{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T19:05:36Z","timestamp":1771614336117,"version":"3.50.1"},"reference-count":32,"publisher":"Frontiers Media SA","license":[{"start":{"date-parts":[[2024,5,1]],"date-time":"2024-05-01T00:00:00Z","timestamp":1714521600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["frontiersin.org"],"crossmark-restriction":true},"short-container-title":["Front. Comput. Sci."],"abstract":"<jats:p>A public key infrastructure-enabled system authentication model is developed to provide essential security functions for Vehicular <jats:italic>ad hoc<\/jats:italic> networks (VANETs). An intelligent transportation system is provided by VANET, an emerging technology. Dedicated short-range communication is used to disseminate messages wirelessly. Communications may be hacked, and messages can be stolen or fabricated. Hence, authenticated communication is crucial in the VANET environment. Some parameters such as trust, authentication, privacy, and security are at high risk. This article suggests a VANET with secure authentication and trust-based clustering mechanisms to provide stable and secure communication. Initially, the Restricted Boltzmann Machine learning algorithm (RBMA) is used to select the cluster head, which depends upon trust, vehicle lifetime, and buffer level. Then, cluster members are formed, followed by grouping. Diffie\u2013Hellman Hyperelliptic Curve Cryptography and cryptographic hash functions are used by signcryption for secure communication in VANET. Therefore, the essential component of the key agreement strategy that will give superior authentication is this signcryption mechanism. Over the medium access protocol layer, all of these security characteristics are updated. The proposed method of clustering signcryption key agreement scheme (CSKAS) approach reduces time complexity and increases packet delivery ratio which is vital in providing stable, secure communication.<\/jats:p>","DOI":"10.3389\/fcomp.2024.1384515","type":"journal-article","created":{"date-parts":[[2024,5,1]],"date-time":"2024-05-01T05:02:30Z","timestamp":1714539750000},"update-policy":"https:\/\/doi.org\/10.3389\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Design of CSKAS-VANET model for stable clustering and authentication scheme using RBMA and signcryption"],"prefix":"10.3389","volume":"6","author":[{"given":"M.","family":"Gayathri","sequence":"first","affiliation":[]},{"given":"C.","family":"Gomathy","sequence":"additional","affiliation":[]}],"member":"1965","published-online":{"date-parts":[[2024,5,1]]},"reference":[{"key":"B1","doi-asserted-by":"publisher","first-page":"142858","DOI":"10.1109\/ACCESS.2020.3014038","article-title":"MFSPV: a multi-factor secured and lightweight privacy-preserving authentication scheme for VANETs","volume":"8","author":"Alfadhli","year":"2020","journal-title":"IEEE Access"},{"key":"B2","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1049\/iet-net.2013.0065","article-title":"Vehicular communication - a survey","volume":"3","author":"Bhoi","year":"2014","journal-title":"IET Netw."},{"key":"B3","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1109\/MWC.2015.7054724","article-title":"VANET-cloud: a generic cloud computing model for vehicular ad hoc networks","volume":"22","author":"Bitam","year":"2015","journal-title":"IEEE Wirel. Commun."},{"key":"B4","doi-asserted-by":"publisher","first-page":"1137","DOI":"10.3966\/160792642020072104022","article-title":"An improved RSU-based authentication scheme for VANET","volume":"21","author":"Cheng","year":"2020","journal-title":"J. Internet Technol."},{"key":"B5","doi-asserted-by":"publisher","first-page":"9391","DOI":"10.1109\/TITS.2021.3117950","article-title":"PPVF: privacy-preserving protocol for vehicle feedback in cloud-assisted VANET","volume":"23","author":"Cheng","year":"2022","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"B6","doi-asserted-by":"publisher","first-page":"510","DOI":"10.1109\/TC.2012.188","article-title":"VSPN VANET based secure and privacy-preserving navigation","volume":"63","author":"Chim","year":"2014","journal-title":"IEEE Trans. Comput."