1. Introduction
VANET is a popular, modern network. The network is termed an ad-hoc network, as the position of the vehicles changes at every instant of time. The average speed of vehicular nodes varies from 40 to 80 km/h [
1]. Due to this high randomness in location, VANET is quite prone to security threats, especially hybrid DoS attacks, including all forms of attacks. Uncertainties, such as hybrid DoS attacks, are the biggest reasons for security threats. VANET utilizes vehicles as mobile nodes in the form of a sub-class of a mobile ad-hoc network (MANET) to communicate with nearby vehicles and among vehicles close to roadside units (RSUs) or equipment, though is differs from other networks according to its characteristics [
2]. Particularly, the vehicles (nodes) are inadequate for the road topology when moving; thus, vehicles’ future positions can be predicted when information of the road is available. As per IEEE 1471-2000 and ISO/IEC 42010 framework general guidelines, VANET systems can be categorized into three domains, including mobile, infrastructure, and generic domains [
3].
Figure 1 depicts the VANET infrastructure architecture (VIA). The mobile domain transfers the information and communicates with the infrastructure domain. It utilizes IEEE 802.11p beacons and signals, which process the data and proceed towards modulation [
4]. Then, the infrastructure domain communicates with generic domains and then exchanges the information. The flows of data between the mobile and stationary resources results in effective utilization of the road with the user, which utilizes IEEE 802.11p beacon communication standard.
In this research, the transmission rate of information for real-time IEEE 802.11p information delivery in VANET is 30 Mbps. Vehicles move in groups, as they are directed in the VIA to their intended destination (as shown in
Figure 1). In the VIA also, vehicle cooperation in the group movement is such that they exchange frequent sporadic broadcasts of safety messages. These broadcasts carry the information of the speed of the vehicle and their position, whilst utilizing the IEEE 802.11p beacon’s dedicated channel [
5]. During normal operation of the IEEE 802.11p medium access control (MAC) protocol random access specification, beacon loss is possible. This can be attributed to impairment of wireless channels (i.e., beacon transmissions overlapping resulting from several vehicles, which can lead to collision/congestion). Collision/congestion (CC) can be reduced based upon proper selection of MAC protocol real-time transmission methods, which include secure authentication and key distribution algorithm models, and secure transmission range models, which can be deployed in the VIA network. Based upon this, performance parameters, such as real-time end-to-end delay sensitivity for trust enforcement of neighboring nodes in VANET, can be measured [
6,
7].
Nevertheless, it is possible that the IEEE 802.11p beacon transmissions can also get corrupted through malicious attacker vehicles. They may also present themselves in all forms of attacks, including hybrid DoS attacks (HDSA), which include DoS jamming signal attack, (DoD JSA), packet drop (PD), and resources consumption/RSU or CPU overutilization (RCRCO) [
8]. The VANET safety can seriously be at risk, since vehicles would not be capable of properly utilizing the information obtained. However, vehicles are required to utilize and transmit the information based upon the IEEE 802.11p beacon’s relay through the RSU in order to sensitize awareness in VANET. The RSU utilizes the information to also update other vehicles about the requirements of end-to-end delay and jitter in the network, which is imposed by the automotive control system (ACS) from the traffic management center, as shown in the VIA in
Figure 1.
Consequently, real-time detection of all forms of attacks, including hybrid DoS attacks (HDSA), require trustworthiness, intelligent computation, and efficient storage, which can be achieved through vehicular cloud and fog computing (VFC). These can provide trustworthiness in VANET. In addition, integration with hybrid deployment of optimization algorithms (OAs) in VANET also provides swarm intelligence. The OAs include Cuckoo/CSA (ABC), and Firefly/Genetic Algorithm (GA). These OAs can also be integrated with authentication and KDE mechanisms. This integration with the real-time detection of HDSA can provide secure methods in the MAC layer, which in turn can be used to mitigate all forms of attacks, including HDSA, such as DoS JSA, PD, and RCRCO, which utilizes IEEE 802.11p beacon transmissions in VANET. This represents an urgent practical problem that we are motivated to investigate in this research.
1.1. Background Study of This Research
Real-time detection of only DoS JSA using IEEE 802.11 signal in VANET was proposed and investigated based upon previous studies [
9,
10]. In these studies, the MAC layer misbehavior of some vehicles and nodes violates IEEE 802.11 rules. Small back-off counters were chosen to access the channel more frequently than other nodes. However, their performance were degraded. In these investigations, however, restriction in detection of all forms of attacks, including HDSA, was an issue. Moreover, the investigation was based on only a DoS JSA attack. In detecting DoS JSA only in VANET, the method in a previous study [
11] that utilized a unicast traffic method based upon the regression model was proposed. However, the proposed method did not consider any trustworthiness investigation of the nodes in the network. Real-time detection of DoS attacks in the IEEE 802.11p vehicular network method was also proposed in a previous study [
12]. This considered beacons transmission regularly in IEEE 802.11p in broadcast mode only, without retransmission. This method also included an alternative jamming detector for considering detection of only DoS JSA attacks in a VANET platoon. However, the investigation revealed gaps in trustworthiness in the protocol. Based upon the investigation of these two or more methods, we can verify that the DoS attacks considered for investigation in VANET were based only on DoS JSA. There are other forms of attacks eminent in VANET, which include HDSA. The detection of all other attacks and HDSA still presents the greatest challenge in VANET safety application deployment. In addition, there are other forms of DoS attacks, such as PD, RCRCO overutilization, and DoS resilience attacker (DRA). These attacks altogether also form HDSA [
13], which mostly cause overutilization of the RSU. However, none of the above defined proposed schemes in VANET considered investigation for detecting HDSA, which also includes DRA. Moreover, the authors’ investigations concerning utilizing the above proposed schemes demonstrate only limited recommendation and provision for trusting methods, secure efficient storage mechanisms, proper OAs, and authentication and KDE methods based upon the investigations of the proposed schemes. The authors detected only DoS JSA based upon the investigations of their proposed schemes. DoS attacks encompass DRA for the sake of this research. Therefore, it is important to investigate HDSA using a sophisticated approach. This new approach will be capable of detecting all forms of DoS attacks, including HDSA attacks, which should be supported in this research.
Vehicular Cloud and Fog Computing (VFC) is a standard that comprehends FC and vehicular cloud (VCC) [
14]. VFC is also a solution that satisfies the requirements of VANET, such as secure and efficient computing, storage, and in-network resource provision [
13]. In addition, optimization algorithms (OAs), such as Cuckoo/CSA (ABC) [
15], Firefly algorithm (GA) [
16], and firefly neural algorithm [
17] are capable of providing swarm intelligence. The OAs are either heuristic or metaheuristic in nature and have problem-solving skills. They also have the capability to adjust DoS JSA and HDSAs (i.e., congestion and collusion), which include all other forms of attacks, such as DoS JSA, PD, and RCRCO, for optimum user experience [
18]. The OAs have also been used to evaluate a real-time data transmission in VANET [
19], which utilized IEEE 802.11p for dedicated short-range communication (DSRC) technology. VFC integration with OAs and trust detection of the nodes in VANET, which also utilize authentication/KDE in VANET, can appropriately secure the VANET through the RSU. This secure method for VANET protection provide a real-time detection of DoS attacks in IEEE 802.11p, which utilizes the DSRC technology. It also provides the safety of roads and highways based upon intelligent transportation system (ITS) opportunities. Therefore, real-time detection of DoS JSA and HDSA utilizing IEEE 802.11p, which is based upon VFC, requires investigation to evaluate end-to-end delay and jitter in VANET, due to DoS JSA and HDSA attack, (congestion and collision) for trust evaluation.
