The wide use of vehicular ad hoc networks (VANETs) in the last decade has led many researchers to find efficient and reliable methods to obtain the desired benefits and offer services, such as healthcare and traffic management. However, VANETs suffer from security issues represented by authentication and data integrity. In this paper, we propose a robust mutual authentication scheme based on elliptic curve cryptography (ECC), cryptography Hash Function, and a pseudonym. The proposed work was twofold in focus: first, on healthcare in emergency cars which use VANETs, and second, on overcoming security issues, such as resisting familiar attacks (e.g. insider attacks and reply attacks). Because of the serious situation generated by the worldwide outbreak of the Covid-19 epidemic, we also found this research valuable in supporting global efforts to combat the rapid spread of this virus, by finding the safest and fastest routes to epidemic treatment centres for medical staff, assistance teams in medical operations, fumigation control, and all work teams associated with disease control. This research attempts to contribute by proposing a special signal used to define epidemic teams. The best route, fast route can be chosen by using VANETs infrastructure. This scheme also deals with metric security features, such as key management, data integrity, and data privacy. In the communication and computation cost, we noticed that our proposed scheme achieved good results compared with the related works
Security schemes based on conditional privacy-preserving vehicular ad hoc net...nooriasukmaningtyas
Recently, vehicular ad hoc networks (VANETs) have been garnering
significant inter-est from the people involved in transportation field.
Nowadays automotive manufactur-ers have already supplying vehicles with
multitude of road sensors that provides many useful characteristics. VANET
communication not only offers the drivers and passen-gers with the various
safety related services but also provides a wide range of valuable
applications. However, the inherent openness of the wireless communication
medium used by VANETs exposes vehicles to various security and privacy
issues. Researchers have proposed many security schemes to solve the issues
mentioned above for the widespread deployment of VANETs. However,
these schemes failed to fulfill all as-pects of security and privacy
requirements. Besides, these schemes have not provided the performance
parameters such as computation and communication costs. The pri-mary
emphasis of this paper is on the taxonomy of security schemes based
conditional privacy-preserving with respect to strengths and limitations.
Besides, a comparison be-tween these schemes related to the model of
security and privacy requirements, attacks, and performance parameters is
provided. Finally, this paper critically reviews the re-lated works by taking
into consideration the design and development of all VANETs security and
privacy schemes, this paper could serve as a guide and reference.
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...IJCNCJournal
Vehicular Ad-hoc network (VANET) is one of the emerging technologies for research community to get various research challenges to construct secured framework for autonomous vehicular communication. The prime concern of this technology is to provide efficient data communication among registered vehicle nodes. The several research ideas are implemented practically to improve overall communication in VANETs by considering security and privacy as major aspects of VANETs. Several mechanisms have been implemented using cryptography algorithms and methodologies. However, these mechanisms provide a solution only for some restricted environments and to limited security threats. Hence, the proposed novel mechanism has been introduced, implemented and tested using key management technique. It provides secured network environment for VANET and its components. Later, this mechanism provides security for data packets of emergency messages using cryptography mechanism. Hence, the proposed novel mechanism is named Group Key Management & Cryptography Schemes (GKMC). The experimental analysis shows significant improvements in the network performance to provide security and privacy for emergency messages. This GKMC mechanism will help the VANET user’s to perform secured emergency message communication in network environment.
Today, a growing number of vehicles are equipped with communication devices to facilitate vehicle to vehicle and vehicle to infrastructure communication and increase the safety of passengers. A new type of network called Vehicular Network VANET provides us with the infrastructure for developing new systems to enhance drivers' and passengers' safety and comfort. Vehicular networks are special types of mobile ad hoc networks that are used to help drivers access necessary information. This paper provides an introduction to vehicular networks. Matthew N. O. Sadiku | Uwakwe C. Chukwu | Abayomi Ajayi-Majebi | Sarhan M. Musa "Vehicular Networking" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-6 , October 2021, URL: https://www.ijtsrd.com/papers/ijtsrd46451.pdf Paper URL : https://www.ijtsrd.com/engineering/electrical-engineering/46451/vehicular-networking/matthew-n-o-sadiku
In vehicular ad hoc network (VANETs), the applications mainly focused on the road challenging subclass of Mobile Ad-hoc Network, which empowers smart transmission among vehicles and between vehicles and roadside frameworks. It is an optimistic methodology for the Intelligent Transport System (ITS). There are numerous difficulties to be tended while utilizing VANET. It is flexible and has a high dynamic topology and flexibility which makes the conventional MANET protocols unacceptable for VANET. Trust is a principal element which is used to create a trustful environment to improve the security in vehicular networks. Trust can be calculated by observing the human behavior which creates a trusted communicating environment. In this paper, we define the architecture of VANET, then the communication establishment and various challenges. Some trust models had been defined in this paper to enforce honest information sharing between communicating nodes. Trust establishment is compulsory among communicating vehicles to build a secure messages exchange and reliability.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...Dr. Amarjeet Singh
Vehicles in a vehicular ad-hoc network (VANET) broadcast information about the driving environment in the road. Due to the open-access environment, this means that the VANET is susceptible to security and privacy issues. However, none of the related works satisfies all security and privacy requirements. Besides, their proposed has huge overhead in terms of computation and communication. To address the above issues, we will propose the security and privacy scheme based on Elliptic Curve Cryptography (ECC) and one secure hash function. Hence the reliability of each message being signed and checked has been improved. The main aim of this work is to satisfy all aspect requirements of security and privacy and reduce the computational complexity of the system.
A heterogeneous short-range communication platform for Internet of Vehicles IJECEIAES
The automotive industry is rapidly accelerating toward the development of innovative industry applications that feature management capabilities for data and applications alike in cars. In this regard, more internet of vehicles solutions are emerging through advancements of various wireless medium access-control technologies and the internet of things. In the present work, we develop a short-range communication–based vehicular system to support vehicle communication and remote car control. We present a combined hardware and software testbed that is capable of controlling a vehicle’s start up, operation and several related functionalities covering various vehicle metric data. The testbed is built from two microcontrollers, Arduino and Raspberry Pi 3, each of which individually controls certain functions to improve the overall vehicle control. The implementation of the heterogeneous communication module is based on the IEEE 802.11 and IEEE 802.15 medium access control technologies. Further, a control module on a smartphone was designed and implemented for efficient management. Moreover, we study the system connectivity performance by measuring various important parameters including the coverage distance, signal strength, download speed and latency. This study covers the use of this technology setup in different geographical areas over various time spans.
Security schemes based on conditional privacy-preserving vehicular ad hoc net...nooriasukmaningtyas
Recently, vehicular ad hoc networks (VANETs) have been garnering
significant inter-est from the people involved in transportation field.
Nowadays automotive manufactur-ers have already supplying vehicles with
multitude of road sensors that provides many useful characteristics. VANET
communication not only offers the drivers and passen-gers with the various
safety related services but also provides a wide range of valuable
applications. However, the inherent openness of the wireless communication
medium used by VANETs exposes vehicles to various security and privacy
issues. Researchers have proposed many security schemes to solve the issues
mentioned above for the widespread deployment of VANETs. However,
these schemes failed to fulfill all as-pects of security and privacy
requirements. Besides, these schemes have not provided the performance
parameters such as computation and communication costs. The pri-mary
emphasis of this paper is on the taxonomy of security schemes based
conditional privacy-preserving with respect to strengths and limitations.
Besides, a comparison be-tween these schemes related to the model of
security and privacy requirements, attacks, and performance parameters is
provided. Finally, this paper critically reviews the re-lated works by taking
into consideration the design and development of all VANETs security and
privacy schemes, this paper could serve as a guide and reference.
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...IJCNCJournal
Vehicular Ad-hoc network (VANET) is one of the emerging technologies for research community to get various research challenges to construct secured framework for autonomous vehicular communication. The prime concern of this technology is to provide efficient data communication among registered vehicle nodes. The several research ideas are implemented practically to improve overall communication in VANETs by considering security and privacy as major aspects of VANETs. Several mechanisms have been implemented using cryptography algorithms and methodologies. However, these mechanisms provide a solution only for some restricted environments and to limited security threats. Hence, the proposed novel mechanism has been introduced, implemented and tested using key management technique. It provides secured network environment for VANET and its components. Later, this mechanism provides security for data packets of emergency messages using cryptography mechanism. Hence, the proposed novel mechanism is named Group Key Management & Cryptography Schemes (GKMC). The experimental analysis shows significant improvements in the network performance to provide security and privacy for emergency messages. This GKMC mechanism will help the VANET user’s to perform secured emergency message communication in network environment.
Today, a growing number of vehicles are equipped with communication devices to facilitate vehicle to vehicle and vehicle to infrastructure communication and increase the safety of passengers. A new type of network called Vehicular Network VANET provides us with the infrastructure for developing new systems to enhance drivers' and passengers' safety and comfort. Vehicular networks are special types of mobile ad hoc networks that are used to help drivers access necessary information. This paper provides an introduction to vehicular networks. Matthew N. O. Sadiku | Uwakwe C. Chukwu | Abayomi Ajayi-Majebi | Sarhan M. Musa "Vehicular Networking" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-6 , October 2021, URL: https://www.ijtsrd.com/papers/ijtsrd46451.pdf Paper URL : https://www.ijtsrd.com/engineering/electrical-engineering/46451/vehicular-networking/matthew-n-o-sadiku
In vehicular ad hoc network (VANETs), the applications mainly focused on the road challenging subclass of Mobile Ad-hoc Network, which empowers smart transmission among vehicles and between vehicles and roadside frameworks. It is an optimistic methodology for the Intelligent Transport System (ITS). There are numerous difficulties to be tended while utilizing VANET. It is flexible and has a high dynamic topology and flexibility which makes the conventional MANET protocols unacceptable for VANET. Trust is a principal element which is used to create a trustful environment to improve the security in vehicular networks. Trust can be calculated by observing the human behavior which creates a trusted communicating environment. In this paper, we define the architecture of VANET, then the communication establishment and various challenges. Some trust models had been defined in this paper to enforce honest information sharing between communicating nodes. Trust establishment is compulsory among communicating vehicles to build a secure messages exchange and reliability.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...Dr. Amarjeet Singh
Vehicles in a vehicular ad-hoc network (VANET) broadcast information about the driving environment in the road. Due to the open-access environment, this means that the VANET is susceptible to security and privacy issues. However, none of the related works satisfies all security and privacy requirements. Besides, their proposed has huge overhead in terms of computation and communication. To address the above issues, we will propose the security and privacy scheme based on Elliptic Curve Cryptography (ECC) and one secure hash function. Hence the reliability of each message being signed and checked has been improved. The main aim of this work is to satisfy all aspect requirements of security and privacy and reduce the computational complexity of the system.
A heterogeneous short-range communication platform for Internet of Vehicles IJECEIAES
The automotive industry is rapidly accelerating toward the development of innovative industry applications that feature management capabilities for data and applications alike in cars. In this regard, more internet of vehicles solutions are emerging through advancements of various wireless medium access-control technologies and the internet of things. In the present work, we develop a short-range communication–based vehicular system to support vehicle communication and remote car control. We present a combined hardware and software testbed that is capable of controlling a vehicle’s start up, operation and several related functionalities covering various vehicle metric data. The testbed is built from two microcontrollers, Arduino and Raspberry Pi 3, each of which individually controls certain functions to improve the overall vehicle control. The implementation of the heterogeneous communication module is based on the IEEE 802.11 and IEEE 802.15 medium access control technologies. Further, a control module on a smartphone was designed and implemented for efficient management. Moreover, we study the system connectivity performance by measuring various important parameters including the coverage distance, signal strength, download speed and latency. This study covers the use of this technology setup in different geographical areas over various time spans.
LSKA-ID: A lightweight security and key agreement protocol based on an identi...TELKOMNIKA JOURNAL
Recently, a huge effort has been pushed to the wireless broadcasting nature in the open area. However, the vehicular ad hoc network (VANET) is disposed to various kinds of attacks. Hence, keeping the security in VANET is the most critical issue because of the VANET network related to human life. Thus, we propose a robust and lightweight security and key agreement-based identity protocol LSKA-ID for vehicular communication. Our protocol utilizes the elliptic curve cryptography, Chinese reminder theorem, and identity (ID)-based cryptosystem to resolve the issues found in the previously proposed schemes, in which our protocol can resolve the key escrow issues accompanied in most ID-based schemes. Also, it does not need batch verification operations, which cause some problems to the verifier in case the batch beacons have one or more illegal beacons. Moreover, the LSKA-ID protocol addresses the dependency on the trusted authority (TA) during the high frequent handover between the groups that may cause a bottleneck problem on the TA. The security analysis proves the correctness of the LSKA-ID protocol by using the random oracle model and has shown to be effective in a performance evaluation.
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...TELKOMNIKA JOURNAL
Vehicular ad-hoc networks (VANETs) are wireless-equipped vehicles that form networks along the road. The security of this network has been a major challenge. The identity-based cryptosystem (IBC) previously used to secure the networks suffers from membership authentication security features. This paper focuses on improving the detection of intruders in VANETs with a modified identity-based cryptosystem (MIBC). The MIBC is developed using a non-singular elliptic curve with Lagrange interpolation. The public key of vehicles and roadside units on the network are derived from number plates and location identification numbers, respectively. Pseudo-identities are used to mask the real identity of users to preserve their privacy. The membership authentication mechanism ensures that only valid and authenticated members of the network are allowed to join the network. The performance of the MIBC is evaluated using intrusion detection ratio (IDR) and computation time (CT) and then validated with the existing IBC. The result obtained shows that the MIBC recorded an IDR of 99.3% against 94.3% obtained for the existing identity-based cryptosystem (EIBC) for 140 unregistered vehicles attempting to intrude on the network. The MIBC shows lower CT values of 1.17 ms against 1.70 ms for EIBC. The MIBC can be used to improve the security of VANETs.
Preparing for CV Deployment read ahead 9-8-18raymurphy9533
The fundamental premise of the connected vehicle environment lies in the power of wireless connectivity among vehicles (V2V communications), the infrastructure (V2I communications), and mobile devices to bring about transformative changes in highway safety, mobility, and the environmental impacts of the transportation system.
Automotive Ethernet architecture and security: challenges and technologies IJECEIAES
Vehicle infrastructure must address the challenges posed by today's advances toward connected and autonomous vehicles. To allow for more flexible architectures, high-bandwidth connections and scalability are needed to connect many sensors and electronic control units (ECUs). At the same time, deterministic and low latency is a critical and significant design requirement to support urgent real-time applications in autonomous vehicles. As a recent solution, the time-sensitive network (TSN) was introduced as Ethernet-based amendments in IEEE 802.1 TSN standards to meet those needs. However, it had hurdle to be overcome before it can be used effectively. This paper discusses the latest studies concerning the automotive Ethernet requirements, including transmission delay studies to improve worst-case end-to-end delay and end-to-end jitter. Also, the paper focuses on the securing Ethernet-based in-vehicle networks (IVNs) by reviewing new encryption and authentication methods and approaches.
