Detecting sybil attacks in vehicular ad hoc networks using fuzzy logic and arithmetic optimization algorithm
In vehicular ad hoc networks (VANETs), Sybil attacks are serious security problems that can seriously affect the operations of the VANETs by producing fake identities and routes. To deal with this problem, in this paper, we present a cross-layer approach and fuzzy logic-based solution that should be...
Uloženo v:
| Vydáno v: | The Journal of supercomputing Ročník 78; číslo 14; s. 16303 - 16335 |
|---|---|
| Hlavní autoři: | , , |
| Médium: | Journal Article |
| Jazyk: | angličtina |
| Vydáno: |
New York
Springer US
01.09.2022
Springer Nature B.V |
| Témata: | |
| ISSN: | 0920-8542, 1573-0484 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | In vehicular ad hoc networks (VANETs), Sybil attacks are serious security problems that can seriously affect the operations of the VANETs by producing fake identities and routes. To deal with this problem, in this paper, we present a cross-layer approach and fuzzy logic-based solution that should be applied in roadside units (RSUs). This scheme applies two fuzzy logic controllers (FLCs), in which the first one considers factors such as vehicles trust, Received signal strength indication (RSSI) difference, vehicle distance, and vehicle angle while the second one utilizes factors such as signal-to-noise ratio, network entry time, number of the neighbors, and buffer size. In addition, the arithmetic optimization algorithm (AOA) is applied for tuning the applied fuzzy sets and selecting the best possible rules in the proposed FLCs to improve their performance. Extensive simulation results were conducted using the NS2 and SUMO simulators for two scenarios, which the first one is allocated for in-town and the other is considered for out-town environments. The achieved results indicate that the proposed Sybil attack detection scheme outperforms other approaches in terms of the various metrics such as false positive rate (FPR), the number of dropped packets, and packet loss ratio are used. |
|---|---|
| AbstractList | In vehicular ad hoc networks (VANETs), Sybil attacks are serious security problems that can seriously affect the operations of the VANETs by producing fake identities and routes. To deal with this problem, in this paper, we present a cross-layer approach and fuzzy logic-based solution that should be applied in roadside units (RSUs). This scheme applies two fuzzy logic controllers (FLCs), in which the first one considers factors such as vehicles trust, Received signal strength indication (RSSI) difference, vehicle distance, and vehicle angle while the second one utilizes factors such as signal-to-noise ratio, network entry time, number of the neighbors, and buffer size. In addition, the arithmetic optimization algorithm (AOA) is applied for tuning the applied fuzzy sets and selecting the best possible rules in the proposed FLCs to improve their performance. Extensive simulation results were conducted using the NS2 and SUMO simulators for two scenarios, which the first one is allocated for in-town and the other is considered for out-town environments. The achieved results indicate that the proposed Sybil attack detection scheme outperforms other approaches in terms of the various metrics such as false positive rate (FPR), the number of dropped packets, and packet loss ratio are used. |
| Author | Shayegan, Mohammad Amin Maleknasab Ardakani, Mahdi Tabarzad, Mohammad Ali |
| Author_xml | – sequence: 1 givenname: Mahdi surname: Maleknasab Ardakani fullname: Maleknasab Ardakani, Mahdi organization: Department of Computer Engineering, Shiraz Branch, Islamic Azad University – sequence: 2 givenname: Mohammad Ali orcidid: 0000-0002-8368-4414 surname: Tabarzad fullname: Tabarzad, Mohammad Ali email: tabarzad@iaushiraz.ac.ir organization: Department of Computer Engineering, Shiraz Branch, Islamic Azad University – sequence: 3 givenname: Mohammad Amin surname: Shayegan fullname: Shayegan, Mohammad Amin organization: Department of Computer Engineering, Shiraz Branch, Islamic Azad University |
| BookMark | eNp9kE1LAzEQhoMoWKt_wFPA82qS3W02R_EbBC96DtnspE3dJjXJKt1fb9oKggdPwzDPMzO8J-jQeQcInVNySQnhV5FSxnhBGCtIVbNZMR6gCa15mdumOkQTIhgpmrpix-gkxiUhpCp5OUH9LSTQybo5jpvW9lilpPR7xNbhT1hYPfQqYNXhhdfYQfryIQ-HuBXMMI4b3Pu51Vi5Dqtg02IFKbd-nezKjipZ77Dq5343OkVHRvURzn7qFL3d373ePBbPLw9PN9fPhWaVSEXLORMGZl3b6RmH2lSGillpWg6daHQLRhENTDdMAdSiqerMNqIrlclQW5ZTdLHfuw7-Y4CY5NIPweWTknFKG0EErzPV7CkdfIwBjNQ27T5OQdleUiK32cp9tjJnK3fZyjGr7I-6DnalwuZ_qdxLMcNuDuH3q3-sbzVcktE |