The authors in previous studies [
14,
15,
16] have conducted investigations separately using Cuckoo/CSA (ABC) and Firefly Genetic Algorithm (GA), respectively. The investigations were performed to evaluate delay sensitivity for real-time detection for only DoS JSA attacks in VANET, which also utilized DSRC technology. However, based upon the investigation conducted with the Cuckoo/CSA (ABC) scheme, it revealed that it was not centered on VFC. In addition, most of the schemes’ investigations dwell on only the unicast method for data transmission. However, this method did not achieve trustworthiness in the network. The authors have conducted an investigation on Firefly (GA), and utilized the concept of VANET as key enabler of future ITS, utilizing real-time detection of DoS attacks. The authors also trained the misbehavior of the nodes on the paths of vehicles delayed in VANET. They also utilized the DSRC technology and multicast data transmission. However, the author’s investigation was limited. This is based upon the fact that the investigation does not include all forms of attacks, including HDSA attacks, such as DoS JSA, PD, and RCRCO, in the network. In addition, the absence of the VFC method was also a major limitation observed in the schemes. Therefore, it can be concluded that there is a trustworthiness limitation in VANET. This still presents the greatest challenge.
To address these challenges in VANET, in this paper we consider all forms of attacks, including all forms of DoS attack detection in VANET, which includes but is not limited to DoS JSA, HDSA (congestion and collusion), PD, and RCRCO/DoS attacks in our proposed scheme VIA models. We also consider the hybrid deployment of OAs with VFCs and integrate full authentication/KDE trust mechanism deployment in the VANET. These will be used to evaluate the end-to-end delay and jitter in real-time IEEE 802.11p hybrid multicast and unicast data transmission in VANET. Therefore, in this paper we propose real-time detection of DoS attacks in IEEE 802.11p using VFC in a Secure Intelligent Vehicular Network.
1.2. Research Contribution
The main contributions of this research are:
Deployment of trust in VANET utilizing VFC and hybrid integration of OAs, which include Cuckoo/CSA (ABC) and Firefly (GA) with authentication/KDE. VFC provides a search space for information processing and achieves efficiency in computational overhead due to advantages in rapidly stored vehicular information processing using the V2V and V2RSU, and RSU2FS communication behavior in this research.
Real-time detection of all forms of attacks, including HDSA attack detection, such as DoS JSA, PD, and RCRCO in VANET, to provide trustworthiness in the network.
Provision of IEEE 802.11p benefits information processing. which utilize hybrid multicast and unicast broadcast data transmission in VANET for efficient and real-time transmission of safety information.
Provision for single next hop vehicle (SNHV) probability analysis for efficient data processing within the elliptical segment area transmission range (ESATR) in VANET.
Provision for regression model prediction based upon reduced delay and jitter in VANET for secure road safety provision.
The rest of the paper is organized as follows.
Section 2 presents the related work.
Section 3 presents the secure real-time detection of DoS attack models (DAM) and jamming signal attack models (JAM). Both attack models provide Hybrid DoS attack model (HDAM) prevention mechanisms in VANET.
Section 4 presents the preventive mechanisms and the system models, including the system architecture model (SAM) and elliptical segment area transmission range model (ESATRM), OA deployment, and trustworthiness of nodes of the proposed scheme.
Section 5 presents the resulting analysis and discussion.
Section 6 is a miscellaneous section for background study comparison of VANET protocols, and
Section 7 presents the conclusions.
4. Prevention Mechanisms of the Proposed Scheme
4.1. Proposed Scheme System Architecture Model (PSAM)
In this research, PSAM represents the proposed scheme system architecture model. It is used for the detection of end-to-end delayed path packets of vehicles in the network that have also encountered HDSA attacks with the HDAM. PSAM utilizes the attacked packet detection algorithms (APDA) deployed in the PSAM, as shown in
Figure 4. The APDA is utilized to capture all forms of attacks categories, including HDSA and all other forms of associated attacks with VANET, as identified with the PSAM. The HDSA categories include PD/FI, DoS JSA, and RCRCO, which would require high memory computation and high bandwidth.
Figure 4 depicts the PSAM of this research, whereby the APDA method has been implemented. The APDA method used is attached through every RSU and the FS via a packet detection mechanism that distinguishes exact message positions on the path of the vehicle. It also utilizes ESA communication range (ESACR), which has the objective of evaluating end-to-end delay and jitter experienced in the network.
In addition, one of RSU’s main job functions include serving as a gateway for the PSAM for all vehicle communication. The RSU also coordinates with FS to disseminate secure transmissions of V2V communication. The RSU is also connected with the FS logically through wireless or wired means. After the detection of vehicle position, the information or messages are derived based upon the effectiveness of the utilization of the above two attacks models, which include the DoS attack model (DAM) and jamming attack model (DJSAM). These two models (DAM and DJSAM) are together known as the HDSA model (HDAM). These attack models are deployed for the proposed scheme for detection of the HDSA and other attacks, discussed previously in
Section 3. HDAM models, as depicted in
Figure 2 and
Figure 3, utilize RSUs and the FS to process the communication. Thus, HDAM utilizes the IEEE 802.11p beacons and signals for vehicle communication. IEEE 802.11p beacons employ the devices in the VANET, which have on-board units (OBUs) and Tamper Proof Devices (TPDs). These are used to store the comprehensive information for the vehicles, such as position, speed, etc. The position of the vehicles is identified by the velocity of the vehicles, frequency of the vehicles, the vehicle position, and the number of packets sent to the vehicles. The vehicle position identification utilizes the following communication processes: vehicle-to-vehicle (V2V) communication, the vehicle-to-road-side unit (V2RSU), and the inter-roadside-communication unit (RSU2RSU), as shown in
Figure 4. The communication process also encompass the relay of IEEE 802.11p beacons that utilize hybrid multicast/broadcast and unicast data transmission. The communication process also sensitizes awareness for road safety and driver vigilance.
In the PSAM, when the packet is not attacked, then the V2V communication, V2RSU, RSU2V, and RSU2RSU communication will not track the path in end-to-end delay of the exact vehicle. This capability includes the tendency to reduce communication overhead (CO) in the PSAM. An algorithm has been designed on the basis of requirements as per the variations in the positions of vehicles in the VANET. The identification of the attacked packets can be done by
V (velocity) and
F (Frequency);
λ is a co-efficient that has been determined by the characteristics of the road and Vmax is the maximum Speed, m as shown in the Equation (1):
where
F is the number of packets unicast and multicast (or broadcast) per second. The identification of the attacked packets is done with the below conditions:
The ranges of F and V are high, as the vehicle’s position varies instantly.
The ranges of F and V are low, as the vehicle’s position does not vary instantly.
