The wide use of vehicular ad hoc networks (VANETs) in the last decade hasled many researchers to find efficient and reliable methods to obtain the desired benefits and offer services, such as healthcare and traffic management. However, VANETs suffer from security issues represented by authentication and data integrity. In thispaper, we propose a robust mutual authentication scheme based on elliptic curve cryptography (ECC), cryptography hash function, and a pseudonym. The proposed work was twofold in focus: first, on healthcare in emergency cars which use VANETs, and second, on overcoming security issues, such as resisting familiar attacks (e.g. insider attacks and reply attacks). Because of the serious situation generated by the worldwide outbreak of the Covid-19 epidemic, we also found this research valuable in supporting global efforts to combat the rapid spread of this virus, by finding the safest and fastest routes to epidemic treatment centres for medical staff, assistance teams in medical operations, fumigation control, and all work teams associated with disease control. This research attempts to contribute by proposing a special signal used to define epidemic teams. The best route, fast route can be chosen by using VANETs infrastructure. This scheme also deals with metric security features, such as key management, data integrity, and data privacy. In the communication and computation cost, we noticed that our proposed scheme achieved good results compared with the related works.
Most of the scientific research engines utilize the same way to rank scientific research papers (SRP), this way is highly depend on the citation network. The retrieved results of these engines for any keyword contain old papers with the highest citation value. In this paper, we proposed a new and easy to implement ranking algorithm for scientific research papers known as Paper Time Ranking Algorithm (PTRA). PTRA is a new ranking algorithm that depends on three factors to rank its results; paper age, citation index and publication venue. To construct and prove our ranking algorithm we created a web crawler that crawl different scientific search papers databases in the world to collect the information that PTRA needs. Unfortunately, some of this information was missing, such as, the impact factor of the journals. To collect this information, we created another crawler that search the Internet for these journals impact factors. However, to prove our ranking algorithm results, we have compared PTRA with Google scholar ranking algorithm. We used Google scholar, since it has more than 50 million papers and its own system can gather and collect papers in a faster way. Our comparison results show that, citation index has the highest impact on Google scholars ranking algorithm results. Unlike PTRA that gains the paper age a higher impact on the ranked results. However, PTRA depends on the citation index and publication venue to rank the results but with less impact than the paper age.
As a hopeful computing paradigm, cloud services are obtainable to end users based on pay-as-you-go service. Security is represented one of the vital issues for the extended adoption of cloud computing, with the object of accessing several cloud service providers, applications, and services by using anonymity features to authenticate the user. We present a good authentication scheme based on quick response (QR) code and smart card. Furthermore, our proposed scheme has several crucial merits such as key management, mutual authentication, one-time password, user anonymity, freely chosen password, secure password changes, and revocation by using QR code. The security of proposed scheme depends on crypto-hash function, QR-code validation, and smart card. Moreover, we view that our proposed scheme can resist numerous malicious attacks and are more appropriate for practical applications than other previous works. The proposed scheme has proved as a strong mutual authentication based on burrows-abadi-needham (BAN) logic and security analysis. Furthermore, our proposed scheme has good results compared with related work.
In vehicular ad hoc networks (VANET), the privacy of vehicle data symbolizes a big challenge towards malicious attacks. On the other side, vehicles in VANET can play a staple role in monitoring the environment by sensing the surrounding environment, compute the sensing information, and transfer the results if needed to the authorized party. Most of the modern VANETs systems encrypt the information to prevent hacking it but mostly neglect the decryption that occurred when data need to re-processed. In this paper, we try to cover this weak point by using fully homomorphic encryption (FHE) because of its specifications. The proposed work focus on twofold: first, create secure authentication and permission management system. While the second is to preserve the privacy of vehicle data that transferred among VANET infrastructure. This scheme also deals with metric security features, such as data privacy, data integrity, and key management. In the experimental results, there is good advance in the fields of interest comparing with the related works.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.