Jellyfish Search Chimp Optimization Enabled Routing and Attack Detection in SDN based VANETs
In recent times, Vehicular Ad hoc Network (VANET) has been the focal point of the research community to devise efficient smart transportation systems. VANET provides the key advantage of providing cautionary measures and safety to passengers and drivers. With the evolution of fifth-generation (5G) n...
Gespeichert in:
Veröffentlicht in: | Wireless personal communications 2024-09, Vol.138 (2), p.819-859 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 859 |
---|---|
container_issue | 2 |
container_start_page | 819 |
container_title | Wireless personal communications |
container_volume | 138 |
creator | Kaur, Upinder Mahajan, Aparna N. Kumar, Sunil Dutta, Kamlesh |
description | In recent times, Vehicular Ad hoc Network (VANET) has been the focal point of the research community to devise efficient smart transportation systems. VANET provides the key advantage of providing cautionary measures and safety to passengers and drivers. With the evolution of fifth-generation (5G) network technology and rapid growth in vehicles, it becomes challenging for conventional VANET to manage large-scale dynamic heterogeneous networks due to their limited flexibility and scalability features. Moreover, the dynamic nature of VANET makes it vulnerable to malicious attacks. Software Defined Networking (SDN) is a technology that provides an integrated improvement over the conventional VANETs. SDN architecture is flexible, programmable, scalable, and provides globally the knowledge of the network. However, its centralized nature makes SDN based VANETs a prime target of attackers, which may adversely impact the VANETs causing life-threatening consequences. To address these issues, this paper presents two novel schemes. Firstly, this paper presents a trusted routing scheme named Jellyfish Chimp Optimization Algorithm (JChOA) for SDN based VANETs. JChOA is designed by amalgamation of the Jellyfish Search Optimization algorithm (JS) and Chimp Optimization algorithm (ChOA). Secondly, this paper presents an attack detection and mitigation scheme named JChOA_RideNN for SDN based VANETs. This attack detection scheme utilizes the Rider Optimization Algorithm based neural network (RideNN) architecture at the SDN controller, where the weighting parameters of RideNN tunned through the use of JChOA. The effectiveness of JChOA routing is evaluated based on the metrics energy and trust value where the performance of JChOA_RideNN is assessed using precision and recall. Moreover, the JChOA routing algorithm attained greater performance with a maximum of 0.947 J energy and 0.462 trust value and JChOA_RideNN attained with a maximum of 93.9% precision, and 93.1% recall than other traditional approaches. The results of the experiments clearly show the effectiveness of the proposed defensive schemes for SDN based VANETs. |
doi_str_mv | 10.1007/s11277-024-11525-1 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_3110895551</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3110895551</sourcerecordid><originalsourceid>FETCH-LOGICAL-c200t-8417d22844eb9434e3e5d5efd60e797c77573ff41fc253250b24e293cb98b6333</originalsourceid><addsrcrecordid>eNp9kM1PwjAYhxujiYj-A56aeJ72k65HAvgVAomg8WDSdF0HxbHNthzwr3cwE2-e3svz_N7kAeAao1uMkLgLGBMhEkRYgjEnPMEnoIe5IElK2fsp6CFJZDIgmJyDixA2CLWaJD3w8WzLcl-4sIYLq71Zw9HabRs4b6Lbum8dXV3BSaWz0ubwpd5FV62grnI4jFGbTzi20Zoj5Cq4GM9gpkNLvg1nk2W4BGeFLoO9-r198Ho_WY4ek-n84Wk0nCaGIBSTlGGRE5IyZjPJKLPU8pzbIh8gK6QwQnBBi4LhwhBOCUcZYZZIajKZZgNKaR_cdLuNr792NkS1qXe-al8qijFKJecctxTpKOPrELwtVOPdVvu9wkgdKqquomorqmNFdZBoJ4UWrlbW_03_Y_0AjCBzMg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3110895551</pqid></control><display><type>article</type><title>Jellyfish Search Chimp Optimization Enabled Routing and Attack Detection in SDN based VANETs</title><source>SpringerLink Journals</source><creator>Kaur, Upinder ; Mahajan, Aparna N. ; Kumar, Sunil ; Dutta, Kamlesh</creator><creatorcontrib>Kaur, Upinder ; Mahajan, Aparna N. ; Kumar, Sunil ; Dutta, Kamlesh</creatorcontrib><description>In recent times, Vehicular Ad hoc Network (VANET) has been the focal point of the research community to devise efficient