Detecting sybil attacks in vehicular ad hoc networks using fuzzy logic and arithmetic optimization algorithm

In vehicular ad hoc networks (VANETs), Sybil attacks are serious security problems that can seriously affect the operations of the VANETs by producing fake identities and routes. To deal with this problem, in this paper, we present a cross-layer approach and fuzzy logic-based solution that should be...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:The Journal of supercomputing Jg. 78; H. 14; S. 16303 - 16335
Hauptverfasser: Maleknasab Ardakani, Mahdi, Tabarzad, Mohammad Ali, Shayegan, Mohammad Amin
Format: Journal Article
Sprache:Englisch
Veröffentlicht: New York Springer US 01.09.2022
Springer Nature B.V
Schlagworte:
ISSN:0920-8542, 1573-0484
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Abstract In vehicular ad hoc networks (VANETs), Sybil attacks are serious security problems that can seriously affect the operations of the VANETs by producing fake identities and routes. To deal with this problem, in this paper, we present a cross-layer approach and fuzzy logic-based solution that should be applied in roadside units (RSUs). This scheme applies two fuzzy logic controllers (FLCs), in which the first one considers factors such as vehicles trust, Received signal strength indication (RSSI) difference, vehicle distance, and vehicle angle while the second one utilizes factors such as signal-to-noise ratio, network entry time, number of the neighbors, and buffer size. In addition, the arithmetic optimization algorithm (AOA) is applied for tuning the applied fuzzy sets and selecting the best possible rules in the proposed FLCs to improve their performance. Extensive simulation results were conducted using the NS2 and SUMO simulators for two scenarios, which the first one is allocated for in-town and the other is considered for out-town environments. The achieved results indicate that the proposed Sybil attack detection scheme outperforms other approaches in terms of the various metrics such as false positive rate (FPR), the number of dropped packets, and packet loss ratio are used.
AbstractList In vehicular ad hoc networks (VANETs), Sybil attacks are serious security problems that can seriously affect the operations of the VANETs by producing fake identities and routes. To deal with this problem, in this paper, we present a cross-layer approach and fuzzy logic-based solution that should be applied in roadside units (RSUs). This scheme applies two fuzzy logic controllers (FLCs), in which the first one considers factors such as vehicles trust, Received signal strength indication (RSSI) difference, vehicle distance, and vehicle angle while the second one utilizes factors such as signal-to-noise ratio, network entry time, number of the neighbors, and buffer size. In addition, the arithmetic optimization algorithm (AOA) is applied for tuning the applied fuzzy sets and selecting the best possible rules in the proposed FLCs to improve their performance. Extensive simulation results were conducted using the NS2 and SUMO simulators for two scenarios, which the first one is allocated for in-town and the other is considered for out-town environments. The achieved results indicate that the proposed Sybil attack detection scheme outperforms other approaches in terms of the various metrics such as false positive rate (FPR), the number of dropped packets, and packet loss ratio are used.
Author Shayegan, Mohammad Amin
Maleknasab Ardakani, Mahdi
Tabarzad, Mohammad Ali
Author_xml – sequence: 1
  givenname: Mahdi
  surname: Maleknasab Ardakani
  fullname: Maleknasab Ardakani, Mahdi
  organization: Department of Computer Engineering, Shiraz Branch, Islamic Azad University
– sequence: 2
  givenname: Mohammad Ali
  orcidid: 0000-0002-8368-4414
  surname: Tabarzad
  fullname: Tabarzad, Mohammad Ali
  email: tabarzad@iaushiraz.ac.ir
  organization: Department of Computer Engineering, Shiraz Branch, Islamic Azad University
– sequence: 3
  givenname: Mohammad Amin
  surname: Shayegan
  fullname: Shayegan, Mohammad Amin
  organization: Department of Computer Engineering, Shiraz Branch, Islamic Azad University
BookMark eNp9kE1LAzEQhoMoWKt_wFPA82qS3W02R_EbBC96DtnspE3dJjXJKt1fb9oKggdPwzDPMzO8J-jQeQcInVNySQnhV5FSxnhBGCtIVbNZMR6gCa15mdumOkQTIhgpmrpix-gkxiUhpCp5OUH9LSTQybo5jpvW9lilpPR7xNbhT1hYPfQqYNXhhdfYQfryIQ-HuBXMMI4b3Pu51Vi5Dqtg02IFKbd-nezKjipZ77Dq5343OkVHRvURzn7qFL3d373ePBbPLw9PN9fPhWaVSEXLORMGZl3b6RmH2lSGillpWg6daHQLRhENTDdMAdSiqerMNqIrlclQW5ZTdLHfuw7-Y4CY5NIPweWTknFKG0EErzPV7CkdfIwBjNQ27T5OQdleUiK32cp9tjJnK3fZyjGr7I-6DnalwuZ_qdxLMcNuDuH3q3-sbzVcktE
CitedBy_id crossref_primary_10_1007_s10207_025_01107_y
crossref_primary_10_1080_01969722_2022_2157601
crossref_primary_10_1007_s11831_023_09902_3
crossref_primary_10_1002_spy2_487
crossref_primary_10_1007_s11042_023_17084_0
crossref_primary_10_1080_1206212X_2024_2389476
crossref_primary_10_1007_s11227_023_05597_2
crossref_primary_10_1007_s42979_025_04064_4
crossref_primary_10_1007_s11276_023_03399_1
Cites_doi 10.1016/j.advengsoft.2016.01.008
10.1007/s12652-021-03379-3
10.1002/spe.995
10.1016/j.vehcom.2014.05.001
10.1016/j.eij.2016.11.003
10.1016/j.jnca.2013.02.036
10.1108/02644401211235834
10.1007/978-981-15-7907-3_15
10.1016/j.jnca.2021.103111
10.1016/j.advengsoft.2013.12.007
10.52547/mjee.15.1.9
10.3390/fi11020027
10.1080/02564602.2016.1215270
10.1002/sec.679
10.1016/j.jnca.2017.04.008
10.1080/17445760.2019.1617865
10.1016/j.cma.2020.113609
10.1109/JSAC.2019.2933888
10.1109/TVT.2020.2987526
10.1007/s12083-016-0431-x
10.1007/978-3-319-93025-1_4
10.1002/sec.1642
10.4018/978-1-7998-2570-8.ch009
10.1109/TITS.2015.2439292
10.1007/s11277-019-06836-7
10.1109/ICC.2015.7249492
10.1109/TMC.2018.2833849
10.1145/984622.984660
10.1007/s10462-012-9328-0
10.1002/sec.1539
10.1016/j.adhoc.2019.01.010
10.1145/3267809.3267828
10.1109/ICEEOT.2016.7754777
10.1007/s11277-020-07272-8
10.1109/JIOT.2018.2843769
10.1016/j.asoc.2020.106301
10.1007/s11277-016-3661-6
10.1016/j.procs.2016.02.080
10.1016/j.jnca.2018.07.006
10.1007/s00500-020-05373-x
10.1007/s11276-019-02198-x
10.1016/j.comcom.2014.02.020
10.1007/s10586-020-03184-1
10.3390/s18030878
10.1016/j.jnca.2016.12.025
10.1109/ACCESS.2018.2864111
10.1145/3178212.3178231
10.1109/MCI.2006.329691
10.1016/j.future.2016.05.034
10.1007/978-94-015-7744-1_2
10.1016/0377-2217(94)90009-4
10.1007/s11227-019-02933-3
ContentType Journal Article
Copyright The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022
The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022.
