The International Arab Journal of Information Technology (IAJIT)

..............................
..............................
..............................


Trust Enabled Secure Routing in Vehicular Adhoc Networks

Vehicular Ad-hoc NETworks (VANETs) can improve traffic efficiency and safety on the roads by enabling real-time vehicle-infrastructure connectivity along roadways. Routing in VANETs presents major obstacles due to the continuously evolving network architecture and security risks. Trust-based routing may improve Vehicle-to-Infrastructure (V2I) communication security, reliability, and Quality of Service (QoS). Trust-based routing requires trustworthy evaluation, authentication, privacy protection, and access control for the Internet of Vehicles (IOV). IOVs’ continual modification poses trust computing algorithm efficiency and scalability issues. Trust-based routing must be able to withstand Sybil attacks and poor vehicle collisions. This study introduces trust-enabled routing for VANETs. The proposed approach combines direct, indirect, situational, and experiential trust to determine node reliability. Mobility has an impact on Direct Trust (DT), which includes punishment and reward parameters, communication frequency and consistency, and delay duration. The value of feedback trust, mobility factor, and link dependability determine iN-Direct Trust (N-DT). Situational trust considers the time period of the day, location, weather, and the density of traffic between every two nodes. Effective communication builds experience and trust. We use final trust scores to select reliable routes, thereby improving network performance. This approach minimizes network latency and enables accurate assessment of trust in real-time with low false positives, enhancing network resource consumption efficiency, dependability, security, and resilience. The new Trust-Enabled Secure Routing (TESR) scheme works better than Graph-Based Trust-enabled Routing (GBTR), Obstacle Prediction-Based Routing Protocol (OPBRP), and Regression Geometric Optimization (LARgeoOPT) in terms of end-to-end delay, routing overhead, latency, dropped packet ratio, throughput, and Packet DeLivery Ratio (PDLR). It does these things by decreasing them by 2%, 2.8%, 4%, 6%, and increasing them by 6% and 7.14%, respectively. TESR improves network performance and reliability, enhances VANET security, and enables the expansion of intelligent transportation systems.

[1] Abdalla A. and Salamah S., “Performance Comparison between Delay-Tolerant and Non- Delay-Tolerant Position-Based Routing Protocols in VANETs,” International Journal of Communications, Network and System Sciences, vol. 15, no. 1, pp. 1-14, 2022. file:///C:/Users/user/Downloads/Performance_Co mparison_between_Delay-Tolerant_and_.pdf

[2] Akter S., Shahriar Rahman M., Bhuiyan M., and Mansoor N., “Towards Secure Communication in CR-VENTs through a Trust-Based Routing Protocol,” in Proceedings of the IEEE INFOCOM-IEEE Conference on Computer Communications Workshops, Vancouver, pp. 1-6, 2021. https://doi.org/10.1109/infocomwkshps51825.20 21.9484515

[3] Alam I., Manjul M., Pathak V., Mala V., Mangal A., ThakurH., and Sharma D., “Efficient and Secure Graph-based Trust-Enabled Routing in Vehicular Ad-Hoc Networks,” Mobile Networks and Applications, pp. 1-21, 2024. https://link.springer.com/article/10.1007/s11036- 023-02274-9

[4] Alharbi A. and Alsubhi K., “Botnet Detection Approach Using Graph-based Machine Learning,” IEEE Access, vol. 9, pp. 99166-99180, 2021. https://doi.org/10.1109/access.2021.3094183

[5] Bangotra D., Singh Y., Selwal A., Kumar N., and Singh P., “A Trust-Based Secure Intelligent Opportunistic Routing Protocol for Wireless Sensor Networks,” Wireless Personal Communications, vol. 127, no. 2, pp. 1045-1066, 2022. https://doi.org/10.1007/s11277-021-08564- 3

[6] Belamri F., Boulfekhar S., and Aissani D., “A Survey on QoS Routing Protocols in Vehicular Ad Hoc Network (VANET),” Telecommunication Systems, vol. 78, no. 1, pp. 117-153, 2021. https://doi.org/10.1007/s11235-021-00797-8

[7] Bousbaa F., Kerrache C., Lagraa N., Hussain R., Yagoubi M., and Tahari A., “Group Data Communication in Connected Vehicles: A Survey,” Vehicular Communications, vol. 37, pp. 100518, 2022. https://doi.org/10.1016/j.vehcom.2022.100518 610 The International Arab Journal of Information Technology, Vol. 22, No. 3, May 2025

[8] BrijilalRuban C. and Paramasivan B., “Energy Efficient Enhanced OLSR Routing Protocol Using Particle Swarm Optimization with Certificate Revocation Scheme for VANET,” Wireless Personal Communications, vol. 121, pp. 2589- 2608, 2021. https://doi.org/10.1007/s11277-021- 08838-w

