Mobile QR Code QR CODE

  1. (Research Scholar, Department of Computer Science and Engineering, SRM Institute of Science and Technology, Kattankulathur, Chengalpattu, Chennai, Tamilnadu, 603203, India lk6685@srmist.edu.in)
  2. ( Associate Professor, Department of Networking and Communications, SRM Institute of Science and Technology, Kattankulathur, Chengalpattu, Chennai, Tamilnadu, 603203, India nareshr@srmist.edu.in)



Tree hierarchical deep convolutional neural network, Improved k-means clustering algorithm, Enhanced identity-based encryption algorithm, Black hole attack

1. Introduction

A vehicular ad hoc network (VANET) is a superior type of mobile ad hoc network (MANET). In a VANET, automobiles as well as roadside units (RSUs) are connected to generate a safe and effective driving atmosphere. A VANET contains three parts: i) on-board units (OBUs), ii) roadside units (RSUs), and iii)a trusted authority (TA). Each vehicle has an OBU that gathers, evaluates, and spreads information to other automobiles in the area [1]. The RSU is connected with the roadside and communicates with vehicles, substructure, and a TA [2].

Due to the decreasing amount of road accidents, a VANET provides an effective traffic information system (TIS) that shares information about accident and traffic to vehicles. The main goal of a VANET is to protect travelers, drivers, and a vehicle by means of TIS [3]. However, a VANET faces several security issues, such as wormhole attacks, black hole attacks (BHAs), and gray hole attacks (GHAs), which disturb usual routine of networks. ABHA is a type of attack that aims to disturb the network communication by fabricating several vehicle characteristics [4]. In a BHA, a malevolent node uses a routing protocol in order to advertise itself for consuming the shortest path to a packet that it wants to interrupt. Thus, to manage these security threats, intrusion detection systems (IDSs) were presented [5].

It is still difficult to formulate an IDS designed for a VANET with high vehicular mobility [6]. For this, detection and prevention of a BHA in a VANET is most important [7]. Hence, several attack detection, attack reaction, and attack prevention methods were suggested, but the existing methods do not provide sufficient attack detection accuracy and have high computational time, which motivated us to do this work [8]. In this manuscript, a method for discovery and prevention of a BHA is proposed using a tree hierarchical deep convolutional neural network and enhanced identity-based encryption (BCMO-THDCNN-BHA-VANET) for accurately detecting BHA in a VANET [9].

Detection using clustering

VANET share wireless networks where vehicles communicate with each other to improve traffic safety and efficiency. One of the important tasks in VANETs is to detect and prevent accidents. Clustering is a technique used in VANETs to group vehicles based on their geographical location, speed, and direction. Clustering also allows vehicles to share information with their neighboring vehicles efficiently.

To use clustering for detecting accidents in VANETs, the following steps can be taken:

1. Cluster formation: Vehicles in the network are grouped into clusters based on their geographical location, speed, and direction. This clustering can be done using different approaches. K-means, hierarchical clustering, and density-based clustering are examples of such approaches.

2. Cluster head (CH) selection: Each cluster has a CH, which is responsible for collecting and disseminating information to other vehicles in the cluster. The selection of a CH can be done using optimization algorithms.

Intrusion detection system (IDS)

A VANET IDS is a security device designed to identify and prevent harmful actions. The IDS in a VANET monitors the network for unusual or suspicious behavior that might signal an attack or intrusion. The IDS can aid in the prevention of numerous sorts of assaults, such as denial of service, black hole, wormhole, and Sybil attacks.

The IDS in a VANET typically consists of two main components: anomaly detection and misbehavior detection. Some common techniques used in IDSs for VANETs include the following. Signature-related identification entails compiling a database of well-known attack patterns or signature and matching them against the network traffic to detect attacks. This approach analyzes network data and identifies deviations from usual behavior. Reputation-based detection involves assigning a reputation score to each vehicle based on its past behavior and using this score to identify malicious or selfish behavior.

The IDS can operate in a centralized or distributed manner. In centralized IDS, a central authority is responsible for monitoring the network and detecting attacks. In distributed IDS, each vehicle is responsible for monitoring its own behavior and detecting attacks. By detecting and preventing attacks, the IDS help to ensure the reliability and effectiveness of vehicular communication and improve the overall safety of the network.

The following is the work that was carried out,

· In this manuscript, detection with prevention of black hole attacks depending on BCMO-THDCNN-BHA-VANETis proposed for accurately detecting a BHA in a VANET.

· The automobiles are initially organized in clusters using an improved k-means clustering technique. The CH is chosen after the cluster formation using the balancing composite motion optimization (BCMO) algorithm.

· The arrival of a malicious node in the cluster occurs after the selection of the CH. THDCNN is proposed to categorize cluster nodes into two types: i) BHA nodes and ii) normal nodes.

· If a BHA node is found, attack node information informs a specific CH to make a final conclusion. Finally, the proposed method prevents the normal node data from the attacker.

· A simulation of the model was done in a network simulator, and the performance metrics were calculated.

