Abstract
The contemporary fog computing paradigm evolved from traditional cloud computing to give storage and computation resources at the network’s edge. Fog enabled vehicular processing is anticipated to be a fundamental component that may expedite a variety of applications, notably crowd-sensing, when applied to vehicular networks. As a result, the confidentiality and safety of vehicles participating in the crowd-sensing platform are now recognized as critical challenges for smart police and cyber defence. Furthermore, sophisticated access control is essential to meet the requirements of crowd-sensing users of information. This work presents a novel secured fog-based protocol for vehicular crowd sensing utilizing an attribute-based encryption model. The proposed framework incorporates a two-layered fog architecture termed fog layer A and fog layer B. Fog layer A includes data owners (vehicles) and fog nodes, while fog layer B consists of fog nodes integrated with Road Side Units (RSUs). The Transport Triggered Architecture (TTA) governs the retrieval of regular or specialized data as per the request of data users. The data collection procedure varies based on the type of data being processed. Regular data is gathered from data owners, aggregated using the Multiple Kernel Induced in Kernel Least Mean Square (MKI-KLMS) technique, which employs kernel least mean square and hierarchical fractional bidirectional least mean square methods to handle redundancy in data aggregation. Subsequently, the aggregated data is encrypted using the Proposed Fusion Key for Encryption (PFKE) technique, which employs a fusion key for message encryption. Additionally, an enhanced Blowfish algorithm is applied for an extra layer of encryption on the already encrypted data. The encrypted data is then transmitted to the TTA. The decryption process utilizes the same key to retrieve the original message. The Modified Attribute based Encryption Model (MAEM) scheme achieves the highest efficiency of 90.9476.
Nomenclature
Description
Advanced Encryption Standard
Blockchain-based Privacy-Preserving SVM Classification
Ciphertext-Policy Attribute-Based Encryption with access Update Policy
Content Centric-Networking
Chosen Ciphertext Attack
Chosen Plaintext Attack
Differentially Private Double Auction With Reliability
Data Relay Mule–based Collection Scheme
Data-Oriented Network Architecture
Data Encryption Standard
Fog-Enabled Vehicle Crowd-Sensing
Information Centric Networks
Key Correlated Attack
Known Plaintext Attack
Location Authentication based Secure Participant Recruitment
Mobile Crowd-Sensing
Micro Mobile Data Center
Modified Attribute based Encryption Model
Multiple Kernel Induced in Kernel Least Mean Square
Proposed Fusion Key for Encryption
Road Side Unit
Transport Triggered Architecture
Introduction
Cisco announced the concept of fog computing for the first time in 2012 as an infrastructure, which accepts heavy data acquired by final equipment, especially vehicle sensors, and transmits it to local fog nodes situated next to these devices rather than transferring it to the central cloud [1]. Following then, fog computing has been used in a variety of disciplines and studied by researchers in academia as well as industry. Moreover, the fog computing architecture is expected to tackle the problem of expanding resources for computing through conducting statistical analysis at network edges rather than centralized cloud servers [2,3]. Also, Fog-Enabled Vehicle Crowd-Sensing (FEVC) represents a novel idea that enhances Mobile Crowd-Sensing (MCS) by permitting vehicles to gather information collected through embedded sensors and distribute it for ITS-based or additional purposes. Fog-Enabled Vehicle Crowd-Sensing (FEVC) permits fog devices to gather and evaluate data quickly [4,5]. Further, the vehicles gather information and then transmit it to fog devices in FEVC, where it is processed according to the demands of data users consisting of police agencies, traffic authorities, and rescue organizations [6]. As a result, depending on the underlying circumstance, data can be gathered and evaluated at the fog level or core cloud layer [7].
Despite the fact that fog computing infrastructure provides significant capacity for handling shared data, the extensive number of vehicles in the network as well as the shifting wireless connectivity pose a danger to the successful delivery of these data [8,9]. Various academic and business studies have highlighted the constraints of global Internet Protocol(IP) address assignments for vehicle networks. As a result, the vehicular network will probably implement Information Centric Network (ICN) with the goal to increase data transmission. Numerous underpinning structures, which incorporate Content-Centric Networking (CCN) and Data Oriented Network Architecture (DONA), have also been suggested [10,11]. Several research studies accepted and endorsed CCN as an effective method of facilitating data distribution and querying for volatile networks that have substantial mobility, including vehicles networks [12].
