1 Introduction

A vehicular ad hoc network (VANET) is a network consisting of a collection of moving vehicles. VANET imports all the characteristics of mobile ad hoc networks (MANETs) with additional parameters such as high mobility, frequent route breaks, and dynamic topology. Being a sub-type of MANETs, VANETs often experience communication link breaks due to imbalances in vehicle availability. VANETs are intended to exchange various types of information between vehicles regarding traffic, entertainment, road conditions, etc. VANETs include communication frameworks such as Vehicle to Vehicle (V2V) and Vehicle to Fixed Unit (V2I) to support communication between vehicles [1]. Fig. 1 represents V2V and V2I communication in VANETs. VANET is used in Intelligent Transportation Systems (ITS). Vehicles in VANETs are fitted with a range of hardware components, including processing power, communication entities, On-Board Unit (OBU), and Global Positioning System (GPS) units. An OBU is a device that is mounted in a vehicle and used in VANETs to communicate with other OBUs and Road side units (RSUs). RSU is deployed in specific locations, like junctions and roadside areas. To communicate with the infrastructure network and vehicles, the RSU uses radio technology based on Dedicated Short-Range Communications (DSRC) [2].

Fig. 1
figure 1

V2V and V2I communication in VANETs

The non-efficient paths can face frequent interruptions due to the high movement of vehicles on the road. The mobility, frequent changes in network layout, and wireless communication can damage the path at any time without any symptoms. Additionally, the dynamic assets of VANETs such as dynamic topology with wireless communication may generate additional problems for communication. Because of the high-impact properties of VANETs, transmitting time-oriented data over wireless channels is a hard task [3, 4]. The message routing method which is in practice for VANETs should cope with VANET properties. The routing approaches need to tend to offer secure communication. Intruders can attack wireless communication in terms of passive or active attacks. Passive attacks are very hard to detect. The communication in V2V or V2I should be secure to avoid intruders from listening to the traffic. The vehicles in the path should be authenticated using valid security mechanisms.

Transmission of traffic-based/confidential messages through trusted or honest vehicles provides information security. VANET is an open-source wireless communication that is more vulnerable to various security attacks. For example, an attacker may modify/create a fake road congestion message for his benefit. Vehicles receiving a modified or fake message about traffic may make a wrong decision. Therefore, vehicles must authenticate before considering message transmission. Due to high mobility, communication time is very short and vehicles must be authenticated quickly for communication [5]. Therefore, VANETs require light white authentication mechanisms, and a group signature (GS) scheme is the best choice to authenticate vehicles in a short time. A group signature scheme allows the dynamic joining/leaving of vehicles with authentication features to provide security for information. Group Admin of GS is responsible for generating certificates and issuing/revoking certificates to group vehicles. Message signing is done through certificates, which provide low computational overhead and security for messages in VANETs. The location-aided method with group signature is the best solution to offer privacy, security, and authentication for VANETs.

Henceforth loss or delay in end-to-end data communication will cause panic and accidents in road transport. The shortest path with fewer intermediate vehicles can deliver the packets related to traffic or accident information quickly. The packets should not experience any type of delay such as processing delay, transmitting delay, propagation delay, queuing delay, waiting delay, or scheduling delay [6]. With certain modifications to routing approaches the delay issues will be solved [7, 8]. Security requirements should focus on VANET to ensure data integration, security, and authentication on data. The bio-based approaches incorporate the natural behavior of insects such as ants and bees to provide solutions for various problems such as scheduling, vehicle routing, optimization, etc., From the last decade the vast amount of enhancements introduced in VANET routing approaches with bio-based approaches. The Routing method's working style is modified with bio-inspired approaches to provide seamless data transmission with the required security.

This work significantly focuses on enhancing the routing methodology with a bio-based approach such as ACR to provide seamless data transmission among vehicles. ACR has significant advantages such as adaptability, high robustness, and distributed properties. All these advantages are the backbone of ACR to use in VANETs for routing. To impose security, the location-based group signature concept was adopted with ACR. The group signature enhances the ACR with privacy, security, and data integrity with end-to-end communication. Position-oriented group signature for the VANET system not only enhances the data security in transmission but improves the throughput and packet transmission ratio [9].

Currently, the routing domain of VANET needs extensive research to propose better routing protocols or mechanisms. In this context, ELAACR is introduced to provide secure communication in VANET. ELAACR fits the current state of VANET because seamless data transmission between vehicles is a challenging task due to VANET's rich set of dynamic characteristics. ELAACR relies on a location-aware approach and an adaptive approach such as ACR to deal with VANET characteristics. The decentralized and adaptive nature of ACR is suitable for solving dynamic and challenging situations of vehicular networks.

This work primarily aims to address the below problem statements.

  • The highly dynamic features of VANETs affect the reliability and security of the routing mechanism. Exchanging time-critical information about road conditions requires reliable and secure communication between vehicles/infrastructure.

  • Routing concerns such as high vehicle speeds and dynamic path breaks reduce the efficiency of the routing mechanism.

  • A high level of mobility causes unexpected irregular vehicle arrival/departure and general fluctuation in the VANETs network, which affects the VANETs routing strategy in a repeated path failure mode, resulting in message communication interruption.

  • In this context, a secure seamless data transmission mechanism is required for the routing mechanism to provide secure reliable communication without communication interruption to exchange time-critical data between vehicles.

1.1 The Novelty and Important Contributions of This Work Are as Follows

The novelty of the proposed work lies in introducing LAKM with ACR. LAKM provides a secure network and ACR generates efficient secure channels for seamless data transmission. Furthermore, ACR pheromone models have been improved to maintain high amounts of pheromone in optimal paths. ACR's novel optimal route discovery and route-handling mechanisms are rich in providing efficient routing for VANETs.

Contributions are,

  • The proposed scheme aims to determine the efficient and secure shortest path for secure seamless data transmission.

  • In the proposed model, we adopt group signature-based LAKM to build a secure network. A constructed secure network consists of authenticated vehicles for communication.

  • ACR algorithm is implemented in the proposed model and its modified pheromone patterns are configured to handle a high concentration of pheromones in optimal paths to find efficient secure shortest paths for seamless data transmission.

  • Novel optimal route discovery mechanism and route-handling mechanism of the proposed ACR are used to provide efficient routing and route handling for VANETs.

  • Using an efficient and secure shortest path with secure seamless data transmission increases efficiency in routing in terms of high throughput, high packet delivery, low overhead, and low end-to-end delay.

  • Furthermore, this work provides a comparison of ELAACR with existing schemes, i.e. EHACORP and F-ANT.

The rest of the manuscript is structured as follows. Section 2 is devoted to related work. The proposed work is described in Sect. 3. Section 4 covers simulation results and performance analysis and the last section concludes the proposed work.

2 Related Work

In the proposed work, a bio-inspired algorithm like an ant colony optimization (ACO) is combined with a group signature-oriented location-aided key management scheme to provide secure and reliable communication. In this context, this section provides a discussion of existing location-aided, group signature-oriented schemes and secure ACO-based works.

Muniyandi et al. [10] discussed the importance of location-aided routing (LAR) for dynamic VANETs. The authors found that LAR uses location information obtained from Global Positioning System GPS) sensors to locate nodes in the network. Using location information reduces the search space for a particular route, reducing the use of route discovery and route maintenance messages by limiting the search space to the communication range. It also helps to reduce the overhead. An extension for LAR [11, 12] improves the stability of routes by removing nodes based on direction. Nodes in the opposite direction to the origin are removed. The forward direction of nodes is considered based on the source direction for routing.

The work proposed by Gurumoorthi and Ayyasamy [13] is a combination of position-oriented and geocasting. The distance between vehicles is determined based on the current position of the vehicles. This work was carried out in two phases. In step 1, the source's next hop vehicles are selected for forwarding packets in the expected zone. In step 2, the geocast routing procedure is used and the desired zone is converted into a geocast region. This work proves the efficiency of position-oriented routing in terms of retransmission ratio and hop count. Pandey et al. [14] considered hop count as an important metric to evaluate the performance of VANET protocols. Enhanced Direction-Based Location-Aided Routing (DLAR) considers hop count and direction of vehicles for message forwarding. Route efficiency is estimated by hop count and duration. DLAR constructs routes with low overhead, minimum hops, and long lifetime.

Ali et al. [15] improve location-based routing by adding location privacy to vehicles. In this task, RSU helps vehicles with secure message transmission. A location privacy mechanism protects the vehicle's information from intruders. Message forwarding between source and target is achieved with highly efficient encryption/decryption techniques. This task provides location privacy protection for the entire routing process including vehicles, RSU, and intermediate cars. Additionally, end-to-end secure message forwarding is also a primary objective of this work.

The GPSR [16] (Greedy Perimeter Stateless Routing) is a most outstanding location-based routing convention. In GPSR stateless routing provides efficient paths. The greedy approach chooses legitimate nodes according to the greedy perimeter. Direction-Based Forwarding (DBF) [17] is a location-based steering convention that was originally presented by utilizing a predefined map direction (way) to control steering choices and forward bundles in a predefined way. The source indicates the direction of a parcel and forwards the packets in the specified direction toward the destination.

An authentication mechanism [18] based on a group signature scheme is proposed to authenticate vehicles as legitimate members of a group. Vehicle privacy is the main purpose of this work. This work focuses on V2V and V2R to provide secure communication by satisfying message integrity. Funderburg et al. [19] propose an improved group signature scheme to reduce pairing costs earned during pairing operations. Also, the cost of updating group key information is considered. The group signature has been modified to eliminate pairing operations and twin loads in key distribution systems. Pairing with the same private keys is eliminated to reduce the cost of the pairing operation. In Lu et al. [20] group signature allows any vehicle of the group to sign a packet anonymously on behalf of the group to provide privacy. This work proposes important changes to the group signature. Factors such as weight, reward, and punishment mechanisms are proposed to quantify the trustworthiness of shared information through a group signature scheme. Shangle Li et al. [21] use a double-key approach to satisfy the exculpability issue in group signatures. To address exculpability Shangle Li proposes a privacy-preserving scheme with group signature. This work combines group signature with an identity-based approach for offering trusted communication among vehicles, RSU, and trusted authorities.

Group signature [22] is used in VANETs to provide message authentication. Non-repudiation and unlinkability features combined to provide authentication functionality for vehicles and messages. Additionally, this work focuses on providing less burden by taking privacy and identity levels as a single scheme. Cryptographic and communication delays are analyzed to prove the efficiency of the routing scheme. This work also proves that transmitting messages with lower frequency provides quick delivery of urgent messages. A group signature [23] scheme allows vehicles to dynamically join a network to provide privacy for vehicle information. When joining a group, the group administrator authenticates the car and a group member certificate is generated for signing. The certificate is canceled when the vehicles leave the group. The proposed group signature scheme adds little overhead to improve the efficiency of the signature process. A group signature scheme with low overhead is suitable for dynamic networks.

To provide security [24] for messages transmitted between vehicles, a Certificate less aggregate signature (CAS) is proposed. This work applies CAS to a routing mechanism to provide vehicles with the ability to avoid leaking sensitive data during message transmission. CAS is suitable for implementation in VANETs to protect sensitive data. According to Lim et al. [25] a group signature mechanism is an ideal approach to protect message communication in VANETs from malicious users. The authors propose an effective key management approach based on a group signature scheme. A group is transformed into a domain with RSUs and vehicles to frame the topology. This mechanism securely exchanges group keys between vehicles. The use of Bloom filters improves privacy and security.

The work proposed by Chhikara and Patel [26] demonstrates ACO's robustness against failures and security. Artificial ants in ACO configure route information for routing. Only the information of the authenticated node is stored in the ant header for traveling between the source and destination. Saleem and Ahmed [27] use Enhanced Ant Colony Optimization (eACO) for secure routing of packets. eACO transmits packets securely by considering the header information of the packets. Encryption of header information in packets helps to protect packets from malicious nodes. eACO performs routing by considering the energy of nodes. The performance of eACO is evaluated in terms of PDR, overhead, and energy consumption. Zhang et al. [28] introduce security-aware fuzzy enhanced ACO for secure routing. The adoption of fuzzy logic with ACO improves the convergence speed of ACO. This task specifically identifies misbehaving nodes and avoids misbehaving nodes during routing. A fuzzy-oriented detection scheme robustly weights nodes based on limited information. This work also has the potential to provide a high level of robustness against blackhole and Sybil attacks.

Real-time message propagation in VANETs requires an energy-efficient shortest path without congestion to quickly deliver messages without delay. Ramamoorthy and Thangavelu [29] proposed an efficient routing scheme based on congestion and residual energy of nodes. Distance, congestion, and energy levels of nodes are key factors for route formation. This work focuses only on finding efficient routes but fails to provide security for paths. This work uses ACO with modified pheromone models for path establishment, data transfer, and path maintenance.