The main aim of this dissertation is to evaluate the performance of Four routing protocols i.e. Destination Sequence Distance Vector Routing (DSDV), Ad hoc On Demand Distance Vector (AODV),survey over vanet routing protocols for vehicle to vehicle communication
Master Thesis on Vehicular Ad-hoc Network (VANET)Prof Ansari
In present, many people during the public died each year in vehicle accidents, therefore in almost countries some safety data i.e. traffic lights & velocity limits are applied, simply however it is not a better solution. Also government and number of automation industries regarded that vehicular safety is real challenging task [1]. Then equally result, to enhance people traffic safety of a new progressed particular technology is formulated i.e. VANET [4]. It is progress type of MANET (Mobile Ad-hoc Network). VANET manages a network within which vehicles are act nodes and applied as mobile nodes to construct a robust infrastructure-less ad-hoc network. In Figure 1 illustrates the basic components of VANET architecture. It builds the network among Inter-Vehicle, Vehicle-to-Roadside and Inter-Roadside communicating networks [4]. Moreover, apart from accidental-safety and security types, there are also broad varieties of applications in VANET are available and potential that can extend passenger comfort like predictable mobility by GPS, web browsing and information modify and so on. Vehicular Ad-hoc Network (VANET) is a novel formulated form of Mobile Ad-hoc Network (MANET), where moving nodes are vehicles same automobiles, cars, buses etc [2].
A novel key management protocol for vehicular cloud securityTELKOMNIKA JOURNAL
Vehicular cloud computing (VCC) is a new hybrid technology which has become an outstanding area of research. VCC combines salient features of cloud computing and wireless communication technology to help drivers in network connectivity, storage space availability and applications. VCC is formed by dynamic cloud formation by moving vehicles. Security plays an important role in VCC communication. Key management is one of the important tasks for security of VCC. This paper proposes a novel key management protocol for VCC security. Proposed scheme is based on Elliptical Curve Cryptography (ECC). The simulation results demonstrated that the proposed protocol is efficient compared to existing key management algorithms in terms of key generation time, memory usage and cpu utilization.
Vehicular Ad hoc Network (VANET) is the favorable method to enhance the safety of divers and passengers. It becomes a basic element of the Intelligent Transportation System (ITS). It has created by applying the concepts of Mobile Ad Hoc Networks (MANETs) – which is an application of a wireless network for exchanging the data – to the domain of vehicles. They become a main element of intelligent transportation systems. In existing technique drawback is the Authentication Server (AS) gives all the working to Law Executor (LE) means AS send information to RSU, RSU send this information to law executor and then login process start but if LE behave maliciously then this authentication process fail. In our propose work, we calculate the trust of each vehicle's on the basis of their behavior. Each vehicle calculates the trust of its neighbor and send this value to AS by RSU then AS update these values and then broadcast this value by RSU, now all the vehicles have a trust value of its neighboring vehicles so that send the data by using hashing technique and use trusted path to send data source to a destination so that security enhances.
SECURITY ISSUES AND SOLUTIONS IN VEHICULAR ADHOC NETWORK : A REVIEW APPROACHcscpconf
Vehicular networks are the promising approach to provide safety to the drivers. It becomes a key component of intelligent transport system. A lot of research work has been done towards it but security issue got less attention. In this article we discuss about the VANET, it's technical and security challenges. We also discuss some major attacks and solutions that can be
implemented against these attacks. We compare the solution on different parameters and lastly discuss the mechanisms that are used in the solutions
Security issues and solutions in vehicular adhoc network a review approachcsandit
Vehicular networks are the promising approach to provide safety to the drivers. It becomes a
key component of intelligent transport system. A lot of research work has been done towards it
but security issue got less attention. In this article we discuss about the VANET, it's technical
and security challenges. We also discuss some major attacks and solutions that can be
implemented against these attacks. We compare the solution on different parameters and lastly
discuss the mechanisms that are used in the solutions.
Cyber DoS attack-based security simulator for VANET IJECEIAES
At the late years, researches focused on the cyber denial of service (DoS) attacks in the vehicle ad hoc networks (VANETS). This is due to high importance of ensuring the save receiving of information in terms of vehicle to vehicle (V2V), vehicle to infrastructure (V2I) and Vehicle to Road side unit (V2R). In this paper, a cyber-security system is proposed to detect and block the DoS attacks in VANET. In addition, a simulator for VENAT based on lightweight authentication and key exchange is presented to simulate the network performance and attacks. The proposed system consists of three phases: registration, authentication as well as communications and DoS attack detection. These phases improve the system ability to detect the attacks in efficient way. Each phase working is based in a proposed related algorithm under the guidance of lightweight protocol. In order to test the proposed system, a prototype is considered includes six cars and we adopt police cars due to high importance of exchanged information. Different case studies have been considered to evaluate the proposed system and the obtained results show a high efficiency of performance in terms of information exchange and attack detection.
A Synopsis of Simulation and Mobility Modeling in Vehicular Ad-hoc Networks (...IOSR Journals
Abstract : Vehicular communication is considered to be a backbone for many critical safety applications. In
order to achieve a better implementation of any vehicular communication scenario, an efficient, accurate and
reliable simulator is essential. Various open source and commercial simulating tools are available for this
purpose. One of the key issues in this regard is the selection of a reliable simulator which implements all
standard algorithms and paradigms giving accurate results. In this paper, we first present IEEE standard and
protocols for vehicular communication, IEEE 802.11p and IEEE 1609.x, also known as WAVE protocol stack.
The paper then discusses the necessary requirements for a generic discrete event simulator which can be used to
simulate Vehicular Ad-hoc Networks. Since not all the network simulators can be used in the scenario of
vehicular communication, we highlight the key features of some network simulators in the context of vehicular
ad-hoc networks. The paper also highlights some of the implementation limitations in these simulators.
Furthermore, the paper presents a discussion on traffic simulators by emphasizing on the underlying mobility
models used in order to generate the realistic traffic patterns. A comparative study of both network and traffic
simulators show the pros and cons of these simulation tools. The paper suggests the appropriate choice of a
network simulator to be used as a VANET simulator.
Keywords: VANET, IEEE 802.11p, WAVE-PHY, WAVE-MAC, Simulators, Modeling
Insights of 6G and artificial intelligence-based internet-of-vehicle towards ...IAESIJAI
The significance of internet-of-vehicle (IoV) is spontaneously increasing with exponentially rising demands towards transportation system and road safety. At present, there are various number of scientific approaches which is meant for leveraging the communication performance in IoV, but yet the problem still exists over multiple attributes e.g. resource management, privacy, security, and service offloading. Such problems are anticipated to be solved by 6G services that offers better communication capabilities compared to its prior version of 5G. At the same time, the quality of communication system can be enhanced by artificial intelligence (AI), which is capable of solving complex real-world problems. Therefore, this manuscript offers an insight towards strength and weakness of existing 6G based study model as well as AI-based solution in order to contribute towards highlighting an essential research gap that could directly offer better insight towards future planning towards improving communication in IoV.
Comparative study of proactive and reactive routing protocols in vehicular ad...IJECEIAES
In recent years, the vehicular ad-hoc network (VANET), which is an ad-hoc network used by connected autonomous vehicles (CAV) for information processing, has attracted the interest of researchers in order to meet the needs created by the accelerating development of autonomous vehicle technology. The enormous amount of information and the high speed of the vehicles require us to have a very reliable communication protocol. The objective of this paper is to determine a topology-based routing protocol that improves network performance and guarantees information traffic over VANET. This comparative study was carried out using the simulation of urban mobility (SUMO) and network simulator (NS-3). Through the results obtained, we will show that the choice of the type of protocol to use depends on the size of the network and also on the metrics to be optimized.
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolEditor IJCATR
A VANET facilitates communicate between vehicles and between vehicles and infrastructure. Vehicular Ad-Hoc Network
is a sub type of Mobile Ad-Hoc Network i.e. MANET. Now days, road traffic activities are one of the most important daily routines
worldwide. VANET provides you most of information that are required for better safety and driving such as an accurate weather
description or early warnings of upcoming dangers. To successfully deploy VANET, security is one of the major challenges such as
protection from selfish vehicles that may block or mess traffic, bogus notifications etc. that may harm and losses lives, that must be
addressed. Sybil attacks have become a serious threat as they can affect the functionality of VANETs for the benefit of the attacker.
The Sybil attack is the case where a single faulty entity, called a malicious node, can create multiple identities known as Sybil nodes or
fake nodes. This project detects and prevents the Sybil attack using “Secure Routing for Ad Hoc Network” (SRAN) routing protocol.
SRAN is based on AODV protocol. In our proposed work, we have developed SRAN protocol to maintain routing information and
route discovery in such manner that will detect as well as prevent Sybil Attack. Each node will have a unique identity and their entry in
route table. SRAN Protocol easily detects such route that is not valid anymore for communication. It deletes all the related entries from
the routing table for those invalid routes.
Model predictive controller for a retrofitted heat exchanger temperature cont...nooriasukmaningtyas
This paper aims to demonstrate the practical aspects of process control theory for undergraduate students at the Department of Chemical Engineering at the University of Bahrain. Both, the ubiquitous proportional integral derivative (PID) as well as model predictive control (MPC) and their auxiliaries were designed and implemented in a real-time framework. The latter was realized through retrofitting an existing plate-and-frame heat exchanger unit that has been operated using an analog PID temperature controller. The upgraded control system consists of a personal computer (PC), low-cost signal conditioning circuit, national instruments USB 6008 data acquisition card, and LabVIEW software. LabVIEW control design and simulation modules were used to design and implement the PID and MPC controllers. The performance of the designed controllers was evaluated while controlling the outlet temperature of the retrofitted plate-and-frame heat exchanger. The distinguished feature of the MPC controller in handling input and output constraints was perceived in real-time. From a pedagogical point of view, realizing the theory of process control through practical implementation was substantial in enhancing the student’s learning and the instructor’s teaching experience.
Control of a servo-hydraulic system utilizing an extended wavelet functional ...nooriasukmaningtyas
Servo-hydraulic systems have been extensively employed in various industrial applications. However, these systems are characterized by their highly complex and nonlinear dynamics, which complicates the control design stage of such systems. In this paper, an extended wavelet functional link neural network (EWFLNN) is proposed to control the displacement response of the servo-hydraulic system. To optimize the controller's parameters, a recently developed optimization technique, which is called the modified sine cosine algorithm (M-SCA), is exploited as the training method. The proposed controller has achieved remarkable results in terms of tracking two different displacement signals and handling external disturbances. From a comparative study, the proposed EWFLNN controller has attained the best control precision compared with those of other controllers, namely, a proportional-integralderivative (PID) controller, an artificial neural network (ANN) controller, a wavelet neural network (WNN) controller, and the original wavelet functional link neural network (WFLNN) controller. Moreover, compared to the genetic algorithm (GA) and the original sine cosine algorithm (SCA), the M-SCA has shown better optimization results in finding the optimal values of the controller's parameters.
More Related Content
Similar to Towards design strong emergency and COVID-19 authentication scheme in VANET
LSKA-ID: A lightweight security and key agreement protocol based on an identi...TELKOMNIKA JOURNAL
Recently, a huge effort has been pushed to the wireless broadcasting nature in the open area. However, the vehicular ad hoc network (VANET) is disposed to various kinds of attacks. Hence, keeping the security in VANET is the most critical issue because of the VANET network related to human life. Thus, we propose a robust and lightweight security and key agreement-based identity protocol LSKA-ID for vehicular communication. Our protocol utilizes the elliptic curve cryptography, Chinese reminder theorem, and identity (ID)-based cryptosystem to resolve the issues found in the previously proposed schemes, in which our protocol can resolve the key escrow issues accompanied in most ID-based schemes. Also, it does not need batch verification operations, which cause some problems to the verifier in case the batch beacons have one or more illegal beacons. Moreover, the LSKA-ID protocol addresses the dependency on the trusted authority (TA) during the high frequent handover between the groups that may cause a bottleneck problem on the TA. The security analysis proves the correctness of the LSKA-ID protocol by using the random oracle model and has shown to be effective in a performance evaluation.
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...TELKOMNIKA JOURNAL
Vehicular ad-hoc networks (VANETs) are wireless-equipped vehicles that form networks along the road. The security of this network has been a major challenge. The identity-based cryptosystem (IBC) previously used to secure the networks suffers from membership authentication security features. This paper focuses on improving the detection of intruders in VANETs with a modified identity-based cryptosystem (MIBC). The MIBC is developed using a non-singular elliptic curve with Lagrange interpolation. The public key of vehicles and roadside units on the network are derived from number plates and location identification numbers, respectively. Pseudo-identities are used to mask the real identity of users to preserve their privacy. The membership authentication mechanism ensures that only valid and authenticated members of the network are allowed to join the network. The performance of the MIBC is evaluated using intrusion detection ratio (IDR) and computation time (CT) and then validated with the existing IBC. The result obtained shows that the MIBC recorded an IDR of 99.3% against 94.3% obtained for the existing identity-based cryptosystem (EIBC) for 140 unregistered vehicles attempting to intrude on the network. The MIBC shows lower CT values of 1.17 ms against 1.70 ms for EIBC. The MIBC can be used to improve the security of VANETs.
Preparing for CV Deployment read ahead 9-8-18raymurphy9533
The fundamental premise of the connected vehicle environment lies in the power of wireless connectivity among vehicles (V2V communications), the infrastructure (V2I communications), and mobile devices to bring about transformative changes in highway safety, mobility, and the environmental impacts of the transportation system.
Automotive Ethernet architecture and security: challenges and technologies IJECEIAES
Vehicle infrastructure must address the challenges posed by today's advances toward connected and autonomous vehicles. To allow for more flexible architectures, high-bandwidth connections and scalability are needed to connect many sensors and electronic control units (ECUs). At the same time, deterministic and low latency is a critical and significant design requirement to support urgent real-time applications in autonomous vehicles. As a recent solution, the time-sensitive network (TSN) was introduced as Ethernet-based amendments in IEEE 802.1 TSN standards to meet those needs. However, it had hurdle to be overcome before it can be used effectively. This paper discusses the latest studies concerning the automotive Ethernet requirements, including transmission delay studies to improve worst-case end-to-end delay and end-to-end jitter. Also, the paper focuses on the securing Ethernet-based in-vehicle networks (IVNs) by reviewing new encryption and authentication methods and approaches.