smart transportation systems. VANET provides the key advantage of providing cautionary measures and safety to passengers and drivers. With the evolution of fifth-generation (5G) network technology and rapid growth in vehicles, it becomes challenging for conventional VANET to manage large-scale dynamic heterogeneous networks due to their limited flexibility and scalability features. Moreover, the dynamic nature of VANET makes it vulnerable to malicious attacks. Software Defined Networking (SDN) is a technology that provides an integrated improvement over the conventional VANETs. SDN architecture is flexible, programmable, scalable, and provides globally the knowledge of the network. However, its centralized nature makes SDN based VANETs a prime target of attackers, which may adversely impact the VANETs causing life-threatening consequences. To address these issues, this paper presents two novel schemes. Firstly, this paper presents a trusted routing scheme named Jellyfish Chimp Optimization Algorithm (JChOA) for SDN based VANETs. JChOA is designed by amalgamation of the Jellyfish Search Optimization algorithm (JS) and Chimp Optimization algorithm (ChOA). Secondly, this paper presents an attack detection and mitigation scheme named JChOA_RideNN for SDN based VANETs. This attack detection scheme utilizes the Rider Optimization Algorithm based neural network (RideNN) architecture at the SDN controller, where the weighting parameters of RideNN tunned through the use of JChOA. The effectiveness of JChOA routing is evaluated based on the metrics energy and trust value where the performance of JChOA_RideNN is assessed using precision and recall. Moreover, the JChOA routing algorithm attained greater performance with a maximum of 0.947 J energy and 0.462 trust value and JChOA_RideNN attained with a maximum of 93.9% precision, and 93.1% recall than other traditional approaches. The results of the experiments clearly show the effectiveness of the proposed defensive schemes for SDN based VANETs.</description><identifier>ISSN: 0929-6212</identifier><identifier>EISSN: 1572-834X</identifier><identifier>DOI: 10.1007/s11277-024-11525-1</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Algorithms ; Communications Engineering ; Computer architecture ; Computer Communication Networks ; Cybersecurity ; Effectiveness ; Engineering ; Mobile ad hoc networks ; Networks ; Neural networks ; Optimization ; Optimization algorithms ; Performance evaluation ; Recall ; Routing (telecommunications) ; Signal,Image and Speech Processing ; Software-defined networking ; Transportation networks ; Transportation systems</subject><ispartof>Wireless personal communications, 2024-09, Vol.138 (2), p.819-859</ispartof><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c200t-8417d22844eb9434e3e5d5efd60e797c77573ff41fc253250b24e293cb98b6333</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11277-024-11525-1$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11277-024-11525-1$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,776,780,27901,27902,41464,42533,51294</link.rule.ids></links><search><creatorcontrib>Kaur, Upinder</creatorcontrib><creatorcontrib>Mahajan, Aparna N.</creatorcontrib><creatorcontrib>Kumar, Sunil</creatorcontrib><creatorcontrib>Dutta, Kamlesh</creatorcontrib><title>Jellyfish Search Chimp Optimization Enabled Routing and Attack Detection in SDN based VANETs</title><title>Wireless personal communications</title><addtitle>Wireless Pers Commun</addtitle><description>In recent times, Vehicular Ad hoc Network (VANET) has been the focal point of the research community to devise efficient smart transportation systems. VANET provides the key advantage of providing cautionary measures and safety to passengers and drivers. With the evolution of fifth-generation (5G) network technology and rapid growth in vehicles, it becomes challenging for conventional VANET to manage large-scale dynamic heterogeneous networks due to their limited flexibility and scalability features. Moreover, the dynamic nature of VANET makes it vulnerable to malicious attacks. Software Defined Networking (SDN) is a technology that provides an integrated improvement over the conventional VANETs. SDN