scholarly journals A Secure Enhanced Non-Cooperative Cognitive Division Multiple Access for Vehicle-to-Vehicle Communication

Sensors ◽  
2020 ◽  
Vol 20 (4) ◽  
pp. 1000
Author(s):  
Mohammed Abdulhakim Al-Absi ◽  
Ahmed Abdulhakim Al-Absi ◽  
Hoon Jae Lee

The growth of the Internet has led to the increasing usage of smart infotainment applications on the vehicular ad-hoc network (VANET). Preserving privacy and security regarding the provision of smart infotainment applications while on the go is most desired. Thus, a secure authentication scheme is required. Many privacy-preserving security schemes have been developed in recent times using cryptography approaches. However, these incur key management and communication overhead. The usage of third-party servers incurs the overhead of key computation, storage and distribution. Post completion of the initialization phase, the message is secured using cryptography and is shared among vehicles. The design of the proposed secure enhanced non-cooperative cognitive division multiple access ( S − ENCCMA ) aims to eliminate the need for the local message available with the parties to be released for provisioning secure safety-related applications. To overcome the research challenges, this work presents a novel security scheme, namely secure non-cooperative cognitive medium access ( S − ENCCMA ). The experiment is conducted to evaluate the overhead incurred in provisioning security to ENCCMA . The outcome shows that the overhead incurred by S − ENCCMA over ENCCMA was negligible to provide the real-time security requirements of smart infotainment applications, which is experimentally shown in this paper in terms of throughput, collision and successful packet transmission considering varied environmental models such as cities, highways and rural areas.

Sensors ◽  
2019 ◽  
Vol 19 (15) ◽  
pp. 3283 ◽  
Author(s):  
Al-Absi ◽  
Al-Absi ◽  
Jae Lee

Future safety applications require the timely delivery of messages between vehicles. The 802.11p has been standardized as the standard Medium Access Control (MAC) protocol for vehicular communication. The 802.11p uses Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) as MAC. CSMA/CA induces unbounded channel access delay. As a result, it induces high collision. To reduce collision, distributed MAC is required for channel allocation. Many existing approaches have adopted Time Division Multiple Access (TDMA) based MAC design for channel allocation. However, these models are not efficient at utilizing bandwidth. Cognitive radio technique is been adopted by various existing approach for channel allocation in shared channel network to maximize system throughput. However, it induces MAC overhead, and channel allocation on a shared channel network is considered to be an NP-hard problem. This work addresses the above issues. Here we present distributed MAC design PECA (Performance Enriching Channel Allocation) for channel allocation in a shared channel network. The PECA model maximizes the system throughput and reduces the collision, which is experimentally proven. Experiments are conducted to evaluate the performance in terms of throughput, collision and successful packet transmission considering a highly congested vehicular ad-hoc network. Experiments are carried out to show the adaptiveness of proposed MAC design considering different environments such City, Highway and Rural (CHR).


2013 ◽  
Vol 646 ◽  
pp. 235-239
Author(s):  
Hana Do ◽  
Hoon Jeong ◽  
Eui In Choi

The cloud environment is recently emphasized when we save a large amount of data with a minimum of maintenance. But the cloud is a variable environment that data is likely to be changed when which is transferred, and even doesn't permanently store. Besides it has the risk of phishing from a third party. A scalable storage space as one of the features of the cloud has to consist as more proactive access control, secure encryption, and key management in the aspect of the size of the database and the number of users. In this paper, we analyze about database security requirements of these environment and the provided encryption technologies of until now. And, even anyone who don't have the expertise for security assessment and management or CC could be easily accessible it.


