scholarly journals A fuzzy logic based clustering strategy for improving vehicular ad-hoc network performance

Sadhana ◽  
2015 ◽  
Vol 40 (2) ◽  
pp. 351-367 ◽  
Author(s):  
ALI ÇALHAN
Author(s):  
Ankit Kumar ◽  
Pankaj Dadheech ◽  
Mahender Kumar Beniwal ◽  
Basant Agarwal ◽  
Pawan Kumar Patidar

Electronics ◽  
2021 ◽  
Vol 10 (9) ◽  
pp. 1068
Author(s):  
Imran Memon ◽  
Mohammad Kamrul Hasan ◽  
Riaz Ahmed Shaikh ◽  
Jamel Nebhen ◽  
Khairul Azmi Abu Bakar ◽  
...  

Many algorithms use clustering to improve vehicular ad hoc network performance. The expected points of many of these approaches support multiple rounds of data to the roadside unit and constantly include clustering in every round of single-hop data transmission towards the road side unit; however, the clustering in every round maximizes the number of control messages and there could be the possibility of collision and decreases in network energy. Multi-hop transmission prolongs the cluster head node’s lifetime and boosts the network’s efficiency. Accordingly, this article proposes a new fuzzy-clustering-based routing algorithm to benefit from multi-hop transmission clustering simultaneously. This research has analyzed the limitation of clustering in each round, different algorithms were used to perform the clustering, and multi-hop routing was used to transfer the data of every cluster to the road side unit. The fuzzy logic was used to choose the head node of each cluster. Three parameters, (1) distance of each node, (2) remaining energy, and (3) number of neighbors of every node, were considered as fuzzy criteria. The results of this research were compared to various other algorithms in relation to parameters like dead node in every round, first node expire, half node expire, last node expire, and the network lifetime. The simulation results show that the proposed approach outperforms other methods. On the other hand, the vehicular ad hoc network (VANET) environment is vulnerable at the time of data transmission. The NS-2 software tool was used to simulate and evaluate the proposed fuzzy logic opportunistic routing’s performance results concerning end-to-end delay, packet delivery, and network throughput. We compare to the existing protocols, such as fuzzy Internet of Things (IoT), two fuzzy, and Fuzzy-Based Driver Monitoring System (FDMS). The performance comparison also emphasizes an effective utilization of the resources. Simulations on the highway environment show that the suggested protocol has an improved Quality of Service (QoS) efficiency compared to the above published methods in the literature.


2017 ◽  
Vol 13 (8) ◽  
pp. 155014771772569 ◽  
Author(s):  
Liang Pang ◽  
Xiao Chen ◽  
Yong Shi ◽  
Zhi Xue ◽  
Rida Khatoun

In vehicular ad hoc network, wireless jamming attacks are easy to be launched in the control channel and can cause serious influence on the network performance which may cause further safety accidents. In order to address the issue of wireless jamming attacks, a new technique which localizes the jamming attackers and prevents vehicles from jamming through human intervention is proposed. In this article, we propose a range-free approach to localize the source of the attacker and determine the number of jamming attackers. The data set is the locating information and the jamming detection information associated with each vehicle. Then, we formulate the problem of determining the number of attackers as a multiclass detection problem. We define the incorrectly classified area and use it to measure the distance between samples and centroids in fuzzy c-means algorithm. We further determine the number of jamming attackers through the coverage rate of beaconing circles and utilize weight-based fuzzy c-means to classify the data set. When the data set is classified as acceptable, we further explore the means of using particle swarm optimization algorithm to calculate the positional coordinates of each attacker. We simulate our techniques in MATLAB, and both urban traffic area and open area are considered in our simulation. The experimental results suggest that the proposed algorithm can achieve high precision when determining the number of attackers while the result of the classified performance is always satisfying. Our localization results lead to higher accuracy than other existing solutions. Also, when the data set is limited, the chances of taking accurate localization are higher than other measures.


Author(s):  
Atanu Mondal ◽  
Sulata Mitra

Background and Objective: The inter-vehicle communication is a potential issue for improving road safety, detecting traffic accidents, etc. in vehicular ad hoc network. The communication among the vehicles in VANET must be protected from the dissemination of message by unauthorized vehicles and the alteration of the message by misbehaving vehicles. Methods: In this paper, a low overhead digital watermark based vehicle revocation scheme is proposed. The sender vehicle generates a message and a random number after observing an event. It generates a deformed version of the generated message and message digest, and concatenates them. The watermark bits are generated by the sender vehicle from its unique identification and the random number. The sender vehicle embeds the watermark bits in the concatenated form of the message digest and deformed version of the generated message, and broadcasts the embedded message for its neighbours. The neighbour vehicles extract the required information from the received embedded message to verify the authentication of the sender vehicle and to identify whether the sender vehicle is an alteration attacker. It revokes unauthentic vehicles and vehicles that are identified as alteration attacker from vehicular ad-hoc network without any dependency on the trusted third party. The cracking probability and cracking time are used to measure the robustness of the scheme. The cracking probability and cracking time are measured to set the design guideline regarding the size of the watermark. The qualitative performance of the scheme is measured in terms of storage, communication and computation overhead. The significant reduction of all such overheads is observed by comparing the qualitative performance of the proposed scheme with two existing schemes. Conclusion and Results: Thus, the proposed scheme is a low overhead solution of securing vehicular ad hoc network. Performance of the scheme is also studied quantitatively in terms of the time of verifying vehicle authentication at the receiving end, delay in message dissemination at the sending end and delay in message reception at the receiving end. The quantitative performance is also compared with two of the existing schemes.


2016 ◽  
Vol 19 (2) ◽  
pp. 301-315 ◽  
Author(s):  
Seyed Ahmad Soleymani ◽  
Abdul Hanan Abdullah ◽  
Mohammad Hossein Anisi ◽  
Ayman Altameem ◽  
Wan Haslina Hasan ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document