A spatial crowd-sensing architecture inspired by fog that strives to accomplish exact assignment of tasks as well as safe crowd-sensing data de-duplication. Despite addressing typical security issues, appropriate authentication and authorization was not addressed, which is critical for the crowdsensing technology considering its function in reducing the communications strain [13,14]. Such fog nodes, tiny clouds, are anticipated to provide reliable information outsourced activities despite compromising the data owner’s confidentiality or privacy. A further major investigation was given to secure crowd-sensing protocol for the internet of vehicles, which addressed security and privacy concerns for crowd-sensing devices for fog-based vehicular networks [15,16]. Nevertheless, the protocol they utilized was built on substantial collective signatures, which compromises the system’s performance [17]. The system they created also took into account traditional control over access, which does not depend on encryption using attributes and hence cannot provide precise authorization for many data users. This makes figuring out the key that was used to encrypt a message the attacker’s primary goal [18]. The aforementioned protocol also collapses to solve the problem of data outsourcing that constitutes a critical idea for crowd-sourced solutions [19,20]. For the greatest degree of the information we have, no complete method for vehicle-based crowd-sensing has been suggested that solves safety, confidentiality, extremely fine control over access, as well as contracting concerns [21]. As a result of the vehicles not interacting with the upper fog nodes and the effective alleviation of the bandwidth deficiency issue when compared to the conventional IP network, the lower level fog nodes can generate a content naming policy that will be utilized by the DU to pull the data from the upper fog layer in a content-centric manner, while also performing ciphertext update functions for data outsourcing. Hence, this paper proposes secured fog based vehicular crowd sensing protocol through attribute based encryption model.
The main contribution of this work is as follows:
Proposes PFKE technique for encrypting the message, in which fusion key is induced for encrypting the message and performs decryption with the same key. Developsmodified regular data collection, in which the parameters of encryption are improved with the combination of chaotic map including modified logistic map and tent map. Deploys MKI-KLMS technique, in which it employs kernel least mean square and hierarchical fractional bidirectional least mean square for aggregating redundancy data.
The main organization of this work is as follows:
The rest of these work studied on fog based vehicular crowd sensing protocol, which are implemented with various conventional strategies are tabularized in Section 2. The Section 3 elaborates the proposed model of secured fog based vehicular crowd sensing protocol through attribute based encryption model. The assessment of numerous statistical measures analyzed by comparing various strategies is exhibited in Section 4. Eventually, the conclusion of proposed work is concluded in Section 5.
In 2021, Foschini, L., et al. [4] has proposed Participant platform, which designs edge nodes to evaluate appropriate complicated crowd capabilities and evaluated the network of federated blockchain to save the state of prices. Edge nodes had been informed of any hazardous situations within their coverage area and may alert smartphone users through a smart push announcement system that prevented users from sending excessive messages through adjusting the cautionary frequency based on the mode of travel and the precise subarea that involved customers were situated.
In 2021, Nkenyereye, L., et al. [7] has developed privacy protection and secure crowd sensing strategy based on fog activated vehicular evaluation. This work comprises of two layered fog nodes, which had the capability to produce crowd sensing work for vehicles that gathers, assessment and aggregates the data in accordance with user specification. Moreover, Ciphertext-Policy Attribute-Based Encryption with access Update Policy (CP-ABE-UP) approach was proposed to encrypt the data. This proposed work ensured both privacy protection and authentication with the utilization of ID based signature approach together with pseudonymous mechanism.
In 2020, Ren, Y., et al. [6] has suggested Micro Mobile Data Center (MMDC) technique for minimizing the completion as well as delay rate of sensing tasks. MMDC minimizes data loss as opposed to typical data gathering methods. Further, MMDC operates as a mobile data centre with a set schedule and itinerary. Data Relay Mule–based Collection Scheme (DRMCS)’s MMDC selection technique depends on a computerized annealing process that takes into account both redundancy and gathering rate.