The main aim of this dissertation is to evaluate the performance of Four routing protocols i.e. Destination Sequence Distance Vector Routing (DSDV), Ad hoc On Demand Distance Vector (AODV),survey over vanet routing protocols for vehicle to vehicle communication
Master Thesis on Vehicular Ad-hoc Network (VANET)Prof Ansari
In present, many people during the public died each year in vehicle accidents, therefore in almost countries some safety data i.e. traffic lights & velocity limits are applied, simply however it is not a better solution. Also government and number of automation industries regarded that vehicular safety is real challenging task [1]. Then equally result, to enhance people traffic safety of a new progressed particular technology is formulated i.e. VANET [4]. It is progress type of MANET (Mobile Ad-hoc Network). VANET manages a network within which vehicles are act nodes and applied as mobile nodes to construct a robust infrastructure-less ad-hoc network. In Figure 1 illustrates the basic components of VANET architecture. It builds the network among Inter-Vehicle, Vehicle-to-Roadside and Inter-Roadside communicating networks [4]. Moreover, apart from accidental-safety and security types, there are also broad varieties of applications in VANET are available and potential that can extend passenger comfort like predictable mobility by GPS, web browsing and information modify and so on. Vehicular Ad-hoc Network (VANET) is a novel formulated form of Mobile Ad-hoc Network (MANET), where moving nodes are vehicles same automobiles, cars, buses etc [2].
A novel key management protocol for vehicular cloud securityTELKOMNIKA JOURNAL
Vehicular cloud computing (VCC) is a new hybrid technology which has become an outstanding area of research. VCC combines salient features of cloud computing and wireless communication technology to help drivers in network connectivity, storage space availability and applications. VCC is formed by dynamic cloud formation by moving vehicles. Security plays an important role in VCC communication. Key management is one of the important tasks for security of VCC. This paper proposes a novel key management protocol for VCC security. Proposed scheme is based on Elliptical Curve Cryptography (ECC). The simulation results demonstrated that the proposed protocol is efficient compared to existing key management algorithms in terms of key generation time, memory usage and cpu utilization.
Vehicular Ad hoc Network (VANET) is the favorable method to enhance the safety of divers and passengers. It becomes a basic element of the Intelligent Transportation System (ITS). It has created by applying the concepts of Mobile Ad Hoc Networks (MANETs) – which is an application of a wireless network for exchanging the data – to the domain of vehicles. They become a main element of intelligent transportation systems. In existing technique drawback is the Authentication Server (AS) gives all the working to Law Executor (LE) means AS send information to RSU, RSU send this information to law executor and then login process start but if LE behave maliciously then this authentication process fail. In our propose work, we calculate the trust of each vehicle's on the basis of their behavior. Each vehicle calculates the trust of its neighbor and send this value to AS by RSU then AS update these values and then broadcast this value by RSU, now all the vehicles have a trust value of its neighboring vehicles so that send the data by using hashing technique and use trusted path to send data source to a destination so that security enhances.
SECURITY ISSUES AND SOLUTIONS IN VEHICULAR ADHOC NETWORK : A REVIEW APPROACHcscpconf
Vehicular networks are the promising approach to provide safety to the drivers. It becomes a key component of intelligent transport system. A lot of research work has been done towards it but security issue got less attention. In this article we discuss about the VANET, it's technical and security challenges. We also discuss some major attacks and solutions that can be
implemented against these attacks. We compare the solution on different parameters and lastly discuss the mechanisms that are used in the solutions
Security issues and solutions in vehicular adhoc network a review approachcsandit
Vehicular networks are the promising approach to provide safety to the drivers. It becomes a
key component of intelligent transport system. A lot of research work has been done towards it
but security issue got less attention. In this article we discuss about the VANET, it's technical
and security challenges. We also discuss some major attacks and solutions that can be
implemented against these attacks. We compare the solution on different parameters and lastly
discuss the mechanisms that are used in the solutions.
Cyber DoS attack-based security simulator for VANET IJECEIAES
At the late years, researches focused on the cyber denial of service (DoS) attacks in the vehicle ad hoc networks (VANETS). This is due to high importance of ensuring the save receiving of information in terms of vehicle to vehicle (V2V), vehicle to infrastructure (V2I) and Vehicle to Road side unit (V2R). In this paper, a cyber-security system is proposed to detect and block the DoS attacks in VANET. In addition, a simulator for VENAT based on lightweight authentication and key exchange is presented to simulate the network performance and attacks. The proposed system consists of three phases: registration, authentication as well as communications and DoS attack detection. These phases improve the system ability to detect the attacks in efficient way. Each phase working is based in a proposed related algorithm under the guidance of lightweight protocol. In order to test the proposed system, a prototype is considered includes six cars and we adopt police cars due to high importance of exchanged information. Different case studies have been considered to evaluate the proposed system and the obtained results show a high efficiency of performance in terms of information exchange and attack detection.
A Synopsis of Simulation and Mobility Modeling in Vehicular Ad-hoc Networks (...IOSR Journals
Abstract : Vehicular communication is considered to be a backbone for many critical safety applications. In
order to achieve a better implementation of any vehicular communication scenario, an efficient, accurate and
reliable simulator is essential. Various open source and commercial simulating tools are available for this
purpose. One of the key issues in this regard is the selection of a reliable simulator which implements all
standard algorithms and paradigms giving accurate results. In this paper, we first present IEEE standard and
protocols for vehicular communication, IEEE 802.11p and IEEE 1609.x, also known as WAVE protocol stack.
The paper then discusses the necessary requirements for a generic discrete event simulator which can be used to
simulate Vehicular Ad-hoc Networks. Since not all the network simulators can be used in the scenario of
vehicular communication, we highlight the key features of some network simulators in the context of vehicular
ad-hoc networks. The paper also highlights some of the implementation limitations in these simulators.
Furthermore, the paper presents a discussion on traffic simulators by emphasizing on the underlying mobility
models used in order to generate the realistic traffic patterns. A comparative study of both network and traffic
simulators show the pros and cons of these simulation tools. The paper suggests the appropriate choice of a
network simulator to be used as a VANET simulator.
Keywords: VANET, IEEE 802.11p, WAVE-PHY, WAVE-MAC, Simulators, Modeling
Insights of 6G and artificial intelligence-based internet-of-vehicle towards ...IAESIJAI
The significance of internet-of-vehicle (IoV) is spontaneously increasing with exponentially rising demands towards transportation system and road safety. At present, there are various number of scientific approaches which is meant for leveraging the communication performance in IoV, but yet the problem still exists over multiple attributes e.g. resource management, privacy, security, and service offloading. Such problems are anticipated to be solved by 6G services that offers better communication capabilities compared to its prior version of 5G. At the same time, the quality of communication system can be enhanced by artificial intelligence (AI), which is capable of solving complex real-world problems. Therefore, this manuscript offers an insight towards strength and weakness of existing 6G based study model as well as AI-based solution in order to contribute towards highlighting an essential research gap that could directly offer better insight towards future planning towards improving communication in IoV.
Comparative study of proactive and reactive routing protocols in vehicular ad...IJECEIAES
In recent years, the vehicular ad-hoc network (VANET), which is an ad-hoc network used by connected autonomous vehicles (CAV) for information processing, has attracted the interest of researchers in order to meet the needs created by the accelerating development of autonomous vehicle technology. The enormous amount of information and the high speed of the vehicles require us to have a very reliable communication protocol. The objective of this paper is to determine a topology-based routing protocol that improves network performance and guarantees information traffic over VANET. This comparative study was carried out using the simulation of urban mobility (SUMO) and network simulator (NS-3). Through the results obtained, we will show that the choice of the type of protocol to use depends on the size of the network and also on the metrics to be optimized.
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolEditor IJCATR
A VANET facilitates communicate between vehicles and between vehicles and infrastructure. Vehicular Ad-Hoc Network
is a sub type of Mobile Ad-Hoc Network i.e. MANET. Now days, road traffic activities are one of the most important daily routines
worldwide. VANET provides you most of information that are required for better safety and driving such as an accurate weather
description or early warnings of upcoming dangers. To successfully deploy VANET, security is one of the major challenges such as
protection from selfish vehicles that may block or mess traffic, bogus notifications etc. that may harm and losses lives, that must be
addressed. Sybil attacks have become a serious threat as they can affect the functionality of VANETs for the benefit of the attacker.
The Sybil attack is the case where a single faulty entity, called a malicious node, can create multiple identities known as Sybil nodes or
fake nodes. This project detects and prevents the Sybil attack using “Secure Routing for Ad Hoc Network” (SRAN) routing protocol.
SRAN is based on AODV protocol. In our proposed work, we have developed SRAN protocol to maintain routing information and
route discovery in such manner that will detect as well as prevent Sybil Attack. Each node will have a unique identity and their entry in
route table. SRAN Protocol easily detects such route that is not valid anymore for communication. It deletes all the related entries from
the routing table for those invalid routes.
Similar to Towards design strong emergency and COVID-19 authentication scheme in VANET (20)
Model predictive controller for a retrofitted heat exchanger temperature cont...nooriasukmaningtyas
This paper aims to demonstrate the practical aspects of process control theory for undergraduate students at the Department of Chemical Engineering at the University of Bahrain. Both, the ubiquitous proportional integral derivative (PID) as well as model predictive control (MPC) and their auxiliaries were designed and implemented in a real-time framework. The latter was realized through retrofitting an existing plate-and-frame heat exchanger unit that has been operated using an analog PID temperature controller. The upgraded control system consists of a personal computer (PC), low-cost signal conditioning circuit, national instruments USB 6008 data acquisition card, and LabVIEW software. LabVIEW control design and simulation modules were used to design and implement the PID and MPC controllers. The performance of the designed controllers was evaluated while controlling the outlet temperature of the retrofitted plate-and-frame heat exchanger. The distinguished feature of the MPC controller in handling input and output constraints was perceived in real-time. From a pedagogical point of view, realizing the theory of process control through practical implementation was substantial in enhancing the student’s learning and the instructor’s teaching experience.
Control of a servo-hydraulic system utilizing an extended wavelet functional ...nooriasukmaningtyas
Servo-hydraulic systems have been extensively employed in various industrial applications. However, these systems are characterized by their highly complex and nonlinear dynamics, which complicates the control design stage of such systems. In this paper, an extended wavelet functional link neural network (EWFLNN) is proposed to control the displacement response of the servo-hydraulic system. To optimize the controller's parameters, a recently developed optimization technique, which is called the modified sine cosine algorithm (M-SCA), is exploited as the training method. The proposed controller has achieved remarkable results in terms of tracking two different displacement signals and handling external disturbances. From a comparative study, the proposed EWFLNN controller has attained the best control precision compared with those of other controllers, namely, a proportional-integralderivative (PID) controller, an artificial neural network (ANN) controller, a wavelet neural network (WNN) controller, and the original wavelet functional link neural network (WFLNN) controller. Moreover, compared to the genetic algorithm (GA) and the original sine cosine algorithm (SCA), the M-SCA has shown better optimization results in finding the optimal values of the controller's parameters.
Decentralised optimal deployment of mobile underwater sensors for covering la...nooriasukmaningtyas
This paper presents the problem of sensing coverage of layers of the ocean in three dimensional underwater environments. We propose distributed control laws to drive mobile underwater sensors to optimally cover a given confined layer of the ocean. By applying this algorithm at first the mobile underwater sensors adjust their depth to the specified depth. Then, they make a triangular grid across a given area. Afterwards, they randomly move to spread across the given grid. These control laws only rely on local information also they are easily implemented and computationally effective as they use some easy consensus rules. The feature of exchanging information just among neighbouring mobile sensors keeps the information exchange minimum in the whole networks and makes this algorithm practicable option for undersea. The efficiency of the presented control laws is confirmed via mathematical proof and numerical simulations.
Evaluation quality of service for internet of things based on fuzzy logic: a ...nooriasukmaningtyas
The development of the internet of thing (IoT) technology has become a major concern in sustainability of quality of service (SQoS) in terms of efficiency, measurement, and evaluation of services, such as our smart home case study. Based on several ambiguous linguistic and standard criteria, this article deals with quality of service (QoS). We used fuzzy logic to select the most appropriate and efficient services. For this reason, we have introduced a new paradigmatic approach to assess QoS. In this regard, to measure SQoS, linguistic terms were collected for identification of ambiguous criteria. This paper collects the results of other work to compare the traditional assessment methods and techniques in IoT. It has been proven that the comparison that traditional valuation methods and techniques could not effectively deal with these metrics. Therefore, fuzzy logic is a worthy method to provide a good measure of QoS with ambiguous linguistic and criteria. The proposed model addresses with constantly being improved, all the main axes of the QoS for a smart home. The results obtained also indicate that the model with its fuzzy performance importance index (FPII) has efficiently evaluate the multiple services of SQoS.
Low power architecture of logic gates using adiabatic techniquesnooriasukmaningtyas
The growing significance of portable systems to limit power consumption in ultra-large-scale-integration chips of very high density, has recently led to rapid and inventive progresses in low-power design. The most effective technique is adiabatic logic circuit design in energy-efficient hardware. This paper presents two adiabatic approaches for the design of low power circuits, modified positive feedback adiabatic logic (modified PFAL) and the other is direct current diode based positive feedback adiabatic logic (DC-DB PFAL). Logic gates are the preliminary components in any digital circuit design. By improving the performance of basic gates, one can improvise the whole system performance. In this paper proposed circuit design of the low power architecture of OR/NOR, AND/NAND, and XOR/XNOR gates are presented using the said approaches and their results are analyzed for powerdissipation, delay, power-delay-product and rise time and compared with the other adiabatic techniques along with the conventional complementary metal oxide semiconductor (CMOS) designs reported in the literature. It has been found that the designs with DC-DB PFAL technique outperform with the percentage improvement of 65% for NOR gate and 7% for NAND gate and 34% for XNOR gate over the modified PFAL techniques at 10 MHz respectively.
A review on techniques and modelling methodologies used for checking electrom...nooriasukmaningtyas
The proper function of the integrated circuit (IC) in an inhibiting electromagnetic environment has always been a serious concern throughout the decades of revolution in the world of electronics, from disjunct devices to today’s integrated circuit technology, where billions of transistors are combined on a single chip. The automotive industry and smart vehicles in particular, are confronting design issues such as being prone to electromagnetic interference (EMI). Electronic control devices calculate incorrect outputs because of EMI and sensors give misleading values which can prove fatal in case of automotives. In this paper, the authors have non exhaustively tried to review research work concerned with the investigation of EMI in ICs and prediction of this EMI using various modelling methodologies and measurement setups.
Smart monitoring system using NodeMCU for maintenance of production machinesnooriasukmaningtyas
Maintenance is an activity that helps to reduce risk, increase productivity, improve quality, and minimize production costs. The necessity for maintenance actions will increase efficiency and enhance the safety and quality of products and processes. On getting these conditions, it is necessary to implement a monitoring system used to observe machines' conditions from time to time, especially the machine parts that often experience problems. This paper presents a low-cost intelligent monitoring system using NodeMCU to continuously monitor machine conditions and provide warnings in the case of machine failure. Not only does it provide alerts, but this monitoring system also generates historical data on machine conditions to the Google Cloud (Google Sheet), includes which machines were down, downtime, issues occurred, repairs made, and technician handling. The results obtained are machine operators do not need to lose a relatively long time to call the technician. Likewise, the technicians assisted in carrying out machine maintenance activities and online reports so that errors that often occur due to human error do not happen again. The system succeeded in reducing the technician-calling time and maintenance workreporting time up to 50%. The availability of online and real-time maintenance historical data will support further maintenance strategy.