Copyright_xml – notice: The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022
– notice: The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022.
DBID AAYXX
CITATION
JQ2
DOI 10.1007/s11227-022-04526-z
DatabaseName CrossRef
ProQuest Computer Science Collection
DatabaseTitle CrossRef
ProQuest Computer Science Collection
DatabaseTitleList ProQuest Computer Science Collection

DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1573-0484
EndPage 16335
ExternalDocumentID 10_1007_s11227_022_04526_z
GroupedDBID -4Z
-59
-5G
-BR
-EM
-Y2
-~C
.4S
.86
.DC
.VR
06D
0R~
0VY
123
199
1N0
1SB
2.D
203
28-
29L
2J2
2JN
2JY
2KG
2KM
2LR
2P1
2VQ
2~H
30V
4.4
406
408
409
40D
40E
5QI
5VS
67Z
6NX
78A
8TC
8UJ
95-
95.
95~
96X
AAAVM
AABHQ
AACDK
AAHNG
AAIAL
AAJBT
AAJKR
AANZL
AAOBN
AARHV
AARTL
AASML
AATNV
AATVU
AAUYE
AAWCG
AAYIU
AAYOK
AAYQN
AAYTO
AAYZH
ABAKF
ABBBX
ABBXA
ABDBF
ABDPE
ABDZT
ABECU
ABFTD
ABFTV
ABHLI
ABHQN
ABJNI
ABJOX
ABKCH
ABKTR
ABMNI
ABMQK
ABNWP
ABQBU
ABQSL
ABSXP
ABTEG
ABTHY
ABTKH
ABTMW
ABULA
ABWNU
ABXPI
ACAOD
ACBXY
ACDTI
ACGFS
ACHSB
ACHXU
ACKNC
ACMDZ
ACMLO
ACOKC
ACOMO
ACPIV
ACUHS
ACZOJ
ADHHG
ADHIR
ADIMF
ADINQ
ADKNI
ADKPE
ADMLS
ADQRH
ADRFC
ADTPH
ADURQ
ADYFF
ADZKW
AEBTG
AEFIE
AEFQL
AEGAL
AEGNC
AEJHL
AEJRE
AEKMD
AEMSY
AENEX
AEOHA
AEPYU
AESKC
AETLH
AEVLU
AEXYK
AFBBN
AFEXP
AFGCZ
AFLOW
AFQWF
AFWTZ
AFZKB
AGAYW
AGDGC
AGGDS
AGJBK
AGMZJ
AGQEE
AGQMX
AGRTI
AGWIL
AGWZB
AGYKE
AHAVH
AHBYD
AHSBF
AHYZX
AI.
AIAKS
AIGIU
AIIXL
AILAN
AITGF
AJBLW
AJRNO
AJZVZ
ALMA_UNASSIGNED_HOLDINGS
ALWAN
AMKLP
AMXSW
AMYLF
AMYQR
AOCGG
ARCSS
ARMRJ
ASPBG
AVWKF
AXYYD
AYJHY
AZFZN
B-.