Maranur and Mathapati [30] introduce an ACO-based routing scheme for routing in VANETs. ACO uses a trust-based fitness function to compute a trust value for each node. Important reliability parameters used in trust value calculation are link quality, mobility, and buffer capacity. Routes are identified based on trusted values. Patel and Jhaveri [31] use ACO to send data packets to targets based on nodes' trust values. Security mechanisms are used to establish secure paths between the source and destination. Paths are safe from malicious attacks. ACO combines with a group signature scheme to establish routes. Source, destination, and intermediate nodes are authenticated before starting data transmission.

Anantapur and Patil [32] proposed an ACO-based modified ad hoc on-demand distance vector (MAODV) to provide secure packet transmission over ad hoc networks. ACO in MAODV calculates fitness functions based on belief, distance, node degree, and residual energy. A fitness value gives the fitness of a path, and the safest path is rich in fitness value. The route discovery method finds optimal routes based on fitness values. Essentially it improves AODV performance and prevents blackhole attacks to provide better packet transmission.

In Maheshwari and Bhardwaj [33] for secure route selection, the route selection parameter (RSP) is calculated at each node. RSP at each node is calculated based on packet forwarding ratio, cost, and bandwidth capacity. The route discovery mechanism selects intermediate nodes for routes with high RSP values. A path with a good packet forwarding ratio provides maximum delivery of packets and the authors consider this path to be more secure. Choosing a path with a higher capacity of bandwidth ensures faster delivery of packets.

A modified ACO [34] is used to establish the efficient shortest path based on the distance metric. Efficient routing is suitable for high packet delivery and throughput. A modification to ACO improves its convergence speed for low-density networks. When the network size increases dynamically, the convergence speed of ACO decreases. In the Enhanced Bio-Inspired Routing Algorithm (EBIRA) [35], Enhanced ACO finds routes based on distance, hop count, and signal strength. Routes identified in EBIRA are more efficient for routing with less overhead. Enhanced ACO generates less overhead for massive network changes, in turn increasing network performance.

Ramamoorthy and Thangavelu [36] proposed an EHACORP to improve the efficiency of the routing process with the shortest paths. EHACORP combines ACO with source-based routing for efficient route discovery. Multiple paths are identified and the most efficient path among the multiple paths is identified. The source specifically implements a route selection algorithm to select efficient routes. The efficiency of routes is determined based on hop count and distance. The source initiates route handling packets to repair the route for link breaks. EHACORP proves its efficiency in different road scenarios with different vehicle variations.

Fatemidokht and Kuchaki Rafsanjani [37] introduced F-ANT for efficient routing in VANETs. F-ANT uses ACO and fuzzy logic to estimate efficient routes, efficient routes are rich in providing optimal message dissemination. The efficiency of a path is determined based on the connectivity level of the links and the capability levels of the nodes. Connectivity levels deal with signal strength and the level of congestion of links. Capacity levels of nodes deal with bandwidth. ACO initiates the route discovery process to find routes based on connectivity and capability levels. NS2 was used to simulate F-ANT. Simulation results were conducted for real-time traffic scenarios and F-ANT outperformed in all aspects compared to on-demand and proactive protocols.

The position-based ACO [38] relies on the exact GPS-based location of vehicles and mobility directions to find stable paths. The location servers play a vital role in exchanging location information of vehicles. Routing tables are updated proactively to have up-to-date routing information. However global positioning will not be suitable for roads with tunnels. The proactive-based ACO [39] will quickly find optimal paths for VANETs, but periodic updates are necessary to maintain stable paths. The overhead is very high because the frequent exchange of routing information is required. The reactive-based ACO [40] is very suitable for VANETs. The paths are determined based on demand but a significant delay can occur. Hybrid ACO [41] combines proactive and reactive together to offer message routing. The transmission range of each vehicle is very important for hybrid routing. The proactive method is used to transmit a message within the geographical area of each node. The reactive method is utilized for routing the packets between the networks.

Multipath ACO [42] is suitable for continuous data transmission applications. Many paths will be elected for routing and data will be distributed among paths to reach the targets. Unicast ACO-based [43] methods will unicast data with a single path. Unicast ACO-type algorithms are not suitable for VANETs. The Quality of service (QoS) [43] based ACO algorithms have to satisfy many QoS metrics in routing. High-quality paths in terms of connectivity, robustness, adaptability, and efficiency are used in QoS routing. QoS-based routing will produce high overhead in routing. However significant benefits are high throughput with low latency. Furthermore, many ACO-based algorithms have been announced in the last decade to provide efficient routing. Certain modifications happen in traditional ACOs to improve their working style for increase its convergence speed. Table 1 summarizes existing position-based, group signature-oriented location-aided key management schemes and ACOs. This table presents scenarios, evaluation parameters, and tools/simulations of existing works.

Table 1 Summarization of existing works

In Table 1, Packet Delivery Ratio (PDR), End to End delay (E2E), Routing Overhead (RO), Throughput (T), Packet loss rate (PLR), Normalized routing load (NRL), Vehicle to RSU (V2R), Packet lost rate (PLR), Network Simulator (NS2), Certificate less aggregate signature (CAS).

3 Proposed VANET System

In this work, ELAACR is proposed to achieve seamless secure data transmission. The proposed VANET system works in two phases. Phase 1 implements a location-aided key management (LAKM) scheme based on group signature (GS) to establish a secure network, and Phase 2 uses ACR to find efficient secure paths for seamless data transmission. In Phase 1, the GS is computed among the vehicles in the network. The pair of public and private keys used for GS. GS allows any vehicle on the network to become a legitimate member of the group by signing the GS using the group's public key and the vehicle's private key. Wireless medium-based communication is more vulnerable to security issues but using a group signature scheme allows the proposed system to build a secure network.

In Phase 2, ACR is triggered to find an efficient secure path for seamless data transmission based on the pheromone concentration of the path. ACR uses Route Explorer Ants (REANTs) and Route Manage Ants (RMANTs) to discover routes. During new route discovery, REANTs deposit pheromones on the routes, and RMANTs update the pheromone-based on the old pheromone value and evaporation rate. RMANTs also calculate the pheromone summation for each route. A path with a higher pheromone value and lower hop count is selected for data transmission. Notably, during the route discovery phase, ACR uses the GS scheme to bring all vehicles of identified routes under a legitimate group. A legitimate group is a group consisting of vehicles that have been authenticated using the GS scheme. After selecting a path based on the pheromone summation value and hop count Data Carry Ants (DCAs) are created to transmit data between the source and destination using a secure established path. To handle link failures, ACR includes a route-handling mechanism. This mechanism maintains and repairs link breaks. Route Error Handling Ant (REHANT) and Acknowledgment ANT (AKANT) are used in the route handling mechanism.

