A novel trust-based security and privacy model for Internet of Vehicles using encryption and steganography

Manjari Singh Rathore, M. Poongodi, Praneet Saurabh, Umesh Kumar Lilhore, Sami Bourouis, Wajdi Alhakami, Jude Osamor and Mounir Hamdi 2022. A novel trust-based security and privacy model for Internet of Vehicles using encryption and steganography. Computers and Electrical Engineering. 102 108205. https://doi.org/10.1016/j.compeleceng.2022.108205

TitleA novel trust-based security and privacy model for Internet of Vehicles using encryption and steganography
TypeJournal article
AuthorsManjari Singh Rathore, M. Poongodi, Praneet Saurabh, Umesh Kumar Lilhore, Sami Bourouis, Wajdi Alhakami, Jude Osamor and Mounir Hamdi
Abstract

High-speed wireless network technologies play a vital role in autonomous vehicle communication systems (AVS), i.e., IoV (Internet of Vehicles), and enhance the effectiveness and reliability of the communication network. Since the size of IoV communication is rapidly growing, it is now an essential part of our regular routines. Due to its dynamic nature and massive size, it is essential to avoid any miss-communication and protect the data privacy of each vehicle.IoVallowsAVS to link remotely to each other and to various platforms and groups that may be using the same communications system. This quality link between vehicles and the need for information exchanges among vehicles introduces vulnerability and threats that can be exploited by cybercriminals. This research emphasizes on enhancing data security in real-time IoV communication. It presents a trust-driven privacy method using encryption and steganography for IoV. This method uses an Efficient Algorithm for Secure Transmission (EAST) that integrates encryption and steganography algorithms. The proposed EAST is then compared to the various current state of arts, i.e., AES (Advanced Encryption Standard), DES (Data Encryption Standard), G-DES (Generalized DES), and Standard LSB on the basis of various performance measuring parameters, i.e., encryption and decryption time, efficiency, avalanche effect, PSNR, and file cover size. Experimental results are promising for the proposed EAST method, which reported a better time efficiency of 0.86 ms, avalanche effect of 58.81%, and PSNR of 78.58%, compared to the current state arts.

Article number108205
JournalComputers and Electrical Engineering
Journal citation102
ISSN0045-7906
Year2022
PublisherElsevier
Digital Object Identifier (DOI)https://doi.org/10.1016/j.compeleceng.2022.108205
Web address (URL)http://dx.doi.org/10.1016/j.compeleceng.2022.108205
Publication dates
Published in printSep 2022
Published online09 Jul 2022

Related outputs

Enhanced Image-Based Malware Classification Using Transformer-Based Convolutional Neural Networks (CNNs)
Ashawa, M., Owoh, N., Hosseinzadeh, S. and Osamor, Jude 2024. Enhanced Image-Based Malware Classification Using Transformer-Based Convolutional Neural Networks (CNNs). Electronics. 13 (20) 4081. https://doi.org/10.3390/electronics13204081

Malware Detection Based on API Call Sequence Analysis: A Gated Recurrent Unit–Generative Adversarial Network Model Approach
Owoh, Nsikak, Adejoh, J., Hosseinzadeh, S., Ashawa, M., Osamor, Jude and Qureshi, Ayyaz 2024. Malware Detection Based on API Call Sequence Analysis: A Gated Recurrent Unit–Generative Adversarial Network Model Approach. Future Internet. 16 (10), p. 369. https://doi.org/10.3390/fi16100369

Digital Forensics Challenges in Cyberspace: Overcoming Legitimacy and Privacy Issues Through Modularisation
Ashawa, M., Mansour, A., Riley, J., Osamor, J. and Owoh, N.P. 2024. Digital Forensics Challenges in Cyberspace: Overcoming Legitimacy and Privacy Issues Through Modularisation. Cloud Computing and Data Science. 5 (1), pp. 140-156. https://doi.org/10.37256/ccds.512024

An Adaptive Temporal Convolutional Network Autoencoder for Malicious Data Detection in Mobile Crowd Sensing
Nsikak Owoh, Jackie Riley, Moses Ashawa, Salaheddin Hosseinzadeh, Anand Philip and Jude Osamor 2024. An Adaptive Temporal Convolutional Network Autoencoder for Malicious Data Detection in Mobile Crowd Sensing. Sensors. 24 (7) 2353. https://doi.org/10.3390/s24072353

An Exploration of shared code execution for malware analysis
Moses Ashawa, Nsikak Pius Owoh, Jackie Riley, Jude Osamor and Salaheddin Hosseinzadeh 2024. An Exploration of shared code execution for malware analysis. 2024 International Conference on Artificial Intelligence, Computer, Data Sciences and Applications (ACDSA). Victoria, Seychelles 01 - 02 Feb 2024 IEEE . https://doi.org/10.1109/acdsa59508.2024.10467679

