<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.1 20151215//EN" "http://jats.nlm.nih.gov/publishing/1.1/JATS-journalpublishing1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" article-type="research-article" dtd-version="1.1">
<front>
<journal-meta>
<journal-id journal-id-type="pmc">IASC</journal-id>
<journal-id journal-id-type="nlm-ta">IASC</journal-id>
<journal-id journal-id-type="publisher-id">IASC</journal-id>
<journal-title-group>
<journal-title>Intelligent Automation &#x0026; Soft Computing</journal-title>
</journal-title-group>
<issn pub-type="epub">2326-005X</issn>
<issn pub-type="ppub">1079-8587</issn>
<publisher>
<publisher-name>Tech Science Press</publisher-name>
<publisher-loc>USA</publisher-loc>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">24687</article-id>
<article-id pub-id-type="doi">10.32604/iasc.2022.024687</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Article</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>Improved Homomorphic Encryption with Optimal Key Generation Technique for VANETs</article-title><alt-title alt-title-type="left-running-head">Improved Homomorphic Encryption with Optimal Key Generation Technique for VANETs</alt-title><alt-title alt-title-type="right-running-head">Improved Homomorphic Encryption with Optimal Key Generation Technique for VANETs</alt-title>
</title-group>
<contrib-group content-type="authors">
<contrib id="author-1" contrib-type="author" corresp="yes">
<name name-style="western"><surname>Tamilarasi</surname><given-names>G.</given-names></name>
<xref ref-type="aff" rid="aff-1">1</xref><email>prithvi6781@gmail.com</email>
</contrib>
<contrib id="author-2" contrib-type="author">
<name name-style="western"><surname>Rajiv Gandhi</surname><given-names>K.</given-names></name>
<xref ref-type="aff" rid="aff-2">2</xref>
</contrib>
<contrib id="author-3" contrib-type="author">
<name name-style="western"><surname>Palanisamy</surname><given-names>V.</given-names></name>
<xref ref-type="aff" rid="aff-1">1</xref>
</contrib>
<aff id="aff-1"><label>1</label><institution>Department of Computer Applications, Alagappa University</institution>, <addr-line>Karaikudi, 630004, Tamilnadu</addr-line>, <country>India</country></aff>
<aff id="aff-2"><label>2</label><institution>Department of Computer Science, Alagappa University Model Constituent College</institution>, <addr-line>Paramakkudi, 623707, Tamilnadu</addr-line>, <country>India</country></aff>
</contrib-group><author-notes><corresp id="cor1"><label>&#x002A;</label>Corresponding Author: G. Tamilarasi. Email: <email>prithvi6781@gmail.com</email></corresp></author-notes>
<pub-date pub-type="epub" date-type="pub" iso-8601-date="2022-01-18"><day>18</day>
<month>01</month>
<year>2022</year></pub-date>
<volume>33</volume>
<issue>2</issue>
<fpage>1273</fpage>
<lpage>1288</lpage>
<history>
<date date-type="received"><day>27</day><month>10</month><year>2021</year></date>
<date date-type="accepted"><day>09</day><month>12</month><year>2021</year></date>
</history>
<permissions>
<copyright-statement>&#x00A9; 2022 Tamilarasi et al.</copyright-statement>
<copyright-year>2022</copyright-year>
<copyright-holder>Tamilarasi et al.</copyright-holder>
<license xlink:href="https://creativecommons.org/licenses/by/4.0/">
<license-p>This work is licensed under a <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution 4.0 International License</ext-link>, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.</license-p>
</license>
</permissions>
<self-uri content-type="pdf" xlink:href="TSP_IASC_24687.pdf"></self-uri>
<abstract>
<p>In recent years, vehicle ad hoc networks (VANETs) have garnered considerable interest in the field of intelligent transportation systems (ITS) due to the added safety and preventive measures for drivers and passengers. Regardless of the benefits provided by VANET, it confronts various challenges, most notably in terms of user/message security and privacy. Due to the decentralised nature of VANET and its changeable topologies, it is difficult to detect rogue or malfunctioning nodes or users. Using an improved grasshopper optimization algorithm (IGOA-PHE) technique in VANETs, this research develops a new privacy-preserving partly homomorphic encryption with optimal key generation. The suggested IGOA-PHE approach is intended to provide privacy and security in VANETs. The proposed IGOA-PHE technique consists of two stages: an ElGamal public key cryptosystem (EGPKC) for PHE and an optimised key generation procedure based on IGOA. To enhance the security of the EGPKC approach, the keys are selected ideally utilising the IGOA. Additionally, the IGOA is derived by using Gaussian mutation (GM) and Levy flights ideas. The experimental investigation of the proposed IGOA-PHE approach is extensive. The resulting results demonstrated that the provided IGOA-PHE technique outperformed recent state-of-the-art methods.</p>
</abstract>
<kwd-group kwd-group-type="author">
<kwd>VANETs</kwd>
<kwd>security</kwd>
<kwd>privacy</kwd>
<kwd>homomorphic encryption</kwd>
<kwd>optimal key generation</kwd>
<kwd>levy flight</kwd>
<kwd>GOA</kwd>
</kwd-group>
</article-meta>
</front>
<body>
<sec id="s1">
<label>1</label>
<title>Introduction</title>
<p>VANETs are being developed as a subset of Mobile Adhoc Network (MANET) applications [<xref ref-type="bibr" rid="ref-1">1</xref>,<xref ref-type="bibr" rid="ref-2">2</xref>]. VANET is being considered as a viable technology for intelligent transportation systems (ITS) [<xref ref-type="bibr" rid="ref-3">3</xref>]. Recently, several scientists working in the field of wireless mobile transmission have placed a premium on VANET. The purpose of VANET is to provide an inter-vehicle transmission and road side unit (RSU) to vehicles in order to improve road safety, local traffic flow, and road traffic performance by providing timely and reliable data to road customers [<xref ref-type="bibr" rid="ref-4">4</xref>]. In a VANET, vehicles serve as network nodes, as seen in <xref ref-type="fig" rid="fig-1">Fig. 1</xref>. In a VANET, the OBU and RSU establish a link between themselves via dedicated short range communication (DSRC) via single/multi hop transmission [<xref ref-type="bibr" rid="ref-5">5</xref>]. VANET provides a variety of applications and services to the user, all of which are centred on infotainment, navigation assistance, and driver security [<xref ref-type="bibr" rid="ref-6">6</xref>].</p>
<fig id="fig-1">
<label>Figure 1</label>
<caption>
<title>Structure of VANET</title></caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="IASC_24687-fig-1.png"/>
</fig>
<p>While interest in the major benefits of VANETs is growing, the dynamic nature of VANETs (vehicles may quit and rejoin willingly) combined with a plethora of scheme and application-related requirements makes establishing an efficient way to maintain vehicle privacy extremely challenging [<xref ref-type="bibr" rid="ref-7">7</xref>]. Privacy refers to the driver&#x0027;s (vehicle) privacy and the vehicle&#x0027;s position. If a vehicle transmits a message, nobody (save the proper authority) can deduce the vehicle&#x0027;s position/identity from the transmission. Simultaneously, the entire set of messages transmitted by the vehicle must be validated prior to processing. Until this issue is fixed to the user&#x0027;s satisfaction, significant VANET placement cannot be accomplished. Verification should occur on two levels: first at the node level, which corresponds to node verification, and then at the message level, which corresponds to message verification [<xref ref-type="bibr" rid="ref-8">8</xref>]. The fundamental standard of message authentication can be shortened by having the sender sign a message and then verifying the message&#x0027;s integrity and authenticity at the receiver end. Specific verification requirements such as scalable and robust authentication, effective and scalable certificate revocation, and reduced computation overhead should be addressed and handled in order to provide safe transmission in the VANET. Assuring the vehicle&#x0027;s (driver&#x0027;s) privacy is a significant issue that requires an appropriate solution; otherwise, an adversary can trace a vehicle&#x0027;s travelling route by analysing and collecting its message [<xref ref-type="bibr" rid="ref-9">9</xref>] and identify the vehicle (driver), which could have a detrimental impact on the drivers.</p>
<p>To address this issue, numerous scientists have proposed techniques in which vehicles can transmit under a pseudonym rather than their true identity, allowing authorities to retrieve the true identity from pseudonyms in order to penalise and trace mischievous vehicles [<xref ref-type="bibr" rid="ref-10">10</xref>]. This protocol is referred to as a privacy-preserving conditional protocol. Allocating pseudonyms to cars and changing them on a regular basis is another method of ensuring the vehicle&#x0027;s anonymity. To maximise privacy, cars should modify pseudonyms more frequently, however the frequency of these modifications is unknown. Features such as storage capacity and availability significantly influence the rate at which the pseudonym must be adjusted [<xref ref-type="bibr" rid="ref-11">11</xref>]. The majority of studies in the survey that address privacy, security, and authentication make use of TA to get and load OBU &#x0026; RSU using security variables such as pseudonyms, keys, and certificates. <xref ref-type="fig" rid="fig-2">Fig. 2</xref> depicts the safe transfer of data in a VANET. Conventional methods for authenticating and securing message dissemination, which rely heavily on key management and message encryption, are capable of ensuring secure message exchange between destination pairs and known sources. This strategy cannot be directly used to VANETs due to their dynamic nature. The propagation of messages in a VANET may be vulnerable to insider attacks (i.e., attacks by valid VANET members), which may corrupt the substance of the message or transmit malicious messages. As a result, ensuring the validity and integrity of messages transmitted across VANET is a serious issue. In VANETs, this article proposes a new privacy-preserving partly homomorphic encryption strategy with optimal key generation based on an improved grasshopper optimization algorithm (IGOA-PHE). The suggested IGOA-PHE approach is intended to provide privacy and security in VANETs. The proposed IGOA-PHE technique consists of two stages: an ElGamal public key cryptosystem (EGPKC) for PHE and an optimised key generation procedure based on IGOA. To enhance the security of the EGPKC approach, keys are chosen ideally utilising the IGOA. Additionally, the IGOA is derived by adding Gaussian mutation and Levy flights ideas. To evaluate the proposed IGOA-PHE technique&#x0027;s security outcomes, a large number of simulations were run and the results examined using a variety of metrics.</p>
<fig id="fig-2">
<label>Figure 2</label>
<caption>
<title>Secure data transmission in VANET</title></caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="IASC_24687-fig-2.png"/>
</fig>
</sec>
<sec id="s2">
<label>2</label>
<title>Related Works</title>
