Loading…

Optimized Security Algorithms for Intelligent and Autonomous Vehicular Transportation Systems

With the growth of the Internet of Vehicles (IoV) in Intelligent Autonomous Transport Systems (IATS), a huge volume of data is exchanged between vehicles in these newly developed infrastructures. As a result, the requirements of securing data exchange between vehicles, autonomous or otherwise, have...

Full description

Saved in:
Bibliographic Details
Published in:IEEE transactions on intelligent transportation systems 2023-02, Vol.24 (2), p.2038-2044
Main Authors: Kamal, Mohsin, Tariq, Muhammad, Srivastava, Gautam, Malina, Lukas
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c293t-421606785b2fcdf3b4b8bef92a19ebec407cba311b3c1eecd23a4973798c76153
cites cdi_FETCH-LOGICAL-c293t-421606785b2fcdf3b4b8bef92a19ebec407cba311b3c1eecd23a4973798c76153
container_end_page 2044
container_issue 2
container_start_page 2038
container_title IEEE transactions on intelligent transportation systems
container_volume 24
creator Kamal, Mohsin
Tariq, Muhammad
Srivastava, Gautam
Malina, Lukas
description With the growth of the Internet of Vehicles (IoV) in Intelligent Autonomous Transport Systems (IATS), a huge volume of data is exchanged between vehicles in these newly developed infrastructures. As a result, the requirements of securing data exchange between vehicles, autonomous or otherwise, have also increased tremendously. Securing data transfer and keeping a record of each transaction becomes a necessity in IoV/IATS. In this paper, we propose some optimized security algorithms using symmetric encryption for secure multimedia data transfer between vehicles. The main feature of these optimized algorithms is that they use a lower amount of data to generate fingerprints. The algorithms convert approximately 3.7 \times 10^{5} samples of data into 3600 samples to generate the fingerprint. Fast Fourier Transform (FFT) is used to fetch the highest three peak values of the signal in the frequency domain. A centralized server authenticates the data transfer by comparing the HASH of the fingerprints and also keeps the transaction record. Through experimental analysis, the performance of proposed algorithms is confirmed by achieving reduced size samples to generate fingerprints and their authentication at the server-side.
doi_str_mv 10.1109/TITS.2021.3123188
format article
fullrecord <record><control><sourceid>proquest_ieee_</sourceid><recordid>TN_cdi_ieee_primary_9599461</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9599461</ieee_id><sourcerecordid>2775104360</sourcerecordid><originalsourceid>FETCH-LOGICAL-c293t-421606785b2fcdf3b4b8bef92a19ebec407cba311b3c1eecd23a4973798c76153</originalsourceid><addsrcrecordid>eNo9kMtqwzAQRU1poWnaDyjdCLp2qpH80jKEPgKBLOJ2V4wsjxMF23IleZF-fW0SuprLcO4MnCB4BLoAoOIlX-e7BaMMFhwYhyy7CmYQx1lIKSTXU2ZRKGhMb4M7547jNooBZsH3tve61b9YkR2qwWp_Istmb8ZwaB2pjSXrzmPT6D12nsiuIsvBm860ZnDkCw9aDY20JLeyc72xXnptOrI7OY-tuw9uatk4fLjMefD59pqvPsLN9n29Wm5CxQT3YcQgoUmaxSWrVVXzMiqzEmvBJAgsUUU0VaXkACVXgKgqxmUkUp6KTKUJxHwePJ_v9tb8DOh8cTSD7caXBUvTGGjEEzpScKaUNc5ZrIve6lbaUwG0mCwWk8VislhcLI6dp3NHI-I_L2IhogT4Hzevb_0</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2775104360</pqid></control><display><type>article</type><title>Optimized Security Algorithms for Intelligent and Autonomous Vehicular Transportation Systems</title><source>IEEE Electronic Library (IEL) Journals</source><creator>Kamal, Mohsin ; Tariq, Muhammad ; Srivastava, Gautam ; Malina, Lukas</creator><creatorcontrib>Kamal, Mohsin ; Tariq, Muhammad ; Srivastava, Gautam ; Malina, Lukas</creatorcontrib><description><![CDATA[With the growth of the Internet of Vehicles (IoV) in Intelligent Autonomous Transport Systems (IATS), a huge volume of data is exchanged between vehicles in these newly developed