Network data security based on routing algorithm: application in vehicular ad-hoc networks

被引:0
作者
Mittal, M.S. Sonam [1 ]
Prasanth, S.P. [2 ]
Faith, S. Julia [3 ]
机构
[1] Department of Computer Science and Engineering, Chitkara University Institute of Engineering and Technology, Punjab
[2] V.S.B. Engineering College, Kovai Main Road, Post, Tamil Nadu, Karudayampalayam
[3] Department of Information Technology, S. A. Engineering College, Tamil Nadu, Chennai
关键词
blackhole; clustering; deep learning; secure routing; VANET; vehicular ad-hoc networks;
D O I
10.1504/IJMNDI.2024.144006
中图分类号
学科分类号
摘要
One crucial element of intelligent transportation systems (ITS) is the use of vehicle ad hoc networks, or VANETs. Among the many advantages, these networks provide are increased road safety and decreased traffic. Despite their many benefits, VANETs are nonetheless vulnerable to a variety of security risks, such as devastating blackhole attacks. The following is a summary of the primary characteristics and contributions this paper made. First, deep learning (DL) capabilities are included into every node in the DLSR protocol, enabling it to build secure routes and decide between secure and conventional routing. Furthermore, we may look at the fitness function value of each choice to decide which is preferable for the next hop by analysing the activity of malicious nodes. Second, it is thought that the DLC protocol acts as a foundation that reduces control overhead and improves node-to-node communication. © 2024 Inderscience Enterprises Ltd.
引用
收藏
页码:94 / 101
页数:7
相关论文
共 28 条
[1]  
Sonam Mittal M.S., Prasanth S.P., Julia Faith S., Network data security based on routing algorithm: application in vehicular ad-hoc networks, Int. J. Mobile Network Design and Innovation, 11, 2, pp. 94-101, (2024)
[2]  
Al Nuaimi E., Al Neyadi H., Mohamed N., Al-Jaroodi J., Applications of big data to smart cities, J. Internet Serv. Appl, 6, pp. 1-15, (2015)
[3]  
Al-Turjman F., Zahmatkesh H., Shahroze R., An overview of security and privacy in smart cities’ IoT communications, Trans. Emerg. Telecommun. Technol, 33, (2022)
[4]  
Amini N., Vahdatpour A., Xu W., Gerla M., Sarrafzadeh M., Cluster size optimization in sensor networks with decentralized cluster-based protocols, Comput. Commun, 35, pp. 207-220, (2012)
[5]  
Bhuvaneswari R., Ramachandran R., Denial of service attack solution in OLSR based manet by varying number of fictitious nodes, Clust. Comput, 22, pp. 12689-12699, (2018)
[6]  
Bukar U.A., Othman M., Architectural design, improvement, and challenges of distributed software-defined wireless sensor networks, Wirel. Pers. Commun, 122, pp. 2395-2439, (2022)
[7]  
Da Xu L., He W., Li S., Internet of things in industries: a survey, IEEE Trans. Ind. Inform, 10, pp. 2233-2243, (2014)
[8]  
Ghodichor N., Thaneeghavl R., Sahu D., Borkar G., Sawarkar A., Secure Routing Protocol to Mitigate Attacks by Using Blockchain Technology in Manet (Version 1), (2023)
[9]  
Ijemaru G.K., Ang K.L.M., Seng J.K., Wireless power transfer and energy harvesting in distributed sensor networks: survey, opportunities, and challenges, Int. J. Distrib. Sens. Netw, 18, (2022)
[10]  
Jain R., Ant colony inspired energy efficient OLSR (AC-OLSR) routing protocol in MANETS, Wirel. Pers. Commun, 124, pp. 3307-3320, (2022)