In 2021, Ni, T., et al. [2] has introduced Differentially Private Double Auction With Reliability (DPDR) approach, in which the incentive technique was deployed with exponential technique for choosing clearing worth tuple. For all clearing price tuples, numerous consistent workers were considered as candidates to gather accurate sensory data. Also, social welfare function was modified with the implementation of utility function together with deploying various practical pricing techniques as well as minimal sensitivity.
In 2020, Smahi, A., et al. [1] has implemented Block chain-based Privacy-Preserving SVM Classification (BPPSVC) approach among data owners of mutually distrusted. Moreover, this proposed work framed the design at first, then adversary system and implement the goals of proposed BPPSVC. Further, the privacy assessment represented that the suggested work was secure and it ensured privacy against Denial of Service (DoS) attacks.
In 2018, Nsikak P. Owoh, et al. [8] has framed security assessment of mobile crowd sensing platform. This paper illustrated the unauthenticated access to position data of user at the time of sensing because of defective security techniques in major sensing strategy. Also, this work suggested advanced encryption 256-Galois counter mode (AES 256-GCM) to guaranteed authentication as well as encryption of sensed information. It also guaranteed peer-to-peer security position as well as moving information from smart phone sensors.
In 2020, Wang, D., et al. [3] has introduced Location Authentication based Secure Participant Recruitment (LA-SPR) strategy to activate all vehicle to execute participant recruitment procedure without showing the exact position as well as sensitive data to requester and revealing key transmission and position authenticity lacking of prior distributed secret. Moreover, this work employed TA to gather location tag of anchor as well as vehicle candidates. Thus, the proposed work attained security, feasibility as well as efficiency with assessment of performance and theoretical validation.
In 2019, A. P., Amritha and J., Sandeep [9] has framed centralized travel scheduling model that links the vehicles to centralized sink to obtain best solution of routes. A prediction model was used to schedule routes. The environment was sampled for several aspects such as congestion, crowd, and the arrival and departure times of other vehicles. For control and management, the system included modules such as mobile nodes, static nodes, sink nodes, and host nodes. A major technique for designing any Vehicular Ad-hoc Network (VANET) system was the choice of a route and protocol.
In 2024, Peng et al. [22] has presented a unique technique for privacy-preserving truth discovery based on multi-party computation that is secure. We use the Secret Sharing method to safely breakdown data and build a Secure Multi-party Computation protocol to compute the ground truth, with the goal of achieving high efficiency and robust privacy protection. Furthermore, a data quality-driven incentive mechanism is constructed by using the weight value produced by truth discovery as a quantitative data quality indicator that dynamically modifies the user’s rewards.
In 2023, Yin et al. [23] has developed, a data collection method (VDCM) for vehicle ad hoc networks (VANETs) crowd sensing is proposed. The mechanism chooses suitable techniques to cut consumption and incorporates two mechanism assumptions. When there are relatively few vehicles or the coalition cannot be formed, it chooses sub mechanism 1; otherwise, it chooses sub mechanism 2. In sub mechanism 1, data is collected using a single aggregate. Submechanism2 employs multi aggregation for data collection, coalition formation method, and auction cooperation agreement for the selection of cooperative vehicles.
Features and challenges on traditional techniques correspond to fog based vehicular crowd sensing protocol.
Features and challenges on traditional techniques correspond to fog based vehicular crowd sensing protocol.
