC-OAFA方法已在大量模拟中被证明可以有效地分析性能,并确定了各种函数的结果。独创性/价值鉴于物联网的日益普及,越来越多的人对他们在线保存的个人数据的保护和保密感到焦虑。鉴于越来越多的东西与互联网相连,这一点尤其正确。物联网能够收集个人身份信息,如姓名、地址和电话号码,以及使用的能源量。由于担心用户生成的数据的安全性和隐私性,客户采用物联网技术将是一项挑战。在这项工作中,EGPKC与对抗性人工菌群配对,从而提高了EGPKC为物联网(EGPKC-OAFA)提供的隐私安全性。作为IEEE 802.15.4标准一部分的MAC安全字段是EGPKC-OAFA协议高度关注的领域之一。认证密钥生成协议密钥协议(也称为EGPKCA)用于MAC报头。该协议的缩写是EGPKCA。OAFA技术,也称为OBL和AFA的组合,是选择EGPKC最成功的方法。这种方法的首字母缩写为OAFA。通过各种模拟表明,EGPKC-OAFA技术是进行性能分析的一种非常有用的工具。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
International Journal of Pervasive Computing and Communications
International Journal of Pervasive Computing and Communications COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS-
CiteScore
6.60
自引率
0.00%
发文量
54
期刊最新文献
Big data challenges and opportunities in Internet of Vehicles: a systematic review Cooperative optimization techniques in distributed MAC protocols – a survey Novel communication system for buried water pipe monitoring using acoustic signal propagation along the pipe A new predictive approach for the MAC layer misbehavior in IEEE 802.11 networks Clustering based EO with MRF technique for effective load balancing in cloud computing
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1