A FUZZY BASED EFFICIENT AND BLOCKCHAIN ORIENTED SECURED ROUTING IN VEHICULAR AD-HOC NETWORKS

Publish Year: 1403
نوع سند: مقاله ژورنالی
زبان: English
View: 210

This Paper With 17 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

JR_IJFS-21-6_002

تاریخ نمایه سازی: 21 آذر 1403

Abstract:

Vehicular ad-hoc networks (VANET) represent an improved iteration of Wireless Sensor Networks (WSN) with mobile sensory nodes situated within vehicles. The Vehicular Adhoc Networks hold a crucial position within smart city applications as inter-vehicle communication is deemed indispensable for maintaining the technological efficiency of the city. Despite the benefits provided by VANET, it encounters numerous challenges and drawbacks within the context of smart city applications. One such challenge pertains to the security and privacy principles of VANET. Privacy and security emerge as principal concerns associated with VANET, prompting multiple researchers to propose security solutions over the past decade. The present research endeavor focuses on elevating the quality of service (QoS) by offering an enhanced level of security for data communication. This security enhancement is achieved through the use of blockchain technology and the integration of Elliptical Curve Cryptography with secure hash functions to safeguard data communication from node to Mobile Control Unit (MCU). Furthermore, the proposed research work presents an efficient routing mechanism for data between mobile nodes and the Control Unit by employing neuro fuzzy logic to identify the optimal path from the source node to the Mobile Control Unit (MCU). The proposed work is compared with existing cryptographic methodologies as well as state-of-the-art routing path optimization algorithms, namely Particle Swarm Optimization (PSO), Genetic Algorithm (GA), Memetic Algorithm (MA), and Honey Bee Optimization (HBO), in order to establish its superiority in terms of computational time, throughput, packet delivery ratio, and accuracy.

Keywords:

Authors

N PRAVEENA

Department of Electronics and Communication Engineering R.M.K College of Engineering and Technology, Chennai, Tamil Nadu

SELVARAJ K

Department of Information Technology PSNA College of Engineering and Technology, Dindigul

Kalai Selvi T

Department of Artificial Intelligence and Data Science Easwari Engineering College, Chennai

Srigitha S Nath

Department of Electronics and Communication Engineering Saveetha Engineering College, Chennai

Prabakaran D

Department of Electronics and Communication Engineering IFET College of Engineering, Villupuram, Tamil Nadu

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • N. Aishwarya, N. G. Praveena, C. Karthikeyan, S. Priyanka, IoT ...
  • A. Bhatia, K. Haribabu, K. Gupta, A. Sahu, Realization of ...
  • C. Chen, L. Liu, T. Qiu, D. O. Wu, Z. ...
  • M. Deveci, I. Gokasar, D. Pamucar, A. Alaa Zaidan, X.Wen, ...
  • M. Deveci, D. Pamucar, I. Gokasar, M. K¨oppen, B. B. ...
  • M. K. Diaa, I. S. Mohamed, M. A. Hassan, OPBRP- ...
  • X. Guo, Y. Chen, L. Cao, D. Zhang, Y. Jiang, ...
  • M. Hashem Eiza, T. Owens, Q. Ni, Secure and robust ...
  • Z. Hassan, A. Mehmood, C. Maple, M. A. Khan, A. ...
  • S. Hu, Y. Jia, C. She, Performance analysis of VANET ...
  • Y. Huang, M. Ma, ILL-IDS: An incremental lifetime learning IDS ...
  • R. Hussain, F. Abbas, J. Son, H. Eun, H. Oh, ...
  • R. Hussain, J. Son, H. Eun, S. Kim, H. Oh, ...
  • K. Kandali, L. Bennis, H. Bennis, A new hybrid routing ...
  • R. Kaur, T. P. Singh, V. Khajuria, Security issues in ...
  • P. S. Kumar, Computationally simple and efficient method for solving ...
  • K. Lakshmi Narayanan, R. Naresh, An efficient key validation mechanism ...
  • Z. Onder, E. Savas, I. Canak, Some novel approaches on ...
  • D. Prabakaran, H. Sathyapriya, A review on methodologies and performance ...
  • J. Qi, T. Gao, C. Zhao, A pseudonym based certificateless ...
  • M. Sayad Haghighi, Z. Aziminejad, Highly anonymous mobility-tolerant location-based onion ...
  • J. Shen, C. Wang, A. Castiglione, D. Liu, C. Esposito, ...
  • G. D. Singh, M. Prateek, S. Kumar, M. Verma, D. ...
  • M. Syfullah, J. M. Y. Lim, Data broadcasting on cloud-VANET ...
  • A. M. R. Tolba, Trust-based distributed authentication method for collision ...
  • P. Upadhyay, V. Marriboina, S. Kumar, S. Kumar, M. A. ...
  • Y. Wang, X. Li, X. Zhang, X. Liu, J. Weng, ...
  • VIKOR-based group decision-making method for software quality assessment [مقاله ژورنالی]
  • A. P. Zabaleta, P. Fern´andez, J. F. Prados-Castillo, M. de ...
  • S. S. Zalte, V. R. Ghorpade, R. K. Kamat, Synergizing ...
  • J. Zhang, J. Wei, On the security of privacy-enhanced authentication ...
  • نمایش کامل مراجع