B0M
BA0
BBWZM
BDATZ
BGNMA
BSONS
CAG
COF
CS3
CSCUP
DDRTE
DL5
DNIVK
DPUIP
DU5
EAD
EAP
EAS
EBD
EBLON
EBS
EDO
EIOEI
EJD
EMK
EPL
ESBYG
ESX
F5P
FEDTE
FERAY
FFXSO
FIGPU
FINBP
FNLPD
FRRFC
FSGXE
FWDCC
GGCAI
GGRSB
GJIRD
GNWQR
GQ6
GQ7
GQ8
GXS
H13
HF~
HG5
HG6
HMJXF
HQYDN
HRMNR
HVGLF
HZ~
H~9
I-F
I09
IHE
IJ-
IKXTQ
ITM
IWAJR
IXC
IZIGR
IZQ
I~X
I~Z
J-C
J0Z
JBSCW
JCJTX
JZLTJ
KDC
KOV
KOW
LAK
LLZTM
M4Y
MA-
N2Q
N9A
NB0
NDZJH
NPVJJ
NQJWS
NU0
O9-
O93
O9G
O9I
O9J
OAM
OVD
P19
P2P
P9O
PF0
PT4
PT5
QOK
QOS
R4E
R89
R9I
RHV
RNI
ROL
RPX
RSV
RZC
RZE
RZK
S16
S1Z
S26
S27
S28
S3B
SAP
SCJ
SCLPG
SCO
SDH
SDM
SHX
SISQX
SJYHP
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
SZN
T13
T16
TEORI
TSG
TSK
TSV
TUC
TUS
U2A
UG4
UOJIU
UTJUX
UZXMN
VC2
VFIZW
VH1
W23
W48
WH7
WK8
YLTOR
Z45
Z7R
Z7X
Z7Z
Z83
Z88
Z8M
Z8N
Z8R
Z8T
Z8W
Z92
ZMTXR
~8M
~EX
AAPKM
AAYXX
ABBRH
ABDBE
ABFSG
ABJCF
ABRTQ
ACSTC
ADHKG
ADKFA
AEZWR
AFDZB
AFFHD
AFHIU
AFKRA
AFOHR
AGQPQ
AHPBZ
AHWEU
AIXLP
ARAPS
ATHPR
AYFIA
BENPR
BGLVJ
CCPQU
CITATION
HCIFZ
K7-
M7S
PHGZM
PHGZT
PQGLB
PTHSS
JQ2
ID FETCH-LOGICAL-c249t-b7729fe6dbdc67e5f4f1963fb7ed98cbefa0ce2c82aee59845e6d89d3af3fbb33
IEDL.DBID RSV
ISICitedReferencesCount 11
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000790702000002&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 0920-8542
IngestDate Thu Sep 25 00:45:44 EDT 2025
Sat Nov 29 04:27:42 EST 2025
Tue Nov 18 22:22:15 EST 2025
Fri Feb 21 02:45:10 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 14
Keywords Fuzzy logic
VANET
RSSI
Sybil Attacks
Security
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c249t-b7729fe6dbdc67e5f4f1963fb7ed98cbefa0ce2c82aee59845e6d89d3af3fbb33
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-8368-4414
PQID 2711890975
PQPubID 2043774
PageCount 33
ParticipantIDs proquest_journals_2711890975
crossref_citationtrail_10_1007_s11227_022_04526_z
crossref_primary_10_1007_s11227_022_04526_z
springer_journals_10_1007_s11227_022_04526_z
PublicationCentury 2000
PublicationDate 2022-09-01
PublicationDateYYYYMMDD 2022-09-01
PublicationDate_xml – month: 09
  year: 2022
  text: 2022-09-01
  day: 01
PublicationDecade 2020
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationSubtitle An International Journal of High-Performance Computer Design, Analysis, and Use
PublicationTitle The Journal of supercomputing
PublicationTitleAbbrev J Supercomput
PublicationYear 2022
Publisher Springer US
Springer Nature B.V
Publisher_xml – name: Springer US
– name: Springer Nature B.V
References Mishra (CR27) 2018; 6
Saif Al-Sultan, Moath, Al-Doori, Al-Bayatti (CR6) 2014
Monica (CR60) 2009
Abualigah (CR28) 2021; 376
Singh (CR4) 2018
Mirjalili, Mirjalili, Lewis (CR64) 2014
CR38
Engoulou (CR10) 2014; 44
Hamdan, Hudaib, Awajan (CR36) 2021; 36
Mirjalili, Lewis (CR65) 2016
Van Laarhoven, Aarts (CR50) 1987
Yao (CR45) 2019; 37
Mejri, Ben-Othman, Hamdi (CR2) 2014
Iwendi (CR30) 2018; 6
Masdari, Barshande, Ozdemir (CR55) 2019; 75
Masdari, Ahmadzadeh, Bidaki (CR25) 2017; 91
Masdari, Jalali (CR11) 2016; 9
Velayudhan, Anitha, Madanan (CR33) 2021; 122
Masdari (CR20) 2011; 1
Qu (CR12) 2015; 16
Costa (CR49) 1994; 76
CR8
Karaboga (CR54) 2014; 42
Feng (CR35) 2017; 10
CR47
Sumra, Hasbullah J-l, AbManan (CR9) 2015; 51
CR44
Hasrouny (CR1) 2017; 7
Masdari, Ahmadzadeh (CR26) 2016; 9
Karimi, Sadeghi (CR63) 2021; 15
Faisal, Zaidi (CR39) 2020; 22
Vasudeva, Sood (CR23) 2018; 120
Mirjalili (CR48) 2019
Ganeshkumar, Sanjay (CR7) 2021
Feng, Tang (CR41) 2017; 22
Yang, Gandomi (CR53) 2012
Masdari (CR61) 2017
CR15
CR58
Grover, Gaur, Laxmi (CR14) 2016
CR57
Jafarian (CR19) 2021; 24
Masdari (CR21) 2017; 80
Rajadurai, Gandhi (CR42) 2020; 110
Jan (CR43) 2018; 80
Ayaida (CR29) 2019; 90
CR51
Tyagi, Dembla (CR59) 2017
Masdari, Bidaki, Naghiloo (CR62) 2017; 94
Sefati, Tabrizi (CR34) 2021; 123
Zeeshan, Naz, Jamil (CR5) 2020; 26
Velayudhan, Anitha, Madanan (CR32) 2021
Bhise, Kamble (CR16) 2016; 78
Hosseinzadeh (CR46) 2021; 25
Yao (CR31) 2018; 18
Arena, Pau (CR3) 2019
Parham, Pouyan (CR37) 2020; 113
Masdari, Khezri (CR17) 2020; 92
Lee (CR18) 2021
Calheiros (CR56) 2011
CR22
Abdulkader (CR24) 2018; 29
Dorigo, Birattari, Stutzle (CR52) 2006; 1
Park (CR40) 2013; 6
Sharma, Kaul (CR13) 2018; 12
A Vasudeva (4526_CR23) 2018; 120
NC Velayudhan (4526_CR33) 2021; 122
P Tyagi (4526_CR59) 2017
M Masdari (4526_CR61) 2017
T Jafarian (4526_CR19) 2021; 24
S Mirjalili (4526_CR48) 2019
RG Engoulou (4526_CR10) 2014; 44
M Masdari (4526_CR55) 2019; 75
4526_CR22
Y Yao (4526_CR31) 2018; 18
M Masdari (4526_CR17) 2020; 92
X Feng (4526_CR41) 2017; 22
D Monica (4526_CR60) 2009
C Iwendi (4526_CR30) 2018; 6
M Masdari (4526_CR62) 2017; 94
M Masdari (4526_CR21) 2017; 80
S Mirjalili (4526_CR65) 2016
M Ayaida (4526_CR29) 2019; 90
M Masdari (4526_CR20) 2011; 1
4526_CR58
N Ganeshkumar (4526_CR7) 2021
4526_CR8
4526_CR15
4526_CR57
4526_CR51
J Grover (4526_CR14) 2016
M Dorigo (4526_CR52) 2006; 1
H Rajadurai (4526_CR42) 2020; 110
X Feng (4526_CR35) 2017; 10
AM Bhise (4526_CR16) 2016; 78
M Karimi (4526_CR63) 2021; 15
S Sharma (4526_CR13) 2018; 12
Y Yao (4526_CR45) 2019; 37