Design and simulation of a software defined networkingenabled smart switch, f...nooriasukmaningtyas
Using sustainable energy is the future of our planet earth, this became not only economically efficient but also a necessity for the preservation of life on earth. Because of such necessity, smart grids became a very important issue to be researched. Many literatures discussed this topic and with the development of internet of things (IoT) and smart sensors, smart grids are developed even further. On the other hand, software defined networking is a technology that separates the control plane from the data plan of the network. It centralizes the management and the orchestration of the network tasks by using a network controller. The network controller is the heart of the SDN-enabled network, and it can control other networking devices using software defined networking (SDN) protocols such as OpenFlow. A smart switching mechanism called (SDN-smgrid-sw) for the smart grid will be modeled and controlled using SDN. We modeled the environment that interact with the sensors, for the sun and the wind elements. The Algorithm is modeled and programmed for smart efficient power sharing that is managed centrally and monitored using SDN controller. Also, all if the smart grid elements (power sources) are connected to the IP network using IoT protocols.
Efficient wireless power transmission to remote the sensor in restenosis coro...nooriasukmaningtyas
In this study, the researchers have proposed an alternative technique for designing an asymmetric 4 coil-resonance coupling module based on the series-to-parallel topology at 27 MHz industrial scientific medical (ISM) band to avoid the tissue damage, for the constant monitoring of the in-stent restenosis coronary artery. This design consisted of 2 components, i.e., the external part that included 3 planar coils that were placed outside the body and an internal helical coil (stent) that was implanted into the coronary artery in the human tissue. This technique considered the output power and the transfer efficiency of the overall system, coil geometry like the number of coils per turn, and coil size. The results indicated that this design showed an 82% efficiency in the air if the transmission distance was maintained as 20 mm, which allowed the wireless power supply system to monitor the pressure within the coronary artery when the implanted load resistance was 400 Ω.
Grid reactive voltage regulation and cost optimization for electric vehicle p...nooriasukmaningtyas
Expecting large electric vehicle (EV) usage in the future due to environmental issues, state subsidies, and incentives, the impact of EV charging on the power grid is required to be closely analyzed and studied for power quality, stability, and planning of infrastructure. When a large number of energy storage batteries are connected to the grid as a capacitive load the power factor of the power grid is inevitably reduced, causing power losses and voltage instability. In this work large-scale 18K EV charging model is implemented on IEEE 33 network. Optimization methods are described to search for the location of nodes that are affected most due to EV charging in terms of power losses and voltage instability of the network. Followed by optimized reactive power injection magnitude and time duration of reactive power at the identified nodes. It is shown that power losses are reduced and voltage stability is improved in the grid, which also complements the reduction in EV charging cost. The result will be useful for EV charging stations infrastructure planning, grid stabilization, and reducing EV charging costs.
Topology network effects for double synchronized switch harvesting circuit on...nooriasukmaningtyas
Energy extraction takes place using several different technologies, depending on the type of energy and how it is used. The objective of this paper is to study topology influence for a smart network based on piezoelectric materials using the double synchronized switch harvesting (DSSH). In this work, has been presented network topology for circuit DSSH (DSSH Standard, Independent DSSH, DSSH in parallel, mono DSSH, and DSSH in series). Using simulation-based on a structure with embedded piezoelectric system harvesters, then compare different topology of circuit DSSH for knowledge is how to connect the circuit DSSH together and how to implement accurately this circuit strategy for maximizing the total output power. The network topology DSSH extracted power a technique allows again up to in terms of maximal power output compared with network topology standard extracted at the resonant frequency. The simulation results show that by using the same input parameters the maximum efficiency for topology DSSH in parallel produces 120% more energy than topology DSSH-series. In addition, the energy harvesting by mono-DSSH is more than DSSH-series by 650% and it has exceeded DSSHind by 240%.
Improving the design of super-lift Luo converter using hybrid switching capac...nooriasukmaningtyas
In this article, an improvement to the positive output super-lift Luo converter (POSLC) has been proposed to get high gain at a low duty cycle. Also, reduce the stress on the switch and diodes, reduce the current through the inductors to reduce loss, and increase efficiency. Using a hybrid switch unit composed of four inductors and two capacitors it is replaced by the main inductor in the elementary circuit. It’s charged in parallel with the same input voltage and discharged in series. The output voltage is increased according to the number of components. The gain equation is modeled. The boundary condition between continuous conduction mode (CCM) and discontinuous conduction mode (DCM) has been derived. Passive components are designed to get high output voltage (8 times at D=0.5) and low ripple about (0.004). The circuit is simulated and analyzed using MATLAB/Simulink. Maximum power point tracker (MPPT) controls the converter to provide the most interest from solar energy.
Third harmonic current minimization using third harmonic blocking transformernooriasukmaningtyas
Zero sequence blocking transformers (ZSBTs) are used to suppress third harmonic currents in 3-phase systems. Three-phase systems where singlephase loading is present, there is every chance that the load is not balanced. If there is zero-sequence current due to unequal load current, then the ZSBT will impose high impedance and the supply voltage at the load end will be varied which is not desired. This paper presents Third harmonic blocking transformer (THBT) which suppresses only higher harmonic zero sequences. The constructional features using all windings in single-core and construction using three single-phase transformers explained. The paper discusses the constructional features, full details of circuit usage, design considerations, and simulation results for different supply and load conditions. A comparison of THBT with ZSBT is made with simulation results by considering four different cases
Power quality improvement of distribution systems asymmetry caused by power d...nooriasukmaningtyas
With an increase of non-linear load in today’s electrical power systems, the rate of power quality drops and the voltage source and frequency deteriorate if not properly compensated with an appropriate device. Filters are most common techniques that employed to overcome this problem and improving power quality. In this paper an improved optimization technique of filter applies to the power system is based on a particle swarm optimization with using artificial neural network technique applied to the unified power flow quality conditioner (PSO-ANN UPQC). Design particle swarm optimization and artificial neural network together result in a very high performance of flexible AC transmission lines (FACTs) controller and it implements to the system to compensate all types of power quality disturbances. This technique is very powerful for minimization of total harmonic distortion of source voltages and currents as a limit permitted by IEEE-519. The work creates a power system model in MATLAB/Simulink program to investigate our proposed optimization technique for improving control circuit of filters. The work also has measured all power quality disturbances of the electrical arc furnace of steel factory and suggests this technique of filter to improve the power quality.
Studies enhancement of transient stability by single machine infinite bus sys...nooriasukmaningtyas
Maintaining network synchronization is important to customer service. Low fluctuations cause voltage instability, non-synchronization in the power system or the problems in the electrical system disturbances, harmonics current and voltages inflation and contraction voltage. Proper tunning of the parameters of stabilizer is prime for validation of stabilizer. To overcome instability issues and get reinforcement found a lot of the techniques are developed to overcome instability problems and improve performance of power system. Genetic algorithm was applied to optimize parameters and suppress oscillation. The simulation of the robust composite capacitance system of an infinite single-machine bus was studied using MATLAB was used for optimization purpose. The critical time is an indication of the maximum possible time during which the error can pass in the system to obtain stability through the simulation. The effectiveness improvement has been shown in the system
Renewable energy based dynamic tariff system for domestic load managementnooriasukmaningtyas
To deal with the present power-scenario, this paper proposes a model of an advanced energy management system, which tries to achieve peak clipping, peak to average ratio reduction and cost reduction based on effective utilization of distributed generations. This helps to manage conventional loads based on flexible tariff system. The main contribution of this work is the development of three-part dynamic tariff system on the basis of time of utilizing power, available renewable energy sources (RES) and consumers’ load profile. This incorporates consumers’ choice to suitably select for either consuming power from conventional energy sources and/or renewable energy sources during peak or off-peak hours. To validate the efficiency of the proposed model we have comparatively evaluated the model performance with existing optimization techniques using genetic algorithm and particle swarm optimization. A new optimization technique, hybrid greedy particle swarm optimization has been proposed which is based on the two aforementioned techniques. It is found that the proposed model is superior with the improved tariff scheme when subjected to load management and consumers’ financial benefit. This work leads to maintain a healthy relationship between the utility sectors and the consumers, thereby making the existing grid more reliable, robust, flexible yet cost effective.
Energy harvesting maximization by integration of distributed generation based...nooriasukmaningtyas
The purpose of distributed generation systems (DGS) is to enhance the distribution system (DS) performance to be better known with its benefits in the power sector as installing distributed generation (DG) units into the DS can introduce economic, environmental and technical benefits. Those benefits can be obtained if the DG units' site and size is properly determined. The aim of this paper is studying and reviewing the effect of connecting DG units in the DS on transmission efficiency, reactive power loss and voltage deviation in addition to the economical point of view and considering the interest and inflation rate. Whale optimization algorithm (WOA) is introduced to find the best solution to the distributed generation penetration problem in the DS. The result of WOA is compared with the genetic algorithm (GA), particle swarm optimization (PSO), and grey wolf optimizer (GWO). The proposed solutions methodologies have been tested using MATLAB software on IEEE 33 standard bus system
Intelligent fault diagnosis for power distribution systemcomparative studiesnooriasukmaningtyas
Short circuit is one of the most popular types of permanent fault in power distribution system. Thus, fast and accuracy diagnosis of short circuit failure is very important so that the power system works more effectively. In this paper, a newly enhanced support vector machine (SVM) classifier has been investigated to identify ten short-circuit fault types, including single line-toground faults (XG, YG, ZG), line-to-line faults (XY, XZ, YZ), double lineto-ground faults (XYG, XZG, YZG) and three-line faults (XYZ). The performance of this enhanced SVM model has been improved by using three different versions of particle swarm optimization (PSO), namely: classical PSO (C-PSO), time varying acceleration coefficients PSO (T-PSO) and constriction factor PSO (K-PSO). Further, utilizing pseudo-random binary sequence (PRBS)-based time domain reflectometry (TDR) method allows to obtain a reliable dataset for SVM classifier. The experimental results performed on a two-branch distribution line show the most optimal variant of PSO for short fault diagnosis.
A deep learning approach based on stochastic gradient descent and least absol...nooriasukmaningtyas
More than eighty-five to ninety percentage of the diabetic patients are affected with diabetic retinopathy (DR) which is an eye disorder that leads to blindness. The computational techniques can support to detect the DR by using the retinal images. However, it is hard to measure the DR with the raw retinal image. This paper proposes an effective method for identification of DR from the retinal images. In this research work, initially the Weiner filter is used for preprocessing the raw retinal image. Then the preprocessed image is segmented using fuzzy c-mean technique. Then from the segmented image, the features are extracted using grey level co-occurrence matrix (GLCM). After extracting the fundus image, the feature selection is performed stochastic gradient descent, and least absolute shrinkage and selection operator (LASSO) for accurate identification during the classification process. Then the inception v3-convolutional neural network (IV3-CNN) model is used in the classification process to classify the image as DR image or non-DR image. By applying the proposed method, the classification performance of IV3-CNN model in identifying DR is studied. Using the proposed method, the DR is identified with the accuracy of about 95%, and the processed retinal image is identified as mild DR.
Automated breast cancer detection system from breast mammogram using deep neu...nooriasukmaningtyas
All over the world breast cancer is a major disease which mostly affects the women and it may also cause death if it is not diagnosed in its early stage. But nowadays, several screening methods like magnetic resonance imaging (MRI), ultrasound imaging, thermography and mammography are available to detect the breast cancer. In this article mammography images are used to detect the breast cancer. In mammography image the cancerous lumps/microcalcifications are seen to be tiny with low contrast therefore it is difficult for the doctors/radiologist to detect it. Hence, to help the doctors/radiologist a novel system based on deep neural network is introduced in this article that detects the cancerous lumps/microcalcifications automatically from the mammogram images. The system acquires the mammographic images from the mammographic image analysis society (MIAS) data set. After pre-processing these images by 2D median image filter, cancerous features are extracted from the images by the hybridization of convolutional neural network with rat swarm optimization algorithm. Finally, the breast cancer patients are classified by integrating random forest with arithmetic optimization algorithm. This system identifies the breast cancer patients accurately and its performance is relatively high compared to other approaches.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Democratizing Fuzzing at Scale by Abhishek Aryaabh.arya
Presented at NUS: Fuzzing and Software Security Summer School 2024
This keynote talks about the democratization of fuzzing at scale, highlighting the collaboration between open source communities, academia, and industry to advance the field of fuzzing. It delves into the history of fuzzing, the development of scalable fuzzing platforms, and the empowerment of community-driven research. The talk will further discuss recent advancements leveraging AI/ML and offer insights into the future evolution of the fuzzing landscape.
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfKamal Acharya
The College Bus Management system is completely developed by Visual Basic .NET Version. The application is connect with most secured database language MS SQL Server. The application is develop by using best combination of front-end and back-end languages. The application is totally design like flat user interface. This flat user interface is more attractive user interface in 2017. The application is gives more important to the system functionality. The application is to manage the student’s details, driver’s details, bus details, bus route details, bus fees details and more. The application has only one unit for admin. The admin can manage the entire application. The admin can login into the application by using username and password of the admin. The application is develop for big and small colleges. It is more user friendly for non-computer person. Even they can easily learn how to manage the application within hours. The application is more secure by the admin. The system will give an effective output for the VB.Net and SQL Server given as input to the system. The compiled java program given as input to the system, after scanning the program will generate different reports. The application generates the report for users. The admin can view and download the report of the data. The application deliver the excel format reports. Because, excel formatted reports is very easy to understand the income and expense of the college bus. This application is mainly develop for windows operating system users. In 2017, 73% of people enterprises are using windows operating system. So the application will easily install for all the windows operating system users. The application-developed size is very low. The application consumes very low space in disk. Therefore, the user can allocate very minimum local disk space for this application.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Towards design strong emergency and COVID-19 authentication scheme in VANET
1. Indonesian Journal of Electrical Engineering and Computer Science
Vol. 21, No. 3, March 2021, pp. 1808~1819
ISSN: 2502-4752, DOI: 10.11591/ijeecs.v21.i3.pp1808-1819 1808
Journal homepage: http://ijeecs.iaescore.com
Towards design strong emergency and COVID-19
authentication scheme in VANET
Akeel Kassim Leaby1
, Ali Yassin2
, Mushtaq Hasson3
, Abdullah Rashid4
1,2,3
Computer Science Department, Education College for Pure Science, University of Basrah, Basrah 61004, Iraq
4
Education College for Human Science, University of Basrah, Basrah, Iraq
Article Info ABSTRACT
Article history:
Received Aug 21, 2020
Revised Dec 2, 2020
Accepted Dec 22, 2021
The wide use of vehicular ad hoc networks (VANETs) in the last decade has
led many researchers to find efficient and reliable methods to obtain the
desired benefits and offer services, such as healthcare and traffic
management. However, VANETs suffer from security issues represented by
authentication and data integrity. In this paper, we propose a robust mutual
authentication scheme based on elliptic curve cryptography (ECC),
cryptography Hash Function, and a pseudonym. The proposed work was
twofold in focus: first, on healthcare in emergency cars which use VANETs,
and second, on overcoming security issues, such as resisting familiar attacks
(e.g. insider attacks and reply attacks). Because of the serious situation
generated by the worldwide outbreak of the Covid-19 epidemic, we also
found this research valuable in supporting global efforts to combat the rapid
spread of this virus, by finding the safest and fastest routes to epidemic
treatment centres for medical staff, assistance teams in medical operations,
fumigation control, and all work teams associated with disease control. This
research attempts to contribute by proposing a special signal used to define
epidemic teams. The best route, fast route can be chosen by using VANETs
infrastructure. This scheme also deals with metric security features, such as
key management, data integrity, and data privacy. In the communication and
computation cost, we noticed that our proposed scheme achieved good
results compared with the related works.
