Seagull Optimization Algorithm with Share Creation with an Image Encryption Scheme for Secure Vehicular Ad Hoc Networks

Authors

  • Ravichandran Mohan Department of Computer Science and Engineering, Annamalai University, India
  • Ganesan Prabakaran Department of Computer Science and Engineering, Annamalai University, India
  • Thirugnanasambandham Priyaradhikadevi Department of Computer Science and Engineering, Mailam Engineering College, India
Volume: 14 | Issue: 1 | Pages: 13000-13005 | February 2024 | https://doi.org/10.48084/etasr.6786

Abstract

Α Vehicular Ad hoc Network (VANET) allows transmission, amid moving or stationary vehicles via wireless technology. Amongst several problems, safe transmission is the most important one in smart VANETs in 5G networks. Smart vehicles require integration with advanced road systems encompassing smart payment and traffic control systems. Numerous security mechanisms are used in VANETs to ensure safe communication. One such mechanism is cryptographic digital signatures based on encryption. This study introduces the new seagull optimization algorithm involving share creation with an image encryption scheme (SGOA-SCIES) for secure VANET transmissions. The goal of the SGOA-SCIES technique is to create a considerable number of shares and encrypt them to accomplish security. In the SGOA-SCIES technique, a Multiple Share Creation (MSC) scheme is employed to generate numerous share sets. For the share encryption process, the SGOA-SCIES technique engages the Fractional-Order Chaotic System (FOCS) approach to encrypt the generated shares. The optimal keys of the FOCS method can be chosen by the SGOA usage, which ameliorates the security level. The performance evaluation of the SGOA-SCIES method is examined on benchmark data. The simulations demonstrate the enhanced SGOA-SCIES methodology outcome and compare it with the ones of other existing systems and under the implementation of various measures.

Keywords:

security, vehicular ad-hoc network, encryption, key generation, share creation

Downloads

Download data is not yet available.

References

K. Nova, U. A, S. S. Jacob, G. Banu, M. S. P. Balaji, and S. S, "Floyd–Warshalls algorithm and modified advanced encryption standard for secured communication in VANET," Measurement: Sensors, vol. 27, Jun. 2023, Art. no. 100796.

A. Munshi, "Randomly-based Stepwise Multi-Level Distributed Medical Image Steganography," Engineering, Technology & Applied Science Research, vol. 13, no. 3, pp. 10922–10930, Jun. 2023.

K. Vinoth Kumar and D. Balaganesh, "An optimal lightweight cryptography with metaheuristic algorithm for privacy preserving data transmission mechanism and mechanical design in vehicular ad hoc network," Materials Today: Proceedings, vol. 66, pp. 789–796, Jan. 2022.

A. N. Mazher and J. Waleed, "Implementation of modified GSO based magic cube keys generation in cryptography," Eastern-European Journal of Enterprise Technologies, vol. 1, no. 9 (109), pp. 43–49, Feb. 2021.

C. Lakshmi, K. Thenmozhi, J. B. B. Rayappan, and R. Amirtharajan, "Hopfield attractor-trusted neural network: an attack-resistant image encryption," Neural Computing and Applications, vol. 32, no. 15, pp. 11477–11489, Aug. 2020.

S. Alkhliwi, "Huffman Encoding with White Tailed Eagle Algorithm-based Image Steganography Technique," Engineering, Technology & Applied Science Research, vol. 13, no. 2, pp. 10453–10459, Apr. 2023.

J. Qi, T. Gao, X. Deng, and C. Zhao, "A pseudonym-based certificateless privacy-preserving authentication scheme for VANETs," Vehicular Communications, vol. 38, Dec. 2022, Art. no. 100535.

M. A. Mahdi, T. C. Wan, A. Mahdi, M. a. G. Hazber, and B. A. Mohammed, "A Multipath Cluster-Based Routing Protocol For Mobile Ad Hoc Networks," Engineering, Technology & Applied Science Research, vol. 11, no. 5, pp. 7635–7640, Oct. 2021.

K. A. Kumari, A. Sharma, C. Chakraborty, and M. Ananyaa, "Preserving Health Care Data Security and Privacy Using Carmichael’s Theorem-Based Homomorphic Encryption and Modified Enhanced Homomorphic Encryption Schemes in Edge Computing Systems," Big Data, vol. 10, no. 1, pp. 1–17, Feb. 2022.