infrastructures. As a result, the requirements of securing data exchange between vehicles, autonomous or otherwise, have also increased tremendously. Securing data transfer and keeping a record of each transaction becomes a necessity in IoV/IATS. In this paper, we propose some optimized security algorithms using symmetric encryption for secure multimedia data transfer between vehicles. The main feature of these optimized algorithms is that they use a lower amount of data to generate fingerprints. The algorithms convert approximately <inline-formula> <tex-math notation="LaTeX">3.7 \times 10^{5} </tex-math></inline-formula> samples of data into 3600 samples to generate the fingerprint. Fast Fourier Transform (FFT) is used to fetch the highest three peak values of the signal in the frequency domain. A centralized server authenticates the data transfer by comparing the <inline-formula> <tex-math notation="LaTeX">HASH </tex-math></inline-formula> of the fingerprints and also keeps the transaction record. Through experimental analysis, the performance of proposed algorithms is confirmed by achieving reduced size samples to generate fingerprints and their authentication at the server-side.]]></description><identifier>ISSN: 1524-9050</identifier><identifier>EISSN: 1558-0016</identifier><identifier>DOI: 10.1109/TITS.2021.3123188</identifier><identifier>CODEN: ITISFG</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Algorithms ; autonomous transport ; cybersecurity ; Data exchange ; Data models ; Data transfer ; Data transfer (computers) ; Fast Fourier transformations ; Fingerprints ; Fourier transforms ; Internet of Things ; Internet of Vehicles ; Multimedia ; Optimization ; Security ; Servers ; Transportation systems ; vehicle to vehicle ; Vehicles ; Vehicular ad hoc networks</subject><ispartof>IEEE transactions on intelligent transportation systems, 2023-02, Vol.24 (2), p.2038-2044</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2023</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c293t-421606785b2fcdf3b4b8bef92a19ebec407cba311b3c1eecd23a4973798c76153</citedby><cites>FETCH-LOGICAL-c293t-421606785b2fcdf3b4b8bef92a19ebec407cba311b3c1eecd23a4973798c76153</cites><orcidid>0000-0001-9851-4103 ; 0000-0003-1296-2058 ; 0000-0002-3893-4330 ; 0000-0002-7208-2514</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9599461$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,27901,27902,54771</link.rule.ids></links><search><creatorcontrib>Kamal, Mohsin</creatorcontrib><creatorcontrib>Tariq, Muhammad</creatorcontrib><creatorcontrib>Srivastava, Gautam</creatorcontrib><creatorcontrib>Malina, Lukas</creatorcontrib><title>Optimized Security Algorithms for Intelligent and Autonomous Vehicular Transportation Systems</title><title>IEEE transactions on intelligent transportation systems</title><addtitle>TITS</addtitle><description><![CDATA[With the growth of the Internet of Vehicles (IoV) in Intelligent Autonomous Transport Systems (IATS), a huge volume of data is exchanged between vehicles in these newly developed infrastructures. As a result, the requirements of securing data exchange between vehicles, autonomous or otherwise, have also increased tremendously. Securing data transfer and keeping a record of each transaction becomes a necessity in IoV/IATS. In this paper, we propose some optimized security algorithms using symmetric encryption for secure multimedia data transfer between vehicles. The main feature of these optimized algorithms is that they use a lower amount of data to generate fingerprints. The algorithms convert approximately <inline-formula> <tex-math notation="LaTeX">3.7 \times 10^{5} </tex-math></inline-formula> samples of data into 3600 samples to generate the fingerprint. Fast Fourier Transform (FFT) is used to fetch the highest three peak values of the signal in the frequency domain. A centralized server authenticates the data transfer by comparing the <inline-formula> <tex-math notation="LaTeX">HASH </tex-math></inline-formula> of the fingerprints and also keeps the transaction record. Through experimental analysis, the performance of proposed algorithms is confirmed by achieving reduced size samples to generate fingerprints and their authentication at the server-side.]]