Table 1 reveals that the features and challenges on traditional techniques correspond to fog based vehicular crowd sensing protocol. The paper [4] improved the distributed ledger platforms’ robustness by deploying ParticipAct approach. Nevertheless, incorporating the ability of edge with this crowd-sensing platform system is complicated issue. Using paper [7], the author achieved increased security and network resources with rejecting unauthorized data owners with CP-ABE-UP technique. Yet, including participation dependent on incentive to ensure less cryptographic fixed cost is difficult. The author employs MMDC mechanism [6] and achieved better sensing task finishing value but still leveraging the redundancy value and data collection value is complicated. Though the author generates greater social welfare rather than other techniques by employing DPDR [2] still it is difficult to expand the work with concerning other kinds of task. Using paper [1], the BPPSVC technique offers security against DoS attacks but still it is necessary to analyze blockchain technology with other edge computing approaches. The paper [8] employs advanced encryption standard 256-Galois counter mode and guaranteed confidentiality as well as authenticity of sensor data. However, it requires high memory utilization to reduce the execution time is difficult. Moreover, the paper deploys LA-SPRtechnique [3] and accomplished time efficacy and ensures privacy. Nonetheless, concerning privacy preservation of data gathering as well as transmission is complicated issue. Consequently, the author utilizes centralized travel scheduling model [9] and attained greater packet delivery ratio but still it is vague in concerning data limitation. As a result, the author uses a centralized journey scheduling model and achieves a higher packet delivery ratio, however the data limitation is still unclear. In order to overcome these limitations, a plan for vehicle-based crowd-sensing devices needs to be investigated. It is necessary to investigate fog computing architectural responses to security, privacy, fine-grained access control, and outsourcing constraints. This work aims to present a modified attribute-based encryption model for a protected fog-based vehicular crowd-sensing system.
Proposed model of secured fog based vehicular crowd sensing protocol through PFKE technique
System model
In fog based vehicular cloud system, the central cloud storages are retained with TTA that stores data and data user that are considered as governmental or non-governmental companies. After this layer, there are two fog layers namely fog layer B and fog layer A, which are implemented sequentially. Both fog layers A and B comprises of fog nodes that are assumed as Data owner: The data owner TTA: The entire system is initialized by the trusted authority. In the system, each entity has particular keys and security parameters that are offered by TTA. Let us consider that TTA is entirely trusted and has the ability of better computation of the system. Also, TTA displays the original entities’ identity that those are participated in the argument. Fog layer A: Along the road side, certain fixed server is positioned in this layer and also it including fog nodes together with sufficient ability of wireless communication and other estimating abilities. According to the demand of data user, these fog nodes gather raw information like regular or special data from the sensors of vehicles. These fog nodes Fog layer B: This layer comprises of fog nodes Data user: Let assume that the data user be governmental or non-governmental organization including regional disaster management, accident prevention or management department, or electrical power department. According to their needs, the diverse companies collect relevant data that is crowd sensing data, which are provided by data owners. In case of crowd sensing action, the data user determines that the offered information should be pulled in the form of ICN format. That is, the Architecture of proposed secured fog based vehicular crowd sensing protocol.

PFKE strategy can be composed with the following five sub-algorithms including setup, update, encryption, key generation as well as decryption. The data encryptionprocedures employed previously is not encrypted the message securely. Hence, in this paper, a novel PFKE approach is employed for securely encrypting the message that is elaborated as follows:
Setup- Key generation- Encryption: The encryption strategy takes input as message Msg and the resultant is Update- Decryption: This strategy is processed by the destination side, which takes encrypted ciphertext as input and used decryption key considered as fusion key that decrypts the ciphertext and provides the resultant message as Msg.
