Abstract
Recent reports show that the millions of people killed each year in the road accidents are due to high density vehicles and traffic environment. The road traffic safety has been an unsolvable problem in recent population. Generally, nodes in vehicle ad hoc networks have a relatively high speed, while there is a major issue to provide the accurate data transmission between two nodes. Many research works have been undertaken to solve these issues by trust based techniques. In this paper, a highly secured QoS aware routing algorithm (HSQ-RA) using optimal trust management scheme is proposed. In HSQ-RA, the multi-hop clustering is performed by improved whale optimization algorithm and the inter-cluster routing is done using the trust values. The multiple constraints are used to calculate the trust of each node and optimized by the trust search algorithm. The simulation result exhibits that the proposed HSQ-RA algorithm provides better quality of service (QoS), delivery rate, faster way to discover routing and reduce loss rate.
Similar content being viewed by others
References
Wu, S. (2002). A Multi-channel MAC protocol with power control for multi-hop mobile ad hoc networks. The Computer Journal, 45(1), 101–110.
Leinmuller, T., Schoch, E., & Kargl, F. (2006). Position verification approaches for vehicular ad hoc networks. IEEE Wireless Communications, 13(5), 16–21.
Guclu, S. S., & Altilar, D. T. (2014). Uplink utilization with V2V2R communications in clustered vehicular networks. In 4th international conference on wireless communications, vehicular technology, information theory and aerospace & electronic systems (VITAE), Aalborg (pp. 1–5)
Fascista, A., Ciccarese, G., Coluccia, A., & Ricci, G. (2017). A localization algorithm based on V2I communications and AOA estimation. IEEE Signal Processing Letters, 24(1), 126–130.
Nilsson, M., Gustafson, C., Abbas, T., & Tufvesson, F. (2017). A measurement-based multilink shadowing model for V2V network simulations of highway scenarios. IEEE Transactions on Vehicular Technology, 66(10), 8632–8643.
Wasef, A., Lu, R., Lin, X., & Shen, X. (2010). Complementing public key infrastructure to secure vehicular ad hoc networks security and privacy in emerging wireless networks. IEEE Wireless Communications, 17(5), 22–28.
Isaac, J., Zeadally, S., & Camara, J. (2010). Security attacks and solutions for vehicular ad hoc networks. IET Communications, 4(7), 894.
Zhang, Lei, Wu, Qianhong, Solanas, A., & Domingo-Ferrer, J. (2010). A scalable robust authentication protocol for secure vehicular communications. IEEE Transactions on Vehicular Technology, 59(4), 1606–1617.
Dietzel, S., Schoch, E., Konings, B., Weber, M., & Kargl, F. (2010). Resilient secure aggregation for vehicular networks. IEEE Network, 24(1), 26–31.
Wasef, A., & Shen, X. (2013). EMAP: Expedite message authentication protocol for vehicular ad hoc networks. IEEE Transactions on Mobile Computing, 12(1), 78–89.
Mershad, K., & Artail, H. (2013). A framework for secure and efficient data acquisition in vehicular ad hoc networks. IEEE Transactions on Vehicular Technology, 62(2), 536–551.
Guo, S., Zeng, D., & Xiang, Y. (2014). Chameleon hashing for secure and privacy-preserving vehicular communications. IEEE Transactions on Parallel and Distributed Systems, 25(11), 2794–2803.
Bhoi, S., & Khilar, P. (2015). SIR: A secure and intelligent routing protocol for vehicular ad hoc network. IET Networks, 4(3), 185–194.
Li, W., & Song, H. (2016). ART: An attack-resistant trust management scheme for securing vehicular ad hoc networks. IEEE Transactions on Intelligent Transportation Systems, 17(4), 960–969.
Wang, F., Xu, Y., Zhang, H., Zhang, Y., & Zhu, L. (2016). 2FLIP: A two-factor lightweight privacy-preserving authentication scheme for VANET. IEEE Transactions on Vehicular Technology, 65(2), 896–911.
Chuang, Ming-Chin, & Lee, Jeng-Farn. (2014). TEAM: Trust-extended authentication mechanism for vehicular ad hoc networks. IEEE Systems Journal, 8(3), 749–758.
Zhong, H., Wen, J., Cui, J., & Zhang, S. (2016). Efficient conditional privacy-preserving and authentication scheme for secure service provision in VANET. Tsinghua Science and Technology, 21(6), 620–629.
Xie, Y., Wu, L., Zhang, Y., & Shen, J. (2016). Efficient and secure authentication scheme with conditional privacy-preserving for VANETs. Chinese Journal of Electronics, 25(5), 950–956.
Shim, K. (2012). An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks. IEEE Transactions on Vehicular Technology, 61(4), 1874–1883.
Shao, J., Lin, X., Lu, R., & Zuo, C. (2016). A threshold anonymous authentication protocol for VANETs. IEEE Transactions on Vehicular Technology, 65(3), 1711–1720.
Cui, J., Zhang, J., Zhong, H., & Xu, Y. (2017). SPACF: A secure privacy-preserving authentication scheme for VANET with Cuckoo filter. IEEE Transactions on Vehicular Technology, 66(11), 10283–10295.
Wazid, M., Das, A., Kumar, N., Odelu, V., Goutham Reddy, A., Park, K., et al. (2017). Design of lightweight authentication and key agreement protocol for vehicular ad hoc networks. IEEE Access, 5, 14966–14980.
Hashem Eiza, M., Owens, T., & Ni, Q. (2016). Secure and robust multi-constrained QoS aware routing algorithm for VANETs. IEEE Transactions on Dependable and Secure Computing, 13(1), 32–45.
Mirjalili, S., & Lewis, A. (2016). The Whale optimization algorithm. Advances in Engineering Software, 95, 51–67.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Ahmed, S., Ramesh, N.V.K. & Reddy, B.N.K. A Highly Secured QoS Aware Routing Algorithm for Software Defined Vehicle Ad-Hoc Networks Using Optimal Trust Management Scheme. Wireless Pers Commun 113, 1807–1821 (2020). https://doi.org/10.1007/s11277-020-07293-3
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-020-07293-3