Vehicular ad-hoc networks (VANETs) are wireless-equipped vehicles that form networks along the road. The security of this network has been a major challenge. The identity-based cryptosystem (IBC) previously used to secure the networks suffers from membership authentication security features. This paper focuses on improving the detection of intruders in VANETs with a modified identity-based cryptosystem (MIBC). The MIBC is developed using a non-singular elliptic curve with Lagrange interpolation. The public key of vehicles and roadside units on the network are derived from number plates and location identification numbers, respectively. Pseudo-identities are used to mask the real identity of users to preserve their privacy. The membership authentication mechanism ensures that only valid and authenticated members of the network are allowed to join the network. The performance of the MIBC is evaluated using intrusion detection ratio (IDR) and computation time (CT) and then validated with the existing IBC. The result obtained shows that the MIBC recorded an IDR of 99.3% against 94.3% obtained for the existing identity-based cryptosystem (EIBC) for 140 unregistered vehicles attempting to intrude on the network. The MIBC shows lower CT values of 1.17 ms against 1.70 ms for EIBC. The MIBC can be used to improve the security of VANETs.
LSKA-ID: A lightweight security and key agreement protocol based on an identi...TELKOMNIKA JOURNAL
Recently, a huge effort has been pushed to the wireless broadcasting nature in the open area. However, the vehicular ad hoc network (VANET) is disposed to various kinds of attacks. Hence, keeping the security in VANET is the most critical issue because of the VANET network related to human life. Thus, we propose a robust and lightweight security and key agreement-based identity protocol LSKA-ID for vehicular communication. Our protocol utilizes the elliptic curve cryptography, Chinese reminder theorem, and identity (ID)-based cryptosystem to resolve the issues found in the previously proposed schemes, in which our protocol can resolve the key escrow issues accompanied in most ID-based schemes. Also, it does not need batch verification operations, which cause some problems to the verifier in case the batch beacons have one or more illegal beacons. Moreover, the LSKA-ID protocol addresses the dependency on the trusted authority (TA) during the high frequent handover between the groups that may cause a bottleneck problem on the TA. The security analysis proves the correctness of the LSKA-ID protocol by using the random oracle model and has shown to be effective in a performance evaluation.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Towards design strong emergency and COVID-19 authentication scheme in VANETnooriasukmaningtyas
The wide use of vehicular ad hoc networks (VANETs) in the last decade has led many researchers to find efficient and reliable methods to obtain the desired benefits and offer services, such as healthcare and traffic management. However, VANETs suffer from security issues represented by authentication and data integrity. In this paper, we propose a robust mutual authentication scheme based on elliptic curve cryptography (ECC), cryptography Hash Function, and a pseudonym. The proposed work was twofold in focus: first, on healthcare in emergency cars which use VANETs, and second, on overcoming security issues, such as resisting familiar attacks (e.g. insider attacks and reply attacks). Because of the serious situation generated by the worldwide outbreak of the Covid-19 epidemic, we also found this research valuable in supporting global efforts to combat the rapid spread of this virus, by finding the safest and fastest routes to epidemic treatment centres for medical staff, assistance teams in medical operations, fumigation control, and all work teams associated with disease control. This research attempts to contribute by proposing a special signal used to define epidemic teams. The best route, fast route can be chosen by using VANETs infrastructure. This scheme also deals with metric security features, such as key management, data integrity, and data privacy. In the communication and computation cost, we noticed that our proposed scheme achieved good results compared with the related works
Security schemes based on conditional privacy-preserving vehicular ad hoc net...nooriasukmaningtyas
Recently, vehicular ad hoc networks (VANETs) have been garnering
significant inter-est from the people involved in transportation field.
Nowadays automotive manufactur-ers have already supplying vehicles with
multitude of road sensors that provides many useful characteristics. VANET
communication not only offers the drivers and passen-gers with the various
safety related services but also provides a wide range of valuable
applications. However, the inherent openness of the wireless communication
medium used by VANETs exposes vehicles to various security and privacy
issues. Researchers have proposed many security schemes to solve the issues
mentioned above for the widespread deployment of VANETs. However,
these schemes failed to fulfill all as-pects of security and privacy
requirements. Besides, these schemes have not provided the performance
parameters such as computation and communication costs. The pri-mary
emphasis of this paper is on the taxonomy of security schemes based
conditional privacy-preserving with respect to strengths and limitations.
Besides, a comparison be-tween these schemes related to the model of
security and privacy requirements, attacks, and performance parameters is
provided. Finally, this paper critically reviews the re-lated works by taking
into consideration the design and development of all VANETs security and
privacy schemes, this paper could serve as a guide and reference.
LSKA-ID: A lightweight security and key agreement protocol based on an identi...TELKOMNIKA JOURNAL
Recently, a huge effort has been pushed to the wireless broadcasting nature in the open area. However, the vehicular ad hoc network (VANET) is disposed to various kinds of attacks. Hence, keeping the security in VANET is the most critical issue because of the VANET network related to human life. Thus, we propose a robust and lightweight security and key agreement-based identity protocol LSKA-ID for vehicular communication. Our protocol utilizes the elliptic curve cryptography, Chinese reminder theorem, and identity (ID)-based cryptosystem to resolve the issues found in the previously proposed schemes, in which our protocol can resolve the key escrow issues accompanied in most ID-based schemes. Also, it does not need batch verification operations, which cause some problems to the verifier in case the batch beacons have one or more illegal beacons. Moreover, the LSKA-ID protocol addresses the dependency on the trusted authority (TA) during the high frequent handover between the groups that may cause a bottleneck problem on the TA. The security analysis proves the correctness of the LSKA-ID protocol by using the random oracle model and has shown to be effective in a performance evaluation.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Towards design strong emergency and COVID-19 authentication scheme in VANETnooriasukmaningtyas
The wide use of vehicular ad hoc networks (VANETs) in the last decade has led many researchers to find efficient and reliable methods to obtain the desired benefits and offer services, such as healthcare and traffic management. However, VANETs suffer from security issues represented by authentication and data integrity. In this paper, we propose a robust mutual authentication scheme based on elliptic curve cryptography (ECC), cryptography Hash Function, and a pseudonym. The proposed work was twofold in focus: first, on healthcare in emergency cars which use VANETs, and second, on overcoming security issues, such as resisting familiar attacks (e.g. insider attacks and reply attacks). Because of the serious situation generated by the worldwide outbreak of the Covid-19 epidemic, we also found this research valuable in supporting global efforts to combat the rapid spread of this virus, by finding the safest and fastest routes to epidemic treatment centres for medical staff, assistance teams in medical operations, fumigation control, and all work teams associated with disease control. This research attempts to contribute by proposing a special signal used to define epidemic teams. The best route, fast route can be chosen by using VANETs infrastructure. This scheme also deals with metric security features, such as key management, data integrity, and data privacy. In the communication and computation cost, we noticed that our proposed scheme achieved good results compared with the related works
Security schemes based on conditional privacy-preserving vehicular ad hoc net...nooriasukmaningtyas
Recently, vehicular ad hoc networks (VANETs) have been garnering
significant inter-est from the people involved in transportation field.
Nowadays automotive manufactur-ers have already supplying vehicles with
multitude of road sensors that provides many useful characteristics. VANET
communication not only offers the drivers and passen-gers with the various
safety related services but also provides a wide range of valuable
applications. However, the inherent openness of the wireless communication
medium used by VANETs exposes vehicles to various security and privacy
issues. Researchers have proposed many security schemes to solve the issues
mentioned above for the widespread deployment of VANETs. However,
these schemes failed to fulfill all as-pects of security and privacy
requirements. Besides, these schemes have not provided the performance
parameters such as computation and communication costs. The pri-mary
emphasis of this paper is on the taxonomy of security schemes based
conditional privacy-preserving with respect to strengths and limitations.
Besides, a comparison be-tween these schemes related to the model of
security and privacy requirements, attacks, and performance parameters is
provided. Finally, this paper critically reviews the re-lated works by taking
into consideration the design and development of all VANETs security and
privacy schemes, this paper could serve as a guide and reference.
Cyber DoS attack-based security simulator for VANET IJECEIAES
At the late years, researches focused on the cyber denial of service (DoS) attacks in the vehicle ad hoc networks (VANETS). This is due to high importance of ensuring the save receiving of information in terms of vehicle to vehicle (V2V), vehicle to infrastructure (V2I) and Vehicle to Road side unit (V2R). In this paper, a cyber-security system is proposed to detect and block the DoS attacks in VANET. In addition, a simulator for VENAT based on lightweight authentication and key exchange is presented to simulate the network performance and attacks. The proposed system consists of three phases: registration, authentication as well as communications and DoS attack detection. These phases improve the system ability to detect the attacks in efficient way. Each phase working is based in a proposed related algorithm under the guidance of lightweight protocol. In order to test the proposed system, a prototype is considered includes six cars and we adopt police cars due to high importance of exchanged information. Different case studies have been considered to evaluate the proposed system and the obtained results show a high efficiency of performance in terms of information exchange and attack detection.
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...IJERA Editor
Designing a protocol structure which contains the control system, VANET device and the type of communication message structures which will implement the message packets for v2v or v2I infrastructure . The different message packets contain the information required to transfer from one node to another in vehicular network for communication. Design various algorithm required for Control, Alert and Infotainment messages. Time stamping lowering data rate efficient packet delivery and proper communication of required messages. Implementation of proposed algorithms and comparison of them with existing algorithms and study of different factors affecting the working of theses algorithms. Analysis of proposed design approach and improvements in results if required.
A heterogeneous short-range communication platform for Internet of Vehicles IJECEIAES
The automotive industry is rapidly accelerating toward the development of innovative industry applications that feature management capabilities for data and applications alike in cars. In this regard, more internet of vehicles solutions are emerging through advancements of various wireless medium access-control technologies and the internet of things. In the present work, we develop a short-range communication–based vehicular system to support vehicle communication and remote car control. We present a combined hardware and software testbed that is capable of controlling a vehicle’s start up, operation and several related functionalities covering various vehicle metric data. The testbed is built from two microcontrollers, Arduino and Raspberry Pi 3, each of which individually controls certain functions to improve the overall vehicle control. The implementation of the heterogeneous communication module is based on the IEEE 802.11 and IEEE 802.15 medium access control technologies. Further, a control module on a smartphone was designed and implemented for efficient management. Moreover, we study the system connectivity performance by measuring various important parameters including the coverage distance, signal strength, download speed and latency. This study covers the use of this technology setup in different geographical areas over various time spans.
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...Dr. Amarjeet Singh
Vehicles in a vehicular ad-hoc network (VANET) broadcast information about the driving environment in the road. Due to the open-access environment, this means that the VANET is susceptible to security and privacy issues. However, none of the related works satisfies all security and privacy requirements. Besides, their proposed has huge overhead in terms of computation and communication. To address the above issues, we will propose the security and privacy scheme based on Elliptic Curve Cryptography (ECC) and one secure hash function. Hence the reliability of each message being signed and checked has been improved. The main aim of this work is to satisfy all aspect requirements of security and privacy and reduce the computational complexity of the system.
In vehicular ad hoc network (VANETs), the applications mainly focused on the road challenging subclass of Mobile Ad-hoc Network, which empowers smart transmission among vehicles and between vehicles and roadside frameworks. It is an optimistic methodology for the Intelligent Transport System (ITS). There are numerous difficulties to be tended while utilizing VANET. It is flexible and has a high dynamic topology and flexibility which makes the conventional MANET protocols unacceptable for VANET. Trust is a principal element which is used to create a trustful environment to improve the security in vehicular networks. Trust can be calculated by observing the human behavior which creates a trusted communicating environment. In this paper, we define the architecture of VANET, then the communication establishment and various challenges. Some trust models had been defined in this paper to enforce honest information sharing between communicating nodes. Trust establishment is compulsory among communicating vehicles to build a secure messages exchange and reliability.