[9] Choksi A. and Shah M., “Machine Learning Based Centralized Dynamic Clustering Algorithm for Energy Efficient Routing in Vehicular Ad Hoc Networks,” Transactions on Emerging Telecommunications Technologies, vol. 35, no. 1 pp. e 4914, 2024. https://doi.org/10.1002/ett.4914

[10] Choksi A. and Shah M., “Neural Network-based Dynamic Clustering Model for Energy Efficient Data Uploading and Downloading in Green Vehicular Ad-Hoc Networks,” International Journal of Next-Generation Computing, vol. 14, no. 3, pp. 502-521, 2023. file:///C:/Users/user/Downloads/PublishedIJNGC Paper.pdf

[11] De Francesco C., Palazzi C., and Ronzani D., “Fast Message Broadcasting in Vehicular Networks: Model Analysis and Performance Evaluation,” IEEE Communications Letters, vol. 24, no. 8, pp. 1669-1672, 2020. https://doi.org/10.1109/lcomm.2020.2993006

[12] Diaa M., Khalid I., Mohamed I., and Hassan M., “OPBRP-Obstacle Prediction-Based Routing Protocol in VANETs,” Ain Shams Engineering Journal, vol. 14, no. 7, pp. 101989, 2023. https://doi.org/10.1016/j.asej.2022.101989

[13] Eiza M. and Ta V., “An Indirect Social Trust Model for Vehicular Social Networks Using Evolving Graph Theory,” arXiv Preprint, vol. arXiv:arXiv:2206.13144v1, pp. 1-6, 2022. https://doi.org/10.48550/arXiv.2206.13144

[14] Fatemidokht H., Rafsanjani M., Gupta B., and Hsu C., “Efficient and Secure Routing Protocol Based on Artificial Intelligence Algorithms with UAV- Assisted for Vehicular Ad Hoc Networks in Intelligent Transportation Systems,” IEEE Transactions on Intelligent Transportation Systems, vol. 22, no. 7, pp. 4757-4769, 2021. https://doi.org/10.1109/tits.2020.3041746

[15] Gazdar T., Alboqomi O., and Munshi A., “A Decentralized Blockchain-based Trust Management Framework for Vehicular Ad Hoc Networks,” Smart Cities, vol. 5, no. 1, pp. 348- 363, 2022. https://doi.org/10.3390/smartcities5010020

[16] Gupta B., Gaurav A., Marin E., and Alhalabi W., “Novel Graph-based Machine Learning Technique to Secure Smart Vehicles in Intelligent Transportation Systems,” IEEE Transactions on Intelligent Transportation Systems, vol. 24, no. 8, pp. 8483-849, 2023. https://doi.org/10.1109/TITS.2022.3174333

[17] Gupta M., Gera P., and Mishra B., Inventive Communication and Computational Technologie, Springer Nature Singapore, 2022. https://link.springer.com/book/10.1007/978-981- 19-4960-9

[18] Hamdi M., Al-Dosary O., Alrawi., Mustafa A., Abood M., and Noori M., “An Overview of Challenges for Data Dissemination and Routing Protocols in VANETs,” in Proceedings of the 3rd International Congress on Human-Computer Interaction, Optimization and Robotic Applications, Ankara, pp. 1-6, 2021. https://doi.org/10.1109/hora52670.2021.9461396

[19] Husain A., Singh S., and Sharma S., “PSO Optimized Geocast Routing in VANET,” Wireless Personal Communications, vol. 115, pp. 2269- 2288, 2020. https://doi.org/10.1007/s11277-020- 07681-9

[20] Jaballah W., Conti M., and Lal C., “Security and Design Requirements for Software-Defined VANETs,” Computer Networks, vol. 169, pp. 107099, 2020. https://doi.org/10.1016/j.comnet.2020.107099

[21] Jiang J., Wei W., Shao W., Liang Y., and Qu Y., “Research on Large-Scale Bi-Level Particle Swarm Optimization Algorithm,” IEEE Access, vol. 9, pp. 56364-56375, 2021. https://doi.org/10.1109/access.2021.3072199

[22] Kadam M., Vaze V., and Todmal S., “TACR: Trust Aware Clustering-Based Routing for Secure and Reliable VANET Communications,” Wireless Personal Communications, vol. 132, no. 1, pp. 305-328, 2023. https://doi.org/10.1007/s11277- 023-10612-z

