SlideShare a Scribd company logo
1 of 8
Download to read offline
TELKOMNIKA Telecommunication Computing Electronics and Control
Vol. 21, No. 5, October 2023, pp. 1005~1012
ISSN: 1693-6930, DOI: 10.12928/TELKOMNIKA.v21i5.22207 ๏ฒ 1005
Journal homepage: http://telkomnika.uad.ac.id
Improving the detection of intrusion in vehicular ad-hoc
networks with modified identity-based cryptosystem
Zachaeus K. Adeyemo1
, Emmanuel B. Ajulo2
, Damilare O. Akande1
, Hammed O. Lasisi3
, Samson I. Ojo1
1
Department of Electronic and Electrical Engineering, Faculty of Engineering and Technology, Ladoke Akintola University of
Technology, Ogbomoso, Nigeria
2
Department of Computer Science and Mathematics, College of Basic and Applied Sciences, Mountain Top University, Ibafo, Ogun
State, Nigeria
3
Department of Electrical and Electronics Engineering, College of Science, Engineering and Technology, Osun State University,
Osogbo, Osun State, Nigeria
Article Info ABSTRACT
Article history:
Received Nov 10, 2021
Revised Mar 21, 2023
Accepted Apr 30, 2023
Vehicular ad-hoc networks (VANETs) are wireless-equipped vehicles that
form networks along the road. The security of this network has been a major
challenge. The identity-based cryptosystem (IBC) previously used to secure
the networks suffers from membership authentication security features. This
paper focuses on improving the detection of intruders in VANETs with a
modified identity-based cryptosystem (MIBC). The MIBC is developed
using a non-singular elliptic curve with Lagrange interpolation. The public
key of vehicles and roadside units on the network are derived from number
plates and location identification numbers, respectively. Pseudo-identities
are used to mask the real identity of users to preserve their privacy.
The membership authentication mechanism ensures that only valid and
authenticated members of the network are allowed to join the network.
The performance of the MIBC is evaluated using intrusion detection ratio
(IDR) and computation time (CT) and then validated with the existing IBC.
The result obtained shows that the MIBC recorded an IDR of 99.3% against
94.3% obtained for the existing identity-based cryptosystem (EIBC) for 140
unregistered vehicles attempting to intrude on the network. The MIBC
shows lower CT values of 1.17 ms against 1.70 ms for EIBC. The MIBC can
be used to improve the security of VANETs.
Keywords:
Identity-based cryptosystem
Intrusion
On-board unit
Road side unit
VANET
This is an open access article under the CC BY-SA license.
Corresponding Author:
Damilare O. Akande
Department of Electronic and Electrical Engineering, Faculty of Engineering and Technology
Ladoke Akintola University of Technology, PMB 4000, Ogbomoso, Oyo State, Nigeria
Email: doakande@lautech.edu.ng
1. INTRODUCTION
The vehicular ad-hoc network (VANET) is an infrastructure-less network created as a result of
developments in wireless communications and networking technologies [1]. This new technology provides
ubiquitous connectivity to vehicles while in motion thereby creating efficient vehicular communications that
enable intelligent transportation systems (ITS) [2]. In VANET, there are two forms of communication,
namely: vehicle-to-vehicle (V2V) communication, in which vehicles fitted with an on-board unit (OBU)
wireless communication system communicate with other road vehicles, and vehicle-to-infrastructure (V2I)
communication, in which vehicles use their OBU to communicate with roadside units (RSUs) [3]. Improving
road safety and quality is the primary essence of this technology [2]. In VANET, the OBU of the vehicle acts
as an independent router, generates independent data, and periodically transmits information to other nearby
vehicles and RSUs on their current states, such as location, direction, speed, current time, and traffic events [4].
๏ฒ ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 21, No. 5, October 2023: 1005-1012
1006
In communicating with vehicles beyond the wireless range; intermediate vehicles or RSUs forward messages to
the intended destination over multiple hops. Thus, many initiatives in academic and standardization societies
have been inspired by this new model of communication [5]. Seven 10 MHz channels in the 5.9 GHz dedicated
short-range communication (DSRC) band have recently been allocated by the Federal Communications
Commission (FCC) of the United States of America (USA) to increase the protection and efficiency of the
transport system [5], [6]. Six 10 MHz channels are dedicated to comfort applications (internet facility,
information on the nearest restaurant, car park, filling station) in the new DSRC standard, and one channel is to
safety applications.
Given the tremendous benefits expected from vehicular communications, just like any other wireless
communication network, security has been a major challenge. Intruders can easily intercept, modify, and
replay messages transmitted on the network or even impersonate other vehicles to broadcast incorrect
information [6], [7]. Besides, the privacy of users on the network is also a challenge. The ideal is that the
travelling route of drivers should not be traceable by intruders through the message(s) sent or received by the
vehicles on the network [8], [9]. Consequent to these security challenges in VANETs, it has received due
attention from researchers, and the use of identity-based cryptosystem (IBC) to provide this security [10]-[12].
The uniqueness of IBC compare to other forms of security protocol is that the identity and pre-configuring
key of users is derived from an arbitrary string that uniquely identifies them [13]-[15]. Nonetheless,
the existing identity-based cryptosystem (EIBC) used to solve this problem lack membership authentication
security feature thereby allowing intruders to invade the network [10]. This informs the purpose of this work
to develop a modified identity-based cryptosystem (MIBC) to prevent and detect intrusion in VANETs. In this
paper, the MIBC was simulated using MATLAB R2018a. The performance of the MIBC was evaluated using
intrusion detection ratio (IDR) and computation time (CT) as performance metrics, and compared with EIBC.
2. OVERVIEW OF VEHICULAR AD-HOC NETWORKS (VANETS) AND IDENTITY-BASED
CRYPTOSYSTEM
Improving the detection of intruders in VANETs with a MIBC forms the basis for this study.
Therefore, the need to discuss the technology of VANETs and the fundamental of an identity-based
cryptosystem cannot be sidelined. The overview of VANETs technology and the IBC used for this work is
thus explained.
2.1. Vehicular ad-hoc networks
A sub-class of the wireless ad-hoc network (WANET) and the mobile ad-hoc network (MANET)
extension is the VANET. In VANET, nodes consist of self-organized vehicles and road-side infrastructure that
communicate with each other through wireless devices and function independently of any infrastructure in a
peer-to-peer mode. Each node operates and produces independent data as an independent router [16]-[19].
Network management and fault detection become distributed and hence more difficult to handle [20].
Nodes in VANETs are mobile which causes frequent changes to the network topology and makes it
unpredictable. It cannot be assumed that VANETs would always be under the protection of their owners
because of the ubiquitous existence of mobile nodes; nodes may be stolen or tampered with. For both
legitimate and unauthorized network users, the shared wireless medium is available [21]. While driving along
the road, these wireless-equipped vehicles spontaneously form networks. The key idea is to provide vehicle
nodes with ubiquitous connectivity while on the move and to establish effective vehicle-to-vehicle
communications that allow ITS. The ultimate objective of VANETs is to enhance the driving experience,
improve traffic safety and improve the performance of drivers [22]-[24].
2.2. Identity-based cryptosystem
Pre-configured vehicle keying materials and RSUs are created from their identities in identity-based
cryptosystems in such a way that the public and private keys of the vehicles and RSUs are bound to their
respective identities, thus avoiding certificate verification [25]. The cost of computing in this cryptosystem is
therefore small. Also, because in identity-based cryptosystems, the vehicle and the RSU do not need to
exchange certificates, the message length is reduced, and IBC is much more effective. IBC consists of two
mechanisms in basic form, namely identity-based encryption (IBE) and identity-based signature (IBS), with
four steps each. Setup/initialization, private key extraction, encryption, and decryption are the IBE process
steps while the IBS mechanism includes four steps include setup/initialization, private key extraction,
signature, and verification [25]-[27]. Both mechanisms follow the same process for setup/initialization and
private key extraction. These mechanisms are combined to achieve desired identity-based cryptosystems.
TELKOMNIKA Telecommun Comput El Control ๏ฒ
Improving the detection of intrusion in vehicular ad-hoc networks with โ€ฆ (Zachaeus K. Adeyemo)
1007
3. RESEARCH METHOD
The MIBC consists of four entities, namely: the trusted authority (TA), the network control unit
(NCU), the RSUs, and the vehicles. The TA is a trusted third party responsible for the system setup, registration,
configuration, and issuing of private keys to the NCU, RSUs, and vehicles on the network. The NCU is
responsible for the authentication of users on the network. The RSUs are static smart devices on the road such as
traffic sensors or pedestrian sensors mounted on the road, while the vehicles are mobile entities with a transceiver
known as OBU installed in them to enable communication. The cryptographic process involves four phases.
The first is the key and pseudo-identity generating phase which is solely carried out by the TA. The second is the
vehicle authentication phase where valid users of the network are allowed to join the network, the third is the data
transmission phase comprising message signing, and the fourth is the message verification phase.
3.1. Development of a secure communication system
The development of secure communication begins at this stage. The system was developed on a
non-singular elliptic curve as expressed in the (1) and Lagrange interpolation was used to define and
interpolates points on the curve. The use of Lagrange interpolation eliminates the need for point pairing
which may increase the cryptographic headcount.
๐‘ฆ2
= ๐‘ฅ3
+ ๐‘Ž๐‘ฅ + ๐‘ ๐‘š๐‘œ๐‘‘ ๐‘ (1)
The registration and setup of vehicles, RSUs, and NCU which are entities on the network were