></description><subject>Algorithms</subject><subject>autonomous transport</subject><subject>cybersecurity</subject><subject>Data exchange</subject><subject>Data models</subject><subject>Data transfer</subject><subject>Data transfer (computers)</subject><subject>Fast Fourier transformations</subject><subject>Fingerprints</subject><subject>Fourier transforms</subject><subject>Internet of Things</subject><subject>Internet of Vehicles</subject><subject>Multimedia</subject><subject>Optimization</subject><subject>Security</subject><subject>Servers</subject><subject>Transportation systems</subject><subject>vehicle to vehicle</subject><subject>Vehicles</subject><subject>Vehicular ad hoc networks</subject><issn>1524-9050</issn><issn>1558-0016</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><recordid>eNo9kMtqwzAQRU1poWnaDyjdCLp2qpH80jKEPgKBLOJ2V4wsjxMF23IleZF-fW0SuprLcO4MnCB4BLoAoOIlX-e7BaMMFhwYhyy7CmYQx1lIKSTXU2ZRKGhMb4M7547jNooBZsH3tve61b9YkR2qwWp_Istmb8ZwaB2pjSXrzmPT6D12nsiuIsvBm860ZnDkCw9aDY20JLeyc72xXnptOrI7OY-tuw9uatk4fLjMefD59pqvPsLN9n29Wm5CxQT3YcQgoUmaxSWrVVXzMiqzEmvBJAgsUUU0VaXkACVXgKgqxmUkUp6KTKUJxHwePJ_v9tb8DOh8cTSD7caXBUvTGGjEEzpScKaUNc5ZrIve6lbaUwG0mCwWk8VislhcLI6dp3NHI-I_L2IhogT4Hzevb_0</recordid><startdate>20230201</startdate><enddate>20230201</enddate><creator>Kamal, Mohsin</creator><creator>Tariq, Muhammad</creator><creator>Srivastava, Gautam</creator><creator>Malina, Lukas</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>FR3</scope><scope>JQ2</scope><scope>KR7</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0001-9851-4103</orcidid><orcidid>https://orcid.org/0000-0003-1296-2058</orcidid><orcidid>https://orcid.org/0000-0002-3893-4330</orcidid><orcidid>https://orcid.org/0000-0002-7208-2514</orcidid></search><sort><creationdate>20230201</creationdate><title>Optimized Security Algorithms for Intelligent and Autonomous Vehicular Transportation Systems</title><author>Kamal, Mohsin ; Tariq, Muhammad ; Srivastava, Gautam ; Malina, Lukas</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c293t-421606785b2fcdf3b4b8bef92a19ebec407cba311b3c1eecd23a4973798c76153</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Algorithms</topic><topic>autonomous transport</topic><topic>cybersecurity</topic><topic>Data exchange</topic><topic>Data models</topic><topic>Data transfer</topic><topic>Data transfer (computers)</topic><topic>Fast Fourier transformations</topic><topic>Fingerprints</topic><topic>Fourier transforms</topic><topic>Internet of Things</topic><topic>Internet of Vehicles</topic><topic>Multimedia</topic><topic>Optimization</topic><topic>Security</topic><topic>Servers</topic><topic>Transportation systems</topic><topic>vehicle to vehicle</topic><topic>Vehicles</topic><topic>Vehicular ad hoc networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Kamal, Mohsin</creatorcontrib><creatorcontrib>Tariq, Muhammad</creatorcontrib><creatorcontrib>Srivastava, Gautam</creatorcontrib><creatorcontrib>Malina, Lukas</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Xplore</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>Engineering Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Civil Engineering Abstracts</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE transactions on intelligent transportation systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Kamal, Mohsin</au><au>Tariq, Muhammad</au><au>Srivastava, Gautam</au><au>Malina, Lukas</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Optimized