The implementation of PFKE strategy can be described with the following five sub-algorithms including setup, update, encryption, key generation as well as decryption that are elaborated as follows:
Pfke.Setup()
Step 1: Choose the parameter that encodes and transmits the attribute in
Step 2: Then random values are selected like
Step 3: Allocate the master secret key as
Step 4: Create the parameter as
Step 5: Return
Pfke.Keygen()
Step 1: hoose
Step 2: Return
Proposed Pfke.Encrypt() steps
Step 1: select the random variable
Step 2: Create
Step 3: Evaluate
These steps are improved due to lack of confidentiality in data encryption by including fusion key in the ciphertext message to encrypt the message more securely with the following points:
The random value is selected from the positive integer set Create Evaluate Then return The encryption extracts the rate
Step 1: Evaluate
Step 2: Return
Proposed Pfke.dec()
Step 1: Evaluate aggregate
Step 2: For decryption, aggregate strategy is employed and the decryption key relevant to LSSS protocol is resolved as secret key
Step 3: Evaluate
Step 4: The decryption evaluates
This step 4 is improved by evaluating
Step 5: The return the message Msg is extracted as
Format of ID-based signature
The implementation of an ID-based signature strategy can be described with the following four sub-algorithms including setup, key, sign, and verification which are elaborated as follows:
IdSig.Setup()
With the parameterk, the two multiplicative classes as
Step 1: Select random variable
Step 2: Choose double cryptographic hash function as
Step 3: Assign the parameters as
Step 4: Return
IdSig.key()
The secret value is returned for the provided ID as follows:
Step 1: Create
Step 2: Evaluate
Step 3: Return
IdSig.Sign()
This strategy returns message signature
Step 1: Select random variable
Step 2: Evaluate
Step 3: Return the message as
IdSig.verf()
The signature is validated with the function IdSig.verf() such that
Step 1: Evaluate
Step 2: verify whether
Step 3:
Description of proposed protocol
System initialization
The TTA [7] offers the attributes for each entity in this initialization stage within the system are determined in the following step:
TTA produces IdSig.Setup() that stores the parameters as
Node registration
The TTA registers all entities within the system and executes the following the steps for data owners
Step 1: TTA assigns a pseudonym psudo
Step 2: The TTA process
Step 3: TTA assigns a pseudonym
Step 4: TTA publishestocan be represented as and send the key for eachsecurely.
Step 5: TTA assigns a pseudonym to all vehicles and for each.
Step 6: TTA publishes sk to
Crowd sensing request
In this crowd sensing request, two types of data gathering is performed like regular data or special data. Initially, TTA accepts the demands form data user to offer crowd sensing information for both type of dataas follows:
Step 1: At first, the data user made a demand as
Step 2: The data user sends request to TTA as
Step 3: Once the TTA receives, the TTA applies decryption with their private key and following that the signature is verified with exploring
A. Regular data collection notification
A regular data collection [7] is the process of collecting certain information by the data user within a given time. For illustration, when the data user requires performing survey over the behaviour of diving in a particular region within a given time, then TTA sends demand to
Step 1: The universe of parameters like
Step 2: TTA selects relevant access framework
Step 3: Then TTA produces a set of attributes as
Step 4: TTA transmits
B. Special data collection notification
In the situation of urgent, the specified urgent relevant data will be gathered like natural disaster [7]. Consider that there is a landslide in particular region; the data user collects the relevant data from the particular region to overcome the congestion. In order to control congestion, the data user urgently gathers specified regions’ information to redirect the vehicles. In this specified case, TTA follows the following steps:
Step 1: The universe of parameters like
Step 2: TTA selects set of access structures as
Step 3: Then TTA produces a set of attributes as
Step 4: Also, TTA produces another set of attributes as
Step 5: TTA assigns
Step 6: Then the access structure
Step 7: Further TTA transmits
Data collection and aggregation
According to the demand of data user, the data collection and aggregation is performed. For regular demand, the
A. Modified regular data collection
After receiving the beacon, the crowd-sensing data is transmitted by performing the following steps with
Step 1: Create a message as
Step 2: According to access structure
Here,
Further, the tent map [26] that specifically takes the random chaotic series of values can be defined as in Eq. (4). Here,
Then the improved chaotic map (i.e. combined form of logistic and tent map) can be defined as in Eq. (5). Here,
Step 3: Then
Step 4: After accepting
As we have includednewly added decryption process, if any malicious agent restores the message, it cannot show the vehicles’ identity. The malicious agent may trace the vehicles’ identity, can try to participate in crowd sensing without any authentication, or it may try to extract the contentof message within the crowd-sensing system.
The initialization of The Blowfish technique is employed to encrypt an all-zero string with the subkeys defined in the preceding stages (1 and 2). The result of step 3 replaced By means of the Blowfish process, step 3 output isencrypted with the revised subkeys. Outcomesattained in step 5 substituted
The conventional Blowfish method is shown in Eq. (6).