Keywords:
Authentication
COVID-19
ECC
Emergency vehicles
Insider attacks
VANET
This is an open access article under the CC BY-SA license.
Corresponding Author:
Akeel Kassim Leaby
Computer Science Department
Education College for Pure Science
University of Basrah, Basrah 61004, Iraq
Email: akeel.kasim@uobasrah.edu.iq
1. INTRODUCTION
The rapid growth of wireless networking technology led to the creation of a special type of wireless
communication called the internet of vehicles (IoV). The most popular form of the IoV is the VANET. It has
been widely used on the roads to achieve several goals: flow and congestion control [1], accident avoidance,
improving the safety of motor vehicles, and knowledge of the real-time location of vehicles. In fact, drivers
can obtain information about the situation of their route in terms of weather and traffic, the vehicles
surrounding them, and how to avoid road problems [2]. Every vehicle can connect to the nearest vehicle
through open-source media based on road side units (RSUs), which are considered the main VANET
component. VANETs are generated by applying the principles of mobile ad hoc networks (MANETs). These
types of networks were introduced in 2001 under vehicle-to-vehicle (V2V) communication and networking
applications, where the networks can be created and beacons relayed among vehicles. V2V and vehicle-to-
2. Indonesian J Elec Eng & Comp Sci ISSN: 2502-4752
Towards design strong emergency and COVID-19 authentication scheme in VANET (Akeel Kassim Leaby)
1809
roadside communications (V2I) architectures will co-exist in VANETs to provide navigation, road safety,
and other services. VANETs are a part of the intelligent transportation system (ITS) framework, sometimes
referred to as the intelligent transportation network (ITN) [3]. Figure 1 explains the main three entities of
VANET as follows: on-board unit (OBU) which carries the same name of the vehicle, road side unit (RSU),
and trusted authority server (TAS). Each component carries out specific tasks such as producing system
limits, identifying trespassers and registering vehicles that TAS relates. RSUs are nodes that are deployed en
route and act as a relay for vehicles, exchanging beacons among vehicles (OBUs) inside the range of RSUs
known as V2V. The interchange of beacons between the vehicles (OBUs) and the VANET infrastructure
(RSUs) is referred to as vehicle-to-infrastructure (V2I) communication.
VANET uses IEEE 802.11p protocol in V2V and V2I communications. IEEE 802.11P is the basis
of dedicated short-range communications (DSRC) and is an approved change to the IEEE 802.11 standard.
The newer version has wireless access in vehicular environments (WAVE); it defines enhancements to
802.11 (the basics of products marketed as Wi-Fi) to support intelligent transportation systems (ITS)
applications. Information between high-speed vehicles and VANET infrastructure is exchanged using a 5.9
GHz (5.85–5.925 GHz) band. IEEE 1609 is a higher-layer standard based on IEEE 802.11p; it is also the
basis of a VANET uses IEEE 802.11p protocol in V2V and V2I communications. IEEE 802.11P is the basis
of dedicated short-range communications (DSRC) and is an approved change to the IEEE 802.11 standard.
The newer version has wireless access in vehicular environments (WAVE); it defines enhancements to
802.11 (the basics of products marketed as Wi-Fi) to support intelligent transportation systems (ITS)
applications. Information between high-speed vehicles and VANET infrastructure is exchanged using a 5.9
GHz (5.85–5.925 GHz) band. IEEE 1609 is a higher-layer standard based on IEEE 802.11p; it is also the
basis of a European standard for vehicular communication known as ETSI ITS-G5. Indeed, all of the
messages in VANET are exchanged via open-source media [4]. This study proposes an authentication
scheme for the VANET environment that uses elliptic-curve cryptography (ECC), a cryptography hash
function (SAH-512), to prepare the pseudonyms and other encrypted information for each vehicle. Our work
has several benefits, such as mutual authentication, a secure management key, user identity recognition,
resistance to well-known attacks (e.g., reply, man in the middle [MITM], and insider attacks), and preserving
VANET data privacy. The proposed scheme supports the health care domain in terms of emergency vehicles,
especially for ambulances and COVID-19 virus treatment teams. The scheme can provide these vehicles with
the shortest route and suggest alternative routes if any congestion or accidents occur based on its knowledge
of COVID-19 treatment centre locations.
The rest of the paper is organised as follows: Section 2 demonstrates the primitives and system
model, Section 3 explains the related works, Section 4 provides a detailed outline of the proposed scheme,
Section 5 contains a security analysis and reports on the experimental results and Section 6 concludes.
Figure 1. VANET components
3. ISSN: 2502-4752
Indonesian J Elec Eng & Comp Sci, Vol. 21, No. 3, March 2021 : 1808 - 1819
1810
2. PRIMITIVES AND SYSTEM MODEL
This section describes all of the proposed scheme requirements to achieve the main goals. It beings
by explaining the physical components necessary for a VANET environment. It then demonstrates a
VANET’s security and privacy requirements and the mathematical tools used in this work.
2.1. Cryptographic TOOLS
a) Elliptic curve cryptography (ECC)
This type of cryptographic tool has become widely used to design security methods and digital
signatures. It first appeared in 1958, designed by Miller [1].
b) SHA-512 cryptographic hash function algorithm
Secured Hash Function 512 is a part of the U.S Federal Information Processing Standard and one of
a set of hash functions designed by the national security agency (NSA) in the United States of America [5-8].
2.2. System model
The proposed scheme contains the following components:
c) Trusted authority server part (TAS) has the following features: Fully trusted and possesses locations of
all components, generates system parameters and processes the joining requests, connected with RSUs
via secure wired system and communicates with RSUs in real time procedures and can generate any
message if needed.
d) RSUs with the following specifications: deployed overall road to construct VANET range, the
neighboured RSUs have a small conferenced area to keep OBUs connected to the system, Route and
interchange information between vehicles and infrastructure, and RSUs are connected to each other and
to TAS via secure wired systems to keep security and integrity.
e) Vehicle’s onboard unit (OBUs) has the following specifications: Use IEEE 802.11p protocol to manage
transmission of data with each vehicle and infrastructure, has temper proof device (TPD), accountable
for implementing cryptography and security parameters and Has 100s of meters of transmission range.
2.3. Main issues
VANET is a self-organised network. So, emergency vehicles and COVID-19 teams who use this
system will face many problems. We can summarise them as follows: Information security [9],
Performance, Health care, COVID-19 pandemic, and Quality of Service (QoS).
3. RELATED WORKS
In recent years, many authors have focused on VANET security and privacy issues. Some of these
works can be illustrated under two main categories: public key infrastructure (PKI) and identity-based (ID)
schemes.
In PKI-based schemes, the real identity of vehicles is hidden using covered certification. In these
schemes, a vehicle obtains a number of certificates during the registration phase using its private key- pairs.
Raya and Hubaux [5] proposed a PKI-based scheme. Certificate authority (CA) is responsible for generating
private and public keys, as well as certification. These parameters, represented as large numbers, are used to
sign and encrypt all the vehicle’s messages. This procedure ensures message integrity, but it is restricted by
the storage size of the on-board unit (OBU) which is limited and cannot store a large number of
private/public keys. Another problem is the time delay caused by a large certificate revocation list (CRL). In
2008, Lu et al. [6] proposed ECPP in relation to security in VANET. ECPP tries to solve the storage space
limitation and the increase in CRL by completing the pseudonym computation inside RSUs. Zhang et al. [7]
proposed a scheme based on k-anonymity and using a hash authentication message. They named their new
scheme RAISE, which stands for efficient roadside aided. In this scheme RSUs are responsible for giving
verifications, this leads to minimize the computation cost and ensure vehicle privacy. Rajaput et al. [8]
introduce HPPPA which is suggested to solve PKI drawbacks.
In HPPPA, CRL management is not required and only two pseudonyms obtained for each vehicle,
based on its key pairs. This protocol faces a problem with the storage of certifications and the management of
keys. In 2018, yang et al. [9] proposed CCPPA PKI- based protocol. This work satisfied requirements of
security and privacy in VANET and do not employ map-to-point hash function to achieve the best message
verification. ID-based schemes were proposed to disentangle the problem of emerging in PKI-based
schemes. Zhang et al. [10] they use id-based aggregate signature and bilinear cryptography to propose
conditional privacy-preserving protocol. This approach uses hierarchy in gathering signatures and patch
verification. Although this technique reduces transmission cost and storage exploitation, but it also reduces
waiting time for aggregation. Zhang et al. [11] Assumes RSUs as trusted party in VANET. Then, multiple
4. Indonesian J Elec Eng & Comp Sci ISSN: 2502-4752
Towards design strong emergency and COVID-19 authentication scheme in VANET (Akeel Kassim Leaby)
1811
trusted authorities occur inside VANETs body. Authentication in this paper depends on ID-based signature
aggregation. In this work, the distribution of certificates is not centralized and computation is overhead. C.
Zhang et al. [12] Proposed IBV scheme. In any time windows, the verification of the received signatures are
allowed by batch verification and it is more efficient and faster than if done using single stepsingle signature
verification. Although this scheme can satisfy the above goals, it cannot satisfy the security issues and it is
weak toward DOS attacks. Lee and Lai [13] try to improve ID scheme to give an advance in security issues
related to scheme that proposed by c.zhang et al. [12]. The new scheme adds pseudonym ID-based
generation, message verification, and message signing techniques. However, when the number of valid
signature increases, we note degradation in performance. Vijayakumar et al. [14] in 2016 adopted ID-based
scheme to propose dual authentication and key management for secure data transmission in VANET. In this
research TA can divide vehicles to primary and secondary groups and each group has its specific keys. The
reference of vehicles classification is according to the service level agreement SLA, that’s means TA will
provide two types of services. The entire shared group keys refreshed when any user joins or leaves VANET.
It is important to note that although this technique offers forward/backward security, the privacy issues are
not addressed. Wang and Nianmin [15] proposed LIAP in 2017. This scheme deals with VANETs ID-based
problems such as complicated revocation and holds too many valid identities to protect vehicle privacy.
Vehicles and RSUs are given long term authentication. Although this scheme can meet the security and
privacy requirements but neglects the redundant authentication overhead. In 2020, Ali et al. [16] proposed
IBS-CPPA. This scheme is based on ECC and hash function encryption in V2V broadcasting and support
batch signature models to enable vehicles to authenticate a large number of beacons at the same time. IBS-
CPPA focuses only on V2V communication but it neglects V2I broadcasting which affects in some way both
system performance and V2V broadcasts load and cost computation. Table 1 explains a comparison between
our work and other related work in some features.
Table 1. Comparison between proposed scheme and related works
Feature [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [21] Our
work
Covid-19 virus solutions No No No No No No No No No No No No Yes
Health care solutions No No No No No No No No No No No No Yes
meet the revocation
requirement
No No No No --- No No No No No No --- Yes
Resist insider attacks Yes Yes No No --- Yes Yes No Yes Yes Yes --- Yes
Central verification Yes Yes No Yes Yes Yes No No No No Yes Yes Yes
Central authority center Yes Yes No Yes Yes Yes No No No No Yes Yes Yes
Designed for any size of
VANET system
No No Yes No No No No Yes Yes Yes No --- Yes
Meet security requirements Yes Yes Yes No Yes Yes Yes Yes Yes Yes Yes Yes Yes
Meet privacy requirements Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes
Process and storage problems Yes Yes Yes No No No Yes No No Yes Yes --- No
4. PROPOSED SCHEME
The proposed scheme constructed from six different phases. These phases form two different
procedures based on special flag (SF) value. This flag involved in joining request message. SF value decides
the type of vehicle either normal if (0) or emergency if (1). The rest of this section describes all phases and
where use. As shown below, Figure 2 describes normal vehicles procedures, and Figure 3 for emergency and
COVID-19 vehicles procedures. To ease the understand all equations, Table 2 shows all notations we used in
our proposed scheme. Initialization phase: used in both SF values. This phase deals with system parameters
initialization and broadcasting to all RSUs and OBUs. This phase operation is the responsibility of TAS. The
registration phase is the second phase. This phase related with vehicle registration. Although registration
phase is applied for both SF values, the result is two different types of pseudonyms. When vehicle sends
joining request to system by send its public key, password, and SF value to the nearest RSU. Then it will get
a pseudonym that is used to hide vehicle real identity. The pseudonym resulted from this phase depends on
(SF) value. Third phase is Joining phase. In this phase, the legal vehicles signature and other parameters that
permit to beacons broadcasting and verifying operations will calculated. The signature also depends the value
of SF flag. When SF=1, permission given to broadcast for both RSUs and OBUs, while when SF=1,
broadcasting is allowed only for RSUs. The broadcasting phase begins when vehicles broadcast beacons.
Beacons contain different types of information. As illustrated in joining phase, SF value control the type of
broadcasting. Renewing signature phase. When vehicles owned its signature, this signature has life-time.
This life-time always checked if expired and renewed if the vehicle is valid. The important note that
emergency vehicles excluded from renewing signature operation to improve performance and increase
5. ISSN: 2502-4752
Indonesian J Elec Eng & Comp Sci, Vol. 21, No. 3, March 2021 : 1808 - 1819
1812
privacy and security issues for all emergency vehicles. In parallel with previous phases, vehicles will trace
and revoke if necessary in Trace and revoke phase. Any malicious vehicles appears aggressive against
system or penetrated will trace. The action against these hostilities vehicles is to expel it and prevent from
renewing signature. The trace and revoke operations includes both normal and emergency vehicles. As we
described in the previous section these phases can be explained in details as follows:
4.1. Initialization phases
TAS initiates and broadcast all system parameters using secured channel. In this phase, TAS always
updates system parameter to maintain system security. Initialization and broadcasting system parameters can
describe in the following steps:-TAS select pairs of large primary numbers p,q . An additive group A, which
includes all Elliptic Curve EC, where EC defined by equation: - 𝒈𝟐
= 𝒙𝟐
+ 𝒂𝒙 + 𝒃𝒎𝒐𝒅𝒆𝒑 . Where 𝒂, 𝒃 ∈
𝑭𝒑 .
a) TAS generates random number r, 𝒓 ∈ 𝒁𝒒 as private key. Then calculate the public key 𝒑𝒖𝒃𝒌 = 𝒓. 𝒑.
b) TAS generates three hash functions ℎ1 = 𝐴 → 𝑍𝑞 ,ℎ2: {0,1} × {0,1} × 𝐴 × 𝑍𝑞,ℎ3:{0,1} − 𝑍𝑞. These
three hash functions represent cryptographic hash functions.
c) TAS loaded the private key to all RSUs in system.
d) The final step is broadcasting (𝑞, 𝑝𝑢𝑏𝑘, 𝑝, ℎ1, ℎ2, ℎ3) parameters to all RSUs via secured channel
(wired channel).
