Adaptive Security Mechanism for Vehicular Data Networks or Platform using Degree of Privacy
Keywords:
Private Key and Public key cryptography algorithms, Security and Privacy, Vehicular data networksAbstract
Vehicular data platforms and networks use IoT devices to provide communication support system and enable the value-added services which generates large amount of vehicular data. The need of hour is to provide security to vehicular data platforms. In this paper, adaptive security mechanism was proposed to secure vehicular data. An adaptive security mechanism allows users to select the degree of privacy they want to use. The privacy degree is divided into low-level, medium level and high level as per the requirement of user. The vehicular data is categorized into vehicle identification & configuration data, running status data, maintenance data, insurance data, driving safety data etc. Different private-key and public-key cryptography algorithms such as DES, AES, RSA are applied on vehicular data of different sizes and suggested the type of suitable algorithm to maintain the degree of privacy and to ensure the requirement of vehicular data category.
Downloads
References
Ahmer khan jadoon, Lincheng Wang, Tong Li, “Lightweight Cryptographic Techniques for Automotive Cyber security” volume 2018,
Specification defines the standard for vehicle data “https://www.w3.org/TR/vehicle-data”
C. Kaiser , A. Stocker1 , G. Viscusi , A. Festl , P. Mörtl , M. Glitzne,Virtual Vehicle Research Center, “Quantified Cars An exploration of the position of ICT start-ups vs. car manufacturers towards digital car services and sustainable business models”,
D. Coopersmith, “The Data Encryption Standard and its strength against attacks”, IBM J RES, Vol 38 no. 3 1994
Seung-Jo Han, Heang-Soo Oh, “The improved Data Encryption Standard (DES) Algorithm”, Jongan Park IEEE Transaction 1996
“Data Encryption Standard for IoT Applications based on Catalan objects and Two combinatorial structure”, IEEE Transaction 2020
Muzafer H, Mohamed Elhoseny, Mahmoud Mohamed Selim, and K. Shankar, “The comparative study of the performance and security issues of AES and RSA Cryptography” Abdullah Al Hasib and Abul Ahsan Md. Mahmudul Haque, 978-0-7695-3407-7/08, 2008 IEEE, DOI 10.1109/ICCIT.2008.179
Xin Zhou, Xiaofei Tang, “Research and Implementation of RSA Algorithm for
Encryption and Decryption”, IEEE 6th International Forum on Strategic Technology 2011
Miles e. smld and dennis k. branstad, “The Data Encryption Standard: Past and Future”, ,proceedings of the ieee, vol. 76, no. 5, may 1988
“Adaptive security provisioning for vehicular safety applications”, January 2017 International Journal of Space-Based and Situated Computing 7(1):16, DOI: 10.1504/IJSSC.2017.084120
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.