Loading…
Optimized Security Algorithms for Intelligent and Autonomous Vehicular Transportation Systems
With the growth of the Internet of Vehicles (IoV) in Intelligent Autonomous Transport Systems (IATS), a huge volume of data is exchanged between vehicles in these newly developed infrastructures. As a result, the requirements of securing data exchange between vehicles, autonomous or otherwise, have...
Saved in:
Published in: | IEEE transactions on intelligent transportation systems 2023-02, Vol.24 (2), p.2038-2044 |
---|---|
Main Authors: | , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c293t-421606785b2fcdf3b4b8bef92a19ebec407cba311b3c1eecd23a4973798c76153 |
---|---|
cites | cdi_FETCH-LOGICAL-c293t-421606785b2fcdf3b4b8bef92a19ebec407cba311b3c1eecd23a4973798c76153 |
container_end_page | 2044 |
container_issue | 2 |
container_start_page | 2038 |
container_title | IEEE transactions on intelligent transportation systems |
container_volume | 24 |
creator | Kamal, Mohsin Tariq, Muhammad Srivastava, Gautam Malina, Lukas |
description | With the growth of the Internet of Vehicles (IoV) in Intelligent Autonomous Transport Systems (IATS), a huge volume of data is exchanged between vehicles in these newly developed infrastructures. As a result, the requirements of securing data exchange between vehicles, autonomous or otherwise, have also increased tremendously. Securing data transfer and keeping a record of each transaction becomes a necessity in IoV/IATS. In this paper, we propose some optimized security algorithms using symmetric encryption for secure multimedia data transfer between vehicles. The main feature of these optimized algorithms is that they use a lower amount of data to generate fingerprints. The algorithms convert approximately 3.7 \times 10^{5} samples of data into 3600 samples to generate the fingerprint. Fast Fourier Transform (FFT) is used to fetch the highest three peak values of the signal in the frequency domain. A centralized server authenticates the data transfer by comparing the HASH of the fingerprints and also keeps the transaction record. Through experimental analysis, the performance of proposed algorithms is confirmed by achieving reduced size samples to generate fingerprints and their authentication at the server-side. |
doi_str_mv | 10.1109/TITS.2021.3123188 |
format | article |
fullrecord | <record><control><sourceid>proquest_ieee_</sourceid><recordid>TN_cdi_ieee_primary_9599461</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9599461</ieee_id><sourcerecordid>2775104360</sourcerecordid><originalsourceid>FETCH-LOGICAL-c293t-421606785b2fcdf3b4b8bef92a19ebec407cba311b3c1eecd23a4973798c76153</originalsourceid><addsrcrecordid>eNo9kMtqwzAQRU1poWnaDyjdCLp2qpH80jKEPgKBLOJ2V4wsjxMF23IleZF-fW0SuprLcO4MnCB4BLoAoOIlX-e7BaMMFhwYhyy7CmYQx1lIKSTXU2ZRKGhMb4M7547jNooBZsH3tve61b9YkR2qwWp_Istmb8ZwaB2pjSXrzmPT6D12nsiuIsvBm860ZnDkCw9aDY20JLeyc72xXnptOrI7OY-tuw9uatk4fLjMefD59pqvPsLN9n29Wm5CxQT3YcQgoUmaxSWrVVXzMiqzEmvBJAgsUUU0VaXkACVXgKgqxmUkUp6KTKUJxHwePJ_v9tb8DOh8cTSD7caXBUvTGGjEEzpScKaUNc5ZrIve6lbaUwG0mCwWk8VislhcLI6dp3NHI-I_L2IhogT4Hzevb_0</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2775104360</pqid></control><display><type>article</type><title>Optimized Security Algorithms for Intelligent and Autonomous Vehicular Transportation Systems</title><source>IEEE Electronic Library (IEL) Journals</source><creator>Kamal, Mohsin ; Tariq, Muhammad ; Srivastava, Gautam ; Malina, Lukas</creator><creatorcontrib>Kamal, Mohsin ; Tariq, Muhammad ; Srivastava, Gautam ; Malina, Lukas</creatorcontrib><description><![CDATA[With the growth of the Internet of Vehicles (IoV) in Intelligent Autonomous Transport Systems (IATS), a huge volume of data is exchanged between vehicles in these newly developed infrastructures. As a result, the requirements