Architecture of improved blowfish algorithm.
Here, we have enhanced and proposed a new blowfish algorithm as shown in Fig. 2. As per improved blowfish, the F-function receives a 64-bit data stream and divides it into eight 8-bit segments, where
B. Special data collection
In case of special data, the data user urgently requires data about the particular region [7]. According to TTA specifications, the
Step 1: The
Step 2: Then
Step 3: Then
Step 4: After accepting
Data aggregation process is performed for both regular data and special data for eliminating the duplicated data. When the data
Moreover, the hyperbolic kernel function can be defined as in Eq. (9). Here,
Then the combined form of proposed MKI-KLMS formulation determines the amalgamation of both exponential and hyperbolic kernel function that can be defined as in Eq. (10).
Thereby, the data is aggregated, encrypted with proposed fusion key and decrypted the original message securely with the same key.
Simulation procedure
Simulation parameters.
Simulation parameters.
Simulation set up.
Further, the system configuration was indicated in Table 3. In addition, the MAEM approach was compared with Tripple Data Encryption Standard (DES), DES, Blowfish, Location Authentication based Secure Participant Recruitment (LA-SPR) [3] and Advanced Encryption Standard-Galois Counter Mode (AES 256-GCM) [8], correspondingly. Moreover, it is examined with respect to Latency, Key Sensitivity, Encryption time, Decryption time and other metrics. Similarly, it was evaluated for varied types of attacks like Chosen-Ciphertext Attack (CCA), Chosen-Plaintext Attack (CPA), Known Ciphertext Attack (KCA) and Known Plaintext Attack (KPA).

Attack assessment on MAEM and traditional methods a) CCA b) CPA c) KCA and d) KPA for Secured fog-based vehicular crowd-sensing protocol.
The attack assessment on MAEM is contrasted with TRIPPLE DES, DES, ABE, BLOWFISH, LA-SPR [3] and AES 256-GCM [8] for Secured fog-based vehicular crowd-sensing protocol. Further, it is examined with respect to CCA, CPA, KCA and KPA attacks as well as the findings are displayed from Fig. 3(a) to 3(d). Also, the evaluation is carried out for varied key sizes (16, 32, 64 and 128). Moreover, the CCA attack is referred to as, “An attack strategy on cryptanalysis known as a chosen-ciphertext attack (CCA) allows the cryptanalyst to collect data via acquiring the decryptions of specified ciphertexts.” For the enhanced security, the model should acquire lesser attack ratings. Likewise, the MAEM accomplished minimal attack values and afford high security. At the key size 128, the CCA attack value of the MAEM is 0.1954, whilst the conventional methods acquired lesser CCA attack values, including, TRIPPLE DES = 0.4891, DES = 0.6583, ABE = 0.5275, BLOWFISH = 0.3738, LA-SPR = 0.3563 and AES 256-GCM = 0.4356, correspondingly. Furthermore, the CPA is said to as, “A chosen-plaintext attack (CPA) is indeed a type of cryptanalysis attack which assumes the attacker has access to the plaintext ciphers for every given plaintext.The attack’s objective is to obtain data that will render the encryption system less secure.” Here, the MAEM offered lesser CPA attack ratings with higher security to the data. Particularly, the CPA attack rate of the MAEM is much lower than the TRIPPLE DES, DES, ABE, BLOWFISH, LA-SPR and AES 256-GCM at the key size 16.
FIA and SCA attack analysis on MAEM and conventional methods.
Table 4 describes the FIA and SCA attack analysis on MAEM scheme over the conventional strategies for Secured fog-based vehicular crowd-sensing protocol.The SCA is defined as “A side-channel attack is vulnerability in security that affects the hardware or system as a whole instead of the program or its code directly in order to gain information from or modify the program execution of a system. “Mainly, the SCA attack rate of the proposed approach is 0.211, though the Tripple DES, DES, ABE, Blowfish, LA-SPR and AES 256-GCM gained greater SCA attack values. The FIA attack is referred to as, “The act of purposefully introducing flaws into a system is known as fault injection. Analyzing the system’s performance under stress is the aim of this technique. Engineers of hardware and software frequently cause flaws in their products for a variety of reasons.’ Further, the FIA attack rate of the proposed scheme is 0.168, whilst the Tripple DES is 0.524, DES is 0.213, ABE is 0.643, Blowfish is 0.447, LA-SPR is 0.558 and AES 256-GCM is 0.234, correspondingly.