carried out by the TA. The TA creates a group ๐บ defined by a non-singular elliptic curve as expressed in (1)
and selects a generator ๐‘ƒ โˆˆ ๐บ. The TA then randomly generates a master private ๐‘  โˆˆ ๐‘๐‘ž
โˆ—
for the system and
computes the system public key ๐‘ƒ๐‘๐‘ข๐‘ as in (2).
๐‘ƒ๐‘๐‘ข๐‘ = ๐‘ . ๐‘ƒ (2)
Where: โ€˜๐‘ โ€™ is the master private key of the system, and it is an integer within the order ๐‘ž, ๐‘ƒ is the generator of
the element in the group, and ๐‘โˆ—
is a set of integers other than zero. The pseudo-identity of entities
(participants) on the network was generated using (3).
๐‘ƒ๐ผ๐ท = ๐›พ๐‘–. ๐‘ƒ||๐‘…๐ผ๐ท โŠ• ๐ป(๐›พ๐‘–. ๐‘ƒ๐‘๐‘ข๐‘). (3)
Where: ๐‘ƒ๐ผ๐ท is the pseudo-identity of entities (participants) on the network, ๐›พ๐‘– is a set of integers randomly
generated in ๐›พ๐‘– โˆˆ ๐‘๐‘ž
โˆ—
, ๐‘…๐ผ๐ท is the real identity of the entity on the network, ๐‘ƒ๐‘๐‘ข๐‘ is the master public key of the
system as derived in (2), and ๐‘ƒ is the generator of the group as already defined. In order to generate the
private key of any entity on the network.
๐‘ ๐‘˜๐‘– = ๐›พ๐‘– + ๐œƒ๐‘–. ๐‘  ๐‘š๐‘œ๐‘‘ ๐‘ž. (4)
Where: ๐›พ๐‘– is a set of integers randomly generated in ๐›พ๐‘– โˆˆ ๐‘๐‘ž
โˆ—
, โ€˜๐œƒ๐‘–โ€™ is a hashed value of pseudo-identity
concatenated with a timestamp ๐‘‡๐‘–, โ€˜๐‘ โ€™ is the master private key of the system, and ๐‘š๐‘œ๐‘‘ ๐‘ž is a modular
arithmetic operation in prime ๐‘ž.
3.2. Development of vehicle authentication system
The TA selects randomly a live session code ๐‘†๐ฟ๐‘ โˆˆ ๐‘๐‘ž
โˆ—
and then generates vehicle membership
authentication code to the vehicle using (5), and the control authentication key for the NCU using (6)
respectively. However, the live session code ๐‘†๐ฟ๐‘ is not given to the vehicle(s) directly, but to the NCU for
vehicle(s) validation and authentication whenever it has to join the network for communication.
๐‘€๐‘˜ = ๐ป(๐ถ๐‘˜||๐ผ๐ท๐‘๐ถ๐‘ˆ) โŠ• ๐‘…๐ผ๐ท๐‘ฃ (5)
๐ถ๐‘˜ = ๐‘ . ๐ป(๐ผ๐ท๐‘‡๐ด||๐‘…๐ผ๐ท๐‘ฃ||๐‘†๐ฟ๐‘) (6)
Where: ๐‘€๐‘˜ is the membership authentication code for participants on the network, ๐ถ๐‘˜ is the control
authentication key for the NCU, ๐ผ๐ท๐‘‡๐ด is the identity of the TA, ๐‘…๐ผ๐ท๐‘ฃ is the real identity of the vehicle, ๐ผ๐ท๐‘๐ถ๐‘ˆ
is the identity of NCU, โ€˜๐‘ โ€™ is the master secret key, ๐›พ๐‘– is a set of integer randomly generated in ๐›พ๐‘– โˆˆ ๐‘๐‘ž
โˆ—
, ๐ป is
the hash function, || is the concatenation operation and โŠ• is the exclusive-OR operation. The NCU checks
for the validity of the request using (7), and further checks the revocation list which contains the real
identities of revoked vehicles received securely from the TA to ascertain the authenticity of the vehiclesโ€™
membership.
๏ฒ ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 21, No. 5, October 2023: 1005-1012
1008
๐‘…๐ผ๐ท๐‘ฃ โ‰Ÿ ๐‘€๐‘˜ โŠ• ๐ป(๐ถ๐‘˜||๐ผ๐ท๐‘๐ถ๐‘ˆ) (7)
The correctness of this authentication is proven as recall from (5) that:
๐‘€๐‘˜ = ๐ป(๐ถ๐‘˜||๐ผ๐ท๐‘๐ถ๐‘ˆ) โŠ• ๐‘…๐ผ๐ท๐‘ฃ
Then,
๐‘…๐ผ๐ท๐‘ฃ = ๐ป(๐ถ๐‘˜||๐ผ๐ท๐‘๐ถ๐‘ˆ) โŠ• ๐‘…๐ผ๐ท๐‘ฃ โŠ• ๐ป(๐ถ๐‘˜||๐ผ๐ท๐‘๐ถ๐‘ˆ)
๐‘…๐ผ๐ท๐‘ฃ = ๐‘…๐ผ๐ท๐‘ฃ
3.3. Message signing
The vehicle signs messages to be transmitted on the network via the OBU device by generating a
random number ๐œ‡๐‘– โˆˆ ๐‘๐‘ž
โˆ—
and computes (8), (9), and (10). This is to ensure non-repudiation and to ensure
high-security protection because any computation towards breaking the scheme by any intruder requires
simultaneous extraction of two unknown secrets.
๐‘…๐‘– = ๐œ‡๐‘–. ๐‘ƒ (8)
๐›ฝ๐‘– = ๐ป(๐‘ƒ๐ผ๐ท||๐‘‡๐‘–||๐‘…๐‘–||๐‘€๐‘–) (9)
๐œŽ๐‘– = ๐‘ ๐‘˜๐‘ฃ + ๐›ฝ๐‘–. ๐œ‡๐‘– ๐‘š๐‘œ๐‘‘ ๐‘ž (10)
The signed message ๐‘€ = {๐‘€๐‘–, ๐‘ƒ๐ผ๐ท๐‘–
, ๐‘‡๐‘–, ๐‘…๐‘–, ๐œŽ๐‘–}. Then, the vehicle broadcasts the message ๐‘€ to the nearby
RSUs and vehicles, which are the receivers.
3.4. Message verification
The verifier which may be an RSU or a vehicle checks the validity of the message received using (11).
The verifier checks the freshness of timestamp ๐‘‡๐‘–; if โˆ†๐‘‡ โ‰ฅ ๐‘‡๐‘๐‘œ๐‘ค โˆ’ ๐‘‡๐‘–, where: โˆ†๐‘‡ is the predefined endurable
transmission delay, ๐‘‡๐‘๐‘œ๐‘ค is the recent message received, and ๐‘– = 1, 2, 3, โ€ฆ , ๐‘›; otherwise, the verifier rejects
the message.
๐œŽ๐‘–. ๐‘ƒ = ๐‘ƒ๐ผ๐ท๐‘ฃ + ๐œƒ๐‘–. ๐‘ƒ๐‘๐‘ข๐‘ + ๐›ฝ๐‘–. ๐‘…๐‘–. (11)
Where: ๐œƒ๐‘– is the hashed value of pseudo-identity concatenated with a timestamp ๐‘‡๐‘–. If it does, the message is
approved by the verifier; otherwise, the message is rejected by the verifier.
3.5. System simulation and procedures
The MIBC was simulated using MATLAB R2018a. The simulation was conducted on a Windows 8
computer system with Intelยฎ Coreโ„ข i3 processor, 4 GB RAM. The simulation was considered for the V2V
and vehicle-to-roadside unit (V2R) communications, and the frequency of operation is 5.9 GHz.
The driving scenario designer (DSD) Application on the MATLAB R2018a Environment was used as a
mobility generation tool; and the transmission rate used is 0.3 seconds. The graphical users interface (GUI) as
shown in Figure 1 was created to aid simulation and analysis of the system. The membership authentication
panel on the GUI checks the validity of the vehicle when a request to join the network is sent; such a request
is either valid or not valid. The key generating panel generates on the GUI generates the entire usable key for
the vehicles on the network.
3.6. System evaluation performance metrics
The performance evaluation of the system was done using IDR and cryptographic computation time.
The IDR which is the ratio of the detected number of vehicles trying to break into the network to vehicles not
detected was analysed. The simulation analyses the efficiency of the NCU in preventing invalid and
unregistered vehicles into the network. For an efficient system, the detection ratio is expected to be high, and
the percentage detection rate is expressed as in (12).
๐ผ๐ท๐‘… =
๐‘๐‘ข๐‘š๐‘๐‘’๐‘Ÿ ๐‘œ๐‘“ ๐‘–๐‘›๐‘๐‘–๐‘‘๐‘’๐‘›๐‘ก๐‘  ๐‘ ๐‘ข๐‘๐‘๐‘’๐‘ ๐‘ ๐‘“๐‘ข๐‘™๐‘™๐‘ฆ ๐‘‘๐‘’๐‘ก๐‘’๐‘๐‘ก๐‘’๐‘‘
๐‘‡๐‘œ๐‘ก๐‘Ž๐‘™ ๐‘›๐‘ข๐‘š๐‘๐‘’๐‘Ÿ ๐‘œ๐‘“ ๐‘–๐‘›๐‘๐‘–๐‘‘๐‘’๐‘›๐‘ก๐‘ 
ร— 100% (12)
TELKOMNIKA Telecommun Comput El Control ๏ฒ
Improving the detection of intrusion in vehicular ad-hoc networks with โ€ฆ (Zachaeus K. Adeyemo)
1009
In the same vein, the computation time which is the time required for computing the cryptographic
operations was also analyzed. In this paper, the computation time was carried out using the โ€˜tit-totโ€™ function
of the MATLAB R2018a for both the developed and existing systems. The percentage of performance
improvement analysis of the developed system was achieved using the (13).
๐ผ๐‘๐‘’๐‘Ÿ =
(๐‘‡๐‘’๐‘ฅ๐‘–๐‘ ๐‘กโˆ’๐‘‡๐‘‘๐‘’๐‘ฃ๐‘’๐‘™๐‘œ๐‘๐‘’๐‘‘)
๐‘‡๐‘’๐‘ฅ๐‘–๐‘ ๐‘ก
% (13)
Where ๐ผ๐‘๐‘’๐‘Ÿ refers to the improvement percentage, ๐‘‡๐‘’๐‘ฅ๐‘–๐‘ ๐‘ก refers to the time costs of the existing scheme, and
๐‘‡๐‘‘๐‘’๐‘ฃ๐‘’๐‘™๐‘œ๐‘๐‘’๐‘‘ refers to the time costs of the developed scheme. Consequently, the developed system (MIBC) was
compared with the existing system, (EIBC), and the percentage performance improvement analysis was
carried out using the (14).
๐ผ๐‘๐‘’๐‘Ÿ =
(๐‘‡๐‘’๐‘ฅ๐‘–๐‘ ๐‘กโˆ’๐‘‡๐‘‘๐‘’๐‘ฃ๐‘’๐‘™๐‘œ๐‘๐‘’๐‘‘)
๐‘‡๐‘’๐‘ฅ๐‘–๐‘ ๐‘ก
100% (14)
Where ๐ผ๐‘๐‘’๐‘Ÿ refers to the improved percentage, ๐‘‡๐‘’๐‘ฅ๐‘–๐‘ ๐‘ก refers to the value of the existing scheme, and ๐‘‡๐‘‘๐‘’๐‘ฃ๐‘’๐‘™๐‘œ๐‘๐‘’๐‘‘
refers to the value of the developed scheme.
Figure 1. Simulation interface for the modified identity-based cryptosystem
4. RESULTS AND DISCUSSION
The IDR which is the ratio of the detected number of vehicles trying to break into the network to
vehicles not detected was analysed. The simulated vehicles were divided into two parts, 70% of the vehicles
were unregistered and invalid vehicles and made to intrude into the network, while the remaining 30% were
registered and valid members of the network. From the simulation, it was observed that all attempts made by
the intruding vehicles were rejected by the NCU. The result is shown in Table 1, and the percentage intrusion
detection rate for the number of incidents (vehicles) is shown in Figure 2.
In the same vein, the CT of the cryptographic process of the MIBC obtained is 1.17 ms. This is an
average result of running the cryptographic algorithm for an average of 1000 times. Also, the MIBC was
compared with the EIBC. In terms of CT, the CT for MIBC is 1.17 ms while that of EIBC is 1.70 ms. The result
shows that the MIBC has a lower computation time compared to the EIBC. Consequently, the percentage
improvement of the computation time of MIBC over the EIBC, shows that the MIBC has 31.18%
improvements over the EIBC. The IDR result for the MIBC and EIBC for different vehicles were compared.
The values are as shown in Table 2, and illustrated in Figure 3.
The overall average percentage of performance improvement analysis of intrusion detection rate in
the MIBC and EIBC is presented in Figure 4. The result shows that the MIBC has a total average of 98.5%
intrusion detection rate compare to the EIBC which has a 93.2% intrusion detection rate. This is a 5.4%
performance improvement over EIBC. The results presented show that the performance of MIBC gets better
even with an increase in the number of vehicles released into the network which is a great improvement
compared to EIBC.
๏ฒ ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 21, No. 5, October 2023: 1005-1012
1010
Table 1. Intrusion detection ratios
No. of vehicle Total no. of incidents No. of incidents successfully detected % IDR
50 35 33 94.3
100 70 69 98.6
150 105 103 99.1
200 140 139 99.3
Figure 2. Intrusion detection rate for the number of
incidents (vehicles)
Figure 3. Comparison of intrusion detection rate
in the MIBC and EIBC
Table 2. Intrusion detection ratio for the MIBC and EIBC
Vehicle density Intrusion detection ratio for MIBC system (%) Intrusion detection ratio for EIBC system (%)
50 97.1 91.4
100 98.6 92.9
150 99.1 94.3
200 99.3 94.3
Figure 4. Overall average intrusion detection analysis
5. CONCLUSION
In this paper, a variant IBC that ensures secure communication and prevention of intruders in
VANET was developed. An authentication system for usersโ€™ validation on the network was incorporated into
the system. The validation is done via the NCU in a handshake with the TA of the system to securely prevent
intrusion and ensures that only valid members of the network are allowed to join the network. The NCU of
the system securely prevents intrusion and ensures that only valid members of the network are allowed to
join the network. The result shows that the proposed MIBC outperforms the EIBC in IDR and CT
performance and shows the superiority of the security features in terms of usersโ€™ membership authentication.
