Summary
Internet of Vehicles is recorded as an ever growing area for connected vehicles to exchange their information with other vehicles using vehicle‐to‐vehicle communication. Vehicle‐to‐vehicle communication is possible by forming vehicular ad hoc networks, with the help of roadside units using vehicle‐to‐roadside communications in the network. Internet of networks has many advantages such as road safety, traffic management, and sharing information on daily traffic and updating traffic information. For example, the Internet of Vehicles can be used to reduce traffic and deaths occurring due to road accidents, to reduce the fuel needed, and to reduce travel time. Interconnected vehicles rapidly learn about road conditions and traffic and respond to the driver; thus, necessary actions are taken. However, the attacker can modify the information in the connected vehicles and, thus, creates problem on the road. Data fascination is one of the main attacks on connected vehicles where connected vehicles take action based on information from the other vehicle. In this paper, first, a model has been proposed to detect the data fascination attack using the hashing technique to enhance the security in the interconnected vehicles by adjusting the size of the contention window to transfer original information to other interconnected vehicles at the correct time. Second, a model has been suggested to reduce the travel time in case of traffic congestion. The efficiency of the proposed model is checked using numerical methods obtained from the simulation results. From the obtained results, the proposed approach prevents data fascination attacks in interconnected vehicles and provides high throughput with lower delay.
Background:
With the advent of IoT, the deployment of batteries with a limited lifetime
in remote areas is a major concern. In certain conditions, the network lifetime gets restricted due to
limited battery constraints. Subsequently, the collaborative approaches for key facilities help to reduce the constraint demands of the current security protocols.
Aim:
This work covers and combines a wide range of concepts linked by IoT based on security and
energy efficiency. Specifically, this study examines the WSN energy efficiency problem in IoT and
security for the management of threats in IoT through collaborative approaches and finally outlines
the future. The concept of energy-efficient key protocols which clearly cover heterogeneous IoT
communications among peers with different resources has been developed. Because of the low capacity of sensor nodes, energy efficiency in WSNs has been an important concern.
Methods:
Hence, in this paper, we present an algorithm for Artificial Bee Colony (ABC) which reviews security and energy consumption to discuss their constraints in the IoT scenarios.
Results:
The results of a detailed experimental assessment are analyzed in terms of communication
cost, energy consumption and security, which prove the relevance of a proposed ABC approach and
a key establishment.
Conclusion:
The validation of DTLS-ABC consists of designing an inter-node cooperation trust
model for the creation of a trusted community of elements that are mutually supportive. Initial attempts to design the key methods for management are appropriate individual IoT devices. This gives
the system designers, an option that considers the question of scalability.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.