· Finally, the proposed approach was analyzed with existing methods, such as generative adversarial networks (GANs) for BHA detection (GAN-BHA-VANET) [10], deep neural networks (DNNs) with a thresholding algorithm (DNN-TA-BHA-VANET) [11], and random forest for BHA detection (RF-BHA-VANET) [12].

The rest of this manuscript is organized as follows. Related works are described in section2, the proposed method is described insection3, the outcomes are demonstrated in section4, and the conclusion is presented in section5.

2. Literature Review

Numerous works were presented previously in the literature related to attack detection in VANET, and a few works are reviewed here. Shu et al. [13] has presented deep learning-based IDS for detecting attacks in a VANET. The suggested method has better performance, but the attack detection result is low.

Alladi et al. [14] have presented anomaly detection in VANETs using deep neural networks (DNNs) with a thresholding algorithm. The suggested method detects anomalous categorizations with 98% accuracy. The main limitation of this method is a high error rate.

Bangui et al. [15] have presented a hybrid machine learning model for intrusion detection in VANETs. The outcomes demonstrate that the suggested method improved the detection accuracy but had higher computational time.

Dhanaraj et al. [16] have suggested a cryptographic method for detecting and mitigating a BHA in VANET environments that was named Secure AODV protocol. The outcome analysis demonstrated that the suggested method is efficient with average accuracy.

Kumar et al. [17] have presented a secure AODV routing algorithm for a BHA in a VANET. The outcomes proved that the suggested method was effective,~but it degrades the network performance. Table 1 shows benchmarks for the proposed BCMO-TCNN-BHA-VANET approaches.

Table 1. Benchmarks for proposed BCMO-TCNN-BHA-VANET approach.

Methods

Performance Analysis

Accuracy (%)

Precision (%)

Specificity (%)

Recall (%)

F-Score (%)

Computational time (ms)

Shu et al. [13],

71.84

69.82

70.91

82.54

69.93

6.8

Alladi et al. [14],

77.38

79.75

77.34

80.82

75.86

5.2

Bangui et al. [15],

86.52

78.48

84.04

80.88

85.75

4.8

Dhanaraj et al. [16],

-

70.06

81.42

78.82

75.58

7.5

Kumar et al. [17],

80.81

-

76.77

81.12

-

6.3

BCMO-TCNN-BHA-VANET (proposed)

99.23

99

99.33

99.51

99.66

2.2

3. Proposed Methodology

Ina VANET, identification with prevention of a BHA is done with the help of TCNN and EIBEA. Fig. 1 shows a block diagram of the proposed method. In this figure, the VANET environment is presented, including cars, RSUs, and internet and cloud servers. AnRSU is a fixed communication point connected to the side of a road for vehicle-to-internet communication. The proposed technique covers four processes: (i) cluster formation using improved k-means clustering, (ii) CH selection uses balancing composite motion optimization (BCMO), (iii) attack detection using the THDCNN method, and (iv) securing the VANET using EIBEA.

Fig. 1. Block diagram of proposed BCMO-THDCNN-BHA-VANET methodology.
../../Resources/ieie/IEIESPC.2024.13.1.41/fig1.png

3.1 Improved k-means Clustering Method (IKMC)

Initially, the cluster formation of vehicles is arranged using the improved k-means clustering method (IKMC). The $K$ value is typically a challenge to describe. The selection of $K$directly defines which data clusters must be grouped into numerous clusters. At the start of the algorithm, the value is expected to provide significant benefits for cluster formation. The main idea behind IKMC is to generate a sequence of values by taking the square of the distance among example points in each cluster and the cluster centroid $K$values.

The sum of squared errors (SSE) is a performance metric, iterationon $K$value and compute SSE. SmallSSE suggestsevery cluster is extra convergent than rest. SSE rapidly decreases when the number of clusters is chosen to approximate the number of genuine clusters. When the count of clusteris more than the count of actual cluster, SSE will continue to fallat a slower rate. The$K$value can be found by using a K-SSE curve andlocating a modulation point. As shown in Fig. 2, there is a clear modulation point at $K$= 2, so the clustering effect is strongest, as shown in Fig. 3.

Selecting$K$ value lesser than actual value, value of costsignificantlycondensed for each 1 growth of k; selected k is higher than true$K$, variation of cost value not so clearat each 1 growth of$K$. Thus, an accurate$K$ value will be at the turning point, as given, there is anactual clear point at $K$= 2

The built distribution's clustering results were compared to find the best number of clusters.

(1)
$ O_{n}\left(K\right)={E}_{n}^{*}\left(\log \left(W_{k}\right)\right)-\log W_{k}{E}_{n}^{*}\left(\log \left(W_{k}\right)\right) $

where${E}_{n}^{*}\left(\log \left(W_{k}\right)\right)$ indicates $\log \left(W_{k}\right)$ expectations. $K$conforming to an extreme value of $O_{n}\left(K\right)$ is a better$K$ satisfied minimal$K$of $O_{n}\left(K\right)\geq O_{n+1}\left(K\right)$ as the optimal number of clusters.

