Fuzzy Clustering Algorithm to Identify Sybil Attacks in Vehicular ad Hoc Networks
Publish place: Journal of Computer and Robotics، Vol: 16، Issue: 2
Publish Year: 1402
نوع سند: مقاله ژورنالی
زبان: English
View: 101
This Paper With 17 Page And PDF Format Ready To Download
- Certificate
- من نویسنده این مقاله هستم
این Paper در بخشهای موضوعی زیر دسته بندی شده است:
استخراج به نرم افزارهای پژوهشی:
شناسه ملی سند علمی:
JR_JCR-16-2_002
تاریخ نمایه سازی: 13 دی 1402
Abstract:
Abstract: Due to the increasing use of VANET networks and the use of smart systems in these types of networks, their challenges have been the focus of researchers. One of the important challenges of such networks is the security issues that threaten this category of networks. In this article, the Sybil attack, which is one of the security challenges in VANET networks, has been investigated and identified. In a Sybil attack, a node threatens VANET networks by stealing the identity of other nodes or creating a virtual identity, by making incorrect decisions and sending false information. In this article, the clustering method is used to avoid the overhead of identification nodes in centralized methods and avoid delay in distributed methods. RSU determines the cluster head with the help of fuzzy logic. The cluster head creates moving clusters by placing similar nodes in terms of direction, speed, and distance in separate clusters while moving. The cluster head performs malicious node detection using a directional antenna and a fuzzy system. The first fuzzy system places the cluster head in the best possible place of the cluster. The cluster head identifies the malicious nodes in each cluster locally, while the second fuzzy system interferes in determining the validity of the cluster members. In the proposed plan, in addition to optimizing the sending and receiving of messages, The simulation results show that the proposed method has improved by ۱.۲% in detecting the malicious node, ۰.۴% in the number of a false positive detection, ۰.۶% in the lost packet, and ۰.۱% in the delay compared to the previous methods.
Keywords:
Authors
Mahdi Maleknasab Ardekani
Department of Computer Engineering, Shiraz Branch, Islamic Azad University, Shiraz, Iran
Mohammad Tabarzad
Department of Computer Engineering, Shiraz Branch, Islamic Azad University, Shiraz, Iran
Mohammad Amin Shayegan
Department of Computer Engineering, Shiraz Branch, Islamic Azad University, Shiraz, Iran