Secured data transmission for VANETS using CNN based trust aware clustering

被引:1
|
作者
Annamalai, Tamizhselvi [1 ]
Anton, J. Liju [2 ]
Yoganathan, P. [3 ]
机构
[1] St Josephs Coll Engn, Chennai, Tamil Nadu, India
[2] Univ Florida, Gainesville, FL USA
[3] Zoho Corp, Chennai, Tamil Nadu, India
关键词
Vehicular ad-hoc networks; wireless communication; routing protocols; cryptography; convolution neural network; AUTHENTICATED KEY AGREEMENT; ROUTING PROTOCOL; EFFICIENT; SCHEME; INTERNET; PERFORMANCE; NETWORKS; VEHICLES; DESIGN; THINGS;
D O I
10.3233/JIFS-220460
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Intelligent transport system is a greatly emerging technology in recent years. The stability and reliability of these systems is very important. In vehicular ad-hoc networks (VANET), the data transmission process can be improved by employing clustering process. The nodes can be clustered in order to utilize the maximum bandwidth of the network and improving network stability. In VANETs it is to introduce road safety and driver safety. In addition, security is a major concern and the malicious nodes need to be accurately detected. Several kinds of attacks can present in the VANETs. Hence an efficient authentication method and trust aware method is essentially required. In this work, stability assured CNN based trust aware clustering and authenticated transmission is introduced. For data authentication quantum cryptography technique is employed. In clustering process, trust degree of nodes is computed, vehicle speed is observed, direction of vehicle and distance among nodes are taken. In addition, for ensuring more safety, the critical data transmission is given higher priority. Therefore in clustering, data criticality parameter is also considered. For cluster formation, convolution neural network is employed. After the clustering process, the quantum cryptography based authentication is implemented for vehicle units and road side units. Data among these units are transmitted with quantum channel encryption key. Then simulation results are observed for validating the proposed protocol.
引用
收藏
页码:8073 / 8087
页数:15
相关论文
共 50 条
  • [1] Trust Aware Secured Data Transmission Based Routing Strategy Using Optimal Ch Selection in Mobile Ad-Hoc Network
    Sankaran, K. Sakthidasan
    Hong, Seng-Phil
    [J]. MOBILE NETWORKS & APPLICATIONS, 2023,
  • [2] RETRACTED ARTICLE: Optimal Hop Selection Based Novel Trust Based DDoS Attack Removal Framework for Reliable and Secured Transmission of Data in VANETs
    Prabakeran Saravanan
    T. Sethukarasi
    [J]. Wireless Personal Communications, 2020, 113 : 693 - 693
  • [3] Trust aware secured energy efficient fuzzy clustering-based protocol in wireless sensor networks
    Kranthikumar, Bhukya
    Velusamy, R. Leela
    [J]. SOFT COMPUTING, 2023,
  • [4] Toward Using Data Trust Model in VANETs
    Basheer, Hanaa S.
    Bassil, Carole
    Chebaro, Bilal
    [J]. 2015 INTERNATIONAL CONFERENCE ON APPLIED RESEARCH IN COMPUTER SCIENCE AND ENGINEERING (ICAR), 2015,
  • [5] Secured Multi-Hop Clustering Protocol for Location-based Routing in VANETs
    Eunice, K. Sushma
    Juvanna, I
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2019, 10 (04) : 121 - 126
  • [6] Adaptive Clustering Mechanism With Trust Enabled Data Propagation For Realization Of Secure VANETs
    Goyal, Heena
    Sharma, Amitabh
    [J]. PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMMUNICATION AND ELECTRONICS SYSTEMS (ICCES), 2016, : 760 - 763
  • [7] Context-aware Unified Routing for VANETs Based on Virtual Clustering
    Wu, Celimuge
    Yoshinaga, Tsutomu
    Ji, Yusheng
    [J]. 2016 IEEE 27TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2016, : 269 - 274
  • [8] Software-Defined Network enabled Vehicle to Vehicle secured data transmission protocol in VANETs
    Amin, Ruhul
    Pali, Isha
    Sureshkumar, Venkatasamy
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 58
  • [9] Secured Data Transmission Using Wavelet Based Steganography and Cryptography by Using AES Algorithm
    Reddy, M. Indra Sena
    Kumar, A. P. Siva
    [J]. INTERNATIONAL CONFERENCE ON COMPUTATIONAL MODELLING AND SECURITY (CMS 2016), 2016, 85 : 62 - 69
  • [10] Using trust model to ensure reliable data acquisition in VANETs
    Yao, Xuanxia
    Zhang, Xinlei
    Ning, Huansheng
    Li, Pengjian
    [J]. AD HOC NETWORKS, 2017, 55 : 107 - 118