TY - GEN
T1 - A Secured and Optimized Clustering Approch in Vehicular Ad-hoc Network
AU - Khan, Imran
AU - Khan, Fazlullah
AU - Ali, Asad
AU - Alshawi, Bandar
AU - Alturki, Ryan
AU - Wedyan, Mohammad
N1 - Publisher Copyright:
© 2024 IEEE.
PY - 2024
Y1 - 2024
N2 - Vehicular ad hoc networks (VANETs) take vital role in intelligent transportation systems, but they face challenges due to dynamic network topology, impacting communication efficiency, especially with increasing active nodes. Security and privacy concerns are paramount, necessitating authentication to ensure only legitimate vehicles access the network. Secure vehicular clustering offers a solution, yet the number of clusters affects network dependability and efficiency. To tackle this, we present a secure clustering mechanism using Bat optimization algorithm, mimicking echolocation behavior to optimize clusters. We introduce an authentication technique for cluster heads to admit approved members, enhancing vehicular authentication. Simulations using MATLAB evaluate our approach, showing improved performance in end-to-end delay, overhead, and cluster head count compared to similar methods.
AB - Vehicular ad hoc networks (VANETs) take vital role in intelligent transportation systems, but they face challenges due to dynamic network topology, impacting communication efficiency, especially with increasing active nodes. Security and privacy concerns are paramount, necessitating authentication to ensure only legitimate vehicles access the network. Secure vehicular clustering offers a solution, yet the number of clusters affects network dependability and efficiency. To tackle this, we present a secure clustering mechanism using Bat optimization algorithm, mimicking echolocation behavior to optimize clusters. We introduce an authentication technique for cluster heads to admit approved members, enhancing vehicular authentication. Simulations using MATLAB evaluate our approach, showing improved performance in end-to-end delay, overhead, and cluster head count compared to similar methods.
KW - Abnormal Behavior
KW - Optimization
KW - Security Authentication
KW - VANET
UR - http://www.scopus.com/inward/record.url?scp=85207378054&partnerID=8YFLogxK
U2 - 10.1109/ICECET61485.2024.10698508
DO - 10.1109/ICECET61485.2024.10698508
M3 - Conference contribution
AN - SCOPUS:85207378054
T3 - International Conference on Electrical, Computer, and Energy Technologies, ICECET 2024
BT - International Conference on Electrical, Computer, and Energy Technologies, ICECET 2024
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 4th IEEE International Conference on Electrical, Computer, and Energy Technologies, ICECET 2024
Y2 - 25 July 2024 through 27 July 2024
ER -