The algorithm is based upon the variation in frequency, position, and velocity. Algorithm 1 is used for the detection of attacked packets.
Algorithm 1. Detection of all attacked packets based on hybrid DoS attacks (HDSA) and other attacked packets in the HDSA model (HDAM). |
- 1.
function RECOGNIZE (attacked packet for HDSA in the models). - 2.
Start - 3.
Discover - 4.
If (F ≥ high && V ≥ high) then - 5.
recognize (Attacked packet) - 6.
set attacked packet detection Alg (req) then - 7.
Start when validated (request) - 8.
return true - 9.
else - 10.
if (F ≤ low && V ≤ low) then - 11.
return invalid request - 12.
else - 13.
set attacked packet detection Alg (req) - 14.
end if - 15.
end if - 16.
end - 17.
end
|
The above algorithm can be applied prior to the verification time and to increase the security. The algorithm is utilized for detection of unacceptable requests with the attacked packet. It can also be utilized to avoid the end-to-end delay CO on the path of vehicles in the network. It is also worth noting that establishment of a safe and secure root is another matter, and sending the data in secure manner is also another matter. Even if the roots are safe, they cannot be 100% trusted. The proposed scheme model utilizes a Vehicular RSA algorithm (VRA) type at the transmitter end. The transmitting node also shares a key to the universal port (a port that keeps an eye on data sharing and vehicle information), which is established at the center of the network. The receiving node has the same key, which is shared by the transmitting node, but obviously there must be an intermediator who can verify it. The central port plays the role of the intermediator. The receiving node and the transmitting node both send their key with the added registration number of the vehicle to the central port. Suppose the key is 6612 and the registration number of the transmitter is 31, then the shared key will be 6612 + 31 = 6643. The receiver will also show 6612, and assuming that the registration number of the receiver is 45, then the key which is shared by the receiver will be 6612 + 45 = 6657. The central port subtracts the registration number from both the sender and transmitter shared value. If after the subtraction both share the same common key, the decryption key is shared by the central port.
The vehicular RSA encryption algorithm used at the transmitter end to further secure the network given as Algorithm 2.
Algorithm 2. Vehicular RSA Encryption Algorithm. |
1. if Sender vehicle creates a key then
2. receiver vehicle and creates two large prime numbers (P and Q) then//note that P and Q are each about same number of digits long, and are selected such that their product is long
3. set and to determine the value of large number N using, N = PQ then
4. Creates the value M//using the given expression below, Euclidean algorithm
5. M = phi (N) = (P − 1) (Q − 1)
6. if and select any integer value E then
7. E = positive integer//E lies between, 0 < E < M
8. function GCD (M, E) = 1//(GCD is Greater Common Divisor)
input: and calculate the value of D
Output: The quotient and remainder of M and E If (E × D) = 1 (mod M) then
(E × D) mod M = 1 &
9. if and create the Public key: E, N then
10. set and to create Private Key using D and N
Encryption/Verification:
11. if can utilize original plain text (a block value) = X ... X < N then
12. obtain Ciphertext = C ... C = () mod N
end if
13. Decryption/Signing:
14. if Utilize Ciphertext = C then
15. Deciphertext = Y
16. end if
17. end if
18. end if
19. end if
20. end |
The proposed vehicular RSA is an algorithm used by modern fog computing and cloud-based techniques to encrypt and decrypt packet data during the data transmission. It is an asymmetric cryptographic algorithm. Asymmetric means that there are two different keys. This is also called public key cryptography because one of the keys can be given to everyone. The other key must be kept private.
Figure 5 represents the authentication process of data packets using the vehicular RSA encryption algorithm. The transmission of data packets from the transmitting vehicle or node to the receiving vehicle or node is represented by an arrow. Every vehicle in VANET comprises an individual private key generated by each node along with the public key. The public key is same for every node, whereas the private key is different. Therefore, whenever a node wants to transmit the data, a private key along with the public key must be generated and transmitted along with the packet. In the case where the key is matched, it means that the node is genuine and the transmitting node transmits the data, otherwise the node is considered an attacker node and the route is changed without forwarding data to the attacker node.
The process of authentication of data packets in the proposed scheme models are also required to be extended for further investigation on storage of data in a model, based upon the ESA, which is determined based upon the DJSAM elliptical segment transmission range. This is due to the fact that there is high anticipation of HDSA that can be identified in the ESA that would require further investigation within a specified transmission range in VANET. In addition, Vehicular Fog Computing and Cloud-based (VFC) integration, which utilize ESA, are important in the network design. These are used to solve any limitations in storage and efficient computation in VANET. VFC should also be deployed in the elliptical segment area transmission range (ESATR) in order to also investigate trustworthiness, using the storage prevention mechanism in the proposed scheme network, which will be investigated subsequently.
4.2. Fog Computing (FC) Storage Preventive Model
VANET is mainly designed to optimize the communication network between the vehicles. Due to the high movement of the vehicles, Fog Computing and cloud integration (VFC) has gained attention in this area. Fog Computing that denotes VFC can store a lot of data, which can be reused and can be aggregated to prevent time succession searches, as the vehicles have a lot of on-board storage [
37].
Broadcasting data for vehicles in the network differ, based upon fog computing status. When the vehicle status is in the state of being elected for communication, in which the vehicles discover the decision of subsequent state on vehicle location information and speed, broadcasting of vehicles data packets () are considered so that they arrive at CM (Cloud member) within the network. When the CL (Cloud leader) produces data packets, it confirms through the information acquired from vehicles if packets are either received effectively or not. When the vehicles in the cloud have the data packets, then vehicles verify the packet source. When the source is from the parent cloud, they multicast the data packet to the cloud member, otherwise, the packet is taken from the vehicle as the state election mode.
Later, vehicles unicast the received packets towards the parent cloud to send the packet until packets arrive at the cloud leader, which discloses the vehicle information. Accordingly, as shown in the below algorithms, if the cloud leader produces a data packet, initially it verifies the packet source. When the data packet approaches from enode-B (an element of the long term evolution (LTE) radio access network), the cloud leader transfers the data packet to each cloud member or the packet is sent from the parent cloud () member. In this circumstance, the cloud leader sends the data packet to the cloud member and generates the LTE data packet (, which transfer the packets to enode-B with the novel original received packet from the vehicle. In the end, the packets are updated as cloud leader vehicle information (CLvInf).
The PSAM utilizes the multicast/broadcast and unicast modelling in order to fulfill the requirement as needed. Obviously, the multicast architecture incurs some latency and as it broadcasts the data, it will consume some time.
Algorithms 3, 4, and 5 decrease the issues of the broadcasting storm within the network by lessening the iterated data broadcasting and by keeping less overhead information. They also broadcast the specific data using appropriate vehicles or nodes that also decrease the network load. The reduction of network load action taken is necessary due to consideration of overwhelming messages that may occur as a result of all forms of attacks, including HDSA and DoS JSA in the network. They also lessen the problem of network disconnection by lessening the regular downloading and subscription to the network [
38].
Table 1 depicts the notation and descriptions of the algorithms and the models terms.