Validation on MAEM and traditional strategies for Secured fog-based vehicular crowd-sensing protocol a) Decryption time and b) Encryption time.
Figure 4(a) and (b) represents the decryption and encryption time assessment on the proposed MAEM is compared with TRIPPLE DES, DES, ABE, BLOWFISH, LA-SPR [3] and AES 256-GCM [8]. For the effective performance of the model, it should accomplish minimal encryption and decryption time. Likewise, the MAEM recorded lesser values in all the key size. Particularly, the encryption time of the proposed approach is 0.00468s (Key Size = 32), even though the traditional techniques gained highest encryption time, notably, TRIPPLE DES = 0.0056s, DES = 0.0059s, ABE = 0.0058s, BLOWFISH = 0.0057s, LA-SPR = 0.0048s and AES 256-GCM = 0.0049s, correspondingly. Regarding the Fig. 4(a), the decryption time of the MAEM is minimal than TRIPPLE DES, DES, ABE, BLOWFISH, LA-SPR and AES 256-GCM. Mainly, for the key size 16, the proposed method yielded the decryption time of 0.00402s, which is minimal than TRIPPLE DES, DES, ABE, BLOWFISH, LA-SPR and AES 256-GCM. As a consequence, the MAEM exceeded other previous strategies with low encryption and decryption time, proving that it has a greater potential to protect the data in a fog-based vehicular crowd sensing protocol.
Computation time evaluation on MAEM and traditional methodologies.
Computation time evaluation on MAEM and traditional methodologies.

Validation on MAEM and traditional strategies for Secured fog-based vehicular crowd-sensing protocol a) Key Sensitivity and b) Latency.
The examination on the proposed MAEM over the TRIPPLE DES, DES, ABE, BLOWFISH, LA-SPR [3] and AES 256-GCM [8] with regard to key sensitivity and latency for secured fog-based vehicular crowd-sensing protocol is shown in Fig. 5(a) and 5(b). Moreover, the key sensitivity and latency must be lower for efficacious performance of the model. For the key size 64, the MAEM offered the key sensitivity of 0.1271, this is extremely lower than TRIPPLE DES (0.2476), DES (0.2819), ABE (0.2265), BLOWFISH (0.2658), LA-SPR (0.2597) and AES 256-GCM (0.2489), correspondingly. Considering the Fig. 5(b), the latency of the MAEM is higher over TRIPPLE DES, DES, ABE, BLOWFISH, LA-SPR and AES 256-GCM at the key size 128. Altogether, the MAEM has asserted its supremacy for secured fog-based vehicular crowd sensing protocol with lesser key sensitivity and latency and this is because of the improved data aggregation and modified attribute based encryption method.
Table 5 explains the computation time evaluation on proposed MAEM is contrasted over the TRIPPLE DES, DES, ABE, BLOWFISH, LA-SPR [3] and AES 256-GCM [8] for secured fog-based vehicular crowd-sensing protocol. The computation time need to be lower for secure data transmission in fog-based vehicular crowd sensing protocol. Further, the computation time of the MAEM methodology is 1.6885, mean while the TRIPPLE DES is 1.8451, DES is 1.9675, ABE is 3.1255, BLOWFISH is 8.7533, LA-SPR is 5.6487 and AES 256-GCM is 2.1549, correspondingly.
Efficiency and availability analysis on MAEM and conventional schemes
Efficiency evaluation on MAEM and traditional strategies.
Efficiency evaluation on MAEM and traditional strategies.
Availability evaluation on MAEM and traditional strategies.