ACKNOWLEDGEMENTS
Our sincere appreciation goes to the Department of Electronic and Electrical Engineering, Ladoke
Akintola University of Technology, Ogbomoso, Nigeria, for the provision of the conducive environment
upon whch this research was conducted.
TELKOMNIKA Telecommun Comput El Control ๏ฒ
Improving the detection of intrusion in vehicular ad-hoc networks with โ€ฆ (Zachaeus K. Adeyemo)
1011
REFERENCES
[1] D. A. J. Al-Khaffaf and M. G. Al-Hamiri, โ€œPerformance evaluation of campus network involving VLAN and broadband
multimedia wireless networks using OPNET modeler,โ€ TELKOMNIKA (Telecommunication, Computing, Electronics and
Control), vol. 19, no. 5, pp. 1490-1497, 2021, doi: 10.12928/TELKOMNIKA.v19i5.18531.
[2] Girish and Phaneendra H. D., โ€œIdentity-based cryptography and comparison with traditional public-key encryption: A survey,โ€
International Journal of Computer Science and Information Technologies (IJCSIT), vol. 5, no. 4, pp. 5521-5525, 2014. [Online].
Available: https://www.ijcsit.com/docs/Volume%205/vol5issue04/ijcsit20140504155.pdf
[3] J. Jenefa and E. A. M. Anita, โ€œSecure vehicular communication using identity-based signature scheme,โ€ Wireless Personal
Communication, vol. 98, pp. 1383-1411, 2018, doi: 10.1007/s11277-017-4923-7.
[4] J. Cui, W. Xu, H. Zhong, J. Zhang, Y. Xu, and L. Liu, โ€œPrivacy-preserving authentication using a double pseudonym for the
internet of vehicles,โ€ Sensors, vol. 18, no. 5, 2018, doi: 10.3390/s18051453.
[5] H. Peng, L. Liang, X. Shen, and G. Y. Li, โ€œVehicular communications: a network layer perspective,โ€ IEEE Transactions on
Vehicular Technology, vol. 68, no. 2, pp. 1064-1078, 2019, doi: 10.1109/TVT.2018.2833427.
[6] E. B. Ajulo, R. O. Akinyede, and O. S. Adewale, โ€œSecurity threats and privacy issues in vehicular ad-hoc network (VANET):
survey and perspective,โ€ Journal of Information, vol. 4, no. 1, 2018, doi: 10.18488/journal.104.2018.41.1.9.
[7] Y. Huang, X. Ma, Y. Liu, and Z. Yang, โ€œEffective capacity maximization in beyond 5G vehicular networks: a hybrid deep
transfer learning method,โ€ Wireless Communications and Mobile Computing, vol. 2021, 2021, doi: 10.1155/2021/8899094.
[8] F. A. Ghaleb, M. A. Maarof, A. Zainal, B. A. S. Al-Rimy, A. Alsaeedi, and W. Boulila, โ€œEnsemble-based hybrid context-aware
misbehavior detection model for vehicular ad hoc network,โ€ Remote Sensing, vol. 11, no. 23, 2019, doi: 10.3390/rs11232852.
[9] E. B. Ajulo, R. O. Akinyede, and O. S. Adewale, โ€œModeling of situation response time in vehicular ad-hoc network,โ€ MATICS:
Jurnal Ilmu Komputer dan Teknologi Informasi, vol. 10, no. 1, pp. 1-7, 2018, doi: 10.18860/mat.v10i1.4785.
[10] H. F. Jassim, M. A. Tawfeeq, and S. M. Mahmoud, โ€œOverlapped hierarchical clusters routing protocol for improving quality of
service,โ€ TELKOMNIKA (Telecommunication, Computing, Electronics and Control), vol. 19, no. 3, pp. 705-715, 2021,
doi: 10.12928/TELKOMNIKA.v19i3.18354.
[11] D. Manivannan, S. S. Moni, and S. Zeadally, โ€œSecure authentication and privacy-preserving techniques in vehicular ad-hoc
networks (VANETs),โ€ Vehicular Communications, vol. 25, 2020, doi: 10.1016/j.vehcom.2020.100247.
[12] F. A. Ghaleb et al., โ€œMisbehavior-aware on-demand collaborative intrusion detection system using distributed ensemble learning
for VANET,โ€ Electronics, vol. 9, no. 9, 2020, doi: 10.3390/electronics9091411.
[13] B. A. S. Al-Rimy et al., โ€œA pseudo feedback-based annotated TF-IDF technique for dynamic crypto-ransomware pre-encryption
boundary delineation and features extraction,โ€ IEEE Access, vol. 8, pp. 140586-140598, 2020, doi: 10.1109/ACCESS.2020.3012674.
[14] S. Sharma and A. Kaul, โ€œA survey on intrusion detection systems and honeypot based proactive security mechanisms in VANETs
and VANET cloud,โ€ Vehicular Communication, vol. 12, pp. 138-164, 2018, doi: 10.1016/j.vehcom.2018.04.005.
[15] J. Liang, J. Chen, Y. Zhu, and R. Yu, โ€œA novel intrusion detection system for vehicular ad hoc networks (VANETs) based on
differences of traffic flow and position,โ€ Application Soft Computing, vol. 75, pp. 712-727, 2019, doi: 10.1016/j.asoc.2018.12.001.
[16] Y. Zhou, S. Liu, M. Xiao, S. Deng, and X. Wang, โ€œAn efficient V2I authentication scheme for VANETs,โ€ Mobile Information
Systems, 2018, doi: 10.1155/2018/4070283.
[17] S. Zeng, Y. Huang, and X. Liu, โ€œPrivacy-preserving communication for VANETs with conditionally anonymous ring signature,โ€
International Journal Network Security, vol. 17, no. 2, pp. 135-141, 2015. [Online]. Available:
http://ijns.jalaxy.com.tw/contents/ijns-v17-n2/ijns-v17-n2.pdf#page=37
[18] C. Wan and J. Zhang, โ€œEfficient identity-based transmission for VANET,โ€ Journal of Ambient Intelligence and Humanized
Computing, vol. 9, pp. 1861-1871, 2018, doi: 10.1007/s12652-017-0650-x.
[19] F. A. Ghaleb, M. A. Maarof, A. Zainal, B. A. S. Al-Rimy, F. Saeed, and T. Al-Hadhrami, โ€œHybrid and multifaceted context-aware
misbehavior detection model for vehicular ad hoc network,โ€ IEEE Access, vol. 7, pp. 159119-159140, 2019,
doi: 10.1109/ACCESS.2019.2950805.
[20] M. Lee and T. Atkison, โ€œVANET applications: Past, present, and future,โ€ Vehicular Communications, vol. 28, 2021,
doi: 10.1016/j.vehcom.2020.100310.
[21] S. Zhang, Y. Liu, Y. Xiao, and R. He, โ€œA trust based adaptive privacy preserving authentication scheme for VANETs,โ€ Vehicular
Communication, vol. 37, 2022, doi: 10.1016/j.vehcom.2022.100516.
[22] A. F. Abbas, U. U. Sheikh, F. T. Al-Dhief, and M. N. H. Mohd, โ€œA comprehensive review of vehicle detection using computer
vision,โ€ TELKOMNIKA (Telecommunication, Computing, Electronics and Control), vol. 19, no. 3, pp. 838-850, 2021,
doi: 10.12928/TELKOMNIKA.v19i3.12880.
[23] V. H. La and A. Cavalli, โ€œSecurity attacks and solutions in vehicular ad-hoc networks: A survey,โ€ International Journal on
AdHoc Networking Systems (IJANS), vol. 4, no. 2, pp. 1-20, 2014, doi: 10.5121/ijans.2014.4201.
[24] B. Ji et al., โ€œSurvey on the internet of vehicles: network architectures and applications,โ€ IEEE Communications Standards
Magazine, vol. 4, no. 1, pp. 34-41, 2020, doi: 10.1109/MCOMSTD.001.1900053.
[25] F. Mezrag, S. Bitam, and A. Mellouk, โ€œAn efficient and lightweight identity-based scheme for secure communication in clustered
wireless sensor networks,โ€ Journal of Network and Computer Applications, vol. 200, 2022, doi: 10.1016/j.jnca.2021.103282.
[26] Y. Chen, Y. Wang, M. Liu, J. Zhang, and L. Jiao, โ€œNetwork slicing enabled resource management for service-oriented ultra-
reliable and low-latency vehicular networks,โ€ IEEE Transactions on Vehicular Technology, vol. 69, no. 7, pp. 7847โ€“7862, 2020,
doi: 10.1109/TVT.2020.2991723.
[27] B. A. S. Al-Rimy, M. A. Maarof, and S. Z. M. Shaid, โ€œCrypto-ransomware early detection model using novel incremental
bagging with enhanced semi-random subspace selection,โ€ Future Generation Computer Systems, vol. 101, pp. 476-491, 2019,
doi: 10.1016/j.future.2019.06.005.
๏ฒ ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 21, No. 5, October 2023: 1005-1012
1012
BIOGRAPHIES OF AUTHORS
Zachaeus K. Adeyemo received his B.Eng., M.Eng. degrees in Electrical
Engineering from University of Ilorin, Ilorin, Nigeria in 1994 and 2002, respectively, and
Ph.D. in Electronic and Electrical Engineering (Communication Engineering) from Ladoke
Akintola University of Technology (LAUTECH), Ogbomoso, Nigeria in 2009. He joined the
services of Ladoke Akintola University of Technology (LAUTECH) Ogbomoso in 1995 as a
Graduate Assistant in the department of Electronic and Electrical Engineering and rose from
this lowest level of the academic cadre through all the ranks until he was promoted to a full-
fledged Professor. His current research interests are wireless communications, signal
processing in communication systems, development of a path-loss prediction model using
adaptive neuro-fuzzy inference system, spectrum detection in a cognitive radio network. Prof.
Adeyemo is a corporate member, Nigerian Society of Engineers (MNSE), Registered member
of Council for the Regulation of Engineering in Nigeria (R. COREN) and Member, Africa
Engineering Education Association (AEEA). He can be contacted at email:
zkadeyemo@lautech.edu.ng.
Emmanuel B. Ajulo received his B.Tech and M.Tech degrees in Electronic and
Electrical Engineering from Ladoke Akintola University of Technology (LAUTECH),
Ogbomoso, Nigeria; and M.Tech and Ph.D degrees in Computer Science from the Federal
University of Technology, Akure, Nigeria in 2015 and 2020 respectively. Heโ€™s reputable for
developing I.T architectures and security frameworks to drive communication systems. He is a
member of Nigeria Society of Engineers, member of Nigeria Computing Society, and a
registered engineer with the Council for the Regulation of Engineering in Nigeria (COREN).
His research interest is on computational cryptography, signal processing, machine learning,
and artificial intelligence. He can be contacted at email: emmanuelajulo@gmail.com.
Damilare O. Akande obtained his B. Tech and M. Tech degrees in Electronic and
Electrical Engineering from Ladoke Akintola University of Technology (LAUTECH),
Ogbomoso and the Federal University of Technology, Akure, Nigeria in 2008 and 2012
respectively. He obtained his Ph. D degree from University Sans Malaysia, Malaysia in 2019.
He is a member of Nigeria Society of Engineers and a registered member of COREN. His
research interest is on signal processing, cooperative communications and MAC layer design.
He can be contacted at email: doakande@lautech.edu.ng.
Hammed O. Lasisi is a senior lecturer and researcher in the Department of
Electrical and Electronics Engineering, Osun State University, Osogbo, Nigeria. He holds
doctorate (Ph.D) and masterโ€™s degrees in Elecctrical and Electronics Engineering from
University of Ilorin, Nigeria. His area of specialization is telecommunication and telegraphic
engineering. He is a registered member of the Council for the Regulation of Engineering
(COREN) in Nigeria. He can be contacted at email: hammed.lasis@uniosun.edu.ng.
Samson I. Ojo received his B. Tech and M. Tech degrees in Electronic and
Electrical Engineering in 2011 and 2018, respectively, from Ladoke Akintola University of
Technology (LAUTECH), Ogbomoso, Nigeria. He is a registered member of Council for the
Regulation of Engineering in Nigeria (COREN). He obtained his Ph.D. in mobile
communication in the year 2021. His research interest is on signal processing, diversity and
cognitive radio. He can be contacted at email: siojo83@lautech.edu.ng.

