Journal of Machine and Computing


Sybil Attack Detection in VANET Using CNN Enhanced with Chaotic Maps and Elephant Herding Optimization for Secure Data Transmission



Journal of Machine and Computing

Received On : 08 October 2024

Revised On : 23 January 2025

Accepted On : 25 March 2025

Published On : 05 April 2025

Volume 05, Issue 02

Pages : 1233-1247


Abstract


The Vehicular Ad-Hoc Network (VANET) model stands out as a cost-effective and easily deployable solution for traffic management and accident prevention. Within VANET, nodes employ broadcast protocols for disseminating safety information rather than relying on routing protocols. Nonetheless, there exists a vulnerability to malicious activities, such as targeted attacks where a vehicle may intentionally transmit harmful packets to cause harm. Among these, the Sybil attack (SA) poses the most severe threat, wherein the attacker creates multiple identities to impersonate distinct nodes. Detecting and defending against such attacks, particularly when perpetrators operate under genuine identities, presents significant challenges. To mitigate this issue, a deep learning-based intrusion detection system (IDS) has been proposed for effectively identifying SA in VANET. The system employs a clustering algorithm known as Glow Worm Swarm Optimization (Gon SO)-based K-harmonic means (GSOKHM) for vehicle clustering. Subsequently, it utilizes the Floyd-Warshall algorithm (FWA) to designate Cluster Heads (CH) from these clusters. Following CH selection, our advanced CMEHA-CNN algorithm utilizes a combination of Convolutional Neural Network (CNN) and chaotic maps to detect any malicious CH. This entails extracting pertinent features from the CH. Upon confirming the legitimacy of the CH, its information is firmly transmitted to the cloud by means of SHA2-ECC, a fusion of Secure Hashing Algorithm and Elliptic Curve Cryptography. The simulation (NS-2.35) outcomes of our proposed methodology achieves an impressive accuracy rate of 98.9% and ensures a high level of security at 99%, surpassing existing methodologies.


Keywords


Intrusion Detection System, Vehicular Adhoc Networks (VANET), Optimisation, Sybil Attack Detection and Deep Learning Safe Hash Algorithm (SHA), Elephant Herding Algorithm (EHA).