architecture is flexible, programmable, scalable, and provides globally the knowledge of the network. However, its centralized nature makes SDN based VANETs a prime target of attackers, which may adversely impact the VANETs causing life-threatening consequences. To address these issues, this paper presents two novel schemes. Firstly, this paper presents a trusted routing scheme named Jellyfish Chimp Optimization Algorithm (JChOA) for SDN based VANETs. JChOA is designed by amalgamation of the Jellyfish Search Optimization algorithm (JS) and Chimp Optimization algorithm (ChOA). Secondly, this paper presents an attack detection and mitigation scheme named JChOA_RideNN for SDN based VANETs. This attack detection scheme utilizes the Rider Optimization Algorithm based neural network (RideNN) architecture at the SDN controller, where the weighting parameters of RideNN tunned through the use of JChOA. The effectiveness of JChOA routing is evaluated based on the metrics energy and trust value where the performance of JChOA_RideNN is assessed using precision and recall. Moreover, the JChOA routing algorithm attained greater performance with a maximum of 0.947 J energy and 0.462 trust value and JChOA_RideNN attained with a maximum of 93.9% precision, and 93.1% recall than other traditional approaches. The results of the experiments clearly show the effectiveness of the proposed defensive schemes for SDN based VANETs.</description><subject>Algorithms</subject><subject>Communications Engineering</subject><subject>Computer architecture</subject><subject>Computer Communication Networks</subject><subject>Cybersecurity</subject><subject>Effectiveness</subject><subject>Engineering</subject><subject>Mobile ad hoc networks</subject><subject>Networks</subject><subject>Neural networks</subject><subject>Optimization</subject><subject>Optimization algorithms</subject><subject>Performance evaluation</subject><subject>Recall</subject><subject>Routing (telecommunications)</subject><subject>Signal,Image and Speech Processing</subject><subject>Software-defined networking</subject><subject>Transportation networks</subject><subject>Transportation systems</subject><issn>0929-6212</issn><issn>1572-834X</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><recordid>eNp9kM1PwjAYhxujiYj-A56aeJ72k65HAvgVAomg8WDSdF0HxbHNthzwr3cwE2-e3svz_N7kAeAao1uMkLgLGBMhEkRYgjEnPMEnoIe5IElK2fsp6CFJZDIgmJyDixA2CLWaJD3w8WzLcl-4sIYLq71Zw9HabRs4b6Lbum8dXV3BSaWz0ubwpd5FV62grnI4jFGbTzi20Zoj5Cq4GM9gpkNLvg1nk2W4BGeFLoO9-r198Ho_WY4ek-n84Wk0nCaGIBSTlGGRE5IyZjPJKLPU8pzbIh8gK6QwQnBBi4LhwhBOCUcZYZZIajKZZgNKaR_cdLuNr792NkS1qXe-al8qijFKJecctxTpKOPrELwtVOPdVvu9wkgdKqquomorqmNFdZBoJ4UWrlbW_03_Y_0AjCBzMg</recordid><startdate>20240901</startdate><enddate>20240901</enddate><creator>Kaur, Upinder</creator><creator>Mahajan, Aparna N.</creator><creator>Kumar, Sunil</creator><creator>Dutta, Kamlesh</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>20240901</creationdate><title>Jellyfish Search Chimp Optimization Enabled Routing and Attack Detection in SDN based VANETs</title><author>Kaur, Upinder ; Mahajan, Aparna N. ; Kumar, Sunil ; Dutta, Kamlesh</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c200t-8417d22844eb9434e3e5d5efd60e797c77573ff41fc253250b24e293cb98b6333</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Algorithms</topic><topic>Communications Engineering</topic><topic>Computer architecture</topic><topic>Computer Communication Networks</topic><topic>Cybersecurity</topic><topic>Effectiveness</topic><topic>Engineering</topic><topic>Mobile ad hoc networks</topic><topic>Networks</topic><topic>Neural networks</topic><topic>Optimization</topic><topic>Optimization algorithms</topic><topic>Performance evaluation</topic><topic>Recall</topic><topic>Routing (telecommunications)</topic><topic>Signal,Image and Speech Processing</topic><topic>Software-defined networking</topic><topic>Transportation networks</topic><topic>Transportation systems</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Kaur, Upinder</creatorcontrib><creatorcontrib>Mahajan, Aparna N.</creatorcontrib><creatorcontrib>Kumar, Sunil</creatorcontrib><creatorcontrib>Dutta, Kamlesh</creatorcontrib><collection>CrossRef</collection><jtitle>Wireless personal communications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Kaur, Upinder</au><au>Mahajan, Aparna N.