Multivariate Quadratic Quasigroup Polynomial based Cryptosystem in Vanet
-
2018-10-02 https://doi.org/10.14419/ijet.v7i4.10.26767 -
K-means Cluster Head Algorithm, Multivariate Quadratic Quasigroup (MVQQ), Pseudonym Authentication, VANET (Vehicular Ad-Hoc Network). -
Abstract
Vehicular Ad-hoc Network (VANET) is a developing transmission system to abet in the everyday organization of vehicular traffic and safety of vehicles (nodes). Unsigned verification is one of the key necessities in VANET gives the confidentiality of the root of the message. Current security conventions in VANET’s gives unsigned verification depends on the two-tier architecture, comprises of two VANET components, particularly nodes and Roadside Units (RsU’s) functioning as the key developing server (KDS). This protocol depends densely on RsU’s to give unsigned identification to the nodes. In this paper, we propose the K-means Cluster Head algorithm which is utilized for guide assortment, for both personal-best (’pbest’) and global-best (’gbest’), are observed a tremendously successful and complete well evaluate to the before existing methods. Here, we also propose an asymmetric encryption algorithm, with emphasis on Multivariate Quadratic Quasigroups (MVQQ) algorithm, in a circumstance of VANET. We set forward prime pseudonyms reasonably make a long time cycle that are worn to interact with semi-confided in experts and alternate pseudonyms with a minor lifetime which are utilized to talk with different nodes. Â
Â
Â
-
References
[1] Pathan, Al-Sakib Khan , “Security of Self- Organizing Networks: MANET, WSN, WMN, VANETâ€, CRC press, 2011.
[2] Sumra, I.A., H.B. Hasbullah, J. Manan and A. Lail, 2011, “Comparative study of security hardware modules (EDR, TPD and TPM) in VANETâ€, at king Saud University Riyadh.
[3] Choudhary, G.K., 2007. Providing VANET security through position verification. MSc., Thesis, Old Dominion University.
[4] M. Raya and J. Hubaux, ‘‘the security of vehicular ad hoc networks’’, in Proc. 3rd ACM Workshop Secur. Ad Hoc Sensor Netw., 2005, pp. 11–21.
[5] Giorgio Calandriello, Panos Papadimitratos, Jean-Pierre Hubaux, and Antonio Lioy, â€Efficient and robust pseudonymous authentication in VANETâ€, In VANET ’07, New York, NY, USA, September 2007. ACM, pages 19–28.
[6] U. Rajput,F. Abbas, H. Eun, R. Hussain, and H. Oh, ‘‘A two level privacy preserving pseudonymous authentication protocol for VANET’’, in Proc.IEEE Int.Conf. Wireless Mobile Comput., Netw. Commun. (WiMob), Oct. 2015, pp. 643–650.
[7] J. Petit, F. Schaub, M. Feiri, and F. Kargl, ‘‘Pseudonym schemes in vehicular networks: A survey’’, IEEE Commun. Surveys Tut., vol. 17, no. 1, 2015, 1st Quart., pp. 228–255.
[8] Studer, A.; Shi, E.; Fan Bai; Perrig, A, “TACKing Together Efficient Authentication, Revocation, and Privacy in VANETsâ€, Sensor, Mesh and Ad Hoc Communications and Networks, SECON '09. 6th Annual IEEE Communications Society Conference on, vol., no., June 2009, pp.1-9, 22-26.
[9] Rajni, M.K. and P. Singh, 2013. An encryption algorithm to evaluate performance of V2V communication in vanet. Int. J. Cryptography Inform. Security.
[10] Bhuvaneshwari, S., G. Divya, K.B. Kirithika and S. Nithya, 2014. A novel approach for secured data transmission in VANET through clustering. J. Electron. Commun. Eng., 9: 23-30.
[11] Nasrin Taherkhani and Samuel Pierre, “Centralized and Localized Data Congestion Control Strategy for Vehicular Ad Hoc Networks Using a Machine Learning Clustering Algorithmâ€, Senior Member, IEEE transactions on Intelligent Transport Systems, Vol. 17, No. 11, November 2016.
[12] Nikhil Padhye, Juergen Branke and Sanaz Mostaghim, “Empirical Comparison of MOPSO Methods - Guide Selection and Diversity Preservationâ€, 2009.
[13] Tanwar, G., G. Singh and V. Gaur, 2010. Secured encryption-concept and challenge. Int. J. Comput. Applic., 2: 89-94.
[14] Gligoroski, D., S. Markovski and S. Knapskog, 2008. “A public key block cipher based on multivariate quadratic quasigroups†in Cornell University Library.
[15] Maia, R.J.M., P.S.L.M. Barreto and B.T. Oliveira, 2010. Implementation of multivariate quadratic quasigroup for wireless sensor network. Trans. Comput. Sci. XI, 6480: 64-78. DOI: 10.1007/978-3-642- 17697-5_4.
[16] Ahlawat, R., K. Gupta and S.K. Pal, 2009. From MQ to MQQ cryptography: Weaknesses and new solutions. Universia Holding.
[17] Quirino, G. and E. Moreno, 2013a. Architectural evaluation of asymmetric algorithms in ARM processors. Int. J. Electron. Electrical Eng., 1: 39-43. DOI: 10.12720/ijeee.1.1.39-43.
[18] Quirino, G. and E. Moreno, 2013b. Architectural evaluation of algorithms RSA, ECC and MQQ in ARM processors. Int. J. Comput. Netw. Commun., 5: 153-168. DOI: 10.5121/ijcnc.2013.5212.
-
Downloads
-
How to Cite
Selvakumar, K., & Naveen Kumar, S. (2018). Multivariate Quadratic Quasigroup Polynomial based Cryptosystem in Vanet. International Journal of Engineering & Technology, 7(4.10), 832-836. https://doi.org/10.14419/ijet.v7i4.10.26767Received date: 2019-01-29
Accepted date: 2019-01-29
Published date: 2018-10-02