The Internet of Vehicles (IoV) enables data exchange among individuals, cloud resources, road infrastructures, and vehicles, interconnected through Vehicular Ad Hoc Networks (VANETs). VANETs comprise vehicles with Onboard Units (OBUs), Roadside Units (RSUs), and a Trusted Party Agent (TPA). The data transmission among these entities supports seamless interaction and collaborative traffic management. However, data transmission on public communication channels in VANETs presents significant challenges, including security, privacy, and authentication of participating entities. Although numerous key exchange and authentication protocols have been introduced to tackle these issues, many protocols remain vulnerable to various attacks, such as a vehicle, RSU, TPA impersonation, denial of service, physical cloning, and desynchronization attacks. Therefore, to address these vulnerabilities, we propose a key exchange protocol that leverages hash functions and Advanced Encryption Standard (AES) encryption. Our protocol also integrates the Physical Unclonable Function (PUF), enhancing its resistance to physical or cloning attacks. Additionally, it effectively counters threats like impersonation, session key leakage, ephemeral secret leakage, and desynchronization attacks. We validate the security and reliability of our protocol through both formal and informal analysis. Informal analysis highlights the protocol’s essential security features, while formal analysis provides robust substantiation. Performance evaluation reveals that our protocol achieves an average reduction of 35.53%, and 53.77%, in communication and computation overheads.

Other Researches

Modified YOLOv8x model for coronary stenosis detection and troponin risk stratification

Detection of coronary artery stenosis and risk stratification of troponin play a pivotal role in offering early diagnosis and treatment of cardiovascular diseases. In this paper, an improved deep learning framework that allows using both spatial and...

LSOARP: A Link Stability and Obstacle-Aware Routing Protocol for UAV Networks

As using Unmanned Aerial Vehicles (UAVs) continues to grow across military, environmental, and public safety sectors, we are seeing a fast development of Flying Ad Hoc Networks (FANETs). Despite this progress, creating reliable routing protocols for...

Generalizing location-centric variations to enhance contactless human activity recognition

Contactless Human Activity Recognition (HAR) has played a critical role in smart healthcare and elderly care homes to monitor patient behavior and detect falls or abnormal activities in real time. The effectiveness of non-invasive HAR is often hinde...

A Novel Flip-Filtered Orthagonal Frequency Division Multiplexing-Based Visible Light Communication System: Peak-to-Average-Power Ratio Assessment and System Performance Improvement

Filtered orthogonal frequency division multiplexing (F-OFDM), employed in visible light communication (VLC) systems, has been considered a promising technique for overcoming OFDM’s large out-of-band emissions and thus reducing bandwidth efficiency. ...

Malware Detection with Subspace Learning-based One-Class Classification

Detecting malware is crucial for ensuring the security of computer systems. Traditional machine learning models face challenges in effectively detecting malware, mainly due to the class imbalance problem, where the number of malware samples is signi...

Enhancing spectral efficiency with low complexity filtered-orthogonal frequency division multiplexing in visible light communication system

The filtered-orthogonal frequency division multiplexing (F-OFDM) scheme has gained attention as a promising solution in the field of visible light communication (VLC) systems. One crucial aspect in VLC is the conversion of the complex F-OFDM signal ...

Uni-temporal Sentinel-2 imagery for wildfire detection using deep learning semantic segmentation models

Wildfires are common disasters that have long-lasting climate effects and serious ecological, social, and economic effects due to climate change. Since Earth observation (EO) satellites were launched into space, remote sensing (RS) has become a more...

Impact of portable executable header features on malware detection accuracy

One aspect of cybersecurity incorporates the study of Portable Executable (PE) file maleficence. Artificial Intelligence (AI) can be employed in such studies, since AI has the ability to discriminate benign from malicious files. In this study, an ex...

Novel partial overlapped gaussian pulse multi-access system aided by data analysis

Orthogonal frequency-division multi-access (OFDMA) systems have limited flexibility to improve efficiency due to their dependency on subcarrier orthogonality. As a result of this restriction, attention has shifted to a new multi-access communication...

YOLO-V3 based real-time drone detection algorithm

Drones are currently being used in a wide range of useful tasks that are too dangerous and/or expensive to be performed by humans. However, this is increasingly developing security breaching issues due to the possibility of misuse of unmanned aircra...