Refine your search
Collections
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Geetha, S.
- Towards Improved Detection of Intrusions with Constraint-Based Clustering (CBC)
Abstract Views :222 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science and Engineering, College of Engineering and Technology, SRM Institute of Science and Technology, SRM Nagar, Kattankulathur, Kanchipuram, Chennai, Tamil Nadu, IN
2 Department of Information Science and Engineering, CMR Institute of Technology, Bangalore, IN
3 Department of Computer Science and Engineering, SRM Institute of Science and Technology, SRM Nagar, Chennai, Tamil Nadu, IN
1 Department of Computer Science and Engineering, College of Engineering and Technology, SRM Institute of Science and Technology, SRM Nagar, Kattankulathur, Kanchipuram, Chennai, Tamil Nadu, IN
2 Department of Information Science and Engineering, CMR Institute of Technology, Bangalore, IN
3 Department of Computer Science and Engineering, SRM Institute of Science and Technology, SRM Nagar, Chennai, Tamil Nadu, IN
Source
International Journal of Computer Networks and Applications, Vol 8, No 1 (2021), Pagination: 28-43Abstract
The modern society is greatly benefited by the advancement of the Internet. The quick surge in the number of connections and the ease of access to the Internet have given rise to tremendous security threat to individuals and organizations. In addition to intrusion prevention techniques like firewalls, intrusion detection systems (IDS) are an obligatory level of safety for establishments to identify insiders and outsiders with malicious intentions. Anomaly-based IDS is in the literature for the last few decades, but still the existing methods lack in three main aspects – difficulty in handling mixed attribute types, more dependence on input parameters and incompetence in maintaining a good balance between detection rate (DR) and false alarm rate (FAR). The research work proposed in this paper proposes a semi supervised IDS based on outlier detection which first selects the important features that help in identifying intrusive events and then applies a constraint-based clustering algorithm to closely learn the properties of normal connections. The proposed method can handle data with mixed attribute types efficiently, requires less number of parameters and maintains a good balance between DR and FAR. The standard NSL-KDD benchmark dataset is used for performance evaluation and the experimental results yielded an overall DR of 99.52% and FAR of 1.15%. It is successful in identifying 99.81% of DoS attacks, 99.71% of Probe attacks, 98.73% of R2L attacks and 96.50% of U2R attacks.Keywords
Anomaly, Classification, Feature Extraction, NSL-KDD Dataset, Outlier, Intrusion Detection.References
- V. Chandola, A. Banerjee and V. Kumar, “Anomaly Detection: A Survey”, in ACM Computing Surveys (CSUR), ACM, Vol. 41, No.3, pp. 1-58, 2009.
- V. Hodge and J. Austin, “A Survey of Outlier Detection Methodologies”, Artificial Intelligence Review, Vol. 22, No. 2, pp. 85-126, 2004.
- M. I. Petrovskiy, “Outlier Detection Algorithms in Data Mining Systems”, Programming and Computer Software, Vol. 24, No. 4, pp. 228-237, 2003;
- E. M. Knorr and T. Ng. Raymond, Finding intensional knowledge of distance-based outliers, in VLDB, vol. 99, pp. 211-222, 1999.
- F. Angiulli, S. Basta and C. Pizzuti, “Distance-based detection and prediction of outliers”, IEEE Transactions on Knowledge and Data Engineering, Vol.18, No. 2, 2005, pp. 145-160.
- J. Zhang, “Advancements of outlier detection: A Survey”, ICST Transactions on Scalable Information Systems, Vol. 13, No. 1, 2013, pp. 1-26.
- M. M. Breunig, H. P. Kriegel, R. T. Ng and J. Sander, “LOF: Identifying Density-based Local Outliers” in Proceedings of the 2000 ACM SIGMOD International Conference on Management of data, 2000, pp. 93-104.
- S. Ramaswamy, R. Rastogi and K. Shim, “Efficient algorithms for mining outliers from large data sets”, in Proceedings of the 2000 ACM SIGMOD International conference on Management of Data, 2000, pp. 427-438.
- Z. He, X. Xu, Z.J. Huang and S. Deng, “FP-outlier: Frequent pattern based outlier detection”, Computer Science and Information Systems, Vol. 2, No. 1, 2015, pp. 103-118.
- C.C. Aggarwal, “Data Mining: Text Book”, Springer International Publishing, Switzerland, 2015, pp. 246-248.
- P. Murugavel and M. Punithavalli, “Improved Hybrid Clustering and Distance-based Technique for outlier removal”, International Journal of Computer Science and Engineering (IJCSE), Vol. 3, No. 1, 2011, pp. 333-339.
