2020
DOI: 10.1007/s11276-020-02413-0
|View full text |Cite
|
Sign up to set email alerts
|

Optimal solution for malicious node detection and prevention using hybrid chaotic particle dragonfly swarm algorithm in VANETs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(7 citation statements)
references
References 50 publications
0
7
0
Order By: Relevance
“…Prabakeran et al states Chaos theory is applied to tune the parameters of proposed HCPDS algorithm. It is also proved that the HCPDS based proposed approach can efficiently meet the requirements of security and privacy in VANETs [17]. Prabakeran et al explains their proposed frameworks of Fuzzy with BW-SMO effectively to solve optimizing selection and join queries with low cost, latency, and securing data.The fuzzy can be used to cluster the query solution.…”
Section: Literature Surveymentioning
confidence: 96%
“…Prabakeran et al states Chaos theory is applied to tune the parameters of proposed HCPDS algorithm. It is also proved that the HCPDS based proposed approach can efficiently meet the requirements of security and privacy in VANETs [17]. Prabakeran et al explains their proposed frameworks of Fuzzy with BW-SMO effectively to solve optimizing selection and join queries with low cost, latency, and securing data.The fuzzy can be used to cluster the query solution.…”
Section: Literature Surveymentioning
confidence: 96%
“…Aguilar-Mejía [111] used the DA to model and adjust the speed of a permanent-magnet synchronous motor with cracks. Prabakeran [117] added a PSO update strategy for the DA, to improve the search space. In addition, a hybrid chaotic particle dragonfly swarm algorithm was used in VANETs to detect deceptive and misbehaving nodes.…”
Section: Research Progress Regarding Theory and Application Of Dragon...mentioning
confidence: 99%
“…We chose [ 38 ] and [ 39 ] as baseline methods for comparison. is the security mechanism proposed in this paper.…”
Section: Simulation-based Experiments and Performance Analysismentioning
confidence: 99%
“…where N f denotes the total number of true messages that are identified as false messages by the method, N i denotes the total number of true messages, N miss denotes the total number of false messages that are identified as true messages by the method, and N denotes the total number of false messages. We chose HCPDS [38] and GBPM [39] as baseline methods for comparison. BCSM is the security mechanism proposed in this paper.…”
Section: Evaluate the Detection Of Forged Messagesmentioning
confidence: 99%