Initially, the vehicles are arranged in a cluster form using IKMC. The vehicles’ mobility should be observed while clusters form in a VANET, and they are categorized by location organized with the speedof vehicles. For the$j^{th}$vehicle with the $l^{th}$ centroid ($1\leq j\leq m,1\leq l\leq L$), the locationor position is denoted as$y_{j}\,\,and\,\,{y}_{l}^{g}$, and the speeds are denoted as $s_{y,j}\,\,and\,{s}_{g}^{l}$. The Euclidean distances between the present node position and upcoming node positions$Dis(j,l)$are expressed in Eq. (2).

(2)
$ Dis\left(j,l\right) =-\left(\left|\left|y_{i}-y_{l}\right|\right|+\left|\left|y_{j}*-y_{l}*\right|\right|\right)\\ $
(3)
$\begin{align} y_{j}&=\left[\begin{array}{c} y_{j}\\ x_{j} \end{array}\right]\left(y_{j}\right)^{*}=\left[\begin{array}{c} y_{j}+s_{y,j}T_{e}\\ x_{j}+s_{x,j}T_{e} \end{array}\right] \end{align} $

In Eq. (2), $y_{j}$represents the present node position, and the forecasted upcoming node position of node $j$is denoted as$(y_{j})*$. The upcoming location of node $j$ is predicted at $T_{e}$seconds. The objective function of the cluster is expressed in Eq. (4).

(4)
$ Fun_{IKMC}={\sum }_{j=1}^{M}\frac{L}{{\sum }_{l=1}^{L}\frac{1}{(Dis_{j,i})^{2}}} $

To derive the centroids’ optimum locations, the partial derivation of $Fun_{IKMC}$ is regarding the centroids’ location, explicitly${y}_{l}^{g}\,,1\leq l\leq L$.This can be formulated with Eq. (5)

(5)
$ \frac{\partial e}{\partial {y}_{l}^{g}}=-L{\sum }_{j=1}^{M}\frac{4\left(y_{j}-{y}_{l}^{g}\right)+\left(s_{y,j}-{s}_{l}^{g}\right)}{Dis_{j,{l^{3}}}\left({\sum }_{l=1}^{L}\frac{1}{Dis_{j,{l^{2}}}}\right)} $

In Eq. (3), let $\frac{\partial e}{\partial {y}_{l}^{g}}$=0. Hence, the $l^{th}$ centroid optimum position ${y}_{l}^{g}\,$can be found with Eq. (6).

(6)
$ {y}_{l}^{g}=\frac{{\sum }_{j=1}^{M}\frac{y_{i}+s_{y,j}}{Dis_{j,{l^{3}}}\left({\sum }_{l=1}^{L}\frac{1}{Dis_{j,{l^{2}}}}\right)^{2}}}{{\sum }_{j=1}^{M}\frac{1}{Dis_{j,{l^{3}}}\left({\sum }_{l=1}^{L}\frac{1}{Dis_{j,{l^{2}}}}\right)^{2}}} $

Using IKMC, vehicles are precisely arranged in a cluster form based on Eq. (6). Every cluster contains a CH, which is chosen with the help of the BCMO algorithm.

Fig. 2. Optimal $K$ selection using IKMC algorithmand choosing the value of K.
../../Resources/ieie/IEIESPC.2024.13.1.41/fig2.png
Fig. 3. Clustering effect when $K$=2.
../../Resources/ieie/IEIESPC.2024.13.1.41/fig3.png

3.2 CH Selection using BCMO

Following the cluster formation, the CH is selected. BCMO is a method for optimizing the CH selection process. In this paper, each node is approximated as a graph vertex, and the distance between cars is the road vehicle’s setup and is taken, which is denoted as boundaries. The distance between the two vehicles is evaluated with the help of Eq. (7).

(7)
$ distance=\sqrt{\left(a"_{2}-a"_{1}\right)^{2}+\left(b"_{2}-b"_{1}\right)^{2}} $

In Eq. (5), $a"and\,b"$ are coordinates of the vehicles, and$distance$ indicates the vehicles’ distance. Every vehicle chooses a CH to form a cluster group and computes the shortest paths between the vehiclesby using the BCMO algorithm.Hence, the parameter of distance is optimized with the BCMO approach.

The BCMO algorithm is a population-based optimization approach that was inspired by the assumption that the solution space is Cartesian and that searchmotions of candidate solutions arestabilized by global and local ones. Then, it optimally calculates the shortest path between the nodes (vehicles) for efficient CH selection. The procedure of BCMO is given below.

Step 1: Initialization

The BCMO population is initialized uniformly in the solution space based on Eq. (8):

(8)
$ x_{i}=\left({x}_{i}^{L}+rand\left(1,d\right)\times \left({x}_{i}^{U}-{x}_{i}^{L}\right)\right) $

where${x}_{i}^{L}\,and\,\,{x}_{i}^{U}$represent the upper and lower boundaries of $i^{th}$ individuals, and $rand$denotes a $d$dimensional vector with a uniform distribution in a range of [0,1].