<p>Al-Shareeda et al. [<xref ref-type="bibr" rid="ref-12">12</xref>] described a privacy-preserving communication scheme (VPPCS) based on the VANET that satisfies the criteria for contextual and content privacy. It makes use of elliptic curve cryptography (ECC) and a system of identity-based encryption. They conducted extensive security assessments on the proposed system (random oracle module, BAN logic, security attribute, and security of proof). The analyses demonstrated that this method is secure and also efficient when performing calculations. Cui et al. [<xref ref-type="bibr" rid="ref-13">13</xref>] suggested a data downloading method for VANET that is both effective and private, based on the edge computing architecture. In the proposed method, an RSU may detect shared data simply by inspecting the encrypted requests transmitted by neighbouring cars, without compromising the privacy of their downloaded request. Additionally, the RSU stores shared data in a near-qualified vehicle called an ECV. When a vehicle requires current data upload, it can do it immediately from the next ECV. This strategy improves the scheme&#x0027;s upload performance.</p>
<p>Alfadhli et al. [<xref ref-type="bibr" rid="ref-14">14</xref>] proposed a low-weighted multifactor authentication and privacy-preserving security solution for VANETs. Additionally, it eliminates the heavyweight reliance on the scheme key by decentralising the CA&#x0027;s broad region to local areas and achieving strong domain key management. Ali et al. [<xref ref-type="bibr" rid="ref-15">15</xref>] suggested an efficient ID-CPPA signature system for V2I transmission based on a bilinear map. This increases the efficacy of the RSU&#x0027;s operation by signing and authenticating messages. Additionally, this ID CPPA signature system provides batch signature authentication, which reduces the computational burden on the RSU and enables it to authenticate a large volume of traffic-related messages in a high-traffic area.</p>
<p>Wang et al. [<xref ref-type="bibr" rid="ref-16">16</xref>] suggested a novel anonymous authentication mechanism based on identification. The system&#x0027;s master key will not be configured directly in TPD in this system. Additional secrecy is required to generate the vehicle&#x0027;s private key, which is provided via RSU. Thus, revoking a malicious vehicle in the VANET is effective, and the RSU should discontinue the car&#x0027;s present privacy. Additionally, the signature authentication approach does not require bilinear pairing, resulting in a highly effective authentication procedure. Wang et al. [<xref ref-type="bibr" rid="ref-17">17</xref>] suggested a hybrid CPPA protocol that relies on both public key infrastructure certificates and identity-based signatures. The TA assigns an exclusive long-term certificate to each of the mentioned nodes in this system approach. Vehicles with valid certificates could use the present RSU&#x0027;s anonymous short term identity to sign security-related messages. Identity-based signatures obviate the need for CRL verification and complex bilinear parsing processes. Moni et al. [<xref ref-type="bibr" rid="ref-18">18</xref>] suggested a privacy-preserving authentication system for VANET that is scalable, distributed, and has a minimal overhead. This approach authenticates RSUs using MHT and verifies cars using MMPT. Benarous et al. [<xref ref-type="bibr" rid="ref-19">19</xref>] provide a novel privacy-preserving approach for pseudonym on-road on-demand replenishment, in which the vehicle authenticates itself anonymously to the local authority subsidiaries of the central trusted authority in order to seek a novel pseudonyms pool. This technique entails a challenge-based authentication process and the creation of an anonymous ticket. Al-shareeda et al. [<xref ref-type="bibr" rid="ref-20">20</xref>] introduced an identity-based CPPA system that enables concurrent authentication of several messages with each node via a batch authentication technique. Section 2 describes the literature survey in the field privacy preserving homomorphic encryption, Section 3 deals with the proposed technique called IGOA-PHE, Section 4 elaborates the results and discussion and final section 5 describes the conclusion and future work.</p>
</sec>
<sec id="s3">
<label>3</label>
<title>The Proposed IGOA-PHE Technique</title>
<p>The overall working principle involved in the proposed IGOA-PHE technique is here. It is stated that the IGOA-PHE technique follows a 2-stage process namely EGPKC for PHE and IGOA based optimal key generation process. These processes are neatly elaborated in the following subsections.</p>
<sec id="s3_1">
<label>3.1</label>
<title>Design of EGPKC Technique</title>
<p>Generally, it is stated in 1985 using discrete method cause problems to constrained areas (partial HE technique). It has key decryption, generation, and encryption operations. Usually, this technique has private key (an arbitrary amount) <inline-formula id="ieqn-1">
<mml:math id="mml-ieqn-1"><mml:mi>x</mml:mi><mml:mi>i</mml:mi><mml:mo>&#x2208;</mml:mo><mml:mi>Z</mml:mi><mml:msubsup><mml:mi>i</mml:mi><mml:mrow><mml:mrow><mml:mi mathvariant="normal">q</mml:mi><mml:msup><mml:mrow><mml:mi mathvariant="normal">i</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="normal">&#x2032;</mml:mi></mml:mrow></mml:msup></mml:mrow></mml:mrow><mml:mrow><mml:mo>&#x2217;</mml:mo></mml:mrow></mml:msubsup></mml:math>
</inline-formula> by its corresponding public key <italic>yi</italic>&#x2009;&#x2261;&#x2009;(g<italic>i</italic><sup>&#x2032;</sup>) <sup><italic>xi</italic></sup> <italic>mod</italic> <italic>qi</italic>, whereas g<italic>i</italic><sup>&#x2032;</sup> identify the generator to <italic>Gi</italic><sub>1</sub> using prime order <italic>qi</italic><sup>&#x2032;</sup>. Therefore, the novel involvement, to optimize the corresponding private key with the help of new hybrid method. An optimization handles creation of an optimum key this indeed enhances and states the security emergency. Moreover, an encryption message m<italic>i</italic>&#x2009;&#x2208;&#x2009;<italic>Gi</italic><sub>1</sub> &#x0026; public key <italic>yi</italic> is determined by <inline-formula id="ieqn-2">
<mml:math id="mml-ieqn-2"><mml:mi>c</mml:mi><mml:msub><mml:mi>i</mml:mi><mml:mn>1</mml:mn></mml:msub><mml:mo>&#x2261;</mml:mo><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mrow><mml:mi mathvariant="normal">g</mml:mi></mml:mrow><mml:msup><mml:mrow><mml:mi>i</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="normal">&#x2032;</mml:mi></mml:mrow></mml:msup></mml:mrow><mml:msup><mml:mo stretchy="false">)</mml:mo><mml:mrow><mml:mi mathvariant="normal">n</mml:mi></mml:mrow></mml:msup><mml:mi>m</mml:mi><mml:mi>o</mml:mi><mml:mi>d</mml:mi><mml:mtext>&#xA0;</mml:mtext><mml:mi>q</mml:mi><mml:mi>i</mml:mi></mml:math>
</inline-formula>, <inline-formula id="ieqn-3">
<mml:math id="mml-ieqn-3"><mml:mi>c</mml:mi><mml:msub><mml:mi>i</mml:mi><mml:mn>2</mml:mn></mml:msub><mml:mo>&#x2261;</mml:mo><mml:mi>y</mml:mi><mml:msup><mml:mi>i</mml:mi><mml:mrow><mml:mi>r</mml:mi><mml:mi>i</mml:mi></mml:mrow></mml:msup><mml:mrow><mml:mi mathvariant="normal">m</mml:mi></mml:mrow><mml:mi>i</mml:mi><mml:mtext>&#xA0;</mml:mtext><mml:mi>m</mml:mi><mml:mi>o</mml:mi><mml:mi>d</mml:mi><mml:mtext>&#xA0;</mml:mtext><mml:mi>q</mml:mi><mml:mi>i</mml:mi></mml:math>
</inline-formula>, whereas <italic>ri</italic> denotes random amount. Likewise, the decryption ciphertext <inline-formula id="ieqn-4">
<mml:math id="mml-ieqn-4"><mml:mo fence="false" stretchy="false">{</mml:mo><mml:mrow><mml:mi>c</mml:mi><mml:msub><mml:mi>i</mml:mi><mml:mn>1</mml:mn></mml:msub><mml:mo>,</mml:mo><mml:mspace width="thickmathspace" /><mml:mi>c</mml:mi><mml:msub><mml:mi>i</mml:mi><mml:mn>2</mml:mn></mml:msub></mml:mrow><mml:mo fence="false" stretchy="false">}</mml:mo></mml:math>
</inline-formula> &#x0026; private key <italic>xi</italic> is determined by <inline-formula id="ieqn-5">
<mml:math id="mml-ieqn-5"><mml:mi>m</mml:mi><mml:mi>i</mml:mi><mml:mo>&#x2261;</mml:mo><mml:mi>c</mml:mi><mml:msub><mml:mi>i</mml:mi><mml:mn>2</mml:mn></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mi>c</mml:mi><mml:msubsup><mml:mi>i</mml:mi><mml:mn>1</mml:mn><mml:mrow><mml:mi>x</mml:mi><mml:mi>i</mml:mi></mml:mrow></mml:msubsup></mml:mrow><mml:msup><mml:mo stretchy="false">)</mml:mo><mml:mrow><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msup></mml:math>
</inline-formula> <italic>mod</italic> <italic>qi</italic>.</p>
<p>Most of this technique takes an equivalent ciphertext by selecting a plaintexts attack for every probabilistic polynomial time adversaries <italic>Ai</italic>. Also, the message encrypting arbitrarily in two different messages assured by <italic>Ai</italic>, to identify the elected message is increased to random resolving. For considering, the ElGamal cryptosystem is determined by the game module with the challenger <italic>Ci</italic> and opponent <italic>Ai</italic>.<list list-type="bullet"><list-item>
<p>Initially, <italic>Ai</italic> elects two separate messages as m<italic>i</italic><sub>0</sub>, m<italic>i</italic><sub>1</sub>&#x2009;&#x2208;&#x2009;<italic>Gi</italic><sub>1</sub> and forward it to <italic>Ci</italic><sup>&#x2032;</sup>.</p></list-item><list-item>
<p>After, this technique calculates <italic>Ci</italic><sup>&#x2032;</sup> elects <italic>ai</italic>&#x2009;&#x2208;&#x2009;&#x007B;0, 1&#x007D; and <italic>ri</italic><sub>1</sub>, <inline-formula id="ieqn-6">
<mml:math id="mml-ieqn-6"><mml:mi>x</mml:mi><mml:mi>i</mml:mi><mml:mo>&#x2208;</mml:mo><mml:mi>Z</mml:mi><mml:msubsup><mml:mi>i</mml:mi><mml:mrow><mml:mi>q</mml:mi><mml:msup><mml:mrow><mml:mi>i</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="normal">&#x2032;</mml:mi></mml:mrow></mml:msup></mml:mrow><mml:mrow><mml:mo>&#x2217;</mml:mo></mml:mrow></mml:msubsup></mml:math>
</inline-formula> arbitrarily and set <inline-formula id="ieqn-7">
<mml:math id="mml-ieqn-7"><mml:mi>y</mml:mi><mml:mi>i</mml:mi><mml:mo>&#x2261;</mml:mo><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mrow><mml:mi mathvariant="normal">g</mml:mi></mml:mrow><mml:msup><mml:mrow><mml:mi>i</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="normal">&#x2032;</mml:mi></mml:mrow></mml:msup></mml:mrow><mml:msup><mml:mo stretchy="false">)</mml:mo><mml:mrow><mml:mi>x</mml:mi><mml:mi>i</mml:mi></mml:mrow></mml:msup><mml:mi>m</mml:mi><mml:mi>o</mml:mi><mml:mi>d</mml:mi><mml:mi>q</mml:mi><mml:mi>i</mml:mi></mml:math>
</inline-formula>, <italic>ci</italic><sub>1</sub>&#x2009;&#x2261;&#x2009;(g<italic>i</italic><sup>&#x2032;</sup>)<sup><italic>ri</italic></sup><italic>modqi</italic> and <italic>ci</italic><sub>2</sub>&#x2009;&#x2261;&#x2009;(g<italic>i</italic><sup>&#x2032;</sup>)<sup><italic>rixi</italic></sup>m<italic>i</italic><sub><italic>ai</italic></sub> <italic>mod</italic> <italic>qi</italic>. Likewise, <italic>Ci</italic><sup>&#x2032;</sup> provide <italic>Ai</italic> as <inline-formula id="ieqn-8">
<mml:math id="mml-ieqn-8"><mml:mrow><mml:mi mathvariant="normal">g</mml:mi></mml:mrow><mml:msup><mml:mrow><mml:mi>i</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="normal">&#x2032;</mml:mi></mml:mrow></mml:msup><mml:mo>,</mml:mo><mml:mspace width="thickmathspace" /><mml:mi>y</mml:mi><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mspace width="thickmathspace" /><mml:mi>c</mml:mi><mml:msub><mml:mi>i</mml:mi><mml:mn>1</mml:mn></mml:msub><mml:mo>,</mml:mo><mml:mspace width="thickmathspace" /><mml:mrow><mml:mi mathvariant="normal">&#x0026;</mml:mi><mml:mtext>&#xA0;</mml:mtext></mml:mrow><mml:mi>c</mml:mi><mml:msub><mml:mi>i</mml:mi><mml:mn>2</mml:mn></mml:msub><mml:mo>.</mml:mo></mml:math>
</inline-formula></p></list-item><list-item>
<p>The calculated challenge <italic>Ci</italic><sup>&#x2032;</sup> analyses <italic>Ai</italic> on <italic>ai</italic>.</p></list-item><list-item>
<p>For calculating a guess as <italic>Ai</italic> provides <italic>ai</italic><sup>&#x2032;</sup> and forward it return to <italic>Ci</italic><sup>&#x2032;</sup>.</p></list-item></list></p>
<p>Now, <italic>Ai</italic> becomes a success when <italic>ai</italic><sup>&#x2032;</sup>&#x2009;&#x003D;&#x2009;<italic>ai</italic> otherwise fails.</p>
<p>In Above mentioned game, consider <italic>Ai</italic> recognizes <inline-formula id="ieqn-9">
<mml:math id="mml-ieqn-9"><mml:mi>g</mml:mi><mml:msup><mml:mrow><mml:mi>i</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="normal">&#x2032;</mml:mi></mml:mrow></mml:msup><mml:mo>,</mml:mo><mml:mspace width="thickmathspace" /><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mrow><mml:mi mathvariant="normal">g</mml:mi></mml:mrow><mml:msup><mml:mrow><mml:mi>i</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="normal">&#x2032;</mml:mi></mml:mrow></mml:msup></mml:mrow><mml:msup><mml:mo stretchy="false">)</mml:mo><mml:mrow><mml:mi>x</mml:mi><mml:mrow><mml:mi mathvariant="normal">i</mml:mi></mml:mrow></mml:mrow></mml:msup><mml:mo>,</mml:mo><mml:mspace width="thickmathspace" /><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mrow><mml:mi mathvariant="normal">g</mml:mi></mml:mrow><mml:msup><mml:mrow><mml:mi>i</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="normal">&#x2032;</mml:mi></mml:mrow></mml:msup></mml:mrow><mml:msup><mml:mo stretchy="false">)</mml:mo><mml:mrow><mml:mi>r</mml:mi><mml:mi>i</mml:mi></mml:mrow></mml:msup><mml:mtext>&#xA0;</mml:mtext><mml:mrow><mml:mi mathvariant="normal">&#x0026;</mml:mi><mml:mtext>&#xA0;</mml:mtext></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mrow><mml:mi mathvariant="normal">g</mml:mi></mml:mrow><mml:msup><mml:mrow><mml:mi>i</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="normal">&#x2032;</mml:mi></mml:mrow></mml:msup></mml:mrow><mml:msup><mml:mo stretchy="false">)</mml:mo><mml:mrow><mml:mi>x</mml:mi><mml:mi>i</mml:mi><mml:mi>r</mml:mi><mml:mi>i</mml:mi></mml:mrow></mml:msup><mml:mrow><mml:mi mathvariant="normal">m</mml:mi></mml:mrow><mml:msub><mml:mi>i</mml:mi><mml:mrow><mml:mi>a</mml:mi><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math>
</inline-formula> but <italic>Ai</italic> cannot get right access for <italic>xi</italic> and ri&#x2019;. Now, the success possibility of probabilistic polynomial time challenger <italic>Ai</italic> for achieving <italic>ai</italic> is high to random guessing as given in <xref ref-type="disp-formula" rid="eqn-1">Eq. (1)</xref>:<disp-formula id="eqn-1"><label>(1)</label>
<mml:math id="mml-eqn-1" display="block"><mml:mi>P</mml:mi><mml:mi>i</mml:mi><mml:mspace width="thickmathspace" /><mml:mo stretchy="false">[</mml:mo><mml:mrow><mml:mi>a</mml:mi><mml:msup><mml:mrow><mml:mi>i</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="normal">&#x2032;</mml:mi></mml:mrow></mml:msup><mml:mo>=</mml:mo><mml:mi>o</mml:mi><mml:mi>i</mml:mi></mml:mrow><mml:mo stretchy="false">]</mml:mo><mml:mo>=</mml:mo><mml:mstyle displaystyle="true" scriptlevel="0"><mml:mrow><mml:mfrac><mml:mn>1</mml:mn><mml:mn>2</mml:mn></mml:mfrac></mml:mrow><mml:mo>+</mml:mo><mml:mi>n</mml:mi><mml:mi>e</mml:mi><mml:mi>g</mml:mi><mml:mi>l</mml:mi></mml:mstyle></mml:math>
</disp-formula></p>
<p>In <xref ref-type="disp-formula" rid="eqn-2">Eq. (2)</xref>, <italic>Pi</italic> denotes success possibility and <italic>negl</italic> represent trivial improvement. Eventually, the ciphertext along with an optimum private key is revealed in MAC.</p>
<p>Generally, the MAC frames are modelled to maintain minimal sophisticated form by a sufficient strength for declaring stable transmission on the noisy channel. Also, each successive protocol layer is added to the frame from layer specific footers &#x0026; headers. The MAC structure has four frames.<list list-type="bullet"><list-item>
<p>Initially, the beacon frame, employed with the coordinator to transfer beacons.</p></list-item><list-item>
<p>In 2nd, the data frame, utilized to broadcast the whole data.</p></list-item><list-item>
<p>In 3rd, the acknowledgment is used for assuring the efficient frame is delivered.</p></list-item><list-item>
<p>Laslty, the MAC command frame is utilized for managing the whole MAC peer entity control transmissions.</p></list-item></list></p>
<p>Now, the data frames transmit the MAC payload and aforementioned procedure is finished in the data frame. MAC payload executes the ciphertext with corresponding transmissions and private keys. On the recipient side, an equal decoder process takes place and eventually, attains the original data.</p>
</sec>
<sec id="s3_2">
<label>3.2</label>
<title>Design of IGOA for Optimal Key Generation</title>
<p>The private key in ElGamal cryptosystem is enhanced to accomplish the accurate ciphertext. A novel technique is developed; where it is implemented to create the ciphertext using numerical values. In general, the proposed ciphertext has numbers (1, 2, 3. . .), alphabets (a, A, b, D, &#x2026;) and special characters <inline-formula id="ieqn-10">
<mml:math id="mml-ieqn-10"><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mo>!</mml:mo><mml:mo>,</mml:mo><mml:mspace width="thickmathspace" /><mml:mrow><mml:mo>@</mml:mo></mml:mrow><mml:mo>,</mml:mo><mml:mspace width="thickmathspace" /><mml:mrow><mml:mspace width="thickmathspace" /><mml:mtext>&#xA0;</mml:mtext><mml:mo>&#x2217;</mml:mo></mml:mrow><mml:mo>,</mml:mo><mml:mspace width="thickmathspace" /><mml:mo>&#x2026;</mml:mo></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:math>
</inline-formula>. Based on the penalty is set, (i) once the ciphertext using numeric values are attained, penalty &#x003D;&#x2009;0 (ii) after the ciphertext is attained with alphabetical and special characters, penalty could reduce in interval. The aim is to achieve a decreased penalty (given in <xref ref-type="disp-formula" rid="eqn-2">Eq. (2)</xref>, e.g., the ciphertext should be in numerical values.<disp-formula id="eqn-2"><label>(2)</label>
<mml:math id="mml-eqn-2" display="block"><mml:mi>O</mml:mi><mml:mi>b</mml:mi><mml:mo>=</mml:mo><mml:mi>M</mml:mi><mml:mi>i</mml:mi><mml:mi>n</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mi>p</mml:mi><mml:mi>e</mml:mi><mml:mi>n</mml:mi><mml:mi>a</mml:mi><mml:mi>l</mml:mi><mml:mi>t</mml:mi><mml:mi>y</mml:mi></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:math>
</disp-formula></p>
<p>Grasshopper is deliberated as pest depending upon the loss they impose on vegetation and crops. In place of performing separately, grasshopper creates few biggest swarms amongst all living beings. The impact of an individual in a wind, swarm, food source, and gravity affects swarm motion. The GOA is a new SI based metaheuristic method that is stimulated using longer range and sudden movement of adult grasshoppers in a group. Metaheuristic algorithm reasonably separates the search procedure as to exploitation &#x0026; exploration phases. The longer range and sudden motions of the grasshopper denote exploration stage, and local motions for searching for an optimal food source represent exploitation stage. A numerical module for this behavior is given in Mirjalili [<xref ref-type="bibr" rid="ref-21">21</xref>] can be denoted as:<disp-formula id="eqn-3"><label>(3)</label>
<mml:math id="mml-eqn-3" display="block"><mml:msub><mml:mi>x</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>=</mml:mo><mml:msub><mml:mi>S</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>+</mml:mo><mml:mi>G</mml:mi><mml:mo>+</mml:mo><mml:mi>A</mml:mi><mml:mo>,</mml:mo><mml:mspace width="thickmathspace" /></mml:math>
</disp-formula></p>
<p>Whereas <italic>x</italic><sub><italic>i</italic></sub> denotes location of <italic>i</italic> grasshopper, <italic>S</italic><sub><italic>i</italic></sub> indicates social interaction in a group, <italic>G</italic> represents force of gravity performing on <italic>i</italic> grasshopper, and <italic>A</italic> signifies wind direction. By extending <italic>S</italic><sub><italic>i</italic></sub>, <italic>G</italic> &#x0026; <italic>A</italic> in <xref ref-type="disp-formula" rid="eqn-1">(1)</xref>, the formula is given by:<disp-formula id="eqn-4"><label>(4)</label>
<mml:math id="mml-eqn-4" display="block"><mml:msub><mml:mi>x</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>=</mml:mo><mml:munderover><mml:mrow><mml:mo movablelimits="false">&#x2211;</mml:mo></mml:mrow><mml:mrow><mml:mi>j</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mi>j</mml:mi><mml:mo>&#x2260;</mml:mo><mml:mi>i</mml:mi></mml:mrow><mml:mi>N</mml:mi></mml:munderover><mml:mo>&#x2061;</mml:mo><mml:mi>s</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mo fence="false" stretchy="false">|</mml:mo><mml:mrow><mml:msub><mml:mi>x</mml:mi><mml:mi>j</mml:mi></mml:msub><mml:mo>&#x2212;</mml:mo><mml:msub><mml:mi>x</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow><mml:mo fence="false" stretchy="false">|</mml:mo></mml:mrow><mml:mo stretchy="false">)</mml:mo><mml:mstyle displaystyle="true" scriptlevel="0"><mml:mrow><mml:mfrac><mml:mrow><mml:msub><mml:mi>x</mml:mi><mml:mi>j</mml:mi></mml:msub><mml:mo>&#x2212;</mml:mo><mml:msub><mml:mi>x</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow><mml:mrow><mml:msub><mml:mi>d</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:mfrac></mml:mrow><mml:mo>&#x2212;</mml:mo><mml:mi>g</mml:mi><mml:msub><mml:mrow><mml:mover><mml:mi>e</mml:mi><mml:mo stretchy="false">&#x005E;</mml:mo></mml:mover></mml:mrow><mml:mi>g</mml:mi></mml:msub><mml:mo>+</mml:mo><mml:mi>u</mml:mi><mml:msub><mml:mrow><mml:mover><mml:mi>e</mml:mi><mml:mo stretchy="false">&#x005E;</mml:mo></mml:mover></mml:mrow><mml:mi>w</mml:mi></mml:msub><mml:mo>,</mml:mo><mml:mspace width="thickmathspace" /></mml:mstyle></mml:math>
</disp-formula></p>
<p>Whereas <italic>s</italic>(<italic>r</italic>)&#x2009;&#x003D;&#x2009;<italic>fe</italic><sup>&#x2212;<italic>r</italic>/<italic>l</italic></sup>&#x2009;&#x2212;&#x2009;<italic>e</italic><sup>&#x2212;<italic>r</italic></sup> denotes function stimulate the influence of social interaction and N represents amount of grasshopper. <inline-formula id="ieqn-11">
<mml:math id="mml-ieqn-11"><mml:mi>g</mml:mi><mml:msub><mml:mrow><mml:mover><mml:mi>e</mml:mi><mml:mo stretchy="false">&#x005E;</mml:mo></mml:mover></mml:mrow><mml:mi>g</mml:mi></mml:msub></mml:math>
</inline-formula> Indicates extended <italic>G</italic> element, while <italic>g</italic> signifies gravitational force and <inline-formula id="ieqn-12">
<mml:math id="mml-ieqn-12"><mml:msub><mml:mrow><mml:mover><mml:mi>e</mml:mi><mml:mo stretchy="false">&#x005E;</mml:mo></mml:mover></mml:mrow><mml:mi>g</mml:mi></mml:msub></mml:math>
</inline-formula> denotes unit vector directing to the center of earth. <inline-formula id="ieqn-13">
<mml:math id="mml-ieqn-13"><mml:mi>u</mml:mi><mml:msub><mml:mrow><mml:mover><mml:mi>e</mml:mi><mml:mo stretchy="false">&#x005E;</mml:mo></mml:mover></mml:mrow><mml:mi>w</mml:mi></mml:msub></mml:math>
</inline-formula> Represents extended A element, let <italic>u</italic> denotes constant drift and <inline-formula id="ieqn-14">
<mml:math id="mml-ieqn-14"><mml:msub><mml:mrow><mml:mover><mml:mi>e</mml:mi><mml:mo stretchy="false">&#x005E;</mml:mo></mml:mover></mml:mrow><mml:mi>w</mml:mi></mml:msub></mml:math>
</inline-formula> indicates unit vector directing in the wind direction. <italic>d</italic><sub><italic>ij</italic></sub> denotes distance among the <italic>i</italic> &#x0026; <italic>j</italic> grasshopper and estimated by [<xref ref-type="bibr" rid="ref-22">22</xref>]:<disp-formula id="ueqn-1">
<mml:math id="mml-ueqn-1" display="block"><mml:msub><mml:mi>d</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mo fence="false" stretchy="false">|</mml:mo><mml:mrow><mml:msub><mml:mi>x</mml:mi><mml:mi>j</mml:mi></mml:msub><mml:mo>&#x2212;</mml:mo><mml:msub><mml:mi>x</mml:mi><mml:mi>j</mml:mi></mml:msub></mml:mrow><mml:mo fence="false" stretchy="false">|</mml:mo><mml:mo>.</mml:mo></mml:math>
</disp-formula></p>