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...IJCNCJournal
Vehicular Ad-hoc network (VANET) is one of the emerging technologies for research community to get various research challenges to construct secured framework for autonomous vehicular communication. The prime concern of this technology is to provide efficient data communication among registered vehicle nodes. The several research ideas are implemented practically to improve overall communication in VANETs by considering security and privacy as major aspects of VANETs. Several mechanisms have been implemented using cryptography algorithms and methodologies. However, these mechanisms provide a solution only for some restricted environments and to limited security threats. Hence, the proposed novel mechanism has been introduced, implemented and tested using key management technique. It provides secured network environment for VANET and its components. Later, this mechanism provides security for data packets of emergency messages using cryptography mechanism. Hence, the proposed novel mechanism is named Group Key Management & Cryptography Schemes (GKMC). The experimental analysis shows significant improvements in the network performance to provide security and privacy for emergency messages. This GKMC mechanism will help the VANET user’s to perform secured emergency message communication in network environment.
A novel key management protocol for vehicular cloud securityTELKOMNIKA JOURNAL
Vehicular cloud computing (VCC) is a new hybrid technology which has become an outstanding area of research. VCC combines salient features of cloud computing and wireless communication technology to help drivers in network connectivity, storage space availability and applications. VCC is formed by dynamic cloud formation by moving vehicles. Security plays an important role in VCC communication. Key management is one of the important tasks for security of VCC. This paper proposes a novel key management protocol for VCC security. Proposed scheme is based on Elliptical Curve Cryptography (ECC). The simulation results demonstrated that the proposed protocol is efficient compared to existing key management algorithms in terms of key generation time, memory usage and cpu utilization.
A THRESHOLD BASED AUTHENTICATION MECHANISM FOR VEHICULAR AD HOC NETWORK (VANET)IAEME Publication
Since Vehicular ad hoc networks (VANETs) are vulnerable to various kinds of attacks, there is a need to fulfill the security requirements like message privacy, integrity, and authentication. The authentication technique is said to be efficient if it detects compromised nodes accurately with less complexity, reduced authentication delay, and keying overhead. In this paper, a threshold-based authentication scheme for cluster-based VANETs is proposed. The vehicles are clustered, and the threshold degree of each node is estimated. The threshold degree is a combination of direct threshold degree and indirect threshold degree. Based on this estimated threshold degree, cluster heads are selected. Then, each vehicle is monitored by a set of verifiers, and the messages are digitally signed by the sender and encrypted using a public/ private key as distributed by a threshold authority and decrypted by the destination. This verifies the identity of sender as well as receiver thus providing authentication to the scheme. By simulation results, we prove that the proposed technique provides high security with less overhead and delay.
Automotive Ethernet architecture and security: challenges and technologies IJECEIAES
Vehicle infrastructure must address the challenges posed by today's advances toward connected and autonomous vehicles. To allow for more flexible architectures, high-bandwidth connections and scalability are needed to connect many sensors and electronic control units (ECUs). At the same time, deterministic and low latency is a critical and significant design requirement to support urgent real-time applications in autonomous vehicles. As a recent solution, the time-sensitive network (TSN) was introduced as Ethernet-based amendments in IEEE 802.1 TSN standards to meet those needs. However, it had hurdle to be overcome before it can be used effectively. This paper discusses the latest studies concerning the automotive Ethernet requirements, including transmission delay studies to improve worst-case end-to-end delay and end-to-end jitter. Also, the paper focuses on the securing Ethernet-based in-vehicle networks (IVNs) by reviewing new encryption and authentication methods and approaches.
Today, a growing number of vehicles are equipped with communication devices to facilitate vehicle to vehicle and vehicle to infrastructure communication and increase the safety of passengers. A new type of network called Vehicular Network VANET provides us with the infrastructure for developing new systems to enhance drivers' and passengers' safety and comfort. Vehicular networks are special types of mobile ad hoc networks that are used to help drivers access necessary information. This paper provides an introduction to vehicular networks. Matthew N. O. Sadiku | Uwakwe C. Chukwu | Abayomi Ajayi-Majebi | Sarhan M. Musa "Vehicular Networking" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-6 , October 2021, URL: https://www.ijtsrd.com/papers/ijtsrd46451.pdf Paper URL : https://www.ijtsrd.com/engineering/electrical-engineering/46451/vehicular-networking/matthew-n-o-sadiku
Cooperative Data Sharing with Security in Vehicular Ad-Hoc Networkscsandit
Vehicles download the data when passing through a drive through the road (RSU) and then share the data after travelling outside the coverage of RSU.A key issue of downloading
cooperative data is how effectively data is shared among them self. Developing an application layer data exchange protocol for the coordination of vehicles to exchange data according to
their geographic locations. Coordinated sharing can avoid medium access control (MAC) layer
collisions and the hidden terminal effect can be avoided in the multi-hop transmission. A salient
feature of the application layer data exchange protocol, in the voluntary services, Vehicles purchase the requested data from service provider via RSUs. In this project, we propose a
cooperative data sharing with secure framework for voluntary services in special vehicles networks (VANETs). We also concentrate on security in the process of downloading data and
sharing. Applicants to ensure exclusive access to data applied and security of the vehicles
involved in the implementation.
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs ApplicationsIJCNCJournal
The VANET has seen a boom in the distribution of significant source data,enabling connected vehicle communications to enhance roadway safety.Despite the potential for interesting applications invehicle networks,thereare still unresolved issues that have the potential to hinder bandwidth utilization once deployed. Specifically, insider assaults on VANET platforms such as Blackhole attemptscan completely stop vehicle-to-vehicle communications and impair the networks' performance level. In this study, we provide the blockchain-based decentralized trust scoring architecture for the participants in the network to identify existing and blacklisted insider adversaries in VANET. To address this concern, we suggest a two-level detection technique, in the first level neighboring nodes determine theirtrustworthiness and in the second level it aggregates trust scores for vehicle nodes using a consortium blockchain-based mechanism that uses authorized Road Side Units (RSUs) as consensus mechanism. The blacklisted node records are then periodically changed based on the trust scores supplied by the nearby nodes. In regards to the practical scope of the network, the experimental study demonstrates that the suggested solution is effective and sustainable. To improve packet delivery ratio and vehicle node security in the VANET, the blockchain-based Trust-LEACH routing technique has also been created. The performance analysis has been carried out for Computational cost analysis, Computational time for block creation, Network analysis, SecurityAnalysis, and MITM attack analysis. Additionally, we provide proof that the suggested approach enhances VANET reliability by thwarting and removing insider threat initiation nodes from its blacklist.
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONSIJCNCJournal
The VANET has seen a boom in the distribution of significant source data,enabling connected vehicle
communications to enhance roadway safety.Despite the potential for interesting applications invehicle
networks,thereare still unresolved issues that have the potential to hinder bandwidth utilization once
deployed. Specifically, insider assaults on VANET platforms such as Blackhole attemptscan completely
stop vehicle-to-vehicle communications and impair the networks' performance level. In this study, we
provide the blockchain-based decentralized trust scoring architecture for the participants in the network to
identify existing and blacklisted insider adversaries in VANET. To address this concern, we suggest a twolevel detection technique, in the first level neighboring nodes determine theirtrustworthiness and in the
second level it aggregates trust scores for vehicle nodes using a consortium blockchain-based mechanism
that uses authorized Road Side Units (RSUs) as consensus mechanism. The blacklisted node records are
then periodically changed based on the trust scores supplied by the nearby nodes. In regards to the
practical scope of the network, the experimental study demonstrates that the suggested solution is effective
and sustainable. To improve packet delivery ratio and vehicle node security in the VANET, the blockchainbased Trust-LEACH routing technique has also been created. The performance analysis has been carried
out for Computational cost analysis, Computational time for block creation, Network analysis,
SecurityAnalysis, and MITM attack analysis. Additionally, we provide proof that the suggested approach
enhances VANET reliability by thwarting and removing insider threat initiation nodes from its blacklist.
Flexible handover solution for vehicular ad-hoc networks based on software de...IJECEIAES
Vehicular ad-hoc networks (VANET) suffer from dynamic network environment and topological instability that caused by high mobility feature and varying vehicles density. Emerging 5G mobile technologies offer new opportunities to design improved VANET architecture for future intelligent transportation system. However, current software defined networking (SDN) based handover schemes face poor handover performance in VANET environment with notable issues in connection establishment and ongoing communication sessions. These poor connectivity and inflexibility challenges appear at high vehicles speed and high data rate services. Therefore, this paper proposes a flexible handover solution for VANET networks by integrating SDN and fog computing (FC) technologies. The SDN provides global knowledge, programmability and intelligence functions for simplified and efficient network operation and management. FC, on the other hand, alleviates the core network pressure by providing real time computation and transmission functionalities at edge network to maintain the demands of delay sensitive applications. The proposed solution overcomes frequent handover challenges and reduces the processing overhead at core network. Moreover, the simulation evaluation shows significant handover performance improvement of the proposed solution compared to current SDN based schemes, especially in terms of handover latency and packet loss ratio under various simulation environments.
VANET is next generation vehicular network and
its applications will be play key to safe human life while journey
on highway. Security is one of the key prominent factors for
implement VANET in real environment.In this survey paper, discuss in detail the various computing methods and illustrate the relationship with vehicular network. Using these computing
methods to secure the vehicular network from attackers and
attacks.
Software engineering based self-checking process for cyber security system in...IJECEIAES
Newly, the cyber security of vehicle ad hoc network (VANET) includes two practicable: vehicle to vehicle (V2V) and Vehicle to Infrastructure (V2I) that have been considered due to importance. It has become possible to keep pace with the development in the world. The people safety is a priority in the development of technology in general and particular in of VANET for police vehicles. In this paper, we propose a software engineering based self-checking process to ensure the high redundancy of the generated keys. These keys are used in underlying cyber security system for VANET. The proposed self-checking process emploies a set of NIST tests including frequency, block and runs as a threshold for accepting the generated keys. The introduced cyber security system includes three levels: Firstly, the registration phase that asks vehicles to register in the system, in which the network excludes the unregistered ones. In this phase, the proposed software engineeringbased self-checking process is adopted. Secondly, the authentication phase that checks of the vehicles after the registration phase. Thirdly, the proposed system that is able to detect the DOS attack. The obtained results show the efficient performance of the proposed system in managing the security of the VANET network. The self-checking process increased the randomness of the generated keys, in which the security factor is increased.
Connected Vehicles, Zonal In Vehicle Network Architectureijtsrd
In vehicle network architecture is crucial in modern automobiles, enabling the seamless integration of electronic components and systems within vehicles. This article provides an in depth exploration of in vehicle network architecture, covering its history, types of networks, communication protocols, and emerging trends. The history section highlights the development of in vehicle networks, from basic electrical systems to the introduction of standardized protocols like the Controller Area Network CAN . The types of networks section discusses Local Interconnect Network LIN, CAN, and Automotive Ethernet, outlining their characteristics and applications. The communication protocols section explores protocols such as CAN, LIN, FlexRay, MOST, and Ethernet, detailing their features and use cases. Additionally, the article delves into emerging trends, including connected vehicles, advanced driver assistance systems ADAS, autonomous vehicles, and cybersecurity. The discussion emphasizes the increasing need for high bandwidth, low latency communication and robust cybersecurity measures in modern vehicles. By understanding in vehicle network architecture and its evolving landscape, automotive engineers and stakeholders can navigate the complexities of designing advanced, connected vehicles that ensure safety, efficiency, and a superior driving experience. Sanath D Javagal "Connected Vehicles, Zonal In-Vehicle Network Architecture" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-7 | Issue-4, August 2023, URL: https://www.ijtsrd.com/papers/ijtsrd59616.pdf Paper Url:https://www.ijtsrd.com/engineering/automotive-engineering/59616/connected-vehicles-zonal-invehicle-network-architecture/sanath-d-javagal
Amazon products reviews classification based on machine learning, deep learni...TELKOMNIKA JOURNAL
In recent times, the trend of online shopping through e-commerce stores and websites has grown to a huge extent. Whenever a product is purchased on an e-commerce platform, people leave their reviews about the product. These reviews are very helpful for the store owners and the product’s manufacturers for the betterment of their work process as well as product quality. An automated system is proposed in this work that operates on two datasets D1 and D2 obtained from Amazon. After certain preprocessing steps, N-gram and word embedding-based features are extracted using term frequency-inverse document frequency (TF-IDF), bag of words (BoW) and global vectors (GloVe), and Word2vec, respectively. Four machine learning (ML) models support vector machines (SVM), logistic regression (RF), logistic regression (LR), multinomial Naïve Bayes (MNB), two deep learning (DL) models convolutional neural network (CNN), long-short term memory (LSTM), and standalone bidirectional encoder representations (BERT) are used to classify reviews as either positive or negative. The results obtained by the standard ML, DL models and BERT are evaluated using certain performance evaluation measures. BERT turns out to be the best-performing model in the case of D1 with an accuracy of 90% on features derived by word embedding models while the CNN provides the best accuracy of 97% upon word embedding features in the case of D2. The proposed model shows better overall performance on D2 as compared to D1.