Step 2: Random generation

Following the initialization process, BCMO input parameters aremaderandomly. The shortest distance is selected based on the fitness function.

Step 3: Computingthe fitness function

A random solution countis made from the startingvalue, and the fitness function is proportional to the distance between nodes. Eq. (9) computes the fitness function.

(9)
$ Fitness=\min \{\mathit{dis}\tan ce\} $

The smallest distance for optimum CH selection is found using Eq. (9).

Step 4: Updating position in solution space of BCMO to find the shortest path

To balance the capacity of every personalityin the search space to explore and exploitthem, the chance of allocating positive and negative indicators $v'_{\frac{i}{j}}+v'_{j}$ in local and global search mustbethe same.The updated location of the $i^{th}$individual at next groups formed in Eq. 10).

(10)
$ X{"}_{i}^{t'+1}=X{"}_{i}^{t'}+v'_{\frac{i}{j}}+v'_{j} $

here$X{"}_{i}^{t'}$represents the input search, and the updated location will optimize according to Eq. (10) distance parameter of the vehicles. Thus, the optimal CH will be obtained.

Step 5: Termination

We stop the procedure after finding the best answer or continue using Eqs. (8) to (10) until the requirements are fulfilled. The result of the BCMO algorithm yields the optimum CH, which is repeated until the halting requirement $t=t+1$is met.

3.3 BHA Detection with THDCNN Method

The arrival of amaliciousnode in cluster occurs after selectingthe CH. THDCNN is proposed to categorize cluster nodes as either BHAnodes. Using THDCNN, each CH node examines its neighboring node for maliciousness. The tested BHAnode and normal node will be categorizedby using the training and testing dataset of THDCNN.

THDCNNcan be used for IDSs in VANETs, which involves detecting attacks and malicious activities in the network. The structure of THDCNN for attack detection in a VANET is similar to the architecture used for vehicular detection and classification.

The THDCNN for attack detection in a VANET typically includes the following components. The completely linked layers are utilizedto achieve the final traffic data categorization. The output layer produces the final classification result, indicating whether the traffic is normal or an attack.

The THDCNN for attack detection in a VANET is trained using a supervised learning approach, where the ground truth labels for each input traffic data are provided. By detecting and preventing attacks in realtime, the THDCNN can help to ensure the reliability and safety of the network. Fig. 4 shows the architecture of THDCNN.

The THDCNN model is inspired by hierarchical classifiers. The THDCNN model is made up of several nodes that are linked in a tree-like fashion. In addition, except for the leaf nodes, each node in the design comprise a deep convolution neural network that has been trainedto categorize input examples to node to children nodesof the tree. Prediction is carried out at the root node in this model since it is the greatest node in the tree. Thus, the branch neural network's output node is derived from leaf nodes, which are the outcome of a second phase branch.

Initially, the THDCNN model is trained using datasets of $D=\left\{1,2,3.......,n\right\}$ with n data points. The proposed method includes a neural network with numerous layersand acts as a root node and multipleleaf nodes.Also, task defined to method to predict LU/LC changes with $M$classes. The output node of THDCNN offers a three-dimension matrix$D^{K\times M\times N}$, where $K$signifies the overall count of root node children, $M$denotes the amount of novel samples, which is revealed$N$ for every class.

$D(k,m,n)$is the classified outcome of the $k^{th}$neuron for$n^{th}$ data in the$m^{th}$class. Here, the value of $k^{th}$neuron belongs to [1,K], the $m^{th}$class belongs to [1,M],and the $n^{th}$ data belongs to [1,N]. Thus, the average classified outcome of $N$data is denoted as${D}_{avg}^{K\times M}$and is computed using Eq. (11).

(11)
$$ D_{\text {avg }}(k, m)=\sum_{n=1}^N(D(k, m, n) / N $$

Also, the probability from the softmax function is computed on${D}_{avg}^{K\times M}$, and the probability matrix$R^{K\times M}$ is calculated with Eq. (12)

(12)
$ R\left(k,m\right)=\left[\frac{e^{{D_{avg}}(k,m)}}{{\sum }_{k=1}^{K}e^{{D_{avg}}(k,m)}}\right] $

where$e^{{D_{avg}}(k,m)}$denotes the model's arithmetical information, which is employedto improve the model's accuracy.

The ordered list $(L)$ of cluster nodes is made from$R^{K\times M}$, which has a property. Here, the ordered list$(L)$ has examples of data$\left[N_{1},N_{2},N_{3}\right]$, where every dataset contains $m$loads. Also, the output valuesof a cluster node are organized in descending order$\left[N_{1}\geq N_{2}\geq N_{3}\right]$. As a result, an arrangement is made to validate that the malicious nodes have a large probability value, which is suppliedto the THDCNN model's leaf node. Finally, the THDCNN model correctly identifies the cluster node as a BHA node or a regular node. If a BHA node is discovered, the information about theattack node is forwarded to the appropriate CH for a final decision. Otherwise, normal node data is encrypted and stored in the cloud.