F Qu (4526_CR12) 2015; 16
4526_CR47
XS Yang (4526_CR53) 2012
SS Sefati (4526_CR34) 2021; 123
4526_CR44
M Masdari (4526_CR11) 2016; 9
RN Calheiros (4526_CR56) 2011
N Saif Al-Sultan (4526_CR6) 2014
M Masdari (4526_CR26) 2016; 9
MN Mejri (4526_CR2) 2014
S Hamdan (4526_CR36) 2021; 36
S Park (4526_CR40) 2013; 6
MA Jan (4526_CR43) 2018; 80
NC Velayudhan (4526_CR32) 2021
M Parham (4526_CR37) 2020; 113
IA Sumra (4526_CR9) 2015; 51
PJ Van Laarhoven (4526_CR50) 1987
A Zeeshan (4526_CR5) 2020; 26
L Abualigah (4526_CR28) 2021; 376
M Hosseinzadeh (4526_CR46) 2021; 25
ZA Abdulkader (4526_CR24) 2018; 29
F Arena (4526_CR3) 2019
4526_CR38
GD Singh (4526_CR4) 2018
D Costa (4526_CR49) 1994; 76
D Karaboga (4526_CR54) 2014; 42
H Hasrouny (4526_CR1) 2017; 7
M Masdari (4526_CR25) 2017; 91
S Mirjalili (4526_CR64) 2014
SW Lee (4526_CR18) 2021
SM Faisal (4526_CR39) 2020; 22
AK Mishra (4526_CR27) 2018; 6
References_xml – volume: 16
  start-page: 2985
  issue: 6
  year: 2015
  end-page: 2996
  ident: CR12
  article-title: A security and privacy review of VANETs
  publication-title: IEEE Trans Intell Transp Syst
– start-page: 329
  year: 2018
  end-page: 340
  ident: CR4
  publication-title: A review on VANET routing protocols and wireless standards in smart computing and informatics
– ident: CR22
– year: 2016
  ident: CR65
  article-title: The whale optimization algorithm
  publication-title: Adv Eng Softw
  doi: 10.1016/j.advengsoft.2016.01.008
– volume: 80
  start-page: 79
  year: 2017
  end-page: 89
  ident: CR21
  article-title: Markov chain-based evaluation of the certificate status validations in hybrid MANETs
  publication-title: J Netw Comput Appl
– volume: 94
  start-page: 977
  issue: 3
  year: 2017
  end-page: 1001
  ident: CR62
  article-title: Comprehensive evaluation of the localized certificate revocation in mobile ad hoc network
  publication-title: Wireless Pers Commun
– volume: 12
  start-page: 138
  year: 2018
  end-page: 164
  ident: CR13
  article-title: A survey on intrusion detection systems and honeypot based proactive security mechanisms in VANETs and VANET Cloud
  publication-title: Veh commun
– volume: 18
  start-page: 362
  issue: 2
  year: 2018
  end-page: 375
  ident: CR31
  article-title: Multi-channel based Sybil attack detection in vehicular ad hoc networks using RSSI
  publication-title: IEEE Trans Mob Comput
– volume: 22
  start-page: 397
  issue: 3
  year: 2020
  end-page: 408
  ident: CR39
  article-title: Timestamp based detection of sybil attack in VANET
  publication-title: Int J Netw Secur
– ident: CR51
– volume: 75
  start-page: 7174
  issue: 11
  year: 2019
  end-page: 7208
  ident: CR55
  article-title: CDABC: chaotic discrete artificial bee colony algorithm for multi-level clustering in large-scale WSNs
  publication-title: J Supercomput
– volume: 9
  start-page: 3724
  issue: 16
  year: 2016
  end-page: 3751
  ident: CR11
  article-title: A survey and taxonomy of DoS attacks in cloud computing
  publication-title: Sec Commun Net
– year: 2021
  ident: CR32
  article-title: Sybil attack detection and secure data transmission in VANET using CMEHA-DNN and MD5-ECC
  publication-title: J Ambient Intell Human Comput
  doi: 10.1007/s12652-021-03379-3
– volume: 36
  start-page: 69
  issue: 2
  year: 2021
  end-page: 79
  ident: CR36
  article-title: Detecting Sybil attacks in vehicular ad hoc networks
  publication-title: Int J Parallel Emergent Distrib Syst
– year: 2011
  ident: CR56
  article-title: CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms
  publication-title: Softw Pract exp
  doi: 10.1002/spe.995
– volume: 44
  start-page: 1
  year: 2014
  end-page: 13
  ident: CR10
  article-title: VANET security surveys
  publication-title: Comput Commun
– year: 2014
  ident: CR2
  article-title: Survey on VANET security challenges and possible cryptographic solutions
  publication-title: Veh Commun
  doi: 10.1016/j.vehcom.2014.05.001
– ident: CR8
– ident: CR58
– volume: 78
  start-page: 395
  year: 2016
  end-page: 401
  ident: CR16
  article-title: Review on detection and mitigation of Sybil attack in the network
  publication-title: Procedia Comput Sci
– volume: 110
  start-page: 2179
  issue: 4
  year: 2020
  end-page: 2193
  ident: CR42
  article-title: Fuzzy based collaborative verification system for Sybil attack detection in MANET
  publication-title: Wireless Pers Commun
– year: 2017
  ident: CR59
  article-title: Performance analysis and implementation of proposed mechanism for detection and prevention of security attacks in routing protocols of vehicular ad-hoc network (VANET)
  publication-title: Egypt Informat J
  doi: 10.1016/j.eij.2016.11.003
– volume: 76
  start-page: 98
  issue: 1
  year: 1994
  end-page: 110
  ident: CR49
  article-title: tabu search algorithm for computing an operational timetable
  publication-title: Eur J Oper Res
– ident: CR15
– volume: 1
  start-page: 1
  year: 2011
  end-page: 12
  ident: CR20
  article-title: (2011)A survey and taxonomy of distributed certificate authorities in mobile ad hoc networks
