Skip to main content

Advertisement

Log in

An Adaptive Cluster based Vehicular Routing Protocol for Secure Communication

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

In today’s scenario, Vehicular Ad-hoc Network (VANET) is one of the modern fields in vehicle communication; it includes a large number of nodes that can be changed arbitrarily with the ability to link or exit the system anytime. Moreover, it has various complexities because of the attacks model in the transmission and communication channel. Besides, most of the attacks are known as black hole attack and wormhole attack. The presence of these attacks causes large damage in the data broadcasting region that ends in data drops or collapses. To defeat these problems, a novel Clustered Vehicle Location protocol for Hybrid Krill Herd and Bat Optimization (CVL-HKH-BO) technique is proposed. Thus, the proposed mechanism of hybrid krill herd and bat optimization is to detect and prevent attacks based on the fitness function. Moreover, secure communication can be enhanced by the proposed technique. Consequently, the solution to energy consumption and packet delay issues are solved using the CVL protocol. The projected strategy is implemented in the Network simulator (Ns-2) platform, and the outcomes show the node energy, overload and delay are minimized by increasing the quantity of packets transmitted in the network. Sequentially, the proposed technique is compared with existing techniques in terms of throughput, packet loss, delay time and data broadcasting ratio. Therefore, the duration of the node can be enhanced and can attain high energy capable data transmission.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Guerna, A., Bitam, S., & Calafate, C. T. (2020). AC-RDV: A novel ant colony system for roadside units deployment in vehicular ad hoc networks. Peer-to-Peer Networking and Applications. https://doi.org/10.1007/s12083-020-01011-3

    Article  Google Scholar 

  2. Aung, P. S., Tun, Y. K., Ei, N. N., & Hong, C. S. (2020). Energy-Efficient Offloading and User Association in UAV-assisted Vehicular Ad Hoc Network. In 2020 21st Asia-Pacific Network Operations and Management Symposium (APNOMS) (pp. 108–113). IEEE. https://doi.org/10.23919/APNOMS50412.2020.9237040

  3. Cui, J., Wang, Y., Zhang, J., Xu, Y., & Zhong, H. (2020). Full session key agreement scheme based on chaotic map in vehicular ad hoc networks. IEEE Transactions on Vehicular Technology. https://doi.org/10.1109/TVT.2020.2997694

    Article  Google Scholar 

  4. Yousefi, F., Khamespanah, E., Gharib, M., Sirjani, M., & Movaghar, A. (2020). VeriVANca framework: Verification of VANETs by property-based message passing of actors in Rebeca with inheritance. International Journal on Software Tools for Technology Transfer, 22(5), 617–633. https://doi.org/10.1007/s10009-020-00579-8

    Article  Google Scholar 

  5. Rashid, S. A., Audah, L., Hamdi, M. M., Abood, M. S., & Alani, S. (2020). Reliable and efficient data dissemination scheme in VANET: A review. International Journal of Electrical and Computer Engineering (IJECE), 10(6), 6423–6434.

    Article  Google Scholar 

  6. AlRubaiei, M., Jassim, H., Sharef, B. T., Safdar, S., Sharef, Z. T., & Malallah, F. L. (2020). Current vulnerabilities, challenges and attacks on routing protocols for mobile ad hoc network: A review. Swarm Intelligence for Resource Management in Internet of Things. https://doi.org/10.1016/B978-0-12-818287-1.00012-7

    Article  Google Scholar 

  7. Muzammal, S. M., Murugesan, R. K., Jhanjhi, N. Z., & Jung, L. T. (2020). SMTrust: Proposing Trust-Based Secure Routing Protocol for RPL Attacks for IoT Applications. 2020 International Conference on Computational Intelligence (ICCI). IEEE. https://doi.org/10.1109/ICCI51257.2020.9247818

  8. Ghaffari, A. (2020). Hybrid opportunistic and position-based routing protocol in vehicular ad hoc networks. Journal of Ambient Intelligence and Humanized Computing, 11(4), 1593–1603. https://doi.org/10.1007/s12652-019-01316-z

    Article  Google Scholar 

  9. Al-shareeda, M. A., Anbar, M., Hasbullah, I. H., & Manickam, S. (2020). Survey of authentication and privacy schemes in vehicular ad hoc networks. IEEE Sensors Journal, 21(2), 2422–2433. https://doi.org/10.1109/JSEN.2020.3021731

    Article  Google Scholar 

  10. Xia, H., Zhang, S. S., Li, Y., Pan, Z. K., Peng, X., & Cheng, X. Z. (2019). An attack-resistant trust inference model for securing routing in vehicular ad hoc networks. IEEE Transactions on Vehicular Technology, 68(7), 7108–7120. https://doi.org/10.1109/TVT.2019.2919681

    Article  Google Scholar 

  11. Al-shareeda, M. A., Anbar, M., Hasbullah, I. H., Manickam, S., & Hanshi, S. M. (2020). Efficient conditional privacy preservation with mutual authentication in vehicular ad hoc networks. IEEE Access, 8, 144957–144968. https://doi.org/10.1109/ACCESS.2020.3014678

    Article  Google Scholar 

  12. Manivannan, D., Moni, S. S., & Zeadally, S. (2020). Secure authentication and privacy-preserving techniques in Vehicular Ad-hoc NETworks (VANETs). Vehicular Communications, 25, 100247. https://doi.org/10.1016/j.vehcom.2020.100247