2016 ◽  
Vol 2016 ◽  
pp. 1-18
Author(s):  
Eduardo da Silva ◽  
Luiz Carlos Pessoa Albini

As a consequence of the particularities of Mobile Ad Hoc Networks (MANETs), such as dynamic topology and self-organization, the implementation of complex and flexible applications is a challenge. To enable the deployment of these applications, several middleware solutions were proposed. However, these solutions do not completely consider the security requirements of these networks. Based on the limitations of the existing solutions, this paper presents a new secure middleware, called Secure Middleware for Ad Hoc Networks (SEMAN), which provides a set of basic and secure services to MANETs aiming to facilitate the development of distributed, complex, and flexible applications. SEMAN considers the context of applications and organizes nodes into groups, also based on these contexts. The middleware includes three modules: service, processing, and security. Security module is the main part of the middleware. It has the following components: key management, trust management, and group management. All these components were developed and are described in this paper. They are supported by a cryptographic core and behave according to security rules and policies. The integration of these components provides security guarantees against attacks to the applications that usethe middleware services.


Electronics ◽  
2019 ◽  
Vol 8 (11) ◽  
pp. 1330
Author(s):  
Kiho Lim ◽  
Weihua Liu ◽  
Xiwei Wang ◽  
Jingon Joung

The security in vehicular ad hoc networks (VANETs) has become a large consideration in safeguarding growing applications and intelligent transport systems. A group signature, a popular authentication approach for VANETs, can be implemented to protect vehicular communications against malicious users. However, the issue of securely distributing group keys to fast-moving vehicular nodes arises. The growing size of the certificate revocation list (CRL) has provided the corresponding complication in its management and distribution in VANETs. In this paper, an efficient key management protocol for group signature based authentication is proposed. A group is extended to a domain with various roadside units forming a hierarchical topology. Our proposed scheme provides a secure method to deliver group keys to vehicular nodes, ensuring the security requirements. Similarly, through utilizing the two Bloom filters in our hierarchical topology, an efficient and scalable vehicle revocation mechanism can be achieved that can minimize the CRL size. Our experiment results demonstrate a scalable, efficient, and secure key distribution scheme in vehicular networking. Moreover, an effective CRL management mechanism can be accomplished using the hierarchical topology.


Webology ◽  
2020 ◽  
Vol 17 (2) ◽  
pp. 706-716
Author(s):  
T. Kirthiga Devi ◽  
R. Mohanakrishnan ◽  
T. Karthick

Vehicular ad-hoc networks were introduced by applying certain principles based on MANET where nodes are high mobility vehicles. Because of this mobility of vehicles topology were rapidly changing, hence Security issue will predominant in VANET. Since network is accessible from every node, any malicious node can easily targets or get access into the network. In order to eliminate this issue a RSU based authentication should be introduced. Also in order to secure the message broadcasting between nodes and eliminating certain attack like Man-In-The-Middle (MITM) attack, a cryptographic technique called cascade encryption are used to broadcast the message from one vehicle to other vehicle in a secure and efficient way. With the help these two concepts we can able to satisfy the privacy and security requirements of Vehicular ad-hoc networks in an efficient manner.


Sensors ◽  
2021 ◽  
Vol 21 (11) ◽  
pp. 3646
Author(s):  
Ahmed Abdulhakim Al-Absi ◽  
Mohammed Abdulhakim Al-Absi ◽  
Mangal Sain ◽  
Hoon Jae Lee

Based on the existing Internet of Vehicles communication protocol and multi-channel allocation strategy, this paper studies the key issues with vehicle communication. First, the traffic volume is relatively large which depends on the environment (city, highway, and rural). When many vehicles need to communicate, the communication is prone to collision. Secondly, because the traditional multi-channel allocation method divides the time into control time slots and transmission time slots when there are few vehicles, it will cause waste of channels, also when there are more vehicles, the channels will not be enough for more vehicles. However, to maximize the system throughput, the existing model Enhanced Non-Cooperative Cognitive division Multiple Access (ENCCMA) performs amazingly well by connected the Cognitive Radio with Frequency Division Multiple Access (FDMA) and Time Division Multiple Access (TDMA) for a multi-channel vehicular network. However, this model induces Medium Access Control (MAC) overhead and does not consider the performance evaluation in various environmental conditions. Therefore, this paper proposes a Distributed Medium Channel Allocation (DMCA) strategy, by dividing the control time slot into an appointment and a safety period in the shared channel network. SIMITS simulator was used for experiment evaluation in terms of throughput, collision, and successful packet transmission. However, the outcome shows that our method significantly improved the channel utilization and reduced the occurrence of communication overhead.