Algorithm 3. IEEE 802.11p-LTE CM. |
On generating or receiving: //on receiving or generating the data packets filter or ; //Filter on Packets If (, ) CLvInf & If is from then multicast on to CM; //Multicast situation else unicast to CL //Unicast situation Update vInf; end if end if end
|
Algorithm 4. IEEE 802.11p-LTE Cloud leader (CL). |
- 1.
for on generating or receiving then - 2.
filter & ; - 3.
If (, ) CLvInf & - 4.
If (On is from eNodeB) then - 5.
send on to CM; - 6.
else - 7.
broadcast to CM - 8.
develop and send to eNodeB then - 9.
Update vInf; - 10.
end if - 11.
end if - 12.
end for - 13.
end
|
Algorithm 5. IEEE 802.11p-LTE eNodeB. |
for generating or receiving; filter and req_data; if (, ) (CL, vInf) then broadcast to eNodeB-fog then broadcast to CL then send to server-fog then broadcast to eNodeB then broadcast to CL Update eNodeB; end for end if end
|
In order to investigate HDSA and DoS JSA, including other attacks, using the PESATRM model, the fog server (FS) and fog level (FL) authentication preventive mechanism is important, which should be utilized in the Elliptical Segment Area Transmission Range Model (ESATRM), as explained below.
4.3. Elliptical Segment Area Transmission Range and Authentication Prevention Model
In order for vehicles to communicate effectively and get authenticated, a specified transmission range of vehicles, which also utilize HDAM, is designated in the network. The designated transmission range is based upon the elliptical segment area (ESA) transmission range (ESATR), which utilizes V2V standardized road safety information exchange (SRSIE). The ESATR requirement is also based upon a model adoption in VANET. Based upon the model, the contribution of HDAM is also important for investigation. The model requires a further authentication prevention mechanism in the network. Therefore, this research investigates a model in VANET known as the proposed scheme elliptical segment transmission range model (PESATRM). PESATRM includes the tendency to utilize a secure authentication prevention method, which is integrated in the VANET communication process design. This is also used to mitigate all forms of attacks, including HDSA and DoS JSA attacks. Further secure authentication in the PESATRM can be achieved through FS and RSU deployment. In the PESATRM, the V2V communication process utilizes IEEE 802.11p beacon transmission to communicate and also secure the network links. This provides the capability for each vehicle to exchange messages securely within a specified ESATR. Based upon this, vehicles move along in the same direction of travel to their intended destination (as shown in
Figure 6). Therefore, the PESATRM has been developed from a modified circular segment area model (CSAM) adopted in a previous study [
39].
However, investigation revealed that the CSAM is insecure based upon limitations in HDSA and DoS JSA and other forms of attack investigation. In addition, another limitation worth noting is that the CSAM design does not utilize fog computing and cloud-based (VFC) integration investigation. Therefore, it is suggested that the PESATRM communication process should be designed to include VFC employing authentication/KDE (AKDE) to further secure the network. In addition, it is estimated that designing a secure PESATRM would also prevent high incidences of communication overhead (CO). CSAM limitations also include increased communication overhead (CO).
In the design of PESATRM, we require that integration with the PSAM model is possible, which should include VFC. VFC integration provides enhancement in the end-to-end delayed path attacked packet detection process. This is based upon the fact that the neighbor-vehicle-to-neighbor-vehicle (NV2NV) communication process requires further AKDE. Moreover, the SRSIE process that prevents CO due to the end-to-end delay/jitter path in vehicles is anticipated in the network, which requires trustworthiness. Secure VFC and FS integration provide secure real-time detection of all other forms of attacks, including HDSA and DoS JSA, which utilize the IEEE 802.11p beacon transmission relay process in a specified ESATR.
Furthermore, in the design of the PESATRM, rapid topology changes in VANET are important for investigation. This is because HDSAs, including DoS JSA and other vulnerabilities, are eminent in the air, or in the open environment in which VANET deployment occur. Therefore, the PESATRM is also designed to detect traffic in DoS JSA and its associated vulnerabilities faster and more accurately. The network topology design should utilize VFC and AKDE, which are able to store large volumes of data utilized for secure delivery of SRSIE. Based upon this provision, it is possible for the proposed scheme to detect and mitigate HDSA, including DoS JSA and associated vulnerabilities that would incur CO in the network. In addition, VFC provides increased space search for SRSIE in the network and requires hybrid optimization algorithms (HOA).
HOA deployment and integration in VANET is important. It provides swarm intelligence and utilizes a heuristic approach in solving VFC limitations. Based upon this, we require that integration of PSAM and PESATRM models should include intelligence for efficient ESATR. HOA integration with VFC utilizes HOA heuristics to solve problems in the network, such as end-to-end delay and jitter performance evaluation. Based upon this, the dynamic transmission range is provided in the network. Dynamic transmission is usually more effective in maintaining connectivity. HDSAs, including DoS JSA and all other forms of DoS attacks, can be detected and eliminated from the network when a specified ESATR is deployed in the PSAM and the PESATRM integration. We also anticipate that the design of ESATR needs to be more secure. Comparatively, the circle segment transmission range (CSAM) that PESATRM was modified from is more confined. Therefore, we anticipate that the CSAM will incur a lot of trustworthiness concerns, since it does not detect and eliminate HDSA and its associated DoS JSA in the proposed scheme models.
Figure 6 is used to explain the deployment of the PESATRM. It is anticipated logically for the PESATRM to utilize AKDE.
In
Figure 6 (as shown below), the vehicles within the ESATR are also known as neighbors. These neighbor vehicles (NV) are secure in the network using the AKDE method. NVs are also required to keep one global key (Gk). The Gk provides the requirement in authentication of the NVs in the models (PSAM the PESATRM). The method of acquiring the Gk, which also represents the public key, is given through FS and the RSU. In addition, secure sharing of the Gk is important. This must be complied with for every NV using NV2NV communication. In addition, secure sharing of the Gk includes SRSIE accurately. Therefore, implementing a further authentication mechanism is required in the network, which is also investigated in the models. In addition, the objective of the NV2NV communication is to utilize authentication of each NV in the PESATRM. This verifies that the communicating NV entities are all neighbors with each other. Subsequently, NVs exchange “hello” messages to initiate the communication process. Thus, NVs are capable of utilizing sufficient time in the NV2NV communication to be able to transmit SRSIE. This successfully leads to processing of standardized road safety traffic emergency information (SRSIE) exchange for VANET in the same ESATR.
Based upon this,
Figure 6 also depicts the PESATRM, which utilizes V2Vcommunication. The PESATRM NVs exchange “hello” neighbor messages. The hello message exchanged by NVs is initially broadcast or multicast and finally unicast using NV2NV and secure NV communication. NV2NV and secure NV communication processes include neighbor vehicles (NV), origin vehicles (OV), and the destination vehicle (DV). Each NV that communicates with other NVs initially gets authenticated. Afterwards, NVs transfer the Gk securely with each other. Subsequently, NVs or NV2NV simultaneously transmit the SRSIE with each NV.
The message transmitted is also used to obtain the direction, speed, and time information of each NV. Since the NV2NV communication process includes secure sharing of the common Gk and SRSIE, these are designated to occur in the proposed ESA. Each NV segment S is as shown in
Figure 6 with the dark black lines. The probability analysis of the proposed scheme PESATRM will be determined subsequently below. For now it is important to determine the ESATR as follows:
From
Figure 6, the area of the ellipse is
.