Figure 2 illustrates the phases of ELAACR. In ELAACR, vehicles are positioned randomly. The LAKM ( Phase 1) approach computes GS. The ACR (Phase 2) is combined with LAKM to find an optimal and efficient secure path for seamless data transmission. ACR has an optimal route discovery mechanism for optimal route selection. The optimal route selection procedure enables REANTs and RMANTs to find several suitable routes, and the best optimal route is selected among the identified routes based on pheromone summation and vehicle count. ACR uses a route handling mechanism to efficiently handle sudden link breaks. In ELAACR, the network \(\left( N \right)\) includes a group of moving vehicles. \(N\) consists vehicles \(\left( {V1,V2, \ldots ,V_n } \right)\) and links \(\left( {L1,L2, \ldots ,L_n } \right)\). The links associate vehicles in \(N\).

Fig. 2
figure 2

Architecture of ELAACR

3.1 Phase 1: Location-Aided Key Management (LAKM) Scheme

LAKM relies on the GS method to construct a secure network. The GS is a key signature scheme with privacy features. In GS any legitimate member (vehicle) of the network can sign a forward packet using its private key and group public key. A GS is created with private and public keys. Any vehicle in the network can decrypt the signed packet by using a key pair such as public and private keys. A valid GS implies that the vehicle is a bonafide member of the group. Conversely, assuming two valid group signatures, determining whether they were produced by similar (or different) group members is computationally impossible. If a disagreement arises on a group signature, a distinct entity such as Group Manager can ask to open the signature and identify the genuine signer. This activity is denoted as Escrowed Anonymity. Based on anonymity, the GS is suitable for VANETs to impose security. The Vehicle can sign GS with its current location without tracking. The LAKM uses an offline group Manager (OGM) to initiate the GS scheme and enroll all vehicles as members in a group.

3.1.1 Phase 1 Needs the Following Specific Requirements to Construct a Secure Network

  • LOCATION: All vehicles in VANET must obtain their exact location reliably and securely using a GPS.

  • TIME: Vehicles in VANET should keep loosely synchronized clocks. These clocks can be obtained from the GPS.

  • RANGE: Uniform transmission range allotted to all vehicles as per Dedicated short-range communication (DSRC) and IEEE 802.11p. This allotment helps to find one-hop nodes for each vehicle.

  • MOBILITY: All nodes move randomly in the network according to the mobility model for a fixed amount of time.

3.1.2 Entities of GS

  • Group Manager (GM): Accountable for grouping the vehicles. GM allows vehicles to join and leave. De-anonymizing the signature for dispute is also the duty of GM. GM distributes the public key to all its members.

  • Legitimate Group Member (LGM): Authorized vehicles in the group. LGMs consist of private keys. This private key is used by the vehicle to sign the GS on behalf of a group.

  • Outside Vehicles: Vehicles that do not belong to the group. All these vehicles are eligible to become group members at any time.

3.1.3 Components of GS

  • SETUP: A polynomial time series method to output cryptographic keys such as public and private keys. The setup component is initially run by GM.

  • JOIN: A secure protocol between a new vehicle (wish to join a group) and GM. The output of this component is the private key for group members.

  • SIGN: A procedure run by a group member to generate GS using public and private keys.

  • VERIFY: Any member can verify GS using its private and group public key.

  • OPEN: Run by GM when a dispute occurs on GS.

  • REVOKE: Run by GM to withdraw the public key and dissolve the membership of the entity from the group.

3.1.4 Operations of LAKM

  • Step 1: Each vehicle broadcasts a hello packet with its information such as location, group public key, and time stamp. The GS is computed by using the above information. Each vehicle broadcasts its hello packet to its one-hop neighbors.

  • Step 2: While receiving a hello packet, each vehicle verifies GS by using its private key and group public key. If verification is successful, the vehicle re-broadcasts the hello packet to its one-hop neighbors for the next verification. Equation 1 indicates the elements of the hello packet. Figure 3 demonstrates how hello packets are broadcasted to the neighbors of each vehicle.

    $$Temp_{id} = \left( {\left( {Location_{GPS} \,_{Coordinates} ||\,Group\,Signature\,_{Public,private\,keys} } \right)\,Temp_{Key} = Key_{Number} } \right)$$
    (1)

    In Eq. 1, Tempid is a temporary identity allotted for the hello packet. Location GPS Coordinators are the X and Y coordinates of vehicles. Group signature is the signature computed between vehicles. TempKey is the temporary key used in the GS scheme.

Fig. 3
figure 3

Hello packets broadcasting

3.2 Ant Colony Routing (ACR)

ACR is the foremost practice for finding the best routes using pheromones. ACR uses the analogy of ACO to find the optimal paths as shown in Fig. 3. The analogy and behavior of ACO is a natural behavior. The ACO consists of artificial packets called ants such as FWDant and BWDant to find the road to food sources. When no path to a food source, the FWDant travels towards the destination by depositing the chemical substance called pheromone on their traveled path. All successful FWDant are converted into BWDant in the destination. BWDant travels in the reverse direction of FWDant to reach the source. At the same time, the BWDant updates the pheromone on its path. This analogy is considered in the proposed work to find the optimal routes. Table 2 shows the algorithm of ACR. As per the algorithm, the ACR initializes all required parameters, pheromone models are called to deposit and update the pheromone on the path until facing the end criteria. Figure 4 represents the movement of ants such as how FWDant and BWDant travel between the origin and target to find valid routes. The FWDant ants move towards a destination in the forward direction until they reach the destination. The successful FWDant transformed into BWDant to bring route information to the source.

Table 2 ACR-algorithm
Fig. 4
figure 4

Movements of ants toward the destination in ACR

3.2.1 Phase 2 Needs the Following Specific Requirements to Establish a Secure and Efficient Path

The ACR should be configured as follows to find routes.

  • The ACR should be configured dynamically to adjust pheromones based on control coefficients.

  • ACR has to generate REANT to find a route with the coordination of Phase 1.

  • ACR has to generate RMANT to manage the path and to bring path information to the generator of REANT.

  • ACR must have the ability to create REHANT to handle broken routes.

  • ACR has to create a DCA for sending data from source to destination.