Design, simulation, and analysis of microstrip patch antenna for wireless app...TELKOMNIKA JOURNAL
In this study, a microstrip patch antenna that works at 3.6 GHz was built and tested to see how well it works. In this work, Rogers RT/Duroid 5880 has been used as the substrate material, with a dielectric permittivity of 2.2 and a thickness of 0.3451 mm; it serves as the base for the examined antenna. The computer simulation technology (CST) studio suite is utilized to show the recommended antenna design. The goal of this study was to get a more extensive transmission capacity, a lower voltage standing wave ratio (VSWR), and a lower return loss, but the main goal was to get a higher gain, directivity, and efficiency. After simulation, the return loss, gain, directivity, bandwidth, and efficiency of the supplied antenna are found to be -17.626 dB, 9.671 dBi, 9.924 dBi, 0.2 GHz, and 97.45%, respectively. Besides, the recreation uncovered that the transfer speed side-lobe level at phi was much better than those of the earlier works, at -28.8 dB, respectively. Thus, it makes a solid contender for remote innovation and more robust communication.
More Related Content
Similar to Improving the detection of intrusion in vehicular ad-hoc networks with modified identity-based cryptosystem
Cyber DoS attack-based security simulator for VANET IJECEIAES
At the late years, researches focused on the cyber denial of service (DoS) attacks in the vehicle ad hoc networks (VANETS). This is due to high importance of ensuring the save receiving of information in terms of vehicle to vehicle (V2V), vehicle to infrastructure (V2I) and Vehicle to Road side unit (V2R). In this paper, a cyber-security system is proposed to detect and block the DoS attacks in VANET. In addition, a simulator for VENAT based on lightweight authentication and key exchange is presented to simulate the network performance and attacks. The proposed system consists of three phases: registration, authentication as well as communications and DoS attack detection. These phases improve the system ability to detect the attacks in efficient way. Each phase working is based in a proposed related algorithm under the guidance of lightweight protocol. In order to test the proposed system, a prototype is considered includes six cars and we adopt police cars due to high importance of exchanged information. Different case studies have been considered to evaluate the proposed system and the obtained results show a high efficiency of performance in terms of information exchange and attack detection.
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...IJERA Editor
Designing a protocol structure which contains the control system, VANET device and the type of communication message structures which will implement the message packets for v2v or v2I infrastructure . The different message packets contain the information required to transfer from one node to another in vehicular network for communication. Design various algorithm required for Control, Alert and Infotainment messages. Time stamping lowering data rate efficient packet delivery and proper communication of required messages. Implementation of proposed algorithms and comparison of them with existing algorithms and study of different factors affecting the working of theses algorithms. Analysis of proposed design approach and improvements in results if required.
A heterogeneous short-range communication platform for Internet of Vehicles IJECEIAES
The automotive industry is rapidly accelerating toward the development of innovative industry applications that feature management capabilities for data and applications alike in cars. In this regard, more internet of vehicles solutions are emerging through advancements of various wireless medium access-control technologies and the internet of things. In the present work, we develop a short-range communication–based vehicular system to support vehicle communication and remote car control. We present a combined hardware and software testbed that is capable of controlling a vehicle’s start up, operation and several related functionalities covering various vehicle metric data. The testbed is built from two microcontrollers, Arduino and Raspberry Pi 3, each of which individually controls certain functions to improve the overall vehicle control. The implementation of the heterogeneous communication module is based on the IEEE 802.11 and IEEE 802.15 medium access control technologies. Further, a control module on a smartphone was designed and implemented for efficient management. Moreover, we study the system connectivity performance by measuring various important parameters including the coverage distance, signal strength, download speed and latency. This study covers the use of this technology setup in different geographical areas over various time spans.
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...Dr. Amarjeet Singh
Vehicles in a vehicular ad-hoc network (VANET) broadcast information about the driving environment in the road. Due to the open-access environment, this means that the VANET is susceptible to security and privacy issues. However, none of the related works satisfies all security and privacy requirements. Besides, their proposed has huge overhead in terms of computation and communication. To address the above issues, we will propose the security and privacy scheme based on Elliptic Curve Cryptography (ECC) and one secure hash function. Hence the reliability of each message being signed and checked has been improved. The main aim of this work is to satisfy all aspect requirements of security and privacy and reduce the computational complexity of the system.
In vehicular ad hoc network (VANETs), the applications mainly focused on the road challenging subclass of Mobile Ad-hoc Network, which empowers smart transmission among vehicles and between vehicles and roadside frameworks. It is an optimistic methodology for the Intelligent Transport System (ITS). There are numerous difficulties to be tended while utilizing VANET. It is flexible and has a high dynamic topology and flexibility which makes the conventional MANET protocols unacceptable for VANET. Trust is a principal element which is used to create a trustful environment to improve the security in vehicular networks. Trust can be calculated by observing the human behavior which creates a trusted communicating environment. In this paper, we define the architecture of VANET, then the communication establishment and various challenges. Some trust models had been defined in this paper to enforce honest information sharing between communicating nodes. Trust establishment is compulsory among communicating vehicles to build a secure messages exchange and reliability.
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...IJCNCJournal
Vehicular Ad-hoc network (VANET) is one of the emerging technologies for research community to get various research challenges to construct secured framework for autonomous vehicular communication. The prime concern of this technology is to provide efficient data communication among registered vehicle nodes. The several research ideas are implemented practically to improve overall communication in VANETs by considering security and privacy as major aspects of VANETs. Several mechanisms have been implemented using cryptography algorithms and methodologies. However, these mechanisms provide a solution only for some restricted environments and to limited security threats. Hence, the proposed novel mechanism has been introduced, implemented and tested using key management technique. It provides secured network environment for VANET and its components. Later, this mechanism provides security for data packets of emergency messages using cryptography mechanism. Hence, the proposed novel mechanism is named Group Key Management & Cryptography Schemes (GKMC). The experimental analysis shows significant improvements in the network performance to provide security and privacy for emergency messages. This GKMC mechanism will help the VANET user’s to perform secured emergency message communication in network environment.
A novel key management protocol for vehicular cloud securityTELKOMNIKA JOURNAL
Vehicular cloud computing (VCC) is a new hybrid technology which has become an outstanding area of research. VCC combines salient features of cloud computing and wireless communication technology to help drivers in network connectivity, storage space availability and applications. VCC is formed by dynamic cloud formation by moving vehicles. Security plays an important role in VCC communication. Key management is one of the important tasks for security of VCC. This paper proposes a novel key management protocol for VCC security. Proposed scheme is based on Elliptical Curve Cryptography (ECC). The simulation results demonstrated that the proposed protocol is efficient compared to existing key management algorithms in terms of key generation time, memory usage and cpu utilization.
A THRESHOLD BASED AUTHENTICATION MECHANISM FOR VEHICULAR AD HOC NETWORK (VANET)IAEME Publication
Since Vehicular ad hoc networks (VANETs) are vulnerable to various kinds of attacks, there is a need to fulfill the security requirements like message privacy, integrity, and authentication. The authentication technique is said to be efficient if it detects compromised nodes accurately with less complexity, reduced authentication delay, and keying overhead. In this paper, a threshold-based authentication scheme for cluster-based VANETs is proposed. The vehicles are clustered, and the threshold degree of each node is estimated. The threshold degree is a combination of direct threshold degree and indirect threshold degree. Based on this estimated threshold degree, cluster heads are selected. Then, each vehicle is monitored by a set of verifiers, and the messages are digitally signed by the sender and encrypted using a public/ private key as distributed by a threshold authority and decrypted by the destination. This verifies the identity of sender as well as receiver thus providing authentication to the scheme. By simulation results, we prove that the proposed technique provides high security with less overhead and delay.
Automotive Ethernet architecture and security: challenges and technologies IJECEIAES
Vehicle infrastructure must address the challenges posed by today's advances toward connected and autonomous vehicles. To allow for more flexible architectures, high-bandwidth connections and scalability are needed to connect many sensors and electronic control units (ECUs). At the same time, deterministic and low latency is a critical and significant design requirement to support urgent real-time applications in autonomous vehicles. As a recent solution, the time-sensitive network (TSN) was introduced as Ethernet-based amendments in IEEE 802.1 TSN standards to meet those needs. However, it had hurdle to be overcome before it can be used effectively. This paper discusses the latest studies concerning the automotive Ethernet requirements, including transmission delay studies to improve worst-case end-to-end delay and end-to-end jitter. Also, the paper focuses on the securing Ethernet-based in-vehicle networks (IVNs) by reviewing new encryption and authentication methods and approaches.
Today, a growing number of vehicles are equipped with communication devices to facilitate vehicle to vehicle and vehicle to infrastructure communication and increase the safety of passengers. A new type of network called Vehicular Network VANET provides us with the infrastructure for developing new systems to enhance drivers' and passengers' safety and comfort. Vehicular networks are special types of mobile ad hoc networks that are used to help drivers access necessary information. This paper provides an introduction to vehicular networks. Matthew N. O. Sadiku | Uwakwe C. Chukwu | Abayomi Ajayi-Majebi | Sarhan M. Musa "Vehicular Networking" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-6 , October 2021, URL: https://www.ijtsrd.com/papers/ijtsrd46451.pdf Paper URL : https://www.ijtsrd.com/engineering/electrical-engineering/46451/vehicular-networking/matthew-n-o-sadiku
Cooperative Data Sharing with Security in Vehicular Ad-Hoc Networkscsandit
Vehicles download the data when passing through a drive through the road (RSU) and then share the data after travelling outside the coverage of RSU.A key issue of downloading
cooperative data is how effectively data is shared among them self. Developing an application layer data exchange protocol for the coordination of vehicles to exchange data according to
their geographic locations. Coordinated sharing can avoid medium access control (MAC) layer
collisions and the hidden terminal effect can be avoided in the multi-hop transmission. A salient
feature of the application layer data exchange protocol, in the voluntary services, Vehicles purchase the requested data from service provider via RSUs. In this project, we propose a
cooperative data sharing with secure framework for voluntary services in special vehicles networks (VANETs). We also concentrate on security in the process of downloading data and
sharing. Applicants to ensure exclusive access to data applied and security of the vehicles
involved in the implementation.
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs ApplicationsIJCNCJournal
The VANET has seen a boom in the distribution of significant source data,enabling connected vehicle communications to enhance roadway safety.Despite the potential for interesting applications invehicle networks,thereare still unresolved issues that have the potential to hinder bandwidth utilization once deployed. Specifically, insider assaults on VANET platforms such as Blackhole attemptscan completely stop vehicle-to-vehicle communications and impair the networks' performance level. In this study, we provide the blockchain-based decentralized trust scoring architecture for the participants in the network to identify existing and blacklisted insider adversaries in VANET. To address this concern, we suggest a two-level detection technique, in the first level neighboring nodes determine theirtrustworthiness and in the second level it aggregates trust scores for vehicle nodes using a consortium blockchain-based mechanism that uses authorized Road Side Units (RSUs) as consensus mechanism. The blacklisted node records are then periodically changed based on the trust scores supplied by the nearby nodes. In regards to the practical scope of the network, the experimental study demonstrates that the suggested solution is effective and sustainable. To improve packet delivery ratio and vehicle node security in the VANET, the blockchain-based Trust-LEACH routing technique has also been created. The performance analysis has been carried out for Computational cost analysis, Computational time for block creation, Network analysis, SecurityAnalysis, and MITM attack analysis. Additionally, we provide proof that the suggested approach enhances VANET reliability by thwarting and removing insider threat initiation nodes from its blacklist.