Fig. 4. Architecture of tree hierarchical deep convolutional neural network.
../../Resources/ieie/IEIESPC.2024.13.1.41/fig4.png

3.4 Security of VANET using Enhanced Identity-based EncryptionAlgorithm(EIBEA)

EIBEA is used to encrypt regular node data. A faster version of role-based categorization is enhanced identity-based encryption.Users are allowedto access the information in this method by means of their identity as a way of confirmation. This method was firstly applied in a proxy serverto cancelillegal operators. The authorized users’ identities are stored in proxy servers and are revoked ifthere is no identical key for that specific identity whenitattemptsto use the server's service. As a result,in order to utilize the service, each user must first register their identification. This consists of four phases.

Setup phase: Initially,a public key and master key arecreated. A secret parameter is selected from finite group$\zeta _{p}$. A random generator $gen$is selected from cyclic group $G"$ , and then $gen\in G"$ , fix $gen_{1}=g^{\alpha }$, and choose $gen_{2}$in $G"$. After selecting all security parameters, a random number $u_{1}$($u_{1}\in G_{1}$) and a random $m$-length vector are chosen ($U_{1}=\left\{u_{1}\right\}$). Lastly, $gen,gen_{1},gen_{2},u_{1}\,and\,U_{1}$are referred to as public keys, and is a master key

Private key generation phase: Let $s$denote the $m$-bit identity of a user. The $j^{th}$ bit of$s$is $s_{j}$. Identity $s$ is formed by selectinga random measure, and $r$represents a random number. A private key with personality is shown in Eq. (13).

(13)
$ d"_{s}=\left(ge{n^{\alpha }}_{2}\left(u_{1}\prod _{j\in s}s_{j}\right)^{r},gen^{r}\right) $

Encryption phase: Let $"t"$be a random parameter selected in $\zeta _{p}$ and message$Mssg(Mssg\in G_{1})$ . Then, the encryption key corresponding to the identity $s$can be expressed in Eq. (14).

(14)
$ T=\left(e\left(gen_{1},gen_{2}\right)Mssg,gen^{t},\left(u_{1}\prod _{j\in s}s_{j}\right)^{t}\right) $

where$e$represents a bilinear map.

Decryption phase: Let $T=(T_{1},T_{2},T_{3})$ be the legal cipher text for message $Mes$ with the operator identity$s$. Then, cipher text $T$can be decrypted by means of $d"_{s}=(d"_{1},d"_{2})$as formulated in Eq. (15).

(15)
$ \begin{array}{l} Decryption=\\ \left(e\left(gen_{1},gen_{2}\right)^{t}Mssg\right)\frac{e(gen,(u_{1}\prod _{j=s}s_{j})^{rt}}{e(gen_{1},gen_{2})^{t}e(gen,(u_{1}\prod _{j=s}s_{j})^{rt})}\\ =Mssg \end{array} $

Finally, the EIBEA method prevents the normal node data from an attacker.

4. Results and Discussion

The efficiency of the proposed BCMO-THDCNN-BHA-VANET methodology was analyzed on the basis of performance metrics. A simulation was completed with the NS-2 simulator, which predicts network performance. It wasrun on a PC with the Windows 10 operating system, 2GB of RAM, and an Intel i3 core CPU. Performance metrics such as recall, accuracy, F-measure, and specificity were examined.

4.1 Dataset Description

The experiments were doneon a dataset that is publicly available. 50% of the datasetwas used for training, and 50% was used for testing.

4.2 Performance Metrics

For identifying and categorizinga BHAnode and normal node, performance measures such as precision, accuracy, specificity, recall, and F-scorewere examined.

· True positive ($A'A'$): The number of VANET network connections correctly identified as BHAs.

· True negative ($N'N'$): The number of VANET network connections correctly identified as normal connections.

· False positive ($A'N'$): The number of VANET network connections incorrectly identified as BHAs.

· False negative ($N'A'$): The number of VANET network connections incorrectly identified as normal connections.

(16)
$ \begin{array}{l} Accuracy=\frac{A'A'+N'N'}{A'A'+N'N'+A'N'+N'A'}\\ Precision=\frac{A'A'}{A'A'+A'N'}\\ F_{score}=2\times \frac{recall\times precision}{recall+precision}\\ Recallvalue=\frac{A'A'}{A'A'+N'A'}\\ Specificity=\frac{N'A'}{A'A'+N'N'} \end{array} $