<p>Since grasshoppers rapidly detect comfortable zone and show poor convergence, the impacts of wind and gravity are far weaker compared to the relationship among grasshoppers, means numerical module must be altered by:<disp-formula id="eqn-5"><label>(5)</label>
<mml:math id="mml-eqn-5" display="block"><mml:msub><mml:mi>x</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>=</mml:mo><mml:mi>c</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:munderover><mml:mrow><mml:mo movablelimits="false">&#x2211;</mml:mo></mml:mrow><mml:mrow><mml:mi>j</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mi>j</mml:mi><mml:mo>&#x2260;</mml:mo><mml:mi>i</mml:mi></mml:mrow><mml:mi>N</mml:mi></mml:munderover><mml:mo>&#x2061;</mml:mo><mml:mi>c</mml:mi><mml:mstyle displaystyle="true" scriptlevel="0"><mml:mrow><mml:mfrac><mml:mrow><mml:mrow><mml:mi mathvariant="normal">u</mml:mi><mml:mi mathvariant="normal">b</mml:mi></mml:mrow><mml:mo>&#x2212;</mml:mo><mml:mrow><mml:mi mathvariant="normal">l</mml:mi><mml:mi mathvariant="normal">b</mml:mi></mml:mrow></mml:mrow><mml:mn>2</mml:mn></mml:mfrac></mml:mrow><mml:mi>s</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mo fence="false" stretchy="false">|</mml:mo><mml:mrow><mml:msub><mml:mi>x</mml:mi><mml:mi>j</mml:mi></mml:msub><mml:mo>&#x2212;</mml:mo><mml:msub><mml:mi>x</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow><mml:mo fence="false" stretchy="false">|</mml:mo></mml:mrow><mml:mo stretchy="false">)</mml:mo><mml:mstyle displaystyle="true" scriptlevel="0"><mml:mrow><mml:mfrac><mml:mrow><mml:msub><mml:mi>x</mml:mi><mml:mi>j</mml:mi></mml:msub><mml:mo>&#x2212;</mml:mo><mml:msub><mml:mi>x</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow><mml:mrow><mml:msub><mml:mi>d</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:mfrac></mml:mrow></mml:mstyle></mml:mstyle></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>+</mml:mo><mml:msub><mml:mrow><mml:mover><mml:mi>T</mml:mi><mml:mo stretchy="false">&#x005E;</mml:mo></mml:mover></mml:mrow><mml:mi>d</mml:mi></mml:msub><mml:mo>,</mml:mo><mml:mspace width="thickmathspace" /></mml:math>
</disp-formula></p>
<p>Whereas <italic>ub</italic> &#x0026; <italic>lb</italic> represents upper &#x0026; lower boundaries of the search space, <italic>T</italic><sub><italic>d</italic></sub> indicates value comparative to the target (optimal solution establish until now), and <italic>c</italic> denotes reducing coefficient which balance the process of explorations &#x0026; exploitations can be denoted by:<disp-formula id="eqn-6"><label>(6)</label>
<mml:math id="mml-eqn-6" display="block"><mml:mi>c</mml:mi><mml:mo>=</mml:mo><mml:msub><mml:mi>c</mml:mi><mml:mrow><mml:mrow><mml:mi mathvariant="normal">m</mml:mi><mml:mi mathvariant="normal">a</mml:mi><mml:mi mathvariant="normal">x</mml:mi></mml:mrow></mml:mrow></mml:msub><mml:mo>&#x2212;</mml:mo><mml:mi>i</mml:mi><mml:mi>t</mml:mi><mml:mi>e</mml:mi><mml:mi>r</mml:mi><mml:mspace width="thickmathspace" /><mml:mstyle displaystyle="true" scriptlevel="0"><mml:mrow><mml:mfrac><mml:mrow><mml:msub><mml:mi>c</mml:mi><mml:mrow><mml:mrow><mml:mi mathvariant="normal">m</mml:mi><mml:mi mathvariant="normal">a</mml:mi><mml:mi mathvariant="normal">x</mml:mi></mml:mrow></mml:mrow></mml:msub><mml:mo>&#x2212;</mml:mo><mml:msub><mml:mi>c</mml:mi><mml:mrow><mml:mrow><mml:mi mathvariant="normal">m</mml:mi><mml:mi mathvariant="normal">i</mml:mi><mml:mi mathvariant="normal">n</mml:mi></mml:mrow></mml:mrow></mml:msub></mml:mrow><mml:mrow><mml:mrow><mml:mi mathvariant="normal">M</mml:mi><mml:mi mathvariant="normal">a</mml:mi></mml:mrow><mml:msub><mml:mrow><mml:mi mathvariant="normal">x</mml:mi></mml:mrow><mml:mrow><mml:mrow><mml:mi mathvariant="normal">i</mml:mi><mml:mi mathvariant="normal">t</mml:mi><mml:mi mathvariant="normal">e</mml:mi><mml:mi mathvariant="normal">r</mml:mi></mml:mrow></mml:mrow></mml:msub></mml:mrow></mml:mfrac></mml:mrow><mml:mo>,</mml:mo><mml:mspace width="thickmathspace" /></mml:mstyle></mml:math>
</disp-formula></p>
<p>Whereas <italic>c</italic><sub>max</sub> denotes maximal value (equivalent to one), <italic>c</italic><sub>min</sub> represents minimal value (equivalent to 0.00001), iter indicates present iteration, and Max<sub>iter</sub> signifies maximal amount of iterations.</p>
<fig id="fig-11">
<graphic mimetype="image" mime-subtype="png" xlink:href="IASC_24687-fig-11.png"/>
</fig>
<p><xref ref-type="fig" rid="fig-3">Fig. 3</xref> demonstrates the flowchart of GOA. In IGOA, to confront the drawback of fundamental GOA, GM and Levy flight are presented to GOA for keeping an appropriate balance among the exploitation &#x0026; exploration. The GM function was derived from Gaussian normal distribution and thier applications to evolution search [<xref ref-type="bibr" rid="ref-23">23</xref>]. This concept was represented by classical evolutionary programming (CEP). It is highly possible for creating a novel offspring nearby the original parent due to its narrow tail. Because of this, the search formula would take small steps permitting all the corners of the search space to be examined well [<xref ref-type="bibr" rid="ref-24">24</xref>&#x2013;<xref ref-type="bibr" rid="ref-26">26</xref>]. Henceforth it is predictable for providing comparatively fast convergence. The Gaussian density operation can be denoted as:<disp-formula id="eqn-7"><label>(7)</label>
<mml:math id="mml-eqn-7" display="block"><mml:msub><mml:mi>f</mml:mi><mml:mrow><mml:mi>g</mml:mi><mml:mi>a</mml:mi><mml:mi>u</mml:mi><mml:mi>s</mml:mi><mml:mi>s</mml:mi><mml:mi>i</mml:mi><mml:mi>a</mml:mi><mml:mi>n</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mn>0</mml:mn><mml:mo>,</mml:mo><mml:msup><mml:mi>&#x03C3;</mml:mi><mml:mn>2</mml:mn></mml:msup></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>&#x03B1;</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:mstyle displaystyle="true" scriptlevel="0"><mml:mrow><mml:mfrac><mml:mn>1</mml:mn><mml:mrow><mml:msqrt><mml:mn>2</mml:mn><mml:mi>&#x03C0;</mml:mi><mml:msup><mml:mi>&#x03C3;</mml:mi><mml:mn>2</mml:mn></mml:msup></mml:msqrt></mml:mrow></mml:mfrac></mml:mrow><mml:msup><mml:mi>e</mml:mi><mml:mrow><mml:mo>&#x2212;</mml:mo><mml:mrow><mml:mfrac><mml:mrow><mml:msup><mml:mi>&#x03B1;</mml:mi><mml:mn>2</mml:mn></mml:msup></mml:mrow><mml:mrow><mml:mn>2</mml:mn><mml:msup><mml:mi>&#x03C3;</mml:mi><mml:mn>2</mml:mn></mml:msup></mml:mrow></mml:mfrac></mml:mrow></mml:mrow></mml:msup></mml:mstyle></mml:math>
</disp-formula></p>
<fig id="fig-3">
<label>Figure 3</label>
<caption>
<title>Flowchart of GOA</title></caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="IASC_24687-fig-3.png"/>
</fig>
<p>Whereas <italic>&#x03C3;</italic><sup>2</sup> denotes difference for every member of the population. This operation is additionally decreased for generating a single <italic>n</italic>-dimension arbitrary parameter by locating the mean value to 0 and SD to one. The arbitrary parameter created is employed for the common formula of metaheuristic method can be denoted by<disp-formula id="eqn-8"><label>(8)</label>
<mml:math id="mml-eqn-8" display="block"><mml:msubsup><mml:mi>X</mml:mi><mml:mi>i</mml:mi><mml:mi>d</mml:mi></mml:msubsup><mml:mo>=</mml:mo><mml:msub><mml:mi>X</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>&#x2295;</mml:mo><mml:mi>G</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>&#x03B1;</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math>
</disp-formula>where <italic>G</italic>(<italic>&#x03B1;</italic>) denotes Gaussian step vector made by Gaussian density function using &#x03B1; as Gaussian arbitrary amount among zero and one.</p>
<p>LF was initially presented by the French mathematician in 1937 called Paul Levy. A varied kind of natural and artificial phenomena are defined based on Levy statistics. The LF is a well-regarded class of stochastic non Gaussian walks that step length value must be distributed regarding Levy stable distribution. It is obtained as:<disp-formula id="eqn-9"><label>(9)</label>
<mml:math id="mml-eqn-9" display="block"><mml:mi>L</mml:mi><mml:mi>e</mml:mi><mml:mi>v</mml:mi><mml:mi>y</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>&#x03B2;</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mspace width="thickmathspace" /><mml:mo>&#x223C;</mml:mo><mml:mi>u</mml:mi><mml:mo>=</mml:mo><mml:msup><mml:mi>t</mml:mi><mml:mrow><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn><mml:mo>&#x2212;</mml:mo><mml:mi>&#x03B2;</mml:mi></mml:mrow></mml:msup><mml:mo>,</mml:mo><mml:mspace width="thickmathspace" /><mml:mspace width="thickmathspace" /><mml:mn>0</mml:mn><mml:mo>&#x003C;</mml:mo><mml:mi>&#x03B2;</mml:mi><mml:mo>&#x2264;</mml:mo><mml:mn>2</mml:mn></mml:math>
</disp-formula></p>
<p><italic>&#x03B2;</italic> denotes significant Levy index for adjusting the stability. The Levy arbitrary amount is estimated using:<disp-formula id="eqn-10"><label>(10)</label>
<mml:math id="mml-eqn-10" display="block"><mml:mi>L</mml:mi><mml:mi>e</mml:mi><mml:mi>v</mml:mi><mml:mi>y</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>&#x03B2;</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>&#x223C;</mml:mo><mml:mstyle displaystyle="true" scriptlevel="0"><mml:mrow><mml:mfrac><mml:mrow><mml:mi>&#x03C6;</mml:mi><mml:mo>&#x00D7;</mml:mo><mml:mi>&#x03BC;</mml:mi></mml:mrow><mml:mrow><mml:msup><mml:mrow><mml:mo fence="false" stretchy="false">|</mml:mo><mml:mrow><mml:mi mathvariant="normal">v</mml:mi></mml:mrow><mml:mo fence="false" stretchy="false">|</mml:mo></mml:mrow><mml:mrow><mml:mn>1</mml:mn><mml:mrow><mml:mo>/</mml:mo></mml:mrow><mml:mi>&#x03B2;</mml:mi></mml:mrow></mml:msup></mml:mrow></mml:mfrac></mml:mrow></mml:mstyle></mml:math>
</disp-formula></p>
<p>Whereas <italic>&#x03BC;</italic> &#x0026; <italic>v</italic> denotes regular distribution, &#x0393; represents normal Gamma function, <italic>&#x03B2;</italic>&#x2009;&#x003D;&#x2009;1.5, &#x0026; &#x03C6; is given by:<disp-formula id="eqn-11"><label>(11)</label>
<mml:math id="mml-eqn-11" display="block"><mml:mi>&#x03C6;</mml:mi><mml:mo>=</mml:mo><mml:msup><mml:mrow><mml:mo>[</mml:mo><mml:mrow><mml:mstyle displaystyle="true" scriptlevel="0"><mml:mrow><mml:mfrac><mml:mrow><mml:mrow><mml:mi mathvariant="normal">&#x0393;</mml:mi></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mn>1</mml:mn><mml:mo>+</mml:mo><mml:mi>&#x03B2;</mml:mi></mml:mrow><mml:mo stretchy="false">)</mml:mo><mml:mo>&#x00D7;</mml:mo><mml:mi>sin</mml:mi><mml:mo>&#x2061;</mml:mo><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mi>&#x03C0;</mml:mi><mml:mo>&#x00D7;</mml:mo><mml:mstyle displaystyle="true" scriptlevel="0"><mml:mrow><mml:mfrac><mml:mi>&#x03B2;</mml:mi><mml:mn>2</mml:mn></mml:mfrac></mml:mrow></mml:mstyle></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:mrow><mml:mrow><mml:mrow><mml:mi mathvariant="normal">&#x0393;</mml:mi></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mstyle displaystyle="true" scriptlevel="0"><mml:mrow><mml:mfrac><mml:mrow><mml:mn>1</mml:mn><mml:mo>+</mml:mo><mml:mi>&#x03B2;</mml:mi></mml:mrow><mml:mn>2</mml:mn></mml:mfrac></mml:mrow></mml:mstyle></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>&#x00D7;</mml:mo><mml:mi>&#x03B2;</mml:mi><mml:mo>&#x00D7;</mml:mo><mml:msup><mml:mn>2</mml:mn><mml:mrow><mml:mrow><mml:mfrac><mml:mrow><mml:mi>&#x03B2;</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mn>2</mml:mn></mml:mfrac></mml:mrow></mml:mrow></mml:msup></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mspace width="thickmathspace" /></mml:mrow></mml:mfrac></mml:mrow></mml:mstyle></mml:mrow><mml:mo>]</mml:mo></mml:mrow><mml:mrow><mml:mrow><mml:mfrac><mml:mn>1</mml:mn><mml:mi>&#x03B2;</mml:mi></mml:mfrac></mml:mrow></mml:mrow></mml:msup><mml:mo>.</mml:mo></mml:math>
</disp-formula></p>