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONSIJCNCJournal
The VANET has seen a boom in the distribution of significant source data,enabling connected vehicle
communications to enhance roadway safety.Despite the potential for interesting applications invehicle
networks,thereare still unresolved issues that have the potential to hinder bandwidth utilization once
deployed. Specifically, insider assaults on VANET platforms such as Blackhole attemptscan completely
stop vehicle-to-vehicle communications and impair the networks' performance level. In this study, we
provide the blockchain-based decentralized trust scoring architecture for the participants in the network to
identify existing and blacklisted insider adversaries in VANET. To address this concern, we suggest a twolevel detection technique, in the first level neighboring nodes determine theirtrustworthiness and in the
second level it aggregates trust scores for vehicle nodes using a consortium blockchain-based mechanism
that uses authorized Road Side Units (RSUs) as consensus mechanism. The blacklisted node records are
then periodically changed based on the trust scores supplied by the nearby nodes. In regards to the
practical scope of the network, the experimental study demonstrates that the suggested solution is effective
and sustainable. To improve packet delivery ratio and vehicle node security in the VANET, the blockchainbased Trust-LEACH routing technique has also been created. The performance analysis has been carried
out for Computational cost analysis, Computational time for block creation, Network analysis,
SecurityAnalysis, and MITM attack analysis. Additionally, we provide proof that the suggested approach
enhances VANET reliability by thwarting and removing insider threat initiation nodes from its blacklist.
Flexible handover solution for vehicular ad-hoc networks based on software de...IJECEIAES
Vehicular ad-hoc networks (VANET) suffer from dynamic network environment and topological instability that caused by high mobility feature and varying vehicles density. Emerging 5G mobile technologies offer new opportunities to design improved VANET architecture for future intelligent transportation system. However, current software defined networking (SDN) based handover schemes face poor handover performance in VANET environment with notable issues in connection establishment and ongoing communication sessions. These poor connectivity and inflexibility challenges appear at high vehicles speed and high data rate services. Therefore, this paper proposes a flexible handover solution for VANET networks by integrating SDN and fog computing (FC) technologies. The SDN provides global knowledge, programmability and intelligence functions for simplified and efficient network operation and management. FC, on the other hand, alleviates the core network pressure by providing real time computation and transmission functionalities at edge network to maintain the demands of delay sensitive applications. The proposed solution overcomes frequent handover challenges and reduces the processing overhead at core network. Moreover, the simulation evaluation shows significant handover performance improvement of the proposed solution compared to current SDN based schemes, especially in terms of handover latency and packet loss ratio under various simulation environments.
VANET is next generation vehicular network and
its applications will be play key to safe human life while journey
on highway. Security is one of the key prominent factors for
implement VANET in real environment.In this survey paper, discuss in detail the various computing methods and illustrate the relationship with vehicular network. Using these computing
methods to secure the vehicular network from attackers and
attacks.
Software engineering based self-checking process for cyber security system in...IJECEIAES
Newly, the cyber security of vehicle ad hoc network (VANET) includes two practicable: vehicle to vehicle (V2V) and Vehicle to Infrastructure (V2I) that have been considered due to importance. It has become possible to keep pace with the development in the world. The people safety is a priority in the development of technology in general and particular in of VANET for police vehicles. In this paper, we propose a software engineering based self-checking process to ensure the high redundancy of the generated keys. These keys are used in underlying cyber security system for VANET. The proposed self-checking process emploies a set of NIST tests including frequency, block and runs as a threshold for accepting the generated keys. The introduced cyber security system includes three levels: Firstly, the registration phase that asks vehicles to register in the system, in which the network excludes the unregistered ones. In this phase, the proposed software engineeringbased self-checking process is adopted. Secondly, the authentication phase that checks of the vehicles after the registration phase. Thirdly, the proposed system that is able to detect the DOS attack. The obtained results show the efficient performance of the proposed system in managing the security of the VANET network. The self-checking process increased the randomness of the generated keys, in which the security factor is increased.
Connected Vehicles, Zonal In Vehicle Network Architectureijtsrd
In vehicle network architecture is crucial in modern automobiles, enabling the seamless integration of electronic components and systems within vehicles. This article provides an in depth exploration of in vehicle network architecture, covering its history, types of networks, communication protocols, and emerging trends. The history section highlights the development of in vehicle networks, from basic electrical systems to the introduction of standardized protocols like the Controller Area Network CAN . The types of networks section discusses Local Interconnect Network LIN, CAN, and Automotive Ethernet, outlining their characteristics and applications. The communication protocols section explores protocols such as CAN, LIN, FlexRay, MOST, and Ethernet, detailing their features and use cases. Additionally, the article delves into emerging trends, including connected vehicles, advanced driver assistance systems ADAS, autonomous vehicles, and cybersecurity. The discussion emphasizes the increasing need for high bandwidth, low latency communication and robust cybersecurity measures in modern vehicles. By understanding in vehicle network architecture and its evolving landscape, automotive engineers and stakeholders can navigate the complexities of designing advanced, connected vehicles that ensure safety, efficiency, and a superior driving experience. Sanath D Javagal "Connected Vehicles, Zonal In-Vehicle Network Architecture" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-7 | Issue-4, August 2023, URL: https://www.ijtsrd.com/papers/ijtsrd59616.pdf Paper Url:https://www.ijtsrd.com/engineering/automotive-engineering/59616/connected-vehicles-zonal-invehicle-network-architecture/sanath-d-javagal
Similar to Improving the detection of intrusion in vehicular ad-hoc networks with modified identity-based cryptosystem (20)
Amazon products reviews classification based on machine learning, deep learni...TELKOMNIKA JOURNAL
In recent times, the trend of online shopping through e-commerce stores and websites has grown to a huge extent. Whenever a product is purchased on an e-commerce platform, people leave their reviews about the product. These reviews are very helpful for the store owners and the product’s manufacturers for the betterment of their work process as well as product quality. An automated system is proposed in this work that operates on two datasets D1 and D2 obtained from Amazon. After certain preprocessing steps, N-gram and word embedding-based features are extracted using term frequency-inverse document frequency (TF-IDF), bag of words (BoW) and global vectors (GloVe), and Word2vec, respectively. Four machine learning (ML) models support vector machines (SVM), logistic regression (RF), logistic regression (LR), multinomial Naïve Bayes (MNB), two deep learning (DL) models convolutional neural network (CNN), long-short term memory (LSTM), and standalone bidirectional encoder representations (BERT) are used to classify reviews as either positive or negative. The results obtained by the standard ML, DL models and BERT are evaluated using certain performance evaluation measures. BERT turns out to be the best-performing model in the case of D1 with an accuracy of 90% on features derived by word embedding models while the CNN provides the best accuracy of 97% upon word embedding features in the case of D2. The proposed model shows better overall performance on D2 as compared to D1.
Design, simulation, and analysis of microstrip patch antenna for wireless app...TELKOMNIKA JOURNAL
In this study, a microstrip patch antenna that works at 3.6 GHz was built and tested to see how well it works. In this work, Rogers RT/Duroid 5880 has been used as the substrate material, with a dielectric permittivity of 2.2 and a thickness of 0.3451 mm; it serves as the base for the examined antenna. The computer simulation technology (CST) studio suite is utilized to show the recommended antenna design. The goal of this study was to get a more extensive transmission capacity, a lower voltage standing wave ratio (VSWR), and a lower return loss, but the main goal was to get a higher gain, directivity, and efficiency. After simulation, the return loss, gain, directivity, bandwidth, and efficiency of the supplied antenna are found to be -17.626 dB, 9.671 dBi, 9.924 dBi, 0.2 GHz, and 97.45%, respectively. Besides, the recreation uncovered that the transfer speed side-lobe level at phi was much better than those of the earlier works, at -28.8 dB, respectively. Thus, it makes a solid contender for remote innovation and more robust communication.
Design and simulation an optimal enhanced PI controller for congestion avoida...TELKOMNIKA JOURNAL
In this paper, snake optimization algorithm (SOA) is used to find the optimal gains of an enhanced controller for controlling congestion problem in computer networks. M-file and Simulink platform is adopted to evaluate the response of the active queue management (AQM) system, a comparison with two classical controllers is done, all tuned gains of controllers are obtained using SOA method and the fitness function chose to monitor the system performance is the integral time absolute error (ITAE). Transient analysis and robust analysis is used to show the proposed controller performance, two robustness tests are applied to the AQM system, one is done by varying the size of queue value in different period and the other test is done by changing the number of transmission control protocol (TCP) sessions with a value of ± 20% from its original value. The simulation results reflect a stable and robust behavior and best performance is appeared clearly to achieve the desired queue size without any noise or any transmission problems.
Conceptual model of internet banking adoption with perceived risk and trust f...TELKOMNIKA JOURNAL
Understanding the primary factors of internet banking (IB) acceptance is critical for both banks and users; nevertheless, our knowledge of the role of users’ perceived risk and trust in IB adoption is limited. As a result, we develop a conceptual model by incorporating perceived risk and trust into the technology acceptance model (TAM) theory toward the IB. The proper research emphasized that the most essential component in explaining IB adoption behavior is behavioral intention to use IB adoption. TAM is helpful for figuring out how elements that affect IB adoption are connected to one another. According to previous literature on IB and the use of such technology in Iraq, one has to choose a theoretical foundation that may justify the acceptance of IB from the customer’s perspective. The conceptual model was therefore constructed using the TAM as a foundation. Furthermore, perceived risk and trust were added to the TAM dimensions as external factors. The key objective of this work was to extend the TAM to construct a conceptual model for IB adoption and to get sufficient theoretical support from the existing literature for the essential elements and their relationships in order to unearth new insights about factors responsible for IB adoption.
Efficient combined fuzzy logic and LMS algorithm for smart antennaTELKOMNIKA JOURNAL
The smart antennas are broadly used in wireless communication. The least mean square (LMS) algorithm is a procedure that is concerned in controlling the smart antenna pattern to accommodate specified requirements such as steering the beam toward the desired signal, in addition to placing the deep nulls in the direction of unwanted signals. The conventional LMS (C-LMS) has some drawbacks like slow convergence speed besides high steady state fluctuation error. To overcome these shortcomings, the present paper adopts an adaptive fuzzy control step size least mean square (FC-LMS) algorithm to adjust its step size. Computer simulation outcomes illustrate that the given model has fast convergence rate as well as low mean square error steady state.
Design and implementation of a LoRa-based system for warning of forest fireTELKOMNIKA JOURNAL
This paper presents the design and implementation of a forest fire monitoring and warning system based on long range (LoRa) technology, a novel ultra-low power consumption and long-range wireless communication technology for remote sensing applications. The proposed system includes a wireless sensor network that records environmental parameters such as temperature, humidity, wind speed, and carbon dioxide (CO2) concentration in the air, as well as taking infrared photos.The data collected at each sensor node will be transmitted to the gateway via LoRa wireless transmission. Data will be collected, processed, and uploaded to a cloud database at the gateway. An Android smartphone application that allows anyone to easily view the recorded data has been developed. When a fire is detected, the system will sound a siren and send a warning message to the responsible personnel, instructing them to take appropriate action. Experiments in Tram Chim Park, Vietnam, have been conducted to verify and evaluate the operation of the system.
