Abstract
Aiming at the possible attacks of malicious nodes in VANET (Vehicle ad hoc network). It is very important to select security nodes in the routing protocols for routing activities. A secure AODV (Ad hoc On-demand Distance Vector Routing) improvement scheme is proposed, namely SGF-AODV (Security AODV with GASA-FNN). This algorithm uses fuzzy neural network to compute node information about routing activities and obtains the trust value of nodes to evaluate the security of nodes. The algorithm considers node security and network environment equally, defends against malicious node attack and balances node utilization rate. In the routing maintenance phase, the parameters of the fuzzy neural network are optimized in real time using the genetic simulated annealing algorithm for the actual environment to ensure that the calculated node trust value is in line with the actual situation. Experiments show that, SGF-AODV relative to AODV, the average delay, packet loss rate, routing overhead are improved.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Perkins, C., Belding-Royer, E., Das, S.: Request for comments: ad hoc on-demand distance vector (AODV) routing. Exp. Internet Soc. 6(7), 90 (2003)
Jain, A., Prajapati, U., Chouhan, P.: Trust based mechanism with AODV protocol for prevention of black-hole attack in MANET scenario. In: Colossal Data Analysis and Networking, pp. 1–5. IEEE, CDAN (2016)
Shoja, M.K., Taheri, H., Vakilinia, S.: Preventing black hole attack in AODV through use of hash chain. In: Electrical Engineering, pp. 1–2. IEEE (2011)
Balakrishnan, V., Varadharajan, V., Lucs, P., et al.: Trust enhanced secure mobile ad-hoc network routing. In: International Conference on Advanced Information Networking and Applications Workshops, Salt Lake City, Utah, USA, pp. 21–33. IEEE Computer Society (2007)
Hiroki, U., Sonoko, T., Hiroshi, S.: An effective secure routing protocol considering trust in mobile ad hoc networks. IPSJ J. 55, 649–658 (2014)
Umeda, S., Takeda, S., Shigeno, H.: Trust evaluation method adapted to node behavior for secure routing in mobile ad hoc networks. In: Eighth International Conference on Mobile Computing and Ubiquitous Networking, Melbourne, Australia, pp. 143–148. IEEE (2015)
Zhan, G., Shi, W., Deng, J.: Design and implementation of TARF: a trust-aware routing framework for WSNs. IEEE Trans. Dependable Secure Comput. 9(2), 184–197 (2012)
Li, H., Singhal, M.: A secure routing protocol for wireless ad hoc networks. In: Hawaii International Conference on System Sciences, Hawaii, USA, p. 225a. IEEE (2006)
Singh, B., Srikanth, D., Kumar, C.R.S.: Mitigating effects of black hole attack in mobile ad-hoc NETworks: military perspective. In: IEEE International Conference on Engineering and Technology, Hammamet, Tunisia, pp. 21–22. IEEE (2016)
Zhu, Y.-S., Dou, G.-Q.: A dimensional trust based security data aggregation method in wireless sensor networks. J. Wuhan Univ. (Natural Science Edition). 59(2), 193–197 (2013)
Adamic, L.A., Adar, E.: Friends and neighbors on the web. Soc. Netw. 25(3), 211–230 (2003)
Xiao, W., Dong, H., Xin, Q.-L., et al.: Synthesis of large-scale multistream heat exchanger networks based on stream pseudo temperature. Chin. J. Chem. Eng. 14(5), 574–583 (2006)
Rehmani, M.H., Saleem, Y.: Network simulator NS-2. J. Inst. Image Inf. Telev. Eng. 65, 946–949 (2015)
Acknowledgments
This work was supported by National Natural Science Foundation of China under Grant No. 61262072.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Xie, T., Mo, J., Huang, B. (2018). A Secure AODV Protocol Improvement Scheme Based on Fuzzy Neural Network. In: Beyah, R., Chang, B., Li, Y., Zhu, S. (eds) Security and Privacy in Communication Networks. SecureComm 2018. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 255. Springer, Cham. https://doi.org/10.1007/978-3-030-01704-0_26
Download citation
DOI: https://doi.org/10.1007/978-3-030-01704-0_26
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-01703-3
Online ISBN: 978-3-030-01704-0
eBook Packages: Computer ScienceComputer Science (R0)