Generic placeholder image

Recent Patents on Engineering

Editor-in-Chief

ISSN (Print): 1872-2121
ISSN (Online): 2212-4047

Research Article

Secure Vehicle-to-Vehicle Communication using Routing Protocol based on Trust Authentication Secure Sugeno Fuzzy Inference System Scheme

Author(s): Anupama K.N.* and R. Nagaraj

Volume 19, Issue 1, 2025

Published on: 23 February, 2024

Article ID: e230224227390 Pages: 17

DOI: 10.2174/0118722121269253240214075231

Price: $65

Abstract

Introduction: Vehicular Ad-hoc Network (VANET) is wireless communication between Roadside vehicles and vehicle infrastructure. Vehicle Ad Hoc Network (VANET) is a promising technology that effectively manages traffic and ensures road safety. However, communication in an open-access environment presents real challenges to security and privacy issues, which may affect large-scale deployments of VANETs. Vehicle identification, classification, distribution rates, and communication are the most challenging areas in previous methods. Vehicular communications face challenges due to vehicle interference and severe delays.

Method: To overcome the drawbacks, this patent work proposed a new method based on the Artificial Neural Network Trust Authentication Secure Sugeno Fuzzy System (AN2-TAS2FS). Vehicular Ad Hoc Networks (VANET) are required to transmit data between vehicles and use traffic safety indicators. Improved Cluster-Based Secure Routing Protocol (ICSRP). Artificial Neural Network Based Trust Authentication Secure Sugeno Fuzzy System (AN2-TAS2FS) used the symmetric key to increase the security performance of VANET. Use ANFIS-based Secure Sugeno Fuzzy System for calculating the node weights for data transferring; reduced the attacks accuracy of network malicious attacks.

Result: In the improved cluster-based VANET routing protocol, each node obtains an address using a new addressing scheme between the wireless vehicle-2-vehicle (V2V) exchanges and the Roadside Units (RSUs). It will explore the effectiveness of the Secure Sugeno Fuzzy System-based adaptation term Enhanced Cluster-based routing protocol in finding the vehicle's shortest-path for transmission.

Conclusion: Simulation results show that in the proposed ANN-based Trust Authentication Secure Sugeno Fuzzy System (AN2-TAS2FS) analysis, the packet delivery ratio is 93%, delay performance is 0.55 sec, throughput performance is 94%, bandwidth is 55 bits/sec, Network security is 92%, and the transmission ratio is 89%, attack detection is 90%.