Wavelet-based sensing technique in cognitive radio networkTELKOMNIKA JOURNAL
Cognitive radio is a smart radio that can change its transmitter parameter based on interaction with the environment in which it operates. The demand for frequency spectrum is growing due to a big data issue as many Internet of Things (IoT) devices are in the network. Based on previous research, most frequency spectrum was used, but some spectrums were not used, called spectrum hole. Energy detection is one of the spectrum sensing methods that has been frequently used since it is easy to use and does not require license users to have any prior signal understanding. But this technique is incapable of detecting at low signal-to-noise ratio (SNR) levels. Therefore, the wavelet-based sensing is proposed to overcome this issue and detect spectrum holes. The main objective of this work is to evaluate the performance of wavelet-based sensing and compare it with the energy detection technique. The findings show that the percentage of detection in wavelet-based sensing is 83% higher than energy detection performance. This result indicates that the wavelet-based sensing has higher precision in detection and the interference towards primary user can be decreased.
A novel compact dual-band bandstop filter with enhanced rejection bandsTELKOMNIKA JOURNAL
In this paper, we present the design of a new wide dual-band bandstop filter (DBBSF) using nonuniform transmission lines. The method used to design this filter is to replace conventional uniform transmission lines with nonuniform lines governed by a truncated Fourier series. Based on how impedances are profiled in the proposed DBBSF structure, the fractional bandwidths of the two 10 dB-down rejection bands are widened to 39.72% and 52.63%, respectively, and the physical size has been reduced compared to that of the filter with the uniform transmission lines. The results of the electromagnetic (EM) simulation support the obtained analytical response and show an improved frequency behavior.
Deep learning approach to DDoS attack with imbalanced data at the application...TELKOMNIKA JOURNAL
A distributed denial of service (DDoS) attack is where one or more computers attack or target a server computer, by flooding internet traffic to the server. As a result, the server cannot be accessed by legitimate users. A result of this attack causes enormous losses for a company because it can reduce the level of user trust, and reduce the company’s reputation to lose customers due to downtime. One of the services at the application layer that can be accessed by users is a web-based lightweight directory access protocol (LDAP) service that can provide safe and easy services to access directory applications. We used a deep learning approach to detect DDoS attacks on the CICDDoS 2019 dataset on a complex computer network at the application layer to get fast and accurate results for dealing with unbalanced data. Based on the results obtained, it is observed that DDoS attack detection using a deep learning approach on imbalanced data performs better when implemented using synthetic minority oversampling technique (SMOTE) method for binary classes. On the other hand, the proposed deep learning approach performs better for detecting DDoS attacks in multiclass when implemented using the adaptive synthetic (ADASYN) method.
The appearance of uncertainties and disturbances often effects the characteristics of either linear or nonlinear systems. Plus, the stabilization process may be deteriorated thus incurring a catastrophic effect to the system performance. As such, this manuscript addresses the concept of matching condition for the systems that are suffering from miss-match uncertainties and exogeneous disturbances. The perturbation towards the system at hand is assumed to be known and unbounded. To reach this outcome, uncertainties and their classifications are reviewed thoroughly. The structural matching condition is proposed and tabulated in the proposition 1. Two types of mathematical expressions are presented to distinguish the system with matched uncertainty and the system with miss-matched uncertainty. Lastly, two-dimensional numerical expressions are provided to practice the proposed proposition. The outcome shows that matching condition has the ability to change the system to a design-friendly model for asymptotic stabilization.
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...TELKOMNIKA JOURNAL
Many systems, including digital signal processors, finite impulse response (FIR) filters, application-specific integrated circuits, and microprocessors, use multipliers. The demand for low power multipliers is gradually rising day by day in the current technological trend. In this study, we describe a 4×4 Wallace multiplier based on a carry select adder (CSA) that uses less power and has a better power delay product than existing multipliers. HSPICE tool at 16 nm technology is used to simulate the results. In comparison to the traditional CSA-based multiplier, which has a power consumption of 1.7 µW and power delay product (PDP) of 57.3 fJ, the results demonstrate that the Wallace multiplier design employing CSA with first zero finding logic (FZF) logic has the lowest power consumption of 1.4 µW and PDP of 27.5 fJ.
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemTELKOMNIKA JOURNAL
The flaw in 5G orthogonal frequency division multiplexing (OFDM) becomes apparent in high-speed situations. Because the doppler effect causes frequency shifts, the orthogonality of OFDM subcarriers is broken, lowering both their bit error rate (BER) and throughput output. As part of this research, we use a novel design that combines massive multiple input multiple output (MIMO) and weighted overlap and add (WOLA) to improve the performance of 5G systems. To determine which design is superior, throughput and BER are calculated for both the proposed design and OFDM. The results of the improved system show a massive improvement in performance ver the conventional system and significant improvements with massive MIMO, including the best throughput and BER. When compared to conventional systems, the improved system has a throughput that is around 22% higher and the best performance in terms of BER, but it still has around 25% less error than OFDM.
Reflector antenna design in different frequencies using frequency selective s...TELKOMNIKA JOURNAL
In this study, it is aimed to obtain two different asymmetric radiation patterns obtained from antennas in the shape of the cross-section of a parabolic reflector (fan blade type antennas) and antennas with cosecant-square radiation characteristics at two different frequencies from a single antenna. For this purpose, firstly, a fan blade type antenna design will be made, and then the reflective surface of this antenna will be completed to the shape of the reflective surface of the antenna with the cosecant-square radiation characteristic with the frequency selective surface designed to provide the characteristics suitable for the purpose. The frequency selective surface designed and it provides the perfect transmission as possible at 4 GHz operating frequency, while it will act as a band-quenching filter for electromagnetic waves at 5 GHz operating frequency and will be a reflective surface. Thanks to this frequency selective surface to be used as a reflective surface in the antenna, a fan blade type radiation characteristic at 4 GHz operating frequency will be obtained, while a cosecant-square radiation characteristic at 5 GHz operating frequency will be obtained.
Reagentless iron detection in water based on unclad fiber optical sensorTELKOMNIKA JOURNAL
A simple and low-cost fiber based optical sensor for iron detection is demonstrated in this paper. The sensor head consist of an unclad optical fiber with the unclad length of 1 cm and it has a straight structure. Results obtained shows a linear relationship between the output light intensity and iron concentration, illustrating the functionality of this iron optical sensor. Based on the experimental results, the sensitivity and linearity are achieved at 0.0328/ppm and 0.9824 respectively at the wavelength of 690 nm. With the same wavelength, other performance parameters are also studied. Resolution and limit of detection (LOD) are found to be 0.3049 ppm and 0.0755 ppm correspondingly. This iron sensor is advantageous in that it does not require any reagent for detection, enabling it to be simpler and cost-effective in the implementation of the iron sensing.
Impact of CuS counter electrode calcination temperature on quantum dot sensit...TELKOMNIKA JOURNAL
In place of the commercial Pt electrode used in quantum sensitized solar cells, the low-cost CuS cathode is created using electrophoresis. High resolution scanning electron microscopy and X-ray diffraction were used to analyze the structure and morphology of structural cubic samples with diameters ranging from 40 nm to 200 nm. The conversion efficiency of solar cells is significantly impacted by the calcination temperatures of cathodes at 100 °C, 120 °C, 150 °C, and 180 °C under vacuum. The fluorine doped tin oxide (FTO)/CuS cathode electrode reached a maximum efficiency of 3.89% when it was calcined at 120 °C. Compared to other temperature combinations, CuS nanoparticles crystallize at 120 °C, which lowers resistance while increasing electron lifetime.
In place of the commercial Pt electrode used in quantum sensitized solar cells, the low-cost CuS cathode is created using electrophoresis. High resolution scanning electron microscopy and X-ray diffraction were used to analyze the structure and morphology of structural cubic samples with diameters ranging from 40 nm to 200 nm. The conversion efficiency of solar cells is significantly impacted by the calcination temperatures of cathodes at 100 °C, 120 °C, 150 °C, and 180 °C under vacuum. The fluorine doped tin oxide (FTO)/CuS cathode electrode reached a maximum efficiency of 3.89% when it was calcined at 120 °C. Compared to other temperature combinations, CuS nanoparticles crystallize at 120 °C, which lowers resistance while increasing electron lifetime.
A progressive learning for structural tolerance online sequential extreme lea...TELKOMNIKA JOURNAL
This article discusses the progressive learning for structural tolerance online sequential extreme learning machine (PSTOS-ELM). PSTOS-ELM can save robust accuracy while updating the new data and the new class data on the online training situation. The robustness accuracy arises from using the householder block exact QR decomposition recursive least squares (HBQRD-RLS) of the PSTOS-ELM. This method is suitable for applications that have data streaming and often have new class data. Our experiment compares the PSTOS-ELM accuracy and accuracy robustness while data is updating with the batch-extreme learning machine (ELM) and structural tolerance online sequential extreme learning machine (STOS-ELM) that both must retrain the data in a new class data case. The experimental results show that PSTOS-ELM has accuracy and robustness comparable to ELM and STOS-ELM while also can update new class data immediately.
Electroencephalography-based brain-computer interface using neural networksTELKOMNIKA JOURNAL
This study aimed to develop a brain-computer interface that can control an electric wheelchair using electroencephalography (EEG) signals. First, we used the Mind Wave Mobile 2 device to capture raw EEG signals from the surface of the scalp. The signals were transformed into the frequency domain using fast Fourier transform (FFT) and filtered to monitor changes in attention and relaxation. Next, we performed time and frequency domain analyses to identify features for five eye gestures: opened, closed, blink per second, double blink, and lookup. The base state was the opened-eyes gesture, and we compared the features of the remaining four action gestures to the base state to identify potential gestures. We then built a multilayer neural network to classify these features into five signals that control the wheelchair’s movement. Finally, we designed an experimental wheelchair system to test the effectiveness of the proposed approach. The results demonstrate that the EEG classification was highly accurate and computationally efficient. Moreover, the average performance of the brain-controlled wheelchair system was over 75% across different individuals, which suggests the feasibility of this approach.
Adaptive segmentation algorithm based on level set model in medical imagingTELKOMNIKA JOURNAL
For image segmentation, level set models are frequently employed. It offer best solution to overcome the main limitations of deformable parametric models. However, the challenge when applying those models in medical images stills deal with removing blurs in image edges which directly affects the edge indicator function, leads to not adaptively segmenting images and causes a wrong analysis of pathologies wich prevents to conclude a correct diagnosis. To overcome such issues, an effective process is suggested by simultaneously modelling and solving systems’ two-dimensional partial differential equations (PDE). The first PDE equation allows restoration using Euler’s equation similar to an anisotropic smoothing based on a regularized Perona and Malik filter that eliminates noise while preserving edge information in accordance with detected contours in the second equation that segments the image based on the first equation solutions. This approach allows developing a new algorithm which overcome the studied model drawbacks. Results of the proposed method give clear segments that can be applied to any application. Experiments on many medical images in particular blurry images with high information losses, demonstrate that the developed approach produces superior segmentation results in terms of quantity and quality compared to other models already presented in previeous works.
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...TELKOMNIKA JOURNAL
Drug addiction is a complex neurobiological disorder that necessitates comprehensive treatment of both the body and mind. It is categorized as a brain disorder due to its impact on the brain. Various methods such as electroencephalography (EEG), functional magnetic resonance imaging (FMRI), and magnetoencephalography (MEG) can capture brain activities and structures. EEG signals provide valuable insights into neurological disorders, including drug addiction. Accurate classification of drug addiction from EEG signals relies on appropriate features and channel selection. Choosing the right EEG channels is essential to reduce computational costs and mitigate the risk of overfitting associated with using all available channels. To address the challenge of optimal channel selection in addiction detection from EEG signals, this work employs the shuffled frog leaping algorithm (SFLA). SFLA facilitates the selection of appropriate channels, leading to improved accuracy. Wavelet features extracted from the selected input channel signals are then analyzed using various machine learning classifiers to detect addiction. Experimental results indicate that after selecting features from the appropriate channels, classification accuracy significantly increased across all classifiers. Particularly, the multi-layer perceptron (MLP) classifier combined with SFLA demonstrated a remarkable accuracy improvement of 15.78% while reducing time complexity.
