Smart City Gnosys

Smart city article details

Title A Clustering Approach For Attack Detection And Data Transmission In Vehicular Ad-Hoc Networks
ID_Doc 680
Authors Barve A.; Patheja P.S.
Year 2023
Published Network: Computation in Neural Systems
DOI http://dx.doi.org/10.1080/0954898X.2023.2279973
Abstract Vehicular ad-hoc networks (VANETs) are increasingly pivotal for empowering applications in smart cities and intelligent traffic systems. However, the reliability and stability of VANET communications face formidable obstacles. Natura 2000 (N2k), the largest globally coordinated network of protected areas, has drawn significant criticism for its conservation-centric management structure lacking a strategic vision. This study proposes a three-phase strategy to address these concerns, aiming for effective and sustainable N2K site management. The novel approach employs DNN-Assisted Canonical Correlation Analysis (DNN-CCAS), encompassing cluster formation, cluster head selection, and outbreak recognition for enhanced VANET security. Vehicle clustering begins with an amended K-consonance method, emphasizing both position and speed through AKCEM clustering. A cluster head is chosen via a linear measure promenade approach, followed by secure data transmission to the cloud using DNN-CCAS if the cluster head is deemed normal. The proposed method outperforms prevailing techniques, achieving an impressive 91% accuracy. This comprehensive strategy not only addresses VANET communication challenges but also aims to revolutionize the management of N2K sites by integrating a strategic vision into conservation practices. © 2023 Informa UK Limited, trading as Taylor & Francis Group.
Author Keywords amended K-consonance expedient; DNN-CCAS; linear measure promenade approach; Natura 2000; Vehicle ad hoc network


Similar Articles


Id Similarity Authors Title Published
679 View0.973Barve A.; Patheja P.S.A Clustering Approach For Attack Detection And Data Transmission In Vehicular Ad-Hoc NetworksAd-Hoc and Sensor Wireless Networks, 58, 1-2 (2024)
30719 View0.873Jabbar M.K.; Trabelsi H.; Kareem T.A.Improved Hypergraph Clustering With Weighted Gra For Dynamic V Anet Environment2024 21st International Multi-Conference on Systems, Signals and Devices, SSD 2024 (2024)
47371 View0.869Mosadegh H.; Farzaneh N.Scds: A Secure Clustering Protocol Using Dempster-Shafer Theory For Vanet In Smart CityICCKE 2021 - 11th International Conference on Computer Engineering and Knowledge (2021)
408 View0.868Jabbar M.K.; Trabelsi H.A Betweenness Centrality Based Clustering In VanetsProceedings of the 2022 15th IEEE International Conference on Security of Information and Networks, SIN 2022 (2022)
37148 View0.863Dean A.; Huber B.; Kandah F.Mitigating Location-Based Attacks Using Predication Models In Vehicular Ad-Hoc NetworksProceedings - IEEE Consumer Communications and Networking Conference, CCNC (2022)
44980 View0.858Ghosh J.; Kumar N.; Al-Utaibi K.A.; Sait S.M.; Vo V.N.; So-In C.Reliable Data Transmission For A Vanet-Ioit Architecture: A Dnn ApproachInternet of Things (Netherlands), 25 (2024)
60837 View0.854Kaur G.; Khurana M.; Kaur A.Vanet Cluster Based Gray Hole Attack Detection And PreventionSN Computer Science, 5, 1 (2024)
2469 View0.852Rabah N.B.; Idoudi H.A Machine Learning Framework For Intrusion Detection In Vanet CommunicationsEmerging Trends in Cybersecurity Applications (2022)
36054 View0.852Masmoudi O.; Idoudi H.; Mosbah M.Machine Learning-Based Intrusion Detection For Position Falsification Attack In The Internet Of VehiclesIntelligent Systems for IoE Based Smart Cities (2023)
11021 View0.851Alwasel A.; Mishra S.; AlShehri M.Attacks On The Vehicle Ad-Hoc Network From CyberspaceInternational Journal of Advanced Computer Science and Applications, 14, 7 (2023)