Figure 2. Normal vehicles operation scheme
Figure 3. Emergency vehicles operation in the proposed scheme
6. Indonesian J Elec Eng & Comp Sci ISSN: 2502-4752
Towards design strong emergency and COVID-19 authentication scheme in VANET (Akeel Kassim Leaby)
1813
Table 2. Notations and their descriptions
Notation Description Notation Description
𝐸C An elliptic curve ∥ Concatenation operator
A An additive group based on 𝐸C ⨁ Exclusive OR (XOR) operation
𝑃 A generator of A 𝑆I The signature of the beacon issued from the RSU
𝑝, 𝑞 Large prime numbers 𝑚 Traffic-related message
𝑠, 𝑃𝑢𝑏k Private and public key pairs 𝑇sk The timestamp of the signature
ℎ1, ℎ2, ℎ3 Three secure hash functions 𝑇s1, Ts2, △ 𝑇 Timestamp, receiving time and time delay values
𝑅𝐼𝐷𝑅, 𝑅𝐼𝐷𝑉 Real identities of the RSU and vehicle Abbr Abbreviation of cryptography operations
𝑃𝐼𝐷v1, 𝑃𝐼𝐷v2 Pseudonyms of the vehicle for broadcasting MBVO Multi Beacons Verification Operations.
𝑃𝑠 Pseudonym of the normal vehicle to hide its
real identity
SBVO Single Beacon Verification Operations
𝑆𝑃𝑆 Pseudonym of the emergency vehicle to hide
its real identity
BGS Beacons Generation and Signing
𝑟 Random integer 𝑃𝑊 Password
4.2. Registration phase
The registration for any new user need to join VANET passes through number of steps to approve
legality. These steps sequnsly (the user sends join requests message, including vehicle’s real identity 𝑅𝐼𝐷𝑣
and password (𝑝𝑤) across a secured channel to keep privacy and security of the user and system. The join
request message contains special flag SF. It either contains 0 if a normal vehicle needs to join or if an
emergency vehicle needs to join. And if SF=0 then (TAS checks the validity of(𝑅𝐼𝐷𝑣), Calculate the pseudo
name for normal vehicles 𝒑𝒔 = 𝒉𝟑(𝑹𝑰𝑫𝒗⫿𝒓), and TAS sends (𝒑𝒔, 𝒑𝒘, 𝑅𝐼𝐷𝑅) to all RSUs and car𝑇𝑃𝐷).
While when SF=1, the procedure of registration will be (TAS checks the validity of(𝑅𝐼𝐷𝑣), TAS calculates
the pseudo name of emergency vehicle s𝒑𝒔 = 𝒉𝟑(𝑹𝑰𝑫𝒗⫿𝒓), and TAS sends(𝒔𝒑𝒔, pw, 𝑅𝐼𝐷𝑅) to all RSUs
and car𝑇𝑃𝐷.).
4.3. Joining phase
By creating mutual authentication for every vehicle, the joining phase can summarized as follows:
Inside vehicles OBU, (r) will generated where r∈𝑍𝑞. And OBU will calculate the value of (𝑃𝐼𝐷𝑉1,𝑃𝐼𝐷𝑉2)
which represent the pseudonym of the vehicle. This pseudonym is used to hide the real identity of vehicles.
These parameters are calculated as follows: 𝑃𝐼𝐷𝑉1 = 𝑟. 𝑃 , 𝑃𝐼𝐷𝑉2 = 𝑝𝑠 ⨁ ℎ1(𝑟. 𝑝𝑢𝑏𝑘),σOBU=
ℎ3(𝑇𝑠1 ∥ 𝑝𝑠) 𝑖𝑓 𝑆𝐹 = 0, 𝑃𝐼𝐷𝑉1 = 𝑟. 𝑃, 𝑃𝐼𝐷𝑉2 = 𝑠𝑝𝑠 ⨁ ℎ1(𝑟. 𝑝𝑢𝑏𝑘),σOBU= ℎ3(𝑇𝑠1 ∥ 𝑠𝑝𝑠) 𝑖𝑓 𝑆𝐹 = 1,
When OBU completes the estimation of 𝑃𝐼𝐷𝑣1, 𝑃𝐼𝐷𝑣2, it will send the parameters (𝑃𝐼𝐷𝑉1, 𝑃𝐼𝐷𝑉2, σOBU) to
the nearest RSU. When RSU receives the parameter massage from OBU, the next steps will Check the
validity of (Ts1) by supposing (Tsr) which represents the receive time and if (𝑇𝑠𝑟 − 𝑇 > △ 𝑇) it will reject the
massage because of no validity occurred. Otherwise, it calculates 𝑝𝑠 = 𝑃𝐼𝐷𝑣2 ⨁ ℎ1(𝑠. 𝑃𝐼𝐷𝑣1), 𝑂𝑅 𝑠𝑝𝑠 =
𝑃𝐼𝐷𝑣2 ⨁ ℎ1(𝑠. 𝑃𝐼𝐷𝑣1) Check if the equations 𝜎𝑂𝐵𝑈 =? ℎ3(𝑇1 ∥ 𝑝𝑠) 𝑜𝑟 𝑡ℎ𝑒 𝑒𝑞𝑢𝑎𝑡𝑖𝑜𝑛 𝜎𝑂𝐵𝑈 =
? ℎ3(𝑇1 ∥ 𝑠𝑝𝑠) is true. If false, RSU will reject the massage. However, RSU will send the parameters
((𝑇𝑠2, 𝑅𝐼𝐷𝑅,𝑠𝑝) 𝑖𝑓 𝑆𝐹 = 0 , (𝑇𝑠2, 𝑅𝐼𝐷𝑅,𝑠𝑝𝑠)𝑖𝑓 𝑆𝐹 = 1) to TAS.
When TAS receives the parameters (𝑇𝑠2, 𝑅𝐼𝐷𝑅, 𝑠𝑝 𝑠𝑝𝑠) from OBU, then TAS will first check the
validity of timestamp (𝑇𝑠2). If valid, TAS’s next step is to check the match between the stored (𝑅𝐼𝐷𝑅, 𝑠𝑝
𝑠𝑝𝑠) and the received one. If matched, the message (verified) will be sent to RSU. If any of the above
conditions ((𝑇𝑠2) 𝑛𝑜𝑡 𝑣𝑎𝑙𝑖𝑑 𝑜𝑟 (𝑅𝐼𝐷𝑅,𝑠𝑝𝑠𝑝𝑠) is not matched, then the message will reject and “not-
verified” will be sent to RSU. The content of the massage received by RSU will control the following action
from RSU. It will be one of the following procedures. If the message is verified, RSU will complete the
signature(𝑆𝐼)𝑓𝑜𝑟 𝑛𝑜𝑟𝑚𝑎𝑙 𝑣𝑒ℎ𝑖𝑐𝑙𝑒𝑠 𝑜𝑟(𝑆𝐼𝐸)𝑓𝑜𝑟 𝑒𝑚𝑒𝑟𝑔𝑒𝑛𝑐𝑦 𝑣𝑒ℎ𝑖𝑐𝑙𝑒𝑠. Also it calculates the validation
time for normal vehicles only as (𝑇𝑠𝑘). These signatures will be calculated by the following equations if
𝑆𝐼𝐸 = 𝑠. ℎ2(𝑃𝐼𝐷𝑣1 ∥ 𝑃𝐼𝐷𝑣2 ∥ 𝑇𝑠𝑘) 𝑓𝑜𝑟 𝑆𝐹 = 1 or 𝑆𝐼 = 𝑠. ℎ2(𝑃𝐼𝐷𝑣1 ∥ 𝑃𝐼𝐷𝑣2 ∥ 𝑇𝑠𝑘) 𝑓𝑜𝑟 𝑆𝐹 = 0
In the last step of the (verified) message, RSU will send a continue message containing the
following parameters (𝑇𝑠𝑘, 𝑇𝑠3, 𝑆𝐼𝑒𝑛𝑐,𝜎𝑅𝑆𝑈) to normal vehicles OBUs or ( 𝑆𝐼𝐸𝑒𝑛𝑐, 𝑇𝑠3, 𝜎𝑅𝑆𝑈) to emergency
vehicles OBUs. Where(𝜎𝑅𝑆𝑈 = ℎ2(𝑆𝐼 ∥ 𝑇𝑠3 ∥ 𝑇𝑠𝑘), 𝑆𝐼𝑒𝑛𝑐 = 𝑆𝐼⨁ℎ1(𝑠. 𝑃𝐼𝐷𝑣1), 𝑆𝐼𝐸𝑒𝑛𝑐 = 𝑆𝐼𝐸⨁ℎ1(𝑠. 𝑃𝐼𝐷𝑣1)
If the massage content is (not verified), RSU will reject the massage and the vehicle will be
identified as illegal car. When the parameters (𝑇𝑠𝑘, 𝑇𝑠3, 𝑆𝐼𝑒𝑛𝑐, 𝜎𝑅𝑆𝑈) are received by normal vehicles OBUs,
or ( 𝑆𝐼𝐸𝑒𝑛𝑐, 𝑇𝑠3, 𝜎𝑅𝑆𝑈) by emergency vehicles OBUs, they will first check the validity of(𝑇𝑠3). If valid,
OBU will compute (𝑆𝐼 𝑜𝑟 𝑆𝐼𝐸) by using the following equations: (𝑆𝐼 = 𝑆𝐼𝑒𝑛𝑐⨁ℎ1(𝑟. 𝑝𝑢𝑏𝑘), 𝑆𝐼𝐸 =
𝑆𝐼𝐸𝑒𝑛𝑐⨁ℎ1(𝑟. 𝑝𝑢𝑏𝑘), 𝜎𝑅𝑆𝑈 =?ℎ2(𝑆𝐼 ∥ 𝑇𝑠3 ∥ 𝑇𝑠𝑘)).
The OBUs of these cars that possess (SF=0) will begin broadcasting its (SI) to the nearest OBUs by
sending beacons. While for emergency vehicles, there is no need to transmit beacons to other OBUs. Only
Broadcast beacons continue their signature (SIE) for the nearest RSUs according to our proposed scheme.
7. ISSN: 2502-4752
Indonesian J Elec Eng & Comp Sci, Vol. 21, No. 3, March 2021 : 1808 - 1819
1814
These beacons contain in addition to signatures many of parameters such as (direction, speed, location,
velocity and health care information for ambulance cars).
4.4. Renew signature phase
This phase is applied only for normal cars whose value of the status flag is (SF=0). The renewing
signature phase must be applied to renew the expired signature (when 𝑇𝑠𝑘 𝑒𝑥𝑝𝑖𝑟𝑒𝑑). The OBU will renew
the signature with the nearest RSU without the need to transmit or receive any information with TAS. This
operation is completed by applying the following steps: OBU will generate random integer(𝑟𝑛𝑒𝑤
),
where(𝑟𝑛𝑒𝑤
∈ 𝑧𝑞). Then will calculate (𝑃𝐼𝐷𝑣𝑛) where :-𝑃𝐼𝐷𝑣𝑛1 = 𝑟𝑛𝑒𝑤
.𝑝 , 𝑃𝐼𝐷𝑣𝑛2 = 𝑃𝑠⨁ℎ1(𝑟𝑛𝑒𝑤
. 𝑝𝑢𝑏𝑘)
OBU sends a message containing parameters (𝑇𝑠𝑘, 𝑇𝑠1, 𝑃𝐼𝐷𝑣𝑛1,𝑃𝐼𝐷𝑣𝑛2, 𝜎𝑣) to RSU. Where 𝜎𝑣 =
𝑆𝐼 + 𝑟. ℎ2( 𝑇𝑠1 ∥ 𝑃𝐼𝐷𝑣𝑛1 ∥ 𝑃𝐼𝐷𝑣𝑛2) . When RSU receive these parameters (𝑇𝑠𝑘, 𝑇𝑠1, 𝑃𝐼𝐷𝑣𝑛1, 𝑃𝐼𝐷𝑣𝑛2,𝜎𝑣), it
check the validity of (𝑇𝑠1). If not valid, RSU will reject the massage and new joining phase must be
implemented by OBU. While if (𝑇𝑠1) is valid, then the next step is to check the validity of (𝑇𝑠𝑘) by
calculating the time required to request new signature(𝑆𝐼). But if (𝑇𝑠1) not valid and request new signature it
first check the validity of the vehicle using the following (1):
𝜎𝑣𝑃 = ℎ2(𝑃𝐼𝐷𝑣1 ∥ 𝑃𝐼𝐷𝑣2 ∥ 𝑇𝑠𝑘). 𝑝𝑢𝑏𝑘 + ℎ2(𝑃𝐼𝐷𝑣𝑛1 ∥ 𝑃𝐼𝐷𝑣𝑛2 ∥ 𝑇𝑠1)𝑃𝐼𝐷𝑣1 (1)
If the result shows that this car is not valid, it will reject the massage from RSU. While valid cars
will complete its new signature (𝑆𝐼𝑛𝑒𝑤
) with RSU where:- 𝑆𝐼𝑛𝑒𝑤
= 𝑠. ℎ2(𝑃𝐼𝐷𝑣𝑛1 ∥ 𝑃𝐼𝐷𝑣𝑛2 ∥ 𝑇𝑠𝑘)
(𝑇𝑠𝑘) is the new expiration time for new signature. When the new signature is ready to use, RSU
will send the following parameters to OBU. (𝑇𝑠2, 𝑇𝑠𝑘, 𝑆𝐼𝑒𝑛𝑐, 𝜎𝑅𝑆𝑈) Where: 𝑆𝐼𝑒𝑛𝑐 = 𝑆𝐼𝑛𝑒𝑤
⨁ℎ1(𝑠. 𝑃𝐼𝐷𝑣𝑛1), ,
𝜎𝑅𝑆𝑈 = ℎ2(𝑆𝐼𝑛𝑒𝑤
∥ 𝑇𝑠2 ∥ 𝑇𝑠𝑘). When OBU receive the massage from RSU, it will first check the validity of
time stamp(𝑇𝑠2). If this parameter is valid, OBU will calculate 𝑆𝐼𝑛𝑒𝑤
= 𝑆𝐼𝑒𝑛𝑐⨁ℎ1(𝑟𝑛𝑒𝑤
. 𝑝𝑢𝑏𝑘), the next
step is to calculate if the following equation is true: 𝜎𝑅𝑆𝑈 =?ℎ2(𝑆𝐼𝑛𝑒𝑤
∥ 𝑇𝑠2 ∥ 𝑇𝑠𝑘). If this equation is
equal, the new signature 𝑆𝐼𝑛𝑒𝑤 will be valid and can be used with all RSUs. The car when moving inside
VANET will receive a valid signature without announcing TAS. For emergency cars, this procedure will be
dedicated by sending the signature (𝑆𝐼𝐸) which is calculated previously in the joining phase to all RSUs only
and no beacons will be distributed with other cars. If any malicious action or broadcast bogus beacons are
sent to any car or RSU, this vehicle will be traced and revoked by informing all RSUs to delete its signature
and do not deal with it.