ResNet-n/DR: Automated diagnosis of diabetic retinopathy using a residual neu...TELKOMNIKA JOURNAL
Diabetic retinopathy (DR) is a progressive eye disease associated with diabetes, resulting in blindness or blurred vision. The risk of vision loss was dramatically decreased with early diagnosis and treatment. Doctors diagnose DR by examining the fundus retinal images to develop lesions associated with the disease. However, this diagnosis is a tedious and challenging task due to growing undiagnosed and untreated DR cases and the variability of retinal changes across disease stages. Manually analyzing the images has become an expensive and time-consuming task, not to mention that training new specialists takes time and requires daily practice. Our work investigates deep learning methods, particularly convolutional neural network (CNN), for DR diagnosis in the disease’s five stages. A pre-trained residual neural network (ResNet-34) was trained and tested for DR. Then, we develop computationally efficient and scalable methods after modifying a ResNet-34 with three additional residual units as a novel ResNet-n/DR. The Asia Pacific Tele-Ophthalmology Society (APTOS) 2019 dataset was used to evaluate the performance of models after applying multiple pre-processing steps to eliminate image noise and improve color contrast, thereby increasing efficiency. Our findings achieved state-of-the-art results compared to previous studies that used the same dataset. It had 90.7% sensitivity, 93.5% accuracy, 98.2% specificity, 89.5% precision, and 90.1% F1 score.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Quality defects in TMT Bars, Possible causes and Potential Solutions.PrashantGoswami42
Maintaining high-quality standards in the production of TMT bars is crucial for ensuring structural integrity in construction. Addressing common defects through careful monitoring, standardized processes, and advanced technology can significantly improve the quality of TMT bars. Continuous training and adherence to quality control measures will also play a pivotal role in minimizing these defects.
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
Democratizing Fuzzing at Scale by Abhishek Aryaabh.arya
Presented at NUS: Fuzzing and Software Security Summer School 2024
This keynote talks about the democratization of fuzzing at scale, highlighting the collaboration between open source communities, academia, and industry to advance the field of fuzzing. It delves into the history of fuzzing, the development of scalable fuzzing platforms, and the empowerment of community-driven research. The talk will further discuss recent advancements leveraging AI/ML and offer insights into the future evolution of the fuzzing landscape.
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Student information management system project report ii.pdf
Improving the detection of intrusion in vehicular ad-hoc networks with modified identity-based cryptosystem
1. TELKOMNIKA Telecommunication Computing Electronics and Control
Vol. 21, No. 5, October 2023, pp. 1005~1012
ISSN: 1693-6930, DOI: 10.12928/TELKOMNIKA.v21i5.22207 1005
Journal homepage: http://telkomnika.uad.ac.id
Improving the detection of intrusion in vehicular ad-hoc
networks with modified identity-based cryptosystem
Zachaeus K. Adeyemo1
, Emmanuel B. Ajulo2
, Damilare O. Akande1
, Hammed O. Lasisi3
, Samson I. Ojo1
1
Department of Electronic and Electrical Engineering, Faculty of Engineering and Technology, Ladoke Akintola University of
Technology, Ogbomoso, Nigeria
2
Department of Computer Science and Mathematics, College of Basic and Applied Sciences, Mountain Top University, Ibafo, Ogun
State, Nigeria
3
Department of Electrical and Electronics Engineering, College of Science, Engineering and Technology, Osun State University,
Osogbo, Osun State, Nigeria
Article Info ABSTRACT
Article history:
Received Nov 10, 2021
Revised Mar 21, 2023
Accepted Apr 30, 2023
Vehicular ad-hoc networks (VANETs) are wireless-equipped vehicles that
form networks along the road. The security of this network has been a major
challenge. The identity-based cryptosystem (IBC) previously used to secure
the networks suffers from membership authentication security features. This
paper focuses on improving the detection of intruders in VANETs with a
modified identity-based cryptosystem (MIBC). The MIBC is developed
using a non-singular elliptic curve with Lagrange interpolation. The public
key of vehicles and roadside units on the network are derived from number
plates and location identification numbers, respectively. Pseudo-identities
are used to mask the real identity of users to preserve their privacy.
The membership authentication mechanism ensures that only valid and
authenticated members of the network are allowed to join the network.
The performance of the MIBC is evaluated using intrusion detection ratio
(IDR) and computation time (CT) and then validated with the existing IBC.
The result obtained shows that the MIBC recorded an IDR of 99.3% against
94.3% obtained for the existing identity-based cryptosystem (EIBC) for 140
unregistered vehicles attempting to intrude on the network. The MIBC
shows lower CT values of 1.17 ms against 1.70 ms for EIBC. The MIBC can
be used to improve the security of VANETs.
Keywords:
Identity-based cryptosystem
Intrusion
On-board unit
Road side unit
VANET
This is an open access article under the CC BY-SA license.
Corresponding Author:
Damilare O. Akande
Department of Electronic and Electrical Engineering, Faculty of Engineering and Technology
Ladoke Akintola University of Technology, PMB 4000, Ogbomoso, Oyo State, Nigeria
Email: doakande@lautech.edu.ng
1. INTRODUCTION
The vehicular ad-hoc network (VANET) is an infrastructure-less network created as a result of
developments in wireless communications and networking technologies [1]. This new technology provides
ubiquitous connectivity to vehicles while in motion thereby creating efficient vehicular communications that
enable intelligent transportation systems (ITS) [2]. In VANET, there are two forms of communication,
namely: vehicle-to-vehicle (V2V) communication, in which vehicles fitted with an on-board unit (OBU)
wireless communication system communicate with other road vehicles, and vehicle-to-infrastructure (V2I)
communication, in which vehicles use their OBU to communicate with roadside units (RSUs) [3]. Improving
road safety and quality is the primary essence of this technology [2]. In VANET, the OBU of the vehicle acts
as an independent router, generates independent data, and periodically transmits information to other nearby
vehicles and RSUs on their current states, such as location, direction, speed, current time, and traffic events [4].
2. ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 21, No. 5, October 2023: 1005-1012
1006
In communicating with vehicles beyond the wireless range; intermediate vehicles or RSUs forward messages to
the intended destination over multiple hops. Thus, many initiatives in academic and standardization societies
have been inspired by this new model of communication [5]. Seven 10 MHz channels in the 5.9 GHz dedicated
short-range communication (DSRC) band have recently been allocated by the Federal Communications
Commission (FCC) of the United States of America (USA) to increase the protection and efficiency of the
transport system [5], [6]. Six 10 MHz channels are dedicated to comfort applications (internet facility,
information on the nearest restaurant, car park, filling station) in the new DSRC standard, and one channel is to
safety applications.
Given the tremendous benefits expected from vehicular communications, just like any other wireless
communication network, security has been a major challenge. Intruders can easily intercept, modify, and
replay messages transmitted on the network or even impersonate other vehicles to broadcast incorrect
information [6], [7]. Besides, the privacy of users on the network is also a challenge. The ideal is that the
travelling route of drivers should not be traceable by intruders through the message(s) sent or received by the
vehicles on the network [8], [9]. Consequent to these security challenges in VANETs, it has received due
attention from researchers, and the use of identity-based cryptosystem (IBC) to provide this security [10]-[12].
The uniqueness of IBC compare to other forms of security protocol is that the identity and pre-configuring
key of users is derived from an arbitrary string that uniquely identifies them [13]-[15]. Nonetheless,
the existing identity-based cryptosystem (EIBC) used to solve this problem lack membership authentication
security feature thereby allowing intruders to invade the network [10]. This informs the purpose of this work
to develop a modified identity-based cryptosystem (MIBC) to prevent and detect intrusion in VANETs. In this
paper, the MIBC was simulated using MATLAB R2018a. The performance of the MIBC was evaluated using
intrusion detection ratio (IDR) and computation time (CT) as performance metrics, and compared with EIBC.
2. OVERVIEW OF VEHICULAR AD-HOC NETWORKS (VANETS) AND IDENTITY-BASED
CRYPTOSYSTEM
Improving the detection of intruders in VANETs with a MIBC forms the basis for this study.
Therefore, the need to discuss the technology of VANETs and the fundamental of an identity-based
cryptosystem cannot be sidelined. The overview of VANETs technology and the IBC used for this work is
thus explained.
2.1. Vehicular ad-hoc networks
A sub-class of the wireless ad-hoc network (WANET) and the mobile ad-hoc network (MANET)
extension is the VANET. In VANET, nodes consist of self-organized vehicles and road-side infrastructure that
communicate with each other through wireless devices and function independently of any infrastructure in a
peer-to-peer mode. Each node operates and produces independent data as an independent router [16]-[19].
Network management and fault detection become distributed and hence more difficult to handle [20].
Nodes in VANETs are mobile which causes frequent changes to the network topology and makes it
unpredictable. It cannot be assumed that VANETs would always be under the protection of their owners
because of the ubiquitous existence of mobile nodes; nodes may be stolen or tampered with. For both
legitimate and unauthorized network users, the shared wireless medium is available [21]. While driving along
the road, these wireless-equipped vehicles spontaneously form networks. The key idea is to provide vehicle
nodes with ubiquitous connectivity while on the move and to establish effective vehicle-to-vehicle
communications that allow ITS. The ultimate objective of VANETs is to enhance the driving experience,
improve traffic safety and improve the performance of drivers [22]-[24].
2.2. Identity-based cryptosystem
Pre-configured vehicle keying materials and RSUs are created from their identities in identity-based
cryptosystems in such a way that the public and private keys of the vehicles and RSUs are bound to their
respective identities, thus avoiding certificate verification [25]. The cost of computing in this cryptosystem is
therefore small. Also, because in identity-based cryptosystems, the vehicle and the RSU do not need to
exchange certificates, the message length is reduced, and IBC is much more effective. IBC consists of two
mechanisms in basic form, namely identity-based encryption (IBE) and identity-based signature (IBS), with
four steps each. Setup/initialization, private key extraction, encryption, and decryption are the IBE process
steps while the IBS mechanism includes four steps include setup/initialization, private key extraction,
signature, and verification [25]-[27]. Both mechanisms follow the same process for setup/initialization and
private key extraction. These mechanisms are combined to achieve desired identity-based cryptosystems.
3. TELKOMNIKA Telecommun Comput El Control
Improving the detection of intrusion in vehicular ad-hoc networks with … (Zachaeus K. Adeyemo)
1007
3. RESEARCH METHOD
The MIBC consists of four entities, namely: the trusted authority (TA), the network control unit
(NCU), the RSUs, and the vehicles. The TA is a trusted third party responsible for the system setup, registration,
configuration, and issuing of private keys to the NCU, RSUs, and vehicles on the network. The NCU is
responsible for the authentication of users on the network. The RSUs are static smart devices on the road such as
traffic sensors or pedestrian sensors mounted on the road, while the vehicles are mobile entities with a transceiver
known as OBU installed in them to enable communication. The cryptographic process involves four phases.
The first is the key and pseudo-identity generating phase which is solely carried out by the TA. The second is the
vehicle authentication phase where valid users of the network are allowed to join the network, the third is the data
transmission phase comprising message signing, and the fourth is the message verification phase.
3.1. Development of a secure communication system
The development of secure communication begins at this stage. The system was developed on a
non-singular elliptic curve as expressed in the (1) and Lagrange interpolation was used to define and
interpolates points on the curve. The use of Lagrange interpolation eliminates the need for point pairing
which may increase the cryptographic headcount.
𝑦2
= 𝑥3
+ 𝑎𝑥 + 𝑏 𝑚𝑜𝑑 𝑝 (1)
The registration and setup of vehicles, RSUs, and NCU which are entities on the network were
carried out by the TA. The TA creates a group 𝐺 defined by a non-singular elliptic curve as expressed in (1)
and selects a generator 𝑃 ∈ 𝐺. The TA then randomly generates a master private 𝑠 ∈ 𝑍𝑞
∗
for the system and
computes the system public key 𝑃𝑝𝑢𝑏 as in (2).
𝑃𝑝𝑢𝑏 = 𝑠. 𝑃 (2)
Where: ‘𝑠’ is the master private key of the system, and it is an integer within the order 𝑞, 𝑃 is the generator of
the element in the group, and 𝑍∗
is a set of integers other than zero. The pseudo-identity of entities
(participants) on the network was generated using (3).
