Skip to main content
Top
Published in: Wireless Networks 8/2020

05-07-2020

Optimal solution for malicious node detection and prevention using hybrid chaotic particle dragonfly swarm algorithm in VANETs

Authors: S. Prabakeran, T. Sethukarasi

Published in: Wireless Networks | Issue 8/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Vehicular ad hoc networks (VANETs) have the ability to make changes in travelling and driving mode of people and so on, in which vehicle can broadcast and forward the message related to emergency or present road condition. The safety and efficiency of modern transportation system is highly improved using VANETs. However, the vehicular communication performance is weakened with the sudden emergence of distributed denial of service (DDoS) attacks. Among other attacks, DDoS attack is the fastest attack degrading the VANETs performance due to its node mobility nature. Also, the attackers (cyber terrorists, politicians, etc.) have now considered the DDoS attack as a network service degradation weapon. In current trend, there is a quick need for mitigation and prevention of DDoS attacks in the exploration field. To resolve the conflict of privacy preservation, we propose a fast and secure HCPDS based framework for DDoS attack detection and prevention in VANETs. The Road Side Units (RSUs) have used HCPDS algorithm to evaluate the fitness values of all vehicles. This evaluation process is done for effective detection of spoofing and misbehaving nodes by comparing the obtained fitness value with the statistical information (packet factors, RSU zone, and vehicle dynamics) gathered from the vehicles. The credentials of all worst nodes are cancelled to avoid further communication with other vehicles. In HCPDS algorithm, the PSO updation strategy is added to Dragon fly algorithm to improve the search space. In addition, Chaos theory is applied to tune the parameters of proposed HCPDS algorithm. From the experimental results, it proved that the HCPDS based proposed approach can efficiently meet the requirements of security and privacy in VANETs.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Wafa, B. J., Mauro, C., & Chhagan, L. (2020). Security and design requirements for software-defined VANETs. Computer Networks, 169, 107099. Wafa, B. J., Mauro, C., & Chhagan, L. (2020). Security and design requirements for software-defined VANETs. Computer Networks, 169, 107099.
2.
go back to reference Deb, N., Chakraborty, M., & Chaki, N. (2014). CORIDS: A cluster-oriented reward-based intrusion detection system for wireless mesh networks. Security and Communication Networks, 7(3), 532–543. Deb, N., Chakraborty, M., & Chaki, N. (2014). CORIDS: A cluster-oriented reward-based intrusion detection system for wireless mesh networks. Security and Communication Networks, 7(3), 532–543.
3.
go back to reference Kumar, N., & Chilamkurti, N. (2014). Collaborative trust aware intelligent intrusion detection in VANETs. Computers & Electrical Engineering, 40(6), 1981–1996. Kumar, N., & Chilamkurti, N. (2014). Collaborative trust aware intelligent intrusion detection in VANETs. Computers & Electrical Engineering, 40(6), 1981–1996.
4.
go back to reference Misra, S., Venkata Krishna, P., & Abraham, K. I. (2011). A stochastic learning automata based solution for intrusion detection in vehicular ad hoc networks. Security and Communication Networks, 4(6), 666–677. Misra, S., Venkata Krishna, P., & Abraham, K. I. (2011). A stochastic learning automata based solution for intrusion detection in vehicular ad hoc networks. Security and Communication Networks, 4(6), 666–677.
5.
go back to reference Jiang, S., Zhu, X., & Wang, L. (2016). An efficient anonymous batch authentication scheme based on HMAC for VANETs. IEEE Transactions on Intelligent Transportation Systems, 17(8), 2193–2204. Jiang, S., Zhu, X., & Wang, L. (2016). An efficient anonymous batch authentication scheme based on HMAC for VANETs. IEEE Transactions on Intelligent Transportation Systems, 17(8), 2193–2204.
6.
go back to reference Li, Q., Malip, A., Martin, K. M., Ng, S.-L., & Zhang, J. (2012). A reputation-based announcement scheme for VANETs. IEEE Transactions on Vehicular Technology, 61(9), 4095–4108. Li, Q., Malip, A., Martin, K. M., Ng, S.-L., & Zhang, J. (2012). A reputation-based announcement scheme for VANETs. IEEE Transactions on Vehicular Technology, 61(9), 4095–4108.
