Secure Data Forwarding with Key Management in Vehicular Delay Tolerant Network

Authors

  • Seema Jangra Shri Mata Vaishno Devi University, Katra, J&K
  • Amit Kant Pandit Indraprastha College for Women, Delhi University

Keywords:

Vehicular Delay Tolerant Network, Symmetric Encryption, Advance Encryption Standard.

Abstract

A vehicle network with delay tolerance is called VDTN. In situations when a constant network connection cannot be ensured, this kind of network architecture is intended to facilitate communication between automobiles and other nodes. VDTNs solve the problems of sporadic connectivity and lengthy latency times by storing, transporting, and forwarding messages using the mobility of vehicles. Since vehicular delay-tolerant networks (VDTNs) operate in a unique context, they must overcome a number of security obstacles.  Authentication and authorization, data integrity, confidentiality, privacy, secure routing, and trust management are a few of the major security issues facing VDTNs. The data integrity of the network's transit data must be preserved because to the limited resources in this advantageous environment. In order to provide privacy, secure routing, and handle malicious or self-serving nodes, data is sent to neighboring nodes based on trust. Cryptography techniques should also be used to encode the transit data. In order to maintain the security of transit data, we suggest a secure data forwarding technique in this study. The key management strategy used in this secure data forwarding system takes into account a dependable central authority for both key distribution and production. We are employing the symmetric cryptographic technique Advance Encryption Standard (AES) with a key management mechanism to accomplish an end-to-end data security strategy in VDTN. The suggested method involves the sharing of a private key amongst the trustworthy nodes in communication, with encrypted communications being routed to their target through opportunistic contacts.The suggested secure data forwarding scheme is examined using a few benchmark routing protocols according to different performance criteria. The research shows that the suggested approach can offer data security with outcomes that are similar to those of conventional data forwarding in VDTN.

Downloads

Published

2024-09-17

How to Cite

Seema Jangra, & Amit Kant Pandit. (2024). Secure Data Forwarding with Key Management in Vehicular Delay Tolerant Network. Journal of Computational Analysis and Applications (JoCAAA), 33(07), 1199–1208. Retrieved from http://eudoxuspress.com/index.php/pub/article/view/1196

Issue

Section

Articles

Similar Articles

<< < 1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.