Abstract
Vehicular ad hoc networks (VANET) are revolutionizing transportation by enabling real-time communication between vehicles and roadside infrastructure, enhancing safety and efficiency through the exchange of traffic updates, road conditions, and critical data. However, VANET faces significant security threats, including Sybil, black hole, and wormhole attacks, where malicious nodes manipulate network communication, leading to misinformation and disruptions. This research proposes a novel hybrid model, GBiL, integrating gated recurrent unit (GRU) and bidirectional long short-term memory (BiLSTM) to detect and mitigate such attacks. At the core of this architecture, an intrusion detection system (IDS) is combined with a trust detection module to assess the trustworthiness of network nodes using real-time data. The IDS employs a hybrid approach for efficient intrusion detection, leveraging particle swarm optimization (PSO) after feature selection. To ensure a balanced dataset, data augmentation is applied using SMOTETomek, a combination of Synthetic Minority Over-sampling Technique (SMOTE) and Tomek Links. Real-time simulations using NS-3 and SUMO with real-world mapping from OpenStreetMap validate the system’s effectiveness in a realistic urban network environment by generating a dataset called VANET Attacks (VA) dataset. This comprehensive approach strengthens VANET security against multiple attack vectors. The proposed GBiL model achieves high performance, with an accuracy of 96.01% and a false alarm rate of just 0.04%. This research significantly enhances VANET security by integrating sophisticated detection techniques, data augmentation, and real-time trust evaluations, establishing a robust foundation for more secure and reliable autonomous transportation through improved vehicular communication networks.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Details
; Nathan, A. Thillai 2 ; Sivakumar, Dhev Sabharish 2 ; Annie, R. Arockia Xavier 2 1 Loyola-ICAM College of Engineering and Technology, Department of Information Technology, Chennai, India
2 CEG Campus, Anna University, Department of Computer Science and Engineering, Chennai, India (GRID:grid.252262.3) (ISNI:0000 0001 0613 6919)