More Related Content

Similar to Improving the detection of intrusion in vehicular ad-hoc networks with modified identity-based cryptosystem

Cyber DoS attack-based security simulator for VANET
Cyber DoS attack-based security simulator for VANET Cyber DoS attack-based security simulator for VANET
Cyber DoS attack-based security simulator for VANET IJECEIAES
ย 
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...IJERA Editor
ย 
A heterogeneous short-range communication platform for Internet of Vehicles
A heterogeneous short-range communication platform for Internet of Vehicles A heterogeneous short-range communication platform for Internet of Vehicles
A heterogeneous short-range communication platform for Internet of Vehicles IJECEIAES
ย 
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...Dr. Amarjeet Singh
ย 
Review Paper on VANET
Review Paper on VANETReview Paper on VANET
Review Paper on VANETPallavi Agarwal
ย 
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...IJCNCJournal
ย 
A novel key management protocol for vehicular cloud security
A novel key management protocol for vehicular cloud securityA novel key management protocol for vehicular cloud security
A novel key management protocol for vehicular cloud securityTELKOMNIKA JOURNAL
ย 
A THRESHOLD BASED AUTHENTICATION MECHANISM FOR VEHICULAR AD HOC NETWORK (VANET)
A THRESHOLD BASED AUTHENTICATION MECHANISM FOR VEHICULAR AD HOC NETWORK (VANET)A THRESHOLD BASED AUTHENTICATION MECHANISM FOR VEHICULAR AD HOC NETWORK (VANET)
A THRESHOLD BASED AUTHENTICATION MECHANISM FOR VEHICULAR AD HOC NETWORK (VANET)IAEME Publication
ย 
Automotive Ethernet architecture and security: challenges and technologies
Automotive Ethernet architecture and security: challenges and technologies Automotive Ethernet architecture and security: challenges and technologies
Automotive Ethernet architecture and security: challenges and technologies IJECEIAES
ย 
Vehicular Networking
Vehicular NetworkingVehicular Networking
Vehicular Networkingijtsrd
ย 
Cooperative Data Sharing with Security in Vehicular Ad-Hoc Networks
Cooperative Data Sharing with Security in Vehicular Ad-Hoc NetworksCooperative Data Sharing with Security in Vehicular Ad-Hoc Networks
Cooperative Data Sharing with Security in Vehicular Ad-Hoc Networkscsandit
ย 
Security Requirements for IVC Network
 Security Requirements for IVC Network  Security Requirements for IVC Network
Security Requirements for IVC Network IRJET Journal
ย 
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs ApplicationsBlockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs ApplicationsIJCNCJournal
ย 
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONS
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONSBLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONS
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONSIJCNCJournal
ย 
Flexible handover solution for vehicular ad-hoc networks based on software de...
Flexible handover solution for vehicular ad-hoc networks based on software de...Flexible handover solution for vehicular ad-hoc networks based on software de...
Flexible handover solution for vehicular ad-hoc networks based on software de...IJECEIAES
ย 
Using Computing Methods to Secure VANET
Using Computing Methods to Secure VANETUsing Computing Methods to Secure VANET
Using Computing Methods to Secure VANETDr.Irshad Ahmed Sumra
ย 
Software engineering based self-checking process for cyber security system in...
Software engineering based self-checking process for cyber security system in...Software engineering based self-checking process for cyber security system in...
Software engineering based self-checking process for cyber security system in...IJECEIAES
ย 
CVIN ppt.pptx
CVIN ppt.pptxCVIN ppt.pptx
CVIN ppt.pptxAbhi71358
ย 
Connected Vehicles, Zonal In Vehicle Network Architecture
Connected Vehicles, Zonal In Vehicle Network ArchitectureConnected Vehicles, Zonal In Vehicle Network Architecture
Connected Vehicles, Zonal In Vehicle Network Architectureijtsrd
ย 

Similar to Improving the detection of intrusion in vehicular ad-hoc networks with modified identity-based cryptosystem (20)

Cyber DoS attack-based security simulator for VANET
Cyber DoS attack-based security simulator for VANET Cyber DoS attack-based security simulator for VANET
Cyber DoS attack-based security simulator for VANET
ย 
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...
ย 
A heterogeneous short-range communication platform for Internet of Vehicles
A heterogeneous short-range communication platform for Internet of Vehicles A heterogeneous short-range communication platform for Internet of Vehicles
A heterogeneous short-range communication platform for Internet of Vehicles
ย 
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...
ย 
Review Paper on VANET
Review Paper on VANETReview Paper on VANET
Review Paper on VANET
ย 
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...
ย 
A novel key management protocol for vehicular cloud security
A novel key management protocol for vehicular cloud securityA novel key management protocol for vehicular cloud security
A novel key management protocol for vehicular cloud security
ย 
A THRESHOLD BASED AUTHENTICATION MECHANISM FOR VEHICULAR AD HOC NETWORK (VANET)
A THRESHOLD BASED AUTHENTICATION MECHANISM FOR VEHICULAR AD HOC NETWORK (VANET)A THRESHOLD BASED AUTHENTICATION MECHANISM FOR VEHICULAR AD HOC NETWORK (VANET)
A THRESHOLD BASED AUTHENTICATION MECHANISM FOR VEHICULAR AD HOC NETWORK (VANET)
ย 
Automotive Ethernet architecture and security: challenges and technologies
Automotive Ethernet architecture and security: challenges and technologies Automotive Ethernet architecture and security: challenges and technologies
Automotive Ethernet architecture and security: challenges and technologies
ย 
Vehicular Networking
Vehicular NetworkingVehicular Networking
Vehicular Networking
ย 
Cooperative Data Sharing with Security in Vehicular Ad-Hoc Networks
Cooperative Data Sharing with Security in Vehicular Ad-Hoc NetworksCooperative Data Sharing with Security in Vehicular Ad-Hoc Networks
Cooperative Data Sharing with Security in Vehicular Ad-Hoc Networks
ย 
capitulos 6
capitulos 6capitulos 6
capitulos 6
ย 
Security Requirements for IVC Network
 Security Requirements for IVC Network  Security Requirements for IVC Network
Security Requirements for IVC Network
ย 
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs ApplicationsBlockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications
ย 
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONS
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONSBLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONS
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONS
ย 
Flexible handover solution for vehicular ad-hoc networks based on software de...
Flexible handover solution for vehicular ad-hoc networks based on software de...Flexible handover solution for vehicular ad-hoc networks based on software de...
Flexible handover solution for vehicular ad-hoc networks based on software de...
ย 
Using Computing Methods to Secure VANET
Using Computing Methods to Secure VANETUsing Computing Methods to Secure VANET
Using Computing Methods to Secure VANET
ย 
Software engineering based self-checking process for cyber security system in...
Software engineering based self-checking process for cyber security system in...Software engineering based self-checking process for cyber security system in...
Software engineering based self-checking process for cyber security system in...
ย 
CVIN ppt.pptx
CVIN ppt.pptxCVIN ppt.pptx
CVIN ppt.pptx
ย 
Connected Vehicles, Zonal In Vehicle Network Architecture
Connected Vehicles, Zonal In Vehicle Network ArchitectureConnected Vehicles, Zonal In Vehicle Network Architecture
Connected Vehicles, Zonal In Vehicle Network Architecture
ย 