3.2.2 Optimal Route Discovery Mechanism

When a source does not have a usable route to a destination to send data packets, a valid route must be determined by a routing mechanism. The ACR is utilized to discover the secure shortest path to a destination. To discover a valid route, the ACR requests REANT. The REANTs are created in source based on their neighbor table. Each vehicle maintains a neighbor table to keep the tract of one-hop nodes based on mobility. The REANTs start their journey toward the destination by following phases 1 and 2. REANTs pass from vehicle to vehicle toward the destination by following the probability rule and pheromone deposit formula. The structure of REANT is shown in Eq. 2. Equation 3 shows the probability rule and Eq. 4 represents the pheromone deposit formula. Equation 5 depicts the measurement of pheromones. Equation 6 shows how \(HOP_{count}\) is computed.

$$REANT\left( {S_{No} ,\,S_{add} ,D_{add} ,HOP_{count} Add{\,}_{{\text{Re}} cord},GS{\,}_{public,private\,Keys},\Gamma_{i,j} } \right)$$
(2)

In REANT, \(S_{No}\) is the sequence number used to discard duplicates, \(S_{add}\) is the source address, \(D_{add}\) is the destination address, \(HOP_{count}\) is the vehicle count. It indicates the total number of vehicles visited by REANT during its journey toward its destination. \(Add{\,}_{{\text{Re}} cord}\) is the record of vehicles, and the travel history contains identities of visited vehicles by REANT. \(GS{\,}_{public,private\,Keys}\) indicates group signature computed between two vehicles. \(\Gamma_{i,j}\) is the pheromone deposited by REANT.

$$p_{o,p} = \frac{{\Gamma_{o,p}^\alpha \eta_{o,p}^\beta }}{{\sum {\Gamma_{o,p}^\alpha \eta_{o,p}^\beta } }}$$
(3)

Equation 3, \(\Gamma_{o,p}^\alpha\) is the measure of pheromone on anxiety \(o,p\). \(\alpha\) is a metric to regulate the effect of \(\Gamma_{o,p}^{\,}\). \(\eta_{o,p}\) is the attractiveness of edge \(o,p\). \(\beta\) is a metric to regulate the effect of \(\eta_{o,p}\).

The volume of pheromone is deposited on the link between \(o,p\) using Eq. 4. The REANT deposits the pheromone on the path.

$$\Gamma_{o,p} = \Gamma_{o,p} + \Delta \Gamma_{o,p}$$
(4)

where \(\Gamma_{o,p}\) is the total volume of pheromones deposited by REANT. \(\Delta \Gamma_{o,p}\) s the measure of pheromones that need to be deposited based on Eq. 5.

$$\Delta \Gamma_{o,p} = \left\{ {\begin{array}{*{20}l} {\frac{1}{Lh_z }} \hfill & { if\, ant\, z\, moves\, on\, link\, o,p} \hfill \\ 0 \hfill & {otherwise} \hfill \\ \end{array} } \right.$$
(5)

where \(Lh_z\) is the cost of the zth ant’s visit.

$$HOP_{COUNT} = HOP_{COUNT} + 1$$
(6)

Initially, \(HOP_{COUNT}\) value is set to zero, and for every visit, its value is incremented by 1. Pheromone quantity is refreshed by the RMANT ants. All successful REANTs at a destination are converted into RMANTs and refresh the pheromone on the return path based on Eq. 7. The \(Add{\,}_{{\text{Re}} cord}\) of REANTs copied to \(Add{\,}_{{\text{Re}} cord}\) of RMANTs.

$$\Gamma ph_{i,j} = \left( {1 - \rho } \right)\,\Gamma_{i,j} + \sum_{k = 1}^m \Delta \Gamma_{i,j}$$
(7)

In Eq. 7, \(\rho\) is the pheromone rate evaporation, \(\Gamma_{i,j}\) is the old pheromone value, \(\Gamma ph_{i,j}\) is the pheromone refreshed by RMANT towards the destination to source. All RMANT reach the source by refreshing the pheromone on their way to the source. Equation 8 Shows the structure of RMANT.

$$RMANT\left( {S_{No} ,\,S_{add} ,D_{add} ,HOP_{count} Add{\,}_{{\text{Re}} cord},GS{\,}_{public,private\,Keys},\,\Gamma ph_{i,j} ,Ph_{SUM} } \right)$$
(8)

Fields of RMANT is similar to REANT except \(\Gamma ph_{i,j}\) and \(Ph_{SUM}\). \(\Gamma ph_{i,j}\) is the pheromone refreshed by RMANT. The \(Ph_{SUM}\) is the consolidation of pheromones from destination to source. The \(Ph_{SUM}\) is computed via Eq. 9.

$$Ph_{SUM} = \sum {\left( {\Gamma ph_{i,j} .D_{Add}^{Add_{{\text{Re}} cord} } :\Gamma ph_{i,j} .S_{Add}^{Add_{{\text{Re}} cord} } } \right)}$$
(9)

Equation 9, \(Ph_{SUM}\) is the summation of pheromones from destination to source. Once RMANTs reach the source from the destination, the RMANT with a high pheromone and low hop count is selected for path construction. The \(Add{\,}_{{\text{Re}} cord}\) of RMANT is copied to the header of Data Carry Ant (DCA). Equation 10 shows the format of DCA. Table 3 displays the route selection algorithm executed at the source after receiving RMANT. The source executes a route selection algorithm to select an optimal route for routing the packets. This algorithm outputs optimal paths based on pheromone summation and hop count, which are extracted from RMANTs.

$$DCA(S_{No} ,\,S_{add} ,D_{add} ,Add{\,}_{{\text{Re}} cord},Payload)$$
(10)
Table 3 Route selection algorithm

In Eq. 10 payload indicates the content of DCA.