𝑃𝐼𝐷 = 𝛾𝑖. 𝑃||𝑅𝐼𝐷 ⊕ 𝐻(𝛾𝑖. 𝑃𝑝𝑢𝑏). (3)
Where: 𝑃𝐼𝐷 is the pseudo-identity of entities (participants) on the network, 𝛾𝑖 is a set of integers randomly
generated in 𝛾𝑖 ∈ 𝑍𝑞
∗
, 𝑅𝐼𝐷 is the real identity of the entity on the network, 𝑃𝑝𝑢𝑏 is the master public key of the
system as derived in (2), and 𝑃 is the generator of the group as already defined. In order to generate the
private key of any entity on the network.
𝑠𝑘𝑖 = 𝛾𝑖 + 𝜃𝑖. 𝑠 𝑚𝑜𝑑 𝑞. (4)
Where: 𝛾𝑖 is a set of integers randomly generated in 𝛾𝑖 ∈ 𝑍𝑞
∗
, ‘𝜃𝑖’ is a hashed value of pseudo-identity
concatenated with a timestamp 𝑇𝑖, ‘𝑠’ is the master private key of the system, and 𝑚𝑜𝑑 𝑞 is a modular
arithmetic operation in prime 𝑞.
3.2. Development of vehicle authentication system
The TA selects randomly a live session code 𝑆𝐿𝑐 ∈ 𝑍𝑞
∗
and then generates vehicle membership
authentication code to the vehicle using (5), and the control authentication key for the NCU using (6)
respectively. However, the live session code 𝑆𝐿𝑐 is not given to the vehicle(s) directly, but to the NCU for
vehicle(s) validation and authentication whenever it has to join the network for communication.
𝑀𝑘 = 𝐻(𝐶𝑘||𝐼𝐷𝑁𝐶𝑈) ⊕ 𝑅𝐼𝐷𝑣 (5)
𝐶𝑘 = 𝑠. 𝐻(𝐼𝐷𝑇𝐴||𝑅𝐼𝐷𝑣||𝑆𝐿𝑐) (6)
Where: 𝑀𝑘 is the membership authentication code for participants on the network, 𝐶𝑘 is the control
authentication key for the NCU, 𝐼𝐷𝑇𝐴 is the identity of the TA, 𝑅𝐼𝐷𝑣 is the real identity of the vehicle, 𝐼𝐷𝑁𝐶𝑈
is the identity of NCU, ‘𝑠’ is the master secret key, 𝛾𝑖 is a set of integer randomly generated in 𝛾𝑖 ∈ 𝑍𝑞
∗
, 𝐻 is
the hash function, || is the concatenation operation and ⊕ is the exclusive-OR operation. The NCU checks
for the validity of the request using (7), and further checks the revocation list which contains the real
identities of revoked vehicles received securely from the TA to ascertain the authenticity of the vehicles’
membership.
4. ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 21, No. 5, October 2023: 1005-1012
1008
𝑅𝐼𝐷𝑣 ≟ 𝑀𝑘 ⊕ 𝐻(𝐶𝑘||𝐼𝐷𝑁𝐶𝑈) (7)
The correctness of this authentication is proven as recall from (5) that:
𝑀𝑘 = 𝐻(𝐶𝑘||𝐼𝐷𝑁𝐶𝑈) ⊕ 𝑅𝐼𝐷𝑣
Then,
𝑅𝐼𝐷𝑣 = 𝐻(𝐶𝑘||𝐼𝐷𝑁𝐶𝑈) ⊕ 𝑅𝐼𝐷𝑣 ⊕ 𝐻(𝐶𝑘||𝐼𝐷𝑁𝐶𝑈)
𝑅𝐼𝐷𝑣 = 𝑅𝐼𝐷𝑣
3.3. Message signing
The vehicle signs messages to be transmitted on the network via the OBU device by generating a
random number 𝜇𝑖 ∈ 𝑍𝑞
∗
and computes (8), (9), and (10). This is to ensure non-repudiation and to ensure
high-security protection because any computation towards breaking the scheme by any intruder requires
simultaneous extraction of two unknown secrets.
𝑅𝑖 = 𝜇𝑖. 𝑃 (8)
𝛽𝑖 = 𝐻(𝑃𝐼𝐷||𝑇𝑖||𝑅𝑖||𝑀𝑖) (9)
𝜎𝑖 = 𝑠𝑘𝑣 + 𝛽𝑖. 𝜇𝑖 𝑚𝑜𝑑 𝑞 (10)
The signed message 𝑀 = {𝑀𝑖, 𝑃𝐼𝐷𝑖
, 𝑇𝑖, 𝑅𝑖, 𝜎𝑖}. Then, the vehicle broadcasts the message 𝑀 to the nearby
RSUs and vehicles, which are the receivers.
3.4. Message verification
The verifier which may be an RSU or a vehicle checks the validity of the message received using (11).
The verifier checks the freshness of timestamp 𝑇𝑖; if ∆𝑇 ≥ 𝑇𝑁𝑜𝑤 − 𝑇𝑖, where: ∆𝑇 is the predefined endurable
transmission delay, 𝑇𝑁𝑜𝑤 is the recent message received, and 𝑖 = 1, 2, 3, … , 𝑛; otherwise, the verifier rejects
the message.
𝜎𝑖. 𝑃 = 𝑃𝐼𝐷𝑣 + 𝜃𝑖. 𝑃𝑝𝑢𝑏 + 𝛽𝑖. 𝑅𝑖. (11)
Where: 𝜃𝑖 is the hashed value of pseudo-identity concatenated with a timestamp 𝑇𝑖. If it does, the message is
approved by the verifier; otherwise, the message is rejected by the verifier.
3.5. System simulation and procedures
The MIBC was simulated using MATLAB R2018a. The simulation was conducted on a Windows 8
computer system with Intel® Core™ i3 processor, 4 GB RAM. The simulation was considered for the V2V
and vehicle-to-roadside unit (V2R) communications, and the frequency of operation is 5.9 GHz.
The driving scenario designer (DSD) Application on the MATLAB R2018a Environment was used as a
mobility generation tool; and the transmission rate used is 0.3 seconds. The graphical users interface (GUI) as
shown in Figure 1 was created to aid simulation and analysis of the system. The membership authentication
panel on the GUI checks the validity of the vehicle when a request to join the network is sent; such a request
is either valid or not valid. The key generating panel generates on the GUI generates the entire usable key for
the vehicles on the network.
3.6. System evaluation performance metrics
The performance evaluation of the system was done using IDR and cryptographic computation time.
The IDR which is the ratio of the detected number of vehicles trying to break into the network to vehicles not
detected was analysed. The simulation analyses the efficiency of the NCU in preventing invalid and
unregistered vehicles into the network. For an efficient system, the detection ratio is expected to be high, and
the percentage detection rate is expressed as in (12).
𝐼𝐷𝑅 =
𝑁𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑖𝑛𝑐𝑖𝑑𝑒𝑛𝑡𝑠 𝑠𝑢𝑐𝑐𝑒𝑠𝑠𝑓𝑢𝑙𝑙𝑦 𝑑𝑒𝑡𝑒𝑐𝑡𝑒𝑑
𝑇𝑜𝑡𝑎𝑙 𝑛𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑖𝑛𝑐𝑖𝑑𝑒𝑛𝑡𝑠
× 100% (12)
5. TELKOMNIKA Telecommun Comput El Control
Improving the detection of intrusion in vehicular ad-hoc networks with … (Zachaeus K. Adeyemo)
1009
In the same vein, the computation time which is the time required for computing the cryptographic
operations was also analyzed. In this paper, the computation time was carried out using the ‘tit-tot’ function
of the MATLAB R2018a for both the developed and existing systems. The percentage of performance
improvement analysis of the developed system was achieved using the (13).
𝐼𝑝𝑒𝑟 =
(𝑇𝑒𝑥𝑖𝑠𝑡−𝑇𝑑𝑒𝑣𝑒𝑙𝑜𝑝𝑒𝑑)
𝑇𝑒𝑥𝑖𝑠𝑡
% (13)
Where 𝐼𝑝𝑒𝑟 refers to the improvement percentage, 𝑇𝑒𝑥𝑖𝑠𝑡 refers to the time costs of the existing scheme, and
𝑇𝑑𝑒𝑣𝑒𝑙𝑜𝑝𝑒𝑑 refers to the time costs of the developed scheme. Consequently, the developed system (MIBC) was
compared with the existing system, (EIBC), and the percentage performance improvement analysis was
carried out using the (14).
𝐼𝑝𝑒𝑟 =
(𝑇𝑒𝑥𝑖𝑠𝑡−𝑇𝑑𝑒𝑣𝑒𝑙𝑜𝑝𝑒𝑑)
𝑇𝑒𝑥𝑖𝑠𝑡
100% (14)
Where 𝐼𝑝𝑒𝑟 refers to the improved percentage, 𝑇𝑒𝑥𝑖𝑠𝑡 refers to the value of the existing scheme, and 𝑇𝑑𝑒𝑣𝑒𝑙𝑜𝑝𝑒𝑑
refers to the value of the developed scheme.
Figure 1. Simulation interface for the modified identity-based cryptosystem
4. RESULTS AND DISCUSSION
The IDR which is the ratio of the detected number of vehicles trying to break into the network to
vehicles not detected was analysed. The simulated vehicles were divided into two parts, 70% of the vehicles
were unregistered and invalid vehicles and made to intrude into the network, while the remaining 30% were
registered and valid members of the network. From the simulation, it was observed that all attempts made by
the intruding vehicles were rejected by the NCU. The result is shown in Table 1, and the percentage intrusion
detection rate for the number of incidents (vehicles) is shown in Figure 2.
In the same vein, the CT of the cryptographic process of the MIBC obtained is 1.17 ms. This is an
average result of running the cryptographic algorithm for an average of 1000 times. Also, the MIBC was
compared with the EIBC. In terms of CT, the CT for MIBC is 1.17 ms while that of EIBC is 1.70 ms. The result
shows that the MIBC has a lower computation time compared to the EIBC. Consequently, the percentage
improvement of the computation time of MIBC over the EIBC, shows that the MIBC has 31.18%
improvements over the EIBC. The IDR result for the MIBC and EIBC for different vehicles were compared.
The values are as shown in Table 2, and illustrated in Figure 3.
The overall average percentage of performance improvement analysis of intrusion detection rate in
the MIBC and EIBC is presented in Figure 4. The result shows that the MIBC has a total average of 98.5%
intrusion detection rate compare to the EIBC which has a 93.2% intrusion detection rate. This is a 5.4%
performance improvement over EIBC. The results presented show that the performance of MIBC gets better
even with an increase in the number of vehicles released into the network which is a great improvement
compared to EIBC.
6. ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 21, No. 5, October 2023: 1005-1012
1010
Table 1. Intrusion detection ratios
No. of vehicle Total no. of incidents No. of incidents successfully detected % IDR
50 35 33 94.3
100 70 69 98.6
150 105 103 99.1
200 140 139 99.3
Figure 2. Intrusion detection rate for the number of
incidents (vehicles)
Figure 3. Comparison of intrusion detection rate
in the MIBC and EIBC
Table 2. Intrusion detection ratio for the MIBC and EIBC
Vehicle density Intrusion detection ratio for MIBC system (%) Intrusion detection ratio for EIBC system (%)
50 97.1 91.4
100 98.6 92.9
150 99.1 94.3
200 99.3 94.3
Figure 4. Overall average intrusion detection analysis
5. CONCLUSION
In this paper, a variant IBC that ensures secure communication and prevention of intruders in
VANET was developed. An authentication system for users’ validation on the network was incorporated into
the system. The validation is done via the NCU in a handshake with the TA of the system to securely prevent
intrusion and ensures that only valid members of the network are allowed to join the network. The NCU of
the system securely prevents intrusion and ensures that only valid members of the network are allowed to
join the network. The result shows that the proposed MIBC outperforms the EIBC in IDR and CT
performance and shows the superiority of the security features in terms of users’ membership authentication.