[23] Kamboj S., Mann K., and Kaur S., “An Optimized Multiple Malicious Node Detection Method for Detection of Security Attacks in VANETs,” in Proceedings of the 2nd International Conference on Computational Methods in Science and Technology, Mohali, pp. 152-157, 2021. https://doi.org/10.1109/iccmst54943.2021.00041

[24] Kandali K., Bennis L., and Bennis H., “A New Hybrid Routing Protocol Using a Modified K- Means Clustering Algorithm and Continuous Hopfield Network for VANET,” IEEE Access, vol. 9, pp. 47169-47183, 2021. https://doi.org/10.1109/access.2021.3068074

[25] Kaur G. and Kakkar D., “Hybrid Optimization Enabled Trust-Based Secure Routing with Deep Learning-based Attack Detection in VANET,” Ad Hoc Networks, vol. 136, pp. 102961, 2022. https://doi.org/10.1016/j.adhoc.2022.102961

[26] Kchaou A., Abassi R., and Guemara S., “Towards the Performance Evaluation of a Clustering and Trust-Based Security Mechanism for VANET,” in Proceedings of the 15th International Conference on Availability, Reliability and Security, Ireland, pp. 1-6, 2020. Trust Enabled Secure Routing in Vehicular Adhoc Networks 611 https://doi.org/10.1145/3407023.3407071

[27] Khadim S., Riaz F., Jabbar S., Khalid S., and Aloqaily M., “A Non-Cooperative Rear-End Collision Avoidance Scheme for Non-Connected and Heterogeneous Environment,” Computer Communications, vol. 150, pp. 828-840, 2020. https://doi.org/10.1016/j.comcom.2019.11.002

[28] Kudva S., Badsha S., Sengupta S., La H., Khalil I., and Atiquzzaman M., “A Scalable Blockchain- Based Trust Management in VANET Routing Protocol,” Journal of Parallel and Distributed Computing, vol. 152, pp. 144-156, 2021. https://doi.org/10.1016/j.jpdc.2021.02.024

[29] Luong N. and Hoang D., “BAPRP: A Machine Learning Approach to Blackhole Attacks Prevention Routing Protocol in Vehicular Ad Hoc Networks,” International Journal of Information Security, vol. 22, no. 6, pp. 1547-1566, 2023. https://doi.org/10.1007/s10207-023-00705-y

[30] Mahalakshmi G., Uma E., Senthilnayaki B., Devi A., Rajeswary C., and Dharanyadevi P., “Trust Score Evaluation Scheme for Secure Routing in VANET,” in Proceedings of the IEEE International Conference on Mobile Networks and Wireless Communications, Karnataka, pp. 1-6, 2021. https://doi.org/10.1109/icmnwc52512.2021.9688 475

[31] Mahdi H., Abood M, and Hamdi M., “Performance Evaluation for Vehicular Ad-Hoc Networks-Based Routing Protocols,” Bulletin of Electrical Engineering and Informatics, vol. 10, no. 2, pp. 1080-1091, 2021. https://doi.org/10.11591/eei.v10i2.2943

[32] Mahi M., Chaki S., Ahmed S., Biswas M., Shamim Kaiser M., Islam M., Sookhak M., Barros A., and Whaiduzzaman M., “A Review on VANET Research: Perspective of Recent Emerging Technologies,” IEEE Access, vol. 10, pp. 65760-65783, 2022. https://doi.org/10.1109/access.2022.3183605

[33] Maria A., Rajasekaran A., Al-Turjman F., Altrjman C., and Mostarda L., “BAIV: An Efficient Blockchain-based Anonymous Authentication and Integrity Preservation Scheme for Secure Communication in VANETs,” Electronics, vol. 11 no. 3, pp. 1-20, 2022. https://doi.org/10.3390/electronics11030488

[34] Michael O., Tambuwal A., Chemebe C., Noor R., and Distefano S., “VANETs QoS-based Routing Protocols Based on Multi-Constrained Ability to Support ITS Infotainment Services,” Wireless Networks, vol. 26, pp. 1685-1715, 2020. https://doi.org/10.1007/s11276-018-1860-7

[35] Muzammal S., Murugesan R., and Jhanjhi N., “A Comprehensive Review on Secure Routing in the Internet of Things: Mitigation Methods and Trust- based Approaches,” IEEE Internet of Things Journal, vol. 8, no.6 pp. 4186-4210, 2020. https://doi.org/10.1109/jiot.2020.3031162

[36] Naeem A., Rizwan M., Alsubai S., Almadhor A., Akhtaruzzaman M., Islam S., and Hameedur Rahman., “Enhanced Clustering Based Routing Protocol in Vehicular Ad‐Hoc Networks,” IET Electrical Systems in Transportation, vol. 13, no. 1, pp. 1-15, 2023. https://doi.org/10.1049/els2.12069