Artificial datasets

To assess the efficacy of the proposed technique, certain fictitious datasets were constructed and clustered using IKMC. Each dataset was considered to include three clusters (A, B, and C) and varying vehicles within each cluster. The x-coordinates and y-coordinates in cluster A were created individually from normal distributions using mean ${\mu }_{x}^{A}$and standard deviation$\sigma ^{A}$, which were specified as$N\left({\mu }_{x}^{A},\sigma ^{A}\right)$and $N\left({\mu }_{y}^{A},\sigma ^{A}\right)$, respectively. Likewise, x- and y-coordinates in cluster B were created from $N\left({\mu }_{x}^{B},\sigma ^{B}\right)$ and$N\left({\mu }_{y}^{B},\sigma ^{B}\right)$. However, a vehicle in cluster C was madesomewhat differently. A proportion of vehicles in cluster C were assumed to have a large standard deviation${\sigma }_{L}^{C}$, say, the standard deviation of rest ($\sigma ^{C}$), while the means of x- and y-coordinates of every vehicle in cluster Care similar(${\mu }_{x}^{C}$ and ${\mu }_{y}^{C}$). After 10% of vehicles are stated, the x- and y-coordinates of vehicles in cluster C are made from $N\left({\mu }_{x}^{C},{\sigma }_{L}^{C}\right)$ and$N\left({\mu }_{y}^{C},{\sigma }_{L}^{C}\right)$, respectively, and the 2 coordinates of rest vehicles are in cluster C are created from $N\left({\mu }_{x}^{C},\sigma ^{C}\right)$. The selected parameters are given in Table 2.

To compare the performance of the IKMC method with WKM, MKHM, and KNN, the adjusted Rand index was used. The adjusted Rand index was suggested by Hubert and Arabie and is commonly utilized to compare cluster outcomes if an exterior principle or true division is known. If $U$and $V$denote2 various partitions of vehicles under deliberation,$U$is a true divider, and $V$is a cluster outcome, the adjusted Rand index for clustering outcome $V$is computed using Eq. (17) as follows:

(17)
$ RI_{adj}=\frac{2\left(ad-bc\right)}{\left(a+b\right)\left(b+d\right)\left(a+c\right)\left(c+d\right)} $

where$a$is the count of pairs of vehicles locatedin a similar class in $U$and in a similar cluster in $V$, $b$is the count of pairs in an identical class in $U$but not in an equal cluster in $V$, $c$is the count of pairs in a similar cluster in $V$but not in a similar class in $U$, and $d$is the count of pairs in a dissimilar class in $U$and various clusters in $V$.

Table 2. Parameters used when generating a vehicle.

Cluster A

Cluster B

Cluster C

Mean

${\mu }_{x}^{A}$=0, ${\mu }_{y}^{A}$=0

${\mu }_{x}^{B}$=6, ${\mu }_{y}^{B}$=-1

${\mu }_{x}^{C}$=6, ${\mu }_{y}^{C}$=2

Standard deviations

$\sigma ^{A}$=1.5

$\sigma ^{B}$=0.5

$\sigma ^{C}$=0.5, ${\sigma }_{L}^{C}$=2

Table 3. Adjusted Rand indices ofvarious clustering methods.

% Vehicles

WKM

MKHM

KNN

IKMC (proposed)

0

0.7903

0.7679

0.8231

0.9629

5

0.8376

0.7534

0.8198

0.9335

15

0.7957

0.7288

0.6782

0.9189

25

0.7708

0.7053

0.8123

0.9904

35

0.7595

0.7782

0.6673

0.9609

Table 3 compares the derived adjusted Rand index of each approach with a varied fraction of noisy items included. Table 3 clearly shows that the suggested IKMC approach outperforms the WKM, MKHM, and KNN clustering methods.

Performance of the proposed method according to initial K selection

The proposed IKMC technique includes one method for determining the initial K in Step 1. Obviously, the performance will differ depending on how the initial K is chosen. Other options may include the following:

Method 1 (WKM): Choose k vehicles at random from all available vehicles.

Method 2 (MKHM): Sort all cars in the order of the variable's values,divide the values into k equal intervals, and choose one car at random from each interval.

Method 3 (KNN): Take 10% of all cars at random as a sample and use the algorithm to do preliminary clusteringon these sampled vehicles. The k clustering results are utilized as the initial clustering.

To compare the various approaches for determining starting K, a datasetwas created in the same manner as before with 10% of cars in class C. Table 4 shows the findings for various total item counts and ways of picking the starting K. It may be interesting to note that methods 2 (MKHM) and 3 (KNN) appear to be worse than method 1 (WKM). Approach 3 was predicted to outperform the suggested IKMC approach, and this is true when the number of vehicles is relatively big. It is possible to infer that the suggested IKMC method's first K selection performs quite well as compared with the WKM, MKHM, and KNN clustering techniques.

Table 4. Adjusted Rand indices withdifferent initial K selection.

