Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Article type: Research Article
Authors: Umale, Bhagyashree Ramesha; b | Sharma, Poojac; *
Affiliations: [a] Department of Computer Engineering, D Y Patil University, Ambi, Pune, Maharshtra, India | [b] Department of Artificial Intelligence and Data Science Engineering, Ajeenkya DY Patil School of Engineering, Lohgaon, Pune, India | [c] Department of Computer Engineering, D Y Patil University, Ambi, Pune, Maharshtra, India
Correspondence: [*] Corresponding author: Pooja Sharma, Department of Computer Engineering, D Y Patil University, Ambi, Pune, Maharshtra, 410506, India. E-mail: [email protected].
Abstract: The contemporary fog computing paradigm evolved from traditional cloud computing to give storage and computation resources at the network’s edge. Fog enabled vehicular processing is anticipated to be a fundamental component that may expedite a variety of applications, notably crowd-sensing, when applied to vehicular networks. As a result, the confidentiality and safety of vehicles participating in the crowd-sensing platform are now recognized as critical challenges for smart police and cyber defence. Furthermore, sophisticated access control is essential to meet the requirements of crowd-sensing users of information. This work presents a novel secured fog-based protocol for vehicular crowd sensing utilizing an attribute-based encryption model. The proposed framework incorporates a two-layered fog architecture termed fog layer A and fog layer B. Fog layer A includes data owners (vehicles) and fog nodes, while fog layer B consists of fog nodes integrated with Road Side Units (RSUs). The Transport Triggered Architecture (TTA) governs the retrieval of regular or specialized data as per the request of data users. The data collection procedure varies based on the type of data being processed. Regular data is gathered from data owners, aggregated using the Multiple Kernel Induced in Kernel Least Mean Square (MKI-KLMS) technique, which employs kernel least mean square and hierarchical fractional bidirectional least mean square methods to handle redundancy in data aggregation. Subsequently, the aggregated data is encrypted using the Proposed Fusion Key for Encryption (PFKE) technique, which employs a fusion key for message encryption. Additionally, an enhanced Blowfish algorithm is applied for an extra layer of encryption on the already encrypted data. The encrypted data is then transmitted to the TTA. The decryption process utilizes the same key to retrieve the original message. The Modified Attribute based Encryption Model (MAEM) scheme achieves the highest efficiency of 90.9476.
Keywords: Data encryption, decryption process, efficiency, protocol, redundancy and Blowfish algorithm
DOI: 10.3233/IDT-240439
Journal: Intelligent Decision Technologies, vol. Pre-press, no. Pre-press, pp. 1-23, 2024
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]