Skip to main content
Erschienen in: Wireless Personal Communications 4/2020

19.04.2020

A Highly Secured QoS Aware Routing Algorithm for Software Defined Vehicle Ad-Hoc Networks Using Optimal Trust Management Scheme

verfasst von: Shakeel Ahmed, N. V. K. Ramesh, B. Naresh Kumar Reddy

Erschienen in: Wireless Personal Communications | Ausgabe 4/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Recent reports show that the millions of people killed each year in the road accidents are due to high density vehicles and traffic environment. The road traffic safety has been an unsolvable problem in recent population. Generally, nodes in vehicle ad hoc networks have a relatively high speed, while there is a major issue to provide the accurate data transmission between two nodes. Many research works have been undertaken to solve these issues by trust based techniques. In this paper, a highly secured QoS aware routing algorithm (HSQ-RA) using optimal trust management scheme is proposed. In HSQ-RA, the multi-hop clustering is performed by improved whale optimization algorithm and the inter-cluster routing is done using the trust values. The multiple constraints are used to calculate the trust of each node and optimized by the trust search algorithm. The simulation result exhibits that the proposed HSQ-RA algorithm provides better quality of service (QoS), delivery rate, faster way to discover routing and reduce loss rate.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Wu, S. (2002). A Multi-channel MAC protocol with power control for multi-hop mobile ad hoc networks. The Computer Journal, 45(1), 101–110.MATHCrossRef Wu, S. (2002). A Multi-channel MAC protocol with power control for multi-hop mobile ad hoc networks. The Computer Journal, 45(1), 101–110.MATHCrossRef
2.
Zurück zum Zitat Leinmuller, T., Schoch, E., & Kargl, F. (2006). Position verification approaches for vehicular ad hoc networks. IEEE Wireless Communications, 13(5), 16–21.CrossRef Leinmuller, T., Schoch, E., & Kargl, F. (2006). Position verification approaches for vehicular ad hoc networks. IEEE Wireless Communications, 13(5), 16–21.CrossRef
3.
Zurück zum Zitat Guclu, S. S., & Altilar, D. T. (2014). Uplink utilization with V2V2R communications in clustered vehicular networks. In 4th international conference on wireless communications, vehicular technology, information theory and aerospace & electronic systems (VITAE), Aalborg (pp. 1–5) Guclu, S. S., & Altilar, D. T. (2014). Uplink utilization with V2V2R communications in clustered vehicular networks. In 4th international conference on wireless communications, vehicular technology, information theory and aerospace & electronic systems (VITAE), Aalborg (pp. 1–5)
4.
Zurück zum Zitat Fascista, A., Ciccarese, G., Coluccia, A., & Ricci, G. (2017). A localization algorithm based on V2I communications and AOA estimation. IEEE Signal Processing Letters, 24(1), 126–130.CrossRef Fascista, A., Ciccarese, G., Coluccia, A., & Ricci, G. (2017). A localization algorithm based on V2I communications and AOA estimation. IEEE Signal Processing Letters, 24(1), 126–130.CrossRef
5.
Zurück zum Zitat Nilsson, M., Gustafson, C., Abbas, T., & Tufvesson, F. (2017). A measurement-based multilink shadowing model for V2V network simulations of highway scenarios. IEEE Transactions on Vehicular Technology, 66(10), 8632–8643.CrossRef Nilsson, M., Gustafson, C., Abbas, T., & Tufvesson, F. (2017). A measurement-based multilink shadowing model for V2V network simulations of highway scenarios. IEEE Transactions on Vehicular Technology, 66(10), 8632–8643.CrossRef
6.