- S. Cherednichenko, “Outlier Detection in Clustering”, University of Joensuu, Department of Computer Science (Doctoral dissertation, Master’s Thesis), 2005.
- C. H. Teixeira, G. H. Orair, W. Meira Jr and S. Parthasarathy, “An efficient algorithm for outlier detection in high dimensional real databases” in Technical report, University of Minas Gerais, 2008.
- G. Singh, F. Masseglia, C. Fiot, A. Marascu and P. Poncelet, “Data mining for intrusion detection: from outliers to true intrusions”, In Pacific-Asia Conference on Knowledge Discovery and Data Mining, Springer, Berlin, Heidelberg, 2009, pp. 891-898.
- P. Casas, J. Mazel and P. Owezarski, “UNADA: Unsupervised Network Anomaly Detection using Sub-space Outliers Ranking”, in International Conference on Research in Networking, Springer, Berlin, Heidelberg, 2011, pp. 40-51.
- M. H. Bhuyan, D. K. Bhattacharyya and J. K. Kalita, “NADO: Network Anomaly Detection using Outlier approach”, in Proceedings of the 2011 International Conference on Communication, Computing & Security, 2011, pp. 531-536.
- E. De la Hoz, E. De la Hoz, A. Ortiz, J. Ortega, and B. Prie, “PCA filtering and probabilistic SOM for network anomaly detection”, Neurocomputing, Vol. 164, pp. 71-81, 2015.
- H. Mohamad Tahir, W. Hasan, A. Md Said, N.H. Zakaria, N. Katuk, N.F. Kabir, M.H. Omar, O. Ghazali, and N.I. Yahaya, “Hybrid machine learning technique for intrusion detection system”, in Proc. ICOCI, 2015, pp. 464-472.
- R. Singh, H. Kumar, and R.K. Singla, “An intrusion detection system using network traffic profiling and online sequential extreme learning machine”, Expert Systems with Applications, Vol.42, No.22, 2015, pp. 8609-8624.
- M.H. Bhuyan, D.K. Bhattacharyya, and J.K. Kalita, “A multi-step outlier-based anomaly detection approach to network-wide traffic”, Information Science, Vol. 348, 2016, pp. 243-271.
- S.M.H. Bamakan, H. Wang, T. Yingjie, and Y. Shi, “An effective intrusion detection framework based on MCLP/SVM optimized by time-varying chaos particle swarm optimization”, Neurocomputing, vol. 199, 2016, pp. 90-102.
- A.C. Enache, and V. Sgarciu, “Anomaly intrusions detection based on support vector machines with an improved bat algorithm”, in Proc. CSCS, 2015, pp. 317-321.
- E.K. Viegas, A.O. Santin and L.S. Oliveira, “Toward a reliable anomaly-based intrusion detection in real-world environments”, Computer Networks, Vol. 127, 2017, pp. 200-216.
- S. Aljawarneh, M. Aldwairi and M.B. Yassein, “Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model”, Journal of Computational Science, vol. 25, 2018, pp. 152-160.
- P.A.A. Resende and A.C.Drummond, “Adaptive anomaly-based intrusion detection system using genetic algorithm and profiling”, Security and Privacy, Vol. 1, No. 4, 2018, p.e36.
- E. Min, J. Long, Q. Liu, J. Cui and W. Chen, “TR-IDS: Anomaly-based intrusion detection through text-convolutional neural network and random forest”, Security and Communication Networks, 2018.
- B.A. Tama, M. Comuzzi and K.H. Rhee, “TSE-IDS: A two-stage classifier ensemble for intelligent anomaly-based intrusion detection system”, IEEE Access, Vol. 7, 2019, pp. 94497-94507.
- S. Dwivedi, M. Vardhan, S. Tripathi and A.K. Shukla, “Implementation of adaptive scheme in evolutionary technique for anomaly-based intrusion detection”, Evolutionary Intelligence, Vol. 13, No. 1, 2020, pp. 103-117.
- S. Zavrak, M. Iskefiyeli, Anomaly-based intrusion detection from network flow features using variational autoencoder, IEEE Access, Vol. 8, 2020, pp. 108346-108358.
- L. Zhiqiang, L. Zhijun, G. Ting and S. Yucheng, “A Three-Layer Architecture for Intelligent Intrusion Detection using Deep Learning”, In Proceedings of Fifth International Congress on Information and Communication Technology, Springer, Singapore, 2021, pp. 245-255.
- W. Cui, Q. Lu, A.M. Qureshi, W. Li and K. Wu, “An adaptive LeNet-5 model for anomaly detection”, Information Security Journal: A Global Perspective, Vol. 30, No. 1, 2021, pp. 19-29.