<p>For obtaining a tradeoff among the exploitation and exploration abilities of metaheuristic method, LF method is utilized for updating search agent location that can be given by:<disp-formula id="eqn-12"><label>(12)</label>
<mml:math id="mml-eqn-12" display="block"><mml:msubsup><mml:mi>X</mml:mi><mml:mi>i</mml:mi><mml:mrow><mml:mi>l</mml:mi><mml:mi>e</mml:mi><mml:mrow><mml:mi mathvariant="normal">v</mml:mi></mml:mrow><mml:mi>y</mml:mi></mml:mrow></mml:msubsup><mml:mo>=</mml:mo><mml:msub><mml:mi>X</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>+</mml:mo><mml:mi>r</mml:mi><mml:mo>&#x2295;</mml:mo><mml:mi>l</mml:mi><mml:mi>e</mml:mi><mml:mi>v</mml:mi><mml:mi>y</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>&#x03B2;</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math>
</disp-formula>where <inline-formula id="ieqn-15">
<mml:math id="mml-ieqn-15"><mml:msubsup><mml:mi>X</mml:mi><mml:mi>i</mml:mi><mml:mrow><mml:mi>l</mml:mi><mml:mi>e</mml:mi><mml:mrow><mml:mi mathvariant="normal">v</mml:mi></mml:mrow><mml:mi>y</mml:mi></mml:mrow></mml:msubsup></mml:math>
</inline-formula> denotes novel location of <italic>i</italic>th search agent <italic>X</italic><sub><italic>i</italic></sub> afterward upgrading and <italic>r</italic> denotes random vector in zero and one <inline-formula id="ieqn-16">
<mml:math id="mml-ieqn-16"><mml:mo>&#x2295;</mml:mo></mml:math>
</inline-formula> indicates dot product (entry wise multiplication).</p>
<p>As mentioned, the range of search agents is critical for metaheuristic method, since diversity provides the population a robust search ability to global optimal. In IGOA, GM method has been applied for increasing the range of GOA population. The altered numerical module is introduced by:<disp-formula id="eqn-13"><label>(13)</label>
<mml:math id="mml-eqn-13" display="block"><mml:msubsup><mml:mi>X</mml:mi><mml:mi>i</mml:mi><mml:mi>d</mml:mi></mml:msubsup><mml:mo>=</mml:mo><mml:mi>c</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:munderover><mml:mrow><mml:mo movablelimits="false">&#x2211;</mml:mo></mml:mrow><mml:mrow><mml:mtable rowspacing="4pt" columnspacing="1em"><mml:mtr><mml:mtd><mml:mrow><mml:mi>j</mml:mi><mml:mo>=</mml:mo><mml:mi>i</mml:mi></mml:mrow></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mrow><mml:mi>j</mml:mi><mml:mo>&#x2260;</mml:mo><mml:mi>i</mml:mi></mml:mrow></mml:mtd></mml:mtr></mml:mtable></mml:mrow><mml:mi>N</mml:mi></mml:munderover><mml:mo>&#x2061;</mml:mo><mml:mi>c</mml:mi><mml:mstyle displaystyle="true" scriptlevel="0"><mml:mrow><mml:mfrac><mml:mrow><mml:mi>u</mml:mi><mml:msub><mml:mi>b</mml:mi><mml:mi>d</mml:mi></mml:msub><mml:mo>&#x2212;</mml:mo><mml:mi>l</mml:mi><mml:msub><mml:mi>b</mml:mi><mml:mi>d</mml:mi></mml:msub></mml:mrow><mml:mn>2</mml:mn></mml:mfrac></mml:mrow><mml:mi>s</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mo fence="false" stretchy="false">|</mml:mo><mml:mrow><mml:msubsup><mml:mi>x</mml:mi><mml:mi>j</mml:mi><mml:mi>d</mml:mi></mml:msubsup><mml:mo>&#x2212;</mml:mo><mml:msubsup><mml:mi>x</mml:mi><mml:mi>i</mml:mi><mml:mi>d</mml:mi></mml:msubsup></mml:mrow><mml:mo fence="false" stretchy="false">|</mml:mo></mml:mrow><mml:mo stretchy="false">)</mml:mo><mml:mstyle displaystyle="true" scriptlevel="0"><mml:mrow><mml:mfrac><mml:mrow><mml:msub><mml:mi>x</mml:mi><mml:mi>j</mml:mi></mml:msub><mml:mo>&#x2212;</mml:mo><mml:msub><mml:mi>x</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow><mml:mrow><mml:msub><mml:mi>d</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:mfrac></mml:mrow></mml:mstyle></mml:mstyle></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>&#x2295;</mml:mo><mml:mi>G</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>&#x03B1;</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>+</mml:mo><mml:mrow><mml:mover><mml:mrow><mml:msub><mml:mi>T</mml:mi><mml:mi>d</mml:mi></mml:msub></mml:mrow><mml:mo>&#x005E;</mml:mo></mml:mover></mml:mrow><mml:mo>.</mml:mo></mml:math>
</disp-formula></p>
<p>Afterward the location of <italic>i</italic>th grasshopper <italic>X</italic><sub>i</sub> is upgraded, Levy flight method would be adapted for generating a novel candidate solution that can be given by:<disp-formula id="eqn-14"><label>(14)</label>
<mml:math id="mml-eqn-14" display="block"><mml:msubsup><mml:mrow><mml:mi mathvariant="normal">X</mml:mi></mml:mrow><mml:mi>i</mml:mi><mml:mrow><mml:mi>l</mml:mi><mml:mi>e</mml:mi><mml:mrow><mml:mi mathvariant="normal">v</mml:mi></mml:mrow><mml:mi>y</mml:mi></mml:mrow></mml:msubsup><mml:mo>=</mml:mo><mml:msubsup><mml:mrow><mml:mi mathvariant="normal">X</mml:mi></mml:mrow><mml:mi>i</mml:mi><mml:mrow><mml:mo>&#x2217;</mml:mo></mml:mrow></mml:msubsup><mml:mo>+</mml:mo><mml:mi>r</mml:mi><mml:mi>a</mml:mi><mml:mi>n</mml:mi><mml:mi>d</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>d</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>&#x2295;</mml:mo><mml:mi>l</mml:mi><mml:mi>e</mml:mi><mml:mi>v</mml:mi><mml:mi>y</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>&#x03B2;</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math>
</disp-formula><disp-formula id="eqn-15"><label>(15)</label>
<mml:math id="mml-eqn-15" display="block"><mml:msubsup><mml:mrow><mml:mi mathvariant="normal">X</mml:mi></mml:mrow><mml:mi>i</mml:mi><mml:mrow><mml:mi>t</mml:mi><mml:mo>+</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msubsup><mml:mo>=</mml:mo><mml:mrow><mml:mo>{</mml:mo><mml:mrow><mml:mtable rowspacing="4pt" columnspacing="1em"><mml:mtr><mml:mtd columnalign="left"><mml:mrow><mml:msubsup><mml:mrow><mml:mi mathvariant="normal">X</mml:mi></mml:mrow><mml:mi>i</mml:mi><mml:mrow><mml:mi>l</mml:mi><mml:mi>e</mml:mi><mml:mrow><mml:mi mathvariant="normal">v</mml:mi></mml:mrow><mml:mi>y</mml:mi></mml:mrow></mml:msubsup><mml:mi>f</mml:mi><mml:mi>i</mml:mi><mml:mi>t</mml:mi><mml:mi>n</mml:mi><mml:mi>e</mml:mi><mml:mi>s</mml:mi><mml:mi>s</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:msubsup><mml:mrow><mml:mi mathvariant="normal">X</mml:mi></mml:mrow><mml:mi>i</mml:mi><mml:mrow><mml:mi>l</mml:mi><mml:mi>e</mml:mi><mml:mrow><mml:mi mathvariant="normal">v</mml:mi></mml:mrow><mml:mi>y</mml:mi></mml:mrow></mml:msubsup></mml:mrow><mml:mo stretchy="false">)</mml:mo><mml:mo>&#x003E;</mml:mo><mml:mi>f</mml:mi><mml:mi>i</mml:mi><mml:mi>t</mml:mi><mml:mi>n</mml:mi><mml:mi>e</mml:mi><mml:mi>s</mml:mi><mml:mi>s</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:msubsup><mml:mrow><mml:mi mathvariant="normal">X</mml:mi></mml:mrow><mml:mi>i</mml:mi><mml:mrow><mml:mo>&#x2217;</mml:mo></mml:mrow></mml:msubsup></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:mtd></mml:mtr><mml:mtr><mml:mtd columnalign="left"><mml:mrow><mml:msubsup><mml:mrow><mml:mi mathvariant="normal">X</mml:mi></mml:mrow><mml:mi>i</mml:mi><mml:mrow><mml:mo>&#x2217;</mml:mo></mml:mrow></mml:msubsup><mml:mi>o</mml:mi><mml:mi>t</mml:mi><mml:mi>h</mml:mi><mml:mi>e</mml:mi><mml:mi>r</mml:mi><mml:mi>w</mml:mi><mml:mi>i</mml:mi><mml:mi>s</mml:mi><mml:mi>e</mml:mi></mml:mrow></mml:mtd></mml:mtr></mml:mtable></mml:mrow><mml:mo fence="true" stretchy="true" symmetric="true"></mml:mo></mml:mrow></mml:math>
</disp-formula></p>
<p>whereas <inline-formula id="ieqn-17">
<mml:math id="mml-ieqn-17"><mml:msubsup><mml:mrow><mml:mi mathvariant="normal">X</mml:mi></mml:mrow><mml:mi>i</mml:mi><mml:mrow><mml:mo>&#x2217;</mml:mo></mml:mrow></mml:msubsup></mml:math>
</inline-formula> denotes novel location of ith grasshopper afterward upgrading and <italic>rand</italic>(<italic>d</italic>) denotes d-dimension arbitrary vector is zero and one. Since Levy flight is an arbitrary procedure where the jump size follows the Levy likelihood distribution functions, the novel candidate solution is made using Levy flight method is a higher likelihood of jumping beyond local optimal and attains optimum solutions. For ensuring the population quality, search agents using high fitness would be retained in the population.</p>
</sec>
</sec>
<sec id="s4">
<label>4</label>
<title>Performance Validation</title>
<p>Authors are required to adhere to this Microsoft Word template in preparing their manuscripts for submission. It will speed up the review and typesetting process. This section validates the performance of the proposed IGOA-PHE technique with other techniques in terms of different measures.</p>
<p><xref ref-type="table" rid="table-1">Tab. 1</xref> and <xref ref-type="fig" rid="fig-4">Fig. 4</xref> investigates the encryption time analysis of the IGOA-PHE technique with other encryption algorithms. The experimental outcomes demonstrated that the AES and RSA techniques have accomplished poor outcomes with the higher encryption time of 329 and 338 ms. At the same time, the ECC and Blowfish-ODHO techniques have gained slightly reduced encryption time of 276 and 258&#x2005;ms respectively. But the IGOA-PHE technique has required a minimum encryption time of 243&#x2005;ms. Key similarity analysis of the proposed IGOA-PHE technique with other encryption algorithms under different attacks is provided in <xref ref-type="table" rid="table-2">Tab. 2</xref> and <xref ref-type="fig" rid="fig-5">Fig. 5</xref>. The resultant values demonstrated that the IGOA-PHE technique has showcased effective outcomes under all different types of attacks. Under the presence of DoS attack, the IGOA-PHE technique has accomplished a lower key similarity of 11.06&#x0025; whereas the AES, RSA, ECC, and Blowfish-ODHO techniques have obtained a higher key similarity of 25.58&#x0025;, 22.54&#x0025;, 19.35&#x0025;, and 12.21&#x0025; respectively.</p>
<fig id="fig-4">
<label>Figure 4</label>
<caption>
<title>Encryption time analysis of IGOA-PHE model</title></caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="IASC_24687-fig-4.png"/>
</fig>
<fig id="fig-5">
<label>Figure 5</label>
<caption>
<title>Similarity analysis of IGOA-PHE model</title></caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="IASC_24687-fig-5.png"/>
</fig>
<table-wrap id="table-1"><label>Table 1</label>
<caption>
<title>Result analysis of encryption time</title></caption>
<table><colgroup><col align="left"/><col align="left"/>
</colgroup>
<thead>
<tr>
<th align="left">Algorithms</th>
<th align="left">Encryption time (ms)</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left">AES</td>
<td align="left">329</td>
</tr>
<tr>
<td align="left">RSA</td>
<td align="left">338</td>
</tr>
<tr>
<td align="left">ECC</td>
<td align="left">276</td>
</tr>
<tr>
<td align="left">Blowfish-ODHO</td>
<td align="left">258</td>
</tr>
<tr>
<td align="left">IGOA-PHE</td>
<td align="left">243</td>
</tr>
</tbody>
</table>
</table-wrap>
<table-wrap id="table-2"><label>Table 2</label>
<caption>
<title>Result analysis of key similarity analysis</title></caption>
<table><colgroup><col align="left"/><col align="left"/><col align="left"/><col align="left"/><col align="left"/>
</colgroup>
<thead>
<tr>
<th align="left" rowspan="2">Algorithms</th>
<th align="center" colspan="4">Similarity (in &#x0025;)</th>
</tr>
<tr>
<th align="left">DOS attack</th>
<th align="left">Sybil attack</th>
<th align="left">Brute force attack</th>
<th align="left">MIM attack</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left">AES</td>
<td align="left">25.58</td>
<td align="left">23.44</td>
<td align="left">23.16</td>
<td align="left">25.18</td>
</tr>
<tr>
<td align="left">RSA</td>
<td align="left">22.54</td>
<td align="left">21.65</td>
<td align="left">21.34</td>
<td align="left">22.84</td>
</tr>
<tr>
<td align="left">ECC</td>
<td align="left">19.35</td>
<td align="left">18.46</td>
<td align="left">19.98</td>
<td align="left">19.65</td>
</tr>
<tr>
<td align="left">Blowfish-ODHO</td>
<td align="left">12.21</td>
<td align="left">13.32</td>
<td align="left">13.43</td>
<td align="left">14.06</td>
</tr>
<tr>