  publication-title: EURASIP J Wirel Commun Net
– volume: 122
  start-page: 1
  issue: 4
  year: 2021
  end-page: 29
  ident: CR33
  article-title: Sybil Attack with RSU detection and location privacy in urban VANETs: an efficient EPORP technique
  publication-title: Wire Pers Commun
– volume: 123
  start-page: 1
  issue: 3
  year: 2021
  end-page: 21
  ident: CR34
  article-title: Detecting sybil attack in vehicular Ad-hoc networks (Vanets) by using fitness function signal strength index and throughput
  publication-title: Wire Pers Commun
– ident: CR57
– volume: 91
  start-page: 36
  year: 2017
  end-page: 51
  ident: CR25
  article-title: Key management in wireless body area network: challenges and issues
  publication-title: J Netw Comput Appl
– volume: 26
  start-page: 2905
  issue: 4
  year: 2020
  end-page: 2914
  ident: CR5
  article-title: Minimizing transmission delays in vehicular ad hoc networks by optimized placement of road-side unit
  publication-title: Wireless Netw
– volume: 25
  start-page: 3195
  issue: 4
  year: 2021
  end-page: 3223
  ident: CR46
  article-title: Improving security using SVM-based anomaly detection: issues and challenges
  publication-title: Soft Comput
– year: 2014
  ident: CR6
  article-title: A comprehensive survey on vehicular ad hoc network
  publication-title: J Netw Comput Appl
  doi: 10.1016/j.jnca.2013.02.036
– volume: 7
  start-page: 7
  year: 2017
  end-page: 20
  ident: CR1
  article-title: VANet security challenges and solutions: A survey
  publication-title: Veh Commun
– volume: 113
  start-page: 1149
  issue: 2
  year: 2020
  end-page: 1182
  ident: CR37
  article-title: An effective privacy-aware Sybil attack detection scheme for secure communication in vehicular ad hoc network
  publication-title: Wireless Pers Commun
– volume: 80
  start-page: 613
  year: 2018
  end-page: 626
  ident: CR43
  article-title: A Sybil attack detection scheme for a forest wildfire monitoring application
  publication-title: Futur Gener Comput Syst
– volume: 90
  year: 2019
  ident: CR29
  article-title: A macroscopic traffic model-based approach for sybil attack detection in VANETs
  publication-title: Ad Hoc Netw
– year: 2012
  ident: CR53
  article-title: Bat algorithm: a novel approach for global engineering optimization
  publication-title: Eng Comput
  doi: 10.1108/02644401211235834
– year: 2021
  ident: CR7
  article-title: Obu (on-board unit) wireless devices in vanet (s) for effective communication—A review
  publication-title: Computational Methods and Data Engineering
  doi: 10.1007/978-981-15-7907-3_15
– ident: CR47
– volume: 376
  year: 2021
  ident: CR28
  article-title: The arithmetic optimization algorithm
  publication-title: Comput Method Appl Mech Eng
– volume: 9
  start-page: 4777
  issue: 17
  year: 2016
  end-page: 4803
  ident: CR26
  article-title: Comprehensive analysis of the authentication methods in wireless body area networks
  publication-title: Sec commun Net
– year: 2021
  ident: CR18
  article-title: Towards secure intrusion detection systems using deep learning techniques: comprehensive analysis and review
  publication-title: J Netw Comput Appl
  doi: 10.1016/j.jnca.2021.103111
– year: 2009
  ident: CR60
  publication-title: Thwarting the sybil attack in wireless ad hoc networks
– volume: 10
  start-page: 305
  issue: 2
  year: 2017
  end-page: 314
  ident: CR35
  article-title: A method for defensing against multi-source Sybil attacks in VANET
  publication-title: Peer-to-Peer Net Appl
– volume: 92
  year: 2020
  ident: CR17
  article-title: A survey and taxonomy of the fuzzy signature-based intrusion detection systems
  publication-title: Appl Soft Comput
– start-page: 287
  year: 2016
  end-page: 312
  ident: CR14
  publication-title: Sybil attack in VANETs: detection and prevention in security of self-organizing networks
– year: 2014
  ident: CR64
  article-title: Grey wolf optimizer
  publication-title: Adv Eng Softw
  doi: 10.1016/j.advengsoft.2013.12.007
– volume: 42
  start-page: 21
  issue: 1
  year: 2014
  end-page: 57
  ident: CR54
  article-title: A comprehensive survey: artificial bee colony (ABC) algorithm and applications
  publication-title: Artif Intell Rev
– volume: 24
  start-page: 1235
  issue: 2
  year: 2021
  end-page: 1253
  ident: CR19
  article-title: A survey and classification of the security anomaly detection mechanisms in software defined networks
  publication-title: Clust Comput
– volume: 29
  start-page: 1
  issue: 2
  year: 2018
  end-page: 6
  ident: CR24
  article-title: A survey on sybil attack detection in vehicular ad hoc networks (VANET)
  publication-title: J Comput
– ident: CR44
– start-page: 7
  year: 1987
  end-page: 15
  ident: CR50
  publication-title: Simulated annealing: theory and applications
– volume: 1
  start-page: 28
  issue: 4
  year: 2006
  end-page: 39
  ident: CR52
  article-title: Ant colony optimization
  publication-title: IEEE Comput Intell Mag
– volume: 22
  start-page: 1
  year: 2017