[1]
F. Yang, J. Han, X. Ding, Z. Wei, and X. Bi, "Spectral efficiency optimization and interference management for multi-hop D2D communications in VANETs", IEEE Trans. Vehicular Technol., vol. 69, no. 6, pp. 6422-6436, 2020.
[http://dx.doi.org/10.1109/TVT.2020.2987526]
[2]
N. Lin, L. Fu, L. Zhao, G. Min, A. Al-Dubai, and H. Gacanin, "A novel multimodal collaborative drone-assisted VANET networking model", IEEE Trans. Wirel. Commun., vol. 19, no. 7, pp. 4919-4933, 2020.
[http://dx.doi.org/10.1109/TWC.2020.2988363]
[3]
O.S. Al-Heety, Z. Zakaria, M. Ismail, M.M. Shakir, S. Alani, and H. Alsariera, "A comprehensive survey: Benefits, services, recent works, challenges, security, and use cases for SDN-VANET", IEEE Access, vol. 8, pp. 91028-91047, 2020.
[http://dx.doi.org/10.1109/ACCESS.2020.2992580]
[4]
P. Wang, C.M. Chen, S. Kumari, M. Shojafar, R. Tafazolli, and Y.N. Liu, "HDMA: Hybrid D2D message authentication scheme for 5G-enabled VANETs", IEEE Trans. Intell. Transp. Syst., vol. 22, no. 8, pp. 5071-5080, 2021.
[http://dx.doi.org/10.1109/TITS.2020.3013928]
[5]
B. Liu, Z. Fang, W. Wang, X. Shao, W. Wei, D. Jia, E. Wang, and S. Xiong, "A region-based collaborative management scheme for dynamic clustering in green VANET", IEEE Trans. Green Commun. Netw., vol. 6, no. 3, pp. 1276-1287, 2022.
[http://dx.doi.org/10.1109/TGCN.2022.3158525]
[6]
J. Chen, and Z. Wang, "Topology control in hybrid VLC/RF vehicular Ad-Hoc network", IEEE Trans. Wirel. Commun., vol. 19, no. 3, pp. 1965-1976, 2020.
[http://dx.doi.org/10.1109/TWC.2019.2960229]
[7]
R.I. Abdelfatah, N.M. Abdal-Ghafour, and M.E. Nasr, "Secure VANET authentication protocol (SVAP) using chebyshev chaotic maps for emergency conditions", IEEE Access, vol. 10, pp. 1096-1115, 2022.
[http://dx.doi.org/10.1109/ACCESS.2021.3137877]
[8]
J. Chen, and Z. Wang, "Coordination game theory-based adaptive topology control for hybrid VLC/RF VANET", IEEE Trans. Commun., vol. 69, no. 8, pp. 5312-5324, 2021.
[http://dx.doi.org/10.1109/TCOMM.2021.3077950]
[9]
Q. Pan, J. Wu, J. Nebhen, A.K. Bashir, Y. Su, and J. Li, "Artificial intelligence-based energy efficient communication system for intelligent reflecting surface-driven VANETs", IEEE Trans. Intell. Transp. Syst., vol. 23, no. 10, pp. 19714-19726, 2022.
[http://dx.doi.org/10.1109/TITS.2022.3152677]
[10]
I. Finkelberg, T. Petrov, A. Gal-Tzur, N. Zarkhin, P. Pocta, T. Kovacikova, L. Buzna, M. Dado, and T. Toledo, "The effects of vehicle-to-infrastructure communication reliability on performance of signalized intersection traffic control", IEEE Trans. Intell. Transp. Syst., vol. 23, no. 9, pp. 15450-15461, 2022.
[http://dx.doi.org/10.1109/TITS.2022.3140767]
[11]
N.H. Hussein, C.T. Yaw, S.P. Koh, S.K. Tiong, and K.H. Chong, "A comprehensive survey on vehicular networking: Communications, applications, challenges, and upcoming research directions", IEEE Access, vol. 10, pp. 86127-86180, 2022.
[http://dx.doi.org/10.1109/ACCESS.2022.3198656]
[12]
Z. Wei, Q. Chen, H. Yang, H. Wu, Z. Feng, and F. Ning, "“Neighbor discovery for VANET with gossip mechanism and multipacket reception”, in IEEE", Int. J., vol. 9, no. 13, pp. 10502-10515, 2022.
[http://dx.doi.org/10.1109/JIOT.2021.3122023]
[13]
H. Tan, and I. Chung, "Secure authentication and key management with blockchain in VANETs", IEEE Access, vol. 8, pp. 2482-2498, 2020.
[http://dx.doi.org/10.1109/ACCESS.2019.2962387]
[14]
A.A. Khan, M. Abolhasan, W. Ni, J. Lipman, and A. Jamalipour, "A hybrid-fuzzy logic guided genetic algorithm (H-FLGA) approach for resource optimization in 5G VANETs", IEEE Trans. Vehicular Technol., vol. 68, no. 7, pp. 6964-6974, 2019.
[http://dx.doi.org/10.1109/TVT.2019.2915194]
[15]
F.A. Ghaleb, B.A.S. Al-Rimy, A. Almalawi, A.M. Ali, A. Zainal, M.A. Rassam, S.Z.M. Shaid, and M.A. Maarof, "Deep kalman neuro fuzzy-based adaptive broadcasting scheme for vehicular Ad hoc network: A context-aware approach", IEEE Access, vol. 8, pp. 217744-217761, 2020.
[http://dx.doi.org/10.1109/ACCESS.2020.3040903]
[16]