| CitedBy_id | crossref_primary_10_1007_s10207_025_01107_y crossref_primary_10_1080_01969722_2022_2157601 crossref_primary_10_1007_s11831_023_09902_3 crossref_primary_10_1002_spy2_487 crossref_primary_10_1007_s11042_023_17084_0 crossref_primary_10_1080_1206212X_2024_2389476 crossref_primary_10_1007_s11227_023_05597_2 crossref_primary_10_1007_s42979_025_04064_4 crossref_primary_10_1007_s11276_023_03399_1 |
| Cites_doi | 10.1016/j.advengsoft.2016.01.008 10.1007/s12652-021-03379-3 10.1002/spe.995 10.1016/j.vehcom.2014.05.001 10.1016/j.eij.2016.11.003 10.1016/j.jnca.2013.02.036 10.1108/02644401211235834 10.1007/978-981-15-7907-3_15 10.1016/j.jnca.2021.103111 10.1016/j.advengsoft.2013.12.007 10.52547/mjee.15.1.9 10.3390/fi11020027 10.1080/02564602.2016.1215270 10.1002/sec.679 10.1016/j.jnca.2017.04.008 10.1080/17445760.2019.1617865 10.1016/j.cma.2020.113609 10.1109/JSAC.2019.2933888 10.1109/TVT.2020.2987526 10.1007/s12083-016-0431-x 10.1007/978-3-319-93025-1_4 10.1002/sec.1642 10.4018/978-1-7998-2570-8.ch009 10.1109/TITS.2015.2439292 10.1007/s11277-019-06836-7 10.1109/ICC.2015.7249492 10.1109/TMC.2018.2833849 10.1145/984622.984660 10.1007/s10462-012-9328-0 10.1002/sec.1539 10.1016/j.adhoc.2019.01.010 10.1145/3267809.3267828 10.1109/ICEEOT.2016.7754777 10.1007/s11277-020-07272-8 10.1109/JIOT.2018.2843769 10.1016/j.asoc.2020.106301 10.1007/s11277-016-3661-6 10.1016/j.procs.2016.02.080 10.1016/j.jnca.2018.07.006 10.1007/s00500-020-05373-x 10.1007/s11276-019-02198-x 10.1016/j.comcom.2014.02.020 10.1007/s10586-020-03184-1 10.3390/s18030878 10.1016/j.jnca.2016.12.025 10.1109/ACCESS.2018.2864111 10.1145/3178212.3178231 10.1109/MCI.2006.329691 10.1016/j.future.2016.05.034 10.1007/978-94-015-7744-1_2 10.1016/0377-2217(94)90009-4 10.1007/s11227-019-02933-3 |
| ContentType | Journal Article |
| Copyright | The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022 The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022. |
| Copyright_xml | – notice: The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022 – notice: The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022. |
| DBID | AAYXX CITATION JQ2 |
| DOI | 10.1007/s11227-022-04526-z |
| DatabaseName | CrossRef ProQuest Computer Science Collection |
| DatabaseTitle | CrossRef ProQuest Computer Science Collection |
| DatabaseTitleList | ProQuest Computer Science Collection |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 1573-0484 |
| EndPage | 16335 |
| ExternalDocumentID | 10_1007_s11227_022_04526_z |
| GroupedDBID | -4Z -59 -5G -BR -EM -Y2 -~C .4S .86 .DC .VR 06D 0R~ 0VY 123 199 1N0 1SB 2.D 203 28- 29L 2J2 2JN 2JY 2KG 2KM 2LR 2P1 2VQ 2~H 30V 4.4 406 408 409 40D 40E 5QI 5VS 67Z 6NX 78A 8TC 8UJ 95- 95. 95~ 96X AAAVM AABHQ AACDK AAHNG AAIAL AAJBT AAJKR AANZL AAOBN AARHV AARTL AASML AATNV AATVU AAUYE AAWCG AAYIU AAYOK AAYQN AAYTO AAYZH ABAKF ABBBX ABBXA ABDBF ABDPE ABDZT ABECU ABFTD ABFTV ABHLI ABHQN ABJNI ABJOX ABKCH ABKTR ABMNI ABMQK ABNWP ABQBU ABQSL ABSXP ABTEG ABTHY ABTKH ABTMW ABULA ABWNU ABXPI ACAOD ACBXY ACDTI ACGFS ACHSB ACHXU ACKNC ACMDZ ACMLO ACOKC ACOMO ACPIV ACUHS ACZOJ ADHHG ADHIR ADIMF ADINQ ADKNI ADKPE ADMLS ADQRH ADRFC ADTPH ADURQ ADYFF ADZKW AEBTG AEFIE AEFQL AEGAL AEGNC AEJHL AEJRE AEKMD AEMSY AENEX AEOHA AEPYU AESKC AETLH AEVLU AEXYK AFBBN AFEXP AFGCZ AFLOW AFQWF AFWTZ AFZKB AGAYW AGDGC AGGDS AGJBK AGMZJ AGQEE AGQMX AGRTI AGWIL AGWZB AGYKE AHAVH AHBYD AHSBF AHYZX AI. AIAKS AIGIU AIIXL AILAN AITGF AJBLW AJRNO AJZVZ ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMXSW AMYLF AMYQR AOCGG ARCSS ARMRJ ASPBG AVWKF AXYYD AYJHY AZFZN B-. B0M BA0 BBWZM BDATZ BGNMA BSONS CAG COF CS3 CSCUP DDRTE DL5 DNIVK DPUIP DU5 EAD EAP EAS EBD EBLON EBS EDO EIOEI EJD EMK EPL ESBYG ESX F5P FEDTE FERAY FFXSO FIGPU FINBP FNLPD FRRFC FSGXE FWDCC GGCAI GGRSB GJIRD GNWQR GQ6 GQ7 GQ8 GXS H13 HF~ HG5 HG6 HMJXF HQYDN HRMNR HVGLF HZ~ H~9 I-F I09 IHE IJ- IKXTQ ITM IWAJR IXC IZIGR IZQ I~X I~Z J-C J0Z JBSCW JCJTX JZLTJ KDC KOV KOW LAK LLZTM M4Y MA- N2Q N9A NB0 NDZJH NPVJJ NQJWS NU0 O9- O93 O9G O9I O9J OAM OVD P19 P2P P9O PF0 PT4 PT5 QOK QOS R4E R89 R9I RHV RNI ROL RPX RSV RZC RZE RZK S16 S1Z S26 S27 S28 S3B SAP SCJ SCLPG SCO SDH SDM SHX SISQX SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 T16 TEORI TSG TSK TSV TUC TUS U2A UG4 UOJIU UTJUX UZXMN VC2 VFIZW VH1 W23 W48 WH7 WK8 YLTOR Z45 Z7R Z7X Z7Z Z83 Z88 Z8M Z8N Z8R Z8T Z8W Z92 ZMTXR ~8M ~EX AAPKM AAYXX ABBRH ABDBE ABFSG ABJCF ABRTQ ACSTC ADHKG ADKFA AEZWR AFDZB AFFHD AFHIU AFKRA AFOHR AGQPQ AHPBZ AHWEU AIXLP ARAPS ATHPR AYFIA BENPR BGLVJ CCPQU CITATION HCIFZ K7- M7S PHGZM PHGZT PQGLB PTHSS JQ2 |
