Skip to main content

Improving Security and Stability of AODV with Fuzzy Neural Network in VANET

  • Conference paper
  • First Online:
Wireless Algorithms, Systems, and Applications (WASA 2018)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 10874))

Abstract

To improve security and stability of AODV in VANET (Vehicle Ad hoc Network), a secure and stable AODV, named GSS-AODV is proposed. GSS-AODV uses a fuzzy neural network to compute the node information in routing activities. The stability of nodes is computed to evaluate links. The link stability and the number of hops are considered in a balanced way, so a stable path with fewer hops is selected. GSS-AODV uses trust value of the node to evaluate the node security. The evaluation balances node security with network environment and node utilization to prevent malicious node attack. In routing maintenance, GSS-AODV uses genetic simulated annealing algorithm to optimize the parameters of the fuzzy neural network in real time to ensure that the calculated stability and trust value of node match the actual situation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 109.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 139.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Perkins, C., Belding-Royer, E., Das, S.: Request for comments: ad hoc on-demand distance vector (AODV) routing. Exp. Internet Soc. 6(7), 90 (2003)

    Google Scholar 

  2. Jain, A., Prajapati, U., Chouhan, P.: Trust based mechanism with AODV protocol for prevention of black-hole attack in MANET scenario. In: Colossal Data Analysis and Networking (CDAN), pp. 1–5. IEEE (2016)

    Google Scholar 

  3. Hiroki, U., Sonoko, T., Hiroshi, S.: An effective secure routing protocol considering trust in mobile ad hoc networks. IPSJ J. 55, 649–658 (2014)

    Google Scholar 

  4. Umeda, S., Takeda, S., Shigeno, H.: Trust evaluation method adapted to node behavior for secure routing in mobile ad hoc networks. In: Eighth International Conference on Mobile Computing and Ubiquitous Networking, pp. 143–148. IEEE, Melbourne (2015)

    Google Scholar 

  5. Zhan, G., Shi, W., Deng, J.: Design and implementation of TARF: a trust-aware routing framework for WSNs. IEEE Trans. Dependable Secur. Comput. 9(2), 184–197 (2012)

    Article  Google Scholar 

  6. Li, H., Singhal, M.: A secure routing protocol for wireless ad hoc networks. In: Hawaii International Conference on System Sciences, p. 225a. IEEE, Hawaii (2006)

    Google Scholar 

  7. Rak, J.: Providing differentiated levels of service availability in VANET communications. IEEE Commun. Lett. 17(7), 1380–1383 (2013)

    Article  Google Scholar 

  8. Rak, J.: LLA. A new anypath routing scheme providing long path lifetime in VANETs. IEEE Commun. Lett. 18(2), 281–284 (2014)

    Article  Google Scholar 

  9. Kout, A., Labed, S., Chikhi, S., et al.: AODVCS, a new bio-inspired routing protocol based on cuckoo search algorithm for mobile ad hoc networks. Wirel. Netw. 9, 1–11 (2017)

    Article  Google Scholar 

  10. Singh, B., Srikanth, D., Kumar, C.R.S.: Mitigating effects of black hole attack in mobile ad-hoc NETworks: military perspective. In: IEEE International Conference on Engineering and Technology, pp. 21–22. IEEE, Hammamet (2016)

    Google Scholar 

  11. Zhu, Y.-S., Dou, G.-Q.: A dimensional trust-based security data aggregation method in wireless sensor networks. J. Wuhan Univ. (Nat. Sci. Ed.) 59(2), 193–197 (2013)

    Google Scholar 

  12. Adamic, L.A., Adar, E.: Friends and neighbors on the web. Soc. Netw. 25(3), 211–230 (2003)

    Article  Google Scholar 

  13. Xiao, W., Dong, H., Xin, Q.-L., et al.: Synthesis of large-scale multistream heat exchanger networks based on stream pseudo temperature. Chin. J. Chem. Eng. 14(5), 574–583 (2006)

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported by National Natural Science Foundation of China under Grant No. 61262072.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Baohua Huang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Huang, B., Mo, J., Cheng, X. (2018). Improving Security and Stability of AODV with Fuzzy Neural Network in VANET. In: Chellappan, S., Cheng, W., Li, W. (eds) Wireless Algorithms, Systems, and Applications. WASA 2018. Lecture Notes in Computer Science(), vol 10874. Springer, Cham. https://doi.org/10.1007/978-3-319-94268-1_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-94268-1_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-94267-4

  • Online ISBN: 978-3-319-94268-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics