2018
DOI: 10.1177/1550147718806193
|View full text |Cite
|
Sign up to set email alerts
|

Improving security and stability of ad hoc on-demand distance vector with fuzzy neural network in vehicular ad hoc network

Abstract: Stability and security are the key directions of VANET (vehicular ad hoc network) research. In order to solve the related problems in VANET, an improved AODV (ad hoc on-demand distance vector) routing protocol based on fuzzy neural network, namely, GSS-AODV (AODV with genetic simulated annealing, security and stability), is proposed. The improved scheme of the protocol analyzes the data in the movement process of the mobile node in VANET, extracts the parameters that affect the link stability, and uses the fuz… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 13 publications
(18 reference statements)
0
5
0
Order By: Relevance
“…The fuzzy trust model relies on a series of fuzzy rules to deal with the uncertainty in trust evaluation. Then, fuzzy theory can be used to evaluate the trust value and select the trusted route [31][32][33]. (d) Directed and undirected graph model.…”
Section: Intrusion Detection Intrusion Detection Is Used To Detect Amentioning
confidence: 99%
“…The fuzzy trust model relies on a series of fuzzy rules to deal with the uncertainty in trust evaluation. Then, fuzzy theory can be used to evaluate the trust value and select the trusted route [31][32][33]. (d) Directed and undirected graph model.…”
Section: Intrusion Detection Intrusion Detection Is Used To Detect Amentioning
confidence: 99%
“…In this topic, we can break the ML application in VANETs further into MAC layer [29] and Network Layer [30][31][32][33][34][35][36].…”
Section: A ML For Qos Guaranteementioning
confidence: 99%
“…The mechanism of update Q-Table reward node balance the next-hop selection between direction connection with BS or neighboring gateway with large number of devices. [36] propose an improved AODV routing protocol based on fuzzy neural network. This neural network is used to calculate the node stability.…”
Section: A ML For Qos Guaranteementioning
confidence: 99%
“…So far, it has become the mainstream to use entropy correlation fuzzy evaluation system to fuzzy the subjective evaluation results of experts, and then use machine learning model to classify the fuzzy features to obtain the network security evaluation results. The existing entropy‐related fuzzy evaluation system uses the subjective evaluation scores of experts to calculate the safety membership matrix, and then constructs the corresponding fuzzy evaluation weight matrix by the way of membership, and then puts the weight matrix into the machine learning model for regression, and predicts the network safety results of the current system 10 . In fact, the subjective bias of experts will accumulate continuously in a period of time, which will eventually have a great impact on the accuracy and robustness of network security situation prediction results.…”
Section: Introductionmentioning
confidence: 99%
“…The existing entropy-related fuzzy evaluation system uses the subjective evaluation scores of experts to calculate the safety membership matrix, and then constructs the corresponding fuzzy evaluation weight matrix by the way of membership, and then puts the weight matrix into the machine learning model for regression, and predicts the network safety results of the current system. 10 In fact, the subjective bias of experts will accumulate continuously in a period of time, which will eventually have a great impact on the accuracy and robustness of network security situation prediction results. In order to solve the problem that the existing machine learning model cannot deal with the relationship between the data before and after the time sequence, resulting in the accumulation of subjective deviation which has a greater impact on the evaluation of network security, this paper proposes a network security state prediction algorithm combining D-S evidence theory and cyclic neural network.…”
Section: Introductionmentioning
confidence: 99%