Beruflich Dokumente
Kultur Dokumente
I. INTRODUCTION
Vehicular Ad-Hoc Network (VANET) is a manner attackers rupture secrecy, security, and
developing zone in networking, other than the discern genuineness properties which affect further insurance.
security applications and driver support that frame the It’s exhibited the safety challenges and existing
fundamental reason for which the VANET has risen; threads in the VANET framework. The reliability of
there are applications for traveler comfort and online such applications was approved through genuine
stimulation [1-10]. Vehicles specifically speak with portability information from an expansive vehicular
various vehicles and send information in regards to car testbed were presently sent [57] Enhance the steering
influxes, cautioning messages with Road-Site Unit execution in terms of transmission time and better
(RSU) which is fasten hardware in roads [11-20]. availability [58]. The FF algorithm on the VANET
Clustering is the technique for creating coherently improves the execution of routing by effective packets
gatherings of the network by some appropriate transfer from the source vehicle to goal vehicle. Inter-
standard and control in vehicles [21-39]. The Security vehicle communication has pulled in consideration
is increasingly essential in VANETs because of the since it tends to be relevant not exclusively to elective
absence of centralization, dynamic topology [40]. networks yet in addition to different correspondence
Because of this, it is hard to recognize noxious, acting frameworks, Fuzzy-based cluster head selection was
up and broken nodes or vehicles in the network. utilized by Kosuke Ozera et al. [60]. In 2014
Primarily trust models depend on confirming vehicles Mohamed Nidhal Mejri et al. [61] has been proposed
and give fitting trust value to all vehicles [41]. the protection and security challenges that should be
defeated to make such networks safety usable
In existing security model in Beacon based practically speaking. It recognizes all current security
trust framework (RABTM) utilized, that is roundabout issues in VANETs and orders them from a
event based trust utilized for trust foundation and cryptographic perspective. It regroups studies and
signal message and occasion message to decide the thinks about additionally the different cryptographic
reliability estimation of that event [42-49]. The goal of plans that have been independently recommended for
VANET is giving road safety [7], improving traffic VANETs, assesses the proficiency of proposed
productivity yet it is a network, so VANET arrangements [62].
additionally has difficulties about security and is
inclined to assault, we will consider reliability III. METHODOLOGY FOR WSN
investigation in created VANET structure [50-55]. SECURITY
II. LITERATURE SURVEY VANET network security in WSN, Lightweight
cryptographically model is utilized. For the most part
In 2018 Rajdeep Kaur et al, [56] have recommended in security examination, the attackers are physically
the VANETs remote discussion between cars in this caught to the real sensor vehicles, the real vehicles
have not strong security, so the assailants effectively
supplant the phony nodes and access all data. So our Second Preimage-resistance: specified f 1 , it is
enhanced security model initially distinguished the
reliability nodes by an optimization procedure that is complex to locate a diverse input f 2 such that
Random Firefly (RFF) Approach with clustering. H ( f 1 ) = H ( f 2 ) and this involves at least 2n work.
From this reliability of vehicle nodes and remote
connections, in packet forwarding of the sensors are IV. RESULT ANALYSIS
addressed adequately in an orderly way with the
assistance of a trust-based frame ceaselessly. In the In this result part talked about the
wake of finding the reliability nodes in network performance of the enhancement strategies; some
topology, the LWC model used to secure the data performance measures are utilized and contrasted and
transmission in sender to a beneficiary with expecting existing systems. The proposed framework is
routing model. actualized in the Java programming language with the
JDK 1.7.0 in a windows machine containing the
3.1 Routing Scenario with Clustering Model configurations, for example, the Intel (R) Core i5
processor, 1.6 GHz, 4 GB RAM, and the operating
Cluster formation processes the cluster heads
system platform is Microsoft Window7 Professional.
to choose the vehicle nodes in each cluster. The node
transmits to the cluster head clearly and in multi-hop
of all vehicle node will send their information through
the neighbor node. For a cluster based sensor network,
the cluster arrangement plays a key part to the cost
shrink, where cost alludes to the outlay of setup and
support of the sensor networks. This cluster formation
model, the routing protocol is extremely critical, in our
work LEACH protocol is used. It's to decrease energy
consumption by conglomerating data and to lessen the
transmissions to the base station.
Collision resistance: It is hard to discover two distinct Figure 1 shows the reliability analysis for various
messages; for instance let us accept two messages, for vehicle nodes. This analysis compares with proposed
example, f1 and f2; with the end goal (LEACH-RFF) into LEACH-FF and AODV-FF. Here,
H ( f 1 ) = H ( f 2 ) this requires at any rate 2 n / 2 work we take 50-200 vehicle nodes for reliability analysis.
The analysis depicts that the proposed model
Preimage- resistance: The known hash value H ( f ), (LEACH-RFF) finds out best reliability nodes
compared to other techniques.
it is hard to discover f , this involves 2n work.
trends in hospital-cost payments of patients classifier for financial crisis prediction. Soft
using ARIMA and GIS: Case study at the Hanoi Computing, 24(1), 101-110.