D. Sharma, S. K. Gupta, A. Rashid, S. Gupta, M. Rashid, and A. Srivastava, "A novel approach for securing data against intrusion attacks in unmanned aerial vehicles integrated heterogeneous network using functional encryption technique," Transactions on Emerging Telecommunications Technologies, vol. 32, no. 7, 2021, Art. no. e4114.

A. Albakri, R. Alshahrani, F. Alharbi, and S. B. Ahamed, "Fully Homomorphic Encryption with Optimal Key Generation Secure Group Communication in Internet of Things Environment," Applied Sciences, vol. 13, no. 10, Jan. 2023, Art. no. 6055.

Z. Man, J. Li, X. Di, Y. Sheng, and Z. Liu, "Double image encryption algorithm based on neural network and chaos," Chaos, Solitons & Fractals, vol. 152, Nov. 2021, Art. no. 111318.

N. C. Velayudhan, A. Anitha, and M. Madanan, "Sybil Attack with RSU Detection and Location Privacy in Urban VANETs: An Efficient EPORP Technique," Wireless Personal Communications, vol. 122, no. 4, pp. 3573–3601, Feb. 2022.

R. Wang, G.-Q. Deng, and X.-F. Duan, "An image encryption scheme based on double chaotic cyclic shift and Josephus problem," Journal of Information Security and Applications, vol. 58, May 2021, Art. no. 102699.

M. Kaur, D. Singh, and V. Kumar, "Color image encryption using minimax differential evolution-based 7D hyper-chaotic map," Applied Physics B, vol. 126, no. 9, Aug. 2020, Art. no. 147.

J. F. Abukhait and M. S. Saleh, "An Adaptive Confidentiality Security Service Enhancement Protocol Using Image-Based Key Generator for Multi-Agent Ethernet Packet Switched Networks," International Journal of Electrical and Electronic Engineering & Telecommunications, vol. 12, no. 2, pp. 112–123, 2023.

S. Pamarthi and R. Narmadha, "Adaptive Key Management-Based Cryptographic Algorithm for Privacy Preservation in Wireless Mobile Adhoc Networks for IoT Applications," Wireless Personal Communications, vol. 124, no. 1, pp. 349–376, May 2022.

M. A. Alohali et al., "Blockchain-Driven Image Encryption Process with Arithmetic Optimization Algorithm for Security in Emerging Virtual Environments," Sustainability, vol. 15, no. 6, Jan. 2023, Art. no. 5133.

A. A. Bahattab, "Designing ROACM routing protocol along with bandwidth allocation using seagull optimization for ad hoc wireless network," Telecommunication Systems, vol. 81, no. 3, pp. 357–372, Nov. 2022.

R. Punithavathi, A. Ramalingam, C. Kurangi, A. S. K. Reddy, and J. Uthayakumar, "Secure content based image retrieval system using deep learning with multi share creation scheme in cloud environment," Multimedia Tools and Applications, vol. 80, no. 17, pp. 26889–26910, Jul. 2021.

J. Chen, C. Li, and X. Yang, "Chaos Synchronization of the Distributed-Order Lorenz System via Active Control and Applications in Chaotic Masking," International Journal of Bifurcation and Chaos, vol. 28, no. 10, Sep. 2018, Art. no. 1850121.

E. S. Ghith and F. A. A. Tolba, "Tuning PID Controllers Based on Hybrid Arithmetic Optimization Algorithm and Artificial Gorilla Troop Optimization for Micro-Robotics Systems," IEEE Access, vol. 11, pp. 27138–27154, 2023.

M. M. Khayyat, M. M. Khayyat, S. Abdel-Khalek, and R. F. Mansour, "Blockchain enabled optimal Hopfield Chaotic Neural network based secure encryption technique for industrial internet of things environment," Alexandria Engineering Journal, vol. 61, no. 12, pp. 11377–11389, Dec. 2022.

Downloads

How to Cite

[1]
R. Mohan, G. Prabakaran, and T. Priyaradhikadevi, “Seagull Optimization Algorithm with Share Creation with an Image Encryption Scheme for Secure Vehicular Ad Hoc Networks”, Eng. Technol. Appl. Sci. Res., vol. 14, no. 1, pp. 13000–13005, Feb. 2024.

Metrics

Abstract Views: 41
PDF Downloads: 47

Metrics Information