Improved recurrent neural network schema for validating digital signatures in VANET

A Jain, J Singh, S Kumar, Ț Florin-Emilian… - Mathematics, 2022 - mdpi.com
Mathematics, 2022mdpi.com
Vehicular ad hoc networks (VANETs) allow communication between stationary or moving
vehicles with the assistance of wireless technology. Among various existing issues in smart
VANETs, secure communication is the key challenge in VANETs with a 5G network. Smart
vehicles must communicate with a broad range of advanced road systems including traffic
control and smart payment systems. Many security mechanisms are used in VANETs to
ensure safe transmission; one such mechanism is cryptographic digital signatures based on …
Vehicular ad hoc networks (VANETs) allow communication between stationary or moving vehicles with the assistance of wireless technology. Among various existing issues in smart VANETs, secure communication is the key challenge in VANETs with a 5G network. Smart vehicles must communicate with a broad range of advanced road systems including traffic control and smart payment systems. Many security mechanisms are used in VANETs to ensure safe transmission; one such mechanism is cryptographic digital signatures based on public key infrastructure (PKI). In this mechanism, secret private keys are used for digital signatures to validate the identity of the message along with the sender. However, the validation of the digital signatures in fast-moving vehicles is extremely difficult. Based on an improved perceptron model of an artificial neural network (ANN), this paper proposes an efficient technique for digital signature verification. Still, manual signatures are extensively used for authentication across the world. However, manual signatures are still not employed for security in automotive and mobile networks. The process of converting manual signatures to pseudo-digital-signatures was simulated using the improved Elman backpropagation (I-EBP) model. A digital signature was employed during network connection to authenticate the legitimacy of the sender’s communications. Because it contained information about the vehicle on the road, there was scope for improvement in protecting the data from attackers. Compared to existing schemes, the proposed technique achieved significant gains in computational overhead, aggregate verification delay, and aggregate signature size.
MDPI
以上显示的是最相近的搜索结果。 查看全部搜索结果