</au><au>Kumar, Sunil</au><au>Dutta, Kamlesh</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Jellyfish Search Chimp Optimization Enabled Routing and Attack Detection in SDN based VANETs</atitle><jtitle>Wireless personal communications</jtitle><stitle>Wireless Pers Commun</stitle><date>2024-09-01</date><risdate>2024</risdate><volume>138</volume><issue>2</issue><spage>819</spage><epage>859</epage><pages>819-859</pages><issn>0929-6212</issn><eissn>1572-834X</eissn><abstract>In recent times, Vehicular Ad hoc Network (VANET) has been the focal point of the research community to devise efficient smart transportation systems. VANET provides the key advantage of providing cautionary measures and safety to passengers and drivers. With the evolution of fifth-generation (5G) network technology and rapid growth in vehicles, it becomes challenging for conventional VANET to manage large-scale dynamic heterogeneous networks due to their limited flexibility and scalability features. Moreover, the dynamic nature of VANET makes it vulnerable to malicious attacks. Software Defined Networking (SDN) is a technology that provides an integrated improvement over the conventional VANETs. SDN architecture is flexible, programmable, scalable, and provides globally the knowledge of the network. However, its centralized nature makes SDN based VANETs a prime target of attackers, which may adversely impact the VANETs causing life-threatening consequences. To address these issues, this paper presents two novel schemes. Firstly, this paper presents a trusted routing scheme named Jellyfish Chimp Optimization Algorithm (JChOA) for SDN based VANETs. JChOA is designed by amalgamation of the Jellyfish Search Optimization algorithm (JS) and Chimp Optimization algorithm (ChOA). Secondly, this paper presents an attack detection and mitigation scheme named JChOA_RideNN for SDN based VANETs. This attack detection scheme utilizes the Rider Optimization Algorithm based neural network (RideNN) architecture at the SDN controller, where the weighting parameters of RideNN tunned through the use of JChOA. The effectiveness of JChOA routing is evaluated based on the metrics energy and trust value where the performance of JChOA_RideNN is assessed using precision and recall. Moreover, the JChOA routing algorithm attained greater performance with a maximum of 0.947 J energy and 0.462 trust value and JChOA_RideNN attained with a maximum of 93.9% precision, and 93.1% recall than other traditional approaches. The results of the experiments clearly show the effectiveness of the proposed defensive schemes for SDN based VANETs.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11277-024-11525-1</doi><tpages>41</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0929-6212 |
ispartof | Wireless personal communications, 2024-09, Vol.138 (2), p.819-859 |
issn | 0929-6212 1572-834X |
language | eng |
recordid | cdi_proquest_journals_3110895551 |
source | SpringerLink Journals |
subjects | Algorithms Communications Engineering Computer architecture Computer Communication Networks Cybersecurity Effectiveness Engineering Mobile ad hoc networks Networks Neural networks Optimization Optimization algorithms Performance evaluation Recall Routing (telecommunications) Signal,Image and Speech Processing Software-defined networking Transportation networks Transportation systems |
title | Jellyfish Search Chimp Optimization Enabled Routing and Attack Detection in SDN based VANETs |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-31T06%3A38%3A05IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Jellyfish%20Search%20Chimp%20Optimization%20Enabled%20Routing%20and%20Attack%20Detection%20in%20SDN%20based%20VANETs&rft.jtitle=Wireless%20personal%20communications&rft.au=Kaur,%20Upinder&rft.date=2024-09-01&rft.volume=138&rft.issue=2&rft.spage=819&rft.epage=859&rft.pages=819-859&rft.issn=0929-6212&rft.eissn=1572-834X&rft_id=info:doi/10.1007/s11277-024-11525-1&rft_dat=%3Cproquest_cross%3E3110895551%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=3110895551&rft_id=info:pmid/&rfr_iscdi=true |