Medical University Hospital, Vietnam, Journal [23] Namasudra, S., & Deka, G. C. (2018).
of Medical Imaging and Health Informatics, Introduction of DNA computing in
7(2), pp. 421-429. cryptography. In Advances of DNA computing
[13] Prasanna, S., & Maran, E. (2015). Stock Market in cryptography (pp. 1-18). Chapman and
Prediction Using Clustering with Meta- Hall/CRC.
Heuristic Approaches. Gazi University Journal [24] Mubarakali, A., Srinivasan, K., Mukhalid, R.,
of Science, 28(3). Jaganathan, S. C., & Marina, N. (2020).
[14] Pustokhina, I. V., Pustokhin, D. A., Rodrigues, Security challenges in internet of things:
J. J., Gupta, D., Khanna, A., Shankar, K., ... & Distributed denial of service attack detection
Joshi, G. P. (2020). Automatic Vehicle License using support vector machine‐based expert
Plate Recognition using Optimal K-Means with systems. Computational Intelligence.
Convolutional Neural Network for Intelligent [25] Le Nguyen Bao, Dac-Nhuong Le, Gia Nhu
Transportation Systems. IEEE Access. Nguyen, Vikrant Bhateja, Suresh Chandra
[15] Namasudra, S. (2018). Cloud computing: A Satapathy (2017), Optimizing Feature Selection
new era. Journal of Fundamental and Applied in Video-based Recognition using Max-Min
Sciences, 10(2). Ant System for the Online Video Contextual
[16] Uthayakumar, J., Elhoseny, M., & Shankar, K. Advertisement User-Oriented System, Journal
(2020). Highly Reliable and Low-Complexity of Computational Science, Elsevier ISSN:
Image Compression Scheme Using 1877-7503. Vol.21, pp.361-370.
Neighborhood Correlation Sequence Algorithm [26] Ezhilarasu, P., Thirunavukkarasu, E.,
in WSN. IEEE Transactions on Reliability. Karuppusami, G., & Krishnaraj, N. (2015).
[17] Deepalakshmi, P., & Shankar, K. (2020). Role Single substring based classification for
and Impacts of Ant Colony Optimization in Job nondeterministic finite automata. International
Shop Scheduling Problems: A Detailed Journal on Applications in Information and
Analysis. Evolutionary Computation in Communication Engineering, 1(10), 29-31.
Scheduling, 11-35. [27] Bhateja, V., Gautam, A., Tiwari, A., Nhu, N.G.,
[18] Ashwin, M., Kamalraj, S., & Azath, M. (2019). Le, D.-N, Haralick features-based classification
Multi objective trust optimization for efficient of mammograms using SVM, Advances in
communication in wireless M learning Intelligent Systems and Computing, Volume
applications. Cluster Computing, 22(5), 10687- 672, 2018, Pages 787-795.
10695. [28] Latha, A., Prasanna, S., Hemalatha, S., &
[19] Ezhilarasu, P., & Krishnaraj, N. (2015). Double Sivakumar, B. (2019). A harmonized trust
Substring based Classification for assisted energy efficient data aggregation
Nondeterministic Finite Automata. Indian scheme for distributed sensor
Journal Of Science And Technology, 8, 26. networks. Cognitive Systems Research, 56, 14-
[20] Amira S. Ashour, Samsad Beagum, Nilanjan 22.
Dey, Ahmed S. Ashour, Dimitra Sifaki Pistolla, [29] Krishnaraj, N., Elhoseny, M., Lydia, E. L.,
Gia Nhu Nguyen, Dac-Nhuong Le, Fuqian Shi Shankar, K., & ALDabbas, O. (2020). An
(2018), Light Microscopy Image De-noising efficient radix trie‐based semantic visual
using Optimized LPA-ICI Filter, Neural indexing model for large‐scale image retrieval
Computing and Applications, Vol.29(12), pp in cloud environment. Software: Practice and
1517–1533, Springer, ISSN: 0941-0643. Experience.
[21] Prasanna, S., Govinda, K., & Kumaran, U. S. [30] Namasudra, S., Roy, P., Vijayakumar, P.,
(2012). An Evaluation study of Oral Cancer Audithan, S., & Balusamy, B. (2017). Time
Detection using Data Mining Classification efficient secure DNA based access control
Techniques. International Journal of Advanced model for cloud computing environment. Future
Research in Computer Science, 3(1). Generation Computer Systems, 73, 90-105.
[22] Sankhwar, S., Gupta, D., Ramya, K. C., Rani, [31] Lakshmanaprabu, S. K., Shankar, K., Rani, S.
S. S., Shankar, K., & Lakshmanaprabu, S. K. S., Abdulhay, E., Arunkumar, N., Ramirez, G.,
(2020). Improved grey wolf optimization-based & Uthayakumar, J. (2019). An effect of big data
feature subset selection with fuzzy neural technology with ant colony optimization based
routing in vehicular ad hoc networks: Towards Cryptography (pp. 37-52). Chapman and
smart cities. Journal of cleaner production, 217, Hall/CRC.
