Loading…
R2SCDT: robust and reliable secure clustering and data transmission in vehicular ad hoc network using weight evaluation
Vehicular ad hoc networks (VANETs) gained the probable to change transportations perspectives using wireless communication network entities such as buses, cars, cell phones, traffic signals, etc. But factors like the heavy reliance on control technologies, computing, communication, severe mobility,...
Saved in:
Published in: | Journal of ambient intelligence and humanized computing 2023-03, Vol.14 (3), p.2029-2046 |
---|---|
Main Authors: | , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Vehicular ad hoc networks (VANETs) gained the probable to change transportations perspectives using wireless communication network entities such as buses, cars, cell phones, traffic signals, etc. But factors like the heavy reliance on control technologies, computing, communication, severe mobility, etc. lead to several vulnerabilities in the network. The communication among two vehicles in VANETs should be secure as it mainly includes one or more intermediate vehicles to forward the data from the source to the objective. Hence the intermediate vehicles must be reliable for guaranteed data transmission. The malicious nodes may become part of such communications that can accept the data and drop (or misuse) data to create congestion. This paper proposed the Robust and Reliable Secure Clustering and Data Transmission (R
2
SCDT/RRSCDT) protocol to mitigate the challenges of malicious vehicles in the network. The methodology is dependent on the trust evaluation of vehicles to detect malicious nodes for secure Cluster Head (CH) selection and data transmission. The clustering performs to isolate the vehicles into clusters and choose the CH for each cluster. The CH choice performed using the trust evaluation of each vehicle and detects the attackers with less trust value. During the data transmission phase, the nodes are selected via the trust evaluation model and raise the alarm if any node has been detected as malicious. The purpose of trust-based clustering and data transmission functionality R
2
SCDT is to achieve guaranteed QoS performance with minimum time and control overheads. The simulation result shows the proposed model significantly improves performance compared to state-of-art security solutions of VANET. |
---|---|
ISSN: | 1868-5137 1868-5145 |
DOI: | 10.1007/s12652-021-03414-3 |