Preprint: Enhancing Credit Card Fraud Detection: An Ensemble Machine Learning Approach
Abdul Rehman Khalid, Nsikak Owoh, Omair Uthmani, Moses Ashawa, Jude Osamor and John Adejoh 2024. Preprint: Enhancing Credit Card Fraud Detection: An Ensemble Machine Learning Approach. Preprints.org. https://doi.org/10.20944/preprints202312.1007.v1

Enhancing Credit Card Fraud Detection: An Ensemble Machine Learning Approach
Abdul Rehman Khalid, Nsikak Owoh, Omair Uthmani, Moses Ashawa, Jude Osamor and John Adejoh 2024. Enhancing Credit Card Fraud Detection: An Ensemble Machine Learning Approach. Big Data and Cognitive Computing. 8 (1) 6. https://doi.org/10.3390/bdcc8010006

Vehicular Propagation Velocity Forecasting Using Open CV
Udayan Das, Vandana Sharma, Madhabananda Das, Sushruta Mishra, Celestine Iwendi and Jude Osamor 2023. Vehicular Propagation Velocity Forecasting Using Open CV. 2023 4th International Conference on Computation, Automation and Knowledge Management (ICCAKM). Dubai, United Arab Emirates 12 - 13 Dec 2023 IEEE . https://doi.org/10.1109/iccakm58659.2023.10449587

Twitter Sentiment Analysis and Emotion Detection Using NLTK and TextBlob
Nehal, Divyank Jeet, Vandana Sharma, Sushruta Mishra, Celestine Iwendi and Jude Osamor 2023. Twitter Sentiment Analysis and Emotion Detection Using NLTK and TextBlob. 2023 4th International Conference on Computation, Automation and Knowledge Management (ICCAKM). Dubai, United Arab Emirates 12 - 13 Dec 2023 IEEE . https://doi.org/10.1109/iccakm58659.2023.10449540

Design and Implementation of an Optimized Mask RCNN Model for Liver Tumour Prediction and Segmentation
Raman Thakur, Dayal Rohan Volety, Vandana Sharma, Sushruta Mishra, Celestine Iwendi and Jude Osamor 2023. Design and Implementation of an Optimized Mask RCNN Model for Liver Tumour Prediction and Segmentation. 2023 4th International Conference on Computation, Automation and Knowledge Management (ICCAKM). Dubai, United Arab Emirates 12 - 13 Dec 2023 IEEE . https://doi.org/10.1109/iccakm58659.2023.10449653

Sustainable Climatic Metrics Determination with Ensemble Predictive Analytics
Ashis Pattanaik, Vandana Sharma, Kanhaiya Kunj, Sushruta Mishra, Celestine Iwendi and Jude Osamor 2023. Sustainable Climatic Metrics Determination with Ensemble Predictive Analytics. 2023 4th International Conference on Computation, Automation and Knowledge Management (ICCAKM). Dubai, United Arab Emirates 12 - 13 Dec 2023 IEEE . https://doi.org/10.1109/iccakm58659.2023.10449578

The Impact of Cyber Threats on the Global Food Supply Chain: a Focus on Grain Storage Security
Aliyu Yisa, Mohammed Gana Yisa, Jude Osamor and Mohammed Yisa 2023. The Impact of Cyber Threats on the Global Food Supply Chain: a Focus on Grain Storage Security. Authorea. https://doi.org/10.22541/au.169511622.28532721/v1

A big data study of language use and impact in radio broadcasting in China
Ruihua Zhang, Jincheng Zhou, Tao Hai, Shixue Zhang, Marvellous Iwendi, Mohd Asif Shah and Jude Osamor 2023. A big data study of language use and impact in radio broadcasting in China. Journal of Cloud Computing: Advances, Systems and Applications. 12 28. https://doi.org/10.1186/s13677-023-00399-6

Preprint: Higher Education Perceived Stress and Physical Stress: Big Data Analysis
Ruihua Zhang, Jincheng Zhou, Tao Hai, Shixue Zhang, Jude Osamor, Marvellous GodsPraise Iwendi and Mohammad Shah 2022. Preprint: Higher Education Perceived Stress and Physical Stress: Big Data Analysis. Research Square. https://doi.org/10.21203/rs.3.rs-2146058/v1

Inferences Derived from Reservoir Permeability Estimation Using Static and Dynamic Data: Core Data Analysis Versus Drawdown Tests
Francis Nwabia, Jude Osamor, Robinson Madu, Nkemakolam Izuwa and Anthony Chikwe 2021. Inferences Derived from Reservoir Permeability Estimation Using Static and Dynamic Data: Core Data Analysis Versus Drawdown Tests. in: Jia'en Lin (ed.) IPPTC 2021: Proceedings of the 2021 International Petroleum and Petrochemical Technology Conference Springer Nature. pp. 184-196

Permalink - https://westminsterresearch.westminster.ac.uk/item/w80v5/a-novel-trust-based-security-and-privacy-model-for-internet-of-vehicles-using-encryption-and-steganography


Share this

Usage statistics

40 total views
0 total downloads
These values cover views and downloads from WestminsterResearch and are for the period from September 2nd 2018, when this repository was created.