Fuzzy Logic Based Clustering with Optimal Lightweight Cryptography for Privacy-Preserving Data Transmission in Vehicular Adhoc Networks
Fuzzy Logic Based Clustering with Optimal Lightweight Cryptography for Privacy-Preserving Data Transmission in Vehicular Adhoc Networks |
||
|
||
© 2022 by IJETT Journal | ||
Volume-70 Issue-3 |
||
Year of Publication : 2022 | ||
Authors : G. Tamilarasi, K. Rajiv Gandhi, V. Palanisamy |
||
https://doi.org/10.14445/22315381/IJETT-V70I3P238 |
How to Cite?
G. Tamilarasi, K. Rajiv Gandhi, V. Palanisamy, "Fuzzy Logic Based Clustering with Optimal Lightweight Cryptography for Privacy-Preserving Data Transmission in Vehicular Adhoc Networks," International Journal of Engineering Trends and Technology, vol. 70, no. 3, pp. 334-341, 2022. Crossref, https://doi.org/10.14445/22315381/IJETT-V70I3P238
Abstract
Recently, vehicular ad hoc networks (VANETs) have received significant intention in the domain of wireless and communication technologies. It plays a vital role in intelligent transportation systems (ITS), providing safety and preventive measures to drivers and passengers. Despite the merits provided by VANET, it has some major challenging issues such as high mobility, clustering, routing, and security of the network. Owing to the decentralized and adaptive topologies of VANET, security among the users, data, and vehicles becomes important as the recognition of malicious nodes becomes mandatory. Therefore, this research work involves the design of privacy-preserving encryption with reliable data transmission for cluster-based VANETs. The proposed model involves a novel Fuzzy Logic-Based Clustering with Optimal Lightweight Cryptography with Chaotic Shell Game Optimization (FLC-OLCCSGO) algorithm for Privacy-Preserving Data Transmission through Reliable Vehicles in VANET. The major intention of the FLC-OLCCSGO approach is to accomplish security and privacy in VANET. The presented FLC-OLCCSGO technique undergoes a three-stage process such as clustering, encryption, and optimum key generation. To enhance the secrecy of the LWC technique, the optimum key generation process is performed using the CGSO algorithm. The simulation analysis of the FLC-OLCCSGO technique has been assessed under several sets of experimentations, and the outcomes are investigated in terms of distinct metrics. The experimental results showed that the provided strategy had the best results over the most current methods.
Keywords
VANET, Light Weight, Privacy-Preserving, Data Transmission.
Reference
[1] B. Ayyappan and P. M. Kumar, Vehicular Ad Hoc Networks (Vanet): Architectures, Methodologies and Design Issues, In 2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM), (2016) 177-180.
[2] W. Liang, Z. Li, H. Zhang, S. Wang and R. Bie, Vehicular Ad Hoc Networks: Architectures, Research Issues, Methodologies, Challenges, and Trends, International Journal of Distributed Sensor Networks, 11(8) (2015) 745303.
[3] F.J.Martinez, C. K.Toh, J.C.Cano, C.T.Calafate and P.Manzoni, A Survey and Comparative Study of Simulators for Vehicular Ad Hoc Networks (VANETs), Wireless Communications and Mobile Computing, 11(7) (2011) 813-828.
[4] W.Chen, R.K.Guha, T.J.Kwon, J.Lee and Y.Y.Hsu, A Survey and Challenges in Routing and Data Dissemination in Vehicular Ad Hoc Networks, Wireless Communications and Mobile Computing, 11(7) (2011) 787-795.
[5] M.S.Sheikh, J.Liang and W.Wang, A Survey of Security Services, Attacks, and Applications for Vehicular Ad Hoc Networks (VANETs), Sensors, 19(16) (2019) 3589.
[6] S.Zeadally, R.Hunt, Y.S.Chen, A.Irwin and A.Hassan, Vehicular Ad Hoc Networks (VANETS): Status, Results, and Challenges, Telecommunication Systems, 50(4) (2012) 217-241.
