Enhanced Adaptive Multimedia Data Forwarding for Privacy Preservation in Vehicular Ad-Hoc Networks Using Authentication Group Key

Abstract

The vehicular ad-hoc networks (VANETs) are expected to support the diverse infrastructure based commercial services, including internet access, real-time traffic concerns, video streaming and content distribution. It also enables a wide range of promising applications and services. It has brought new security challenges due to their mobile and infrastructure less nature. In particular, confidentiality and location privacy are regarded as the most critical security concerns for securing service-oriented vehicular networks. Forwarded messages in vehicular ad-hoc networks are primarily multimedia data, including structured data, plain text, sound, and video which require access control with efficient privacy preservation. In this project, Ciphertext-policy attribute-based encryption (CP-ABE) delegation scheme is proposed, which allows road side units (RSUs) to perform most of the computation for the purpose of improving the decryption efficiency of the vehicles. In addition to that, proposed a novel Sybil attack detection mechanism, Footprint, using the trajectories of vehicles for identification while still preserving their location privacy. More specifically, when a vehicle approaches a road-side unit (RSU), it actively demands an authorized message from the RSU as the proof of the appearance time at this RSU. A location-hidden authorized message generation scheme is designed for two objectives: first, RSU signatures on messages are signer ambiguous so that the RSU location information is concealed from the resulted authorized message; Second, two authorized messages signed by the same RSU within the same given period of time are recognizable so that they can be used for identification. If the RSU is found to be failure but not updated with Trusted Authority, the current RSU which reads the records from the vehicle, queries the Trusted Authority about all the nearest nodes of missed RSU (second hop) from current RSU, and calculate the two hop timings and suspect the vehicle if the messages are not matched.

Authors and Affiliations

Poongodi R. K, Sivakumar T

Keywords

--

Related Articles

Enhanced Secure Big Data in Distributed Mobile Cloud Computing Using Fuzzy Encryption Model

This paper proposes a novel architecture for adaptive encryption of public cloud databases that offers a proxy-free alternative to the system. cloud system is difficult to synchronize login and authentication data betwee...

Parallel and Multiple E-Data Distributed Process with Progressive Duplicate Detection Model

In present, duplicate detection methods need to process ever larger datasets in ever shorter time: It is difficult to maintain the dataset. This project presents progressive duplicate detection algorithm that gradually i...

Hybridization Approach to Classify Big Data Using Social Internet of Things

Recently there has been quite a number of independent research activities that investigated the potentialities of integrating social networking concepts into Internet of Things solutions. The resulting paradigm, named So...

A Survey on Big Data Security and Related Techniques to Improve Security

Upgrade of security and protection in portable server farms is challengeable with proficient security key administration. For promoting and research, huge numbers of the organizations utilize huge information, however mi...

Topic Categorization on Social Network Using Latent Dirichlet Allocation

Topic modelling is a powerful technique for analysis of large document collection. Topic modelling is used for finding hidden topic from the collection of document. In the twitter api, it is essential all the tweet docum...

Download PDF file
  • EP ID EP405019
  • DOI 10.9756/BIJSESC.8385
  • Views 120
  • Downloads 0

How To Cite

Poongodi R. K, Sivakumar T (2018). Enhanced Adaptive Multimedia Data Forwarding for Privacy Preservation in Vehicular Ad-Hoc Networks Using Authentication Group Key. Bonfring International Journal of Software Engineering and Soft Computing, 8(1), 26-30. https://europub.co.uk./articles/-A-405019