<td align="left">IGOA-PHE</td>
<td align="left">11.06</td>
<td align="left">11.98</td>
<td align="left">12.21</td>
<td align="left">12.86</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>In addition, under the presence of Sybil attack, the IGOA-PHE approach has accomplished a lesser key similarity of 11.98&#x0025; whereas the AES, RSA, ECC, and Blowfish-ODHO methods have gained a maximum key similarity of 23.44&#x0025;, 21.65&#x0025;, 18.46&#x0025;, and 13.32&#x0025; correspondingly. Eventually, under the presence of Brute force attack, the IGOA-PHE manner has accomplished a minimum key similarity of 12.21&#x0025; whereas the AES, RSA, ECC, and Blowfish-ODHO algorithms have obtained a higher key similarity of 23.16&#x0025;, 22.34&#x0025;, 19.98&#x0025;, and 13.43&#x0025; correspondingly. Meanwhile, under the presence of MIM attack, the IGOA-PHE technique has accomplished a minimal key similarity of 12.86&#x0025; whereas the AES, RSA, ECC, and Blowfish-ODHO methodologies have attained a superior key similarity of 25.18&#x0025;, 22.84&#x0025;, 19.65&#x0025;, and 14.06&#x0025; correspondingly.</p>
<p><xref ref-type="table" rid="table-3">Tab. 3</xref> and <xref ref-type="fig" rid="fig-6">Fig. 6</xref> portrays the throughput analysis of the proposed IGOA-PHE technique under varying vehicle speed. The experimental results showcased that the IGOA-PHE technique has gained effective outcome over the other techniques with the maximum throughput values. For instance, under the vehicle speed of 50&#x2005;km/h, the IGOA-PHE technique has achieved a higher throughput of 91646 kbps whereas the SSVC, BPAP, UMBP, and Blowfish-ODHO techniques have attained a reduced throughput of 90542, 84914, 86053, and 91325 kbps respectively. Besides, under the vehicle speed of 70&#x2005;km/h, the IGOA-PHE approach has attained a superior throughput of 90862 kbps whereas the SSVC, BPAP, UMBP, and Blowfish-ODHO manners have gained a lower throughput of 90791, 85982, 86089, and 90328&#x2005;kbps correspondingly. Moreover, under the vehicle speed of 100&#x2005;km/h, the IGOA-PHE method has achieved a superior throughput of 90079 kbps whereas the SSVC, BPAP, UMBP, and Blowfish-ODHO approaches have obtained a minimum throughput of 89402, 83881, 86801, and 89509&#x2005;kbps correspondingly.</p>
<fig id="fig-6">
<label>Figure 6</label>
<caption>
<title>Throughput analysis of IGOA-PHE model</title></caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="IASC_24687-fig-6.png"/>
</fig>
<table-wrap id="table-3"><label>Table 3</label>
<caption>
<title>Result analysis of IGOA-PHE model in terms of throughput</title></caption>
<table><colgroup><col align="left"/><col align="left"/><col align="left"/><col align="left"/><col align="left"/><col align="left"/>
</colgroup>
<thead>
<tr>
<th align="left" colspan="6">Throughput (kbps)</th>
</tr>
<tr>
<th align="left">Vehicle speed (km/h)</th>
<th align="left">SSVC</th>
<th align="left">BPAP</th>
<th align="left">UMBP</th>
<th align="left">Blowfish-ODHO</th>
<th align="left">IGOA-PHE</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left">50</td>
<td align="left">90542</td>
<td align="left">84914</td>
<td align="left">86053</td>
<td align="left">91325</td>
<td align="left">91646</td>
</tr>
<tr>
<td align="left">60</td>
<td align="left">89829</td>
<td align="left">88155</td>
<td align="left">84807</td>
<td align="left">90791</td>
<td align="left">91076</td>
</tr>
<tr>
<td align="left">70</td>
<td align="left">90791</td>
<td align="left">85982</td>
<td align="left">86089</td>
<td align="left">90328</td>
<td align="left">90862</td>
</tr>
<tr>
<td align="left">80</td>
<td align="left">89936</td>
<td align="left">85733</td>
<td align="left">86125</td>
<td align="left">89616</td>
<td align="left">90364</td>
</tr>
<tr>
<td align="left">90</td>
<td align="left">89473</td>
<td align="left">88119</td>
<td align="left">84807</td>
<td align="left">89936</td>
<td align="left">90506</td>
</tr>
<tr>
<td align="left">100</td>
<td align="left">89402</td>
<td align="left">83881</td>
<td align="left">86801</td>
<td align="left">89509</td>
<td align="left">90079</td>
</tr>
</tbody>
</table>
</table-wrap>
<p><xref ref-type="table" rid="table-4">Tab. 4</xref> and <xref ref-type="fig" rid="fig-7">Fig. 7</xref> demonstrates the RCO analysis of the IGOA-PHE technique over the other methods under different vehicle speed. The experimental results highlighted that the IGOA-PHE technique has accomplished superior results with the lower RCO under distinct vehicle speed. For instance, with the vehicle speed of 50&#x2005;km/hr, the IGOA-PHE technique has showcased a lower RCO of 11.102&#x0025; whereas the SSVC, BPAP, UMBP, and Blowfish-ODHO techniques have obtained a higher RCO of 16.031&#x0025;, 35.215&#x0025;, 23.491&#x0025;, and 12.700&#x0025; respectively. Additionally, with the vehicle speed of 70&#x2005;km/hr, the IGOA-PHE method has outperformed a minimal RCO of 16.164&#x0025; whereas the SSVC, BPAP, UMBP, and Blowfish-ODHO manners have achieved a maximal RCO of 23.092&#x0025;, 42.942&#x0025;, 31.618&#x0025;, and 18.829&#x0025; correspondingly. Concurrently, with the vehicle speed of 100&#x2005;km/hr, the IGOA-PHE technique has demonstrated a lesser RCO of 25.223&#x0025; whereas the SSVC, BPAP, UMBP, and Blowfish-ODHO methodologies have attained a superior RCO of 34.283&#x0025;, 49.870&#x0025;, 40.011&#x0025;, and 28.954&#x0025; correspondingly.</p>
<fig id="fig-7">
<label>Figure 7</label>
<caption>
<title>Routing control overhead analysis of IGOA-PHE model</title></caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="IASC_24687-fig-7.png"/>
</fig>
<table-wrap id="table-4"><label>Table 4</label>
<caption>
<title>Result analysis of IGOA-PHE model with different vehicle speed</title></caption>
<table><colgroup><col align="left"/><col align="left"/><col align="left"/><col align="left"/><col align="left"/><col align="left"/>
</colgroup>
<thead>
<tr>
<th align="left" colspan="6">Routing control overhead (&#x0025;)</th>
</tr>
<tr>
<th align="left">Vehicle speed (km/h)</th>
<th align="left">SSVC</th>
<th align="left">BPAP</th>
<th align="left">UMBP</th>
<th align="left">Blowfish-ODHO</th>
<th align="left">IGOA-PHE</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left">50</td>
<td align="left">16.031</td>
<td align="left">35.215</td>
<td align="left">23.491</td>
<td align="left">12.700</td>
<td align="left">11.102</td>
</tr>
<tr>
<td align="left">60</td>
<td align="left">19.628</td>
<td align="left">39.878</td>
<td align="left">26.556</td>
<td align="left">14.565</td>
<td align="left">13.100</td>
</tr>
<tr>
<td align="left">70</td>
<td align="left">23.092</td>
<td align="left">42.942</td>
<td align="left">31.618</td>
<td align="left">18.829</td>
<td align="left">16.164</td>
</tr>
<tr>
<td align="left">80</td>
<td align="left">26.556</td>
<td align="left">45.074</td>
<td align="left">34.682</td>
<td align="left">21.759</td>
<td align="left">19.228</td>
</tr>
<tr>
<td align="left">90</td>
<td align="left">30.019</td>
<td align="left">47.072</td>
<td align="left">36.681</td>
<td align="left">25.090</td>
<td align="left">22.292</td>
</tr>
<tr>
<td align="left">100</td>
<td align="left">34.283</td>
<td align="left">49.870</td>
<td align="left">40.011</td>
<td align="left">28.954</td>
<td align="left">25.223</td>
</tr>
</tbody>
</table>
</table-wrap>
<p><xref ref-type="table" rid="table-5">Tab. 5</xref> and <xref ref-type="fig" rid="fig-8">Fig. 8</xref> showcase the transmission delay analysis of the IGOA-PHE approach over the other techniques under various vehicle speeds. The experimental outcomes exhibited that the IGOA-PHE method has accomplished maximal results with the lesser transmission delay under various vehicle speeds. For sample, with the vehicle speed of 50&#x2005;km/hr, the IGOA-PHE algorithm has depicted a lower transmission delay of 121.297&#x2005;ms whereas the SSVC, BPAP, UMBP, and Blowfish-ODHO methodologies have attained a superior transmission delay of 197.842, 601.681, 279.665, and 150.331&#x2005;ms correspondingly. Also, with the vehicle speed of 70 km/hr, the IGOA-PHE manner has demonstrated a lower transmission delay of 145.052&#x2005;ms whereas the SSVC, BPAP, UMBP, and Blowfish-ODHO techniques have obtained a maximum transmission delay of 261.189, 694.063, 340.373, and 171.447&#x2005;ms respectively. Simultaneously, with the vehicle speed of 100&#x2005;km/hr, the IGOA-PHE methodology has showcased a lower transmission delay of 176.726&#x2005;ms whereas the SSVC, BPAP, UMBP, and Blowfish-ODHO techniques have obtained a superior transmission delay of 348.292, 892.023, 416.918, and 216.318&#x2005;ms correspondingly.</p>
<fig id="fig-8">
<label>Figure 8</label>
<caption>
<title>Transmission delay analysis of IGOA-PHE model</title></caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="IASC_24687-fig-8.png"/>
</fig>
<table-wrap id="table-5"><label>Table 5</label>
<caption>
<title>Result analysis of IGOA-PHE model in terms of transmission delay</title></caption>
<table><colgroup><col align="left"/><col align="left"/><col align="left"/><col align="left"/><col align="left"/><col align="left"/>
</colgroup>
<thead>
<tr>
<th align="left" colspan="6">Transmission delay (ms)</th>
</tr>
<tr>
<th align="left">Vehicle speed (km/h)</th>
<th align="left">SSVC</th>
<th align="left">BPAP</th>
<th align="left">UMBP</th>
<th align="left">Blowfish-ODHO</th>
<th align="left">IGOA-PHE</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left">50</td>
<td align="left">197.842</td>
<td align="left">601.681</td>
<td align="left">279.665</td>
<td align="left">150.331</td>
<td align="left">121.297</td>
</tr>
<tr>
<td align="left">60</td>
<td align="left">221.597</td>
<td align="left">646.552</td>
<td align="left">292.863</td>
<td align="left">150.331</td>
<td align="left">131.855</td>
</tr>
<tr>
<td align="left">70</td>
<td align="left">261.189</td>
<td align="left">694.063</td>
<td align="left">340.373</td>
<td align="left">171.447</td>
<td align="left">145.052</td>
</tr>
<tr>
<td align="left">80</td>
<td align="left">300.781</td>
<td align="left">791.723</td>
<td align="left">372.047</td>
<td align="left">176.726</td>
<td align="left">145.052</td>
</tr>
<tr>
<td align="left">90</td>
<td align="left">313.978</td>
<td align="left">841.873</td>
<td align="left">395.802</td>
<td align="left">205.760</td>
<td align="left">163.528</td>
</tr>
<tr>
<td align="left">100</td>
<td align="left">348.292</td>
<td align="left">892.023</td>
<td align="left">416.918</td>
<td align="left">216.318</td>
<td align="left">176.726</td>
</tr>
</tbody>
</table>
</table-wrap>
<p><xref ref-type="table" rid="table-6">Tab. 6</xref> and <xref ref-type="fig" rid="fig-9">Fig. 9</xref> exhibits the KCT analysis of the IGOA-PHE approach over the other algorithms under distinct key sizes. The experimental results highlighted that the IGOA-PHE technique has accomplished superior results with the lower KCT under distinct key size. For instance, with the key size of 64bits, the IGOA-PHE technique has showcased a lower KCT of 1111.06&#x2005;ms whereas the SSVC, BPAP, UMBP, and Blowfish-ODHO techniques have attained a higher KCT of 1975.19, 2787.27, 2995.50, and 1267.23&#x2005;ms correspondingly. Moreover, with the key size of 256 bits, the IGOA-PHE scheme has showcased a minimum KCT of 1506.69&#x2005;ms whereas the SSVC, BPAP, UMBP, and Blowfish-ODHO techniques have gained a higher KCT of 2662.34, 3495.24, 3870.04, and 1694.09&#x2005;ms correspondingly. At the same time, with the key size of 512 bits, the IGOA-PHE manner has outperformed a lower KCT of 1714.91&#x2005;ms whereas the SSVC, BPAP, UMBP, and Blowfish-ODHO methodologies have obtained a maximum KCT of 2974.68, 3849.22, 4182.38, and 1975.19&#x2005;ms respectively.</p>