    Article  Google Scholar 

  13. Babaghayou, M., Labraoui, N., Ari, A. A. A., Lagraa, N., & Ferrag, M. A. (2020). Pseudonym change-based privacy-preserving schemes in vehicular ad-hoc networks: A survey. Journal of Information Security and Applications, 55, 102618. https://doi.org/10.1016/j.jisa.2020.102618

    Article  Google Scholar 

  14. Malhi, A. K., Batra, S., & Pannu, H. S. (2020). Security of vehicular ad-hoc networks: A comprehensive survey. Computers and Security, 89, 101664. https://doi.org/10.1016/j.cose.2019.101664

    Article  Google Scholar 

  15. Farooq, S. M., Hussain, S. M. S., & Ustun, T. S. (2020). Survey of authentication techniques in vehicular Ad-hoc networks (VANETs). IEEE Intelligent Transportation Systems Magazine. https://doi.org/10.1109/MITS.2020.2985024

    Article  Google Scholar 

  16. Wang, Z., & Blum, R. S. (2020). Cybersecurity of Inference in Vehicular Ad-hoc Networks: Invited Presentation. 2020 54th Annual Conference on Information Sciences and Systems (CISS). IEEE. https://doi.org/10.1109/CISS48834.2020.1570627364

  17. Tripathi, K. N., Sharma, S. C., & Jain, G. (2020). A new reputation-based algorithm (RBA) to detect malicious nodes in vehicular Ad Hoc networks (VANETs) Soft Computing Theories and Applications. Springer.

    Google Scholar 

  18. Araujo, J. N. R., Batista, L. S., & Monteiro, C. C. (2020). Improving proactive routing with a multicriteria and adaptive framework in ad-hoc wireless networks. Wireless Networks. https://doi.org/10.1007/s11276-020-02366-4

    Article  Google Scholar 

  19. Mohanakrishnan, U., & Ramakrishnan, B. (2020). MCTRP: An energy efficient tree routing protocol for vehicular ad hoc network using genetic whale optimization algorithm. Wireless Personal Communications, 110(1), 185–206. https://doi.org/10.1007/s11277-019-06720-4

    Article  Google Scholar 

  20. Mirsadeghi, F., Rafsanjani, M. K., & Gupta, B. B. (2020). A trust infrastructure based authentication method for clustered vehicular ad hoc networks. Peer-to-Peer Networking and Applications. https://doi.org/10.1007/s12083-020-01010-4

    Article  Google Scholar 

  21. Eftekhari, S. A., Nikooghadam, M., & Rafighi, M. (2020). Security-enhanced three-party pairwise secret key agreement protocol for fog-based vehicular ad-hoc communications. Vehicular Communications. https://doi.org/10.1016/j.vehcom.2020.100306

    Article  Google Scholar 

  22. Kumar, A., Varadarajan, V., Kumar, A., Dadheech, P., Choudhary, S. S., Ambeth Kumar, V. D., Panigrahi, B. K., & Veluvolu, K. C. (2020). Black hole attack detection in vehicular ad-hoc network using secure AODV routing algorithm. Microprocessors and Microsystems. https://doi.org/10.1016/j.micpro.2020.103352

    Article  Google Scholar 

  23. Mahmood, A., Zhang, W. E., Sheng, Q. Z., Siddiqui, S. A., & Aljubairy, A. (2019). Trust management for software-defined heterogeneous vehicular Ad Hoc networks. Security, Privacy and Trust in the IoT Environment (pp. 203–226). Cham: Springer. https://doi.org/10.1007/978-3-030-18075-1_10

  24. Tripathi, K. N., Jain, G., Yadav, A. M., & Sharma, S. C. (2021). Entity-centric combined trust (ECT) algorithm to detect packet dropping attack in vehicular Ad Hoc Networks (VANETs). Next Generation Information Processing System (pp. 23–33). Singapore: Springer. https://doi.org/10.1007/978-981-15-4851-2_3

  25. Majumder, S., Mathur, A., & Javaid, A. Y. (2019). A study on recent applications of blockchain technology in vehicular Adhoc network (VANET). National Cyber Summit. Cham: Springer.

  26. Fiade, A., Triadi, A. Y., Sulhi, A., Masruroh, S. U., Handayani, V., & Suseno, H. B. (2020). Performance Analysis of Black Hole Attack and Flooding Attack AODV Routing Protocol on VANET (Vehicular Ad-Hoc Network). 2020 8th International Conference on Cyber and IT Service Management (CITSM). IEEE. https://doi.org/10.1109/CITSM50537.2020.9268789

  27. Vignesh, C. C., Sivaparthipan, C. B., Daniel, J. A., et al. (2021). Adjacent node based energetic association factor routing protocol in wireless sensor networks. Wireless Personal Communications. https://doi.org/10.1007/s11277-021-08397-0

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to N. Sree Divya.

Ethics declarations

Conflict of interest

The authors declare that they have no potential conflict of interest.

Ethical Approval

All applicable institutional and/or national guidelines for the care and use of animals were followed.

Informed Consent

For this type of study formal consent is not required.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Divya, N.S., Bobba, V. & Vatambeti, R. An Adaptive Cluster based Vehicular Routing Protocol for Secure Communication. Wireless Pers Commun 127, 1717–1736 (2022). https://doi.org/10.1007/s11277-021-08717-4

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-021-08717-4

Keywords

Navigation