3.2.3 Route-Handling Mechanism

The communication links in the path are more vulnerable due to mobility. After a certain time, the vehicles can move from the established path, which ends with path breaks. To handle link breaks efficient route-handling mechanisms are necessary. This work considers that the source receives acknowledgment ants (AKANTs) for all transmitted packets. The source fails to receive AKANTs only when packets do not reach the target. The segmentation and re-segmentation are followed based on window size. This work considers equal window sizes at the source and destination. When the source fails to receive acknowledgments, it assumes a path break happens and stops sending DCA ants. If the link fails, the vehicle adjacent to the failed link initiates a REHANT. REHANT is transmitted downstream to the source vehicle on the current route to warn of link failure. When the source vehicle receives REHANT, \(Add{\,}_{{\text{Re}} cord}\) of DCA is immediately cleared. Similarly, the source ignores previously used routes for data transmission based on the route ID. Next, the source vehicle calls the route handling process to select another efficient route for data transfer. Once the route is identified after the link break, the \(Add{\,}_{{\text{Re}} cord}\) of RMANT is copied to DCAs \(Add{\,}_{{\text{Re}} cord}\), and route ID is allotted to start data transmission. Equation 11 indicates REHANT and Eq. 12 indicates AKANT. Table 4 represents the algorithm for the route handling process.

$$REHANT\left( {S_{No} ,\,S_{add} ,D_{add} ,Add{\,}_{{\text{Re}} cord}} \right)$$
(11)
$$AKANT\left( {S_{No} ,\,S_{add} ,D_{add} ,Add{\,}_{{\text{Re}} cord}} \right)$$
(12)
Table 4 Route handling process

Consider Fig. 5 and accept that the link between vehicle M and vehicle O is broken. In ELAACR, the source commonly gets AKANT from the destination for successful packets. A link failure arises when a destination vehicle or an intermediate vehicle deviates from the predetermined path. When the source is unsuccessful in receiving AKANTs from the destination, the source interprets this as a link failure because the packets can not practice delay or loss if an efficient shortest path is used. The vehicle adjacent to the failed link (vehicle M) initiates REHANT and transmits it to the source. When receiving a REHANT, the source discards the route and calls the route handling process.

Fig. 5
figure 5

Route handling scenario

4 Simulation Results

4.1 Environment for Simulation

The proposed ELAACR and existing works EHACORP [36], and F-ANT [37] are implemented in NS 2.35 using C++ and Object Tool Command Language (OTcl). NS 2.35 is an open-source event-oriented simulator that is frequently employed in communication networks to simulate routing systems. To construct road scenarios for VANETs, the Java-based Mobility model generator for vehicular networks (MOVE) is utilized. MOVE is assembled on top of SUMO 0.22.0 (simulation of urban mobility). SUMO 0.22.0 is an open-source simulation platform utilized to simulate traffic in the VANET environment. SUMO 0.22.0 enables simulation of VANETs environment for ELAACR in integration with OpenStreetMap and MOVE. For simulation, the Hosur to Bengaluru highway (Part of the national highway) from OpenStreetMap is exported in the type of Extensible Markup Language (XML) such as osm.xml type and used this exported map as the road map for simulation. The exported XML file is converted into net.xml using net convert. The traffic modeler imports net.xml to produce traffic scenarios. The traffic modeler is a graphical user interface utilized to create vehicular traffic. TraNSLite is used for converting created traffic scenarios into Tool command language (TCL) for execution in NS 2.35. Figure 6 shows the simulation steps used in the implementation of the proposed work and existing works.

Fig. 6
figure 6

Simulation steps

The metrics such as T, PLR, PDR, OH, and EED, and according to the simulation period the average of EED and PDR is used to evaluate the performance of the proposed and existing works. Vehicle variations from 30 to 200 were used in the simulation to examine the results of the ELAACR, EHACORP, and F-ANT. In the simulation, IEEE 802.11p is utilized. It can provide a vehicle speed of 30 m/s (around 110 km/h) for urban, rural, and suburban environments. Dedicated short-range communication (DSRC) is used to consider the transmission range of each vehicle up to 350 m. The constant bit rate (CBR) model is followed to produce the traffic at a constant rate. The ACR algorithm in the proposed work follows the evaporation rate of 0.2, 0.3, 0.6, and 0.8. The tests were kept running for the accompanying packet sizes 512, and 1024 bytes. The performance of ELAACR, EHACORP, and F-ANT were analyzed for metrics with different vehicle variations and packet sizes. Table 5 gives the complete parameters set used in the simulation.

Table 5 Parameters set

4.2 Why are the Proposed ELAACR and the Existing EHACORP and F-ANT Tested in a Real-Time Road Scenario?

VANET is subject to normal changes in terms of vehicle variations. Road density is not the same in all cases. The validity of vehicles can change at any time to raise frequent network changes. To follow real-time road conditions for proposed and existing works, the Hosur to Bangalore highway from OpenStreetMap is considered. This observation helps to test all approaches by considering real-time traffic. Figure 7 shows the OpenStreetMap of Hosur to Bangalore highway imported from OpenStreetMap. Figure 8 shows the real-world mode of Sumo-gui bengaluru.sumo.cfg, used in the simulation. Different vehicle variations such as 30, 40, 50, 100, 150, and 200 are considered as scenarios or case studies to evaluate the behavior of the proposed and existing protocols in real time. Vehicles follow a speed of 0 to 30 m/s (about 110 km/h). Simulation tests follow different packet sizes such as 512 and 1024 bytes. Different variations such as packet sizes and vehicles helped to practically prove the efficiency of the proposed and existing works.

Fig. 7
figure 7

OpenStreetMap for Hosur to Bengaluru highway

Fig. 8
figure 8

A scenario of the Hosur to Bengaluru highway in the SUMO tool

4.3 Impact and Limitations of the Proposed ELAACR in VANET Environments

VANETS supports both highway and urban environments. A highway environment consists of only a few barriers and traffic signals. Vehicles face high speeds and rely on multi-hop communication to exchange messages between vehicles. An urban environment consists of different entities such as intersections, streets, traffic signals, crosswalks, buildings, etc. The availability of these entities affects signal transmission, which ends in packet loss. Additionally, vehicle speeds vary irregularly in urban environments due to traffic lights, crosswalks, and barriers; Hence, vehicles experience high variations in speed in this environment. Mobility assessment in urban environments is difficult. This study focuses on the implementation of the proposed ELAACR and existing works in a highway environment (Hosur to Bengaluru Highway: Part of the National Highway). ELAACR is compatible with the highway environment in the following ways.

Scalability: The ACR of ELAACR has the scalability to create REANT and other ants for different types of vehicles (30, 40, 50, 100, 150, and 200). ACR can generate many types of ants and adjust them according to network size and variations. Indirect communication between ants in ACR provides more scalable solutions for large-scale networks such as VANETs.

Adaptability: ELAACR's ACR is suitable for self-organized networks based on highly collaborative tasks. ACR's ants can perform assigned tasks based on a distributed method without human intervention. The behavior of ACR ants is deterministic. According to network changes, ants can be deployed for the ACR routing mechanism.