[7] E.C.Eze, S.Zhang and E.Liu, Vehicular Ad Hoc Networks (VANETs): Current State, Challenges, Potentials and Way Forward, In 2014 20th international conference on automation and computing, (2014) 176-181.
[8] F. Yang and Y.Tang, Cooperative Clustering-Based Medium Access Control for Broadcasting in Vehicular Ad-Hoc Networks, IET Communications, 8(17) (2014) 3136-3144.
[9] B.Yu and C. Xu, Vehicular Ad-Hoc Networks: An Information-Centric Perspective, ZTE communications, 8(3) (2010) 42-49.
[10] C. Jeremiah and A.J. Nneka, Issues and Possibilities in Vehicular Ad-Hoc Networks (VANETs). In 2015 International Conference on Computing, Control, Networking, Electronics and Embedded Systems Engineering (ICCNEEE), (2015) 254-259.
[11] S. Manickam, K. Shankar, E. Perumal, M. Ilayaraja and K. SatheshKumar, Secure Data Transmission through Reliable Vehicles in VANET using Optimal Lightweight Cryptography, In Cybersecurity and Secure Information Systems. Springer, Cham, (2019) 193-204..
[12] B. Alaya and L. Sellami, Clustering Method And Symmetric/Asymmetric Cryptography Scheme Adapted to Securing Urban VANET networks, Journal of Information Security and Applications, 58 (2021) 102779.
[13] F. Mirsadeghi, M.K.Rafsanjani and B.B.Gupta, A Trust Infrastructure Based Authentication Method for Clustered Vehicular Ad Hoc Networks, Peer-to-Peer Networking and Applications, 14(4) (2021) 2537-2553.
[14] K. Gu, X. Dong, X. Li and W. Jia, Cluster-Based Malicious Node Detection for False Downstream Data in Fog Computing-Based VANETs, IEEE Transactions on Network Science and Engineering, (2022) 1-18.
[15] S. Tangade, S. S. Manvi and P. Lorenz, Trust Management Scheme Based on Hybrid Cryptography for Secure Communications in VANETs, IEEE Transactions on Vehicular Technology, 69(5) (2020) 5232-5243.
[16] Brijilal Ruban, C. and Paramasivan, B., Cluster-Based Secure Communication and Certificate Revocation Scheme for VANET. The Computer Journal, 62(2) (2019) 263-275.
[17] J.S.Lee and W.L.Cheng, Fuzzy-Logic-Based Clustering Approach for Wireless Sensor Networks Using Energy Predication, IEEE Sensors Journal, 12(9) (2012) 2891-2897.
[18] M.Priyatham, Light Weight Cryptography for Secure Data Transmission, International Journal of Engineering Trends and Applications, 7(5) (2020) 30-35.
[19] M. Dehghani, Z.Montazeri, O.P.Malik, H.Givi and J.M.Guerrero, Shell Game Optimization: A Novel Game-Based Algorithm, Int. J. Intell. Eng. Syst, 13 (2020) 246-255.
[20] J. Bielawski, T. Chotibut, F. Falniowski, G. Kosiorowski, M. Misiurewicz and G. Piliouras, Follow-The-Regularized-Leader Routes to Chaos in Routing Games, In International Conference on Machine Learning, (2021) 925-935. PMLR.
[21] N. Krishnaraj and S.Sangeetha, A Study of Data Privacy in Internet of Things using Privacy Preserving Techniques with its Management, International Journal of Engineering Trends and Technology, 70(2) (2022) 43-52.
[22] M. V. S. S. Nagendranth, M. Rajesh Khanna, N. Krishnaraj, Mohamed Yacin Sikkandar, Mohamed Abdelkader Aboamer& R. Surendran, Type II fuzzy-based clustering with improved ant colony optimization-based routing (T2FCATR) protocol for secured data transmission in manet, The Journal of Supercomputing, First Online, (2022).