Browse > Article
http://dx.doi.org/10.22937/IJCSNS.2022.22.7.19

Whale Optimization Algorithm and Blockchain Technology for Intelligent Networks  

Sulthana, Shazia (Department of ECE, Global Academy of Technology, VTU)
Reddy, BN Manjunatha (Department of ECE, Global Academy of Technology, VTU)
Publication Information
International Journal of Computer Science & Network Security / v.22, no.7, 2022 , pp. 157-164 More about this Journal
Abstract
The proposed privacy preserving scheme has identified the drawbacks of existing schemes in Vehicular Networks. This prototype enhances the number of nodes by decreasing the cluster size. This algorithm is integrated with the whale optimization algorithm and Block Chain Technology. A set of results are done through the NS-2 simulator in the direction to check the effectiveness of proposed algorithm. The proposed method shows better results than with the existing techniques in terms of Delay, Drop, Delivery ratio, Overhead, throughout under the denial of attack.
Keywords
VANET; Privacy; Block chain; Cluster size; Network simulator;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 Ying, B. Nayak,:An Anonymous and lightweight authentication for secure vehicular networks. IEEE Trans.Veh. Technol. 2017, 66, 10626-10636   DOI
2 Sherazi, H.H.R.; Iqbal, R.; Ahmad, F.; Khan, Z.A.; Chaudary, M.H.:DDoS attack detection: A key enabler forsustainable communication in internet of vehicles.Sustain. Comput. Inf. Syst. 2019, 23, 13-20.
3 Ikram Ali, Mwitende Gervais, Emmanuel Ahene and Fagen Li:A blockchain-based certificateless public key signature scheme for vehicle-to-infrastructure communication in VANETs. Journal of Systems Architecture, Vol. 99, No. 101636, 2019.
4 Bidiyng and Amiya Nayak:Anonymous and Lightweight Authentication for Secure Vehicular Networks. IEEE Transactions on Vehicular Technology Volume: 66, Issue: 12, Dec. 2017.
5 Prashar, D.; Jha, N.; Jha, S.; Joshi, G.P.; Seo, C:Integrating IoT and Block chain for Ensuring Road Safety:An Unconventional Approach. Sensors 2020, 20, 3296   DOI
6 Yang, Y.T.; Chou, L.D.; Tseng, C.W.; Tseng, F.H.; Liu, C.C. :Block chain-based trace event validation and trust verification for VANETs. IEEE Access 2019, 7, 30868-30877.   DOI
7 Dai, H.-N.; Zheng, Z.; Zhang, Y:Block chain for Internet of Things: A Survey. IEEE Internet Things J. 2019, 6,8076-8094.   DOI
8 Xuanxia Yao, Xinlei Zhang , Huansheng Ning and Pengjian Li:Using Trust Model to Ensure Reliable Data Acquisition in VANETs. Ad Hoc Networks, Vol. 55, pp. 107-118, 2017.   DOI
9 R.Muthumeenakshi, T.R.Reshmi and K.Murugan:Extended 3PAKE authentication scheme for value-added services in VANETs.Computers & Electrical Engineering, Vol. 59, pp. 27-38, 2017.   DOI
10 Dongyao Jia and Dong Ngoduy:Enhanced cooperative carfollowing traffic model with the combination of V2V and V2I communication. Transportation Research Part B: Methodological, Vol. 90, pp. 172-191, 2016.   DOI
11 Wazid, M.; Das, A.K.; Kumar, N.; Odelu,V.; Reddy, A.G.;Park, K.; Park,Y. :Design of lightweight authentication and key agreement protocol for vehicular adhoc networks.IEEE Access 2017 5, 14966-14980.   DOI
12 Rajput, U.; Abbas, F.; Eun, H.; Oh, H,:A hybrid approach for efficient privacy-preserving authentication in VANET.IEEE Access 2017, 5, 12014-12030.   DOI
13 Lei, A.; Ogah, C.; Al, E, :A Secure Key Management Scheme for Heterogeneous Secure Vehicular Communication Systems.ZteCommun, Mag. 2016, 111.
14 S. Mirjalili and A. Lewis, :the whale optimization algorithm. Adv. Eng.Softw., vol. 95, pp. 51_67, May 2016.   DOI
15 Cui, J.; Zhang, J.; Zhong, H.; Xu, Y:SPACF: A secure privacy-preserving authentication scheme for VANET with CUCKOO Filter. IEEE Transmission Vehicle Technology, 2017, 66, 10283-10295.   DOI
16 Wafa Ben Jaballah, Mauro Conti and Chhagan Lal,:Security and Design Requirements for Software-Defined VANETs", Computer Networks. Vol. 169, No. 107099, 2020.
17 Leiding, B.; Memarmo shrefi, P.; Hogrefe, D.:Self-managed and Block chain-based vehicular ad-hoc networks. In Proceedings of the 2016 ACM Int. Jt. Conf.Pervasive Ubiquitous Comput. Adjun-UbiComp, Heidelberg, Germany, 12-16 September 2016; Volume 16, p. 137140.
18 Rowan, S.; Clear, M.; Gerla, M.; Huggard, M.; Goldrick, C.M. :Securing Vehicle to Vehicle Communications using Block chain through Visible Light and Acoustic Side Channels. arXiv 2017, arXiv:1704.02553.
19 Guo, S.; Hu, X.; Zhou, Z.; Wang, X.; Qi, F.; Gao, L.:Trust access authentication in vehicular network based on Block chain. China Commun. 2019, 16, 18-30.   DOI
20 Dorri, A.:Block chain: A Distributed Solution to Automotive Security and Privacy. IEEE Commun. Mag. 2017, 55, 119-125.   DOI
21 Tangade, S.; Manvi, S.S. :Scalable and privacy-preserving authentication protocol for secure vehicular communications. International Proceedings of the 2016 IEEE International Conference on Advanced Networks and Telecommunications Systems, Bangalore, India, 6-9 November 2016.
22 Song, F.; Zhu, M.; Zhou, Y.; You, I.; Zhang, H. :Smart collaborative tracking for ubiquitous power. IoT inedgecloud interplay domain. IEEE Int. Things J. 2019
23 Moazzeni, A.R.; Khamehchi, E. :Rain optimization algorithm (ROA): A new metaheuristic method for drilling optimization solutions. J. Pet. Sci. Eng.2020.
24 Shrestha, R.; Bajracharya, R.; Shrestha, A.P.; Nam, S.Y, :A new type of Block chain for secure message exchange in VANET. Digit. Commun. Netw. 2020, 6, 177-186.   DOI
25 Sherazi, H.H.R.; Khan, Z.A.; Iqbal, R.; Rizwan, S.; Imran,M.A.;Awan,K, :A heterogeneous IoV architecture for data forwarding in vehicle to infrastructure communication. Mob. Inf. Syst. 2019.