Skip to main content
Log in

Performance and Analysis of Advanced and Enhanced Security Protocol for Vehicular Ad Hoc Networks (VANETs)

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

VANETs- Vehicular Ad Hoc Networks depends on organizing the innovation where the vehicles go about as versatile hubs for shaping a correspondence arrange. The arrangement of vehicular specially appointed systems doesn't just encourage novel telematics applications. The selection of dynamic wellbeing application raises new dangers to street wellbeing if security issues are not appropriately taken care-of. An extraordinary dynamic security application is viewed as the empowers those foresights the passing of the trading of nearby threat alerts that depends on singular perceptions. VANET is considered by many specialist co-ops in urban situations. As it were, communicate tempest corrupts the directing presentation. The issue is addressed and examined by various protocols such as AODV, DSR, DYMO, TORA and TIHOO. The proposed protocol Advanced and enhanced security protocol for VANET (AESP-VANET) which is an upgraded that also depends on improved fluffy and cuckoo ways for dealing with location of the steadiest way between a source and a goal hub. The disclosure of the courses is restricted brilliantly by AESP-VANET by utilizing fuzzy framework thereby constraining the messages that are course demand. The improved cuckoo calculation in hybrid methodology, which is one of the best meta-calculations particularly in the huge inquiry space, brilliantly chooses the most steady and ideal course among realized courses by computing an upgraded wellness work. AESP-VANET gives out the result using Network Simulator-2. This shows a tremendous improvement in the throughput, overhead, and many more parameters which is the objective of the proposed model.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Oh, J. S., Park, C. U., & Lee, S. B. (2014). NFC-based mobile payment service adoption and diffusion. JoC, 5(2), 8–14.

    Google Scholar 

  2. Smys, S., & Haoxiang, W. (2021). Security enhancement in smart vehicle using blockchain-based architectural framework. Journal of Artificial Intelligence, 3(02), 90–100.

    Google Scholar 

  3. Kumari, N. D., & Shylaja, B. S. (2019). AMGRP: AHP-based multimetric geographical routing protocol for urban environment of VANETs. Journal of King Saud University-Computer and Information Sciences, 31(1), 72–81.

    Article  Google Scholar 

  4. Barekatain, B., Khezrimotlagh, D., Maarof, M. A., Ghaeini, H. R., Quintana, A. A., & Cabrera, A. T. (2015). Efficient P2P live video streaming over hybrid WMNs using random network coding. Wireless Personal Communications, 80(4), 1761–1789.

    Article  Google Scholar 

  5. Hariharakrishnan, J., & Bhalaji, N. (2021). Adaptability analysis of 6LoWPAN and RPL for healthcare applications of internet-of-things. Journal of ISMAC, 3(02), 69–81.

    Article  Google Scholar 

  6. Sharma, B., Bhatia, R. S., & Singh, A. K. (2014). A token based protocol for mutual exclusion in mobile ad hoc networks. Journal of Information Processing Systems, 10(1), 36–54.

    Article  Google Scholar 

  7. Dehghani, S., Barekatain, B., & Pourzaferani, M. (2018). An enhanced energy-aware cluster-based routing algorithm in wireless sensor networks. Wireless Personal Communications, 98(1), 1605–1635.

    Article  Google Scholar 

  8. Wu, C., Ohzahata, S., & Kato, T. (2012). Routing in vanets: A fuzzy constraint q-learning approach. In 2012 IEEE global communications conference (GLOBECOM) (pp. 195–200). IEEE.

  9. Wu, T. Y., Wang, Y. B., & Lee, W. T. (2012). Mixing greedy and predictive approaches to improve geographic routing for VANET. Wireless Communications and Mobile Computing, 12(4), 367–378.

    Article  Google Scholar 

  10. Rana, H., Thulasiraman, P., & Thulasiram, R. K. (2013). MAZACORNET: Mobility aware zone based ant colony optimization routing for VANET. In 2013 IEEE congress on evolutionary computation (pp. 2948–2955). IEEE.

  11. Chung, Y., Choi, S., & Won, D. (2013). Lightweight anonymous authentication scheme with unlinkability in global mobility networks. Journal of Convergence, 4(4), 23–29.

    Google Scholar 

  12. Park, S. W., & Lee, I. Y. (2013). Anonymous authentication scheme based on NTRU for the protection of payment information in NFC mobile environment. Journal of Information Processing Systems, 9(3), 461–476.

    Article  Google Scholar 

  13. Sinha, A., & Lobiyal, D. K. (2013). Performance evaluation of data aggregation for cluster-based wireless sensor network. Human-Centric Computing and Information Sciences, 3(1), 13.

    Article  Google Scholar 

  14. Qureshi, K. N., Abdullah, A. H., & Altameem, A. (2017). Road aware geographical routing protocol coupled with distance, direction and traffic density metrics for urban vehicular ad hoc networks. Wireless Personal Communications, 92(3), 1251–1270.

    Article  Google Scholar 

  15. Gohar, M., & Koh, S. J. (2013). A network-based handover scheme in HIP-based mobile networks. Journal of Information Processing Systems, 9(4), 651–659.

    Article  Google Scholar 

  16. Fatemidokht, H., & Rafsanjani, M. K. (2018). F-Ant: An effective routing protocol for ant colony optimization based on fuzzy logic in vehicular ad hoc networks. Neural Computing and Applications, 29(11), 1127–1137.

    Article  Google Scholar 

  17. Dehghani, S., Pourzaferani, M., & Barekatain, B. (2015). Comparison on energy-efficient cluster based routing algorithms in wireless sensor network. Procedia Computer Science, 72, 535–542.

    Article  Google Scholar 

  18. Smys, S., Abul, B., & Wang, H. (2021). Taxonomy Classification and comparison of routing protocol based on energy efficient rate. Journal of ISMAC, 3(02), 96–110.

    Google Scholar 

  19. Al-Sultan, S., Al-Doori, M. M., Al-Bayatti, A. H., & Zedan, H. (2014). A comprehensive survey on vehicular ad hoc network. Journal of network and computer applications, 37, 380–392.

    Article  Google Scholar 

  20. Smys, S., & Joe, M. C. V. (2021). Metric routing protocol for detecting untrustworthy nodes for packet transmission. Journal of Information Technology, 3(02), 67–76.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to A. Ganesh.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Humans and Animals Participants

Humans and animals are not involved in this research wok.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ganesh, A., Ayyasamy, S. & Kumar, N.M.S. Performance and Analysis of Advanced and Enhanced Security Protocol for Vehicular Ad Hoc Networks (VANETs). Wireless Pers Commun 121, 3163–3183 (2021). https://doi.org/10.1007/s11277-021-08868-4

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-021-08868-4

Keywords

Navigation