| ID | FETCH-LOGICAL-c249t-b7729fe6dbdc67e5f4f1963fb7ed98cbefa0ce2c82aee59845e6d89d3af3fbb33 |
| IEDL.DBID | RSV |
| ISICitedReferencesCount | 11 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000790702000002&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 0920-8542 |
| IngestDate | Thu Sep 25 00:45:44 EDT 2025 Sat Nov 29 04:27:42 EST 2025 Tue Nov 18 22:22:15 EST 2025 Fri Feb 21 02:45:10 EST 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 14 |
| Keywords | Fuzzy logic VANET RSSI Sybil Attacks Security |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c249t-b7729fe6dbdc67e5f4f1963fb7ed98cbefa0ce2c82aee59845e6d89d3af3fbb33 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0002-8368-4414 |
| PQID | 2711890975 |
| PQPubID | 2043774 |
| PageCount | 33 |
| ParticipantIDs | proquest_journals_2711890975 crossref_citationtrail_10_1007_s11227_022_04526_z crossref_primary_10_1007_s11227_022_04526_z springer_journals_10_1007_s11227_022_04526_z |
| PublicationCentury | 2000 |
| PublicationDate | 2022-09-01 |
| PublicationDateYYYYMMDD | 2022-09-01 |
| PublicationDate_xml | – month: 09 year: 2022 text: 2022-09-01 day: 01 |
| PublicationDecade | 2020 |
| PublicationPlace | New York |
| PublicationPlace_xml | – name: New York |
| PublicationSubtitle | An International Journal of High-Performance Computer Design, Analysis, and Use |
| PublicationTitle | The Journal of supercomputing |
| PublicationTitleAbbrev | J Supercomput |
| PublicationYear | 2022 |
| Publisher | Springer US Springer Nature B.V |
| Publisher_xml | – name: Springer US – name: Springer Nature B.V |
| References | Mishra (CR27) 2018; 6 Saif Al-Sultan, Moath, Al-Doori, Al-Bayatti (CR6) 2014 Monica (CR60) 2009 Abualigah (CR28) 2021; 376 Singh (CR4) 2018 Mirjalili, Mirjalili, Lewis (CR64) 2014 CR38 Engoulou (CR10) 2014; 44 Hamdan, Hudaib, Awajan (CR36) 2021; 36 Mirjalili, Lewis (CR65) 2016 Van Laarhoven, Aarts (CR50) 1987 Yao (CR45) 2019; 37 Mejri, Ben-Othman, Hamdi (CR2) 2014 Iwendi (CR30) 2018; 6 Masdari, Barshande, Ozdemir (CR55) 2019; 75 Masdari, Ahmadzadeh, Bidaki (CR25) 2017; 91 Masdari, Jalali (CR11) 2016; 9 Velayudhan, Anitha, Madanan (CR33) 2021; 122 Masdari (CR20) 2011; 1 Qu (CR12) 2015; 16 Costa (CR49) 1994; 76 CR8 Karaboga (CR54) 2014; 42 Feng (CR35) 2017; 10 CR47 Sumra, Hasbullah J-l, AbManan (CR9) 2015; 51 CR44 Hasrouny (CR1) 2017; 7 Masdari, Ahmadzadeh (CR26) 2016; 9 Karimi, Sadeghi (CR63) 2021; 15 Faisal, Zaidi (CR39) 2020; 22 Vasudeva, Sood (CR23) 2018; 120 Mirjalili (CR48) 2019 Ganeshkumar, Sanjay (CR7) 2021 Feng, Tang (CR41) 2017; 22 Yang, Gandomi (CR53) 2012 Masdari (CR61) 2017 CR15 CR58 Grover, Gaur, Laxmi (CR14) 2016 CR57 Jafarian (CR19) 2021; 24 Masdari (CR21) 2017; 80 Rajadurai, Gandhi (CR42) 2020; 110 Jan (CR43) 2018; 80 Ayaida (CR29) 2019; 90 CR51 Tyagi, Dembla (CR59) 2017 Masdari, Bidaki, Naghiloo (CR62) 2017; 94 Sefati, Tabrizi (CR34) 2021; 123 Zeeshan, Naz, Jamil (CR5) 2020; 26 Velayudhan, Anitha, Madanan (CR32) 2021 Bhise, Kamble (CR16) 2016; 78 Hosseinzadeh (CR46) 2021; 25 Yao (CR31) 2018; 18 Arena, Pau (CR3) 2019 Parham, Pouyan (CR37) 2020; 113 Masdari, Khezri (CR17) 2020; 92 Lee (CR18) 2021 Calheiros (CR56) 2011 CR22 Abdulkader (CR24) 2018; 29 Dorigo, Birattari, Stutzle (CR52) 2006; 1 Park (CR40) 2013; 6 Sharma, Kaul (CR13) 2018; 12 A Vasudeva (4526_CR23) 2018; 120 NC Velayudhan (4526_CR33) 2021; 122 P Tyagi (4526_CR59) 2017 M Masdari (4526_CR61) 2017 T Jafarian (4526_CR19) 2021; 24 S Mirjalili (4526_CR48) 2019 RG Engoulou (4526_CR10) 2014; 44 M Masdari (4526_CR55) 2019; 75 4526_CR22 Y Yao (4526_CR31) 2018; 18 M Masdari (4526_CR17) 2020; 92 X Feng (4526_CR41) 2017; 22 D Monica (4526_CR60) 2009 C Iwendi (4526_CR30) 2018; 6 M Masdari (4526_CR62) 2017; 94 M Masdari (4526_CR21) 2017; 80 S Mirjalili (4526_CR65) 2016 M Ayaida (4526_CR29) 2019; 90 M Masdari (4526_CR20) 2011; 1 4526_CR58 N Ganeshkumar (4526_CR7) 2021 4526_CR8 4526_CR15 4526_CR57 4526_CR51 J Grover (4526_CR14) 2016 M Dorigo (4526_CR52) 2006; 1 H Rajadurai (4526_CR42) 2020; 110 X Feng (4526_CR35) 2017; 10 AM Bhise (4526_CR16) 2016; 78 M Karimi (4526_CR63) 2021; 15 S Sharma (4526_CR13) 2018; 12 Y Yao (4526_CR45) 2019; 37 F Qu (4526_CR12) 2015; 16 4526_CR47 XS Yang (4526_CR53) 2012 SS Sefati (4526_CR34) 2021; 123 4526_CR44 M Masdari (4526_CR11) 2016; 9 RN Calheiros (4526_CR56) 2011 N Saif Al-Sultan (4526_CR6) 2014 M Masdari (4526_CR26) 2016; 9 MN Mejri (4526_CR2) 2014 S Hamdan (4526_CR36) 2021; 36 S Park (4526_CR40) 2013; 6 MA Jan (4526_CR43) 2018; 80 NC Velayudhan (4526_CR32) 2021 M Parham (4526_CR37) 2020; 113 IA Sumra (4526_CR9) 2015; 51 PJ Van Laarhoven (4526_CR50) 1987 A Zeeshan (4526_CR5) 2020; 26 L Abualigah (4526_CR28) 2021; 376 M Hosseinzadeh (4526_CR46) 2021; 25 ZA Abdulkader (4526_CR24) 2018; 29 F Arena (4526_CR3) 2019 4526_CR38 GD Singh (4526_CR4) 2018 D Costa (4526_CR49) 1994; 76 D Karaboga (4526_CR54) 2014; 42 H Hasrouny (4526_CR1) 2017; 7 M Masdari (4526_CR25) 2017; 91 S Mirjalili (4526_CR64) 2014 SW Lee (4526_CR18) 2021 SM Faisal (4526_CR39) 2020; 22 AK Mishra (4526_CR27) 2018; 6 |
| References_xml | – volume: 16 start-page: 2985 issue: 6 year: 2015 end-page: 2996 ident: CR12 article-title: A security and privacy review of VANETs publication-title: IEEE Trans Intell Transp Syst – start-page: 329 year: 2018 end-page: 340 ident: CR4 publication-title: A review on VANET routing protocols and wireless standards in smart computing and informatics – ident: CR22 – year: 2016 ident: CR65 article-title: The whale optimization algorithm publication-title: Adv Eng Softw doi: 10.1016/j.advengsoft.2016.01.008 – volume: 80 start-page: 79 year: 2017 end-page: 89 ident: CR21 article-title: Markov chain-based evaluation of the certificate status validations in hybrid MANETs publication-title: J Netw Comput Appl – volume: 94 start-page: 977 issue: 3 year: 2017 end-page: 1001 ident: CR62 article-title: Comprehensive evaluation of the localized certificate revocation in mobile ad hoc network publication-title: Wireless Pers Commun – volume: 12 start-page: 138 year: 2018 end-page: 164 ident: CR13 article-title: A survey on intrusion detection systems and honeypot based proactive security mechanisms in VANETs and VANET Cloud publication-title: Veh commun – volume: 18 start-page: 362 issue: 2 year: 2018 end-page: 375 ident: CR31 article-title: Multi-channel based Sybil attack detection in vehicular ad hoc networks using RSSI publication-title: IEEE Trans Mob Comput – volume: 22 start-page: 397 issue: 3 year: 2020 end-page: 408 ident: CR39 article-title: Timestamp based detection of sybil attack in VANET publication-title: Int J Netw Secur – ident: CR51 – volume: 75 start-page: 7174 issue: 11 year: 2019 end-page: 7208 ident: CR55 article-title: CDABC: chaotic discrete artificial bee colony algorithm for multi-level clustering in large-scale WSNs publication-title: J Supercomput – volume: 9 start-page: 3724 issue: 16 year: 2016 end-page: 3751 ident: CR11 article-title: A survey and taxonomy of DoS attacks in cloud computing publication-title: Sec Commun Net – year: 2021 ident: CR32 article-title: Sybil attack detection and secure data transmission in VANET using CMEHA-DNN and MD5-ECC publication-title: J Ambient Intell Human Comput doi: 10.1007/s12652-021-03379-3 – volume: 36 start-page: 69 issue: 2 year: 2021 end-page: 79 ident: CR36 article-title: Detecting Sybil attacks in vehicular ad hoc networks publication-title: Int J Parallel Emergent Distrib Syst – year: 2011 ident: CR56 article-title: CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms publication-title: Softw Pract exp doi: 10.1002/spe.995 – volume: 44 start-page: 1 year: 2014 end-page: 13 ident: CR10 article-title: VANET security surveys publication-title: Comput Commun – year: 2014 ident: CR2 article-title: Survey on VANET security challenges and possible cryptographic solutions publication-title: Veh Commun doi: 10.1016/j.vehcom.2014.05.001 – ident: CR8 – ident: CR58 – volume: 78 start-page: 395 year: 2016 end-page: 401 ident: CR16 article-title: Review on detection and mitigation of Sybil attack in the network publication-title: Procedia Comput Sci – volume: 110 start-page: 2179 issue: 4 year: 2020 end-page: 2193 ident: CR42 article-title: Fuzzy based collaborative verification system for Sybil attack detection in MANET publication-title: Wireless Pers Commun – year: 2017 ident: CR59 article-title: Performance analysis and implementation of proposed mechanism for detection and prevention of security attacks in routing protocols of vehicular ad-hoc network (VANET) publication-title: Egypt Informat J doi: 10.1016/j.eij.2016.11.003 – volume: 76 start-page: 98 issue: 1 year: 1994 end-page: 110 ident: CR49 article-title: tabu search algorithm for computing an operational timetable publication-title: Eur J Oper Res – ident: CR15 – volume: 1 start-page: 1 year: 2011 end-page: 12 ident: CR20 