  end-page: 11
  ident: CR41
  article-title: Obfuscated RSUs vector based signature scheme for detecting conspiracy Sybil attack in VANETs
  publication-title: Mob Inf Syst
– ident: CR38
– volume: 15
  start-page: 9
  issue: 1
  year: 2021
  ident: CR63
  article-title: Improvement of Sybil attack detection in vehicular ad-Hoc networks using cross-layer and fuzzy Logic
  publication-title: Majlesi J Elect Eng
  doi: 10.52547/mjee.15.1.9
– year: 2019
  ident: CR3
  article-title: An overview of vehicular communications
  publication-title: Future Internet
  doi: 10.3390/fi11020027
– volume: 120
  start-page: 78
  year: 2018
  end-page: 118
  ident: CR23
  article-title: Survey on sybil attack defense mechanisms in wireless ad hoc networks
  publication-title: J Netw Comput Appl
– start-page: 43
  year: 2019
  end-page: 55
  ident: CR48
  publication-title: Genetic algorithm in evolutionary algorithms and neural networks
– volume: 6
  start-page: 523
  issue: 4
  year: 2013
  end-page: 538
  ident: CR40
  article-title: Defense against Sybil attack in the initial deployment stage of vehicular ad hoc network based on roadside unit support
  publication-title: Sec Commun Net
– volume: 6
  start-page: 379
  issue: 1
  year: 2018
  end-page: 387
  ident: CR27
  article-title: Analytical model for sybil attack phases in internet of things
  publication-title: IEEE Internet Things J
– volume: 37
  start-page: 2588
  issue: 11
  year: 2019
  end-page: 2602
  ident: CR45
  article-title: Power control identification: a novel Sybil attack detection scheme in VANETs using RSSI
  publication-title: IEEE J Sel Areas Commun
– volume: 6
  start-page: 47258
  year: 2018
  end-page: 47267
  ident: CR30
  article-title: On detection of Sybil attack in large-scale VANETs using spider-monkey technique
  publication-title: IEEE Access
– volume: 51
  start-page: 61
  year: 2015
  ident: CR9
  article-title: Attacks on security goals confidentiality, integrity, availability in VANET: a survey in vehicular ad-hoc networks for smart cities springer
  publication-title: London
– year: 2017
  ident: CR61
  article-title: Towards secure localized certificate revocation in mobile ad-hoc networks
  publication-title: IETE Tech Rev
  doi: 10.1080/02564602.2016.1215270
– volume: 6
  start-page: 523
  issue: 4
  year: 2013
  ident: 4526_CR40
  publication-title: Sec Commun Net
  doi: 10.1002/sec.679
– start-page: 287
  volume-title: Sybil attack in VANETs: detection and prevention in security of self-organizing networks
  year: 2016
  ident: 4526_CR14
– volume: 91
  start-page: 36
  year: 2017
  ident: 4526_CR25
  publication-title: J Netw Comput Appl
  doi: 10.1016/j.jnca.2017.04.008
– volume: 36
  start-page: 69
  issue: 2
  year: 2021
  ident: 4526_CR36
  publication-title: Int J Parallel Emergent Distrib Syst
  doi: 10.1080/17445760.2019.1617865
– year: 2014
  ident: 4526_CR64
  publication-title: Adv Eng Softw
  doi: 10.1016/j.advengsoft.2013.12.007
– volume: 376
  year: 2021
  ident: 4526_CR28
  publication-title: Comput Method Appl Mech Eng
  doi: 10.1016/j.cma.2020.113609
– year: 2012
  ident: 4526_CR53
  publication-title: Eng Comput
  doi: 10.1108/02644401211235834
– volume: 1
  start-page: 1
  year: 2011
  ident: 4526_CR20
  publication-title: EURASIP J Wirel Commun Net
– volume: 37
  start-page: 2588
  issue: 11
  year: 2019
  ident: 4526_CR45
  publication-title: IEEE J Sel Areas Commun
  doi: 10.1109/JSAC.2019.2933888
– ident: 4526_CR8
  doi: 10.1109/TVT.2020.2987526
– volume: 22
  start-page: 397
  issue: 3
  year: 2020
  ident: 4526_CR39
  publication-title: Int J Netw Secur
– volume: 10
  start-page: 305
  issue: 2
  year: 2017
  ident: 4526_CR35
  publication-title: Peer-to-Peer Net Appl
  doi: 10.1007/s12083-016-0431-x
– start-page: 43
  volume-title: Genetic algorithm in evolutionary algorithms and neural networks
  year: 2019
  ident: 4526_CR48
  doi: 10.1007/978-3-319-93025-1_4
– year: 2014
  ident: 4526_CR6
  publication-title: J Netw Comput Appl
  doi: 10.1016/j.jnca.2013.02.036
– volume: 9
  start-page: 4777
  issue: 17
  year: 2016
  ident: 4526_CR26
  publication-title: Sec commun Net
  doi: 10.1002/sec.1642
– year: 2014
  ident: 4526_CR2
  publication-title: Veh Commun
  doi: 10.1016/j.vehcom.2014.05.001
– ident: 4526_CR22
  doi: 10.4018/978-1-7998-2570-8.ch009
– volume: 16
  start-page: 2985
  issue: 6
  year: 2015
  ident: 4526_CR12
  publication-title: IEEE Trans Intell Transp Syst
  doi: 10.1109/TITS.2015.2439292
– volume: 110
  start-page: 2179
  issue: 4
  year: 2020
  ident: 4526_CR42
  publication-title: Wireless Pers Commun
  doi: 10.1007/s11277-019-06836-7
– ident: 4526_CR58
  doi: 10.1109/ICC.2015.7249492
– volume: 18
  start-page: 362
  issue: 2
  year: 2018
  ident: 4526_CR31
  publication-title: IEEE Trans Mob Comput
  doi: 10.1109/TMC.2018.2833849
– ident: 4526_CR47
  doi: 10.1145/984622.984660
– volume: 42
  start-page: 21
  issue: 1
  year: 2014
  ident: 4526_CR54
  publication-title: Artif Intell Rev
  doi: 10.1007/s10462-012-9328-0
