Upinder Kaur, Aparna N. Mahajan, Sunil Kumar, Kamlesh Dutta
{"title":"Jellyfish Search Chimp Optimization Enabled Routing and Attack Detection in SDN based VANETs","authors":"Upinder Kaur, Aparna N. Mahajan, Sunil Kumar, Kamlesh Dutta","doi":"10.1007/s11277-024-11525-1","DOIUrl":null,"url":null,"abstract":"<p>In recent times, Vehicular Ad hoc Network (VANET) has been the focal point of the research community to devise efficient smart transportation systems. VANET provides the key advantage of providing cautionary measures and safety to passengers and drivers. With the evolution of fifth-generation (5G) network technology and rapid growth in vehicles, it becomes challenging for conventional VANET to manage large-scale dynamic heterogeneous networks due to their limited flexibility and scalability features. Moreover, the dynamic nature of VANET makes it vulnerable to malicious attacks. Software Defined Networking (SDN) is a technology that provides an integrated improvement over the conventional VANETs. SDN architecture is flexible, programmable, scalable, and provides globally the knowledge of the network. However, its centralized nature makes SDN based VANETs a prime target of attackers, which may adversely impact the VANETs causing life-threatening consequences. To address these issues, this paper presents two novel schemes. Firstly, this paper presents a trusted routing scheme named Jellyfish Chimp Optimization Algorithm (JChOA) for SDN based VANETs. JChOA is designed by amalgamation of the Jellyfish Search Optimization algorithm (JS) and Chimp Optimization algorithm (ChOA). Secondly, this paper presents an attack detection and mitigation scheme named JChOA_RideNN for SDN based VANETs. This attack detection scheme utilizes the Rider Optimization Algorithm based neural network (RideNN) architecture at the SDN controller, where the weighting parameters of RideNN tunned through the use of JChOA. The effectiveness of JChOA routing is evaluated based on the metrics energy and trust value where the performance of JChOA_RideNN is assessed using precision and recall. Moreover, the JChOA routing algorithm attained greater performance with a maximum of 0.947 J energy and 0.462 trust value and JChOA_RideNN attained with a maximum of 93.9% precision, and 93.1% recall than other traditional approaches. The results of the experiments clearly show the effectiveness of the proposed defensive schemes for SDN based VANETs.</p>","PeriodicalId":23827,"journal":{"name":"Wireless Personal Communications","volume":"35 1","pages":""},"PeriodicalIF":1.9000,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Wireless Personal Communications","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1007/s11277-024-11525-1","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
引用次数: 0
Abstract
In recent times, Vehicular Ad hoc Network (VANET) has been the focal point of the research community to devise efficient smart transportation systems. VANET provides the key advantage of providing cautionary measures and safety to passengers and drivers. With the evolution of fifth-generation (5G) network technology and rapid growth in vehicles, it becomes challenging for conventional VANET to manage large-scale dynamic heterogeneous networks due to their limited flexibility and scalability features. Moreover, the dynamic nature of VANET makes it vulnerable to malicious attacks. Software Defined Networking (SDN) is a technology that provides an integrated improvement over the conventional VANETs. SDN architecture is flexible, programmable, scalable, and provides globally the knowledge of the network. However, its centralized nature makes SDN based VANETs a prime target of attackers, which may adversely impact the VANETs causing life-threatening consequences. To address these issues, this paper presents two novel schemes. Firstly, this paper presents a trusted routing scheme named Jellyfish Chimp Optimization Algorithm (JChOA) for SDN based VANETs. JChOA is designed by amalgamation of the Jellyfish Search Optimization algorithm (JS) and Chimp Optimization algorithm (ChOA). Secondly, this paper presents an attack detection and mitigation scheme named JChOA_RideNN for SDN based VANETs. This attack detection scheme utilizes the Rider Optimization Algorithm based neural network (RideNN) architecture at the SDN controller, where the weighting parameters of RideNN tunned through the use of JChOA. The effectiveness of JChOA routing is evaluated based on the metrics energy and trust value where the performance of JChOA_RideNN is assessed using precision and recall. Moreover, the JChOA routing algorithm attained greater performance with a maximum of 0.947 J energy and 0.462 trust value and JChOA_RideNN attained with a maximum of 93.9% precision, and 93.1% recall than other traditional approaches. The results of the experiments clearly show the effectiveness of the proposed defensive schemes for SDN based VANETs.
期刊介绍:
The Journal on Mobile Communication and Computing ...
Publishes tutorial, survey, and original research papers addressing mobile communications and computing;
Investigates theoretical, engineering, and experimental aspects of radio communications, voice, data, images, and multimedia;
Explores propagation, system models, speech and image coding, multiple access techniques, protocols, performance evaluation, radio local area networks, and networking and architectures, etc.;
98% of authors who answered a survey reported that they would definitely publish or probably publish in the journal again.
Wireless Personal Communications is an archival, peer reviewed, scientific and technical journal addressing mobile communications and computing. It investigates theoretical, engineering, and experimental aspects of radio communications, voice, data, images, and multimedia. A partial list of topics included in the journal is: propagation, system models, speech and image coding, multiple access techniques, protocols performance evaluation, radio local area networks, and networking and architectures.
In addition to the above mentioned areas, the journal also accepts papers that deal with interdisciplinary aspects of wireless communications along with: big data and analytics, business and economy, society, and the environment.
The journal features five principal types of papers: full technical papers, short papers, technical aspects of policy and standardization, letters offering new research thoughts and experimental ideas, and invited papers on important and emerging topics authored by renowned experts.