article-title: (2011)A survey and taxonomy of distributed certificate authorities in mobile ad hoc networks publication-title: EURASIP J Wirel Commun Net – volume: 122 start-page: 1 issue: 4 year: 2021 end-page: 29 ident: CR33 article-title: Sybil Attack with RSU detection and location privacy in urban VANETs: an efficient EPORP technique publication-title: Wire Pers Commun – volume: 123 start-page: 1 issue: 3 year: 2021 end-page: 21 ident: CR34 article-title: Detecting sybil attack in vehicular Ad-hoc networks (Vanets) by using fitness function signal strength index and throughput publication-title: Wire Pers Commun – ident: CR57 – volume: 91 start-page: 36 year: 2017 end-page: 51 ident: CR25 article-title: Key management in wireless body area network: challenges and issues publication-title: J Netw Comput Appl – volume: 26 start-page: 2905 issue: 4 year: 2020 end-page: 2914 ident: CR5 article-title: Minimizing transmission delays in vehicular ad hoc networks by optimized placement of road-side unit publication-title: Wireless Netw – volume: 25 start-page: 3195 issue: 4 year: 2021 end-page: 3223 ident: CR46 article-title: Improving security using SVM-based anomaly detection: issues and challenges publication-title: Soft Comput – year: 2014 ident: CR6 article-title: A comprehensive survey on vehicular ad hoc network publication-title: J Netw Comput Appl doi: 10.1016/j.jnca.2013.02.036 – volume: 7 start-page: 7 year: 2017 end-page: 20 ident: CR1 article-title: VANet security challenges and solutions: A survey publication-title: Veh Commun – volume: 113 start-page: 1149 issue: 2 year: 2020 end-page: 1182 ident: CR37 article-title: An effective privacy-aware Sybil attack detection scheme for secure communication in vehicular ad hoc network publication-title: Wireless Pers Commun – volume: 80 start-page: 613 year: 2018 end-page: 626 ident: CR43 article-title: A Sybil attack detection scheme for a forest wildfire monitoring application publication-title: Futur Gener Comput Syst – volume: 90 year: 2019 ident: CR29 article-title: A macroscopic traffic model-based approach for sybil attack detection in VANETs publication-title: Ad Hoc Netw – year: 2012 ident: CR53 article-title: Bat algorithm: a novel approach for global engineering optimization publication-title: Eng Comput doi: 10.1108/02644401211235834 – year: 2021 ident: CR7 article-title: Obu (on-board unit) wireless devices in vanet (s) for effective communication—A review publication-title: Computational Methods and Data Engineering doi: 10.1007/978-981-15-7907-3_15 – ident: CR47 – volume: 376 year: 2021 ident: CR28 article-title: The arithmetic optimization algorithm publication-title: Comput Method Appl Mech Eng – volume: 9 start-page: 4777 issue: 17 year: 2016 end-page: 4803 ident: CR26 article-title: Comprehensive analysis of the authentication methods in wireless body area networks publication-title: Sec commun Net – year: 2021 ident: CR18 article-title: Towards secure intrusion detection systems using deep learning techniques: comprehensive analysis and review publication-title: J Netw Comput Appl doi: 10.1016/j.jnca.2021.103111 – year: 2009 ident: CR60 publication-title: Thwarting the sybil attack in wireless ad hoc networks – volume: 10 start-page: 305 issue: 2 year: 2017 end-page: 314 ident: CR35 article-title: A method for defensing against multi-source Sybil attacks in VANET publication-title: Peer-to-Peer Net Appl – volume: 92 year: 2020 ident: CR17 article-title: A survey and taxonomy of the fuzzy signature-based intrusion detection systems publication-title: Appl Soft Comput – start-page: 287 year: 2016 end-page: 312 ident: CR14 publication-title: Sybil attack in VANETs: detection and prevention in security of self-organizing networks – year: 2014 ident: CR64 article-title: Grey wolf optimizer publication-title: Adv Eng Softw doi: 10.1016/j.advengsoft.2013.12.007 – volume: 42 start-page: 21 issue: 1 year: 2014 end-page: 57 ident: CR54 article-title: A comprehensive survey: artificial bee colony (ABC) algorithm and applications publication-title: Artif Intell Rev – volume: 24 start-page: 1235 issue: 2 year: 2021 end-page: 1253 ident: CR19 article-title: A survey and classification of the security anomaly detection mechanisms in software defined networks publication-title: Clust Comput – volume: 29 start-page: 1 issue: 2 year: 2018 end-page: 6 ident: CR24 article-title: A survey on sybil attack detection in vehicular ad hoc networks (VANET) publication-title: J Comput – ident: CR44 – start-page: 7 year: 1987 end-page: 15 ident: CR50 publication-title: Simulated annealing: theory and applications – volume: 1 start-page: 28 issue: 4 year: 2006 end-page: 39 ident: CR52 article-title: Ant colony optimization publication-title: IEEE Comput Intell Mag – volume: 22 start-page: 1 year: 2017 end-page: 11 ident: CR41 article-title: Obfuscated RSUs vector based signature scheme for detecting conspiracy Sybil attack in VANETs publication-title: Mob Inf Syst – ident: CR38 – volume: 15 start-page: 9 issue: 1 year: 2021 ident: CR63 article-title: Improvement of Sybil attack detection in vehicular ad-Hoc networks using cross-layer and fuzzy Logic publication-title: Majlesi J Elect Eng doi: 10.52547/mjee.15.1.9 – year: 2019 ident: CR3 article-title: An overview of vehicular communications publication-title: Future Internet doi: 10.3390/fi11020027 – volume: 120 start-page: 78 year: 2018 end-page: 118 ident: CR23 article-title: Survey on sybil attack defense mechanisms in wireless ad hoc networks publication-title: J Netw Comput Appl – start-page: 43 year: 2019 end-page: 55 ident: CR48 publication-title: Genetic algorithm in evolutionary algorithms and neural networks – volume: 6 start-page: 523 issue: 4 year: 2013 end-page: 538 ident: CR40 article-title: Defense against Sybil attack in the initial deployment stage of vehicular ad hoc network based on roadside unit support publication-title: Sec Commun Net – volume: 6 start-page: 379 issue: 1 year: 2018 end-page: 387 ident: CR27 article-title: Analytical model for sybil attack phases in internet of things publication-title: IEEE Internet Things J – volume: 37 start-page: 2588 issue: 11 year: 2019 end-page: 2602 ident: CR45 article-title: Power control identification: a novel Sybil attack detection scheme in VANETs using RSSI publication-title: IEEE J Sel Areas Commun – volume: 6 start-page: 47258 year: 2018 end-page: 47267 ident: CR30 article-title: On detection of Sybil attack in large-scale VANETs using spider-monkey technique publication-title: IEEE Access – volume: 51 start-page: 61 year: 2015 ident: CR9 article-title: Attacks on security goals confidentiality, integrity, availability in VANET: a survey in vehicular ad-hoc networks for smart cities springer publication-title: London – year: 2017 ident: CR61 article-title: Towards secure localized certificate revocation in mobile ad-hoc networks publication-title: IETE Tech Rev doi: 10.1080/02564602.2016.1215270 – volume: 6 start-page: 523 issue: 4 year: 2013 ident: 4526_CR40 publication-title: Sec Commun Net doi: 10.1002/sec.679 – start-page: 287 volume-title: Sybil attack in VANETs: detection and prevention in security of self-organizing networks year: 2016 ident: 4526_CR14 – volume: 91 start-page: 36 year: 2017 ident: 4526_CR25 publication-title: J Netw Comput Appl doi: 10.1016/j.jnca.2017.04.008 – volume: 36 start-page: 69 issue: 2 year: 2021 ident: 4526_CR36 publication-title: Int J Parallel Emergent Distrib Syst doi: 10.1080/17445760.2019.1617865 – year: 2014 ident: 4526_CR64 publication-title: Adv Eng Softw doi: 10.1016/j.advengsoft.2013.12.007 – volume: 376 year: 2021 ident: 4526_CR28 publication-title: Comput Method Appl Mech Eng doi: 10.1016/j.cma.2020.113609 – year: 2012 ident: 4526_CR53 publication-title: Eng Comput doi: 10.1108/02644401211235834 – volume: 1 start-page: 1 year: 2011 ident: 4526_CR20 publication-title: EURASIP J Wirel Commun Net – volume: 37 start-page: 2588 issue: 11 year: 2019 ident: 4526_CR45 publication-title: IEEE J Sel Areas Commun doi: 10.1109/JSAC.2019.2933888 – ident: 4526_CR8 doi: 10.1109/TVT.2020.2987526 – volume: 22 start-page: 397 issue: 3 year: 2020 ident: 4526_CR39 publication-title: Int J Netw Secur – volume: 10 start-page: 305 issue: 2 year: 2017 ident: 4526_CR35 publication-title: Peer-to-Peer Net Appl doi: 10.1007/s12083-016-0431-x – start-page: 43 volume-title: Genetic algorithm in evolutionary algorithms and neural networks year: 2019 ident: 4526_CR48 doi: 10.1007/978-3-319-93025-1_4 – year: 2014 ident: 4526_CR6 publication-title: J Netw Comput Appl doi: 10.1016/j.jnca.2013.02.036 – volume: 9 start-page: 4777 issue: 17 year: 2016 ident: 4526_CR26 publication-title: Sec commun Net doi: 10.1002/sec.1642 – year: 2014 ident: 4526_CR2 publication-title: Veh Commun doi: 10.1016/j.vehcom.2014.05.001 – ident: 4526_CR22 doi: 10.4018/978-1-7998-2570-8.ch009 – volume: 16 start-page: 2985 issue: 6 year: 2015 ident: 4526_CR12 publication-title: IEEE Trans