An elliptic sector is the region bounded by an arc and line segments connecting the center of the ellipse (which is the origin in the figure) and the arc endpoints.
To determine the elliptic segment area, we let lines and be perpendicular to the. The coordinates of M and N are and , respectively. Therefore, the area of the elliptic sector MON is determined as:
Segment area
An elliptic segment area is bounded by an arc and the chord that connect the arc’s endpoint.
Hence, the elliptic segment area is given in Equation (3) as:
Figure 6 also demonstrates the movement of vehicles in the designated PESATRM. The PESATRM utilizes maximum transmission range. It is based upon specified NV relationships with each other NV. Based upon this, each NV is required to transmit the IEEE 802.11p beacon’s “hello” message with every other NV. The NVs also obtain their speed, location, direction, and time information. At the same time, further AKDE is required in NV2NV communication. AKDE is initiated against all forms of attacks, including HDSAs, such as DoS JSA attack, which occur at different speeds, directions, and times. It is also achieved through the FS and the RSU data transmission and authentication process based upon each NV, OV, and DV (NODV) communication process, as follows.
4.4. Fog Server (FS) Further Authentication Process in the Elliptical Segment Area
The models encompass PSAM and PESATRM. These models utilize FS and RSU for further authentication processes. This is in order to ensure safe arrival of NODVs that travel in the same ESA. The authentication process involves two-fold performances. In the first performance, V2V communications are authenticated with every other NODV. In addition, they also share the common Gk securely. Based upon this, each NODV is capable of securely acquiring the Gk by FS and the RSU. The authentication (AKDE) and secure SRSIE of NODV ensures that all vehicles that fall in the same ESATR have achieved further trustworthiness protection in the network. Based upon the PESATRM model, we also assume that the use of Vehicular RSA (VRSA) public key deployment is important. This include utilizing the common Gk as each NODV public key.
Each NODV vehicle or node is also required to pass a VRSA authentication process check (this was formally achieved previously through the PSAM). The following further authentication preventive mechanism, which also utilizes the Gk, is formally deployed in the FS and the RSU authentication process, as follows. This also utilizes the following assumptions that are important for the FS and RSU further authentication process of the PESARTM integration with PSAM models, as follows:
FS and RSU message authentication denotes VANET safety message announcement as standardized.
PSAM integration with the PESATRM utilizes the FS parameters, which include, C, , where is the global public key of the sender vehicle or NODV, is ( denotes possible pseudonyms of vehicles of entity , whereby one is also a pseudonym of NODV and others are collected pseudonyms of other NVs), and denotes the authentication tag, which includes the integration of PSAM and PESATRM, which is installed through RSU and the FS.
Based upon each possible signer vehicle that occurs in the PESATRM, a validation
is important. Here,
denotes the PESATRM signature (PESATRMS) created by vehicle entity
When a vehicle entity
is authenticated by a symmetric encryption with key
, it is written as:
The FS and RSU further authentication algorithm is given as Algorithm 6.
Algorithm 6. Fog Server Further Authentication Algorithms for Proposed Models. |
1. if Neighbour vehicle (NVA) sends authenticated safety message (ASM) and shares Gk through an initial broadcast/multicast and finally unicast to all vehicles within same ESATR, based upon the advocated scheme then
2. Assume neighbour Vehicle (NVB) is in the same ESATR that also represents the next single hop vehicle (NSHV), which also utilizes this application and receives the ASM from &
A. if = NSHV then
B. generates a random key and computes the proposed PSAM and the PESATRM parameters, ;
C. creates the PESATRMS over the calculated PSAM and PESATRM parameters through its current application-specific pseudonym, including collected pseudonym, then
D. Set to encrypt PESATRMS with the chosen key K then
E. send resulting ciphertext through the PSAM and PESATRM parameters;
3. if :, then
4. set
5. If NV NV then
6. set
7. end if
8. end if
9. end if
10. end |
In the second performance, further FS and RSU authentication processes are employed. Each V2V communication process utilizes and transmits IEEE 802.11p beacons for SRSIE. This takes place so that each NODV can also share and utilize SRSIE amongst themselves. This performance process employ probability analysis, including encryption/AKDE of each NV communication, followed by successful data exchange in the ESATR.
VANET application models, such as the PSAM and PESATRM integration, require an exchange of application-specific trustworthiness data, which utilizes the secure
Gk sharing. Thus, the data exchanges must first ensure that they have been protected from any form of HDSA, including DoS JSA of NODV, which does not use the application. This enables each communicating NODV that falls in the same transmission range to become convinced that each vehicle is eligible to securely obtain the
Gk. Moreover, vehicles also become securely authenticated and are capable of exchanging SRSIE with each other accurately [
40].
The probability analysis that encompass the PSAM and the PESATRM integration for finding each NSHV also utilizes the proposed scheme FS and RSU authentication algorithm for exchange of SRSIE. This occurs in the encrypted non-shadowing environment (ENSE) region, as determined below.
4.5. Probability Analysis of Vehicles Based on Elliptical Segment Area Transmission Range
This section discusses the probability analysis of vehicles based upon PESATRM. The section also includes utilization of the NSHV concept of authentication based upon the FS and the RSU authentication algorithm, and secure SRSIE. Based upon this, NSHV links are set up to forward the attacked detected packet, utilizing the transmission and relay of IEEE 802.11p beacons in the ESATRM. This is based upon the communication process of NV-to-NV utilized in the network. Based upon this, a sender is required to find at least the NSHV that is in the same ESATR. This is followed by authentication and subsequent transmission of the SRSIE, which is based upon the PESATRM deployment. NV/NODV that are present in the ESATRM utilize three parameters, namely density, segment angle and transmission range. The PESATRM probability analysis has an objective of analyzing the impact of the parameters , and In addition, the PESATRM is also anticipated for use where it is also important for providing secure authentication. This secures each NV2NV communication, and also sharing of Gk with individual NVs. The objective of utilizing sharing of Gks that fall in the same ESATR also include the probability analysis of locating at least one NV for sharing of Gks in the segment area. This objective can be achieved when different values are assigned to in increasing order, until a NODV is found in the ESATR that would authenticate and also share the common Gk with every other neighbor vehicle during the vehicle movement of NODV in the ESATR.
The movement of NODV is considered to take place using a two-dimensional network area. This is based upon the ESATR. NODV availability in the network follows a Poisson distribution with NODV density When considering the mean density of NODV in the network, the number of NVs that are present in the ESATR is obtained using a Poisson distribution. In addition, each NODV arrival also depends on how successfully it is able to initially be authenticated with each other NV. It is then followed with the secure sharing of the Gk with every other NODV vehicle. This also includes exchange of the standardized safety and road emergency conditions with each driver or vehicle on the road.
The proposed scheme uses NODV position to initially broadcast/multicast and finally unicast information to other NVs that fall in the same ESATR. In addition, it is presumed that the proposed scheme PESATRM probability analysis also utilizes the attacked packet detection algorithm (APDA) that was achieved in the PSAM. This is in order to mitigate against HDSAs, including DoS JSA attacks, which may be encountered in the ESATR. The proposed scheme PSAM, which is already integrated with the PESATRM, is also deployed together to prevent malicious nodes becoming part of the network. The NODV position information is represented through both and coordinates on a plane using a 2D network model.
