2022
DOI: 10.3390/math10214030
|View full text |Cite
|
Sign up to set email alerts
|

An Improved Machine Learning Model with Hybrid Technique in VANET for Robust Communication

Abstract: The vehicular ad hoc network, VANET, is one of the most popular and promising technologies in intelligent transportation today. However, VANET is susceptible to several vulnerabilities that result in an intrusion. This intrusion must be solved before VANET technology can be adopted. In this study, we suggest a unique machine learning technique to improve VANET’s effectiveness. The proposed method incorporates two phases. Phase I detects the DDoS attack using a novel machine learning technique called SVM-HHO, w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
2

Relationship

1
7

Authors

Journals

citations
Cited by 26 publications
(11 citation statements)
references
References 33 publications
0
11
0
Order By: Relevance
“…A prior understanding of unusual behavior is not required for the proposed method. In addition, Simmross-Wattenberg et al in [16] utilized a stable method to fit network traffic as well as a threshold-based method to find unusual behaviors. Although numerous cutting-edge algorithms for anomaly detection is proposed, none of them are directly applicable to VANETs [17].…”
Section: Literature Reviewmentioning
confidence: 99%
“…A prior understanding of unusual behavior is not required for the proposed method. In addition, Simmross-Wattenberg et al in [16] utilized a stable method to fit network traffic as well as a threshold-based method to find unusual behaviors. Although numerous cutting-edge algorithms for anomaly detection is proposed, none of them are directly applicable to VANETs [17].…”
Section: Literature Reviewmentioning
confidence: 99%
“…This growth has led to the creation of new smart applications [3]. The automotive industry urgently requires the development of effective protocols that are fully compatible with current technologies as well as trends [4]. Vehicle communication security scenarios and threats in Figure 1 follow.…”
Section: Proposed Secure Breach Detection and Smart Data Transmissionmentioning
confidence: 99%
“…Following formula is utilized to find z-th transmission link's available bandwidth for the time period (t, t) by eq. (3,4).…”
Section: 𝑠 ⟵ 𝐿 ‾ (𝑠𝑑) (𝑡)mentioning
confidence: 99%
See 1 more Smart Citation
“…Furthermore, the survey effort that is included in [ 69 ] created interesting perspectives on related scientific problems. Moreover, the authors of [ 70 , 71 ] proposed interesting data transmission models relative to next-generation radio networks, while [ 72 ] described a versatile data communication channels management system, which can be used in a variety of real-world use case scenarios, including vehicular ad hoc networks (VANET).…”
Section: Data Acquisition Through Mobile Devices and Sensorsmentioning
confidence: 99%