Design A Mobile Application for Vehicles Managing of a Transportation Issue

Seddiq Q. Abd Al-Rahman, Sameeh Abdulghafour Jassim, Ali Makki Sagheer

Abstract


The movement of people between cities is leading to a recovery in the economy that Transportation companies have begun to dominate. These companies start providing the best services to customers and promoting them through workers to earn money properly. From this basis, this paper presents a system designed to manage a company that transports people and goods between a group of cities. Database management was used across the web to enable data exchange between workers. The database is designed to be accessible to workers. It has also been suggested that the elliptic curve can be used to generate public and private keys for all parties while the company's management generates a prime number every day to ensure the confidentiality of the exchanged data. In this proposal, the RSA algorithm is used to encrypt transferred data. It uses technology to exchange information if the recipient is not connected to the network. The proposed system performs a good service for the company’s management in securing the transferred data where smartphone applications are designed to work on it.

Keywords


Web Database; Mobile Application; Cryptography; Transportation

References


T. Guarda, M. F. Augusto, I. Lopes, J. A. Victor, Á. Rocha, and L. Molina, “Mobile Communication Systems: Evolution and Security,” Dev. Adv. Def. Secur. Proc. MICRADS 2019, vol. 152, pp. 119–132, 2020.

D. Nehra, K. S. Dhindsa, and B. Bhushan, “A Security Model to Make Communication Secure in Cluster-Based MANETs,” Advances in Intelligent Systems and Computing, vol. 1079. pp. 183–193, 2020.

N. Biswas, S. Chattopadhyay, and G. Mahapatra, “Computational Intelligence, Communications, and Business Analytics,” vol. 775, pp. 242–255, 2017.

F. M. Jasim, A. M. Sagheer, and A. M. Awad, “Enhancement of digital signature algorithm in bitcoin wallet,” Bull. Electr. Eng. Informatics, vol. 10, no. 1, pp. 449–457, 2021.

D. K. Sarmah, A. J. Kulkarni, and A. Abraham, Optimization Models in Steganography Using Metaheuristics. Cham: Springer, 2020.

J. R. Vacca, Computer and Information Security Handbook, Third Edit. USA: Todd Green, 2017.

O. A. Hammood et al., “An effective transmit packet coding with trust-based relay nodes in VANETs,” Bull. Electr. Eng. Informatics, vol. 9, no. 2, pp. 685–697, 2020.

M. Mushtaq Faheem, S. Jamel, A. Hassan Disina, Z. A. Pindar, N. Shafinaz Ahmad Shakir, and M. Mat Deris, “A Survey on the Cryptographic Encryption Algorithms,” Int. J. Adv. Comput. Sci. Appl., vol. 8, no. 11, pp. 333–344, 2017.

O. A. Dawood, A. M. S. Rahma, and A. M. J. Abdul Hossen, “New Symmetric Cipher Fast Algorithm of Revertible Operations’ Queen (FAROQ) Cipher,” Int. J. Comput. Netw. Inf. Secur., vol. 9, no. 4, pp. 29–36, 2017.

W. Stallings, Cryptography and Network Security Principles and Practice, Global Edi. England, 2017.

Z. Hercigonja, “Comparative Analysis of Cryptographic Algorithms,” Int. J. Digit. Technol. Econ., vol. 1, no. 2, pp. 127–134, 2016.

A. Jha and S. Sharma, “Quantitative Interpretation of Cryptographic Algorithms,” Advances in Intelligent Systems and Computing, vol. 937. pp. 459–469, 2020.

M. N. Dhivya and M. S. Banupriya, “Network Security with Cryptography and Steganography,” Int. J. Eng. Res. Technol., vol. 8, no. 3, pp. 1–4, 2020.

M. A. Mohammed and F. S. Abed, “A symmetric-based framework for securing cloud data at rest,” Turkish J. Electr. Eng. Comput. Sci., vol. 28, no. 1, pp. 347–361, 2020.

Y. Yan, H. Xiaohong, and W. Wanjun, “Location-Based Services and Privacy Protection under Mobile Cloud Computing,” Bull. Electr. Eng. Informatics, vol. 4, no. 4, pp. 345–354, 2015.

I. Eaton and M. McNett, “Protecting the data: Security and privacy,” in Data for Nurses, Elsevier Inc., 2020, pp. 87–99.

A. P. Dilip Singh Sisodia, Shivangi Bhandari, Nerella Keerthana Reddy, Performance Management of Integrated Systems and its Applications in Software Engineering. 2020.

A. Bhowmik, S. Karforma, and J. Dey, “Recurrence relation and DNA sequence: A state-of-art technique for secret sharing,” Int. J. Reconfigurable Embed. Syst., vol. 10, no. 1, p. 65, 2021.

H. Deng, Z. Qin, Q. Wu, Z. Guan, and Y. Zhou, “Flexible attribute-based proxy re-encryption for efficient data sharing,” Inf. Sci. (Ny)., vol. 511, pp. 94–113, 2020.

S. A. Hameed, A. Haddad, M. H. Habaebi, and A. Nirabi, “Dermatological diagnosis by mobile application,” Bull. Electr. Eng. Informatics, vol. 8, no. 3, pp. 847–854, 2019.

C. Chen, J. Wu, H. Lin, W. Chen, and Z. Zheng, “A Secure and Efficient Blockchain-Based Data Trading Approach for Internet of Vehicles,” IEEE Trans. Veh. Technol., vol. 68, no. 9, pp. 9110–9121, 2019.

R. Kushwah, A. Kulshreshtha, K. Singh, and S. Sharma, “ECDSA for Data Origin Authentication and Vehicle Security in VANET,” 2019 12th Int. Conf. Contemp. Comput. IC3 2019, pp. 1–5, 2019.

M. Computing and U. S. Kumar, “Sms Security System Using,” Int. J. Comput. Sci. Mob. Comput., vol. 8, no. 5, pp. 132–142, 2019.

H. Y. Lin, M. Y. Hsieh, and K. C. Li, “The secure vehicle-to-vehicle and vehicle-to-group communication mechanisms in smart city,” Proc. - IEEE 4th Int. Conf. Big Data Comput. Serv. Appl. BigDataService 2018, pp. 186–192, 2018.

D. R. Prathama, P. A. W. Putro, and D. I. Naviangga, “Secure mobile payment based on elliptic curve cryptography,” 2018 Int. Semin. Res. Inf. Technol. Intell. Syst. ISRITI 2018, pp. 140–145, 2018.

W. Stallings, Cryptography and Network Security: Principles and Practice, Sixth Edit. USA: Pearson, 2014.




DOI: https://doi.org/10.11591/eei.v10i4.2918

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

Bulletin of EEI Stats