# vehicles

Method 1 (WKM)

Method 2 (MKHM)

Method 3 (KNN)

IKMC (proposed)

300

0.8456

0.68002

0.71532

0.93927

600

0.82134

0.6562

0.78439

0.92889

900

0.81601

0.65237

0.70749

0.92832

1200

0.84926

0.63543

0.76650

0.93135

1500

0.81001

0.63680

0.75256

0.92939

1800

0.83955

0.63531

0.77791

0.93771

2100

0.79899

0.59487

0.72579

0.92736

2400

0.82880

0.67166

0.74584

0.93755

2700

0.78849

0.65068

0.73119

0.93284

3000

0.80911

0.65120

0.71507

0.92201

4.3 Performance Analysis

Figs. 5-10 show the performance analysis of the proposed BCMO-THDCNN-BHA-VANET technique. Performance metrics like the accuracy, specificity, recall, precision, F-score, and computation time were examined. The performance of the proposed approach was analyzed with GAN-BHA-VANET, DNN-TA-BHA-VANET, and RF-BHA-VANET models.

Fig. 5 demonstrates the accuracy analysis. Here, the proposedapproach provides 23.05%, 32.05%, and 32.10% higher accuracy for a normal node and 29.68%, 32.57%, and 44.28% higher accuracy; Fig. 6 demonstrates the specificity analysis. Here, the proposed approach provides 32.05%, 40.28%,and 41.28% higher specificity for a normal node and29.65%, 30.24%, and 35.24% higher specificity; Fig. 7 demonstrates the recall analysis. The BCMO-THDCNN-BHA-VANET method provides 30.27%, 37.59%, and22.05% higher recallfor a normal node and32.05%, 21.05%, and 23.05% higher recall; Fig. 8 demonstrates the precision analysis. Here, the proposed approach provides 41.27%, 28.57%, and 34.20% higher precision for a normal node and23.58%, 27.38%, and 25.48% higher precision for aBHA node compared to GAN-BHA-VANET, DNN-TA-BHA-VANET, and RF-BHA-VANET, respectively.

Fig. 9 demonstrates theF-score analysis. BCMO-THDCNN-BHA-VANET method provides 29.65%, 32.07%, and36.52% higher F-score for a normal node and30.24%, 22.15%, and 23.05% higher F-score; Fig. 10 demonstrates the computation time analysis. The BCMO-THDCNN-BHA-VANET method provides 29.65%, 32.07%, and36.52% lower computation time compared to GAN-BHA-VANET, DNN-TA-BHA-VANET, and RF-BHA-VANET, respectively.

Fig. 5 presents values for accuracy parameters for a BHA node as well as a normal node. The maximum accuracy was around 99.66%.

It was observed that in the detection of aBHA node, the proposed BCMO-TCNN-BHA-VANET approach’s performance continues to be substantially more accurate than other techniques.

When a node normally communicates, its communication troubled by attack node through referringwrong appeal or via asks for the route by attacker node is precise route or short way, andprecision is corrupted. The performance is better after finding a BHA node. Specificity represents the ability of a detection mechanism to correctly identify nodes that are not participating in the attack as being legitimate nodes.

Fig. 5. Analysis of accuracy.
../../Resources/ieie/IEIESPC.2024.13.1.41/fig5.png
Fig. 6. Comparison of specificity analysis.
../../Resources/ieie/IEIESPC.2024.13.1.41/fig6.png
Fig. 7. Comparison of recall analysis.
../../Resources/ieie/IEIESPC.2024.13.1.41/fig7.png
Fig. 8. Comparison of precision analysis.
../../Resources/ieie/IEIESPC.2024.13.1.41/fig8.png
Fig. 9. Comparison of F-score analysis.
../../Resources/ieie/IEIESPC.2024.13.1.41/fig9.png
Fig. 10. Comparison ofcomputation time analysis.
../../Resources/ieie/IEIESPC.2024.13.1.41/fig10.png

5. Conclusion

In this manuscript, detection and prevention of BHAwith THDCNNand enhanced identity-based encryption in a VANET were successfully implemented. Security and efficacyof the proposed scheme were explained by simulation results and various security analyses. Thus, the proposed BCMO-THDCNN-BHA-VANET approach achieved a 23.7%, 25.7%, and 25.8% higher F-score and 29.8%, 28.45%, and 14.75% higher precision than the GAN-BHA-VANET, DNN-TA-BHA-VANET, and RF-BHA-VANET methods, respectively.

