A chaotic based integrity verification and encryption model for real-time VANET

Integrity and data privacy are the main security parameters between the vehicle and roadside unit (RSU) over large VANETs.  The integrity of the vehicle is used to check its identity against the neighboring nodes, whereas data privacy ensures that the data of a vehicle has not been altered during th...

Full description

Saved in:
Bibliographic Details
Main Authors: Shaik, Kareemulla (Author), Ali Hussain, Dr. Md (Author)
Format: EJournal Article
Published: Institute of Advanced Engineering and Science, 2019-06-01.
Subjects:
Online Access:Get fulltext
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 02439 am a22003013u 4500
001 ijeecs16039_12224
042 |a dc 
100 1 0 |a Shaik, Kareemulla  |e author 
100 1 0 |e contributor 
700 1 0 |a Ali Hussain, Dr. Md.  |e author 
245 0 0 |a A chaotic based integrity verification and encryption model for real-time VANET 
260 |b Institute of Advanced Engineering and Science,   |c 2019-06-01. 
500 |a https://ijeecs.iaescore.com/index.php/IJEECS/article/view/16039 
520 |a Integrity and data privacy are the main security parameters between the vehicle and roadside unit (RSU) over large VANETs.  The integrity of the vehicle is used to check its identity against the neighboring nodes, whereas data privacy ensures that the data of a vehicle has not been altered during the communication process. VANETs provide vehicles to give information about the security parameters and identity to vehicle to infrastructure communication and vehicle to vehicle communication. Most of the traditional VANETs are vulnerable to data security, integrity and authentication due to change in dynamic topology. Also, Traditional security models require limited data size for data security between the V2V or V2I. In this paper, an integrity verification model and non-linear double encryption model were proposed and implemented on large geographical VANET map. The main objective of the proposed model is to improve the security of the V2V communication in large VANETs. Experimental results proved that the proposed security model has less computation cost for encryption model and higher bit change during integrity verification compared to the existing approaches. 
540 |a Copyright (c) 2019 Institute of Advanced Engineering and Science 
540 |a http://creativecommons.org/licenses/by-nc/4.0 
546 |a eng 
690
690 |a VANET Security, chaotic maps, Integrity verification, encryption model. 
655 7 |a info:eu-repo/semantics/article  |2 local 
655 7 |a info:eu-repo/semantics/publishedVersion  |2 local 
655 7 |2 local 
786 0 |n Indonesian Journal of Electrical Engineering and Computer Science; Vol 14, No 3: June 2019; 1425-1432 
786 0 |n 2502-4760 
786 0 |n 2502-4752 
786 0 |n 10.11591/ijeecs.v14.i3 
787 0 |n https://ijeecs.iaescore.com/index.php/IJEECS/article/view/16039/12224 
856 4 1 |u https://ijeecs.iaescore.com/index.php/IJEECS/article/view/16039/12224  |z Get fulltext