7.
go back to reference Kerrache, C. A., Lagraa, N., Calafate, C. T., & Lakas, A. (2017). TFDD: A trust-based framework for reliable data delivery and DoS defense in VANETs. Vehicular Communications, 9, 254–267. Kerrache, C. A., Lagraa, N., Calafate, C. T., & Lakas, A. (2017). TFDD: A trust-based framework for reliable data delivery and DoS defense in VANETs. Vehicular Communications, 9, 254–267.
8.
go back to reference Vinu, S. (2019). Optimal task assignment in mobile cloud computing by queue based ant-bee algorithm. Wireless Personal Communications, 104(1), 173–197. Vinu, S. (2019). Optimal task assignment in mobile cloud computing by queue based ant-bee algorithm. Wireless Personal Communications, 104(1), 173–197.
9.
go back to reference Li, Z., & Chigan, C. T. (2014). On joint privacy and reputation assurance for vehicular ad hoc networks. IEEE Transactions on Mobile Computing, 13(10), 2334–2344. Li, Z., & Chigan, C. T. (2014). On joint privacy and reputation assurance for vehicular ad hoc networks. IEEE Transactions on Mobile Computing, 13(10), 2334–2344.
10.
go back to reference Mahmoud, M. E., & Shen, X. (2011). An integrated stimulation and punishment mechanism for thwarting packet dropping attack in multihop wireless networks. IEEE Transactions on Vehicular Technology, 60(8), 3947–3962. Mahmoud, M. E., & Shen, X. (2011). An integrated stimulation and punishment mechanism for thwarting packet dropping attack in multihop wireless networks. IEEE Transactions on Vehicular Technology, 60(8), 3947–3962.
11.
go back to reference Prabakeran Saravanan, Sethukarasi, T., & Indumathi, V. (2018). Authentic novel trust propagation model with deceptive recommendation penalty scheme for distributed denial of service attacks. Journal of Computational and Theoretical Nanoscience, 15(6), 2383–2389. Prabakeran Saravanan, Sethukarasi, T., & Indumathi, V. (2018). Authentic novel trust propagation model with deceptive recommendation penalty scheme for distributed denial of service attacks. Journal of Computational and Theoretical Nanoscience, 15(6), 2383–2389.
12.
go back to reference Prabakeran Saravanan, Sethukarasi, T., & Indumathi, V. (2018). An efficient software defined network based cooperative scheme for mitigation of distributed denial of service (DDoS) attacks. Journal of Computational and Theoretical Nanoscience, 15(6), 2221–2226. Prabakeran Saravanan, Sethukarasi, T., & Indumathi, V. (2018). An efficient software defined network based cooperative scheme for mitigation of distributed denial of service (DDoS) attacks. Journal of Computational and Theoretical Nanoscience, 15(6), 2221–2226.
13.
go back to reference Saravanan, P., Sethukarasi, T., & Indumathi, V. (2018). Two level trust propagation model with global weighted index for detecting and mitigating denial of service. TAGA Journal of Graphic Technology, 14, 1748–0345. Saravanan, P., Sethukarasi, T., & Indumathi, V. (2018). Two level trust propagation model with global weighted index for detecting and mitigating denial of service. TAGA Journal of Graphic Technology, 14, 1748–0345.
14.
go back to reference Saravanan, P., Swarnapriya, K., & Agnes Priscilla Remina. (2019). Multi-defense framework for mitigating man in the cloud attack (MitC). i-Manager's Journal on Computer Science, 7(2), 8. Saravanan, P., Swarnapriya, K., & Agnes Priscilla Remina. (2019). Multi-defense framework for mitigating man in the cloud attack (MitC). i-Manager's Journal on Computer Science, 7(2), 8.
15.
go back to reference Vinu Sundararaj. (2016). An efficient threshold prediction scheme for wavelet based ECG signal noise reduction using variable step size firefly algorithm. International Journal of Intelligent Engineering and Systems, 9(3), 117–126. Vinu Sundararaj. (2016). An efficient threshold prediction scheme for wavelet based ECG signal noise reduction using variable step size firefly algorithm. International Journal of Intelligent Engineering and Systems, 9(3), 117–126.