Optimal transmission range investigation for VANET has been conducted by various researchers in [
41,
42]. In those studies, it was revealed that transmission range requirements in VANET decrease with increases in vehicle density. High density vehicular traffic situations require a smaller transmission range. Moreover, we recall that NV2NV communication would also require authentication and encryption of data, including the sharing of the
Gk in a non-shadow environment (ENSE). The ENSE avoids real-time conflict in transmissions of data authentication and exchange of information in the shadow area. Based upon this, neighbor vehicle transmissions would result in collision and congestion [
43]. Therefore, we adopt our previous proposed scheme, the ESATR detection process for DoS attacks [
44]. By referring to the efficient transmission range for NV, we chose a transmission range between 250 and 550 m. However, we consider the smaller transmission range of 250 m as effective. This is because of reduced CO, which can be utilized in the elliptical segment probability analysis of the NV/NODV.
We consider
as the random variable, which represents the number of NV/NODV present and located in the ESATR, whereby each NV/NODV possesses the global key (
Gk). After each NV/NODV is authenticated and shares the
Gk securely, the probability
in the presence of
NV/NODV in the proposed ESATR, which utilizes encrypted SRSIE, in non-shadow environment (ENSE) can be obtained in the given Equation (4) as:
Substituting the value of
from Equation (3), we obtain Equation (4) as:
The probability of
in the presence of at least one vehicle in the segment area with encryptin and authentication and sharing of global key
Gk in a non-shadowing environment can be expressed as given in Equation (7):
The above PESATRM probability analysis model, which is integrated with the PSAM, is proposed in addition to the message broadcast algorithms that were investigated. These have been used to decrease the broadcasting storm in the network. Moreover, the models’ integration reduces trustworthiness concerns in the network. The combined effect of the PESATRM and algorithms also increase established trust in the network. This was possible through achieving an efficient ESATR. In addition, the algorithms implemented in the proposed scheme models PESATRM and PSAM also lessen the iterated broadcasting to keep less overhead information and decrease the network load.
The process of using the PESATRM and PSAM integration probability models and the broadcast/multicast and unicast algorithms to verify the network is secured from HDSAs, including DoS JSA and other associated attacks. Even though the deployment of these models in the scheme were satisfactory, in order to make the model more efficient for selection of trustworthy vehicles or nodes in the network, the Cuckoo/CSA (ABC) optimization algorithm, which include swarm intelligence, is applied to select more trustworthy nodes. This is based upon the probability of legitimate selection of the nodes to be part of the network. Therefore, probability analysis specification selection using Cuckoo/CSA (ABC) for selecting the legitimate nodes to be part of the network communication process is determined as follows.
Table 2 shows the Cuckoo/CSA (ABC) specification.
To determine
is the vehicular node,
is evolved the from initial point
to the total gen iteration number, Cuckoo/CSA (ABC) has a powerful feature to generate new candidate vehicle or node solutions to be part of the network. Based upon that approach, a new candidate solution
is produced through disturbing the current
with a position change
is the number of vehicular nodes in the network. To obtain
random step
is generated through symmetric Levy distribution using an algorithm from a previous study [
45].
Finally, the solution for a new vehicular node solution,
, is obtained using:
Then, under replacement of nodes a set of individual new nodes that should be part of the network is probabilistically chosen and replaced with malicious or attacker nodes. Each can be chosen with a probability
The operation can be done with the following model:
where rand is a random number normally distributed, and
are random integers from
.
After producing it must be compared with its past value . If the fitness value of is better than , then is accepted as the final solution. Otherwise, is retained.
The procedure can be done through the following statement:
This Cuckoo/CSA (ABC) selection with fitness value , as shown in the Equation (11) strategy, demonstrates that only high quality vehicular nodes that utilize relays of high IEEE 802.11p signals (best solution near the optimal value) have the opportunity to interact with the RSU and the FS to deliver emergency feedback information, such as accidents and bad road conditions, to alert road users.
After the selection of the legitimate nodes that are to be part of the network and after routes are discovered, assurance in trustworthiness of the nodes in the network must be maintained, as shown below.
4.6. Trust Provision in the Proposed Scheme
In order to provide trust in the network, it is anticipated that hybrid DoS attacks (HDSA), including DoS JSA and other attacks that may be hard to detect in the proposed scheme models, such as HDAM, PSAM, and PESATRM, have one solution that can also be devised to evaluate the probability information received through a consensus mechanism [
46]. Thus, false information reaction due to the HDSAs, including DoS JSA and other attack, would require a vehicle to wait to receive given information based upon binary numbers (ones and zeroes).
Let us consider a vehicle that transmits the information or message, where during the transmission, HDSAs, including DoS JSA and all forms of attacks, occurs because of the neighboring vehicles that disturb or amend the actual information. To secure the network, it is necessary to protect the network from all other forms of external attacks as well. In order to determine the attacks in the network, past information of the transmitting vehicles in the form of binary numbers are considered, on the basis of which the genuine vehicle makes a decision if whether the driver should consider the message as trusted for the vehicle. When the number of zeros is less than ones, the driver would consider the message as the genuine message, or otherwise would ignore the message [
47].
To decide how instantly the receiving vehicle would trust the vehicle that transmits the message to the base station (RSU and FS), the following equation has been used:
As shown in the above equation,
t (rv) is the time to choose whether
rv (receiving vehicle) could trust the
sv (sending vehicle),
t(rv&ap) is the time of transmission and reception with the access points and vehicles,
t(ap&S) is the time of transmission and reception with the access points and server,
t(s&frv) is the time of transmission and reception with the fog server and feedback of reporting vehicles, and
t(p) is the server’s processing time [
48].
In the proposed scheme model, namely PSAM, the communication ranges from 250 to 500 m and the information is transmitted at 30Mbps [
49]. Therefore, the transmission time can be determined by using the following equation:
Distance (d) can be computed by using the following equation:
As shown in the above equation, and show the graph co-ordinates.
4.7. RSU Network Prevention Mechanism Against Hybrid DoS Attacks
The network construction is done with the specifications given in
Table 3. Algorithm 7 shows the random vehicle positioning (Total Vehicles). Algorithm 8 shows random End-to-end delay detection in Vehicles.
Algorithm 7. Random Vehicle Positioning (Total Vehicles). |
//for uncertainties in the network, the network is placed in a random position manner
1. for each n in Nodes/vehicles
2. X pos (n) = 1000*rand//creating a random x coordinate
3. Y pos (n) = 1000*rand//creating random y coordinate
4. Place (Xpos (n), Ypos (n))//Placing the node in their position in the network
5. end for
6. end |
Function Parameters (Nodes)//this function initializes the node parameters
Algorithm 8. Random End-to-end delay detection in Vehicles. |
1. for i = 1: Vehicle/Nodes//Loop running for each node
2. set End2End Delay_n (i) = Random; //Putting an end-to-end delay value for node acting normal
3. End2End Delay (i) = ; //now, the expected reality is unpredictable and hence just for the random//architecture is set to be square of the normal delay
4. end for
5. end |
As the end-to-end delay is initialized, in a similar fashion the other parameters, such as jitter, packet drop, jamming signal resource consumption (RSU/CPU) overutilization, and all other forms of anticipated attacks, including HDSA and DoS JSA attacks, in the network performance metric parameters are also initialized. In VANET, we envisage that there will be no excessive battery consumption. This is due to the fact that as the vehicles that are in the communication process keep moving in order to determine the end-to-end delay of the network, the battery also keeps charging as long as the vehicle are running.