Fault tolerance: In ACR, link outage/interruption does not lead to catastrophic failures. ACR follows a strictly decentralized control system. Lack of specific vehicles or link breaks does not reduce routing performance.

Limitations of proposed ELAACR: The proposed ELAACR is implemented for highway road scenarios and finds optimal shortest paths for routing based on hop count and pheromone summation (intensity). However, in an urban environment, the high number of traffic signals and highly non-uniform speeds affect the density of vehicles on the road. In urban situations, ELAACR mechanisms can find the shortest routes with a large number of vehicles as hop count for routing, which increases the processing overhead. Further research is needed to refine ELAACR for urban environments.

4.4 The Proposed ELAACR is Compared with EHACORP and F-ANT, Why These Protocols?

The proposed ELAACR uses ACR in the routing mechanism, similarly, EHACORP and F-ANT also rely on ACO for the routing mechanism. ACO in EHACORP and F-ANT determine the shortest path with minimum hops between origin and destination. The proposed ELAACR relies on ACR to find a secure path with minimum hops. The reliance of EHACORP and F-ANT on Ant colony oriented routing raises grounds for comparing them with the proposed ELAACR. Table 6 depicts the comparison of ELAACR with existing works.

Table 6 Comparison of ELAACR with existing schemes

4.5 Evaluation Metrics

The ELAACR, EHACORP, and F-ANT are evaluated for the following metrics.

Throughput (T): T indicates the amount of data transmitted for the amount of time Tt. T can be evaluated via Eq. 13.

$$T = \left( {\frac{{\sum_{k = 1}^m {\text{Packets received}} }}{T_t }} \right)$$
(13)

Packet loss rate (PLR): PLR is the value for packets received for transmitted packets. Equation 14 is used to calculate PLR.

$$PLR = \left( {\sum_{l = 1}^m {{\text{Packets sent}} - \, \sum_{l = {1}}^m {\text{Packets received}} } } \right) \times 100$$
(14)

Packet delivery ratio (PDR): PDR gives the total percentage of packets received to the whole packets sent. Equation 15 is used for calculating PDR.

$$PDR = \left( {\frac{{\sum_{m = 1}^l {\text{Packets Received}} }}{{\sum_{{\text{i}} = {1}}^{\text{n}} {\text{Packets Send }} }}} \right)$$
(15)

Overhead (OH): OH is the percentage of whole data packets to total routing packets. Equation 16 is used to compute OH.

$$OH = \left( {\frac{R_P }{{D_P }}} \right)$$
(16)

End-to-End Delay (EED): EED is the time calculated from packet starting time to its reached time to destination. Equation 17 calculated EED.

$${\text{EED}} = \sum {\left( {\text{Packet Reached Time - Packet Starting Time}} \right)}$$
(17)

4.6 Performance Analysis

In the performance analysis section, ELAACR performance is compared with EHACORP and F-ANT.

4.6.1 Throughput (T)

Using a seamless secure shortest route with a restricted number of intermediate vehicles improves the throughput of the proposed ELAACR. In the proposed ELAACR, the group signature is used for establishing a secure route and the modified ACR is used to establish efficient and reliable paths for routing. The EHACORP concentrates only on finding the shortest path but not a secure and seamless path. Using group signatures provides privacy and authentication of vehicles. Only legitimate vehicles are allowed in path construction. Whereas in EHACORP only the shortest path is used for data transmission. The convergence speed of F-ANT is very low, which degrades its performance in terms of throughput. The modified ACR in ELAACR has a better convergence speed compared to F-ANT.

The simulation is performed with different packet sizes such as 512, and 1024 bytes. The average throughput of the proposed ELAACR is high compared to EHACORP and F-ANT. For packets of 512 bytes, ELAACR's average throughput is 680 kbps, while EHACORP's is 640 kbps, and F-ANT records 610 kbps. For 1024 bytes of packets ELAACR's average throughput is 600 kbps, while EHACORP's is 570 kbps, and F-ANT records 550 kbps. Figures 9 and 10 depict the throughput performance of all schemes for vehicle density and packet sizes.

Fig. 9
figure 9

Throughput at different vehicle densities for the 512 bytes packets

Fig. 10
figure 10

Throughput at different vehicle densities for the 1024-byte packets

4.6.2 Packet Loss Rate (PLR)

Using an optimal secure path reduces PLR in the proposed ELAACR. The legitimate nodes are only considered with a secure authentication mechanism for route construction. Similarly, the ACR of ELAACR finds the optimal route in terms of distance and hop count. In ELAACR the packets are routed through an optimal secure shortest path which avoids frequent misrouting of packets to reduce PLR. In EHACORP certain modifications to the packet header can introduce modifications for source-based routing to degrade PLR. In F-ANT, the whole routing information about the network is used for packet routing. In F-ANT malicious packets can modify information in the network which improves its PLR. The secure group signature in the proposed ELAACR can avoid the misrouting of packets through malicious nodes. Similarly, the efficient paths in the proposed ELAACR provide seamless data transmission. The PLR of the introduced ELAACR is very small compared to EHACORP and F-ANT. For packets of 512 bytes, ELAACR's average PLR is 0.015%, while EHACORP's is 0.070%, and F-ANT records 0.090%. For 1024 bytes of packets ELAACR's average PLR is 0.020, while EHACORP's is 0.090%, and F-ANT records 0.102%. Figures 11 and 12 depict the PLR performance of all schemes for vehicle density and packet sizes.

Fig. 11
figure 11

PLR at different vehicle densities for the packet size of 512 bytes

Fig. 12
figure 12

PLR at different vehicle densities for the packet size of 1024 bytes

4.6.3 Packet Delivery Ratio (PDR)

In the proposed ELAACR limiting the intermediate vehicles in the path improves the packets processing time. The quick way of processing packets and using a secure path improves PDR in the proposed ELAACR. In EHACORP connection setup delay degrades its PDR. F-ANT is not able to find optimal paths for the high-density network. The accumulation of packet headers is degraded in FANT for high-density vehicles. In the ELAACR, the ACR avoids connection setup delay by using improved route finding ants. In ELAACR, REANTs reduce the complexity of the route selection procedure. The complexity level of the ELAACR for high-density networks is too low which improves its PDR. The average PDR of the proposed ELAACR is high compared to EHACORP and F-ANT. For packets of 512 bytes, ELAACR's average PDR is 98.9%, while EHACORP's is 96.1%, and F-ANT records 94.1%. For 1024 bytes of packets ELAACR's average PDR is 98.1%, while EHACORP's is 94.1%, and F-ANT records 93.0%. Figures 13 and 14 depict the PDR performance of all schemes for vehicle density and packet sizes.