16.
go back to reference Vinu, S., Selvi, M., & Kumar, R. S. (2018). An optimal cluster formation based energy efficient dynamic scheduling hybrid MAC protocol for heavy traffic load in wireless sensor networks. Computers and Security, 77, 277–288. Vinu, S., Selvi, M., & Kumar, R. S. (2018). An optimal cluster formation based energy efficient dynamic scheduling hybrid MAC protocol for heavy traffic load in wireless sensor networks. Computers and Security, 77, 277–288.
17.
go back to reference Hussain, R., Hussain, F., & Zeadally, S. (2019). Integration of VANET and 5G security: A review of design and implementation issues. Future Generation Computer Systems, 101, 843–864. Hussain, R., Hussain, F., & Zeadally, S. (2019). Integration of VANET and 5G security: A review of design and implementation issues. Future Generation Computer Systems, 101, 843–864.
18.
go back to reference Petit, J., Schaub, F., Feiri, M., & Kargl, F. (2014). Pseudonym schemes in vehicular networks: A survey. IEEE Communications Surveys & Tutorials, 17(1), 228–255. Petit, J., Schaub, F., Feiri, M., & Kargl, F. (2014). Pseudonym schemes in vehicular networks: A survey. IEEE Communications Surveys & Tutorials, 17(1), 228–255.
19.
go back to reference Buttyán, L., Tamás H., André W., & William W. (2009). Slow: A practical pseudonym changing scheme for location privacy in vanets. In 2009 IEEE vehicular networking conference (VNC) (pp. 1–8). IEEE. Buttyán, L., Tamás H., André W., & William W. (2009). Slow: A practical pseudonym changing scheme for location privacy in vanets. In 2009 IEEE vehicular networking conference (VNC) (pp. 1–8). IEEE.
20.
go back to reference Emara, K. (2017). Safety-aware location privacy in VANET: Evaluation and comparison. IEEE Transactions on Vehicular Technology, 66(12), 10718–10731. Emara, K. (2017). Safety-aware location privacy in VANET: Evaluation and comparison. IEEE Transactions on Vehicular Technology, 66(12), 10718–10731.
21.
go back to reference Freudiger, J., Mohammad H. M., Jean-Yves L. B., & Jean-Pierre H. (2010). On the age of pseudonyms in mobile ad hoc networks. In 2010 Proceedings IEEE INFOCOM (pp. 1–9). IEEE. Freudiger, J., Mohammad H. M., Jean-Yves L. B., & Jean-Pierre H. (2010). On the age of pseudonyms in mobile ad hoc networks. In 2010 Proceedings IEEE INFOCOM (pp. 1–9). IEEE.
22.
go back to reference Lu, R., Lin, X., Luan, T. H., Liang, X., & Shen, X. (2011). Pseudonym changing at social spots: An effective strategy for location privacy in vanets. IEEE Transactions on Vehicular Technology, 61(1), 86–96. Lu, R., Lin, X., Luan, T. H., Liang, X., & Shen, X. (2011). Pseudonym changing at social spots: An effective strategy for location privacy in vanets. IEEE Transactions on Vehicular Technology, 61(1), 86–96.
23.
go back to reference Arif, M., Guojun Wang, M., Bhuiyan, Z. A., Wang, T., & Chen, J. (2019). A survey on security attacks in VANETs: Communication, applications and challenges. Vehicular Communications, 19, 100179. Arif, M., Guojun Wang, M., Bhuiyan, Z. A., Wang, T., & Chen, J. (2019). A survey on security attacks in VANETs: Communication, applications and challenges. Vehicular Communications, 19, 100179.
24.
go back to reference Pan, Y., & Li, J. (2013). Cooperative pseudonym change scheme based on the number of neighbors in VANETs. Journal of Network and Computer Applications, 36(6), 1599–1609.MathSciNet Pan, Y., & Li, J. (2013). Cooperative pseudonym change scheme based on the number of neighbors in VANETs. Journal of Network and Computer Applications, 36(6), 1599–1609.MathSciNet
25.
go back to reference Sun, Y., Zhang, B., Zhao, B., Xiangyu, S., & Jinshu, S. (2015). Mix-zones optimal deployment for protecting location privacy in VANET. Peer-to-Peer Networking and Applications, 8(6), 1108–1121. Sun, Y., Zhang, B., Zhao, B., Xiangyu, S., & Jinshu, S. (2015). Mix-zones optimal deployment for protecting location privacy in VANET. Peer-to-Peer Networking and Applications, 8(6), 1108–1121.