In addition, every node has a different set of parameters. A function is designed to initiate network parameters. The real-time simulation may have a slightly different structure. Networks do not have any fixed structure, nevertheless, for any simulation there are parameters that should be initialized.
4.8. Modelling of DoS Threat Prevention
This paper focuses on the prevention of all forms of attacks, including HDSA and DoS JSA attacks. The architecture for the attacks are as follows.
Figure 7a,b represents the path construction and the malicious network for HDSA, including DoS JSA and other attack modes of the attackers, respectively.
Figure 7b shows that the intensity of dumping end-to-end delayed packets of the HDSA, including DoS JSA attackers such as jamming of signals, packet drop, and resources consumption via CPU/RSU overutilization, varies at different instances of time. If the intensity of all these forms of hybrid DoS attackers and others are high, obviously the attackers attempt to dump more packets, which results in more packet drop, jamming of signals, and resources consumption via RSU/CPU overutilization, etc., which might affect the RSU for prolonged end-to-end delay in the network. Based upon this, we define the following equation:
Tpd is total packet drop, Pdn is the total number of dropped packets in normal mode, and Pda is the packet dropped when the network is under threat, which has experienced all types of DoS attacks. In addition, we also define the following equation in relation to the types of attacks as:
Pdr is packet delivery ratio and Tp is the total number of packets. Due to random behavior of the attacks, the PSAM becomes more sophisticated. Now, the challenge is to identify all the forms of DoS attacks that are experienced in the network. The proposed scheme solution utilizes FFBP-NN and the general functions of FFBP-NN and artificial intelligence are given in
Table 4.
The artificial intelligence used in the proposed scheme consist of two methods: (1) Training, and (2) Classification/Optimization.
The proposed scheme models, which include HDAM, PSAM, and the PESATRM, utilize two processes in artificial intelligence (AI). They are the training process and the classification/optimization process. In the training process we utilized jitter as the training parameter to train the neural network using the MATLAB neural network tool box. Based upon the training process, a target set is provided as well. The training is orchestrated in two phases. In the initial phase, the training is done for path identification of all vehicles paths that were affected by HDSA, including DoS JSA and other attacks, based upon the communication process experience of vehicles through the transmission of the IEEE 802.11p beacon relay. Then, in the second process, the training is done to identify the vehicles on the route that were also affected by HDSA, including DoS JSA and other attacks. The classification/optimization process optimizes the real-time signal timings during a given attack situation. These would incur HDSAs, including DoS JSA and other attack traffic, which would result in congestion or jamming of signals, packet drop, and resource consumption via RSU overutilization.
Equation (18) below can be defined by the end-to-end jitter based upon AI processes, as follows:
From Equation (18), Jitr is the jitter, E2EDP is the end-to-end delay of the path, “at” and “nt” represent advanced (under threat) and normal, respectively. Ntd is the network delay. For each path in every iteration, there will be a jitter. The proposed solution uses the first 450 to 600 iteration data points for training, and then for the next 650 iterations and above to train the structure for identification of the path delayed in the vehicle communication process based upon the proposed scheme and models. Algorithm 9 shows Train_Neural (Reiteration Data, Total Reiterations). The used notations are as follows:
Notation | Description |
Tpd | Total packet dropped |
Pdn | Total dropped packet in normal mode |
Pda | Packet dropped when network is under threat |
Pdr | Packet delivery ratio |
Tp | Total number of packet |
Jtr | Jitter |
Dp | Delay path |
“a” | Advanced (under threat) |
“n” | Normal (no threat) |
Nd | Network delay |
k | Total neurons |
Avg_jitter | Average jitter |
Max_jitter | Maximum jitter |
Min_jitter | Minimum jitter |
Tdp | Total delivered packet |
Tm | Total time of packet transfer |
Algorithm 9. Train_Neural (Reiteration Data, Total Reiterations). |
1. for i = 1: Total_Reiterations
2. setTraining_Data (i) =Reiteration_Data (i) then;
3. Target_Lable (i) = Path_ID;
4. end for
5. NeuralI = Initialize_Neural (Training_Data, Target_Label, k); //k is Total Neurons (40 in proposed case)
6. NeuralI.TrainParam.Epochs = 140; //total training iterations
7. Train (NeuralITraining_Data, Target_Label); //training with Initialized Neural and Training data
8. end |
The training section leads into the following (Firefly/GA) FFBP-NN structure.
Figure 8a illustrates Feed forward propagation structure and
Figure 8b illustrates the back propagation Firefly graph. Based upon the graph, the proposed scheme and the models determine the training data jitter and also validate it. The training data jitter also represents the deviation between predicted y value and also the actual y value, which is the measured MSE (mean square error). In addition, based upon
Figure 8b, we can also realize that we have 9 epochs of the proposed scheme model. This implies that the proposed scheme models are trained over 9 epochs as the forward iteration and 3 epochs for backwards iteration. We also expect that the proposed scheme models will also decrease with each epoch, meaning our model predicts value y more frequently and accurately as the model is further continued for training. The test graph also indicates that validation performance at epoch 3 prediction of the proposed models is a good one.
4.9. Identification of All Affected Nodes and Retrieval
The proposed research work scheme also presents a regression model with the back propagation, as shown in
Figure 9.
5. Analysis and Discussion of Results
From
Figure 9, the regression model of the proposed scheme is evaluated. Based upon the evaluation, the training result is 0.7847, the validation result is NaN (not a number), the test result is NaN, and the overall result is 0.98727. These values represent close but high regression values. Generally, close but high regression values represents healthy training and classification structures. High regression values are also the reason that the prevention parameters of HDSA are high, including DoS JSA and other attack activities causing jitter and delay in the network.
As discussed earlier, this section classifies the path value on the basis of the trained structure. The identified malicious vehicle or node is always sent for recovery or maintenance. The following evaluations are also made.
5.1. Analysis of Jitter, Throughput, and Prediction Accuracy of the Proposed Scheme and the Other Contending Schemes
Based upon the proposed scheme models and algorithms, comparison analysis is made with the other contending schemes, such as CUCKOO/Artificial Bee Colony (ABC) and Firefly/Genetic algorithm (GA) models and algorithms. We determined jitter, throughput, and the prediction accuracy. Based upon this, we evaluated end-to-end delay using attacked packet detection algorithms (APDA) and the models in the network, which detected HDSA, including DoS JSA and other attacks observed in the paths of vehicles traveling in the network. V2V, V2RSU, and RSU2V communication processes were utilized. We utilized the simulation with the APDA, including unicast and multicast/broadcast data transmission. We also utilized single next hop vehicle (SNHV) data transfer probability based upon the proposed scheme models (HDAM, and PSAM integrated with PESATRM) concerning the vehicle communication processes, which include V2V, V2RSU, and RSU2V communication. IEEE 802.11p beacon transmissions were utilized in the network, which is based upon DSRC technology.