- Z.A. Bakar, R. Mohemad, A. Ahmad and M.M. Deris, “A comparative study for outlier detection techniques in data mining”, in 2006 IEEE Conference on Cybernetics and Intelligent Systems, 2006, pp. 1-6, IEEE.
- A.K. Tung, J. Han, L.V. Laskhmanan and R.T. Ng, “Constraint-based clustering in large databases”, in International Conference on Database Theory, Springer, 2001, pp. 405-419.
- P. Gogoi, D.K. Bhattacharyya, B. Borah and J.K. Kalita, “A survey of outlier detection methods in network anomaly identification”, The Computer Journal, Vol. 54, No. 4, 2011, pp. 570-588.
- S. Ganapathy, N. Jaisankar, P. Yogesh and A. Kannan, “Intelligent agent-based intrusion detection system using enhanced multiclass SVM”, Computational Intelligence and Neuroscience, vol. 2012, 10 pages.
- J.R. Beulah and D.S. Punithavathani, “Simple Hybrid Feature Selection (SHFS) for enhancing network intrusion detection with NSL-KDD dataset”, International Journal of Applied Engineering Research, Vol. 10, No. 19, 2015, pp. 40498-40505.
- J.R. Beulah and D.S. Punithavathani, “A hybrid feature selection method for improved detection of wired/wireless network intrusions”, Wireless Personal Communications, Vol. 98, No. 2, 2018, pp. 1853-1869.
- Decisiveness PSO-Based Gaussian AOMDV (DPSO-GAOMDV) Routing Protocol: Smart Routing for Dynamic Traffic Conditions in Stochastic Vehicular Ad Hoc Network
Abstract Views :83 |
PDF Views:1
Authors
M. Kayalvizhi
1,
S. Geetha
2
Affiliations
1 Department of Computer Science, Sri Krishna Adithya College of Arts and Science, Coimbatore, Tamil Nadu, IN
2 Department of Computer Science, Government Arts and Science College for Women, Coimbatore, Tamil Nadu, IN
1 Department of Computer Science, Sri Krishna Adithya College of Arts and Science, Coimbatore, Tamil Nadu, IN
2 Department of Computer Science, Government Arts and Science College for Women, Coimbatore, Tamil Nadu, IN
Source
International Journal of Computer Networks and Applications, Vol 10, No 5 (2023), Pagination: 850-867Abstract
Vehicular Ad Hoc Networks (VANETs) have gained prominence in vehicular communication due to their potential to enhance road safety, traffic efficiency, and infotainment services. However, the evolution of Stochastic VANETs (SVANETs) has introduced a layer of uncertainty, where vehicular interactions are influenced by dynamic factors such as varying traffic conditions, changing communication environments, and unpredictable link qualities. Routing within SVANETs presents distinct challenges stemming from the stochastic nature of the environment. Traditional routing protocols struggle to maintain reliable connections amidst fluctuating link conditions, leading to increased latency, dropped packets, and inefficient route utilization. The novel “Decisiveness PSO-Based Gaussian AOMDV (DPSO-GAOMDV) Routing Protocol” is introduced to address these challenges. This innovative protocol combines the predictive power of Gaussian-Anticipatory On-Demand Distance Vector (GAOMDV) routing with the dynamic adaptability of Particle Swarm Optimization (PSO). GAOMDV’s ability to anticipate link stability using Gaussian distribution is integrated with DPSO’s agility in optimizing routing decisions. The simulation phase of the study evaluates the DPSO-GAOMDV protocol under various stochastic vehicular scenarios. The protocol’s performance is thoroughly analyzed by emulating real-world traffic conditions and communication dynamics. The simulation results underscore the protocol’s efficacy in reducing route maintenance overhead, improved packet delivery ratios, and enhanced network stability. The predictive insights and dynamic optimization mechanisms showcase its potential to drive innovative, resilient and efficient routing strategies in the face of stochastic vehicular conditions.Keywords
Ad Hoc Network, Bio-Inspired Optimization, Routing, Stochastic, VANET, Vehicle.References
- H. Ghafoor and I. Koo, “CR-SDVN: A Cognitive Routing Protocol for Software-Defined Vehicular Networks,” IEEE Sens. J., vol. 18, no. 4, pp. 1761–1772, 2018, doi: 10.1109/JSEN.2017.2788014.
- N. Lin, D. Zhao, L. Zhao, A. Hawbani, M. Guizani, and N. Kumar, “ALPS: An Adaptive Link-State Perception Scheme for Software-Defined Vehicular Networks,” IEEE Trans. Veh. Technol., vol. 72, no. 2, pp. 2564–2575, 2023, doi: 10.1109/TVT.2022.3214660.
