Detection of intrusions in clustered vehicle networks using invasive weed optimization using a deep wavelet neural networks

Measurement: Sensors - Tập 28 - Trang 100807 - 2023
M.V.B. Murali Krishna M1, C. Anbu Ananth1, N. Krishnaraj2
1Department of Computer Science Engineering, FEAT, Annamalai University, Chidambaram, 608002, Tamil Nadu, India
2School of Computing, SRM Institute of Science and Technology, Kattankulathur, 603203, Tamil Nadu, India

Tài liệu tham khảo

Aghabagherloo, 2022, An efficient and physically secure privacy-preserving authentication scheme for Vehicular Ad-hoc NETworks (VANETs), IEEE Access, 10, 93831, 10.1109/ACCESS.2022.3203580 Liu, 2019, A blockchain-based trust management with conditional privacy-preserving announcement scheme for VANETs, IEEE Internet Things J., 7, 4101, 10.1109/JIOT.2019.2957421 Zhong, 2017, Conditional privacy-preserving authentication using registration list in vehicular ad hoc networks, IEEE Access, 6, 2241, 10.1109/ACCESS.2017.2782672 Cui, 2020, Edge computing in VANETs-an efficient and privacy-preserving cooperative downloading scheme, IEEE J. Sel. Area. Commun., 38, 1191, 10.1109/JSAC.2020.2986617 Jo, 2017, Reliable cooperative authentication for vehicular networks, IEEE Trans. Intell. Transport. Syst., 19, 1065, 10.1109/TITS.2017.2712772 Mehrabian, 2006, A novel numerical optimization algorithm inspired from weed colonization, Ecol. Inf., 1, 355, 10.1016/j.ecoinf.2006.07.003 Guo, 2017, Deep wavelet prediction for image super-resolution, 104 Khan, 2019, Secure trust-based blockchain architecture to prevent attacks in VANET, Sensors, 19, 4954, 10.3390/s19224954 Maheswari, 2021, A novel QoS based secure unequal clustering protocol with intrusion detection system in wireless sensor networks, Wireless Pers. Commun., 118, 1535, 10.1007/s11277-021-08101-2 B Murali Krishna M, 2021, “Intrusion detection system for energy efficient cluster based vehicular Adhoc Networks”, Int. J. Adv. Compu. Sci.Appl.(IJACSA), 12 Vijayakumar, 2017, Computationally efficient privacy preserving authentication and key distribution techniques for vehicular ad hoc networks, Cluster Comput., 20, 2439, 10.1007/s10586-017-0848-x Chim, 2011, SPECS: secure and privacy enhancing communications schemes for VANETs, Ad Hoc Netw., 9, 189, 10.1016/j.adhoc.2010.05.005 Hu, 2016, REPLACE: a reliable trust-based platoon service recommendation scheme in VANET, IEEE Trans. Veh. Technol., 66, 1786, 10.1109/TVT.2016.2565001 Diro, 2018, Leveraging LSTM networks for attack detection in fog-to-things communications, IEEE Commun. Mag., 56, 124, 10.1109/MCOM.2018.1701270 Omar, 2021, Application of sliding window deep learning for intrusion detection in fog computing, 1 Zhang, 2021, V2V routing in VANET based on fuzzy logic and reinforcement learning, Int. J. Comput. Commun. Control, 16, 10.15837/ijccc.2021.1.4123 Wei, 2020, Blockchain data-based cloud data integrity protection mechanism, Future Generat. Comput. Syst., 102, 902, 10.1016/j.future.2019.09.028 Subba, 2018, A game theory based multi layered intrusion detection framework for VANET, Future Generat. Comput. Syst., 82, 12, 10.1016/j.future.2017.12.008 Prateek, 2022, 2022 Mejri, 2014, Survey on VANET security challenges and possible cryptographic solutions, Veh. Commun., 1, 53 Khan, 2019, Secure trust-based blockchain architecture to prevent attacks in VANET, Sensors, 19, 4954, 10.3390/s19224954 Englund, 2015, Future applications of VANETs, 525