2022
DOI: 10.3390/s22155811
|View full text |Cite
|
Sign up to set email alerts
|

A Hybrid Price Auction-Based Secure Routing Protocol Using Advanced Speed and Cosine Similarity-Based Clustering against Sinkhole Attack in VANETs

Abstract: In ad-hoc vehicle networks (VANETs), the random mobility causes the rapid network topology change, which leads to the challenge of the reliable data transmission. In this paper, we propose a hybrid-price auction-based secure routing (HPA-SR) protocol using advanced speed and cosine similarity-based (ASCS) clustering to establish a secure route to avoid sinkhole attacks and improve connectivity between nodes. The main features and contributions of the proposed HPA-SR protocol are as follows. First, the HPA-SR p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 11 publications
(15 citation statements)
references
References 46 publications
0
7
0
Order By: Relevance
“…The performance metrics used in this paper for performance evaluation purposes are the following [29]:…”
Section: Performance Metricsmentioning
confidence: 99%
See 2 more Smart Citations
“…The performance metrics used in this paper for performance evaluation purposes are the following [29]:…”
Section: Performance Metricsmentioning
confidence: 99%
“…The node degree of its nodes can be written as where can be defined as stands for the node degree of the node , stands for the communication range of the node i , and stands for distance between node i and j . Then, the average node degree can be expressed as The self-adaptive node degree variance is calculated by subtracting the node measure from its average measure, which can be expressed as: The second factor is cosine similarity between two nodes which can be defined as [ 29 , 37 ] where and are the i -th and j -th nodes’ vector information, respectively. Each node is related with a mobility vector information metric value (i.e., speed, direction, and position) , ,⋯, , where constitutes the vector values which indicate link information between nodes.…”
Section: The Proposed Secure Multicast Routing Protocol: Dlsmrmentioning
confidence: 99%
See 1 more Smart Citation
“…The similarity metrics facilitate obtaining temporal information. Pramitarini et al used a cosine similarity-based algorithm for network protocols [24]. In [25], authors designed a clustering algorithm for IoT applications based on a similarity measure.…”
Section: Related Workmentioning
confidence: 99%
“…Traditional VANETs employ a conventional network architecture where each node serves as a router, combining forwarding and routing functions into a single unit [ 15 , 16 , 17 , 18 , 19 ]. Nevertheless, this conventional approach has notable drawbacks, such as its inability to accommodate heterogeneity, scalability issues, limited programmability, and other concerns [ 20 ].…”
Section: Introductionmentioning
confidence: 99%