Zurück zum Zitat Wasef, A., Lu, R., Lin, X., & Shen, X. (2010). Complementing public key infrastructure to secure vehicular ad hoc networks security and privacy in emerging wireless networks. IEEE Wireless Communications, 17(5), 22–28.CrossRef Wasef, A., Lu, R., Lin, X., & Shen, X. (2010). Complementing public key infrastructure to secure vehicular ad hoc networks security and privacy in emerging wireless networks. IEEE Wireless Communications, 17(5), 22–28.CrossRef
7.
Zurück zum Zitat Isaac, J., Zeadally, S., & Camara, J. (2010). Security attacks and solutions for vehicular ad hoc networks. IET Communications, 4(7), 894.MathSciNetMATHCrossRef Isaac, J., Zeadally, S., & Camara, J. (2010). Security attacks and solutions for vehicular ad hoc networks. IET Communications, 4(7), 894.MathSciNetMATHCrossRef
8.
Zurück zum Zitat Zhang, Lei, Wu, Qianhong, Solanas, A., & Domingo-Ferrer, J. (2010). A scalable robust authentication protocol for secure vehicular communications. IEEE Transactions on Vehicular Technology, 59(4), 1606–1617.CrossRef Zhang, Lei, Wu, Qianhong, Solanas, A., & Domingo-Ferrer, J. (2010). A scalable robust authentication protocol for secure vehicular communications. IEEE Transactions on Vehicular Technology, 59(4), 1606–1617.CrossRef
9.
Zurück zum Zitat Dietzel, S., Schoch, E., Konings, B., Weber, M., & Kargl, F. (2010). Resilient secure aggregation for vehicular networks. IEEE Network, 24(1), 26–31.CrossRef Dietzel, S., Schoch, E., Konings, B., Weber, M., & Kargl, F. (2010). Resilient secure aggregation for vehicular networks. IEEE Network, 24(1), 26–31.CrossRef
10.
Zurück zum Zitat Wasef, A., & Shen, X. (2013). EMAP: Expedite message authentication protocol for vehicular ad hoc networks. IEEE Transactions on Mobile Computing, 12(1), 78–89.CrossRef Wasef, A., & Shen, X. (2013). EMAP: Expedite message authentication protocol for vehicular ad hoc networks. IEEE Transactions on Mobile Computing, 12(1), 78–89.CrossRef
11.
Zurück zum Zitat Mershad, K., & Artail, H. (2013). A framework for secure and efficient data acquisition in vehicular ad hoc networks. IEEE Transactions on Vehicular Technology, 62(2), 536–551.CrossRef Mershad, K., & Artail, H. (2013). A framework for secure and efficient data acquisition in vehicular ad hoc networks. IEEE Transactions on Vehicular Technology, 62(2), 536–551.CrossRef
12.
Zurück zum Zitat Guo, S., Zeng, D., & Xiang, Y. (2014). Chameleon hashing for secure and privacy-preserving vehicular communications. IEEE Transactions on Parallel and Distributed Systems, 25(11), 2794–2803.CrossRef Guo, S., Zeng, D., & Xiang, Y. (2014). Chameleon hashing for secure and privacy-preserving vehicular communications. IEEE Transactions on Parallel and Distributed Systems, 25(11), 2794–2803.CrossRef
13.
Zurück zum Zitat Bhoi, S., & Khilar, P. (2015). SIR: A secure and intelligent routing protocol for vehicular ad hoc network. IET Networks, 4(3), 185–194.CrossRef Bhoi, S., & Khilar, P. (2015). SIR: A secure and intelligent routing protocol for vehicular ad hoc network. IET Networks, 4(3), 185–194.CrossRef
14.
Zurück zum Zitat Li, W., & Song, H. (2016). ART: An attack-resistant trust management scheme for securing vehicular ad hoc networks. IEEE Transactions on Intelligent Transportation Systems, 17(4), 960–969.CrossRef Li, W., & Song, H. (2016). ART: An attack-resistant trust management scheme for securing vehicular ad hoc networks. IEEE Transactions on Intelligent Transportation Systems, 17(4), 960–969.CrossRef
15.
Zurück zum Zitat Wang, F., Xu, Y., Zhang, H., Zhang, Y., & Zhu, L. (2016). 2FLIP: A two-factor lightweight privacy-preserving authentication scheme for VANET. IEEE Transactions on Vehicular Technology, 65(2), 896–911.CrossRef Wang, F., Xu, Y., Zhang, H., Zhang, Y., & Zhu, L. (2016). 2FLIP: A two-factor lightweight privacy-preserving authentication scheme for VANET. IEEE Transactions on Vehicular Technology, 65(2), 896–911.CrossRef
16.