Thus, the proposed scheme prevention performed in the network, compared with the prevention performed with the other contending schemes, including CUCKOO (ABC) and Firefly (GA), were evaluated based on Jitter, throughput, and prediction accuracy, as follows.
5.2. Jitter Analysis
Figure 10 illustrates the Jitter for the proposed scheme versus two other schemes. Evaluating the Jitter, the proposed scheme jitter was compared to the other contending schemes, such as Firefly (GA) and CUCKOO (ABC). This evaluation was based upon the end-to-end delayed path of the vehicle communication process observed in the network. For the proposed scheme models, which include HDAM, PSAM, and the PESATRM communication process, the jitter is 60 ms less, whereas the jitter values for CUCKOO (ABC) and Firefly (GA) were 93 ms and 89 ms, respectively, which are high. This is because the proposed scheme architecture models utilized the training structure and did not have to compare the entire feature set, which consumes a lot of time in the case of HDSA, including DoS JSA and other threat detection, based upon the attacked packet transmitted in the model architecture. However, both Firefly (GA) and CUCKOO (ABC) are iterative in nature, and hence consume a lot of time. Mathematically, the jitter can be computed in Equation (19. The jitter comparison are given in
Table 5.
Table 6 shows the average jitter value for different schemes.
5.3. Throughput Analysis
The second evaluation is performed on the basis of throughput. As emphasized already, the throughput evaluation is also based upon the comparison of the proposed scheme with the other contending schemes, which are Artificial Bee Colony (CUCKOO) and Genetic Algorithm (Firefly) schemes. The throughput is determined using the formula as follows in Equation (21):
Tdp is the total delivered packets, and tm is total time tp transmit information from the transmitting vehicle or node to the receiving vehicle or node in the proposed scheme SAM.
Table 7 shows the throughput.
The proposed scheme algorithms and models, which include HDAM, PSAM, and PESATRM, utilize maximum time. This results in the least end-to-end delay of the path of the vehicles’ jitter values. Thus, we envisage that time value is important and time value is utilized in transferring the data packets securely and efficiently. Hence, the proposed scheme models have resulted in a higher throughput value as compared to the other contending schemes, which are CUCKOO (ABC) and the Firefly (GA) scheme throughput, which are less.
5.4. Prediction Accuracy Analysis
The third evaluation is also done on the basis of the prediction accuracy of the proposed scheme. It is also compared with the other contending schemes, including Artificial Bee Colony (CUCKOO) and Genetic Algorithm (Firefly) protocols. The prediction accuracy of the proposed scheme compared to the other contending schemes, which are CUCKOO (ABC) and the Firefly (GA), are determined as shown in
Table 8.
7. Conclusions
The vehicular ad hoc network (VANET) avoids heavy traffic conditions and driving problems that may be encountered on the roads, including highways. Due to the environment in which VANET is deployed, VANET encounters a lot of trustworthiness issues. This includes hybrid DoS attacks (HDSA), including DoS JSA and other forms of attacks that can be unpredictable with VANET. This leads to sporadic processing of information. Sporadic information processing prevents real-time information delivery in VANET during V2V, V2RSU, and RSU2V communication. Consequently, this introduces end-to-end delay and jitter in the network. Alleviating end-to-end delay and jitter in the network requires secure, efficient storage delivery and trustworthiness solutions.
This research has presented fog computing in a cloud-based integration (VFC) concept to secure VANET. The research also utilized hybrid optimization algorithms (HOAs), which are also intelligent and include CSA/ABC and Firefly/GA. HOAs are heuristics, and also have problem-solving skills. The HOAs integrate with vehicular authentication algorithms. In addition, they optimize FS and RSU further authentication algorithms, and also help to select trustworthy nodes in the network. This process has also led to secure transmissions of IEEE 802.11p beacon relays in VANET. Secure transmission helps to ensure safe V2V, V2RSU, and RSU2V VANET communication processes. VANET communication processes include standardized road safety information exchange (SRSIE). This requires VANET Infrastructure Architecture (VIA) system models.
In this research, the system architecture models of VIA and several interesting application scenarios, i.e., challenging issues of VFC, have been discussed in the proposed scheme. The proposed scheme VIA system models include HDAM, PSAM, and PESATRM. The HDAM is a hybrid model of two models that utilize the DoS attack model (DAM) and jamming signal attack model (DJSAM). These two attack models are used to identify and mitigate all forms of attacks, including HDSA, DoS JSA, and all other associated attacks. These HDSAs including DoS JSA and other attacks, interfere with IEEE 802.11p beacon transmission relays during V2V, V2RSU, and RSU2V information dissemination.
PSAM is the overall proposed scheme system model. PSAM utilizes attacked packet detection algorithms (APDA). APDA are used to identify the vehicle position and frequency of the number of attacked packets. PSAM utilizes multicast/broadcast and unicast modes of transmission of data, whilst utilizing the IEEE 802.11p beacons and signals for real-time data delivery. The PSAM also integrates with the PESATRM to provide robustness in VIA deployment. This integration model serves as an additional model of the proposed scheme and utilizes efficient ESATR to process V2V, V2RSU, and RSU2V communication of SRSIE. The PSAM and PESATRM integration models also provides further secure authentication and key distribution establishment (AKDE) for the RSU and the FS. This secures the network for trustworthiness. In addition, PESATRM utilizes probability analysis and also encompass NSHV and non-shadow environment encryption (NESE) concepts of VFC communication. This provide secure and SRSIE to sensitize the vehicles that move in the same transmission range in order to effectively prevent road casualties in a timely manner.
VFC integration with HOA and AKDE support rising VANET applications that demand predictable results with minimum energy consumption rate. This paper has focused on the dual training mechanism of Firefly (GA)/FFBP-NN to provide prevention and recovery mechanisms for all malicious node detection paths for end-to-end delay paths observed in VANET. It also reduced jitter in the proposed scheme significantly. As a result, the detection and prevention of all forms of attacks, such as HDSAs, including DoS JSA and other attacks, is high. Based upon this, the proposed scheme prediction accuracy is 92%. The proposed scheme uses the concepts of authentication and encryption and trustworthiness of nodes. The network provision also utilize hybrid information broadcast/multicast and unicast in the VANET. However, compared to Cuckoo (ABC) and Firefly (GA), their prediction accuracies are, respectively, 63% and 63.89%. These schemes have limitations in trustworthiness provision in VANET. They do not utilize HOAs and AKDE.
In addition, the proposed scheme algorithm and the models, which include HDAM, PSAM, and PESATRM, significantly contributed to efficiently reducing the jitter value by 72%. The maximum attained throughput for the proposed scheme is importantly high as compared to Cuckoo (ABC) and Firefly (GA). The paper utilized FFBP-NN over 100 iterations, out of which 30–40 iterations are reserved for Firefly back propation.
In our future work, we would like to design the layout and implementation of VANET, which would also involve other forms of optimization techniques, including the Spline method to minimize the jitter problems in the fog computing environment. Then, performance evaluation based upon different forms of attacks in the network, including HDSA, would also be assessed.