Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

A Highly Secured QoS Aware Routing Algorithm for Software Defined Vehicle Ad-Hoc Networks Using Optimal Trust Management Scheme

Published: 01 August 2020 Publication History

Abstract

Recent reports show that the millions of people killed each year in the road accidents are due to high density vehicles and traffic environment. The road traffic safety has been an unsolvable problem in recent population. Generally, nodes in vehicle ad hoc networks have a relatively high speed, while there is a major issue to provide the accurate data transmission between two nodes. Many research works have been undertaken to solve these issues by trust based techniques. In this paper, a highly secured QoS aware routing algorithm (HSQ-RA) using optimal trust management scheme is proposed. In HSQ-RA, the multi-hop clustering is performed by improved whale optimization algorithm and the inter-cluster routing is done using the trust values. The multiple constraints are used to calculate the trust of each node and optimized by the trust search algorithm. The simulation result exhibits that the proposed HSQ-RA algorithm provides better quality of service (QoS), delivery rate, faster way to discover routing and reduce loss rate.

References

[1]
Wu SA Multi-channel MAC protocol with power control for multi-hop mobile ad hoc networksThe Computer Journal2002451101-1101016.68006
[2]
Leinmuller T, Schoch E, and Kargl F Position verification approaches for vehicular ad hoc networks IEEE Wireless Communications 2006 13 5 16-21
[3]
Guclu, S. S., & Altilar, D. T. (2014). Uplink utilization with V2V2R communications in clustered vehicular networks. In 4th international conference on wireless communications, vehicular technology, information theory and aerospace & electronic systems (VITAE), Aalborg (pp. 1–5)
[4]
Fascista A, Ciccarese G, Coluccia A, and Ricci G A localization algorithm based on V2I communications and AOA estimation IEEE Signal Processing Letters 2017 24 1 126-130
[5]
Nilsson M, Gustafson C, Abbas T, and Tufvesson F A measurement-based multilink shadowing model for V2V network simulations of highway scenarios IEEE Transactions on Vehicular Technology 2017 66 10 8632-8643
[6]
Wasef A, Lu R, Lin X, and Shen X Complementing public key infrastructure to secure vehicular ad hoc networks security and privacy in emerging wireless networks IEEE Wireless Communications 2010 17 5 22-28
[7]
Isaac J, Zeadally S, and Camara JSecurity attacks and solutions for vehicular ad hoc networksIET Communications20104789427783721273.94364
[8]
Zhang Lei, Wu Qianhong, Solanas A, and Domingo-Ferrer J A scalable robust authentication protocol for secure vehicular communications IEEE Transactions on Vehicular Technology 2010 59 4 1606-1617
[9]
Dietzel S, Schoch E, Konings B, Weber M, and Kargl F Resilient secure aggregation for vehicular networks IEEE Network 2010 24 1 26-31
[10]
Wasef A and Shen X EMAP: Expedite message authentication protocol for vehicular ad hoc networks IEEE Transactions on Mobile Computing 2013 12 1 78-89
[11]
Mershad K and Artail H A framework for secure and efficient data acquisition in vehicular ad hoc networks IEEE Transactions on Vehicular Technology 2013 62 2 536-551
[12]
Guo S, Zeng D, and Xiang Y Chameleon hashing for secure and privacy-preserving vehicular communications IEEE Transactions on Parallel and Distributed Systems 2014 25 11 2794-2803
[13]
Bhoi S and Khilar P SIR: A secure and intelligent routing protocol for vehicular ad hoc network IET Networks 2015 4 3 185-194
[14]
Li W and Song H ART: An attack-resistant trust management scheme for securing vehicular ad hoc networks IEEE Transactions on Intelligent Transportation Systems 2016 17 4 960-969
[15]
Wang F, Xu Y, Zhang H, Zhang Y, and Zhu L 2FLIP: A two-factor lightweight privacy-preserving authentication scheme for VANET IEEE Transactions on Vehicular Technology 2016 65 2 896-911
[16]
Chuang Ming-Chin and Lee Jeng-Farn TEAM: Trust-extended authentication mechanism for vehicular ad hoc networks IEEE Systems Journal 2014 8 3 749-758
[17]
Zhong H, Wen J, Cui J, and Zhang S Efficient conditional privacy-preserving and authentication scheme for secure service provision in VANET Tsinghua Science and Technology 2016 21 6 620-629
[18]
Xie Y, Wu L, Zhang Y, and Shen J Efficient and secure authentication scheme with conditional privacy-preserving for VANETs Chinese Journal of Electronics 2016 25 5 950-956
[19]
Shim K An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks IEEE Transactions on Vehicular Technology 2012 61 4 1874-1883
[20]
Shao J, Lin X, Lu R, and Zuo C A threshold anonymous authentication protocol for VANETs IEEE Transactions on Vehicular Technology 2016 65 3 1711-1720
[21]
Cui J, Zhang J, Zhong H, and Xu Y SPACF: A secure privacy-preserving authentication scheme for VANET with Cuckoo filter IEEE Transactions on Vehicular Technology 2017 66 11 10283-10295
[22]
Wazid M, Das A, Kumar N, Odelu V, Goutham Reddy A, Park K, and Park Y Design of lightweight authentication and key agreement protocol for vehicular ad hoc networks IEEE Access 2017 5 14966-14980
[23]
Hashem Eiza M, Owens T, and Ni Q Secure and robust multi-constrained QoS aware routing algorithm for VANETs IEEE Transactions on Dependable and Secure Computing 2016 13 1 32-45
[24]
Mirjalili S and Lewis A The Whale optimization algorithm Advances in Engineering Software 2016 95 51-67

Cited By

View all
  • (2024)Classification, Impact, and Mitigation Strategies of Attacks in Automotive Trust Management SystemsProceedings of the 2024 Cyber Security in CarS Workshop10.1145/3689936.3694691(61-75)Online publication date: 20-Nov-2024
  • (2023)Satellite Network State Prediction and Route Planning Policy Using the MPNN AlgorithmProceedings of the 2023 6th International Conference on Electronics, Communications and Control Engineering10.1145/3592307.3592334(174-180)Online publication date: 24-Mar-2023
  • (2021)Vehicle-Mounted Self-Organizing Network Routing Algorithm Based on Deep Reinforcement LearningWireless Communications & Mobile Computing10.1155/2021/99345852021Online publication date: 1-Jan-2021

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Wireless Personal Communications: An International Journal
Wireless Personal Communications: An International Journal  Volume 113, Issue 4
Aug 2020
1062 pages

Publisher

Kluwer Academic Publishers

United States

Publication History

Published: 01 August 2020

Author Tags

  1. Inter cluster
  2. Multi-hop cluster
  3. Secure routing
  4. Trust management
  5. VANET

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 08 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Classification, Impact, and Mitigation Strategies of Attacks in Automotive Trust Management SystemsProceedings of the 2024 Cyber Security in CarS Workshop10.1145/3689936.3694691(61-75)Online publication date: 20-Nov-2024
  • (2023)Satellite Network State Prediction and Route Planning Policy Using the MPNN AlgorithmProceedings of the 2023 6th International Conference on Electronics, Communications and Control Engineering10.1145/3592307.3592334(174-180)Online publication date: 24-Mar-2023
  • (2021)Vehicle-Mounted Self-Organizing Network Routing Algorithm Based on Deep Reinforcement LearningWireless Communications & Mobile Computing10.1155/2021/99345852021Online publication date: 1-Jan-2021

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media