- A. V. Kumar and S. K. Mohideen, “Security aware routing protocol for hybrid wireless network (SARP-HWNs) via trust enhanced mechanism,” Int. J. Bus. Data Commun. Netw., vol. 15, no. 1, pp. 34–57, 2019, doi: 10.4018/IJBDCN.2019010103.
- A. M. Mezher and M. A. Igartua, “G-3MRP: A game-theoretical multimedia multimetric map-aware routing protocol for vehicular ad hoc networks,” Comput. Networks, vol. 213, p. 109086, 2022, doi: 10.1016/j.comnet.2022.109086.
- J. Arshad, M. A. Azad, K. Salah, R. Iqbal, M. I. Tariq, and T. Umer, “Performance analysis of content discovery for ad-hoc tactile networks,” Futur. Gener. Comput. Syst., vol. 94, pp. 726–739, 2019, doi: 10.1016/j.future.2018.11.037.
- F. H. Kumbhar and S. Y. Shin, “Innovating Multi-Objective Optimal Message Routing for Unified High Mobility Networks,” IEEE Trans. Veh. Technol., vol. 72, no. 5, pp. 6571–6583, 2023, doi: 10.1109/TVT.2022.3232567.
- A. Ali, F. Aadil, M. F. Khan, M. Maqsood, and S. Lim, “Harris Hawks Optimization-Based Clustering Algorithm for Vehicular Ad-Hoc Networks,” IEEE Trans. Intell. Transp. Syst., vol. 24, no. 6, pp. 5822–5841, 2023, doi: 10.1109/TITS.2023.3257484.
- S. Mokhtari, N. Nouri, J. Abouei, A. Avokh, and K. N. Plataniotis, “Relaying Data With Joint Optimization of Energy and Delay in Cluster-Based UAV-Assisted VANETs,” IEEE Internet Things J., vol. 9, no. 23, pp. 24541–24559, 2022, doi: 10.1109/JIOT.2022.3188563.
- N. Ganeshkumar and S. Kumar, “QOS AWARE MODIFIED HARMONY SEARCH OPTIMIZATION FOR ROUTE SELECTION IN VANETs,” Indian J. Comput. Sci. Eng., vol. 13, no. 2, pp. 288–299, 2022, doi: 10.21817/indjcse/2022/v13i2/221302014.
- B. Zhang, X. Wang, R. Xie, C. Li, H. Zhang, and F. Jiang, “A reputation mechanism based Deep Reinforcement Learning and blockchain to suppress selfish node attack motivation in Vehicular Ad-Hoc Network,” Futur. Gener. Comput. Syst., vol. 139, pp. 17–28, 2023, doi: 10.1016/j.future.2022.09.010.
- G. D. Singh, S. Kumar, H. Alshazly, S. A. Idris, M. Verma, and S. M. Mostafa, “A Novel Routing Protocol for Realistic Traffic Network Scenarios in VANET,” Wirel. Commun. Mob. Comput., vol. 2021, 2021, doi: 10.1155/2021/7817249.
- C. R. Komala and N. K. Srinath, “Routing solutions of GJIBR for unica sting and multicasting over AODV in VANET,” Int. J. Innov. Technol. Explor. Eng., vol. 8, no. 7, pp. 2581–2586, 2019.
- P. Upadhyay, V. Marriboina, S. Kumar, S. Kumar, and M. A. Shah, “An Enhanced Hybrid Glowworm Swarm Optimization Algorithm for Traffic-Aware Vehicular Networks,” IEEE Access, vol. 10, pp. 110136–110148, 2022, doi: 10.1109/ACCESS.2022.3211653.
- J. Ramkumar, S. S. Dinakaran, M. Lingaraj, S. Boopalan, and B. Narasimhan, “IoT-Based Kalman Filtering and Particle Swarm Optimization for Detecting Skin Lesion,” in Lecture Notes in Electrical Engineering, 2023, vol. 975, pp. 17–27. doi: 10.1007/978-981-19-8353-5_2.
- J. Ramkumar and R. Vadivel, “Multi-Adaptive Routing Protocol for Internet of Things based Ad-hoc Networks,” Wirel. Pers. Commun., vol. 120, no. 2, pp. 887–909, Apr. 2021, doi: 10.1007/s11277-021-08495-z.
- R. Jaganathan and V. Ramasamy, “Performance modeling of bio-inspired routing protocols in Cognitive Radio Ad Hoc Network to reduce end-to-end delay,” Int. J. Intell. Eng. Syst., vol. 12, no. 1, pp. 221–231, 2019, doi: 10.22266/IJIES2019.0228.22.
- P. Cirne, A. Zúquete, and S. Sargento, “TROPHY: Trustworthy VANET routing with group authentication keys,” Ad Hoc Networks, vol. 71, pp. 45–67, 2018, doi: 10.1016/j.adhoc.2017.12.005.