of securing data exchange between vehicles, autonomous or otherwise, have also increased tremendously. Securing data transfer and keeping a record of each transaction becomes a necessity in IoV/IATS. In this paper, we propose some optimized security algorithms using symmetric encryption for secure multimedia data transfer between vehicles. The main feature of these optimized algorithms is that they use a lower amount of data to generate fingerprints. The algorithms convert approximately <inline-formula> <tex-math notation="LaTeX">3.7 \times 10^{5} </tex-math></inline-formula> samples of data into 3600 samples to generate the fingerprint. Fast Fourier Transform (FFT) is used to fetch the highest three peak values of the signal in the frequency domain. A centralized server authenticates the data transfer by comparing the <inline-formula> <tex-math notation="LaTeX">HASH </tex-math></inline-formula> of the fingerprints and also keeps the transaction record. Through experimental analysis, the performance of proposed algorithms is confirmed by achieving reduced size samples to generate fingerprints and their authentication at the server-side.]]></description><identifier>ISSN: 1524-9050</identifier><identifier>EISSN: 1558-0016</identifier><identifier>DOI: 10.1109/TITS.2021.3123188</identifier><identifier>CODEN: ITISFG</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Algorithms ; autonomous transport ; cybersecurity ; Data exchange ; Data models ; Data transfer ; Data transfer (computers) ; Fast Fourier transformations ; Fingerprints ; Fourier transforms ; Internet of Things ; Internet of Vehicles ; Multimedia ; Optimization ; Security ; Servers ; Transportation systems ; vehicle to vehicle ; Vehicles ; Vehicular ad hoc networks</subject><ispartof>IEEE transactions on intelligent transportation systems, 2023-02, Vol.24 (2), p.2038-2044</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2023</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c293t-421606785b2fcdf3b4b8bef92a19ebec407cba311b3c1eecd23a4973798c76153</citedby><cites>FETCH-LOGICAL-c293t-421606785b2fcdf3b4b8bef92a19ebec407cba311b3c1eecd23a4973798c76153</cites><orcidid>0000-0001-9851-4103 ; 0000-0003-1296-2058 ; 0000-0002-3893-4330 ; 0000-0002-7208-2514</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9599461$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,27901,27902,54771</link.rule.ids></links><search><creatorcontrib>Kamal, Mohsin</creatorcontrib><creatorcontrib>Tariq, Muhammad</creatorcontrib><creatorcontrib>Srivastava, Gautam</creatorcontrib><creatorcontrib>Malina, Lukas</creatorcontrib><title>Optimized Security Algorithms for Intelligent and Autonomous Vehicular Transportation Systems</title><title>IEEE transactions on intelligent transportation systems</title><addtitle>TITS</addtitle><description><![CDATA[With the growth of the Internet of Vehicles (IoV) in Intelligent Autonomous Transport Systems (IATS), a huge volume of data is exchanged between vehicles in these newly developed infrastructures. As a result, the requirements of securing data exchange between vehicles, autonomous or otherwise, have also increased tremendously. Securing data transfer and keeping a record of each transaction becomes a necessity in IoV/IATS. In this paper, we propose some optimized security algorithms using symmetric encryption for secure multimedia data transfer between vehicles. The main feature of these optimized algorithms is that they use a lower amount of data to generate fingerprints. The algorithms convert approximately <inline-formula> <tex-math notation="LaTeX">3.7 \times 10^{5} </tex-math></inline-formula> samples of data into 3600 samples to generate the fingerprint. Fast Fourier Transform (FFT) is used to fetch the highest three peak values of the signal in the frequency domain. A centralized server authenticates the data transfer by comparing the <inline-formula> <tex-math notation="LaTeX">HASH </tex-math></inline-formula> of the fingerprints and also keeps the transaction record. Through experimental analysis, the performance of proposed algorithms is confirmed by achieving reduced size samples to generate fingerprints and their authentication at the server-side.]]