– volume: 9
  start-page: 3724
  issue: 16
  year: 2016
  ident: 4526_CR11
  publication-title: Sec Commun Net
  doi: 10.1002/sec.1539
– volume: 90
  year: 2019
  ident: 4526_CR29
  publication-title: Ad Hoc Netw
  doi: 10.1016/j.adhoc.2019.01.010
– ident: 4526_CR57
  doi: 10.1145/3267809.3267828
– volume: 123
  start-page: 1
  issue: 3
  year: 2021
  ident: 4526_CR34
  publication-title: Wire Pers Commun
– volume: 15
  start-page: 9
  issue: 1
  year: 2021
  ident: 4526_CR63
  publication-title: Majlesi J Elect Eng
  doi: 10.52547/mjee.15.1.9
– year: 2017
  ident: 4526_CR59
  publication-title: Egypt Informat J
  doi: 10.1016/j.eij.2016.11.003
– volume: 22
  start-page: 1
  year: 2017
  ident: 4526_CR41
  publication-title: Mob Inf Syst
– ident: 4526_CR15
  doi: 10.1109/ICEEOT.2016.7754777
– volume: 113
  start-page: 1149
  issue: 2
  year: 2020
  ident: 4526_CR37
  publication-title: Wireless Pers Commun
  doi: 10.1007/s11277-020-07272-8
– year: 2021
  ident: 4526_CR18
  publication-title: J Netw Comput Appl
  doi: 10.1016/j.jnca.2021.103111
– volume: 6
  start-page: 379
  issue: 1
  year: 2018
  ident: 4526_CR27
  publication-title: IEEE Internet Things J
  doi: 10.1109/JIOT.2018.2843769
– year: 2016
  ident: 4526_CR65
  publication-title: Adv Eng Softw
  doi: 10.1016/j.advengsoft.2016.01.008
– volume: 92
  year: 2020
  ident: 4526_CR17
  publication-title: Appl Soft Comput
  doi: 10.1016/j.asoc.2020.106301
– volume: 94
  start-page: 977
  issue: 3
  year: 2017
  ident: 4526_CR62
  publication-title: Wireless Pers Commun
  doi: 10.1007/s11277-016-3661-6
– year: 2017
  ident: 4526_CR61
  publication-title: IETE Tech Rev
  doi: 10.1080/02564602.2016.1215270
– volume: 122
  start-page: 1
  issue: 4
  year: 2021
  ident: 4526_CR33
  publication-title: Wire Pers Commun
– year: 2021
  ident: 4526_CR7
  publication-title: Computational Methods and Data Engineering
  doi: 10.1007/978-981-15-7907-3_15
– volume: 12
  start-page: 138
  year: 2018
  ident: 4526_CR13
  publication-title: Veh commun
– volume: 78
  start-page: 395
  year: 2016
  ident: 4526_CR16
  publication-title: Procedia Comput Sci
  doi: 10.1016/j.procs.2016.02.080
– volume: 120
  start-page: 78
  year: 2018
  ident: 4526_CR23
  publication-title: J Netw Comput Appl
  doi: 10.1016/j.jnca.2018.07.006
– volume-title: Thwarting the sybil attack in wireless ad hoc networks
  year: 2009
  ident: 4526_CR60
– year: 2021
  ident: 4526_CR32
  publication-title: J Ambient Intell Human Comput
  doi: 10.1007/s12652-021-03379-3
– volume: 25
  start-page: 3195
  issue: 4
  year: 2021
  ident: 4526_CR46
  publication-title: Soft Comput
  doi: 10.1007/s00500-020-05373-x
– volume: 26
  start-page: 2905
  issue: 4
  year: 2020
  ident: 4526_CR5
  publication-title: Wireless Netw
  doi: 10.1007/s11276-019-02198-x
– volume: 44
  start-page: 1
  year: 2014
  ident: 4526_CR10
  publication-title: Comput Commun
  doi: 10.1016/j.comcom.2014.02.020
– volume: 7
  start-page: 7
  year: 2017
  ident: 4526_CR1
  publication-title: Veh Commun
– start-page: 329
  volume-title: A review on VANET routing protocols and wireless standards in smart computing and informatics
  year: 2018
  ident: 4526_CR4
– volume: 24
  start-page: 1235
  issue: 2
  year: 2021
  ident: 4526_CR19
  publication-title: Clust Comput
  doi: 10.1007/s10586-020-03184-1
– ident: 4526_CR44
  doi: 10.3390/s18030878
– ident: 4526_CR51
– volume: 51
  start-page: 61
  year: 2015
  ident: 4526_CR9
  publication-title: London
– volume: 80
  start-page: 79
  year: 2017
  ident: 4526_CR21
  publication-title: J Netw Comput Appl
  doi: 10.1016/j.jnca.2016.12.025
– volume: 6
  start-page: 47258
  year: 2018
  ident: 4526_CR30
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2018.2864111
– ident: 4526_CR38
  doi: 10.1145/3178212.3178231
– volume: 1
  start-page: 28
  issue: 4
  year: 2006
  ident: 4526_CR52
  publication-title: IEEE Comput Intell Mag
  doi: 10.1109/MCI.2006.329691
– volume: 80
  start-page: 613
  year: 2018
  ident: 4526_CR43
  publication-title: Futur Gener Comput Syst
  doi: 10.1016/j.future.2016.05.034
– start-page: 7
  volume-title: Simulated annealing: theory and applications
  year: 1987
  ident: 4526_CR50
  doi: 10.1007/978-94-015-7744-1_2
– year: 2011
  ident: 4526_CR56
  publication-title: Softw Pract exp
  doi: 10.1002/spe.995
– volume: 76
  start-page: 98
  issue: 1
  year: 1994
  ident: 4526_CR49
  publication-title: Eur J Oper Res
  doi: 10.1016/0377-2217(94)90009-4
– year: 2019
  ident: 4526_CR3
  publication-title: Future Internet
  doi: 10.3390/fi11020027
– volume: 29
  start-page: 1
  issue: 2
  year: 2018
  ident: 4526_CR24
  publication-title: J Comput
– volume: 75
  start-page: 7174
  issue: 11
  year: 2019
  ident: 4526_CR55
  publication-title: J Supercomput
  doi: 10.1007/s11227-019-02933-3
SSID ssj0004373
Score 2.3515384
Snippet In vehicular ad hoc networks (VANETs), Sybil attacks are serious security problems that can seriously affect the operations of the VANETs by producing fake...