26.
go back to reference Ullah, I., Abdul W., Munam A. S., & Abdul W. (2017). VBPC: Velocity based pseudonym changing strategy to protect location privacy of vehicles in VANET. In 2017 International conference on communication technologies (ComTech) (pp. 132–137). IEEE. Ullah, I., Abdul W., Munam A. S., & Abdul W. (2017). VBPC: Velocity based pseudonym changing strategy to protect location privacy of vehicles in VANET. In 2017 International conference on communication technologies (ComTech) (pp. 132–137). IEEE.
27.
go back to reference Wasef, A., & Shen, X. S. (2010). REP: Location privacy for VANETs using random encryption periods. Mobile Networks and Applications, 15(1), 172–185. Wasef, A., & Shen, X. S. (2010). REP: Location privacy for VANETs using random encryption periods. Mobile Networks and Applications, 15(1), 172–185.
28.
go back to reference Ying, B., Makrakis, D., & Hou, Z. (2015). Motivation for protecting selfish vehicles’ location privacy in vehicular networks. IEEE Transactions on Vehicular Technology, 64(12), 5631–5641. Ying, B., Makrakis, D., & Hou, Z. (2015). Motivation for protecting selfish vehicles’ location privacy in vehicular networks. IEEE Transactions on Vehicular Technology, 64(12), 5631–5641.
29.
go back to reference Bayat, M., Barmshoory, M., Rahimi, M., & Aref, M. R. (2015). A secure authentication scheme for VANETs with batch verification. Wireless Networks, 21(5), 1733–1743. Bayat, M., Barmshoory, M., Rahimi, M., & Aref, M. R. (2015). A secure authentication scheme for VANETs with batch verification. Wireless Networks, 21(5), 1733–1743.
30.
go back to reference He, D., Zeadally, S., Baowen, X., & Huang, X. (2015). An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Transactions on Information Forensics and Security, 10(12), 2681–2691. He, D., Zeadally, S., Baowen, X., & Huang, X. (2015). An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Transactions on Information Forensics and Security, 10(12), 2681–2691.
31.
go back to reference Huang, D., Misra, S., Verma, M., & Xue, G. (2011). PACP: An efficient pseudonymous authentication-based conditional privacy protocol for VANETs. IEEE Transactions on Intelligent Transportation Systems, 12(3), 736–746. Huang, D., Misra, S., Verma, M., & Xue, G. (2011). PACP: An efficient pseudonymous authentication-based conditional privacy protocol for VANETs. IEEE Transactions on Intelligent Transportation Systems, 12(3), 736–746.
32.
go back to reference Kumaresan, G., & Adiline Macriga, T. (2017). Group key authentication scheme for VANET intrusion detection (GKAVIN). Wireless Networks, 23(3), 935–945. Kumaresan, G., & Adiline Macriga, T. (2017). Group key authentication scheme for VANET intrusion detection (GKAVIN). Wireless Networks, 23(3), 935–945.
33.
go back to reference Lee, C.-C., & Lai, Y.-M. (2013). Toward a secure batch verification with group testing for VANET. Wireless Networks, 19(6), 1441–1449. Lee, C.-C., & Lai, Y.-M. (2013). Toward a secure batch verification with group testing for VANET. Wireless Networks, 19(6), 1441–1449.
34.
go back to reference Li, W., & Song, H. (2015). ART: An attack-resistant trust management scheme for securing vehicular ad hoc networks. IEEE Transactions on Intelligent Transportation Systems, 17(4), 960–969. Li, W., & Song, H. (2015). ART: An attack-resistant trust management scheme for securing vehicular ad hoc networks. IEEE Transactions on Intelligent Transportation Systems, 17(4), 960–969.
35.
go back to reference Zhao, H., Xin Y., & Xiaolin L. (2010). cTrust: trust aggregation in cyclic mobile ad hoc networks. In European conference on parallel processing (pp. 454–465). Springer, Berlin. Zhao, H., Xin Y., & Xiaolin L. (2010). cTrust: trust aggregation in cyclic mobile ad hoc networks. In European conference on parallel processing (pp. 454–465). Springer, Berlin.