4.5. Broadcast and verification phase
These cars that possess value of SF=0 will finally broadcast beacons for both RSUs via V2I
massages and another OBUs via V2V massages. In our proposed scheme, only normal vehicles can do this.
The emergency cars which the system can differentiate by their SF value which equals 1, cannot broadcast to
other OBUs. They only send beacons to RSUs with their special signature (𝑆𝐼𝐸). So, this section will discuss
how these broadcasting operations go ahead. After OBU joins RSU, it will start broadcasting using its
signature (𝑆𝐼 𝑜𝑟 𝑆𝐼𝐸) as follows: OBU calculate the massage signature 𝜎𝑚 = 𝑆𝐼 + 𝑟. ℎ3(𝑚 ∥
𝑇) 𝑓𝑜𝑟 𝑛𝑜𝑟𝑚𝑎𝑙 𝑐𝑎𝑟𝑠, 𝜎𝑒𝑚 = 𝑆𝐼𝐸 + 𝑟. ℎ3(𝑚 ∥ 𝑇) 𝑓𝑜𝑟 𝑒𝑚𝑒𝑔𝑒𝑛𝑐𝑦 𝑐𝑎𝑟𝑠 .
OBU computes verification time for receptor(𝜔) only for normal cars. 𝜔 = ℎ3(𝑚 ∥ 𝑇)𝑃𝐼𝐷𝑣1OBU
for normal vehicles broadcast the following parameters (𝑇, 𝑇𝑠𝑘, 𝑚, 𝜔, 𝜎𝑚, 𝑃𝐼𝐷𝑣1) for both RSUs and OBUs.
While the situation in emergency vehicles broadcast for RSUs only by sending beacons continue
(𝑇, 𝑇𝑠𝑘, 𝑚, 𝜔, 𝜎𝑒𝑚, 𝑃𝐼𝐷𝑣1) and information.
4.6. Vehicle revocation phase
This is an important phase because it allows TAS to trace vehicles against any malicious
authentication or any bogus broadcasting. TAS is not only able to trace but also can revoke these vehicles
with the end of(𝑇𝑠𝑘). Trace and revoke procedures can be summarized the following steps:
If any vehicle broadcast bogus beacons, RSU computes its pseudonym
(𝑝𝑠) 𝑓𝑜𝑟 𝑛𝑜𝑟𝑚𝑎𝑙 𝑣𝑒ℎ𝑖𝑐𝑙𝑒𝑠 , (𝑠𝑝𝑠) 𝑓𝑜𝑟 𝑒𝑚𝑒𝑔𝑒𝑛𝑐𝑦 𝑐𝑎𝑟𝑠. Depending on 𝑃𝐼𝐷𝑣 as:𝑝𝑠 = 𝑃𝐼𝐷𝑣2 +
ℎ1(𝑠. 𝑃𝐼𝐷𝑣1), 𝑠𝑝𝑠 = 𝑃𝐼𝐷𝑣2 + ℎ1(𝑠. 𝑃𝐼𝐷𝑣1).
a) RSU send (𝑝𝑠 𝑜𝑟 𝑠𝑝𝑠) to TAS.
b) TAS will detect the real identity of this vehicle according to the registration record inside TAS.
c) If any illegal identity is detected, TAS will delete this registration from record and send
(acknowledgment) to all RSUs in VANET
d) When RSU receive the (acknowledgment) from TAS, RSU will prevent this vehicle from renewing
its signature. However, revoke operation can take effect after 𝑇𝑠𝑘 𝑒𝑥𝑝𝑖𝑟𝑒𝑑.
8. Indonesian J Elec Eng & Comp Sci ISSN: 2502-4752
Towards design strong emergency and COVID-19 authentication scheme in VANET (Akeel Kassim Leaby)
1815
5. SECURITY ANALYSIS AND EXPERIMENTAL RESULTS
To prove that our proposed scheme is true and strong against well-known attacks we will take in this
section two types of proofing the first about mutual authentication equations and the second for security
analysis.
5.1. Mutual authentication prof
The first prof is for the equations used in the proposed scheme, the first equation will discussed is
the signature renewal (1).
𝜎𝑣𝑃 = ℎ2(𝑃𝐼𝐷𝑣1 ∥ 𝑃𝐼𝐷𝑣2 ∥ 𝑇𝑠𝑘). 𝑝𝑢𝑏𝑘 + ℎ2(𝑃𝐼𝐷𝑣𝑛1 ∥ 𝑃𝐼𝐷𝑣𝑛2 ∥ 𝑇𝑠1)𝑃𝐼𝐷𝑣1
Taking L.H.S:
𝜎𝑣 = 𝑆𝐼 + 𝑟. ℎ2(𝑃𝐼𝐷𝑣𝑛1 ∥ 𝑃𝐼𝐷𝑣𝑛2 ∥ 𝑇𝑠𝑘) & 𝑆𝐼𝑛𝑒𝑤
= 𝑠. ℎ2(𝑃𝐼𝐷𝑣𝑛1 ∥ 𝑃𝐼𝐷𝑣𝑛2 ∥ 𝑇𝑠𝑘) Then:
= 𝑆. ℎ2(𝑃𝐼𝐷𝑣1 ∥ 𝑃𝐼𝐷𝑣2 ∥ 𝑇𝑠𝑘) + 𝑃. 𝑟. ℎ2(𝑃𝐼𝐷𝑣𝑛1 ∥ 𝑃𝐼𝐷𝑣𝑛2 ∥ 𝑇1)
= (𝑃. 𝑟. ℎ2(𝑃𝐼𝐷𝑣𝑛1 ∥ 𝑃𝐼𝐷𝑣𝑛2 ∥ 𝑇1)) + (𝑃. 𝑆. ℎ2(𝑃𝐼𝐷𝑣1 ∥ 𝑃𝐼𝐷𝑣2 ∥ 𝑇𝑠𝑘))
= (𝑃𝐼𝐷𝑣1. ℎ2(𝑃𝐼𝐷𝑣𝑛1 ∥ 𝑃𝐼𝐷𝑣𝑛2 ∥ 𝑇1)) + (𝑝𝑢𝑏𝑘. ℎ2(𝑃𝐼𝐷𝑣1 ∥ 𝑃𝐼𝐷𝑣2 ∥ 𝑇𝑠𝑘))
= R.H.S.
An accurate result is obtained from previous proofing. According to the proposed scheme, the recipient uses
(2) to verify beacons in single verification operations.
𝜎𝑚.𝑃 = ℎ2(𝑃𝐼𝐷𝑣1 ∥ 𝑃𝐼𝐷𝑣2 ∥ 𝑇𝑠𝑘) 𝑝𝑢𝑏𝑘 + 𝜔 (2)
𝜎𝑚 = (𝑆𝐼 + 𝑟. ℎ3(𝑚 ∥ 𝑇)) & 𝑆𝐼 = 𝑠. ℎ2(𝑃𝐼𝐷𝑣1 ∥ 𝑃𝐼𝐷𝑣2 ∥ 𝑇𝑠𝑘)
𝜎𝑚. 𝑃 = (𝑃. 𝑟. ℎ3(𝑚 ∥ 𝑇)) + (𝑃. 𝑆. ℎ2(𝑃𝐼𝐷𝑣1 ∥ 𝑃𝐼𝐷𝑣2 ∥ 𝑇𝑠𝑘))
= (𝑃𝐼𝐷𝑣1. ℎ3(𝑚 ∥ 𝑇)) + 𝑝𝑢𝑏𝑘. ℎ2(𝑃𝐼𝐷𝑣1 ∥ 𝑃𝐼𝐷𝑣2 ∥ 𝑇𝑠𝑘)
= 𝜔 + 𝑝𝑢𝑏𝑘. ℎ2(𝑃𝐼𝐷𝑣1 ∥ 𝑃𝐼𝐷𝑣2 ∥ 𝑇𝑠𝑘)
= 𝑅. 𝐻. 𝑆
According to (2), the result is accurate and can be used effectively. According to (3), which used for (n)
beacons batch verifications.
𝑃. (∑ (𝑥𝑖. 𝜎𝑚𝑖)
𝑛
𝑖=1 ) = (∑ (
𝑛
𝑖=1 𝑥𝑖. 𝜔𝑖) + 𝑝𝑢𝑏𝑘(∑ (𝑥𝑖. ℎ2(𝑃𝐼𝐷𝑖𝑣1 ∥ 𝑃𝐼𝐷𝑖𝑣2 ∥ 𝑇𝑖,𝑠𝑘)
𝑛
𝑖=1 ) (3)
For L.H.S 𝑃. (∑ (𝑥𝑖. 𝜎𝑚𝑖)
𝑛
𝑖=1 )
𝜎𝑚 = 𝑆𝐼 + 𝑟. ℎ3(𝑚 ∥ 𝑇)
𝜎𝑚 = 𝑃. (∑ (𝑥𝑖.(𝑆𝐼 + 𝑟. ℎ3(𝑚 ∥ 𝑇)))
𝑛
𝑖=1
∵ 𝑆𝐼 = 𝑆. ℎ2(𝑃𝐼𝐷𝑖,𝑣1 ∥ 𝑃𝐼𝐷𝑖,𝑣2 ∥ 𝑇𝑖,𝑠𝑘)
= 𝑃. (∑ 𝑥𝑖. ((𝑟𝑖. ℎ3(𝑚𝑖 ∥ 𝑇𝑖) + (𝑆. ℎ2(𝑃𝐼𝐷𝑖,𝑣1 ∥ 𝑃𝐼𝐷𝑖,𝑣2 ∥ 𝑇𝑖,𝑠𝑘))
𝑛
𝑖=1 ))
= ∑ ((𝑃. 𝑥𝑖. 𝑟𝑖. ℎ3(𝑚𝑖 ∥ 𝑇𝑖)) + (𝑃. 𝑆. 𝑥𝑖. ℎ2(𝑃𝐼𝐷𝑖,𝑣1 ∥ 𝑃𝐼𝐷𝑖,𝑣2 ∥ 𝑇𝑖,𝑠𝑘)
𝑛
𝑖=1 ))
= ∑ (𝜔𝑖. 𝑥𝑖) + (𝑥𝑖. 𝑝𝑢𝑏𝑘. ℎ2(𝑃𝐼𝐷𝑖,𝑣1 ∥ 𝑃𝐼𝐷𝑖,𝑣2 ∥ 𝑇𝑖,𝑠𝑘))
𝑛
𝑖=1
= (∑ (𝑥𝑖. 𝜔𝑖)
𝑛
𝑖=1 ) + 𝑝𝑢𝑏𝑘. (∑ 𝑥𝑖. ℎ2(𝑃𝐼𝐷𝑖,𝑣1 ∥ 𝑃𝐼𝐷𝑖,𝑣2 ∥ 𝑇𝑖,𝑠𝑘)
𝑛
𝑖=1 )
= 𝑅. 𝐻. 𝑆 𝑻𝒉𝒆 (𝟑)𝒊𝒔 𝒐𝒄𝒄𝒖𝒓𝒂𝒕𝒆 𝒇𝒐𝒓 𝒃𝒂𝒕𝒄𝒉 𝒗𝒆𝒓𝒊𝒇𝒄𝒂𝒕𝒊𝒐𝒏
5.2. Privacy preservation
There are three types of pseudonym in the proposed scheme: one for normal cars; and two for
urgent/non-urgent emergency cars (for the COVID-19 virus), respectively. In all procedures, privacy
preservation is achieved by concealing the real identity and using a pseudonym. A unique element denotes
the real identity (𝑅𝐼𝐷𝑣), which is TAS. The pseudonym is computed inside TAS, using 𝑝𝑠 = ℎ3(𝑅𝐼𝐷𝑣⫿𝑟) for
normal cars and 𝑠𝑝𝑠 = ℎ3(𝑅𝐼𝐷𝑣⫿𝑟) for emergency and team cars contributing to combatting the COVID-19
epidemic. It is also used to calculate PIDs and to broadcast it within beacons. An adversary cannot re-
compute the real identity of a vehicle based on PIDs, even if it stole RSUs. Thi s is because the PID
calculation involves 𝑃𝐼𝐷𝑉1 = 𝑟. 𝑃 , 𝑃𝐼𝐷𝑉2 = 𝑝𝑠 ⨁ ℎ1(𝑟.𝑝𝑢𝑏𝑘),𝑃𝐼𝐷𝑉1 = 𝑟. 𝑃, 𝑃𝐼𝐷𝑉2 = 𝑠𝑝𝑠 ⨁ ℎ1(𝑟.𝑝𝑢𝑏𝑘), for
normal and emergency vehicles, respectively. In this case, 𝑟 ∈ 𝑧𝑞
. Additionally, in signature renewal for
normal cars, an adversary that has compromised RSUs can receive beacons. It is impossible to discover the
real identity, meaning that- in view of the above- the proposed scheme preserves privacy.
9. ISSN: 2502-4752
Indonesian J Elec Eng & Comp Sci, Vol. 21, No. 3, March 2021 : 1808 - 1819
1816
5.3. Traceability and revocation proof
The following points articulate the proof of traceability and revocation for the proposed scheme:
a) Emergency and COVID-19 teams do not broadcast beacons for other OBUs.
b) All normal vehicles broadcast beacons for OBUs and RSUs. A beacon does not contain any information
about the real identity. As illustrated in the revocation phase, TAS can trace and revoke any vehicle that
broadcasts compromised beacons. The proposed scheme satisfies the tracing and revocation
requirements.
5.4. Resistance against well-known attacks
Because the proposed scheme depends on mutual authentication, the MITM attack cannot take any
effect. Any adversary needs to forge beacons that connect between the sender and receiver, which is
impossible. The proposed scheme is very strong against reply and denial of service DOS attacks. Any
continue beacons transferred among VANET systems have a timestamp that appoints the expired time.
6. PERFORMANCE EVALUATION
This section will describe both computation and communication cost.
6.1. Cost
The performance of our proposed scheme will be explained by comparing with jianhong [17], D.
HE. et al. [18], L wu et al. [19], and J. CU. et al. [20]. This comparison is for computation cost. We note that
[17] use bilinear pairing in cryptography operations, while [18-20] use ECC in cryptography operations.