},{"key":"B7","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1109\/JSYST.2013.2245971","article-title":"Vehicular security through reputation and plausibility checks","volume":"8","author":"Dhurandher","year":"2014","journal-title":"IEEE Syst. J."},{"key":"B8","first-page":"1","author":"Fonseca","year":"2006","journal-title":"A survey of existing approaches for secure ad hoc routing and their applicability to VANETs, Vol. 1"},{"key":"B9","doi-asserted-by":"publisher","first-page":"2145636","DOI":"10.1080\/08839514.2022.2145636","article-title":"AI-TASFIS: an approach to secure vehicle-to-vehicle communication","volume":"36","author":"Gayathri","year":"2022","journal-title":"Appl. Artif. Intell."},{"key":"B10","doi-asserted-by":"publisher","first-page":"5268","DOI":"10.11591\/ijece.v8i6.pp5268-5277","article-title":"A computational analysis of ECC based novel authentication scheme in VANET","volume":"8","author":"Godse","year":"2018","journal-title":"Int. J. Electr. Comput. Eng."},{"key":"B11","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1007\/s11071-018-4573-7","article-title":"A fast double-keyed authenticated image encryption scheme using an improved chaotic map and a butterfly-like structure","volume":"95","author":"Hanis","year":"2019","journal-title":"Nonlinear Dyn."},{"key":"B12","doi-asserted-by":"publisher","first-page":"1456","DOI":"10.3390\/en16031456","article-title":"A bio-inspired cluster optimization schema for efficient routing in vehicular Ad hoc networks (VANETs)","volume":"16","author":"Husnain","year":"2023","journal-title":"Energies"},{"key":"B13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13638-017-1001-5","article-title":"Efficient trust management with bayesian-evidence theorem to secure public key infrastructure-based mobile ad hoc networks","volume":"25","author":"Janani","year":"2018","journal-title":"EURASIP J Wireless Commun. Netw."},{"key":"B14","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/s11277-023-10612-z","article-title":"TACR: trust aware clustering-based routing for secure and reliable VANET communications","volume":"132","author":"Kadam","year":"2023","journal-title":"Wireless Pers. Commun"},{"key":"B15","first-page":"201","article-title":"An intelligent cluster-based energy efficient optimization algorithm to improve the network performance in VANET","volume":"71","author":"Kosuru","year":"2022","journal-title":"Math Stat. Eng. Appl."},{"key":"B16","doi-asserted-by":"publisher","first-page":"3547","DOI":"10.1109\/JSYST.2020.2991168","article-title":"A lightweight privacy-preserving authentication protocol for VANETs","volume":"14","author":"Li","year":"2020","journal-title":"IEEE Syst. J."},{"key":"B17","doi-asserted-by":"publisher","first-page":"161655","DOI":"10.1109\/ACCESS.2020.3021408","article-title":"HPBS: a hybrid proxy based authentication scheme in VANETs","volume":"8","author":"Liu","year":"2020","journal-title":"IEEE Access"},{"key":"B18","doi-asserted-by":"publisher","first-page":"759","DOI":"10.1007\/s11277-022-09974-7","article-title":"Improved security of the data communication in VANET environment using ASCII-ECC algorithm","volume":"128","author":"Marry Anita","year":"2023","journal-title":"Wireless Pers. Commun."},{"key":"B19","doi-asserted-by":"publisher","first-page":"536","DOI":"10.1109\/TVT.2012.2226613","article-title":"A framework for secure and efficient data acquisition in vehicular ad hoc networks","volume":"62","author":"Mershad","year":"2013","journal-title":"IEEE Trans. Veh. Technol."},{"key":"B20","doi-asserted-by":"publisher","first-page":"2537","DOI":"10.1007\/s12083-020-01010-4","article-title":"A trust infrastructure-based authentication method for clustered vehicular ad hoc networks","volume":"14","author":"Mirsadeghi","year":"2021","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"B21","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1049\/iet-net.2017.0054","article-title":"Restricted Boltzmann machine-based cognitive protocol for secure routing in software defined wireless networks","volume":"6","author":"MohanaPriya","year":"2017","journal-title":"IET Netw."