Intell Transp Syst doi: 10.1109/TITS.2015.2439292 – volume: 110 start-page: 2179 issue: 4 year: 2020 ident: 4526_CR42 publication-title: Wireless Pers Commun doi: 10.1007/s11277-019-06836-7 – ident: 4526_CR58 doi: 10.1109/ICC.2015.7249492 – volume: 18 start-page: 362 issue: 2 year: 2018 ident: 4526_CR31 publication-title: IEEE Trans Mob Comput doi: 10.1109/TMC.2018.2833849 – ident: 4526_CR47 doi: 10.1145/984622.984660 – volume: 42 start-page: 21 issue: 1 year: 2014 ident: 4526_CR54 publication-title: Artif Intell Rev doi: 10.1007/s10462-012-9328-0 – volume: 9 start-page: 3724 issue: 16 year: 2016 ident: 4526_CR11 publication-title: Sec Commun Net doi: 10.1002/sec.1539 – volume: 90 year: 2019 ident: 4526_CR29 publication-title: Ad Hoc Netw doi: 10.1016/j.adhoc.2019.01.010 – ident: 4526_CR57 doi: 10.1145/3267809.3267828 – volume: 123 start-page: 1 issue: 3 year: 2021 ident: 4526_CR34 publication-title: Wire Pers Commun – volume: 15 start-page: 9 issue: 1 year: 2021 ident: 4526_CR63 publication-title: Majlesi J Elect Eng doi: 10.52547/mjee.15.1.9 – year: 2017 ident: 4526_CR59 publication-title: Egypt Informat J doi: 10.1016/j.eij.2016.11.003 – volume: 22 start-page: 1 year: 2017 ident: 4526_CR41 publication-title: Mob Inf Syst – ident: 4526_CR15 doi: 10.1109/ICEEOT.2016.7754777 – volume: 113 start-page: 1149 issue: 2 year: 2020 ident: 4526_CR37 publication-title: Wireless Pers Commun doi: 10.1007/s11277-020-07272-8 – year: 2021 ident: 4526_CR18 publication-title: J Netw Comput Appl doi: 10.1016/j.jnca.2021.103111 – volume: 6 start-page: 379 issue: 1 year: 2018 ident: 4526_CR27 publication-title: IEEE Internet Things J doi: 10.1109/JIOT.2018.2843769 – year: 2016 ident: 4526_CR65 publication-title: Adv Eng Softw doi: 10.1016/j.advengsoft.2016.01.008 – volume: 92 year: 2020 ident: 4526_CR17 publication-title: Appl Soft Comput doi: 10.1016/j.asoc.2020.106301 – volume: 94 start-page: 977 issue: 3 year: 2017 ident: 4526_CR62 publication-title: Wireless Pers Commun doi: 10.1007/s11277-016-3661-6 – year: 2017 ident: 4526_CR61 publication-title: IETE Tech Rev doi: 10.1080/02564602.2016.1215270 – volume: 122 start-page: 1 issue: 4 year: 2021 ident: 4526_CR33 publication-title: Wire Pers Commun – year: 2021 ident: 4526_CR7 publication-title: Computational Methods and Data Engineering doi: 10.1007/978-981-15-7907-3_15 – volume: 12 start-page: 138 year: 2018 ident: 4526_CR13 publication-title: Veh commun – volume: 78 start-page: 395 year: 2016 ident: 4526_CR16 publication-title: Procedia Comput Sci doi: 10.1016/j.procs.2016.02.080 – volume: 120 start-page: 78 year: 2018 ident: 4526_CR23 publication-title: J Netw Comput Appl doi: 10.1016/j.jnca.2018.07.006 – volume-title: Thwarting the sybil attack in wireless ad hoc networks year: 2009 ident: 4526_CR60 – year: 2021 ident: 4526_CR32 publication-title: J Ambient Intell Human Comput doi: 10.1007/s12652-021-03379-3 – volume: 25 start-page: 3195 issue: 4 year: 2021 ident: 4526_CR46 publication-title: Soft Comput doi: 10.1007/s00500-020-05373-x – volume: 26 start-page: 2905 issue: 4 year: 2020 ident: 4526_CR5 publication-title: Wireless Netw doi: 10.1007/s11276-019-02198-x – volume: 44 start-page: 1 year: 2014 ident: 4526_CR10 publication-title: Comput Commun doi: 10.1016/j.comcom.2014.02.020 – volume: 7 start-page: 7 year: 2017 ident: 4526_CR1 publication-title: Veh Commun – start-page: 329 volume-title: A review on VANET routing protocols and wireless standards in smart computing and informatics year: 2018 ident: 4526_CR4 – volume: 24 start-page: 1235 issue: 2 year: 2021 ident: 4526_CR19 publication-title: Clust Comput doi: 10.1007/s10586-020-03184-1 – ident: 4526_CR44 doi: 10.3390/s18030878 – ident: 4526_CR51 – volume: 51 start-page: 61 year: 2015 ident: 4526_CR9 publication-title: London – volume: 80 start-page: 79 year: 2017 ident: 4526_CR21 publication-title: J Netw Comput Appl doi: 10.1016/j.jnca.2016.12.025 – volume: 6 start-page: 47258 year: 2018 ident: 4526_CR30 publication-title: IEEE Access doi: 10.1109/ACCESS.2018.2864111 – ident: 4526_CR38 doi: 10.1145/3178212.3178231 – volume: 1 start-page: 28 issue: 4 year: 2006 ident: 4526_CR52 publication-title: IEEE Comput Intell Mag doi: 10.1109/MCI.2006.329691 – volume: 80 start-page: 613 year: 2018 ident: 4526_CR43 publication-title: Futur Gener Comput Syst doi: 10.1016/j.future.2016.05.034 – start-page: 7 volume-title: Simulated annealing: theory and applications year: 1987 ident: 4526_CR50 doi: 10.1007/978-94-015-7744-1_2 – year: 2011 ident: 4526_CR56 publication-title: Softw Pract exp doi: 10.1002/spe.995 – volume: 76 start-page: 98 issue: 1 year: 1994 ident: 4526_CR49 publication-title: Eur J Oper Res doi: 10.1016/0377-2217(94)90009-4 – year: 2019 ident: 4526_CR3 publication-title: Future Internet doi: 10.3390/fi11020027 – volume: 29 start-page: 1 issue: 2 year: 2018 ident: 4526_CR24 publication-title: J Comput – volume: 75 start-page: 7174 issue: 11 year: 2019 ident: 4526_CR55 publication-title: J Supercomput doi: 10.1007/s11227-019-02933-3 |