More from TELKOMNIKA JOURNAL

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...TELKOMNIKA JOURNAL
ย 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...TELKOMNIKA JOURNAL
ย 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...TELKOMNIKA JOURNAL
ย 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...TELKOMNIKA JOURNAL
ย 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaTELKOMNIKA JOURNAL
ย 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireTELKOMNIKA JOURNAL
ย 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkTELKOMNIKA JOURNAL
ย 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsTELKOMNIKA JOURNAL
ย 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...TELKOMNIKA JOURNAL
ย 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesTELKOMNIKA JOURNAL
ย 
Implementation of FinFET technology based low power 4ร—4 Wallace tree multipli...
Implementation of FinFET technology based low power 4ร—4 Wallace tree multipli...Implementation of FinFET technology based low power 4ร—4 Wallace tree multipli...
Implementation of FinFET technology based low power 4ร—4 Wallace tree multipli...TELKOMNIKA JOURNAL
ย 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemTELKOMNIKA JOURNAL
ย 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...TELKOMNIKA JOURNAL
ย 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorTELKOMNIKA JOURNAL
ย 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...TELKOMNIKA JOURNAL
ย 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...TELKOMNIKA JOURNAL
ย 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksTELKOMNIKA JOURNAL
ย 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingTELKOMNIKA JOURNAL
ย 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...TELKOMNIKA JOURNAL
ย 
ResNet-n/DR: Automated diagnosis of diabetic retinopathy using a residual neu...
ResNet-n/DR: Automated diagnosis of diabetic retinopathy using a residual neu...ResNet-n/DR: Automated diagnosis of diabetic retinopathy using a residual neu...
ResNet-n/DR: Automated diagnosis of diabetic retinopathy using a residual neu...TELKOMNIKA JOURNAL
ย 

More from TELKOMNIKA JOURNAL (20)

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...
ย 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...
ย 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...
ย 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...
ย 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antenna
ย 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fire
ย 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio network
ย 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bands
ย 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...
ย 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertainties
ย 
Implementation of FinFET technology based low power 4ร—4 Wallace tree multipli...
Implementation of FinFET technology based low power 4ร—4 Wallace tree multipli...Implementation of FinFET technology based low power 4ร—4 Wallace tree multipli...
Implementation of FinFET technology based low power 4ร—4 Wallace tree multipli...
ย 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
ย 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...
ย 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensor
ย 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
ย 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...
ย 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networks
ย 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imaging
ย 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
ย 
ResNet-n/DR: Automated diagnosis of diabetic retinopathy using a residual neu...
ResNet-n/DR: Automated diagnosis of diabetic retinopathy using a residual neu...ResNet-n/DR: Automated diagnosis of diabetic retinopathy using a residual neu...
ResNet-n/DR: Automated diagnosis of diabetic retinopathy using a residual neu...
ย 

Recently uploaded

Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxnull - The Open Security Community
ย 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
ย 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoรฃo Esperancinha
ย 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage examplePragyanshuParadkar1
ย 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
ย 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
ย 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
ย 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
ย 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
ย 
Study on Air-Water & Water-Water Heat Exchange in a Finned ๏ปฟTube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned ๏ปฟTube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned ๏ปฟTube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned ๏ปฟTube ExchangerAnamika Sarkar
ย 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
ย 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
ย 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIkoyaldeepu123
ย 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
ย 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
ย 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
ย 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
ย 

Recently uploaded (20)

Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
ย 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
ย 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
ย 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage example
ย 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
ย 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
ย 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
ย 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
ย 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
ย 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
ย 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
ย 
Study on Air-Water & Water-Water Heat Exchange in a Finned ๏ปฟTube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned ๏ปฟTube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned ๏ปฟTube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned ๏ปฟTube Exchanger
ย 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
ย 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
ย 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
ย 
young call girls in Rajiv Chowk๐Ÿ” 9953056974 ๐Ÿ” Delhi escort Service
young call girls in Rajiv Chowk๐Ÿ” 9953056974 ๐Ÿ” Delhi escort Serviceyoung call girls in Rajiv Chowk๐Ÿ” 9953056974 ๐Ÿ” Delhi escort Service
young call girls in Rajiv Chowk๐Ÿ” 9953056974 ๐Ÿ” Delhi escort Service
ย 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
ย 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
ย 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
ย 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
ย 

Improving the detection of intrusion in vehicular ad-hoc networks with modified identity-based cryptosystem