REFERENCES

1 
S. Kudva, S. Badsha, S. Sengupta, H. La, I. Khalil, M. Atiquzzaman, ``A scalable blockchain based trust management in VANET routing protocol'', Journal Of Parallel And Distributed Computing. vol. 152, pp. 144-156, Jun. 2021.DOI
2 
F.H. Shajin, B. Aruna Devi, N.B. Prakash, G.R. Sreekanth, P. Rajesh, Sailfish optimizer with Levy flight, chaotic and opposition-based multi-level thresholding for medical image segmentation. Soft Computing. pp. 1-26, Apr. 2023.DOI
3 
P. Remya krishnan, P. Arun Raj Kumar, ``Detection and Mitigation of Smart Blackhole and Gray Hole Attacks in VANET Using Dynamic Time Warping'', Wireless Personal Communications. vol. 124, pp. 931-966, May. 2021.DOI
4 
F.H. Shajin, P. Rajesh, M.R. Raja. An efficient VLSI architecture for fast motion estimation exploiting zero motion prejudgment technique and a new quadrant-based search algorithm in HEVC. Circuits, Systems, and Signal Processing. pp. 1-24, Mar. 2022.DOI
5 
G. Soni, K. Chandravanshi, ``A Novel Privacy-Preserving and Denser Traffic Management System in 6G-VANET Routing Against Black Hole Attack'', Sustainable Communication Networks And Application. pp. 649-663, Jan. 2022.DOI
6 
P. Rajesh, F. Shajin. A multi-objective hybrid algorithm for planning electrical distribution system. European Journal of Electrical Engineering. vol. 22, no. 4-5, pp. 224-509, Dec.2020.DOI
7 
P. Rajesh, R. Kannan, J. Vishnupriyan, B. Rajani. Optimally detecting and classifying the transmission line fault in power system using hybrid technique. ISA transactions. vol. 130, pp. 253-64, Nov. 2022.DOI
8 
G. Soni, K. Chandravanshi, M. Jhariya, A. Rajput, ``An IPS Approach to Secure V-RSU Communication from Blackhole and Wormhole Attacks in VANET'', Lecture Notes In Networks And Systems. pp. 57-65, Dec. 2021.DOI
9 
P. Shah, T. Kasbe, ``Detecting Sybil Attack, Black Hole Attack and DoS Attack in VANET Using RSA Algorithm'', 2021 Emerging Trends In Industry 4.0 (ETI 4.0), May. 2021.DOI
10 
A. Kumar, N. Sharma, A. Kumar, ``Improving security and privacy in VANET network using node authentication'', Journal Of Discrete Mathematical Sciences And Cryptography. vol. 24, pp. 2471-2480, Nov. 2021.DOI
11 
S. Ercan, M. Ayaida, N. Messai, ``Misbehavior Detection for Position Falsification Attacks in VANETs Using Machine Learning'', IEEE Access. vol. 10, pp. 1893-1904, Dec. 2022.DOI
12 
S. Sharma, A. Kaul, S. Ahmed, S. Sharma, ``A detailed tutorial survey on VANETs: Emerging architectures, applications, security issues, and solutions'', International Journal Of Communication Systems. vol. 34, Sep. 2021.DOI
13 
J. Shu, L. Zhou, W. Zhang, X. Du, M. Guizani, ``Collaborative Intrusion Detection for VANETs: A Deep Learning-Based Distributed SDN Approach'', IEEE Transactions On Intelligent Transportation Systems. vol. 22, pp. 4519-4530, Oct. 2021.DOI
14 
T. Alladi, B. Gera, A. Agrawal, V. Chamola, F. Yu, ``DeepADV: A Deep Neural Network Framework for Anomaly Detection in VANETs'', IEEE Transactions On Vehicular Technology. vol. 70, pp. 12013-12023, Sep. 2021.DOI
15 
H. Bangui, M. Ge, B. Buhnova, ``A hybrid machine learning model for intrusion detection in VANET'', Computing. vol. 104, pp. 503-531, Mar. 2021.DOI
16 
R. Dhanaraj, S. Islam, V. Rajasekar, ``A cryptographic paradigm to detect and mitigate blackhole attack in VANET environments'', Wireless Networks, Oct. 2022.DOI
17 
A. Kumar, V. Varadarajan, A. Kumar, P. Dadheech, S.S. Choudhary, V.A. Kumar, B. K. Panigrahi, K.C. Veluvolu, ``Black hole attack detection in vehicular ad-hoc network using secure AODV routing algorithm'', Microprocessors And Microsystems. vol. 80, pp. 103352, Feb. 2021.DOI
K. Lakshmi Narayanan
../../Resources/ieie/IEIESPC.2024.13.1.41/au1.png

K. Lakshmi Narayanan Completed his Master of Engineering in the field of Computer Science and Engineering in Annamalai University Chidam-baram in the year 2012. He completed his Bachelor of Engineering under Annamalai University Chidambaram in the year 2009. He Worked as a Assistant Professor at Mailam Engineering College, Mailam, India from 2012 to 2018. He also worked as a Senior Customer support Executive at HCL Technologies, Chennai from 2018 to 2020. He is presently a Research Scholar in the Department of Computer Science and Engineering, SRM Institute of Science and Technology, Chennai, India. His main thrust research areas are Network Security and Cloud Security.

R. Naresh
../../Resources/ieie/IEIESPC.2024.13.1.41/au2.png

R. Naresh completed his Ph.D in Computer Science and Engineering in Anna University Chennai in the year 2017.He Completed Master of Engineering in the field of Computer Science and Engineering in Anna University Chennai in the year 2011. He completed his Bachelor of Engineering under Anna University Chennai in the year 2007. He was working as a Assistant Professor at Anna University Chennai (University College of Engineering, Tindivanam), Chennai, India from 2011 to 2018. He is presently working as an Associate Professor at Department of Networking and Communications, SRM Institute of Science and Technology, Chennai, India. His main thrust research areas are Group Key management in Network Security and Cloud Security.