Fig. 13
figure 13

PDR at different vehicle densities for the packet size of 512 bytes

Fig. 14
figure 14

PDR at different vehicle densities for the packet size of 1024 bytes

4.6.4 Overhead (OH)

Depending on minimal control packets for network management reduce OH in the proposed ELAACR. The reactive nature of the proposed ELAACR uses controlled routing packets for connection establishment and connection maintenance. In EHACORP the source-based routing is not scalable to high-density networks and demands more resources to process the packets which increases its overhead. Similarly, in FANT organizing the whole colony information in the form of updating requires more control packets. The Dynamic ACR is scalable and requires fewer resources for the speedy processing of packets. Organizing only required routing information controls overhead in the proposed ELAACR. The average OH of the projected ELAACR is small compared to EHACORP and F-ANT. For packets of 512 bytes, ELAACR's average OH is 0.145%, while EHACORP's is 0.210%, and F-ANT records 0.240%. For 1024 bytes of packets ELAACR's average PDR is 0.169%, while EHACORP's is 0.280%, and F-ANT records 0.301%. Figures 15 and 16 depict the OH performance of all schemes for vehicle density and packet sizes.

Fig. 15
figure 15

OH at different vehicle densities for the packet size of 512 bytes

Fig. 16
figure 16

OH at different vehicle densities for the packet size of 1024 bytes

4.6.5 End-to-End Delay (EED)

Seamless data transmission in the proposed ELAACR reduces its EED. The path in the proposed ELAACR is optimal and rich in terms of short distance, security, and the number of intermediate vehicles. Controlling the path length with fewer vehicles reduces EED in ELAACR. EHACORP’s optimal route produces low EED than FANT. The slow convergence speed of FANT increases EED. Utilizing a secure shortest path with seamless data transmission reduces the EED of the proposed work. The average EED of the projected ELAACR is low compared to EHACORP and F-ANT. For packets of 512 bytes, ELAACR's average EED is 0.15 s, while EHACORP's is 0.29 s, and F-ANT records 0.59 s. For 1024 bytes of packets ELAACR's average PDR is 0.17 s, while EHACORP's is 0.40 s, and F-ANT records 0.70 s. Figures 17 and 18 depict the EED performance of all schemes for vehicle density and packet sizes.

Fig. 17
figure 17

EED at different vehicle densities for the packet size of 512 bytes

Fig. 18
figure 18

EED at different vehicle densities for the packet size of 1024 bytes

4.6.6 EED and PDR for Simulation Time (ST)

To check the efficiency of the proposed ELAACR against EHACORP and F-ANT whole ST is used. The Unit of time considered as ST is 500 s. The proposed ELAACR experiences better performance in terms of EED and PDR compared to EHACORP and F-ANT for the whole ST. Using a secure path with optimal connectivity enhances the PDR and EED of the proposed ELAACR. Additionally, the fast convergence speed of ACR and quick processing of all types of packets improves performance in terms of EED and PDR. Figures 19 and 20 depict the EED performance of all schemes for vehicle density and packet sizes. Figures 21 and 22 depict the PDR performance of all schemes for vehicle density and packet sizes. Table 7 depicts the experimental results of the proposed ELAACR, EHACORP, and F-ANT.

Fig. 19
figure 19

EED for vehicle density with 512 bytes packets

Fig. 20
figure 20

EED for vehicle density with 1024 bytes packets

Fig. 21
figure 21

PDR for vehicle density with 512 bytes packets

Fig. 22
figure 22

PDR for vehicle density with 1024 bytes packets

Table 7 Experimental results

5 Conclusion

Information in VANETs is considered time-critical and there is a high demand for timely distribution of information about traffic, accidents, and other important information. A routing mechanism should support building secure seamless data transmission paths for communication between vehicles. Therefore, this work proposes ELAACR for VANETs to achieve seamless secure data transmission. The ELAACR works in two phases. In Phase 1, LAKM uses a group signature scheme to construct a secure network. Phase 2 relies on ACR to find efficient secure shortest path for seamless data transmission over a secure network. The combination of LAKM and ACR offers an efficient shortest path with low intermediate vehicles for seamless data communication. The proposed work is simulated in Network Simulator (NS 2.35).

Using a seamless secure shortest route with a restricted number of intermediate vehicles improves the throughput of the proposed ELAACR. For all data rates, the average throughput of ELAACR is 640 Kbps whereas EHACORP and F-ANT achieve 605 Kbps and 580 Kbps. Allowing only legitimate nodes through the group signature concept to construct a secure path reduces the PLR of the proposed ELAACR. For all data rates, the average PLR of ELAACR is 0.018% whereas EHACORP and F-ANT achieve 0.080% and 0.096%. The quick delivery of packets with quick processing time improves the PDR of the proposed ELAACR. For all data rates, the average PDR of ELAACR is 98.5% whereas EHACORP and F-ANT achieve 95.1% and 93.55%. Using very limited control packets in a controlled manner improves the OH of the proposed ELAACR. For all data rates, the average OH of ELAACR is 0.157% whereas EHACORP and F-ANT achieve 0.245% and 0.270%. Seamless data transmission in the proposed ELAACR reduces its EED. The proposed ELAACR records 0.16 s whereas EHACORP and F-ANT record 0.34 s and 0. 64 s. Additionally, for ST the proposed ELAACR records good improvements. Using efficient routes for uninterrupted data transmission increases the performance of the projected ELAACR in terms of PDR and EED based on ST.

The proposed ELAACR is limited and intended to offer optimal routing for VANETs in highway scenarios. The functioning of ELAACR is to improve for urban environment to deal with significant diversities in terms of intersections, streets, traffic signals, crosswalks, buildings, etc. The availability of more obstacles affects signal transmission, which ends in non-efficient routing. The proposed ELAACR is limited and intended to offer optimal routing for VANETs in highway scenarios. The working method of ELAACR can be improved for urban environments with different road scenarios to deal with significant variations in terms of intersections, streets, traffic signals, crosswalks, buildings, etc. The availability of more obstacles affects signal transmission, which ends in non-efficient routing. Furthermore, the VANETs need to handle huge data on time which requires attention to congestion schemes to avoid congested routing. By considering this demand the ELAACR needs to be enhanced with congestion-oriented schemes to provide more efficient routing. Congestion models to detect congestion at the link and node levels need to be incorporated with ELAACR to improve its efficiency.