Skip to main content
Log in

Artificial neural network-based secured communication strategy for vehicular ad hoc network

  • Application of soft computing
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

Vehicular ad hoc network (VANET) is an application-based network belonging to the class of mobile ad hoc networks. The nodes in the VANET are interconnected and communicate through wireless media and the Internet. This subsequently leads to data security issues. Several secured communication and routing protocols for VANET have been proposed so far. However, security complaints are still rising. The motivation is to provide a secured communication strategy (SCS) in which each node of VANET needs to be authenticated and authorized to participate in the communication network. The SCS comprises two phases, namely node authentication and authorization phases. The details of every node are collected and saved in the authentication phase and validated in the authorization phase. Whenever a new node is admitted into the VANET functionalities, it must fulfill the requirement of answering a set of credentials given by the admin. The logistic regression model is used to overcome the computation complexity. The simulation of SCS is carried out in NS2 software, and the results are verified in terms of throughput, packet delivery ratio, packet loss, and delay. The performance is evaluated by comparing the results with earlier methods to prove its efficiency.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

Availability of data and materials

Not applicable.

References

  • Bangui H, Ge M, Buhnova B (2022) A hybrid machine learning model for intrusion detection in VANET. Computing 104(3):503–531

    Article  Google Scholar 

  • Bariah L, Shehada D, Salahat E, Yeun CY (2015) Recent advances in VANET security: a survey. In: 2015 IEEE 82nd vehicular technology conference (VTC2015-fall). IEEE, pp 1–7

  • Calandriello G, Papadimitratos P, Hubaux JP, Lioy A (2007) Efficient and robust pseudonymous authentication in VANET. In: Proceedings of the 4th ACM international workshop on vehicular ad hoc networks, pp 19–28

  • Cunha F, Villas L, Boukerche A, Maia G, Viana A, Mini RA, Loureiro AA (2016) Data communication in VANETs: protocols, applications, and challenges. Ad Hoc Netw 44:90–103

    Article  Google Scholar 

  • Ftaimi S, Mazri T (2020) A comparative study of machine learning algorithms for VANET networks. In: Proceedings of the 3rd international conference on networking, information systems and security, pp 1–8

  • Gupta BB, Gaurav A, Marín EC, Alhalabi W (2022) Novel graph-based machine learning technique to secure smart vehicles in intelligent transportation systems. In: IEEE transactions on intelligent transportation systems

  • Hasrouny H, Samhat AE, Bassil C, Laouiti A (2017) VANet security challenges and solutions: a survey. Vehic Commun 7:7–20

    Article  Google Scholar 

  • Jeevana Sujitha M, Udayaraju P, Kranthi V (2019) A review of different machine learning models to analyze collective behavior in social networks. Int J Recent Technol Eng 6(7):799–804

    Google Scholar 

  • Kalkundri R, Kulkarni SA (2014) A secure message authentication scheme for VANET using ECDSA. In: Proceedings of the 4th international conference on computing, communications and networking technologies, ICCCNT, pp 1–6

  • Khan AA, Abolhasan M, Ni W (2018) 5G next generation VANETs using SDN and fog computing framework. In: 2018 15th IEEE annual consumer communications and networking conference (CCNC). IEEE, pp 1–6

  • Khatri S, Vachhani H, Shah S, Bhatia J, Chaturvedi M, Tanwar S, Kumar N (2021) Machine learning models and techniques for VANET based traffic management: implementation issues and challenges. Peer-to-Peer Netw Appli 14(3):1778–1805

    Article  Google Scholar 

  • Lu X, Xiao L, Xu T, Zhao Y, Tang Y, Zhuang W (2020) Reinforcement learning-based PHY authentication for VANETs. IEEE Trans Veh Technol 69(3):3068–3079

    Article  Google Scholar 

  • Nagarjuna A, Pamula U (2019) Secure and access control data monitoring in vehicular ad HOC network. Int J Innov Technol Explor Eng 10(8):4145–4149

    Google Scholar 

  • Oubabas S, Aoudjit R, Rodrigues JJPC, Talbi S (2018) Secure and stable vehicular ad hoc network clustering algorithm based on hybrid mobility similarities and trust management scheme, vol 13. Elsevier, New York, pp 128–138

    Google Scholar 

  • Rasheed A, Gillani S, Ajmal S, Qayyum A (2017) Vehicular ad hoc network (VANET): a survey, challenges, and applications. In: Vehicular ad-hoc networks for smart cities, pp 39–51

  • Sekhar BVDS, Reddy PP, Varma G (2015) Novel technique of image denoising using adaptive haar wavelet transformation. Irecos 10(10):1012–1017

    Article  Google Scholar 

  • Sekhar BVDS, Reddy PP, Varma G (2017) Performance of secure and robust watermarking using evolutionary computing technique. JGIM 25(4):61–79

    Google Scholar 

  • Sekhar BVDS et al (2018) Image denoising using wavelet transform based flower pollination algorithm. In: Advances in intelligent systems and computing (Aisc), vol 862, Springer

  • Sekhar BVDS et al (2019) Image denoising using novel social grouping optimization algorithm with transform domain technique. Int J Nat Comput Res 8(4):28–40

    Article  Google Scholar 

  • Sekhar BVDS et al (2020) An experimental analysis of secure-energy trade-off using optimized routing protocol in modern-secure-Wsn. In: EAI endorsed transactions on scalable information systems, issue 24, pp 1–12

  • Sekhar BVDS et al (2020) Processing real world datasets using big data hadoop tools. J Sci Ind Res 9(7):631–635

    Google Scholar 

  • Sivasakthi M, Suresh S (2013) Research on vehicular ad hoc networks (VANETs): an overview. J Appl Sci Eng Res 2(1):23–27

    Google Scholar 

  • Sumra IA, Hasbullah HB, AbManan JLB (2015) Attacks on security goals (confidentiality, integrity, availability) in VANET: a survey. In: Vehicular ad-hoc networks for smart cities. Springer, Singapore, pp 51–61

  • Tangade S, Manvi SS, Hassan S (2019) A deep learning-based driver classification and trust computation in VANETs. In: 2019 IEEE 90th vehicular technology conference (VTC2019-Fall). IEEE, pp 1–6

  • Zeng Y, Qiu M, Zhu D, Xue Z, Xiong J, Liu M (2019) Deepvcm: a deep learning-based intrusion detection method in VANET. In: 2019 IEEE 5th intl conference on big data security on cloud (BigDataSecurity), IEEE intl conference on high performance and smart computing,(HPSC), and IEEE intl conference on intelligent data and security (IDS). IEEE, pp 288–293

  • Zhang X, Li R, Cui B (2018) A security architecture of VANET based on blockchain and mobile edge computing. In: 2018 1st IEEE international conference on hot information-centric networking (HotICN). IEEE, pp 258–259

Download references

Funding

No funding was received to assist with the preparation of this manuscript.

Author information

Authors and Affiliations

Authors

Contributions

All authors are contributed equally.

Corresponding author

Correspondence to B. V. D. S. Sekhar.

Ethics declarations

Conflict of interest

Not applicable.

Ethical approval

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sekhar, B.V.D.S., Udayaraju, P., Kumar, N.U. et al. Artificial neural network-based secured communication strategy for vehicular ad hoc network. Soft Comput 27, 297–309 (2023). https://doi.org/10.1007/s00500-022-07633-4

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-022-07633-4

Keywords

Navigation