Skip to main content

Deep Neural Networks and Black Widow Optimization for VANETS

  • Conference paper
  • First Online:
Inventive Systems and Control

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 436))

  • 357 Accesses

Abstract

In today’s modern world, intelligent communication system which is called as vehicular ad hoc networks (VANETs) play important hypothesis for sharing the live messages concerning with the traffic jamming, highway safety, and position-related services to progress the driving comportment of the driver. During this situation, privacy with the security is the major challenge to be identified. To identify this issue, Trusted Authority (TA) will provide dual authentication to maintain the authentication of messages between the TA and the VANET nodes. In this work, TA classifies the vehicles into prime users, secondary users, and illegal users under the roadside units (RSUs). Black Widow Optimization (BWO) technique for optimizing the weights to improve the network performance parameters and deep neural networks for intrusion detection, both the advantages are combined in the method. The results of the proposed scheme (BWO-DNN) are computationally efficient in terms of Key Computation Time(121 ms) and Key Recovery Time (3.82 ms) with the existing approaches.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Vijayakumar P, Azees M, Kannan A, Deborah LJ (2015) Dual authentication and key management techniques for secure data transmission in vehicular ad hoc network. IEEE Trans Intell Transp Syst, pp 1524–9050

    Google Scholar 

  2. Johnson D, Menezes A, Vanstone S (2001) The elliptic curve digital signature algorithm (ECDSA). Int J Inf Secur 1(1):36–63

    Article  Google Scholar 

  3. Wasef A, Jiang YShen X (2008) ECMV: Efficient certificate management scheme for vehicular networks. In: Proceedings of IEEE GLOBECOM, New Orleans, LA, USA, pp 1–5

    Google Scholar 

  4. Shen W, Liu L, Cao X (2013) Cooperative message authentication in vehicular cyber-physical systems. IEEE Trans Emerg Top Comput 1(1):84–97

    Article  Google Scholar 

  5. Syamsuddin I, Dillon T, Chang E, Han S (2008) A survey of RFID authentication protocols based on hash method. In: Proceedings of 3rd ICCIT, vol 2, pp 559–564

    Google Scholar 

  6. Perrig A, Canetti R, Tygar JD, Song D (2002) The TESLA broadcast authentication protocol. RSA Crypto 5(2):2–13

    Google Scholar 

  7. Guo J, Baugh JP, Wang S (2007) A group signature based secure and privacy preserving vehicular communication framework. In: Proceedings of IEEE INFOCOM, Anchorage, AK, USA, pp 103–108

    Google Scholar 

  8. Lin X, Sun X, Wang X, Zhang C, Ho PH, Shen X (2008) TSVC: timed efficient and secure vehicular communications with privacy preserving. IEEE Trans Wireless Commun 7(12):4987–4998

    Google Scholar 

  9. Wang Y, Menkovski V, Ho IW-H, Pechenizkiy M (2019) VANET meets deep learning: the effect of packet loss on the object detection performance. 978-1-7281-1217

    Google Scholar 

  10. Kanthimathi S, Jhansi Rani P (2021) Optimal routing based load balanced congestion control using MAODV in WANET environment. (IJACSA) Int Jthisnal Adv Comput Sci Appl 12(3)

    Google Scholar 

  11. Moghanian S, Saravi FB, Javidi G, Sheybani EO (2020) GOAMLP: network intrusion detection with multilayer perceptron and grasshopper optimization algorithm. In: Digital object identifier. IEEE Access. https://doi.org/10.1109/ACCESS

  12. Devi MR, Jeya JS (2021) Black widow optimization algorithm and similarity index based adaptive scheduled partitioning technique for reliable emergency message broadcasting in VANET. Research square

    Google Scholar 

  13. Montavon G, Samek W, Müller KR (2018) Methods for interpreting and understanding deep neural networks. Digit Signal Process 73:1–15. SCIENCE DIRECT

    Google Scholar 

  14. Sakr S, Elshawi R, Ahmed AM, Qureshi WT, Brawner CA, Keteyian SJ, Blaha MJ, Al-Mallah MH (2017) Comparison of machine learning techniques to predict all-cause mortality using fitness data: the Henry ford exercise testing (FIT) project. Med Inf Decis Making 17:174. https://doi.org/10.1186/s12911-017-0566-6

  15. Hayyolalam V, Kazem AAP (2020) Black widow optimization algorithm: a novel meta-heuristic approach for solving engineering optimization problems. Eng Appl Artif Intell 87:103249

    Article  Google Scholar 

  16. Shakya S, Pulchowk LN (2020)Intelligent and adaptive multi- objective optimization in WANET using bio inspired algorithms. J Soft Comput Paradigm (JSCP) 2(1):13–23

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shazia Sulthana .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sulthana, S., Reddy, B.N.M. (2022). Deep Neural Networks and Black Widow Optimization for VANETS. In: Suma, V., Baig, Z., Kolandapalayam Shanmugam, S., Lorenz, P. (eds) Inventive Systems and Control. Lecture Notes in Networks and Systems, vol 436. Springer, Singapore. https://doi.org/10.1007/978-981-19-1012-8_48

Download citation

Publish with us

Policies and ethics