SourceID proquest
crossref
springer
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 16303
SubjectTerms Algorithms
Arithmetic
Compilers
Computer Science
Cybersecurity
Fuzzy control
Fuzzy logic
Fuzzy sets
Interpreters
Mobile ad hoc networks
Optimization
Optimization algorithms
Processor Architectures
Programming Languages
Roadsides
Signal strength
Signal to noise ratio
Simulators
Title Detecting sybil attacks in vehicular ad hoc networks using fuzzy logic and arithmetic optimization algorithm
URI https://link.springer.com/article/10.1007/s11227-022-04526-z
https://www.proquest.com/docview/2711890975
Volume 78
WOSCitedRecordID wos000790702000002&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAVX
  databaseName: SpringerLINK Contemporary 1997-Present
  customDbUrl:
  eissn: 1573-0484
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0004373
  issn: 0920-8542
  databaseCode: RSV
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22
  providerName: Springer Nature
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LT8MwDI5gcODCeIrBQD5wg0h9pz0iYOI0IV7arcpzmzRatHaTtl9PkrVUIECCc1yrcmzHlv3ZCJ1Txc2QEIZd7jg4kDLCNBAS-zR0fWIKdSKwyyZIvx8PBsl9BQor6m73uiRpPXUDdnM9j2DTfW7GgEd4uY429HMXm4UND48vDRrSX9WVE50YxWHgVVCZ73l8fo6aGPNLWdS-Nr32__5zB21X0SVcrdRhF63JbA-1680NUBnyPprcSFM80GyhWLDxBGhZGrA9jDOYy9HYNqcCFTDKOWSrTvECTI_8ENRsuVyAdZlAMwE62S5HrwYLCbn2P68VsBPoZJjbowP03Lt9ur7D1d4FzHUyVmJmIm4lI8EEj4gMVaCMnSpGpEhizqSiDpcejz0qZZjEQahp40T4VGki5vuHqJXlmTxC4HGVyCh2VeiwQOlgzBGMMJdwzlw3YlEHubX4U14NJTe7MSZpM07ZiDPV4kytONNlB118fPO2GsnxK3W3vtW0Ms8i9YjOqxInIWEHXda32Bz_zO34b-QnaMuzimB60rqoVU5n8hRt8nk5LqZnVm3fARzw6xw
linkProvider Springer Nature
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3db9NADLdYQRovlPEhCh34gTd2Ur4veZzGqiJKNUGZ-hbdZ1upTVGTTlr_-t1dk0VDA2l7PseKfLbPlv2zAT4zLeyQEE584XkkUiohLJKKhCz2Q2oLdTJyyyboeJxOp9lFDQorm273piTpPHULdvODgBLbfW7HgCdkdwBPI_Ni2Yn5P39dtmjIcF9XzkxilMZRUENl7udx9zlqY8y_yqLutRl0H_efL-FFHV3i6V4djuCJKl5Bt9ncgLUhv4blV2WLB4Ytltd8sURWVRZsj4sCr9R84ZpTkUmcrwUW-07xEm2P_Az1dre7RucykRUSTbJdzVcWC4lr439WNbAT2XK2dkdv4PfgfHI2JPXeBSJMMlYRbiNurRLJpUioinWkrZ1qTpXMUsGVZp5QgUgDplScpVFsaNNMhkwbIh6Gb6FTrAv1DjAQOlNJ6uvY45E2wZgnOeU-FYL7fsKTHviN-HNRDyW3uzGWeTtO2YozN-LMnTjzXQ--3H7zZz-S47_U_eZW89o8yzygJq_KvIzGPThpbrE9_je39w8j_wSHw8mPUT76Nv7-AZ4HTilsf1ofOtVmq47hmbiqFuXmo1PhGypQ7gA
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LSyQxEC5cXRYvvlZxfNbBmxvsd7qPog6KMgg-8NbkOTMw9ojTCs6vN0l32yqusOw51UlTSSVV1PdVAewxLWyREE584XkkUiohLJKKhCz2Q2oTdTJyzSZor5fe3WWX71j8Du3epCQrToOt0lSUBw9SH7TENz8IKLFIdFsSPCHTHzAXWSC9jdevbltmZFjlmDMTJKVxFNS0ma_n-Pg0tf7mpxSpe3m6i___z0uwUHudeFgdk2WYUcUKLDYdHbA28N8wOlY2qWCWwMkLH46QlaUl4eOwwGc1GDrQKjKJg7HAokKQT9Bi5_uon6bTF3RXKbJCognCy8G95Uji2NxL9zXhE9moP3ZDq3DTPbk-OiV1PwYiTJBWEm49ca0SyaVIqIp1pK39ak6VzFLBlWaeUIFIA6ZUnKVRbGTTTIZMGyEehmswW4wLtQ4YCJ2pJPV17PFIGyfNk5xynwrBfT_hSQf8ZityURcrtz0zRnlbZtmqMzfqzJ0682kH9t--eahKdXwrvdXscF6b7SQPqIm3Mi-jcQf-NDvaDv99to1_E9-FX5fH3fzirHe-CfOBOxMWtrYFs-Xjk9qGn-K5HE4ed9xpfgWObvbk
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Detecting+sybil+attacks+in+vehicular+ad+hoc+networks+using+fuzzy+logic+and+arithmetic+optimization+algorithm&rft.jtitle=The+Journal+of+supercomputing&rft.au=Maleknasab+Ardakani%2C+Mahdi&rft.au=Tabarzad%2C+Mohammad+Ali&rft.au=Shayegan%2C+Mohammad+Amin&rft.date=2022-09-01&rft.issn=0920-8542&rft.eissn=1573-0484&rft.volume=78&rft.issue=14&rft.spage=16303&rft.epage=16335&rft_id=info:doi/10.1007%2Fs11227-022-04526-z&rft.externalDBID=n%2Fa&rft.externalDocID=10_1007_s11227_022_04526_z
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0920-8542&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0920-8542&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0920-8542&client=summon