- S. Shokrollahi and M. Dehghan, “TGRV: A trust-based geographic routing protocol for VANETs,” Ad Hoc Networks, vol. 140, p. 103062, 2023, doi: 10.1016/j.adhoc.2022.103062.
- A. S. Al-Obaidi et al., “Cauchy Density-Based Algorithm for VANETs Clustering in 3D Road Environments,” IEEE Access, vol. 10, pp. 76376–76385, 2022, doi: 10.1109/ACCESS.2022.3187698.
- K. Giridhar, C. Anbuananth, and N. Krishnaraj, “Energy efficient clustering with Heuristic optimization based Ro/uting protocol for VANETs,” Meas. Sensors, vol. 27, p. 100745, 2023, doi: 10.1016/j.measen.2023.100745.
- H. Yang, C. Pu, J. Wu, Y. Wu, and Y. Xia, “Enhancing OLSR protocol in VANETs with multi-objective particle swarm optimization,” Phys. A Stat. Mech. its Appl., vol. 614, p. 128570, 2023, doi: 10.1016/j.physa.2023.128570.
- M. Naderi and M. Ghanbari, “Adaptively prioritizing candidate forwarding set in opportunistic routing in VANETs,” Ad Hoc Networks, vol. 140, p. 103048, 2023, doi: 10.1016/j.adhoc.2022.103048.
- Parveen, S. Kumar, R. P. Singh, A. Kumar, R. Yaduwanshi, and D. P. Dora, “TS-CAGR:Traffic sensitive connectivity-aware geocast routing protocol in internet of vehicles,” Ad Hoc Networks, vol. 147, p. 103210, 2023, doi: 10.1016/j.adhoc.2023.103210.
- M. Khalid Diaa, I. Samer Mohamed, and M. Ayman Hassan, “OPBRP - obstacle prediction based routing protocol in VANETs,” Ain Shams Eng. J., vol. 14, no. 7, p. 101989, 2023, doi: 10.1016/j.asej.2022.101989.
- H. Ning et al., “Modeling and analysis of traffic warning message dissemination system in VANETs,” Veh. Commun., vol. 39, p. 100566, 2023, doi: 10.1016/j.vehcom.2022.100566.
- U. Arul, R. Gnanajeyaraman, A. Selvakumar, S. Ramesh, T. Manikandan, and G. Michael, “Integration of IoT and edge cloud computing for smart microgrid energy management in VANET using machine learning,” Comput. Electr. Eng., vol. 110, p. 108905, 2023, doi: 10.1016/j.compeleceng.2023.108905.
- R. K. Satyanarayana and K. Selvakumar, “Bi-linear mapping integrated machine learning based authentication routing protocol for improving quality of service in vehicular Ad-Hoc network,” e-Prime - Adv. Electr. Eng. Electron. Energy, vol. 4, p. 100145, 2023, doi: 10.1016/j.prime.2023.100145.
- R. Shahin, S. M. Saif, A. A. El-Moursy, H. M. Abbas, and S. M. Nassar, “Fog-ROCL: A Fog based RSU Optimum Configuration and Localization in VANETs,” Pervasive Mob. Comput., vol. 94, p. 101807, 2023, doi: 10.1016/j.pmcj.2023.101807.
- K. Lakshmi Narayanan and R. Naresh, “An efficient key validation mechanism with VANET in real-time cloud monitoring metrics to enhance cloud storage and security,” Sustain. Energy Technol. Assessments, vol. 56, p. 102970, 2023, doi: 10.1016/j.seta.2022.102970.
- S. K and C. chinnasamy, “Efficient VANET handover scheme using SSDN by incorporating media independent handover framework,” Meas. Sensors, vol. 26, p. 100684, 2023, doi: 10.1016/j.measen.2023.100684.
- J. Liu, H. Weng, Y. Ge, S. Li, and X. Cui, “A Self-Healing Routing Strategy Based on Ant Colony Optimization for Vehicular Ad Hoc Networks,” IEEE Internet Things J., vol. 9, no. 22, pp. 22695–22708, 2022, doi: 10.1109/JIOT.2022.3181857.
- G. D. Singh, M. Prateek, S. Kumar, M. Verma, D. Singh, and H. N. Lee, “Hybrid Genetic Firefly Algorithm-Based Routing Protocol for VANETs,” IEEE Access, vol. 10, pp. 9142–9151, 2022, doi: 10.1109/ACCESS.2022.3142811.