Security Algorithms for Intelligent and Autonomous Vehicular Transportation Systems</atitle><jtitle>IEEE transactions on intelligent transportation systems</jtitle><stitle>TITS</stitle><date>2023-02-01</date><risdate>2023</risdate><volume>24</volume><issue>2</issue><spage>2038</spage><epage>2044</epage><pages>2038-2044</pages><issn>1524-9050</issn><eissn>1558-0016</eissn><coden>ITISFG</coden><abstract><![CDATA[With the growth of the Internet of Vehicles (IoV) in Intelligent Autonomous Transport Systems (IATS), a huge volume of data is exchanged between vehicles in these newly developed infrastructures. As a result, the requirements of securing data exchange between vehicles, autonomous or otherwise, have also increased tremendously. Securing data transfer and keeping a record of each transaction becomes a necessity in IoV/IATS. In this paper, we propose some optimized security algorithms using symmetric encryption for secure multimedia data transfer between vehicles. The main feature of these optimized algorithms is that they use a lower amount of data to generate fingerprints. The algorithms convert approximately <inline-formula> <tex-math notation="LaTeX">3.7 \times 10^{5} </tex-math></inline-formula> samples of data into 3600 samples to generate the fingerprint. Fast Fourier Transform (FFT) is used to fetch the highest three peak values of the signal in the frequency domain. A centralized server authenticates the data transfer by comparing the <inline-formula> <tex-math notation="LaTeX">HASH </tex-math></inline-formula> of the fingerprints and also keeps the transaction record. Through experimental analysis, the performance of proposed algorithms is confirmed by achieving reduced size samples to generate fingerprints and their authentication at the server-side.]]></abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TITS.2021.3123188</doi><tpages>7</tpages><orcidid>https://orcid.org/0000-0001-9851-4103</orcidid><orcidid>https://orcid.org/0000-0003-1296-2058</orcidid><orcidid>https://orcid.org/0000-0002-3893-4330</orcidid><orcidid>https://orcid.org/0000-0002-7208-2514</orcidid></addata></record>
fulltext fulltext
identifier ISSN: 1524-9050
ispartof IEEE transactions on intelligent transportation systems, 2023-02, Vol.24 (2), p.2038-2044
issn 1524-9050
1558-0016
language eng
recordid cdi_ieee_primary_9599461
source IEEE Electronic Library (IEL) Journals
subjects Algorithms
autonomous transport
cybersecurity
Data exchange
Data models
Data transfer
Data transfer (computers)
Fast Fourier transformations
Fingerprints
Fourier transforms
Internet of Things
Internet of Vehicles
Multimedia
Optimization
Security
Servers
Transportation systems
vehicle to vehicle
Vehicles
Vehicular ad hoc networks
title Optimized Security Algorithms for Intelligent and Autonomous Vehicular Transportation Systems
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-12T21%3A19%3A48IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_ieee_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Optimized%20Security%20Algorithms%20for%20Intelligent%20and%20Autonomous%20Vehicular%20Transportation%20Systems&rft.jtitle=IEEE%20transactions%20on%20intelligent%20transportation%20systems&rft.au=Kamal,%20Mohsin&rft.date=2023-02-01&rft.volume=24&rft.issue=2&rft.spage=2038&rft.epage=2044&rft.pages=2038-2044&rft.issn=1524-9050&rft.eissn=1558-0016&rft.coden=ITISFG&rft_id=info:doi/10.1109/TITS.2021.3123188&rft_dat=%3Cproquest_ieee_%3E2775104360%3C/proquest_ieee_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c293t-421606785b2fcdf3b4b8bef92a19ebec407cba311b3c1eecd23a4973798c76153%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2775104360&rft_id=info:pmid/&rft_ieee_id=9599461&rfr_iscdi=true