Skip to main content
Log in

A Highly Secured QoS Aware Routing Algorithm for Software Defined Vehicle Ad-Hoc Networks Using Optimal Trust Management Scheme

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Recent reports show that the millions of people killed each year in the road accidents are due to high density vehicles and traffic environment. The road traffic safety has been an unsolvable problem in recent population. Generally, nodes in vehicle ad hoc networks have a relatively high speed, while there is a major issue to provide the accurate data transmission between two nodes. Many research works have been undertaken to solve these issues by trust based techniques. In this paper, a highly secured QoS aware routing algorithm (HSQ-RA) using optimal trust management scheme is proposed. In HSQ-RA, the multi-hop clustering is performed by improved whale optimization algorithm and the inter-cluster routing is done using the trust values. The multiple constraints are used to calculate the trust of each node and optimized by the trust search algorithm. The simulation result exhibits that the proposed HSQ-RA algorithm provides better quality of service (QoS), delivery rate, faster way to discover routing and reduce loss rate.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Wu, S. (2002). A Multi-channel MAC protocol with power control for multi-hop mobile ad hoc networks. The Computer Journal, 45(1), 101–110.

    Article  MATH  Google Scholar 

  2. Leinmuller, T., Schoch, E., & Kargl, F. (2006). Position verification approaches for vehicular ad hoc networks. IEEE Wireless Communications, 13(5), 16–21.

    Article  Google Scholar 

  3. Guclu, S. S., & Altilar, D. T. (2014). Uplink utilization with V2V2R communications in clustered vehicular networks. In 4th international conference on wireless communications, vehicular technology, information theory and aerospace & electronic systems (VITAE), Aalborg (pp. 1–5)

  4. Fascista, A., Ciccarese, G., Coluccia, A., & Ricci, G. (2017). A localization algorithm based on V2I communications and AOA estimation. IEEE Signal Processing Letters, 24(1), 126–130.

    Article  Google Scholar 

  5. Nilsson, M., Gustafson, C., Abbas, T., & Tufvesson, F. (2017). A measurement-based multilink shadowing model for V2V network simulations of highway scenarios. IEEE Transactions on Vehicular Technology, 66(10), 8632–8643.

    Article  Google Scholar 

  6. Wasef, A., Lu, R., Lin, X., & Shen, X. (2010). Complementing public key infrastructure to secure vehicular ad hoc networks security and privacy in emerging wireless networks. IEEE Wireless Communications, 17(5), 22–28.

    Article  Google Scholar 

  7. Isaac, J., Zeadally, S., & Camara, J. (2010). Security attacks and solutions for vehicular ad hoc networks. IET Communications, 4(7), 894.

    Article  MathSciNet  MATH  Google Scholar 

  8. Zhang, Lei, Wu, Qianhong, Solanas, A., & Domingo-Ferrer, J. (2010). A scalable robust authentication protocol for secure vehicular communications. IEEE Transactions on Vehicular Technology, 59(4), 1606–1617.

    Article  Google Scholar 

  9. Dietzel, S., Schoch, E., Konings, B., Weber, M., & Kargl, F. (2010). Resilient secure aggregation for vehicular networks. IEEE Network, 24(1), 26–31.

    Article  Google Scholar 

  10. Wasef, A., & Shen, X. (2013). EMAP: Expedite message authentication protocol for vehicular ad hoc networks. IEEE Transactions on Mobile Computing, 12(1), 78–89.

    Article  Google Scholar 

  11. Mershad, K., & Artail, H. (2013). A framework for secure and efficient data acquisition in vehicular ad hoc networks. IEEE Transactions on Vehicular Technology, 62(2), 536–551.

    Article  Google Scholar 

  12. Guo, S., Zeng, D., & Xiang, Y. (2014). Chameleon hashing for secure and privacy-preserving vehicular communications. IEEE Transactions on Parallel and Distributed Systems, 25(11), 2794–2803.

    Article  Google Scholar 

  13. Bhoi, S., & Khilar, P. (2015). SIR: A secure and intelligent routing protocol for vehicular ad hoc network. IET Networks, 4(3), 185–194.

    Article  Google Scholar 

  14. Li, W., & Song, H. (2016). ART: An attack-resistant trust management scheme for securing vehicular ad hoc networks. IEEE Transactions on Intelligent Transportation Systems, 17(4), 960–969.

    Article  Google Scholar 

  15. Wang, F., Xu, Y., Zhang, H., Zhang, Y., & Zhu, L. (2016). 2FLIP: A two-factor lightweight privacy-preserving authentication scheme for VANET. IEEE Transactions on Vehicular Technology, 65(2), 896–911.

    Article  Google Scholar 

  16. Chuang, Ming-Chin, & Lee, Jeng-Farn. (2014). TEAM: Trust-extended authentication mechanism for vehicular ad hoc networks. IEEE Systems Journal, 8(3), 749–758.

    Article  Google Scholar 

  17. Zhong, H., Wen, J., Cui, J., & Zhang, S. (2016). Efficient conditional privacy-preserving and authentication scheme for secure service provision in VANET. Tsinghua Science and Technology, 21(6), 620–629.

    Article  Google Scholar 

  18. Xie, Y., Wu, L., Zhang, Y., & Shen, J. (2016). Efficient and secure authentication scheme with conditional privacy-preserving for VANETs. Chinese Journal of Electronics, 25(5), 950–956.

    Article  Google Scholar 

  19. Shim, K. (2012). An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks. IEEE Transactions on Vehicular Technology, 61(4), 1874–1883.

    Article  Google Scholar 

  20. Shao, J., Lin, X., Lu, R., & Zuo, C. (2016). A threshold anonymous authentication protocol for VANETs. IEEE Transactions on Vehicular Technology, 65(3), 1711–1720.

    Article  Google Scholar 

  21. Cui, J., Zhang, J., Zhong, H., & Xu, Y. (2017). SPACF: A secure privacy-preserving authentication scheme for VANET with Cuckoo filter. IEEE Transactions on Vehicular Technology, 66(11), 10283–10295.

    Article  Google Scholar 

  22. Wazid, M., Das, A., Kumar, N., Odelu, V., Goutham Reddy, A., Park, K., et al. (2017). Design of lightweight authentication and key agreement protocol for vehicular ad hoc networks. IEEE Access, 5, 14966–14980.

    Article  Google Scholar 

  23. Hashem Eiza, M., Owens, T., & Ni, Q. (2016). Secure and robust multi-constrained QoS aware routing algorithm for VANETs. IEEE Transactions on Dependable and Secure Computing, 13(1), 32–45.

    Article  Google Scholar 

  24. Mirjalili, S., & Lewis, A. (2016). The Whale optimization algorithm. Advances in Engineering Software, 95, 51–67.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to B. Naresh Kumar Reddy.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ahmed, S., Ramesh, N.V.K. & Reddy, B.N.K. A Highly Secured QoS Aware Routing Algorithm for Software Defined Vehicle Ad-Hoc Networks Using Optimal Trust Management Scheme. Wireless Pers Commun 113, 1807–1821 (2020). https://doi.org/10.1007/s11277-020-07293-3

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-020-07293-3

Keywords

Navigation