- Efficacy Artificial Bee Colony Optimization-Based Gaussian AOMDV (EABCO-GAOMDV) Routing Protocol for Seamless Traffic Rerouting in Stochastic Vehicular Ad Hoc Network
Abstract Views :57 |
PDF Views:1
Authors
M. Kayalvizhi
1,
S. Geetha
2
Affiliations
1 Department of Computer Science, Sri Krishna Adithya College of Arts and Science, Coimbatore, Tamil Nadu, IN
2 Department of Computer Science, Government Arts and Science College for Women, Coimbatore, Tamil Nadu, IN
1 Department of Computer Science, Sri Krishna Adithya College of Arts and Science, Coimbatore, Tamil Nadu, IN
2 Department of Computer Science, Government Arts and Science College for Women, Coimbatore, Tamil Nadu, IN
Source
International Journal of Computer Networks and Applications, Vol 10, No 6 (2023), Pagination: 993-1014Abstract
Vehicular Ad Hoc Networks (VANETs) have emerged as a dynamic communication paradigm enabling vehicles to form temporary Ad Hoc networks for seamless information exchange. Stochastic VANETs (SVANETs) introduce complexities due to their stochastic nature, necessitating innovative strategies to handle dynamic traffic conditions and intermittent connectivity. Routing within SVANETs presents unique challenges arising from uncertainties inherent in real-world scenarios. The stochastic environment gives rise to intermittent connectivity, dynamic traffic conditions, and varying network topologies. Traditional routing protocols struggle to provide efficient and reliable solutions under these challenging circumstances. This paper introduces the Efficacy Artificial Bee Colony Optimization-Based Gaussian AOMDV (EABCO-GAOMDV) routing protocol as a promising solution for the routing challenges in SVANETs. The protocol integrates the intelligence of Artificial Bee Colony Optimization (EABCO) with the adaptive characteristics of Gaussian AOMDV, aiming to enhance the efficiency of route discovery and rerouting. Through extensive simulations encompassing diverse SVANET scenarios, EABCO-GAOMDV is rigorously evaluated for performance and effectiveness. The protocol substantially improves route stability, packet delivery ratio, and end-to-end delay. The simulation results unequivocally validate the protocol’s ability to adapt to stochastic conditions, ensuring effective traffic rerouting and heightened network resilience. EABCO-GAOMDV showcases its potential as a robust routing solution for SVANETs, effectively addressing the challenges of stochastic conditions.Keywords
Ad Hoc Network, Bio-inspired Optimization, Routing, Stochastic, VANET, AOMDV, SVANET, EABCO-GAOMDV, Vehicle.References
- S. Gupta, R. C. Poonia, and X. Z. Gao, “Performance evaluation of flooding based routing protocol for delay tolerant networks,” Int. J. Recent Technol. Eng., vol. 7, no. 6, pp. 18–22, 2019.
- E. Khoza, C. Tu, and P. A. Owolawi, “Decreasing traffic congestion in vanets using an improved hybrid ant colony optimization algorithm,” J. Commun., vol. 15, no. 9, pp. 676–686, 2020, doi: 10.12720/jcm.15.9.676-686.
- N. Ganeshkumar and S. Kumar, “Qos Aware Modified Harmony Search Optimization For Route Selection In Vanets,” Indian J. Comput. Sci. Eng., vol. 13, no. 2, pp. 288–299, 2022, doi: 10.21817/indjcse/2022/v13i2/221302014.
- J. Ramkumar and R. Vadivel, “Multi-Adaptive Routing Protocol for Internet of Things based Ad-hoc Networks,” Wirel. Pers. Commun., vol. 120, no. 2, pp. 887–909, Apr. 2021, doi: 10.1007/s11277-021-08495-z.
- D. Tian et al., “A microbial inspired routing protocol for VANETs,” IEEE Internet Things J., vol. 5, no. 4, pp. 2293–2303, 2018, doi: 10.1109/JIOT.2017.2737466.
- L. Mani, S. Arumugam, and R. Jaganathan, “Performance Enhancement of Wireless Sensor Network Using Feisty Particle Swarm Optimization Protocol,” ACM Int. Conf. Proceeding Ser., pp. 1–5, Dec. 2022, doi: 10.1145/3590837.3590907.
- M. Laanaoui and S. Raghay, “Enhancing OLSR Protocol by an Advanced Greedy Forwarding Mechanism for VANET in Smart Cities,” Smart Cities, vol. 5, no. 2, pp. 650–667, 2022, doi: 10.3390/smartcities5020034.
- D. Raychaudhuri and N. B. Mandayam, “Frontiers of wireless and mobile communications,” Proc. IEEE, vol. 100, no. 4, pp. 824–840, 2012, doi: 10.1109/JPROC.2011.2182095.