></description><subject>Algorithms</subject><subject>autonomous transport</subject><subject>cybersecurity</subject><subject>Data exchange</subject><subject>Data models</subject><subject>Data transfer</subject><subject>Data transfer (computers)</subject><subject>Fast Fourier transformations</subject><subject>Fingerprints</subject><subject>Fourier transforms</subject><subject>Internet of Things</subject><subject>Internet of Vehicles</subject><subject>Multimedia</subject><subject>Optimization</subject><subject>Security</subject><subject>Servers</subject><subject>Transportation systems</subject><subject>vehicle to vehicle</subject><subject>Vehicles</subject><subject>Vehicular ad hoc networks</subject><issn>1524-9050</issn><issn>1558-0016</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><recordid>eNo9kMtqwzAQRU1poWnaDyjdCLp2qpH80jKEPgKBLOJ2V4wsjxMF23IleZF-fW0SuprLcO4MnCB4BLoAoOIlX-e7BaMMFhwYhyy7CmYQx1lIKSTXU2ZRKGhMb4M7547jNooBZsH3tve61b9YkR2qwWp_Istmb8ZwaB2pjSXrzmPT6D12nsiuIsvBm860ZnDkCw9aDY20JLeyc72xXnptOrI7OY-tuw9uatk4fLjMefD59pqvPsLN9n29Wm5CxQT3YcQgoUmaxSWrVVXzMiqzEmvBJAgsUUU0VaXkACVXgKgqxmUkUp6KTKUJxHwePJ_v9tb8DOh8cTSD7caXBUvTGGjEEzpScKaUNc5ZrIve6lbaUwG0mCwWk8VislhcLI6dp3NHI-I_L2IhogT4Hzevb_0</recordid><startdate>20230201</startdate><enddate>20230201</enddate><creator>Kamal, Mohsin</creator><creator>Tariq, Muhammad</creator><creator>Srivastava, Gautam</creator><creator>Malina, Lukas</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>FR3</scope><scope>JQ2</scope><scope>KR7</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0001-9851-4103</orcidid><orcidid>https://orcid.org/0000-0003-1296-2058</orcidid><orcidid>https://orcid.org/0000-0002-3893-4330</orcidid><orcidid>https://orcid.org/0000-0002-7208-2514</orcidid></search><sort><creationdate>20230201</creationdate><title>Optimized Security Algorithms for Intelligent and Autonomous Vehicular Transportation Systems</title><author>Kamal, Mohsin ; Tariq, Muhammad ; Srivastava, Gautam ; Malina, Lukas</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c293t-421606785b2fcdf3b4b8bef92a19ebec407cba311b3c1eecd23a4973798c76153</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Algorithms</topic><topic>autonomous transport</topic><topic>cybersecurity</topic><topic>Data exchange</topic><topic>Data models</topic><topic>Data transfer</topic><topic>Data transfer (computers)</topic><topic>Fast Fourier transformations</topic><topic>Fingerprints</topic><topic>Fourier transforms</topic><topic>Internet of Things</topic><topic>Internet of Vehicles</topic><topic>Multimedia</topic><topic>Optimization</topic><topic>Security</topic><topic>Servers</topic><topic>Transportation systems</topic><topic>vehicle to vehicle</topic><topic>Vehicles</topic><topic>Vehicular ad hoc networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Kamal, Mohsin</creatorcontrib><creatorcontrib>Tariq, Muhammad</creatorcontrib><creatorcontrib>Srivastava, Gautam</creatorcontrib><creatorcontrib>Malina, Lukas</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Xplore</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>Engineering Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Civil Engineering Abstracts</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE transactions on intelligent transportation systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Kamal, Mohsin</au><au>Tariq, Muhammad</au><au>Srivastava, Gautam</au><au>Malina, Lukas</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Optimized Security Algorithms for Intelligent and Autonomous Vehicular Transportation Systems</atitle><jtitle>IEEE transactions on intelligent transportation systems</jtitle><stitle>TITS</stitle><date>2023-02-01</date><risdate>2023</risdate><volume>24</volume><issue>2</issue><spage>2038</spage><epage>2044</epage><pages>2038-2044</pages><issn>1524-9050</issn><eissn>1558-0016</eissn><coden>ITISFG</coden><abstract><![CDATA[With the growth of the Internet of Vehicles (IoV) in Intelligent Autonomous Transport Systems (IATS), a huge volume of data is exchanged between vehicles in these newly developed infrastructures. As a result, the requirements of securing data exchange between vehicles, autonomous or otherwise, have also increased tremendously. Securing data transfer and keeping a record of each transaction becomes a necessity in IoV/IATS. In this paper, we propose some optimized security algorithms using symmetric encryption for secure multimedia data transfer between vehicles. The main feature of these optimized algorithms is that they use a lower amount of data to generate fingerprints. The algorithms convert approximately <inline-formula> <tex-math notation="LaTeX">3.7 \times 10^{5} </tex-math></inline-formula> samples of data into 3600 samples to generate the fingerprint. Fast Fourier Transform (FFT) is used to fetch the highest three peak values of the signal in the frequency domain. A centralized server authenticates the data transfer by comparing the <inline-formula> <tex-math notation="LaTeX">HASH </tex-math></inline-formula> of the fingerprints and also keeps the transaction record. Through experimental analysis, the performance of proposed algorithms is confirmed by achieving reduced size samples to generate fingerprints and their authentication at the server-side.]]></abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TITS.2021.3123188</doi><tpages>7</tpages><orcidid>https://orcid.org/0000-0001-9851-4103</orcidid><orcidid>https://orcid.org/0000-0003-1296-2058</orcidid><orcidid>https://orcid.org/0000-0002-3893-4330</orcidid><orcidid>https://orcid.org/0000-0002-7208-2514</orcidid></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1524-9050 |
ispartof | IEEE transactions on intelligent transportation systems, 2023-02, Vol.24 (2), p.2038-2044 |
issn | 1524-9050 1558-0016 |
language | eng |
recordid | cdi_ieee_primary_9599461 |
source | IEEE Electronic Library (IEL) Journals |
subjects | Algorithms autonomous transport cybersecurity Data exchange Data models Data transfer Data transfer (computers) Fast Fourier transformations Fingerprints Fourier transforms Internet of Things Internet of Vehicles Multimedia Optimization Security Servers Transportation systems vehicle to vehicle Vehicles Vehicular ad hoc networks |
title | Optimized Security Algorithms for Intelligent and Autonomous Vehicular Transportation Systems |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-12T21%3A19%3A48IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_ieee_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Optimized%20Security%20Algorithms%20for%20Intelligent%20and%20Autonomous%20Vehicular%20Transportation%20Systems&rft.jtitle=IEEE%20transactions%20on%20intelligent%20transportation%20systems&rft.au=Kamal,%20Mohsin&rft.date=2023-02-01&rft.volume=24&rft.issue=2&rft.spage=2038&rft.epage=2044&rft.pages=2038-2044&rft.issn=1524-9050&rft.eissn=1558-0016&rft.coden=ITISFG&rft_id=info:doi/10.1109/TITS.2021.3123188&rft_dat=%3Cproquest_ieee_%3E2775104360%3C/proquest_ieee_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c293t-421606785b2fcdf3b4b8bef92a19ebec407cba311b3c1eecd23a4973798c76153%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2775104360&rft_id=info:pmid/&rft_ieee_id=9599461&rfr_iscdi=true |