<fig id="fig-9">
<label>Figure 9</label>
<caption>
<title>Key computation time analysis of IGOA-PHE model</title></caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="IASC_24687-fig-9.png"/>
</fig>
<table-wrap id="table-6"><label>Table 6</label>
<caption>
<title>Result analysis of IGOA-PHE model in terms of KCT and KRT under different key sizes</title></caption>
<table><colgroup><col align="left"/><col align="left"/><col align="left"/><col align="left"/><col align="left"/><col align="left"/>
</colgroup>
<thead>
<tr>
<th align="left" colspan="6">Key computation time (KCT) (ms)</th>
</tr>
<tr>
<th align="left">Key size (bits)</th>
<th align="left">SSVC</th>
<th align="left">BPAP</th>
<th align="left">UMBP</th>
<th align="left">Blowfish-ODHO</th>
<th align="left">IGOA-PHE</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left"><bold>64</bold></td>
<td align="left">1975.19</td>
<td align="left">2787.27</td>
<td align="left">2995.50</td>
<td align="left">1267.23</td>
<td align="left">1111.06</td>
</tr>
<tr>
<td align="left"><bold>128</bold></td>
<td align="left">2266.71</td>
<td align="left">3172.49</td>
<td align="left">3474.42</td>
<td align="left">1465.04</td>
<td align="left">1267.23</td>
</tr>
<tr>
<td align="left"><bold>256</bold></td>
<td align="left">2662.34</td>
<td align="left">3495.24</td>
<td align="left">3870.04</td>
<td align="left">1694.09</td>
<td align="left">1506.69</td>
</tr>
<tr>
<td align="left"><bold>512</bold></td>
<td align="left">2974.68</td>
<td align="left">3849.22</td>
<td align="left">4182.38</td>
<td align="left">1975.19</td>
<td align="left">1714.91</td>
</tr>
<tr>
<td align="left" colspan="6">Key recovery time (KRT) (ms)</td>
</tr>
<tr>
<td align="left">Key size (bits)</td>
<td align="left">SSVC</td>
<td align="left">BPAP</td>
<td align="left">UMBP</td>
<td align="left">Blowfish-ODHO</td>
<td align="left">IGOA-PHE</td>
</tr>
<tr>
<td align="left"><bold>64</bold></td>
<td align="left">0.821</td>
<td align="left">1.099</td>
<td align="left">1.222</td>
<td align="left">0.659</td>
<td align="left">0.628</td>
</tr>
<tr>
<td align="left"><bold>128</bold></td>
<td align="left">0.976</td>
<td align="left">1.293</td>
<td align="left">1.391</td>
<td align="left">0.730</td>
<td align="left">0.688</td>
</tr>
<tr>
<td align="left"><bold>256</bold></td>
<td align="left">1.068</td>
<td align="left">1.381</td>
<td align="left">1.543</td>
<td align="left">0.849</td>
<td align="left">0.776</td>
</tr>
<tr>
<td align="left"><bold>512</bold></td>
<td align="left">1.244</td>
<td align="left">1.553</td>
<td align="left">1.701</td>
<td align="left">0.934</td>
<td align="left">0.828</td>
</tr>
</tbody>
</table>
</table-wrap>
<p><xref ref-type="fig" rid="fig-10">Fig. 10</xref> defines the KRT analysis of the IGOA-PHE approach over the other techniques under distinct key size. The experimental outcomes outperformed that the IGOA-PHE technique has accomplished maximum results with the lower KRT under distinct key size.</p>
<fig id="fig-10">
<label>Figure 10</label>
<caption>
<title>Key recovery time analysis of IGOA-PHE model</title></caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="IASC_24687-fig-10.png"/>
</fig>
<p>For instance, with the key size of 640 bits, the IGOA-PHE technique has showcased a lower KRT of 0.628&#x2005;ms whereas the SSVC, BPAP, UMBP, and Blowfish-ODHO techniques have gained a superior KRT of 0.821, 1.099, 1.222, and 0.659&#x2005;ms respectively. Additionally, with the key size of 256 bits, the IGOA-PHE method has exhibited a lower KRT of 0.776&#x2005;ms whereas the SSVC, BPAP, UMBP, and Blowfish-ODHO techniques have obtained a higher KRT of 1.068, 1.381, 1.543, and 0.849&#x2005;ms correspondingly. Concurrently, with the key size of 512bits, the IGOA-PHE algorithm has demonstrated a lower KRT of 0.828&#x2005;ms whereas the SSVC, BPAP, UMBP, and Blowfish-ODHO approaches have gained a superior KRT of 1.244, 1.553, 1.701, and 0.934&#x2005;ms correspondingly.</p>
</sec>
<sec id="s5">
<label>5</label>
<title>Conclusion</title>
<p>The purpose of this study is to present a novel IGOA-PHE technique for achieving privacy and security in VANETs. The suggested model begins by encrypting data using the EGPKC technique. Additionally, the IGOA is used to optimise the key selection for the EGPKC approach with the goal of enhancing security performance. The inclusion of Gaussian mutation and Levy flights into the design of IGOA significantly improves the outcomes of the standard IGOA. To evaluate the proposed IGOA-PHE technique&#x0027;s security outcomes, a large number of simulations were run and the results examined using a variety of metrics. The experimental results demonstrated that the IGOA-PHE technique outperformed recent state-of-the-art procedures in a variety of ways. In the future, data aggregation techniques based on steganography can be used to improve network performance and overall security.</p>
</sec>
</body>
<back><fn-group>
<fn fn-type="other">
<p><bold>Funding Statement:</bold> The authors received no specific funding for this study.</p>
</fn>
<fn fn-type="conflict">
<p><bold>Conflicts of Interest:</bold> The authors declare that they have no conflicts of interest to report regarding the present study.</p>
</fn>
</fn-group>
<ref-list content-type="authoryear">
<title>References</title>
<ref id="ref-1"><label>[1]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A. S.</given-names> <surname>Khan</surname></string-name>, <string-name><given-names>K.</given-names> <surname>Balan</surname></string-name>, <string-name><given-names>Y.</given-names> <surname>Javed</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Tarmizi</surname></string-name> and <string-name><given-names>J.</given-names> <surname>Abdullah</surname></string-name></person-group>, &#x201C;<article-title>Secure trust-based blockchain architecture to prevent attacks in VANET</article-title>,&#x201D; <source>Sensors</source>, vol. <volume>19</volume>, no. <issue>22</issue>, pp. <fpage>1</fpage>&#x2013;<lpage>27</lpage>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-2"><label>[2]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>M. R.</given-names> <surname>Ghori</surname></string-name>, <string-name><given-names>K. Z.</given-names> <surname>Zamli</surname></string-name>, <string-name><given-names>N.</given-names> <surname>Quosthoni</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Hisyam</surname></string-name> and <string-name><given-names>M.</given-names> <surname>Montaser</surname></string-name></person-group>, &#x201C;<article-title>Vehicular ad-hoc network (VANET): Review</article-title>,&#x201D; in <conf-name>Proc. of the 2018 IEEE Int. Conf. on Innovative Research and Development (ICIRD)</conf-name>, <conf-loc>Bangkok, Thailand</conf-loc>, pp. <fpage>1</fpage>&#x2013;<lpage>6</lpage>, <year>2018</year>.</mixed-citation></ref>
<ref id="ref-3"><label>[3]</label><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><given-names>S.</given-names> <surname>Gillani</surname></string-name>, <string-name><given-names>F.</given-names> <surname>Shahzad</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Qayyum</surname></string-name> and <string-name><given-names>R.</given-names> <surname>Mehmood</surname></string-name></person-group>, &#x201C;<chapter-title>A survey on security in vehicular ad hoc networks</chapter-title>,&#x201D; in <source>Communication Technologies for Vehicles, Nets4Cars/Nets4Trains 2013</source>, <publisher-loc>Heidelberg/Berlin</publisher-loc>, <publisher-loc>Germany</publisher-loc>: <publisher-name>Springer</publisher-name>, pp. <fpage>59</fpage>&#x2013;<lpage>74</lpage>, <year>2013</year>.</mixed-citation></ref>
<ref id="ref-4"><label>[4]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>I. A.</given-names> <surname>Abbasi</surname></string-name> and <string-name><given-names>A. S.</given-names> <surname>Khan</surname></string-name></person-group>, &#x201C;<article-title>A review of vehicle-to-vehicle communication protocols for VANETs in the urban environment</article-title>,&#x201D; <source>Future Internet</source>, vol. <volume>10</volume>, no. <issue>14</issue>, pp. <fpage>1</fpage>&#x2013;<lpage>18</lpage>, <year>2018</year>.</mixed-citation></ref>
<ref id="ref-5"><label>[5]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>N.</given-names> <surname>Malik</surname></string-name>, <string-name><given-names>P.</given-names> <surname>Nanda</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Arora</surname></string-name>, <string-name><given-names>X.</given-names> <surname>He</surname></string-name> and <string-name><given-names>D.</given-names> <surname>Puthal</surname></string-name></person-group>, &#x201C;<article-title>Blockchain based secured identity authentication and expeditious revocation framework for vehicular networks</article-title>,&#x201D; in <conf-name>Proc. of the 2018 17th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications/12th IEEE Int. Conf. on Big Data Science and Engineering</conf-name>, <conf-loc>New York, NY, USA</conf-loc>, pp. <fpage>674</fpage>&#x2013;<lpage>679</lpage>, <year>2018</year>.</mixed-citation></ref>
<ref id="ref-6"><label>[6]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S.</given-names> <surname>Zeadally</surname></string-name>, <string-name><given-names>R.</given-names> <surname>Hunt</surname></string-name>, <string-name><given-names>Y. S.</given-names> <surname>Chen</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Irwin</surname></string-name> and <string-name><given-names>A.</given-names> <surname>Hassan</surname></string-name></person-group>, &#x201C;<article-title>Vehicular ad hoc networks (VANETS): Status, results, and challenges</article-title>,&#x201D; <source>Telecommunication Systems</source>, vol. <volume>50</volume>, pp. <fpage>217</fpage>&#x2013;<lpage>241</lpage>, <year>2012</year>.</mixed-citation></ref>
<ref id="ref-7"><label>[7]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>B.</given-names> <surname>Alaya</surname></string-name> and <string-name><given-names>L.</given-names> <surname>Sellami</surname></string-name></person-group>, &#x201C;<article-title>Clustering method and symmetric/asymmetric cryptography scheme adapted to securing urban VANET networks</article-title>,&#x201D; <source>Journal of Information Security and Applications</source>, vol. <volume>58</volume>, pp. <fpage>1</fpage>&#x2013;<lpage>8</lpage>, <year>2021</year>.</mixed-citation></ref>
<ref id="ref-8"><label>[8]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S. K.</given-names> <surname>Bhoi</surname></string-name>, <string-name><given-names>P. M.</given-names> <surname>Khillar</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Singh</surname></string-name>, <string-name><given-names>M. M.</given-names> <surname>Sahoo</surname></string-name> and <string-name><given-names>R. R.</given-names> <surname>Swain</surname></string-name></person-group>, &#x201C;<article-title>A routing protocol for urban vehicular ad hoc networks to support non-safety applications</article-title>,&#x201D; <source>Digital Communications Networks</source>, vol. <volume>4</volume>, pp. <fpage>189</fpage>&#x2013;<lpage>199</lpage>, <year>2018</year>.</mixed-citation></ref>
<ref id="ref-9"><label>[9]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S.</given-names> <surname>Zeadally</surname></string-name>, <string-name><given-names>R.</given-names> <surname>Hunt</surname></string-name>, <string-name><given-names>Y. S.</given-names> <surname>Chen</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Irwin</surname></string-name> and <string-name><given-names>A.</given-names> <surname>Hassan</surname></string-name></person-group>, &#x201C;<article-title>Vehicular ad hoc networks (VANETS): Status, results, and challenges</article-title>,&#x201D; <source>Telecommunication System</source>, vol. <volume>50</volume>, pp. <fpage>217</fpage>&#x2013;<lpage>241</lpage>, <year>2012</year>.</mixed-citation></ref>