J. An, Y. Yu, J. Tang, and J. Zhan, "Fuzzy-based hybrid location algorithm for vehicle position in VANETs via fuzzy kalman filtering approach", Advances in. Fuzzy Systems., vol. 2019, p. 11, 2019.
[http://dx.doi.org/10.1155/2019/5142937]
[17]
J. An, X. Liu, and G. Wen, "Stability analysis of delayed Takagi-Sugeno fuzzy systems: A new integral inequality approach", J. Non. Sci. App., vol. 10, no. 4, pp. 1941-1959, 2017.
[http://dx.doi.org/10.22436/jnsa.010.04.53]
[18]
J.M. Mendel, R. Chimatapu, and H. Hagras, "Comparing the performance potentials of singleton and non-singleton type-1 and interval type-2 fuzzy systems in terms of sculpting the state space", IEEE Trans. Fuzzy Syst., vol. 28, no. 4, pp. 783-794, 2020.
[http://dx.doi.org/10.1109/TFUZZ.2019.2916103]
[19]
H. Alolaiyan, U. Shuaib, L. Latif, and A. Razaq, "t-Intuitionistic fuzzification of lagrange’s theorem of t-intuitionistic fuzzy subgroup", IEEE Access, vol. 7, pp. 158419-158426, 2019.
[http://dx.doi.org/10.1109/ACCESS.2019.2950167]
[20]
O. Ajayi, M. Babahaji, and A. Aghdam, "A multi-spectral approach to fuzzy quantum modelling of nonlinear systems", IEEE J. Radio Freq. Identif., vol. 5, no. 3, pp. 254-260, 2021.
[http://dx.doi.org/10.1109/JRFID.2021.3066884]
[21]
T. Chatterjee, R. Karmakar, G. Kaddoum, S. Chattopadhyay, and S. Chakraborty, "A survey of VANET/V2X routing from the perspective of non-learning- and learning-based approaches", IEEE Access, vol. 10, pp. 23022-23050, 2022.
[http://dx.doi.org/10.1109/ACCESS.2022.3152767]
[22]
H. Fatemidokht, M.K. Rafsanjani, B.B. Gupta, and C.H. Hsu, "Efficient and secure routing protocol based on artificial intelligence algorithms with UAV-assisted for vehicular Ad Hoc networks in intelligent transportation systems", IEEE Trans. Intell. Transp. Syst., vol. 22, no. 7, pp. 4757-4769, 2021.
[http://dx.doi.org/10.1109/TITS.2020.3041746]
[23]
L.L. Cárdenas, A.M. Mezher, P.A. Barbecho Bautista, J.P. Astudillo León, and M.A. Igartua, "A multimetric predictive ANN-based routing protocol for vehicular Ad Hoc networks", IEEE Access, vol. 9, pp. 86037-86053, 2021.
[http://dx.doi.org/10.1109/ACCESS.2021.3088474]
[24]
S.S. Sepasgozar, and S. Pierre, "Network traffic prediction model considering road traffic parameters using artificial intelligence methods in VANET", IEEE Access, vol. 10, pp. 8227-8242, 2022.
[http://dx.doi.org/10.1109/ACCESS.2022.3144112]
[25]
M.A. Saleem, S. Zhou, A. Sharif, T. Saba, M.A. Zia, A. Javed, S. Roy, and M. Mittal, "Expansion of cluster head stability using fuzzy in cognitive radio CR-VANET", IEEE Access, vol. 7, pp. 173185-173195, 2019.
[http://dx.doi.org/10.1109/ACCESS.2019.2956478]
[26]
M.A. Al-Shareeda, and S. Manickam, "COVID-19 vehicle based on an efficient mutual authentication scheme for 5G-enabled vehicular fog computing", Int. J. Environ. Res. Public Health, vol. 19, no. 23, p. 15618, 2022.
[http://dx.doi.org/10.3390/ijerph192315618] [PMID: 36497709]
[27]
M.A. Al-Shareeda, M. Anbar, S. Manickam, and I.H. Hasbullah, "SE-CPPA: A secure and efficient conditional privacy-preserving authentication scheme in vehicular Ad-Hoc networks", Sensors , vol. 21, no. 24, p. 8206, 2021.
[http://dx.doi.org/10.3390/s21248206] [PMID: 34960311]
[28]
M.A. Al-Shareeda, M. Anbar, S. Manickam, and I.H. Hasbullah, "Towards identity-based conditional privacy-preserving authentication scheme for vehicular Ad Hoc networks", IEEE Access, vol. 9, pp. 113226-113238, 2021.
[http://dx.doi.org/10.1109/ACCESS.2021.3104148]
[29]
B.A. Mohammed, M.A. Al-Shareeda, S. Manickam, Z.G. Al-Mekhlafi, A. Alreshidi, M. Alazmi, J.S. Alshudukhi, and M. Alsaffar, "FC-PA: Fog computing-based pseudonym authentication scheme in 5G-enabled vehicular networks", IEEE Access, vol. 11, pp. 18571-18581, 2023.
[http://dx.doi.org/10.1109/ACCESS.2023.3247222]
[30]
M.A. Al-Shareeda, and S. Manickam, "MSR-DoS: Modular square root-based scheme to resist Denial of Service (DoS) attacks in 5G-enabled vehicular networks", IEEE Access, vol. 10, pp. 120606-120615, 2022.
[http://dx.doi.org/10.1109/ACCESS.2022.3222488]

Rights & Permissions Print Cite
© 2025 Bentham Science Publishers | Privacy Policy