- R. Hou et al., “Cluster Routing-Based Data Packet Backhaul Prediction Method in Vehicular Named Data Networking,” IEEE Trans. Netw. Sci. Eng., vol. 8, no. 3, pp. 2639–2650, 2021, doi: 10.1109/TNSE.2021.3102969.
- R. Chakroun, S. Abdellatif, and T. Villemur, “Q-Learning Relay Placement for Alert Message Dissemination in Vehicular Networks,” Procedia Comput. Sci., vol. 203, pp. 222–230, 2022, doi: https://doi.org/10.1016/j.procs.2022.07.029.
- C. Liu, G. Zhang, W. Guo, and R. He, “Kalman Prediction-Based Neighbor Discovery and Its Effect on Routing Protocol in Vehicular Ad Hoc Networks,” IEEE Trans. Intell. Transp. Syst., vol. 21, no. 1, pp. 159–169, 2020, doi: 10.1109/TITS.2018.2889923.
- M. A. de Pastre and Y. Quinsat, “Virtual volume correlation of lattice structures: From volumetric data to geometrical and dimensional defects identification,” Addit. Manuf., vol. 61, p. 103347, 2023, doi: 10.1016/j.addma.2022.103347.
- A. Sarkar, K. Daripa, M. Z. Khan, and A. Noorwali, “Cloud enabled Blockchain-based secured communication in mutual intelligent transportation using neural synchronization,” Veh. Commun., vol. 38, p. 100533, 2022, doi: https://doi.org/10.1016/j.vehcom.2022.100533.
- H. Ayaz, M. Waqas, G. Abbas, Z. H. Abbas, and M. Bilal, “Multiple re-configurable intelligent surfaces based physical layer eavesdropper detection for V2I communications,” Phys. Commun., vol. 58, p. 102074, 2023, doi: https://doi.org/10.1016/j.phycom.2023.102074.
- J. Wu, H. Lu, Y. Xiang, R. Wu, and F. Wang, “MBR: A Map-Based Relaying Algorithm for Reliable Data Transmission through Intersection in VANETs,” IEEE Trans. Intell. Transp. Syst., vol. 20, no. 10, pp. 3661–3674, 2019, doi: 10.1109/TITS.2018.2877993.
- P. Senthilraja and B. G. Geetha, “Avoiding fuel theft in multifleet vehicles using vehicular adhoc network,” Cluster Comput., vol. 22, pp. 11175–11181, 2019, doi: 10.1007/s10586-017-1347-9.
- I. Almomani, M. Ahmed, D. Kosmanos, A. Alkhayer, and L. Maglaras, “An Efficient Localization and Avoidance Method of Jammers in Vehicular Ad Hoc Networks,” IEEE Access, vol. 10, pp. 131640–131655, 2022, doi: 10.1109/ACCESS.2022.3229623.
- K. L. K. Sudheera, M. Ma, and P. H. J. Chong, “Real-time cooperative data routing and scheduling in software defined vehicular networks,” Comput. Commun., vol. 181, pp. 203–214, 2022, doi: 10.1016/j.comcom.2021.10.003.
- A. Rahim et al., “Social acquaintance based routing in Vehicular Social Networks,” Futur. Gener. Comput. Syst., vol. 93, pp. 751–760, 2019, doi: 10.1016/j.future.2017.07.059.
- M. M. Hamdi, L. Audah, and S. A. Rashid, “Data Dissemination in VANETs Using Clustering and Probabilistic Forwarding Based on Adaptive Jumping Multi-Objective Firefly Optimization,” IEEE Access, vol. 10, pp. 14624–14642, 2022, doi: 10.1109/ACCESS.2022.3147498.
- S. Samreen, “Resistance to malicious packet droppers through enhanced AODV in a MANET,” Comput. Mater. Contin., vol. 72, no. 2, pp. 4087–4106, 2022, doi: 10.32604/cmc.2022.026141.
- J. Sathiamoorthy, B. Ramakrishnan, and M. Usha, “Design of a proficient hybrid protocol for efficient route discovery and secure data transmission in CEAACK MANETs,” J. Inf. Secur. Appl., vol. 36, pp. 43–58, 2017, doi: 10.1016/j.jisa.2017.08.001.
- Z. H. Ali, N. A. Sakr, N. El-Rashidy, and H. A. Ali, “A reliable position-based routing scheme for controlling excessive data dissemination in vehicular ad-hoc networks,” Comput. Networks, vol. 229, p. 109785, 2023, doi: 10.1016/j.comnet.2023.109785.
- A. Nahar and D. Das, “MetaLearn: Optimizing routing heuristics with a hybrid meta-learning approach in vehicular ad-hoc networks,” Ad Hoc Networks, vol. 138, p. 102996, 2023, doi: 10.1016/j.adhoc.2022.102996.
