ABSTRACT

 The current roadsafety statistics in many countries are horrifying. Many people are killed and injured in road accidents. To reduce this problem, governments and manufacturers have launched different initiatives like use of safety belts, airbags, anti-blocking brake systems, and smart vehicular transportation systems. Upcoming traffic safety initiatives in smart transportation systems depend on information technology and this technology also helps to authenticate and trace vehicles in the system. 124Recently, smart vehicular system use different types of networks, such as vehicular ad hoc networks (VANETS) and networks based on artificial intelligence, that aim to provide a safer, coordinated, smooth, and smart mode of transportation. This article focuses on communication security issues in smart vehicular applications. The ability to transmit messages efficiently and honestly among vehicles is the key issues in this system. At present, communication in smart transportation system or IoV is vulnerable to various types of security attacks because it uses an open wireless connection. Different types of attacks are described. A vehicle needs to verify the incoming message and authenticate the sender and, in addition, in the dense environment, a vehicle may receive multiple messages at the same time. Therefore, the ability to complete the authentication of multiple messages in a short time is an urgent problem. A huge amount of data is available in the air. So, an unauthorized person may capture data, modify records, or attack vehicular systems. Hackers can access vehicle sensors that control safety devices in a vehicle, shutdown systems, control door locking operations, and disable the car. They could provide false information to drivers, use denial-of-service attacks to bring down the network of vehicles, and they can even download incorrect navigation maps. To address these problems, here we have introduced some techniques using the concept of recurrence relation, hash function, and non-linear function. Our proposed technique is made up of three modules in which first algorithm uses the concept of recurrence relation for random number generation, and this random number is used for session key generation. In the encryption process, the symmetric key, session key, and circular left shift operation are used. The second algorithm uses a hash function for user authentication, and third algorithm uses a decryption process. The different types of experiments on our proposed technique and their results confirm that our scheme is secure, robust, and efficient for data transmission in smart vehicular applications.