2021 ◽  
Vol 2021 ◽  
pp. 1-16
Author(s):  
Hongwei Ding ◽  
Mingliang Li ◽  
Jun Zhang

Toward making the conventional carrier sense multiple access (CSMA) protocol transmit and control mobile ad hoc network systems, as well as reducing energy consumption, an adaptive multichannel multipriority two-dimensional probability detection and 1-stick joint control strategy carrier sense multiple access with variable collision duration and three-way handshake mechanisms (iCSMA for short) is proposed. Based on the conventional two-slot model of the CSMA protocol, iCSMA introduces a concept of collision duration (b), which divides the system’s timeslot into the duration of successful packet transmission (1 + a), the duration of collision (b + a), and the duration of the idle state (a) of the system. By employing iCSMA, the loss of the system could be reduced with a fine-tuned collision duration (b), which leads to improved performance compared to the conventional 1P-persistent CSMA protocol. Furthermore, a three-way handshake mechanism is introduced for monitoring the entire network system at a minimal cost of throughput. Toward a higher channel utilization rate, a multichannel and multipriority function is employed in the implementation of multiservice communication for the system. Besides, with an adaptive mechanism, the transmission probabilities p 1 and p 2 are reasonably set so that the system will not produce a complete collision under the condition of high load, and the throughput can also be stabilized. Based on the battery model, the lifetime of the system nodes (T) is extended. Both theoretical analysis and experimental results confirm the accuracy of the theoretical derivation.


Author(s):  
VETRI SELVI S ◽  
PURUS HOTHAMAN

Ad hoc networks are created dynamically and maintained by the individual nodes comprising the network. They do not require a pre-existing architecture for communication purposes and do not rely on any form of wired infrastructure; in an ad hoc network all communication occurs through a wireless median. The design and management of ad-hoc networks is significantly a challenging one when compared to contemporary networks. Authenticating the multicast session is an important one. To authenticate several factors should be considered, major issue are resource constraints and the wireless links. In addition to being resource efficient and robust, security solution must be provides to large group of receivers and to long multi-hop paths. The authentication must be done without much delay and should independent of the other packets. In existing TAM Tired Authentication scheme for Multicast traffic is proposed for ad-hoc networks. It exposed network clustering to reduce the overhead and to improve the scalability. Its two tired hierarchy combines the time and secret information asymmetry to achieve the resource efficiency and scalability. In the proposed system, a Asynchronous authentication scheme as using shared key management is proposed to resolve the foremost conflicting security requirements like group authentication and conditional privacy. The proposed batch verification scheme as a part of the protocol poses a significant reduction within the message delay, then by using shared key process so requirement of the storage management is extremely less.


2021 ◽  
Vol 5 (45) ◽  
pp. 702-712
Author(s):  
D.V. Tropin ◽  
A.M. Ershov ◽  
D.P. Nikolaev ◽  
V.V. Arlazarov

The demand for on-device document recognition systems increases in conjunction with the emergence of more strict privacy and security requirements. In such systems, there is no data transfer from the end device to a third-party information processing servers. The response time is vital to the user experience of on-device document recognition. Combined with the unavailability of discrete GPUs, powerful CPUs, or a large RAM capacity on consumer-grade end devices such as smartphones, the time limitations put significant constraints on the computational complexity of the applied algorithms for on-device execution. In this work, we consider document location in an image without prior knowledge of the docu-ment content or its internal structure. In accordance with the published works, at least 5 systems offer solutions for on-device document location. All these systems use a location method which can be considered Hough-based. The precision of such systems seems to be lower than that of the state-of-the-art solutions which were not designed to account for the limited computational resources. We propose an advanced Hough-based method. In contrast with other approaches, it accounts for the geometric invariants of the central projection model and combines both edge and color features for document boundary detection. The proposed method allowed for the second best result for SmartDoc dataset in terms of precision, surpassed by U-net like neural network. When evaluated on a more challenging MIDV-500 dataset, the proposed algorithm guaranteed the best precision compared to published methods. Our method retained the applicability to on-device computations.


Sign in / Sign up

Export Citation Format

Share Document