Zurück zum Zitat Chuang, Ming-Chin, & Lee, Jeng-Farn. (2014). TEAM: Trust-extended authentication mechanism for vehicular ad hoc networks. IEEE Systems Journal, 8(3), 749–758.CrossRef Chuang, Ming-Chin, & Lee, Jeng-Farn. (2014). TEAM: Trust-extended authentication mechanism for vehicular ad hoc networks. IEEE Systems Journal, 8(3), 749–758.CrossRef
17.
Zurück zum Zitat Zhong, H., Wen, J., Cui, J., & Zhang, S. (2016). Efficient conditional privacy-preserving and authentication scheme for secure service provision in VANET. Tsinghua Science and Technology, 21(6), 620–629.CrossRef Zhong, H., Wen, J., Cui, J., & Zhang, S. (2016). Efficient conditional privacy-preserving and authentication scheme for secure service provision in VANET. Tsinghua Science and Technology, 21(6), 620–629.CrossRef
18.
Zurück zum Zitat Xie, Y., Wu, L., Zhang, Y., & Shen, J. (2016). Efficient and secure authentication scheme with conditional privacy-preserving for VANETs. Chinese Journal of Electronics, 25(5), 950–956.CrossRef Xie, Y., Wu, L., Zhang, Y., & Shen, J. (2016). Efficient and secure authentication scheme with conditional privacy-preserving for VANETs. Chinese Journal of Electronics, 25(5), 950–956.CrossRef
19.
Zurück zum Zitat Shim, K. (2012). An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks. IEEE Transactions on Vehicular Technology, 61(4), 1874–1883.CrossRef Shim, K. (2012). An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks. IEEE Transactions on Vehicular Technology, 61(4), 1874–1883.CrossRef
20.
Zurück zum Zitat Shao, J., Lin, X., Lu, R., & Zuo, C. (2016). A threshold anonymous authentication protocol for VANETs. IEEE Transactions on Vehicular Technology, 65(3), 1711–1720.CrossRef Shao, J., Lin, X., Lu, R., & Zuo, C. (2016). A threshold anonymous authentication protocol for VANETs. IEEE Transactions on Vehicular Technology, 65(3), 1711–1720.CrossRef
21.
Zurück zum Zitat Cui, J., Zhang, J., Zhong, H., & Xu, Y. (2017). SPACF: A secure privacy-preserving authentication scheme for VANET with Cuckoo filter. IEEE Transactions on Vehicular Technology, 66(11), 10283–10295.CrossRef Cui, J., Zhang, J., Zhong, H., & Xu, Y. (2017). SPACF: A secure privacy-preserving authentication scheme for VANET with Cuckoo filter. IEEE Transactions on Vehicular Technology, 66(11), 10283–10295.CrossRef
22.
Zurück zum Zitat Wazid, M., Das, A., Kumar, N., Odelu, V., Goutham Reddy, A., Park, K., et al. (2017). Design of lightweight authentication and key agreement protocol for vehicular ad hoc networks. IEEE Access, 5, 14966–14980.CrossRef Wazid, M., Das, A., Kumar, N., Odelu, V., Goutham Reddy, A., Park, K., et al. (2017). Design of lightweight authentication and key agreement protocol for vehicular ad hoc networks. IEEE Access, 5, 14966–14980.CrossRef
23.
Zurück zum Zitat Hashem Eiza, M., Owens, T., & Ni, Q. (2016). Secure and robust multi-constrained QoS aware routing algorithm for VANETs. IEEE Transactions on Dependable and Secure Computing, 13(1), 32–45.CrossRef Hashem Eiza, M., Owens, T., & Ni, Q. (2016). Secure and robust multi-constrained QoS aware routing algorithm for VANETs. IEEE Transactions on Dependable and Secure Computing, 13(1), 32–45.CrossRef
24.
Zurück zum Zitat Mirjalili, S., & Lewis, A. (2016). The Whale optimization algorithm. Advances in Engineering Software, 95, 51–67.CrossRef Mirjalili, S., & Lewis, A. (2016). The Whale optimization algorithm. Advances in Engineering Software, 95, 51–67.CrossRef
Metadaten
Titel
A Highly Secured QoS Aware Routing Algorithm for Software Defined Vehicle Ad-Hoc Networks Using Optimal Trust Management Scheme
verfasst von
Shakeel Ahmed
N. V. K. Ramesh
B. Naresh Kumar Reddy
Publikationsdatum
19.04.2020
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 4/2020
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-020-07293-3

Weitere Artikel der Ausgabe 4/2020

Wireless Personal Communications 4/2020 Zur Ausgabe

Neuer Inhalt