Bilinear pairing is based on an 80-bit length security level, additive group (𝐺) is generated depending on the
ECC equation (𝐺: 𝑦2
= 𝑥3
+ 𝑥 𝑚𝑜𝑑 𝑝)which uses (𝑝) 𝑜𝑓 a 512-bit prime number. While these protocols use
ECC has the same security level but depends on the equation (𝐺: 𝑦2
= 𝑥3
+ 𝑎𝑥 + 𝑏 𝑚𝑜𝑑𝑒 𝑝) and uses
(p=160 bit). To simplify the understanding of the current section we will use the following notation: Abbr,
BGS, SBVO, and MBVO refer to abbreviation of cryptography operations, beacons generation and signing,
single beacon verification operations, and multi beacons verification operations respectively. We must
explain that we will exclude the execution time of XOR and concatenation because it is very small and can
be neglected. Jianhong et al. [22], proposed a scheme its BGS operations include the following stages: four
hash functions, one map-to-point hash function, two additions point, six numeric multiplications. If we
calculate BGS time for this scheme, we note that total time is (4𝑇ℎ𝑓 + 1𝑇𝑚−𝑝 + 2𝑇𝑎𝑝 + 6𝑇𝑛𝑚)which
approximately equals to (14.8313). SBVO operations include the following stages: two numeric
multiplications, three bilinear pairing, three hash functions, and one additions point. The time calculation is
(2𝑇𝑛𝑚 + 3𝑇𝑏𝑝 + 3𝑇ℎ𝑓 + 1𝑇𝑎𝑝)which is approximately equal to (16.2334). Finally, MBVO involves: (n+1)
numeric multiplication, (2n) small numeric points, (3n-2) additions point, (3n) hash function, and three
bilinear points. The summation of time is (3𝑇𝑏𝑝 + (𝑛 + 1)𝑇𝑛𝑚 + (2𝑛)𝑇𝑠𝑚𝑝 + (3𝑛 − 2)𝑇𝑎𝑝 + (3𝑛)𝑇ℎ𝑓)it is
approximately equal to (1.9313n+14.2136). The scheme proposed by HE. et al. [23] , BGS involved the
following operations: three hash functions, and three numeric multiplications. Hence, the overall BGS
computation will be (3𝑇ℎ𝑓 + 3𝑇𝑛𝑚) which approximately equal to (1.4223). SBVO operations are: two point
additions, two hash functions, and three numeric multiplications, the computation equation will be (2𝑇𝑝𝑎 +
2𝑇ℎ𝑓 + 3𝑇𝑛𝑚) which approximately equal to (1.3329). While MBVO operations are: (2n) small number
multiplication, (2n-1) addition point, (n+2) numeric multiplication, and (2n) hash functions, so the
computation is ((2𝑛)𝑇𝑠𝑛𝑚 + (2𝑛 − 1)𝑇𝑎𝑝 + (𝑛 + 2)𝑇𝑛𝑚 + (2𝑛)𝑇ℎ𝑓) and the result is approximately equal to
(0.5012n+0.7882). The scheme proposed by L wu et al. [24], BGS involved the following operations: two
hash functions, and two numeric multiplications. Hence, the overall BGS computation will be (2𝑇ℎ𝑓 + 2𝑇𝑛𝑚)
which is approximately equal to (0.8833). SBVO operations are: two point additions, two hash functions, and
four numeric multiplications. And the computation equation will be (2𝑇𝑝𝑎 + 2𝑇ℎ𝑓 + 4𝑇𝑛𝑚) which is
approximately equal to (1.7381), while MBVO operations are: (2n+2) numeric multiplication, (2n) small
number multiplication, (2n+1) addition point, and (2n) hash functions, so the computation is (2𝑛 + 2)𝑇𝑛𝑚 +
(2𝑛)𝑇𝑠𝑛𝑚 + (2𝑛 + 1)𝑇𝑎𝑝 + (2𝑛)𝑇ℎ𝑓) and the result is approximately equal to (0.9054n+0.8687).
The scheme proposed by J. CU. et al. [25] has the following operations for BGS: two hash
functions, and two numeric multiplications, so the computation cost will be (2𝑇ℎ𝑓 + 2𝑇𝑛𝑚). The result is
approximately (0,8644). SBVO comprises two numeric multiplication, two hash functions, and one additions
point. Hence (2𝑇𝑛𝑚 + 2𝑇ℎ𝑓 + 𝑇𝑎𝑝) is the computation cost equation and it is approximately equal to
(1.3381). While MBVO computations equation is (2𝑇𝑛𝑚 + (2𝑛)𝑇𝑠𝑝𝑚 + (2𝑛 + 1)𝑇𝑎𝑝 + (𝑛)𝑇ℎ𝑓) because it
10. Indonesian J Elec Eng & Comp Sci ISSN: 2502-4752
Towards design strong emergency and COVID-19 authentication scheme in VANET (Akeel Kassim Leaby)
1817
involves two numeric multiplication, (2n) small point multiplications, (2n+1) additions point, and (n) hash
functions, and the result is approximately equal to (0.4888n+0.8734). Finally, we discuss our proposed
scheme computation cost. BGS includes the following operations: two hash functions, and one numeric
multiplication. So, the computation equation is (2𝑇ℎ𝑓 + 1𝑇𝑛𝑚)𝑎𝑛𝑑 𝑡ℎ𝑒 𝑟𝑒𝑠𝑢𝑙𝑡 𝑖𝑠 (0.4233). SBVO
calculations are (2𝑇𝑛𝑚 + 1𝑇ℎ𝑓 + 1𝑇𝑎𝑝) because it involves the following operations: two numeric
multiplications, one hash function, and one additions point, and the result is approximately equal to (0.8765).
While MBVO calculation equation constructed from: two numeric multiplication, (2n) small numeric
multiplication, (n+1) additions point, and (n) hash function, the equation is (2𝑇𝑛𝑚 + (2𝑛)𝑇𝑠𝑛𝑚 +
(𝑛 + 1)𝑇𝑎𝑝 + 𝑛𝑇ℎ𝑓). Hence the result of MBVO computation cost is approximately (0.03001n+0.9211).
Table 3 show the improvement of our proposed scheme in all computational costs with the other discussed
schemes. Figure 4 illustrates the computation cost for all studded schemes and our proposed scheme with
different number of beacons.
Figure 4. computation cost for different number of beacons
Table 3. Improvement of the reposed scheme
Scheme BGS and BGS improvement
of our scheme
SBVO and SBVO
improvement of our scheme
MBVO and MBVO improvement
of our scheme ( for 50 beacons)
BGS Improvement
(0.4232) (%)
SBVO Improvement
(0.8765) (%)
MBVO Improvement
(2.4020) (%)
Jianhong et al. [22] 14.8313 97.14657515 16.2333 94.60060493 2.4112 0.381552754
HE. et al. [23] 1.4223 70.24537721 1.3329 34.24112837 2.6766 10.25928417
L wu et al. [24] 0.8833 52.08875807 1.7381 49.57137104 2.5644 6.332865388
J. CU. et al. [25] 0.8644 51.04118464 1.3381 34.49667439 2.4454 1.774760775
6.2. Communication cost
This section will compare between jianhong [22], D. HE. et al. [23], L wu et al. [24], and J. CU. et
al. [25] schemes and our proposed scheme term of communication cost to find the overall overhead of our
proposed scheme. As explained in the computation cost section, 𝑝̅ size is 64-bytes, therefore the size of 𝐺̅
will be 128-bytes. Also, size of p is 20-bytes and the size of G therefore will be 40-bytes. We assume time
stamp size as 6-bytes, hash function to be 24-bytes, and assume elements in group integers to be 26-bytes.
The Table 4 illustrates the communication cost for all mentioned schemes, we exclude the beacon inside
content from our calculation. Jianhong [22], proposed a scheme with beacon size of (128*3+6) which equal
to 390-bytes. This beacon includes three elements in 𝐺̅, and one time stamp. HE. et al. [23], proposed a
scheme its beacons of (40*3+26+6)=152 bytes. Beacon involves three elements in G, time stamp, and one
elements in 𝑧𝑞. L wu et al. [24], argue that beacon size consisted from three elements in G, one hash function,
and two time stamp. So, the size of beacon will be (40*3+24+10)=154 bytes. J. CU. et al.[25], decided the
beacons size to be (40+(26*2)+6)=98 bytes. This beacon involved two elements in 𝑧𝑞, one time stamp, and
one elements in 𝐺̅. In our proposed scheme, we note that the beacons contain one element in 𝐺̅, three
elements in 𝑧𝑞, and one time stamp. Beacon size will be (40+ (3*26)+(2*6))=130 bytes. As shown in the
previous calculations, our scheme possesses big overhead compared with the other schemes.
11. ISSN: 2502-4752
Indonesian J Elec Eng & Comp Sci, Vol. 21, No. 3, March 2021 : 1808 - 1819
1818
Table 4. Schemes communication cost
Scheme Communication cost
Jianhong et al. [22] 390
HE. et al. [23] 152
L wu et al. [24] 154
J. CU. et al. [25] 98
Our scheme 130
7. CONCLUSION
This paper suggests a new spurious-ID based scheme in VANET with conditional pseudonym,
integrity and message authentication. The proposed scheme uses a pseudonym instead of the vehicles real
identity. The generation of this alternate identity depends on vehicles classification if normal or emergency.
The proposed scheme satisfies all the privacy and security requirements and resisting the common attacks in
VANET. The suggested scheme provides conditional anonymity in which if any vehicles conducting
malicious then its real identity will uncover. Our scheme does not require the convention operations that are
produced by a bilinear pairing operation. So, the proposed scheme able to conquer most of drawbacks of ID-
based schemes. The preserve privacy in terms of the vehicle’s real identity even from an insider attacker is
one of the important characteristic. Furthermore, the TA can trace a dummy vehicle and revoke it as a
member of the VANET. In addition to the proposed role in the process of expediting the arrival of medical
teams (especially for COVID-19) and any vehicle bearing an emergency status by giving them the privilege
to use the road and suggest alternative lanes in the event of a breakdown or interruption of the roads. A
security analysis shows that the scheme is secure under the random oracle module and meets the security and
privacy conditions of a VANET. We compare our scheme with related ID-based schemes that our scheme
has computation costs lower than previous schemes and lightweight communication.
REFERENCE
[1] Qu, F., et al., "A security and privacy review of VANETs," IEEE Transactions on Intelligent Transportation
Systems, vol. 16, no. 6, pp. 2985-2996, 2015.
[2] Al Shareeda, M., A. Khalil, and W. Fahs, "Realistic heterogeneous genetic-based RSU placement solution for V2I
networks," Int. Arab J. Inf. Technol., vol. 16, no. 3A, pp. 540-547, 2019.
[3] Jabbarpour, M.R., et al., "Applications of computational intelligence in vehicle traffic congestion problem: a
survey," Soft Computing, 2018. 22(7): pp. 2299-2320.
[4] Bayat, M., et al., "NERA: A new and efficient RSU based authentication scheme for VANETs," Wireless networks,
pp. 1-16, 2019.
[5] Huang, J.-L., L.-Y. Yeh, and H.-Y. Chien, "ABAKA: An anonymous batch authenticated and key agreement
scheme for value-added services in vehicular ad hoc networks," IEEE Transactions on Vehicular Technology, vol.
60, no. 1, pp. 248-262, 2010.
[6] Long, S., "A Comparative Analysis of the Application of Hashing Encryption Algorithms for MD5, SHA-1, and
SHA-512," in Journal of Physics: Conference Series: IOP Publishing, 2019.
[7] Ahmad, I. and A.S. Das, "Hardware implementation analysis of SHA-256 and SHA-512 algorithms on FPGAs,"
Computers & Electrical Engineering, vol. 31, no. 6, pp. 345-360, 2005.
[8] NIST, U., "Descriptions of SHA-256, SHA-384 and SHA-512," Technical report, 2001.
[9] La, V.H. and A.R. Cavalli, "Security attacks and solutions in vehicular ad hoc networks: a survey, 2014.
[10] Raya, M. and J.-P. Hubaux, "Securing vehicular ad hoc networks," Journal of computer security, vol. 15, no. 1, pp.
39-68, 2007.
[11] Lu, R., et al. "ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications," in
IEEE INFOCOM 2008-The 27th Conference on Computer Communications: IEEE, 2008.
[12] Zhang, C., et al. "RAISE: An efficient RSU-aided message authentication scheme in vehicular communication
networks," in 2008 IEEE international conference on communications, IEEE, 2008.
[13] Rajput, U., F. Abbas, and H. Oh, "A hierarchical privacy preserving pseudonymous authentication protocol for
VANET," IEEE Access, vol. 4, pp. 7770-7784, 2016.
[14] Ming, Y. and H. Cheng, "Efficient certificateless conditional privacy-preserving authentication scheme in
VANETs," Mobile Information Systems, 2019.
[15] Zhang, L., et al., "Privacy-preserving vehicular communication authentication with hierarchical aggregation and
fast response, IEEE Transactions on Computers, vol. 65, no. 8, pp. 2562-2574, 2015.
[16] Zhang, L., et al., "Distributed aggregate privacy-preserving authentication in VANETs," IEEE Transactions on
Intelligent Transportation Systems, vol. 18, no. 3, pp. 516-526, 2016.
[17] Zhang, C., P.-H. Ho, and J. Tapolcai, "On batch verification with group testing for vehicular communications,"
Wireless networks, vol. 17, no. 8, p. 1851, 2011.
[18] Lee, C.-C. and Y.-M. Lai, "Toward a secure batch verification with group testing for VANET," Wireless networks,
vol. 19, no. 6, pp. 1441-1449, 2013.
12. Indonesian J Elec Eng & Comp Sci ISSN: 2502-4752
Towards design strong emergency and COVID-19 authentication scheme in VANET (Akeel Kassim Leaby)
1819
[19] Vijayakumar, P., et al., "Dual authentication and key management techniques for secure data transmission in
vehicular ad hoc networks," IEEE Transactions on Intelligent Transportation Systems, vol. 17, no. 4, pp. 1015-
1028, 2015.
[20] Wang, S. and N. Yao, "LIAP: A local identity-based anonymous message authentication protocol in VANETs,"
Computer Communications, vol. 112, pp. 154-164, 2017.
[21] Ali, I., T. Lawrence, and F. Li, "An efficient identity-based signature scheme without bilinear pairing for vehicle-
to-vehicle communication in VANETs," Journal of Systems Architecture, vol. 103, p. 101692, 2020.
[22] Jianhong, Z., X. Min, and L. Liying, "On the security of a secure batch verification with group testing for VANET,"
International Journal of Network Security, vol. 16, no. 5, pp. 351-358, 2014.
[23] He, D., et al., "An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad
hoc networks," IEEE Transactions on Information Forensics and Security, vol. 10, no. 12, pp. 2681-2691, 2015.
[24] Wu, L., et al., "Efficient location-based conditional privacy-preserving authentication scheme for vehicle ad hoc
networks," International Journal of Distributed Sensor Networks, vol. 13, no. 3, pp. 1550147717700899, 2017.
[25] Cui, J., et al., "SPACF: A secure privacy-preserving authentication scheme for VANET with cuckoo filter," IEEE
Transactions on Vehicular Technology, vol. 66, no. 11, pp. 10283-10295, 2017.