Skip to main content

A Secure AODV Protocol Improvement Scheme Based on Fuzzy Neural Network

  • Conference paper
  • First Online:
Security and Privacy in Communication Networks (SecureComm 2018)

Abstract

Aiming at the possible attacks of malicious nodes in VANET (Vehicle ad hoc network). It is very important to select security nodes in the routing protocols for routing activities. A secure AODV (Ad hoc On-demand Distance Vector Routing) improvement scheme is proposed, namely SGF-AODV (Security AODV with GASA-FNN). This algorithm uses fuzzy neural network to compute node information about routing activities and obtains the trust value of nodes to evaluate the security of nodes. The algorithm considers node security and network environment equally, defends against malicious node attack and balances node utilization rate. In the routing maintenance phase, the parameters of the fuzzy neural network are optimized in real time using the genetic simulated annealing algorithm for the actual environment to ensure that the calculated node trust value is in line with the actual situation. Experiments show that, SGF-AODV relative to AODV, the average delay, packet loss rate, routing overhead are improved.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Perkins, C., Belding-Royer, E., Das, S.: Request for comments: ad hoc on-demand distance vector (AODV) routing. Exp. Internet Soc. 6(7), 90 (2003)

    Google Scholar 

  2. Jain, A., Prajapati, U., Chouhan, P.: Trust based mechanism with AODV protocol for prevention of black-hole attack in MANET scenario. In: Colossal Data Analysis and Networking, pp. 1–5. IEEE, CDAN (2016)

    Google Scholar 

  3. Shoja, M.K., Taheri, H., Vakilinia, S.: Preventing black hole attack in AODV through use of hash chain. In: Electrical Engineering, pp. 1–2. IEEE (2011)

    Google Scholar 

  4. Balakrishnan, V., Varadharajan, V., Lucs, P., et al.: Trust enhanced secure mobile ad-hoc network routing. In: International Conference on Advanced Information Networking and Applications Workshops, Salt Lake City, Utah, USA, pp. 21–33. IEEE Computer Society (2007)

    Google Scholar 

  5. Hiroki, U., Sonoko, T., Hiroshi, S.: An effective secure routing protocol considering trust in mobile ad hoc networks. IPSJ J. 55, 649–658 (2014)

    Google Scholar 

  6. Umeda, S., Takeda, S., Shigeno, H.: Trust evaluation method adapted to node behavior for secure routing in mobile ad hoc networks. In: Eighth International Conference on Mobile Computing and Ubiquitous Networking, Melbourne, Australia, pp. 143–148. IEEE (2015)

    Google Scholar 

  7. Zhan, G., Shi, W., Deng, J.: Design and implementation of TARF: a trust-aware routing framework for WSNs. IEEE Trans. Dependable Secure Comput. 9(2), 184–197 (2012)

    Article  Google Scholar 

  8. Li, H., Singhal, M.: A secure routing protocol for wireless ad hoc networks. In: Hawaii International Conference on System Sciences, Hawaii, USA, p. 225a. IEEE (2006)

    Google Scholar 

  9. Singh, B., Srikanth, D., Kumar, C.R.S.: Mitigating effects of black hole attack in mobile ad-hoc NETworks: military perspective. In: IEEE International Conference on Engineering and Technology, Hammamet, Tunisia, pp. 21–22. IEEE (2016)

    Google Scholar 

  10. Zhu, Y.-S., Dou, G.-Q.: A dimensional trust based security data aggregation method in wireless sensor networks. J. Wuhan Univ. (Natural Science Edition). 59(2), 193–197 (2013)

    Google Scholar 

  11. Adamic, L.A., Adar, E.: Friends and neighbors on the web. Soc. Netw. 25(3), 211–230 (2003)

    Article  Google Scholar 

  12. Xiao, W., Dong, H., Xin, Q.-L., et al.: Synthesis of large-scale multistream heat exchanger networks based on stream pseudo temperature. Chin. J. Chem. Eng. 14(5), 574–583 (2006)

    Article  Google Scholar 

  13. Rehmani, M.H., Saleem, Y.: Network simulator NS-2. J. Inst. Image Inf. Telev. Eng. 65, 946–949 (2015)

    Google Scholar 

Download references

Acknowledgments

This work was supported by National Natural Science Foundation of China under Grant No. 61262072.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jiawei Mo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Xie, T., Mo, J., Huang, B. (2018). A Secure AODV Protocol Improvement Scheme Based on Fuzzy Neural Network. In: Beyah, R., Chang, B., Li, Y., Zhu, S. (eds) Security and Privacy in Communication Networks. SecureComm 2018. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 255. Springer, Cham. https://doi.org/10.1007/978-3-030-01704-0_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-01704-0_26

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-01703-3

  • Online ISBN: 978-3-030-01704-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics