Open Access
Subscription Access
Reinforcing VANET Security Using Ant Colony Optimization through Heuristic Approach
Subscribe/Renew Journal
Vehicular ad hoc network (VANET) is a novice technique which has drawn the attention of several industries and academics. Security parameters in VANET are now receiving popularity in the research community. A defensive mechanism provides a solution to control the attacks across the VANET security. However, a single defence mechanism is unable to provide solution to the attack models as more sophisticated method is required for VANETs. This paper proposed a method termed heuristic approach for ant colony optimization (HAAC) for improved security in addition to better transportation, reliability and management. The heuristic based ant colony optimization is used to reduce the problem in finding known and unknown opponents in providing security to VANET. The characteristic of real ant colonies is used in VANET security in order to solve attack problems with shortest path. The Reinforcing VANET security using vehicle mode analysis is evaluated in an efficient manner using NS2 simulator. The excellent outcomes are obtained by an HAAC approach combined with a dynamic heuristic.
Keywords
Collision Avoidance, Data Aggregation, Delay Efficiency, Energy Efficiency, Security, Wireless Sensor Networks.
User
Subscription
Login to verify subscription
Font Size
Information
- C. Zhang, Y. Song, Y. Fang and Y. Zhang. 2011. On the price of security in large-scale wireless ad hoc networks, IEEE/ACM Trans. on Networking, 19(2), 319-332. https://doi.org/10.1109/TNET.2011.2106162.
- D. He, J. Bu, S. Chan, C. Chen and M. Yin. 2011. Privacy-preserving universal authentication protocol for wireless communications, IEEE Trans. on Wireless Communications, 10(2), 431-436. https://doi.org/10.1109/TWC.2010.120610.101018.
- C.E. Koksal, O. Ercetin and Y. Sarikaya. 2013. Control of wireless networks with secrecy, IEEE/ACM Trans. on Networking, 21(1), 324-337. https://doi.org/10.1109/TNET.2012.2197410.
- G. Xu, C. Borcea and L. Iftode. 2011. A policy enforcing mechanism for trusted ad hoc networks, IEEE Trans. on Dependable and Secure Computing, 8(3), 321-336. https://doi.org/10.1109/TDSC.2010.11.
- S. Bu, F.R. Yu, X.P. Liu and H. Tang. 2011. Structural results for combined continuous user authentication and intrusion detection in high security mobile ad-hoc networks, IEEE Trans. on Wireless Communications, 10(9), 3064-3073. https://doi.org/10.1109/TWC.2011.071411.102123.
- M. Sepulcre, J. Gozalvez, J. Harri and H. Hartenstein. 2011. Contextual communications congestion control for cooperative vehicular networks, IEEE Trans. on Wireless Communications, 10(2), 385-389. https://doi.org/10.1109/TWC.2010.120610.100079.
- D. Niyato, E. Hossain and P. Wang. 2011. Optimal channel access management with QoS support for cognitive vehicular networks, IEEE Trans. on Mobile Computing, 10(4), 573-591. https://doi.org/10.1109/TMC.2010.191.
- R. Lu, X. Lin, T.H. Luan, X. Liang and X. Shen. 2012. Pseudonym changing at social spots: an effective strategy for location privacy in VANETs, IEEE Trans. on Vehicular Tech., 61(1), 86-96. https://doi.org/10 .1109/TVT.2011.2162864.
- C. Chen and M.A. Jensen. 2011. Secret key establishment using temporally and spatially correlated wireless channel coefficients, IEEE Trans. on Mobile Computing, 10(2), 205-215. https://doi.org/10.1109/TMC.2010.114.
Abstract Views: 392
PDF Views: 153