Smart City Gnosys

Smart city article details

Title A Clustering Approach For Attack Detection And Data Transmission In Vehicular Ad-Hoc Networks
ID_Doc 679
Authors Barve A.; Patheja P.S.
Year 2024
Published Ad-Hoc and Sensor Wireless Networks, 58, 1-2
DOI http://dx.doi.org/10.32908/ahswn.v58.10375
Abstract To support a variety of applications for smart cities and intelligent pas-sage systems, Vehicular Ad-hoc Networks (VANETs) are now becoming more common. To ensure dependable and stable VANETs communica-tions, there are various difficult elements to overcome. The most price-less and endangered species and ecosystems are found in Natura 2000 (N2k), the biggest coordinated network of protected areas in the world. The rigid management structure of N2K sites, which primarily empha-sises conservation practises without a strategic vision for tying into the larger plans, has drawn significant criticism. With the help of three cru-cial phases that enable effective key management, this study attempts to design a strategy for the supportable running of N2K sites. Network ini-tialisation, key generation, and Key distribution. The Deep Neural Network aided Canonical Correlation Analysis (DNN-CCAS) method entails three steps: Cluster Formation (CF), Cluster Head selection (CH), outbreak recognition, and VANET security. The vehicles are initially clustered together by the Amended K-consonance expedient method. Next, the CH is chosen as one of the clusters using the linear measure promenade approach. Finally, if the CH is a normal one after detection, the DNN-CCAS is used to send the data contained in the CH securely to the cloud. In the assessment of prevailing techniques, the planned method achieves an accuracy of 91%. © 2024, Old City Publishing. All rights reserved.
Author Keywords Amended K-consonance expedient; DNN-CCAS; linear measure promenade approach; Natura 2000; Vehicle Ad-Hoc network


Similar Articles


Id Similarity Authors Title Published
680 View0.973Barve A.; Patheja P.S.A Clustering Approach For Attack Detection And Data Transmission In Vehicular Ad-Hoc NetworksNetwork: Computation in Neural Systems (2023)
47371 View0.872Mosadegh H.; Farzaneh N.Scds: A Secure Clustering Protocol Using Dempster-Shafer Theory For Vanet In Smart CityICCKE 2021 - 11th International Conference on Computer Engineering and Knowledge (2021)
11021 View0.866Alwasel A.; Mishra S.; AlShehri M.Attacks On The Vehicle Ad-Hoc Network From CyberspaceInternational Journal of Advanced Computer Science and Applications, 14, 7 (2023)
2469 View0.866Rabah N.B.; Idoudi H.A Machine Learning Framework For Intrusion Detection In Vanet CommunicationsEmerging Trends in Cybersecurity Applications (2022)
37148 View0.865Dean A.; Huber B.; Kandah F.Mitigating Location-Based Attacks Using Predication Models In Vehicular Ad-Hoc NetworksProceedings - IEEE Consumer Communications and Networking Conference, CCNC (2022)
44548 View0.864Bangui H.; Buhnova B.Recent Advances In Machine-Learning Driven Intrusion Detection In Transportation: SurveyProcedia Computer Science, 184 (2021)
30719 View0.863Jabbar M.K.; Trabelsi H.; Kareem T.A.Improved Hypergraph Clustering With Weighted Gra For Dynamic V Anet Environment2024 21st International Multi-Conference on Systems, Signals and Devices, SSD 2024 (2024)
47566 View0.861Rabieinejad E.; Yazdinejad A.; Dehghantanha A.; Parizi R.M.; Srivastava G.Secure Ai And Blockchain-Enabled Framework In Smart Vehicular Networks2021 IEEE Globecom Workshops, GC Wkshps 2021 - Proceedings (2021)
33323 View0.861Arya M.; Sastry H.; Dewangan B.K.; Rahmani M.K.I.; Bhatia S.; Muzaffar A.W.; Bivi M.A.Intruder Detection In Vanet Data Streams Using Federated Learning For Smart City EnvironmentsElectronics (Switzerland), 12, 4 (2023)
58842 View0.859Aleisa H.N.; Alrowais F.; Allafi R.; Almalki N.S.; Faqih R.; Marzouk R.; Alnfiai M.M.; Motwakel A.; Ibrahim S.S.Transforming Transportation: Safe And Secure Vehicular Communication And Anomaly Detection With Intelligent Cyber-Physical System And Deep LearningIEEE Transactions on Consumer Electronics, 70, 1 (2024)