| SSID | ssj0004373 |
| Score | 2.3515384 |
| Snippet | In vehicular ad hoc networks (VANETs), Sybil attacks are serious security problems that can seriously affect the operations of the VANETs by producing fake... |
| SourceID | proquest crossref springer |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 16303 |
| SubjectTerms | Algorithms Arithmetic Compilers Computer Science Cybersecurity Fuzzy control Fuzzy logic Fuzzy sets Interpreters Mobile ad hoc networks Optimization Optimization algorithms Processor Architectures Programming Languages Roadsides Signal strength Signal to noise ratio Simulators |
| Title | Detecting sybil attacks in vehicular ad hoc networks using fuzzy logic and arithmetic optimization algorithm |
| URI | https://link.springer.com/article/10.1007/s11227-022-04526-z https://www.proquest.com/docview/2711890975 |
| Volume | 78 |
| WOSCitedRecordID | wos000790702000002&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAVX databaseName: SpringerLINK Contemporary 1997-Present customDbUrl: eissn: 1573-0484 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0004373 issn: 0920-8542 databaseCode: RSV dateStart: 19970101 isFulltext: true titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22 providerName: Springer Nature |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LT9wwELbKlgMXoC_x1hy4UUvJ5GUfEQ_1hBAtiFtkO2N2pSWLSEDa_fXY3qQRValUzh6PrLE9D818M4wdosgimwjNs0QKnkpLXCg0nGIdVc5mGCxMGDZRXFyI21t52YHCmr7avU9JBk09gN1ixIL76nPfBjznixX20Zk74Qc2XP28GdCQyTKvLF1gJLIUO6jM33m8NkeDj_lHWjRYm_ON951zk6133iUcL5_DJ_aB6s9so5_cAN1H_sKmp-STB44tNHM9mYJqWw-2h0kNzzSehOJUUBWMZwbqZaV4A75G_g7s02Ixh6AyQdUVuGC7Hd97LCTMnP6574CdoKZ3s7D0lV2fn_06-cG7uQvcuGCs5dp73JbySlcmLyizqfX_1OqCKimMJqsiQ2gEKqJMijRztEJWibKOSCfJNzaqZzVtMYiRIsoJc7eSakTlvDFCXaCJSVnMtlnci780XVNyPxtjWg7tlL04SyfOMoizXGyzo997HpYtOf5Jvdffatl9z6bEwsVVMpKFO8D3_haH5be57fwf-S5bw_AQfE3aHhu1j0-0z1bNcztpHg_Cs30BiHnq6g |
| linkProvider | Springer Nature |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3daxQxEA9aC_rSarX0U-ehb21gd_YreRRrqVgP6Rd9W5LspHdw3ZPuttD7601yuy6WKuhzJkOYJPPBzG-GsT0UWWQToXmWSMFTaYkLhYZTrKPK2QyDhQnDJorRSFxdye8dKKzpq937lGTQ1APYLUYsuK8-923Acz5_zl6kzmL5jvmnZ5cDGjJZ5JWlC4xElmIHlXmax-_maPAxH6VFg7U5Wv2_c75mK513CR8Xz-ENe0b1GlvtJzdA95Hfsukh-eSBYwvNg55MQbWtB9vDpIZ7Gk9CcSqoCsYzA_WiUrwBXyN_DfZuPn-AoDJB1RW4YLsd33gsJMyc_rnpgJ2gptezsPSOXRx9Pv90zLu5C9y4YKzl2nvclvJKVyYvKLOp9f_U6oIqKYwmqyJDaAQqokyKNHO0QlaJso5IJ8k6W6pnNW0wiJEiyglzt5JqROW8MUJdoIlJWcw2WdyLvzRdU3I_G2NaDu2UvThLJ84yiLOcb7L9X3t-LFpy_JV6p7_VsvueTYmFi6tkJAt3gIP-FoflP3Pb-jfyD-zl8fm3k_Lky-jrNnuF4VH4-rQdttTe3tEuWzb37aS5fR-e8E-Tge3O |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3dSxwxEA-tLcWXaj9Erdp56Fsb3J39Sh5L9VBaDkFbfFuS7MQ7OPfEWwXvrzfJ7rptsYXS58xmQ5LJzDC_3wxjH1BkkU2E5lkiBU-lJS4UGk6xjipnMwwWJjSbKMZjcX4uT35i8Qe0e5-SbDkNvkpT3exfVXZ_IL7FiAX3SHRfEjzny6fsWeqB9D5eP_0xMCOTNscsXZAkshQ72szjc_xqmgZ_87cUabA8o7X_X_M6e9l5nfC5vSav2BOqX7O1vqMDdAr-hs0OyCcV3C9gcaenM1BN40n4MK3hlibTAFoFVcFkbqBuEeQL8Nj5C7A3y-UdhKcUVF2BC8KbyaXnSMLcvUuXHeET1OxiHobesu-jw7MvR7zrx8CNC9Iarr0nbimvdGXygjKbWq-_VhdUSWE0WRUZQiNQEWVSpJmTFbJKlHVCOkk22Eo9r2mTQYwUUU6Yu5FUIyrnpRHqAk1MymK2xeL-KErTFSv3PTNm5VBm2W9n6bazDNtZLrfYx4dvrtpSHX-V3ulPuOzUdlFi4eItGcnCLeBTf6LD8J9n2_438ffsxcnBqPx2PP76jq1iuBMetrbDVprrG9plz81tM11c74XbfA_0Kfay |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Detecting+sybil+attacks+in+vehicular+ad+hoc+networks+using+fuzzy+logic+and+arithmetic+optimization+algorithm&rft.jtitle=The+Journal+of+supercomputing&rft.au=Maleknasab+Ardakani+Mahdi&rft.au=Tabarzad+Mohammad+Ali&rft.au=Shayegan%2C+Mohammad+Amin&rft.date=2022-09-01&rft.pub=Springer+Nature+B.V&rft.issn=0920-8542&rft.eissn=1573-0484&rft.volume=78&rft.issue=14&rft.spage=16303&rft.epage=16335&rft_id=info:doi/10.1007%2Fs11227-022-04526-z&rft.externalDBID=NO_FULL_TEXT |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0920-8542&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0920-8542&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0920-8542&client=summon |