<ref id="ref-10"><label>[10]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>R.</given-names> <surname>Begum</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Raziuddin</surname></string-name> and <string-name><given-names>V. K.</given-names> <surname>Prasad</surname></string-name></person-group>, &#x201C;<article-title>A survey on VANETs applications and its challenges</article-title>,&#x201D; in <conf-name>Proc. of the Int. Conf. on Advanced Computer Science &#x0026; Software Engineering</conf-name>, <conf-loc>Hyderabad, India</conf-loc>, pp. <fpage>1</fpage>&#x2013;<lpage>12</lpage>, <year>2016</year>.</mixed-citation></ref>
<ref id="ref-11"><label>[11]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>R. G.</given-names> <surname>Engoulou</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Bella&#x00EF;che</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Pierre</surname></string-name> and <string-name><given-names>A.</given-names> <surname>Quintero</surname></string-name></person-group>, &#x201C;<article-title>VANET security surveys</article-title>,&#x201D; <source>Computer Communications</source>, vol. <volume>44</volume>, pp. <fpage>1</fpage>&#x2013;<lpage>13</lpage>, <year>2014</year>.</mixed-citation></ref>
<ref id="ref-12"><label>[12]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>M. A.</given-names> <surname>Al-Shareeda</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Anbar</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Manickam</surname></string-name> and <string-name><given-names>A. A.</given-names> <surname>Yassin</surname></string-name></person-group>, &#x201C;<article-title>Vppcs: Vanet-based privacy-preserving communication scheme</article-title>,&#x201D; <source>IEEE Access</source>, vol. <volume>8</volume>, pp. <fpage>150914</fpage>&#x2013;<lpage>150928</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-13"><label>[13]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>J.</given-names> <surname>Cui</surname></string-name>, <string-name><given-names>L.</given-names> <surname>Wei</surname></string-name>, <string-name><given-names>H.</given-names> <surname>Zhong</surname></string-name>, <string-name><given-names>J.</given-names> <surname>Zhang</surname></string-name>, <string-name><given-names>Y.</given-names> <surname>Xu</surname></string-name> <etal>et al.</etal></person-group><italic>,</italic> &#x201C;<article-title>Edge computing in VANETs-an efficient and privacy-preserving cooperative downloading scheme</article-title>,&#x201D; <source>IEEE Journal on Selected Areas in Communications</source>, vol. <volume>38</volume>, no. <issue>6</issue>, pp. <fpage>1191</fpage>&#x2013;<lpage>1204</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-14"><label>[14]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S. A.</given-names> <surname>Alfadhli</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Lu</surname></string-name>, <string-name><given-names>K.</given-names> <surname>Chen</surname></string-name> and <string-name><given-names>M.</given-names> <surname>Sebai</surname></string-name></person-group>, &#x201C;<article-title>Mfspv: A multi-factor secured and lightweight privacy-preserving authentication scheme for vanets</article-title>,&#x201D; <source>IEEE Access</source>, vol. <volume>8</volume>, pp. <fpage>142858</fpage>&#x2013;<lpage>142874</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-15"><label>[15]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>I.</given-names> <surname>Ali</surname></string-name> and <string-name><given-names>F.</given-names> <surname>Li</surname></string-name></person-group>, &#x201C;<article-title>An efficient conditional privacy-preserving authentication scheme for vehicle-to-infrastructure communication in VANETs</article-title>,&#x201D; <source>Vehicular Communications</source>, vol. <volume>22</volume>, pp. <fpage>1</fpage>&#x2013;<lpage>18</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-16"><label>[16]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>Y.</given-names> <surname>Wang</surname></string-name>, <string-name><given-names>H.</given-names> <surname>Zhong</surname></string-name>, <string-name><given-names>Y.</given-names> <surname>Xu</surname></string-name>, <string-name><given-names>J.</given-names> <surname>Cui</surname></string-name> and <string-name><given-names>G.</given-names> <surname>Wu</surname></string-name></person-group>, &#x201C;<article-title>Enhanced security identity-based privacy-preserving authentication scheme supporting revocation for vanets</article-title>,&#x201D; <source>IEEE Systems Journal</source>, vol. <volume>14</volume>, no. <issue>4</issue>, pp. <fpage>5373</fpage>&#x2013;<lpage>5383</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-17"><label>[17]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S.</given-names> <surname>Wang</surname></string-name>, <string-name><given-names>K.</given-names> <surname>Mao</surname></string-name>, <string-name><given-names>F.</given-names> <surname>Zhan</surname></string-name> and <string-name><given-names>D.</given-names> <surname>Liu</surname></string-name></person-group>, &#x201C;<article-title>Hybrid conditional privacy-preserving authentication scheme for VANETs</article-title>,&#x201D; <source>Peer-to-Peer Networking and Applications</source>, vol. <volume>13</volume>, pp. <fpage>1600</fpage>&#x2013;<lpage>1615</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-18"><label>[18]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S. S.</given-names> <surname>Moni</surname></string-name> and <string-name><given-names>D.</given-names> <surname>Manivannan</surname></string-name></person-group>, &#x201C;<article-title>A scalable and distributed architecture for secure and privacy-preserving authentication and message dissemination in VANETs</article-title>,&#x201D; <source>Internet of Things</source>, vol. <volume>13</volume>, pp. <fpage>1</fpage>&#x2013;<lpage>12</lpage>, <year>2021</year>.</mixed-citation></ref>
<ref id="ref-19"><label>[19]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>L.</given-names> <surname>Benarous</surname></string-name>, <string-name><given-names>B.</given-names> <surname>Kadri</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Bitam</surname></string-name> and <string-name><given-names>A.</given-names> <surname>Mellouk</surname></string-name></person-group>, &#x201C;<article-title>Privacy-preserving authentication scheme for on-road on-demand refilling of pseudonym in VANET</article-title>,&#x201D; <source>International Journal of Communication Systems</source>, vol. <volume>33</volume>, no. <issue>10</issue>, pp. <fpage>1</fpage>&#x2013;<lpage>18</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-20"><label>[20]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>M. A.</given-names> <surname>Al-shareeda</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Anbar</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Manickam</surname></string-name> and <string-name><given-names>I. H.</given-names> <surname>Hasbullah</surname></string-name></person-group>, &#x201C;<article-title>An efficient identity-based conditional privacy-preserving authentication scheme for secure communication in a vehicular ad hoc network</article-title>,&#x201D; <source>Symmetry</source>, vol. <volume>12</volume>, no. <issue>10</issue>, pp. <fpage>1</fpage>&#x2013;<lpage>25</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-21"><label>[21]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S.</given-names> <surname>Saremi</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Mirjalili</surname></string-name> and <string-name><given-names>A.</given-names> <surname>Lewis</surname></string-name></person-group>, &#x201C;<article-title>Grasshopper optimisation algorithm: Theory and application</article-title>,&#x201D; <source>Advances in Engineering Software</source>, vol. <volume>105</volume>, pp. <fpage>30</fpage>&#x2013;<lpage>47</lpage>, <year>2017</year>.</mixed-citation></ref>
<ref id="ref-22"><label>[22]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>H.</given-names> <surname>Feng</surname></string-name>, <string-name><given-names>H.</given-names> <surname>Ni</surname></string-name>, <string-name><given-names>R.</given-names> <surname>Zhao</surname></string-name> and <string-name><given-names>X.</given-names> <surname>Zhu</surname></string-name></person-group>, &#x201C;<article-title>An enhanced grasshopper optimization algorithm to the Bin packing problem</article-title>,&#x201D; <source>Journal of Control Science and Engineering</source>, vol. <volume>2020</volume>, no. <issue>3894987</issue>, pp. <fpage>1</fpage>&#x2013;<lpage>19</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-23"><label>[23]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>J.</given-names> <surname>Luo</surname></string-name>, <string-name><given-names>H.</given-names> <surname>Chen</surname></string-name>, <string-name><given-names>Y.</given-names> <surname>Xu</surname></string-name>, <string-name><given-names>H.</given-names> <surname>Huang</surname></string-name> and <string-name><given-names>X.</given-names> <surname>Zhao</surname></string-name></person-group>, &#x201C;<article-title>An improved grasshopper optimization algorithm with application to financial stress prediction</article-title>,&#x201D; <source>Applied Mathematical Modelling</source>, vol. <volume>64</volume>, pp. <fpage>654</fpage>&#x2013;<lpage>668</lpage>, <year>2018</year>.</mixed-citation></ref>
<ref id="ref-24"><label>[24]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A.</given-names> <surname>Bechir</surname></string-name></person-group>, &#x201C;<article-title>Efficient privacy-preservation scheme for securing urban P2P VANET networks</article-title>,&#x201D; <source>Egyptian Informatics Journal</source>, vol. <volume>22</volume>, no. <issue>3</issue>, pp. <fpage>317</fpage>&#x2013;<lpage>328</lpage>, <year>2021</year>.</mixed-citation></ref>
<ref id="ref-25"><label>[25]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>F.</given-names> <surname>Farouk</surname></string-name>, <string-name><given-names>Y.</given-names> <surname>Alkady</surname></string-name> and <string-name><given-names>R.</given-names> <surname>Rizk</surname></string-name></person-group>, &#x201C;<article-title>Efficient privacy-preserving scheme for location based services in VANET system</article-title>,&#x201D; <source>IEEE Access</source>, vol. <volume>8</volume>, pp. <fpage>60101</fpage>&#x2013;<lpage>60116</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-26"><label>[26]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>M. M.</given-names> <surname>Salim</surname></string-name>, <string-name><given-names>I.</given-names> <surname>Kim</surname></string-name>, <string-name><given-names>U.</given-names> <surname>Doniyor</surname></string-name>, <string-name><given-names>C.</given-names> <surname>Lee</surname></string-name> and <string-name><given-names>J. H.</given-names> <surname>Park</surname></string-name></person-group>, &#x201C;<article-title>Homomorphic encryption based privacy-preservation for IoMT</article-title>,&#x201D; <source>Applied Sciences</source>, vol. <volume>11</volume>, no. <issue>18</issue>, pp. <fpage>8757</fpage>&#x2013;<lpage>8772</lpage>, <year>2021</year>.</mixed-citation></ref>
</ref-list>
</back>
</article>