  • 1. TELKOMNIKA Telecommunication Computing Electronics and Control Vol. 21, No. 5, October 2023, pp. 1005~1012 ISSN: 1693-6930, DOI: 10.12928/TELKOMNIKA.v21i5.22207 ๏ฒ 1005 Journal homepage: http://telkomnika.uad.ac.id Improving the detection of intrusion in vehicular ad-hoc networks with modified identity-based cryptosystem Zachaeus K. Adeyemo1 , Emmanuel B. Ajulo2 , Damilare O. Akande1 , Hammed O. Lasisi3 , Samson I. Ojo1 1 Department of Electronic and Electrical Engineering, Faculty of Engineering and Technology, Ladoke Akintola University of Technology, Ogbomoso, Nigeria 2 Department of Computer Science and Mathematics, College of Basic and Applied Sciences, Mountain Top University, Ibafo, Ogun State, Nigeria 3 Department of Electrical and Electronics Engineering, College of Science, Engineering and Technology, Osun State University, Osogbo, Osun State, Nigeria Article Info ABSTRACT Article history: Received Nov 10, 2021 Revised Mar 21, 2023 Accepted Apr 30, 2023 Vehicular ad-hoc networks (VANETs) are wireless-equipped vehicles that form networks along the road. The security of this network has been a major challenge. The identity-based cryptosystem (IBC) previously used to secure the networks suffers from membership authentication security features. This paper focuses on improving the detection of intruders in VANETs with a modified identity-based cryptosystem (MIBC). The MIBC is developed using a non-singular elliptic curve with Lagrange interpolation. The public key of vehicles and roadside units on the network are derived from number plates and location identification numbers, respectively. Pseudo-identities are used to mask the real identity of users to preserve their privacy. The membership authentication mechanism ensures that only valid and authenticated members of the network are allowed to join the network. The performance of the MIBC is evaluated using intrusion detection ratio (IDR) and computation time (CT) and then validated with the existing IBC. The result obtained shows that the MIBC recorded an IDR of 99.3% against 94.3% obtained for the existing identity-based cryptosystem (EIBC) for 140 unregistered vehicles attempting to intrude on the network. The MIBC shows lower CT values of 1.17 ms against 1.70 ms for EIBC. The MIBC can be used to improve the security of VANETs. Keywords: Identity-based cryptosystem Intrusion On-board unit Road side unit VANET This is an open access article under the CC BY-SA license. Corresponding Author: Damilare O. Akande Department of Electronic and Electrical Engineering, Faculty of Engineering and Technology Ladoke Akintola University of Technology, PMB 4000, Ogbomoso, Oyo State, Nigeria Email: doakande@lautech.edu.ng 1. INTRODUCTION The vehicular ad-hoc network (VANET) is an infrastructure-less network created as a result of developments in wireless communications and networking technologies [1]. This new technology provides ubiquitous connectivity to vehicles while in motion thereby creating efficient vehicular communications that enable intelligent transportation systems (ITS) [2]. In VANET, there are two forms of communication, namely: vehicle-to-vehicle (V2V) communication, in which vehicles fitted with an on-board unit (OBU) wireless communication system communicate with other road vehicles, and vehicle-to-infrastructure (V2I) communication, in which vehicles use their OBU to communicate with roadside units (RSUs) [3]. Improving road safety and quality is the primary essence of this technology [2]. In VANET, the OBU of the vehicle acts as an independent router, generates independent data, and periodically transmits information to other nearby vehicles and RSUs on their current states, such as location, direction, speed, current time, and traffic events [4].
  • 2. ๏ฒ ISSN: 1693-6930 TELKOMNIKA Telecommun Comput El Control, Vol. 21, No. 5, October 2023: 1005-1012 1006 In communicating with vehicles beyond the wireless range; intermediate vehicles or RSUs forward messages to the intended destination over multiple hops. Thus, many initiatives in academic and standardization societies have been inspired by this new model of communication [5]. Seven 10 MHz channels in the 5.9 GHz dedicated short-range communication (DSRC) band have recently been allocated by the Federal Communications Commission (FCC) of the United States of America (USA) to increase the protection and efficiency of the transport system [5], [6]. Six 10 MHz channels are dedicated to comfort applications (internet facility, information on the nearest restaurant, car park, filling station) in the new DSRC standard, and one channel is to safety applications. Given the tremendous benefits expected from vehicular communications, just like any other wireless communication network, security has been a major challenge. Intruders can easily intercept, modify, and replay messages transmitted on the network or even impersonate other vehicles to broadcast incorrect information [6], [7]. Besides, the privacy of users on the network is also a challenge. The ideal is that the travelling route of drivers should not be traceable by intruders through the message(s) sent or received by the vehicles on the network [8], [9]. Consequent to these security challenges in VANETs, it has received due attention from researchers, and the use of identity-based cryptosystem (IBC) to provide this security [10]-[12]. The uniqueness of IBC compare to other forms of security protocol is that the identity and pre-configuring key of users is derived from an arbitrary string that uniquely identifies them [13]-[15]. Nonetheless, the existing identity-based cryptosystem (EIBC) used to solve this problem lack membership authentication security feature thereby allowing intruders to invade the network [10]. This informs the purpose of this work to develop a modified identity-based cryptosystem (MIBC) to prevent and detect intrusion in VANETs. In this paper, the MIBC was simulated using MATLAB R2018a. The performance of the MIBC was evaluated using intrusion detection ratio (IDR) and computation time (CT) as performance metrics, and compared with EIBC. 2. OVERVIEW OF VEHICULAR AD-HOC NETWORKS (VANETS) AND IDENTITY-BASED CRYPTOSYSTEM Improving the detection of intruders in VANETs with a MIBC forms the basis for this study. Therefore, the need to discuss the technology of VANETs and the fundamental of an identity-based cryptosystem cannot be sidelined. The overview of VANETs technology and the IBC used for this work is thus explained. 2.1. Vehicular ad-hoc networks A sub-class of the wireless ad-hoc network (WANET) and the mobile ad-hoc network (MANET) extension is the VANET. In VANET, nodes consist of self-organized vehicles and road-side infrastructure that communicate with each other through wireless devices and function independently of any infrastructure in a peer-to-peer mode. Each node operates and produces independent data as an independent router [16]-[19]. Network management and fault detection become distributed and hence more difficult to handle [20]. Nodes in VANETs are mobile which causes frequent changes to the network topology and makes it unpredictable. It cannot be assumed that VANETs would always be under the protection of their owners because of the ubiquitous existence of mobile nodes; nodes may be stolen or tampered with. For both legitimate and unauthorized network users, the shared wireless medium is available [21]. While driving along the road, these wireless-equipped vehicles spontaneously form networks. The key idea is to provide vehicle nodes with ubiquitous connectivity while on the move and to establish effective vehicle-to-vehicle communications that allow ITS. The ultimate objective of VANETs is to enhance the driving experience, improve traffic safety and improve the performance of drivers [22]-[24]. 2.2. Identity-based cryptosystem Pre-configured vehicle keying materials and RSUs are created from their identities in identity-based cryptosystems in such a way that the public and private keys of the vehicles and RSUs are bound to their respective identities, thus avoiding certificate verification [25]. The cost of computing in this cryptosystem is therefore small. Also, because in identity-based cryptosystems, the vehicle and the RSU do not need to exchange certificates, the message length is reduced, and IBC is much more effective. IBC consists of two mechanisms in basic form, namely identity-based encryption (IBE) and identity-based signature (IBS), with four steps each. Setup/initialization, private key extraction, encryption, and decryption are the IBE process steps while the IBS mechanism includes four steps include setup/initialization, private key extraction, signature, and verification [25]-[27]. Both mechanisms follow the same process for setup/initialization and private key extraction. These mechanisms are combined to achieve desired identity-based cryptosystems.
  • 3. TELKOMNIKA Telecommun Comput El Control ๏ฒ Improving the detection of intrusion in vehicular ad-hoc networks with โ€ฆ (Zachaeus K. Adeyemo) 1007 3. RESEARCH METHOD The MIBC consists of four entities, namely: the trusted authority (TA), the network control unit (NCU), the RSUs, and the vehicles. The TA is a trusted third party responsible for the system setup, registration, configuration, and issuing of private keys to the NCU, RSUs, and vehicles on the network. The NCU is responsible for the authentication of users on the network. The RSUs are static smart devices on the road such as traffic sensors or pedestrian sensors mounted on the road, while the vehicles are mobile entities with a transceiver known as OBU installed in them to enable communication. The cryptographic process involves four phases. The first is the key and pseudo-identity generating phase which is solely carried out by the TA. The second is the vehicle authentication phase where valid users of the network are allowed to join the network, the third is the data transmission phase comprising message signing, and the fourth is the message verification phase. 