- Y. Wang, X. Li, X. Zhang, X. Liu, and J. Weng, “ARPLR: An All-Round and Highly Privacy-Preserving Location-Based Routing Scheme for VANETs,” IEEE Trans. Intell. Transp. Syst., vol. 23, no. 9, pp. 16558–16575, 2022, doi: 10.1109/TITS.2021.3134686.
- Y. A. Debalki, J. Hou, H. Ullah, and B. Y. Adane, “Multi-hop data dissemination using a multi-metric contention-based broadcast suppression strategy in VANETs,” Ad Hoc Networks, vol. 140, p. 103070, 2023, doi: 10.1016/j.adhoc.2022.103070.
- Y. Song, K. Jiang, Y. Cao, R. Zhou, C. Suthaputchakun, and Y. Zhuang, “STALB: A Spatio-Temporal Domain Autonomous Load Balancing Routing Protocol,” IEEE Trans. Netw. Serv. Manag., vol. 20, no. 1, pp. 73–87, 2023, doi: 10.1109/TNSM.2022.3208025.
- M. Yao, Q. Gan, X. Wang, and Y. Yang, “A key-insulated secure multi-server authenticated key agreement protocol for edge computing-based VANETs,” Internet of Things (Netherlands), vol. 21, p. 100679, 2023, doi: 10.1016/j.iot.2023.100679.
- B. Chen, Z. Wang, T. Xiang, J. Yang, D. He, and K. K. R. Choo, “BCGS: Blockchain-assisted privacy-preserving cross-domain authentication for VANETs,” Veh. Commun., vol. 41, p. 100602, 2023, doi: 10.1016/j.vehcom.2023.100602.
- M. kumar Pulligilla and C. Vanmathi, “An authentication approach in SDN-VANET architecture with Rider-Sea Lion optimized neural network for intrusion detection,” Internet of Things (Netherlands), vol. 22, p. 100723, 2023, doi: 10.1016/j.iot.2023.100723.
- Y. Huang and M. Ma, “ILL-IDS: An incremental lifetime learning IDS for VANETs,” Comput. Secur., vol. 124, p. 102992, 2023, doi: 10.1016/j.cose.2022.102992.
- R. Tirumalasetti and S. K. Singh, “Automatic Dynamic User Allocation with opportunistic routing over vehicles network for Intelligent Transport System,” Sustain. Energy Technol. Assessments, vol. 57, p. 103195, 2023, doi: 10.1016/j.seta.2023.103195.
- Z. Han, C. Xu, S. Ma, Y. Hu, G. Zhao, and S. Yu, “DTE-RR: Dynamic Topology Evolution-Based Reliable Routing in VANET,” IEEE Wirel. Commun. Lett., vol. 12, no. 6, pp. 1061–1065, 2023, doi: 10.1109/LWC.2023.3260142.
- L. Luo, L. Sheng, H. Yu, and G. Sun, “Intersection-Based V2X Routing via Reinforcement Learning in Vehicular Ad Hoc Networks,” IEEE Trans. Intell. Transp. Syst., vol. 23, no. 6, pp. 5446–5459, 2022, doi: 10.1109/TITS.2021.3053958.
- N. Bachir, H. Harb, C. Zaki, M. Nabaa, G. A. Nys, and R. Billen, “PEMAP: An intelligence-based framework for post-event management of transportation systems,” Comput. Electr. Eng., vol. 110, p. 108856, 2023, doi: 10.1016/j.compeleceng.2023.108856.
- R. Han, J. Shi, Q. Guan, F. Banoori, and W. Shen, “Speed and Position Aware Dynamic Routing for Emergency Message Dissemination in VANETs,” IEEE Access, vol. 10, pp. 1376–1385, 2022, doi: 10.1109/ACCESS.2021.3138960.
- J. Liu, H. Weng, Y. Ge, S. Li, and X. Cui, “A Self-Healing Routing Strategy Based on Ant Colony Optimization for Vehicular Ad Hoc Networks,” IEEE Internet Things J., vol. 9, no. 22, pp. 22695–22708, 2022, doi: 10.1109/JIOT.2022.3181857.
- G. D. Singh, M. Prateek, S. Kumar, M. Verma, D. Singh, and H. N. Lee, “Hybrid Genetic Firefly Algorithm-Based Routing Protocol for VANETs,” IEEE Access, vol. 10, pp. 9142–9151, 2022, doi: 10.1109/ACCESS.2022.3142811.
- J. Ramkumar, “Bee inspired secured protocol for routing in cognitive radio ad hoc networks,” Indian J. Sci. Technol., vol. 13, no. 30, pp. 2159–2169, 2020, doi: 10.17485/ijst/v13i30.1152.