ACKNOWLEDGEMENTS
Our sincere appreciation goes to the Department of Electronic and Electrical Engineering, Ladoke
Akintola University of Technology, Ogbomoso, Nigeria, for the provision of the conducive environment
upon whch this research was conducted.
7. TELKOMNIKA Telecommun Comput El Control
Improving the detection of intrusion in vehicular ad-hoc networks with … (Zachaeus K. Adeyemo)
1011
REFERENCES
[1] D. A. J. Al-Khaffaf and M. G. Al-Hamiri, “Performance evaluation of campus network involving VLAN and broadband
multimedia wireless networks using OPNET modeler,” TELKOMNIKA (Telecommunication, Computing, Electronics and
Control), vol. 19, no. 5, pp. 1490-1497, 2021, doi: 10.12928/TELKOMNIKA.v19i5.18531.
[2] Girish and Phaneendra H. D., “Identity-based cryptography and comparison with traditional public-key encryption: A survey,”
International Journal of Computer Science and Information Technologies (IJCSIT), vol. 5, no. 4, pp. 5521-5525, 2014. [Online].
Available: https://www.ijcsit.com/docs/Volume%205/vol5issue04/ijcsit20140504155.pdf
[3] J. Jenefa and E. A. M. Anita, “Secure vehicular communication using identity-based signature scheme,” Wireless Personal
Communication, vol. 98, pp. 1383-1411, 2018, doi: 10.1007/s11277-017-4923-7.
[4] J. Cui, W. Xu, H. Zhong, J. Zhang, Y. Xu, and L. Liu, “Privacy-preserving authentication using a double pseudonym for the
internet of vehicles,” Sensors, vol. 18, no. 5, 2018, doi: 10.3390/s18051453.
[5] H. Peng, L. Liang, X. Shen, and G. Y. Li, “Vehicular communications: a network layer perspective,” IEEE Transactions on
Vehicular Technology, vol. 68, no. 2, pp. 1064-1078, 2019, doi: 10.1109/TVT.2018.2833427.
[6] E. B. Ajulo, R. O. Akinyede, and O. S. Adewale, “Security threats and privacy issues in vehicular ad-hoc network (VANET):
survey and perspective,” Journal of Information, vol. 4, no. 1, 2018, doi: 10.18488/journal.104.2018.41.1.9.
[7] Y. Huang, X. Ma, Y. Liu, and Z. Yang, “Effective capacity maximization in beyond 5G vehicular networks: a hybrid deep
transfer learning method,” Wireless Communications and Mobile Computing, vol. 2021, 2021, doi: 10.1155/2021/8899094.
[8] F. A. Ghaleb, M. A. Maarof, A. Zainal, B. A. S. Al-Rimy, A. Alsaeedi, and W. Boulila, “Ensemble-based hybrid context-aware
misbehavior detection model for vehicular ad hoc network,” Remote Sensing, vol. 11, no. 23, 2019, doi: 10.3390/rs11232852.
[9] E. B. Ajulo, R. O. Akinyede, and O. S. Adewale, “Modeling of situation response time in vehicular ad-hoc network,” MATICS:
Jurnal Ilmu Komputer dan Teknologi Informasi, vol. 10, no. 1, pp. 1-7, 2018, doi: 10.18860/mat.v10i1.4785.
[10] H. F. Jassim, M. A. Tawfeeq, and S. M. Mahmoud, “Overlapped hierarchical clusters routing protocol for improving quality of
service,” TELKOMNIKA (Telecommunication, Computing, Electronics and Control), vol. 19, no. 3, pp. 705-715, 2021,
doi: 10.12928/TELKOMNIKA.v19i3.18354.
[11] D. Manivannan, S. S. Moni, and S. Zeadally, “Secure authentication and privacy-preserving techniques in vehicular ad-hoc
networks (VANETs),” Vehicular Communications, vol. 25, 2020, doi: 10.1016/j.vehcom.2020.100247.
[12] F. A. Ghaleb et al., “Misbehavior-aware on-demand collaborative intrusion detection system using distributed ensemble learning
for VANET,” Electronics, vol. 9, no. 9, 2020, doi: 10.3390/electronics9091411.
[13] B. A. S. Al-Rimy et al., “A pseudo feedback-based annotated TF-IDF technique for dynamic crypto-ransomware pre-encryption
boundary delineation and features extraction,” IEEE Access, vol. 8, pp. 140586-140598, 2020, doi: 10.1109/ACCESS.2020.3012674.
[14] S. Sharma and A. Kaul, “A survey on intrusion detection systems and honeypot based proactive security mechanisms in VANETs
and VANET cloud,” Vehicular Communication, vol. 12, pp. 138-164, 2018, doi: 10.1016/j.vehcom.2018.04.005.
[15] J. Liang, J. Chen, Y. Zhu, and R. Yu, “A novel intrusion detection system for vehicular ad hoc networks (VANETs) based on
differences of traffic flow and position,” Application Soft Computing, vol. 75, pp. 712-727, 2019, doi: 10.1016/j.asoc.2018.12.001.
[16] Y. Zhou, S. Liu, M. Xiao, S. Deng, and X. Wang, “An efficient V2I authentication scheme for VANETs,” Mobile Information
Systems, 2018, doi: 10.1155/2018/4070283.
[17] S. Zeng, Y. Huang, and X. Liu, “Privacy-preserving communication for VANETs with conditionally anonymous ring signature,”
International Journal Network Security, vol. 17, no. 2, pp. 135-141, 2015. [Online]. Available:
http://ijns.jalaxy.com.tw/contents/ijns-v17-n2/ijns-v17-n2.pdf#page=37
[18] C. Wan and J. Zhang, “Efficient identity-based transmission for VANET,” Journal of Ambient Intelligence and Humanized
Computing, vol. 9, pp. 1861-1871, 2018, doi: 10.1007/s12652-017-0650-x.
[19] F. A. Ghaleb, M. A. Maarof, A. Zainal, B. A. S. Al-Rimy, F. Saeed, and T. Al-Hadhrami, “Hybrid and multifaceted context-aware
misbehavior detection model for vehicular ad hoc network,” IEEE Access, vol. 7, pp. 159119-159140, 2019,
doi: 10.1109/ACCESS.2019.2950805.
[20] M. Lee and T. Atkison, “VANET applications: Past, present, and future,” Vehicular Communications, vol. 28, 2021,
doi: 10.1016/j.vehcom.2020.100310.
[21] S. Zhang, Y. Liu, Y. Xiao, and R. He, “A trust based adaptive privacy preserving authentication scheme for VANETs,” Vehicular
Communication, vol. 37, 2022, doi: 10.1016/j.vehcom.2022.100516.
[22] A. F. Abbas, U. U. Sheikh, F. T. Al-Dhief, and M. N. H. Mohd, “A comprehensive review of vehicle detection using computer
vision,” TELKOMNIKA (Telecommunication, Computing, Electronics and Control), vol. 19, no. 3, pp. 838-850, 2021,
doi: 10.12928/TELKOMNIKA.v19i3.12880.
[23] V. H. La and A. Cavalli, “Security attacks and solutions in vehicular ad-hoc networks: A survey,” International Journal on
AdHoc Networking Systems (IJANS), vol. 4, no. 2, pp. 1-20, 2014, doi: 10.5121/ijans.2014.4201.
[24] B. Ji et al., “Survey on the internet of vehicles: network architectures and applications,” IEEE Communications Standards
Magazine, vol. 4, no. 1, pp. 34-41, 2020, doi: 10.1109/MCOMSTD.001.1900053.
[25] F. Mezrag, S. Bitam, and A. Mellouk, “An efficient and lightweight identity-based scheme for secure communication in clustered
wireless sensor networks,” Journal of Network and Computer Applications, vol. 200, 2022, doi: 10.1016/j.jnca.2021.103282.
[26] Y. Chen, Y. Wang, M. Liu, J. Zhang, and L. Jiao, “Network slicing enabled resource management for service-oriented ultra-
reliable and low-latency vehicular networks,” IEEE Transactions on Vehicular Technology, vol. 69, no. 7, pp. 7847–7862, 2020,
doi: 10.1109/TVT.2020.2991723.
[27] B. A. S. Al-Rimy, M. A. Maarof, and S. Z. M. Shaid, “Crypto-ransomware early detection model using novel incremental
bagging with enhanced semi-random subspace selection,” Future Generation Computer Systems, vol. 101, pp. 476-491, 2019,
doi: 10.1016/j.future.2019.06.005.
8. ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 21, No. 5, October 2023: 1005-1012
1012
BIOGRAPHIES OF AUTHORS
Zachaeus K. Adeyemo received his B.Eng., M.Eng. degrees in Electrical
Engineering from University of Ilorin, Ilorin, Nigeria in 1994 and 2002, respectively, and
Ph.D. in Electronic and Electrical Engineering (Communication Engineering) from Ladoke
Akintola University of Technology (LAUTECH), Ogbomoso, Nigeria in 2009. He joined the
services of Ladoke Akintola University of Technology (LAUTECH) Ogbomoso in 1995 as a
Graduate Assistant in the department of Electronic and Electrical Engineering and rose from
this lowest level of the academic cadre through all the ranks until he was promoted to a full-
fledged Professor. His current research interests are wireless communications, signal
processing in communication systems, development of a path-loss prediction model using
adaptive neuro-fuzzy inference system, spectrum detection in a cognitive radio network. Prof.
Adeyemo is a corporate member, Nigerian Society of Engineers (MNSE), Registered member
of Council for the Regulation of Engineering in Nigeria (R. COREN) and Member, Africa
Engineering Education Association (AEEA). He can be contacted at email:
zkadeyemo@lautech.edu.ng.
Emmanuel B. Ajulo received his B.Tech and M.Tech degrees in Electronic and
Electrical Engineering from Ladoke Akintola University of Technology (LAUTECH),
Ogbomoso, Nigeria; and M.Tech and Ph.D degrees in Computer Science from the Federal
University of Technology, Akure, Nigeria in 2015 and 2020 respectively. He’s reputable for
developing I.T architectures and security frameworks to drive communication systems. He is a
member of Nigeria Society of Engineers, member of Nigeria Computing Society, and a
registered engineer with the Council for the Regulation of Engineering in Nigeria (COREN).
His research interest is on computational cryptography, signal processing, machine learning,
and artificial intelligence. He can be contacted at email: emmanuelajulo@gmail.com.
Damilare O. Akande obtained his B. Tech and M. Tech degrees in Electronic and
Electrical Engineering from Ladoke Akintola University of Technology (LAUTECH),
Ogbomoso and the Federal University of Technology, Akure, Nigeria in 2008 and 2012
respectively. He obtained his Ph. D degree from University Sans Malaysia, Malaysia in 2019.
He is a member of Nigeria Society of Engineers and a registered member of COREN. His
research interest is on signal processing, cooperative communications and MAC layer design.
He can be contacted at email: doakande@lautech.edu.ng.
Hammed O. Lasisi is a senior lecturer and researcher in the Department of
Electrical and Electronics Engineering, Osun State University, Osogbo, Nigeria. He holds
doctorate (Ph.D) and master’s degrees in Elecctrical and Electronics Engineering from
University of Ilorin, Nigeria. His area of specialization is telecommunication and telegraphic
engineering. He is a registered member of the Council for the Regulation of Engineering
(COREN) in Nigeria. He can be contacted at email: hammed.lasis@uniosun.edu.ng.
Samson I. Ojo received his B. Tech and M. Tech degrees in Electronic and
Electrical Engineering in 2011 and 2018, respectively, from Ladoke Akintola University of
Technology (LAUTECH), Ogbomoso, Nigeria. He is a registered member of Council for the
Regulation of Engineering in Nigeria (COREN). He obtained his Ph.D. in mobile
communication in the year 2021. His research interest is on signal processing, diversity and
cognitive radio. He can be contacted at email: siojo83@lautech.edu.ng.