Additionally, the availability metric of the MAEM scheme is compared with Tripple DES, DES, ABE, Blowfish, LA-SPR and AES 256-GCM is exposed in Table 7. Here, the availability ought to be greater for the MAEM scheme. Moreover, the greatest availability is achieved using the MAEM methodology is 0.9026, though the Tripple DES, DES, ABE, Blowfish, LA-SPR and AES 256-GCM has attained minimal availability ratings.
Attack analysis for key size 16.
Attack analysis for key size 16.
Attack analysis for key size 32.
Attack analysis for key size 64.
Attack analysis for key size 128.
Attack evaluation on proposed method (MAEM) over the Tripple DES, DES, ABE, Blowfish, LA-SPR [3] and AES 256-GCM [8] for Secured fog-based vehicular crowd-sensing protocol. In this case, the attack analysis is done on two categorizes 1) The analysis of Eavesdropping, Man in the Middle, Message tampering, Plain Text Attacks, and Brute Force Attacks is based on the process of key breaking; and 2) The analysis of False Injection Attacks and Side Channel Attacks is based on correlation. Further, it is evaluated for distinctive number of key sizes (16, 32, 64 and 128) is summarized from Tables 8, 9, 10, and 11. Moreover, for a secured fog-based vehicular crowd sensing protocol, the attack rates should be higher for the key breaking procedure and lower for the correlation analysis.While assessing the Table 8, for the Message tampering attack, the MAEM offered the higher attack rate 33.418, mean while the conventional methodologies scored lower attack ratings, notably, Tripple DES = 20.340, DES = 19.237, ABE = 24.489, Blowfish = 10.955, LA-SPR = 18.560 and AES 256-GCM = 26.884, correspondingly. Additionally, for the key size 32, the MAEM gained the lesser attack value of 0.1903 in the false injection attack, whereas the Tripple DES, DES, ABE, Blowfish, LA-SPR and AES 256-GCM attained greater attack values. Likewise, for the other attacks, the MAEM accomplished superior values than the conventional strategies.
This paper performs an encryption process using improved blowfish algorithm to encrypt the formerly encrypted data. The experimental findings in the simulation program demonstrate how competitive the suggested transmission mechanism is at thwarting attacks, enhancing message transmission efficiency, and providing stronger privacy assurances for users. Specifically, the Proposed (MAEM) produced a decryption time of 0.00402s for the key size 16, which is less than that of TRIPPLE DES, DES, ABE, BLOWFISH, LA-SPR, and AES 256-GCM.The time complexity depends on the number of attributes and the specific decryption policy. Efficient algorithms can handle this process effectively.This enhancement of the MAEM scheme with lower computation time is owing to the improved data aggregation with modified attribute based encryption method.
The primary drawbacks of the suggested security plan pertain to its ability to thwart internal attacks carried out by authorized users. Scalability becomes an issue when more vehicles participate in crowd-sensing. Careful planning is needed to ensure effective data aggregation and analysis over a huge fleet of vehicles. In the future research, we will concentrate on enhancing the suggested method to incorporate incentive-based participation with the least amount of cryptographic overhead possible while guaranteeing security and privacy.
Conclusion
This work suggested an attribute-based encryption strategy for a protected fog-based vehicle crowd sensing technique. Two stacked fog layers, referred to as fog layers A and B, were used in the creation of the suggested framework. Fog nodes and data owners (vehicles) make up fog layer A; fog nodes with RSU make up fog layer B. The TTA required regular or unique data based on the data user’s request. Additionally, the process for gathering data-driven information differs. Regular data was gathered from data owners and aggregated using the MKI-KLMS technique, which also used hierarchical fractional bidirectional least mean square and kernel least mean square for collecting redundancy data. Next, the data was encrypted using the PFKE approach, which involved inducing a fusion key to encrypt the message. Furthermore, the recently enhanced blowfish-based encryption was once more used for encryption. The original message was then retrieved by using the same key to complete the decryption procedure. Additionally, the proposed MAEM methodology’s computation time is 1.6885, whereas the corresponding values for TRIPPLE DES, DES, ABE, BLOWFISH, LA-SPR, and AES 256-GCM are 1.8451, 1.9675, and 3.1255, respectively.