  1. M. H. Alwan, K. N. Ramli, Y. A. Al-Jawher, A. Z. Sameen, and H. F. Mahdi, “Performance comparison between 802.11 and 802.11p for high-speed vehicle in VANET,” International Journal of Electrical and Computer Engineering (IJECE), vol. 9, no. 5, p. 3687, Oct. 2019, doi: 10.11591/ijece. v9i5.pp3687-3694.
  2. M. N. Mejri, J. Ben-Othman, and M. Hamdi, “Survey on VANET security challenges and possible cryptographic solutions,” Vehicular Communications, vol. 1, no. 2, pp. 53–66, Apr. 2014, doi: 10.1016/j.vehcom.2014.05.001.
  3. N. K. Chaubey and D. Yadav, “A Taxonomy of Sybil Attacks in Vehicular Ad-Hoc Network (VANET),” IoT and Cloud Computing Advancements in Vehicular Ad-Hoc Networks, pp. 174–190, 2020, doi: 10.4018/978-1-7998-2570-8.ch009.
  4. F. Perry, K. Raboy, E. Leslie, Z. Huang, and D. Van Duren, “dedicated short range communications roadside unit specifications," National operations center of excellence. 2017, FHWA-JPO-17-589, Accessed: Dec, 2020. [Online]. Available: https://transportationops.org/publications/dedicated-short-range-communications-roadside-unit-specifications
  5. M. Rahbari and M. A. Jabreil Jamali, “Efficient Detection of Sybil attack Based on Cryptography in Vanet,” International Journal of Network Security & Its Applications, vol. 3, no. 6, pp. 185–195, Nov. 2011, doi: 10.5121/ijnsa.2011.3614.
  6. S. Pal, A. Mukhopadhyay, and P. Bhattacharya, “Defending Mechanisms Against Sybil Attack in Next Generation Mobile Ad Hoc Networks,” IETE Technical Review, vol. 25, no. 4, p. 209, 2008, doi: 10.4103/0256-4602.42813.
  7. N. K. Chaubey, “Security Analysis of Vehicular Ad Hoc Networks (VANETs): A Comprehensive Study,” International Journal of Security and Its Applications, vol. 10, no. 5, pp. 261–274, May 2016, doi: 10.14257/ijsia.2016.10.5.25.
  8. S. Tarapiah, K. Aziz, and S. Atalla, “Analysis the Performance of Vehicles Ad Hoc Network,” Procedia Computer Science, vol. 124, pp. 682–690, 2017, doi: 10.1016/j.procs.2017.12.205.
  9. S. Hamdan, R. S. Al-Qassas, and S. Tedmori, “Comparative Study on Sybil Attack Detection Schemes,” International Journal Of Computers Technology, Vol. 14, no. 7, pp. 5869–5876, May 2015, doi: 10.24297/ijct.v14i7.1898.
  10. Y. Gao, H. Wu, B. Song, Y. Jin, X. Luo, and X. Zeng, “A Distributed Network Intrusion Detection System for Distributed Denial of Service Attacks in Vehicular Ad Hoc Network,” IEEE Access, vol. 7, pp. 154560–154571, 2019, doi: 10.1109/access.2019.2948382.
  11. J. Ma, T. Li, J. Cui, Z. Ying, and J. Cheng, “Attribute-Based Secure Announcement Sharing Among Vehicles Using Blockchain,” IEEE Internet of Things Journal, vol. 8, no. 13, pp. 10873–10883, Jul. 2021, doi: 10.1109/jiot.2021.3050802.
  12. S. Dhanasekaran, S. Ramalingam, K. Baskaran, and P. Vivek Karthick, “Efficient Distance and Connectivity Based Traffic Density Stable Routing Protocol for Vehicular Ad Hoc Networks,” IETE Journal of Research, vol. 70, no. 2, pp. 1150–1166, Sep. 2023, doi: 10.1080/03772063.2023.2252385.
  13. S.-J. Horng, C.-C. Lu, and W. Zhou, “An Identity-Based and Revocable Data-Sharing Scheme in VANETs,” IEEE Transactions on Vehicular Technology, vol. 69, no. 12, pp. 15933–15946, Dec. 2020, doi: 10.1109/tvt.2020.3037804.
  14. G. Rathee, S. Garg, G. Kaddoum, B. J. Choi, and M. S. Hossain, “Trusted Computation Using ABM and PBM Decision Models for ITS,” IEEE Access, vol. 8, pp. 195788–195798, 2020, doi: 10.1109/access.2020.3033883.
  15. Y. Meshcheryakov, A. Melman, O. Evsutin, V. Morozov, and Y. Koucheryavy, “On Performance of PBFT Blockchain Consensus Algorithm for IoT-Applications with Constrained Devices,” IEEE Access, vol. 9, pp. 80559–80570, 2021, doi: 10.1109/access.2021.3085405.
  16. B. Subba, S. Biswas, and S. Karmakar, “A game theory based multi layered intrusion detection framework for VANET,” Future Generation Computer Systems, vol. 82, pp. 12–28, May 2018, doi: 10.1016/j.future.2017.12.008.
  17. J. Shu, L. Zhou, W. Zhang, X. Du, and M. Guizani, “Collaborative Intrusion Detection for VANETs: A Deep Learning-Based Distributed SDN Approach,” IEEE Transactions on Intelligent Transportation Systems, vol. 22, no. 7, pp. 4519–4530, Jul. 2021, doi: 10.1109/tits.2020.3027390.
  18. K. Suganyadevi and V. Nandalal, “Swarm Intelligence-Inspired Meta-Heuristics Hybrid Optimization for Multi-Constraint Routing in Vehicular Adhoc Networks,” IETE Journal of Research, vol. 70, no. 1, pp. 95–115, Sep. 2023, doi: 10.1080/03772063.2023.2253763.
  19. N. C. Velayudhan, A. Anitha, and M. Madanan, “Sybil attack detection and secure data transmission in VANET using CMEHA-DNN and MD5-ECC,” Journal of Ambient Intelligence and Humanized Computing, vol. 14, no. 2, pp. 1297–1309, Jul. 2021, doi: 10.1007/s12652-021-03379-3.
  20. B. Zhang, M. Hsu, and U. Dayal, “K-Harmonic Means -A Spatial Clustering Algorithm with Boosting,” Temporal, Spatial, and Spatio-Temporal Data Mining, pp. 31–45, 2001, doi: 10.1007/3-540-45244-3_4.
  21. N. Zainal, A. M. Zain, N. H. M. Radzi, and M. R. Othman, “Glowworm swarm optimization (GSO) for optimization of machining parameters,” Journal of Intelligent Manufacturing, vol. 27, no. 4, pp. 797–804, Apr. 2014, doi: 10.1007/s10845-014-0914-7.
  22. S. Kumaragurubaran and N. Vijayakumar, “A novel swarm intelligence‐based fuzzy logic in efficient connectivity of vehicles,” International Journal of Communication Systems, vol. 37, no. 11, Apr. 2024, doi: 10.1002/dac.5795.

CRediT Author Statement


The authors confirm contribution to the paper as follows:

Conceptualization: Suganyadevi K, Swaminathan A, Baskar Kasi and Anju M A; Methodology: Suganyadevi K and Swaminathan A; Software: Baskar Kasi and Anju M A; Data Curation: Suganyadevi K and Swaminathan A; Writing- Original Draft Preparation: Suganyadevi K, Swaminathan A, Baskar Kasi and Anju M A; Visualization: Suganyadevi K and Swaminathan A; Investigation: Baskar Kasi and Anju M A; Supervision: Suganyadevi K and Swaminathan A; Validation: Baskar Kasi and Anju M A; Writing- Reviewing and Editing: Suganyadevi K, Swaminathan A, Baskar Kasi and Anju M A; All authors reviewed the results and approved the final version of the manuscript.


Acknowledgements


The author(s) received no financial support for the research, authorship, and/or publication of this article.


Funding


No funding was received to assist with the preparation of this manuscript.


Ethics declarations


Conflict of interest

The authors have no conflicts of interest to declare that are relevant to the content of this article.


Availability of data and materials


Data sharing is not applicable to this article as no new data were created or analysed in this study.


Author information


Contributions

All authors have equal contribution in the paper and all authors have read and agreed to the published version of the manuscript.


Corresponding author


Rights and permissions


Open Access This article is licensed under a Creative Commons Attribution NoDerivs is a more restrictive license. It allows you to redistribute the material commercially or non-commercially but the user cannot make any changes whatsoever to the original, i.e. no derivatives of the original work. To view a copy of this license, visit https://creativecommons.org/licenses/by-nc-nd/4.0/


Cite this article


Suganyadevi K, Swaminathan A, Baskar Kasi and Anju M A, “Sybil Attack Detection in VANET Using CNN Enhanced with Chaotic Maps and Elephant Herding Optimization for Secure Data Transmission”, Journal of Machine and Computing, pp. 1233-1247, April 2025, doi: 10.53759/7669/jmc202505097.


Copyright


© 2025 Suganyadevi K, Swaminathan A, Baskar Kasi and Anju M A. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.