36.
go back to reference Jesudoss, A., Kasmir Raja, S. V., & Sulaiman, A. (2015). Stimulating truth-telling and cooperation among nodes in VANETs through payment and punishment scheme. Ad Hoc Networks, 24, 250–263. Jesudoss, A., Kasmir Raja, S. V., & Sulaiman, A. (2015). Stimulating truth-telling and cooperation among nodes in VANETs through payment and punishment scheme. Ad Hoc Networks, 24, 250–263.
37.
go back to reference Wahab, O. A., Otrok, H., & Mourad, A. (2014). A cooperative watchdog model based on Dempster-Shafer for detecting misbehaving vehicles. Computer Communications, 41, 43–54. Wahab, O. A., Otrok, H., & Mourad, A. (2014). A cooperative watchdog model based on Dempster-Shafer for detecting misbehaving vehicles. Computer Communications, 41, 43–54.
38.
go back to reference Minhas, U. F., Zhang, J., Tran, T., & Cohen, R. (2010). A multifaceted approach to modeling agent trust for effective communication in the application of mobile ad hoc vehicular networks. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), 41(3), 407–420. Minhas, U. F., Zhang, J., Tran, T., & Cohen, R. (2010). A multifaceted approach to modeling agent trust for effective communication in the application of mobile ad hoc vehicular networks. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), 41(3), 407–420.
39.
go back to reference Butun, I. (2017). Privacy and trust relations in internet of things from the user point of view. In 2017 IEEE 7th annual computing and communication workshop and conference (CCWC) (pp. 1–5). IEEE. Butun, I. (2017). Privacy and trust relations in internet of things from the user point of view. In 2017 IEEE 7th annual computing and communication workshop and conference (CCWC) (pp. 1–5). IEEE.
40.
go back to reference Chen, Y.-M., & Wei, Y.-C. (2013). A beacon-based trust management system for enhancing user centric location privacy in VANETs. Journal of Communications and Networks, 15(2), 153–163. Chen, Y.-M., & Wei, Y.-C. (2013). A beacon-based trust management system for enhancing user centric location privacy in VANETs. Journal of Communications and Networks, 15(2), 153–163.
41.
go back to reference Wang, J., Zhang, Y., Wang, Y., & Xiang, G. (2016). RPRep: A robust and privacy-preserving reputation management scheme for pseudonym-enabled VANETs. International Journal of Distributed Sensor Networks, 12(3), 6138251. Wang, J., Zhang, Y., Wang, Y., & Xiang, G. (2016). RPRep: A robust and privacy-preserving reputation management scheme for pseudonym-enabled VANETs. International Journal of Distributed Sensor Networks, 12(3), 6138251.
42.
go back to reference Sun, Y., Rongxing, L., Lin, X., Shen, X., & Jinshu, S. (2010). An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications. IEEE Transactions on Vehicular Technology, 59(7), 3589–3603. Sun, Y., Rongxing, L., Lin, X., Shen, X., & Jinshu, S. (2010). An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications. IEEE Transactions on Vehicular Technology, 59(7), 3589–3603.
43.
go back to reference Zhao, H., Xin Y., & Xiaolin L. (2010). cTrust: Trust aggregation in cyclic mobile ad hoc networks. In European conference on parallel processing (pp. 454–465). Springer, Berlin. Zhao, H., Xin Y., & Xiaolin L. (2010). cTrust: Trust aggregation in cyclic mobile ad hoc networks. In European conference on parallel processing (pp. 454–465). Springer, Berlin.
44.
go back to reference Malhi, A. K., & Batra, S. (2016). Genetic-based framework for prevention of masquerade and DDoS attacks in vehicular ad-hoc networks. Security and Communication Networks, 9(15), 2612–2626. Malhi, A. K., & Batra, S. (2016). Genetic-based framework for prevention of masquerade and DDoS attacks in vehicular ad-hoc networks. Security and Communication Networks, 9(15), 2612–2626.
45.
go back to reference Eberhart, R., & Kennedy, J. (1995). A new optimizer using particle swarm theory. In Proceedings of the sixth international symposium on Micro machine and human science, 1995. MHS’95 (pp. 39–43). Eberhart, R., & Kennedy, J. (1995). A new optimizer using particle swarm theory. In Proceedings of the sixth international symposium on Micro machine and human science, 1995. MHS’95 (pp. 39–43).