3.1. Development of a secure communication system The development of secure communication begins at this stage. The system was developed on a non-singular elliptic curve as expressed in the (1) and Lagrange interpolation was used to define and interpolates points on the curve. The use of Lagrange interpolation eliminates the need for point pairing which may increase the cryptographic headcount. ๐‘ฆ2 = ๐‘ฅ3 + ๐‘Ž๐‘ฅ + ๐‘ ๐‘š๐‘œ๐‘‘ ๐‘ (1) The registration and setup of vehicles, RSUs, and NCU which are entities on the network were carried out by the TA. The TA creates a group ๐บ defined by a non-singular elliptic curve as expressed in (1) and selects a generator ๐‘ƒ โˆˆ ๐บ. The TA then randomly generates a master private ๐‘  โˆˆ ๐‘๐‘ž โˆ— for the system and computes the system public key ๐‘ƒ๐‘๐‘ข๐‘ as in (2). ๐‘ƒ๐‘๐‘ข๐‘ = ๐‘ . ๐‘ƒ (2) Where: โ€˜๐‘ โ€™ is the master private key of the system, and it is an integer within the order ๐‘ž, ๐‘ƒ is the generator of the element in the group, and ๐‘โˆ— is a set of integers other than zero. The pseudo-identity of entities (participants) on the network was generated using (3). ๐‘ƒ๐ผ๐ท = ๐›พ๐‘–. ๐‘ƒ||๐‘…๐ผ๐ท โŠ• ๐ป(๐›พ๐‘–. ๐‘ƒ๐‘๐‘ข๐‘). (3) Where: ๐‘ƒ๐ผ๐ท is the pseudo-identity of entities (participants) on the network, ๐›พ๐‘– is a set of integers randomly generated in ๐›พ๐‘– โˆˆ ๐‘๐‘ž โˆ— , ๐‘…๐ผ๐ท is the real identity of the entity on the network, ๐‘ƒ๐‘๐‘ข๐‘ is the master public key of the system as derived in (2), and ๐‘ƒ is the generator of the group as already defined. In order to generate the private key of any entity on the network. ๐‘ ๐‘˜๐‘– = ๐›พ๐‘– + ๐œƒ๐‘–. ๐‘  ๐‘š๐‘œ๐‘‘ ๐‘ž. (4) Where: ๐›พ๐‘– is a set of integers randomly generated in ๐›พ๐‘– โˆˆ ๐‘๐‘ž โˆ— , โ€˜๐œƒ๐‘–โ€™ is a hashed value of pseudo-identity concatenated with a timestamp ๐‘‡๐‘–, โ€˜๐‘ โ€™ is the master private key of the system, and ๐‘š๐‘œ๐‘‘ ๐‘ž is a modular arithmetic operation in prime ๐‘ž. 3.2. Development of vehicle authentication system The TA selects randomly a live session code ๐‘†๐ฟ๐‘ โˆˆ ๐‘๐‘ž โˆ— and then generates vehicle membership authentication code to the vehicle using (5), and the control authentication key for the NCU using (6) respectively. However, the live session code ๐‘†๐ฟ๐‘ is not given to the vehicle(s) directly, but to the NCU for vehicle(s) validation and authentication whenever it has to join the network for communication. ๐‘€๐‘˜ = ๐ป(๐ถ๐‘˜||๐ผ๐ท๐‘๐ถ๐‘ˆ) โŠ• ๐‘…๐ผ๐ท๐‘ฃ (5) ๐ถ๐‘˜ = ๐‘ . ๐ป(๐ผ๐ท๐‘‡๐ด||๐‘…๐ผ๐ท๐‘ฃ||๐‘†๐ฟ๐‘) (6) Where: ๐‘€๐‘˜ is the membership authentication code for participants on the network, ๐ถ๐‘˜ is the control authentication key for the NCU, ๐ผ๐ท๐‘‡๐ด is the identity of the TA, ๐‘…๐ผ๐ท๐‘ฃ is the real identity of the vehicle, ๐ผ๐ท๐‘๐ถ๐‘ˆ is the identity of NCU, โ€˜๐‘ โ€™ is the master secret key, ๐›พ๐‘– is a set of integer randomly generated in ๐›พ๐‘– โˆˆ ๐‘๐‘ž โˆ— , ๐ป is the hash function, || is the concatenation operation and โŠ• is the exclusive-OR operation. The NCU checks for the validity of the request using (7), and further checks the revocation list which contains the real identities of revoked vehicles received securely from the TA to ascertain the authenticity of the vehiclesโ€™ membership.
  • 4. ๏ฒ ISSN: 1693-6930 TELKOMNIKA Telecommun Comput El Control, Vol. 21, No. 5, October 2023: 1005-1012 1008 ๐‘…๐ผ๐ท๐‘ฃ โ‰Ÿ ๐‘€๐‘˜ โŠ• ๐ป(๐ถ๐‘˜||๐ผ๐ท๐‘๐ถ๐‘ˆ) (7) The correctness of this authentication is proven as recall from (5) that: ๐‘€๐‘˜ = ๐ป(๐ถ๐‘˜||๐ผ๐ท๐‘๐ถ๐‘ˆ) โŠ• ๐‘…๐ผ๐ท๐‘ฃ Then, ๐‘…๐ผ๐ท๐‘ฃ = ๐ป(๐ถ๐‘˜||๐ผ๐ท๐‘๐ถ๐‘ˆ) โŠ• ๐‘…๐ผ๐ท๐‘ฃ โŠ• ๐ป(๐ถ๐‘˜||๐ผ๐ท๐‘๐ถ๐‘ˆ) ๐‘…๐ผ๐ท๐‘ฃ = ๐‘…๐ผ๐ท๐‘ฃ 3.3. Message signing The vehicle signs messages to be transmitted on the network via the OBU device by generating a random number ๐œ‡๐‘– โˆˆ ๐‘๐‘ž โˆ— and computes (8), (9), and (10). This is to ensure non-repudiation and to ensure high-security protection because any computation towards breaking the scheme by any intruder requires simultaneous extraction of two unknown secrets. ๐‘…๐‘– = ๐œ‡๐‘–. ๐‘ƒ (8) ๐›ฝ๐‘– = ๐ป(๐‘ƒ๐ผ๐ท||๐‘‡๐‘–||๐‘…๐‘–||๐‘€๐‘–) (9) ๐œŽ๐‘– = ๐‘ ๐‘˜๐‘ฃ + ๐›ฝ๐‘–. ๐œ‡๐‘– ๐‘š๐‘œ๐‘‘ ๐‘ž (10) The signed message ๐‘€ = {๐‘€๐‘–, ๐‘ƒ๐ผ๐ท๐‘– , ๐‘‡๐‘–, ๐‘…๐‘–, ๐œŽ๐‘–}. Then, the vehicle broadcasts the message ๐‘€ to the nearby RSUs and vehicles, which are the receivers. 3.4. Message verification The verifier which may be an RSU or a vehicle checks the validity of the message received using (11). The verifier checks the freshness of timestamp ๐‘‡๐‘–; if โˆ†๐‘‡ โ‰ฅ ๐‘‡๐‘๐‘œ๐‘ค โˆ’ ๐‘‡๐‘–, where: โˆ†๐‘‡ is the predefined endurable transmission delay, ๐‘‡๐‘๐‘œ๐‘ค is the recent message received, and ๐‘– = 1, 2, 3, โ€ฆ , ๐‘›; otherwise, the verifier rejects the message. ๐œŽ๐‘–. ๐‘ƒ = ๐‘ƒ๐ผ๐ท๐‘ฃ + ๐œƒ๐‘–. ๐‘ƒ๐‘๐‘ข๐‘ + ๐›ฝ๐‘–. ๐‘…๐‘–. (11) Where: ๐œƒ๐‘– is the hashed value of pseudo-identity concatenated with a timestamp ๐‘‡๐‘–. If it does, the message is approved by the verifier; otherwise, the message is rejected by the verifier. 3.5. System simulation and procedures The MIBC was simulated using MATLAB R2018a. The simulation was conducted on a Windows 8 computer system with Intelยฎ Coreโ„ข i3 processor, 4 GB RAM. The simulation was considered for the V2V and vehicle-to-roadside unit (V2R) communications, and the frequency of operation is 5.9 GHz. The driving scenario designer (DSD) Application on the MATLAB R2018a Environment was used as a mobility generation tool; and the transmission rate used is 0.3 seconds. The graphical users interface (GUI) as shown in Figure 1 was created to aid simulation and analysis of the system. The membership authentication panel on the GUI checks the validity of the vehicle when a request to join the network is sent; such a request is either valid or not valid. The key generating panel generates on the GUI generates the entire usable key for the vehicles on the network. 3.6. System evaluation performance metrics The performance evaluation of the system was done using IDR and cryptographic computation time. The IDR which is the ratio of the detected number of vehicles trying to break into the network to vehicles not detected was analysed. The simulation analyses the efficiency of the NCU in preventing invalid and unregistered vehicles into the network. For an efficient system, the detection ratio is expected to be high, and the percentage detection rate is expressed as in (12). ๐ผ๐ท๐‘… = ๐‘๐‘ข๐‘š๐‘๐‘’๐‘Ÿ ๐‘œ๐‘“ ๐‘–๐‘›๐‘๐‘–๐‘‘๐‘’๐‘›๐‘ก๐‘  ๐‘ ๐‘ข๐‘๐‘๐‘’๐‘ ๐‘ ๐‘“๐‘ข๐‘™๐‘™๐‘ฆ ๐‘‘๐‘’๐‘ก๐‘’๐‘๐‘ก๐‘’๐‘‘ ๐‘‡๐‘œ๐‘ก๐‘Ž๐‘™ ๐‘›๐‘ข๐‘š๐‘๐‘’๐‘Ÿ ๐‘œ๐‘“ ๐‘–๐‘›๐‘๐‘–๐‘‘๐‘’๐‘›๐‘ก๐‘  ร— 100% (12)
  • 5. TELKOMNIKA Telecommun Comput El Control ๏ฒ Improving the detection of intrusion in vehicular ad-hoc networks with โ€ฆ (Zachaeus K. Adeyemo) 1009 In the same vein, the computation time which is the time required for computing the cryptographic operations was also analyzed. In this paper, the computation time was carried out using the โ€˜tit-totโ€™ function of the MATLAB R2018a for both the developed and existing systems. The percentage of performance improvement analysis of the developed system was achieved using the (13). ๐ผ๐‘๐‘’๐‘Ÿ = (๐‘‡๐‘’๐‘ฅ๐‘–๐‘ ๐‘กโˆ’๐‘‡๐‘‘๐‘’๐‘ฃ๐‘’๐‘™๐‘œ๐‘๐‘’๐‘‘) ๐‘‡๐‘’๐‘ฅ๐‘–๐‘ ๐‘ก % (13) Where ๐ผ๐‘๐‘’๐‘Ÿ refers to the improvement percentage, ๐‘‡๐‘’๐‘ฅ๐‘–๐‘ ๐‘ก refers to the time costs of the existing scheme, and ๐‘‡๐‘‘๐‘’๐‘ฃ๐‘’๐‘™๐‘œ๐‘๐‘’๐‘‘ refers to the time costs of the developed scheme. Consequently, the developed system (MIBC) was compared with the existing system, (EIBC), and the percentage performance improvement analysis was carried out using the (14). ๐ผ๐‘๐‘’๐‘Ÿ = (๐‘‡๐‘’๐‘ฅ๐‘–๐‘ ๐‘กโˆ’๐‘‡๐‘‘๐‘’๐‘ฃ๐‘’๐‘™๐‘œ๐‘๐‘’๐‘‘) ๐‘‡๐‘’๐‘ฅ๐‘–๐‘ ๐‘ก 100% (14) Where ๐ผ๐‘๐‘’๐‘Ÿ refers to the improved percentage, ๐‘‡๐‘’๐‘ฅ๐‘–๐‘ ๐‘ก refers to the value of the existing scheme, and ๐‘‡๐‘‘๐‘’๐‘ฃ๐‘’๐‘™๐‘œ๐‘๐‘’๐‘‘ refers to the value of the developed scheme. Figure 1. Simulation interface for the modified identity-based cryptosystem 4. RESULTS AND DISCUSSION The IDR which is the ratio of the detected number of vehicles trying to break into the network to vehicles not detected was analysed. The simulated vehicles were divided into two parts, 70% of the vehicles were unregistered and invalid vehicles and made to intrude into the network, while the remaining 30% were registered and valid members of the network. From the simulation, it was observed that all attempts made by the intruding vehicles were rejected by the NCU. The result is shown in Table 1, and the percentage intrusion detection rate for the number of incidents (vehicles) is shown in Figure 2. In the same vein, the CT of the cryptographic process of the MIBC obtained is 1.17 ms. This is an average result of running the cryptographic algorithm for an average of 1000 times. Also, the MIBC was compared with the EIBC. In terms of CT, the CT for MIBC is 1.17 ms while that of EIBC is 1.70 ms. The result shows that the MIBC has a lower computation time compared to the EIBC. Consequently, the percentage improvement of the computation time of MIBC over the EIBC, shows that the MIBC has 31.18% improvements over the EIBC. The IDR result for the MIBC and EIBC for different vehicles were compared. The values are as shown in Table 2, and illustrated in Figure 3. The overall average percentage of performance improvement analysis of intrusion detection rate in the MIBC and EIBC is presented in Figure 4. The result shows that the MIBC has a total average of 98.5% intrusion detection rate compare to the EIBC which has a 93.2% intrusion detection rate. This is a 5.4% performance improvement over EIBC. The results presented show that the performance of MIBC gets better even with an increase in the number of vehicles released into the network which is a great improvement compared to EIBC.
  • 6. ๏ฒ ISSN: 1693-6930 TELKOMNIKA Telecommun Comput El Control, Vol. 21, No. 5, October 2023: 1005-1012 1010 Table 1. Intrusion detection ratios No. of vehicle Total no. of incidents No. of incidents successfully detected % IDR 50 35 33 94.3 100 70 69 98.6 150 105 103 99.1 200 140 139 99.3 Figure 2. Intrusion detection rate for the number of incidents (vehicles) Figure 3. Comparison of intrusion detection rate in the MIBC and EIBC Table 2. Intrusion detection ratio for the MIBC and EIBC Vehicle density Intrusion detection ratio for MIBC system (%) Intrusion detection ratio for EIBC system (%) 50 97.1 91.4 100 98.6 92.9 150 99.1 94.3 200 99.3 94.3 Figure 4. Overall average intrusion detection analysis 5. CONCLUSION In this paper, a variant IBC that ensures secure communication and prevention of intruders in VANET was developed. An authentication system for usersโ€™ validation on the network was incorporated into the system. The validation is done via the NCU in a handshake with the TA of the system to securely prevent intrusion and ensures that only valid members of the network are allowed to join the network. The NCU of the system securely prevents intrusion and ensures that only valid members of the network are allowed to join the network. The result shows that the proposed MIBC outperforms the EIBC in IDR and CT performance and shows the superiority of the security features in terms of usersโ€™ membership authentication. ACKNOWLEDGEMENTS Our sincere appreciation goes to the Department of Electronic and Electrical Engineering, Ladoke Akintola University of Technology, Ogbomoso, Nigeria, for the provision of the conducive environment upon whch this research was conducted.