584-593. [42] Mubarakali, A., Ramakrishnan, J., Mavaluru,
[32] Namasudra, S., & Deka, G. C. (Eds.). D., Elsir, A., Elsier, O., & Wakil, K. (2019). A
(2018). Advances of DNA computing in new efficient design for random access memory
cryptography. CRC Press. based on quantum dot cellular automata
[33] Mubarakali, A., Ashwin, M., Mavaluru, D., & nanotechnology. Nano Communication
Kumar, A. D. (2020). Design an attribute based Networks, 21, 100252.
health record protection algorithm for [43] Ramakrishnan, J., Mavaluru, D., Sakthivel, R.
healthcare services in cloud S., Alqahtani, A. S., Mubarakali, A., &
environment. Multimedia Tools and Retnadhas, M. (2020). Brain–computer
Applications, 79(5), 3943-3956. interface for amyotrophic lateral sclerosis
[34] Dey, N., Ashour, A.S., Chakraborty, S., Le, D.- patients using deep learning network. NEURAL
N., Nguyen, G.N, Healthy and unhealthy rat COMPUTING & APPLICATIONS.
hippocampus cells classification: A neural [44] Van, V.N., Chi, L.M., Long, N.Q., Nguyen,
based automated system for Alzheimer disease G.N., Le, D.-N, A performance analysis of
classification, Journal of Advanced Microscopy openstack open-source solution for IaaS cloud
Research, 11(1), pp. 1-10 computing, Advances in Intelligent Systems
[35] Krishnaraj, N., Ezhilarasu, P., & Gao, X. Z. and Computing, 380, pp. 141-150.
Hybrid Soft Computing Approach for [45] Sinha, A., Shrivastava, G., Kumar, P., & Gupta,
Prediction of Cancer in Colon Using D. (2020). A community‐based hierarchical
Microarray Gene Data. Current Signal user authentication scheme for Industry
Transduction Therapy, 11(2). 4.0. Software: Practice and Experience.
[36] Namasudra, S., Deka, G. C., Johri, P., [46] Namasudra, S., Devi, D., Kadry, S.,
Hosseinpour, M., & Gandomi, A. H. (2020). Sundarasekar, R., & Shanthini, A. (2020).
The revolution of blockchain: State-of-the-art Towards DNA based data security in the cloud
and research challenges. Archives of computing environment. Computer
Computational Methods in Engineering. Communications, 151, 539-547.
[37] Goel, N., Grover, B., Gupta, D., Khanna, A., & [47] Mubarakali, A., Durai, A. D., Alshehri, M.,
Sharma, M. (2020). Modified Grasshopper AlFarraj, O., Ramakrishnan, J., & Mavaluru, D.
Optimization Algorithm for detection of Autism (2020). Fog-Based Delay-Sensitive Data
Spectrum Disorder. Physical Communication, Transmission Algorithm for Data Forwarding
101115. and Storage in Cloud Environment for
[38] Prasanna, S., Narayan, S., NallaKaruppan, M. Multimedia Applications. Big Data.
K., Anilkumar, C., & Ramasubbareddy, S. [48] Reshmi, T. R., & Azath, M. (2020). Improved
(2019). Iterative Approach for Frequent Set self-healing technique for 5G networks using
Mining Using Hadoop Over Cloud predictive analysis. Peer-to-Peer Networking
Environment. In Smart Intelligent Computing and Applications, 1-17.
and Applications (pp. 399-405). Springer, [49] Namasudra, S., Chakraborty, R., Majumder, A.,
Singapore. & Moparthi, N. R. (2020). Securing multimedia
[39] Le, D.-N.a, Kumar, R.b, Nguyen, G.N., by using DNA based encryption in the cloud
Chatterjee, J.M.d, Cloud Computing and computing environment. ACM Transactions on
Virtualization, DOI: 10.1002/9781119488149, Multimedia Computing Communications and
Wiley. Applications.
[40] Raj, R. J. S., Shobana, S. J., Pustokhina, I. V., [50] Patro, K. K., Reddi, S. P. R., Khalelulla, S. E.,
Pustokhin, D. A., Gupta, D., & Shankar, K. Kumar, P. R., & Shankar, K. (2020). ECG data
(2020). Optimal Feature Selection-Based optimization for biometric human recognition
Medical Image Classification Using Deep using statistical distributed machine learning
Learning Model in Internet of Medical algorithm. The Journal of
Things. IEEE Access, 8, 58006-58017. Supercomputing, 76(2), 858-875.
[41] Namasudra, S., & Deka, G. C. (2018). [51] Rajagopal, A., Joshi, G. P., Ramachandran, A.,
Taxonomy of DNA-based security models. Subhalakshmi, R. T., Khari, M., Jha, S., ... &
In Advances of DNA Computing in You, J. (2020). A Deep Learning Model Based