46.
go back to reference Yang, X.-S. (2010). A new metaheuristic bat-inspired algorithm. Nature inspired cooperative strategies for optimization (NICSO 2010) (pp. 65–74). Berlin: Springer. Yang, X.-S. (2010). A new metaheuristic bat-inspired algorithm. Nature inspired cooperative strategies for optimization (NICSO 2010) (pp. 65–74). Berlin: Springer.
47.
go back to reference Ludwig, A., & Schmidt, K. D. (2010). Gauss–Markov loss prediction in a linear model. Casualty Actuarial Society E-Forum, Fall, 2010, 1–48. Ludwig, A., & Schmidt, K. D. (2010). Gauss–Markov loss prediction in a linear model. Casualty Actuarial Society E-Forum, Fall, 2010, 1–48.
48.
go back to reference Mirjalili, S. (2016). Dragonfly algorithm: a new meta-heuristic optimization technique for solving single-objective, discrete, and multi-objective problems. Neural Computing and Applications, 27(4), 1053–1073.MathSciNet Mirjalili, S. (2016). Dragonfly algorithm: a new meta-heuristic optimization technique for solving single-objective, discrete, and multi-objective problems. Neural Computing and Applications, 27(4), 1053–1073.MathSciNet
49.
go back to reference Alatas, B., Akin, E., & Bedri Ozer, A. (2009). Chaos embedded particle swarm optimization algorithms. Chaos, Solitons & Fractals, 40(4), 1715–1734.MathSciNetMATH Alatas, B., Akin, E., & Bedri Ozer, A. (2009). Chaos embedded particle swarm optimization algorithms. Chaos, Solitons & Fractals, 40(4), 1715–1734.MathSciNetMATH
50.
go back to reference Gandomi, A. H., Yang, X.-S., Talatahari, S., & Alavi, A. H. (2013). Firefly algorithm with chaos. Communications in Nonlinear Science and Numerical Simulation, 18(1), 89–98.MathSciNetMATH Gandomi, A. H., Yang, X.-S., Talatahari, S., & Alavi, A. H. (2013). Firefly algorithm with chaos. Communications in Nonlinear Science and Numerical Simulation, 18(1), 89–98.MathSciNetMATH
51.
go back to reference Mirjalili, S., Mirjalili, S. M., & Lewis, A. (2014). Grey wolf optimizer. Advances in Engineering Software, 69, 46–61. Mirjalili, S., Mirjalili, S. M., & Lewis, A. (2014). Grey wolf optimizer. Advances in Engineering Software, 69, 46–61.
52.
go back to reference G´omez M´armol, F., & Mart´ınez P´erez, G. (2012). Trip, A trust and reputation infrastructure-based proposal for vehicular ad hoc networks. Journal of Network and Computer Applications, 35(3), 934–941. G´omez M´armol, F., & Mart´ınez P´erez, G. (2012). Trip, A trust and reputation infrastructure-based proposal for vehicular ad hoc networks. Journal of Network and Computer Applications, 35(3), 934–941.
53.
go back to reference Sedjelmaci, H., & Senouci, S. M. (2015). An accurate and efficient collaborative intrusion detection framework to secure vehicular networks. Computers & Electrical Engineering, 43, 33–47. Sedjelmaci, H., & Senouci, S. M. (2015). An accurate and efficient collaborative intrusion detection framework to secure vehicular networks. Computers & Electrical Engineering, 43, 33–47.
54.
go back to reference Sundararaj, V. (2019). Optimised denoising scheme via opposition-based self-adaptive learning PSO algorithm for wavelet-based ECG signal noise reduction. International Journal of Biomedical Engineering and Technology, 31(4), 325. Sundararaj, V. (2019). Optimised denoising scheme via opposition-based self-adaptive learning PSO algorithm for wavelet-based ECG signal noise reduction. International Journal of Biomedical Engineering and Technology, 31(4), 325.
Metadata
Title
Optimal solution for malicious node detection and prevention using hybrid chaotic particle dragonfly swarm algorithm in VANETs
Authors
S. Prabakeran
T. Sethukarasi
Publication date
05-07-2020
Publisher
Springer US
Published in
Wireless Networks / Issue 8/2020
Print ISSN: 1022-0038
Electronic ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-020-02413-0

Other articles of this Issue 8/2020

Wireless Networks 8/2020 Go to the issue