  • 7. TELKOMNIKA Telecommun Comput El Control ๏ฒ Improving the detection of intrusion in vehicular ad-hoc networks with โ€ฆ (Zachaeus K. Adeyemo) 1011 REFERENCES [1] D. A. J. Al-Khaffaf and M. G. Al-Hamiri, โ€œPerformance evaluation of campus network involving VLAN and broadband multimedia wireless networks using OPNET modeler,โ€ TELKOMNIKA (Telecommunication, Computing, Electronics and Control), vol. 19, no. 5, pp. 1490-1497, 2021, doi: 10.12928/TELKOMNIKA.v19i5.18531. [2] Girish and Phaneendra H. D., โ€œIdentity-based cryptography and comparison with traditional public-key encryption: A survey,โ€ International Journal of Computer Science and Information Technologies (IJCSIT), vol. 5, no. 4, pp. 5521-5525, 2014. [Online]. Available: https://www.ijcsit.com/docs/Volume%205/vol5issue04/ijcsit20140504155.pdf [3] J. Jenefa and E. A. M. Anita, โ€œSecure vehicular communication using identity-based signature scheme,โ€ Wireless Personal Communication, vol. 98, pp. 1383-1411, 2018, doi: 10.1007/s11277-017-4923-7. [4] J. Cui, W. Xu, H. Zhong, J. Zhang, Y. Xu, and L. Liu, โ€œPrivacy-preserving authentication using a double pseudonym for the internet of vehicles,โ€ Sensors, vol. 18, no. 5, 2018, doi: 10.3390/s18051453. [5] H. Peng, L. Liang, X. Shen, and G. Y. Li, โ€œVehicular communications: a network layer perspective,โ€ IEEE Transactions on Vehicular Technology, vol. 68, no. 2, pp. 1064-1078, 2019, doi: 10.1109/TVT.2018.2833427. [6] E. B. Ajulo, R. O. Akinyede, and O. S. Adewale, โ€œSecurity threats and privacy issues in vehicular ad-hoc network (VANET): survey and perspective,โ€ Journal of Information, vol. 4, no. 1, 2018, doi: 10.18488/journal.104.2018.41.1.9. [7] Y. Huang, X. Ma, Y. Liu, and Z. Yang, โ€œEffective capacity maximization in beyond 5G vehicular networks: a hybrid deep transfer learning method,โ€ Wireless Communications and Mobile Computing, vol. 2021, 2021, doi: 10.1155/2021/8899094. [8] F. A. Ghaleb, M. A. Maarof, A. Zainal, B. A. S. Al-Rimy, A. Alsaeedi, and W. Boulila, โ€œEnsemble-based hybrid context-aware misbehavior detection model for vehicular ad hoc network,โ€ Remote Sensing, vol. 11, no. 23, 2019, doi: 10.3390/rs11232852. [9] E. B. Ajulo, R. O. Akinyede, and O. S. Adewale, โ€œModeling of situation response time in vehicular ad-hoc network,โ€ MATICS: Jurnal Ilmu Komputer dan Teknologi Informasi, vol. 10, no. 1, pp. 1-7, 2018, doi: 10.18860/mat.v10i1.4785. [10] H. F. Jassim, M. A. Tawfeeq, and S. M. Mahmoud, โ€œOverlapped hierarchical clusters routing protocol for improving quality of service,โ€ TELKOMNIKA (Telecommunication, Computing, Electronics and Control), vol. 19, no. 3, pp. 705-715, 2021, doi: 10.12928/TELKOMNIKA.v19i3.18354. [11] D. Manivannan, S. S. Moni, and S. Zeadally, โ€œSecure authentication and privacy-preserving techniques in vehicular ad-hoc networks (VANETs),โ€ Vehicular Communications, vol. 25, 2020, doi: 10.1016/j.vehcom.2020.100247. [12] F. A. Ghaleb et al., โ€œMisbehavior-aware on-demand collaborative intrusion detection system using distributed ensemble learning for VANET,โ€ Electronics, vol. 9, no. 9, 2020, doi: 10.3390/electronics9091411. [13] B. A. S. Al-Rimy et al., โ€œA pseudo feedback-based annotated TF-IDF technique for dynamic crypto-ransomware pre-encryption boundary delineation and features extraction,โ€ IEEE Access, vol. 8, pp. 140586-140598, 2020, doi: 10.1109/ACCESS.2020.3012674. [14] S. Sharma and A. Kaul, โ€œA survey on intrusion detection systems and honeypot based proactive security mechanisms in VANETs and VANET cloud,โ€ Vehicular Communication, vol. 12, pp. 138-164, 2018, doi: 10.1016/j.vehcom.2018.04.005. [15] J. Liang, J. Chen, Y. Zhu, and R. Yu, โ€œA novel intrusion detection system for vehicular ad hoc networks (VANETs) based on differences of traffic flow and position,โ€ Application Soft Computing, vol. 75, pp. 712-727, 2019, doi: 10.1016/j.asoc.2018.12.001. [16] Y. Zhou, S. Liu, M. Xiao, S. Deng, and X. Wang, โ€œAn efficient V2I authentication scheme for VANETs,โ€ Mobile Information Systems, 2018, doi: 10.1155/2018/4070283. [17] S. Zeng, Y. Huang, and X. Liu, โ€œPrivacy-preserving communication for VANETs with conditionally anonymous ring signature,โ€ International Journal Network Security, vol. 17, no. 2, pp. 135-141, 2015. [Online]. Available: http://ijns.jalaxy.com.tw/contents/ijns-v17-n2/ijns-v17-n2.pdf#page=37 [18] C. Wan and J. Zhang, โ€œEfficient identity-based transmission for VANET,โ€ Journal of Ambient Intelligence and Humanized Computing, vol. 9, pp. 1861-1871, 2018, doi: 10.1007/s12652-017-0650-x. [19] F. A. Ghaleb, M. A. Maarof, A. Zainal, B. A. S. Al-Rimy, F. Saeed, and T. Al-Hadhrami, โ€œHybrid and multifaceted context-aware misbehavior detection model for vehicular ad hoc network,โ€ IEEE Access, vol. 7, pp. 159119-159140, 2019, doi: 10.1109/ACCESS.2019.2950805. [20] M. Lee and T. Atkison, โ€œVANET applications: Past, present, and future,โ€ Vehicular Communications, vol. 28, 2021, doi: 10.1016/j.vehcom.2020.100310. [21] S. Zhang, Y. Liu, Y. Xiao, and R. He, โ€œA trust based adaptive privacy preserving authentication scheme for VANETs,โ€ Vehicular Communication, vol. 37, 2022, doi: 10.1016/j.vehcom.2022.100516. [22] A. F. Abbas, U. U. Sheikh, F. T. Al-Dhief, and M. N. H. Mohd, โ€œA comprehensive review of vehicle detection using computer vision,โ€ TELKOMNIKA (Telecommunication, Computing, Electronics and Control), vol. 19, no. 3, pp. 838-850, 2021, doi: 10.12928/TELKOMNIKA.v19i3.12880. [23] V. H. La and A. Cavalli, โ€œSecurity attacks and solutions in vehicular ad-hoc networks: A survey,โ€ International Journal on AdHoc Networking Systems (IJANS), vol. 4, no. 2, pp. 1-20, 2014, doi: 10.5121/ijans.2014.4201. [24] B. Ji et al., โ€œSurvey on the internet of vehicles: network architectures and applications,โ€ IEEE Communications Standards Magazine, vol. 4, no. 1, pp. 34-41, 2020, doi: 10.1109/MCOMSTD.001.1900053. [25] F. Mezrag, S. Bitam, and A. Mellouk, โ€œAn efficient and lightweight identity-based scheme for secure communication in clustered wireless sensor networks,โ€ Journal of Network and Computer Applications, vol. 200, 2022, doi: 10.1016/j.jnca.2021.103282. [26] Y. Chen, Y. Wang, M. Liu, J. Zhang, and L. Jiao, โ€œNetwork slicing enabled resource management for service-oriented ultra- reliable and low-latency vehicular networks,โ€ IEEE Transactions on Vehicular Technology, vol. 69, no. 7, pp. 7847โ€“7862, 2020, doi: 10.1109/TVT.2020.2991723. [27] B. A. S. Al-Rimy, M. A. Maarof, and S. Z. M. Shaid, โ€œCrypto-ransomware early detection model using novel incremental bagging with enhanced semi-random subspace selection,โ€ Future Generation Computer Systems, vol. 101, pp. 476-491, 2019, doi: 10.1016/j.future.2019.06.005.
  • 8. ๏ฒ ISSN: 1693-6930 TELKOMNIKA Telecommun Comput El Control, Vol. 21, No. 5, October 2023: 1005-1012 1012 BIOGRAPHIES OF AUTHORS Zachaeus K. Adeyemo received his B.Eng., M.Eng. degrees in Electrical Engineering from University of Ilorin, Ilorin, Nigeria in 1994 and 2002, respectively, and Ph.D. in Electronic and Electrical Engineering (Communication Engineering) from Ladoke Akintola University of Technology (LAUTECH), Ogbomoso, Nigeria in 2009. He joined the services of Ladoke Akintola University of Technology (LAUTECH) Ogbomoso in 1995 as a Graduate Assistant in the department of Electronic and Electrical Engineering and rose from this lowest level of the academic cadre through all the ranks until he was promoted to a full- fledged Professor. His current research interests are wireless communications, signal processing in communication systems, development of a path-loss prediction model using adaptive neuro-fuzzy inference system, spectrum detection in a cognitive radio network. Prof. Adeyemo is a corporate member, Nigerian Society of Engineers (MNSE), Registered member of Council for the Regulation of Engineering in Nigeria (R. COREN) and Member, Africa Engineering Education Association (AEEA). He can be contacted at email: zkadeyemo@lautech.edu.ng. Emmanuel B. Ajulo received his B.Tech and M.Tech degrees in Electronic and Electrical Engineering from Ladoke Akintola University of Technology (LAUTECH), Ogbomoso, Nigeria; and M.Tech and Ph.D degrees in Computer Science from the Federal University of Technology, Akure, Nigeria in 2015 and 2020 respectively. Heโ€™s reputable for developing I.T architectures and security frameworks to drive communication systems. He is a member of Nigeria Society of Engineers, member of Nigeria Computing Society, and a registered engineer with the Council for the Regulation of Engineering in Nigeria (COREN). His research interest is on computational cryptography, signal processing, machine learning, and artificial intelligence. He can be contacted at email: emmanuelajulo@gmail.com. Damilare O. Akande obtained his B. Tech and M. Tech degrees in Electronic and Electrical Engineering from Ladoke Akintola University of Technology (LAUTECH), Ogbomoso and the Federal University of Technology, Akure, Nigeria in 2008 and 2012 respectively. He obtained his Ph. D degree from University Sans Malaysia, Malaysia in 2019. He is a member of Nigeria Society of Engineers and a registered member of COREN. His research interest is on signal processing, cooperative communications and MAC layer design. He can be contacted at email: doakande@lautech.edu.ng. Hammed O. Lasisi is a senior lecturer and researcher in the Department of Electrical and Electronics Engineering, Osun State University, Osogbo, Nigeria. He holds doctorate (Ph.D) and masterโ€™s degrees in Elecctrical and Electronics Engineering from University of Ilorin, Nigeria. His area of specialization is telecommunication and telegraphic engineering. He is a registered member of the Council for the Regulation of Engineering (COREN) in Nigeria. He can be contacted at email: hammed.lasis@uniosun.edu.ng. Samson I. Ojo received his B. Tech and M. Tech degrees in Electronic and Electrical Engineering in 2011 and 2018, respectively, from Ladoke Akintola University of Technology (LAUTECH), Ogbomoso, Nigeria. He is a registered member of Council for the Regulation of Engineering in Nigeria (COREN). He obtained his Ph.D. in mobile communication in the year 2021. His research interest is on signal processing, diversity and cognitive radio. He can be contacted at email: siojo83@lautech.edu.ng.