},{"key":"B22","doi-asserted-by":"publisher","first-page":"106851","DOI":"10.1016\/j.compeleceng.2020.106851","article-title":"Clustering in vehicular ad hoc network: algorithms and challenges","volume":"88","author":"Mukhtaruzzaman","year":"2020","journal-title":"Comput. Electr. Eng."},{"key":"B23","doi-asserted-by":"publisher","first-page":"20998","DOI":"10.1109\/JSEN.2021.3097172","article-title":"A secure, privacy-preserving, and lightweight authentication scheme for VANETs","volume":"21","author":"Nandy","year":"2021","journal-title":"IEEE Sens. J."},{"key":"B24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.compeleceng.2022.108016","article-title":"A lightweight authentication scheme with privacy preservation for vehicular networks","volume":"100","author":"Rawat","year":"2022","journal-title":"Comput. Electr. Eng."},{"key":"B25","doi-asserted-by":"publisher","first-page":"1227","DOI":"10.1109\/TPDS.2010.14","article-title":"An identity-based security system for user privacy in vehicular ad hoc networks","volume":"21","author":"Sun","year":"2010","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"B26","doi-asserted-by":"publisher","first-page":"2482","DOI":"10.1109\/ACCESS.2019.2962387","article-title":"Secure authentication and key management with blockchain in VANETs","volume":"8","author":"Tan","year":"2020","journal-title":"IEEE Access"},{"key":"B27","doi-asserted-by":"publisher","first-page":"3967","DOI":"10.1109\/TVT.2019.2899627","article-title":"Delay-minimization routing for heterogeneous VANETs with machine learning based mobility prediction","volume":"68","author":"Tang","year":"2019","journal-title":"IEEE Trans. Veh. Technol."},{"key":"B28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJCAC.305215","article-title":"A hybrid approach for task scheduling in the cloud environment","volume":"12","author":"Tulib","year":"2022","journal-title":"Int. J. Cloud Appl. Comput."},{"key":"B29","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1109\/MPRV.2006.84","article-title":"Smart cars on smart roads: an IEEE intelligent transportation systems society update","volume":"5","author":"Wang","year":"2006","journal-title":"IEEE Pervasive Comput."},{"key":"B30","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/MWC.2010.5601954","article-title":"Complementing public key infrastructure to secure vehicular ad hoc networks","volume":"17","author":"Wasef","year":"2010","journal-title":"IEEE Wireless Commun."},{"key":"B31","doi-asserted-by":"publisher","first-page":"62785","DOI":"10.1109\/ACCESS.2019.2915794","article-title":"A lightweight privacy-preserving protocol for VANETs based on secure outsourcing computing","volume":"7","author":"Wei","year":"2019","journal-title":"IEEE Access"},{"key":"B32","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1109\/TITS.2014.2351612","article-title":"A practical wireless attack on the connected car and security protocol for in-vehicle CAN","volume":"16","author":"Woo","year":"2014","journal-title":"IEEE Trans. Intell. Transp. Syst."}],"container-title":["Frontiers in Computer Science"],"original-title":[],"link":[{"URL":"https:\/\/www.frontiersin.org\/articles\/10.3389\/fcomp.2024.1384515\/full","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,1]],"date-time":"2024-05-01T05:03:39Z","timestamp":1714539819000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.frontiersin.org\/articles\/10.3389\/fcomp.2024.1384515\/full"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,1]]},"references-count":32,"alternative-id":["10.3389\/fcomp.2024.1384515"],"URL":"https:\/\/doi.org\/10.3389\/fcomp.2024.1384515","relation":{},"ISSN":["2624-9898"],"issn-type":[{"value":"2624-9898","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,5,1]]},"article-number":"1384515"}}