[37] Reddy M., Srinivas P., and Chandra Mohan M., “Energy Efficient Routing with Secure and Adaptive Trust Threshold Approach in Mobile Ad Hoc Networks,” The Journal of Supercomputing, vol. 79, no. 12, pp. 13519-13544, 2023. https://doi.org/10.1007/s11227-023-05187-2

[38] Reddy M., Srinivas P., and Mohan M., “Enhancing the Routing Security through Node Trustworthiness Using Secure Trust Based Approach in Mobile Ad Hoc Networks,” International Journal of Interactive Mobile Technologies, vol. 17, no. 14, pp. 152-170, 2022. https://doi.org/10.3991/ijim.v16i14.30651

[39] Shafi S. and Ratnam D., “A Trust-Based Energy and Mobility Aware Routing Protocol to Improve Infotainment Services in VANETs,” Peer-to-Peer Networking and Applications, vol. 15, no. 1, pp. 576-591, 2021. https://doi.org/10.1007/s12083- 021-01272-6

[40] Shafi S. and Venkata Ratnam D., “An Efficient Cross-Layer Design of Stability Based Clustering Scheme Using Ant Colony Optimization in VANETs,” Wireless Personal Communications, vol. 126, no. 4, pp. 3001-3019, 2022. https://doi.org/10.1007/s11277-022-09849-x

[41] Shokrollahi S. and Dehghan M., “TGRV: A Trust- Based Geographic Routing Protocol for VANETs,” Ad Hoc Networks, vol. 140, pp. 103062, 2023. https://doi.org/10.1016/j.adhoc.2022.103062

[42] Shrikant T., Manvi S., and Lorenz P., “Trust Management Scheme Based on Hybrid Cryptography for Secure Communications in VANETs,” IEEE Transactions on Vehicular Technology, vol. 69, no. 5, pp. 5232-5243, 2020. https://doi.org/10.1109/tvt.2020.2981127

[43] Shrivastava P. and Vishwamitra L., “Comparative Analysis of Proactive and Reactive Routing Protocols in VANET Environment,” Measurement: Sensors, vol. 16, pp. 100051, 2021. https://doi.org/10.1016/j.measen.2021.100051

[44] Soni M., Dhiman G., Rajput B., Patel R., and Tejra N., “Energy-Effective and Secure Data Transfer Scheme for mobile Nodes in Smart City Applications,” Wireless Personal Communications, vol. 127, no. 3, pp. 2041-2061, 2022. https://doi.org/10.1007/s11277-021-08767- 8

[45] Speiran J. and Shakshuki E., “Understanding the 612 The International Arab Journal of Information Technology, Vol. 22, No. 3, May 2025 Effect of Physical Parameters on Packet Loss in Veins VANET Simulato,” Procedia Computer Science, vol. 201, pp. 359-367, 2022. https://doi.org/10.1016/j.procs.2022.03.048

[46] Sumithra S. and Vadivel R., “Ensemble Miscellaneous Classifiers-based Misbehavior Detection Model for Vehicular Ad-Hoc Network Security,” International Journal of Computer Networks and Applications, vol. 8, no. 2, pp. 90- 107, 2021. https://doi.org/10.22247/ijcna/2021/208890

[47] Temurnikar A., Verma P., and Dhiman G., “A PSO Enable Multi-Hop Clustering Algorithm for VANET,” International Journal of Swarm Intelligence Research, vol. 13, no. 2, pp. 1-14, 2022. https://doi.org/10.4018/ijsir.20220401.oa7

[48] Tseng H., Chu P., Lu H., and Tsai M., “Easy particle Swarm Optimization for Nonlinear Constrained Optimization Problems,” IEEE Access, vol. 9, pp. 124757-124767, 2021. https://doi.org/10.1109/access.2021.3110708

[49] Velayudhan N, Anitha A., and Madanan M., “An Optimization-Driven Deep Residual Network for Sybil Attack Detection with Reputation and Trust- Based Misbehavior Detection in VANET,” Journal of Experimental and Theoretical Artificial Intelligence, vol. 36, no. 5, pp. 721-744, 2022. https://doi.org/10.1080/0952813X.2022.2104387

[50] Venkatamune N. and PrabhaShankar J., “A VANET Collision Warning System with Cloud Aided Pliable Q-Learning and Safety Message Dissemination,” The International Arab Journal of Information Technology, vol. 20, no. 1, pp. 113- 124, 2023. https://doi.org/10.34028/iajit/20/1/12

[51] Wahid I., Tanvir S., Ahmad M., Ullah F., AlGhamdi A., Khan M., and Alshamrani S., “Vehicular Ad Hoc Networks Routing Strategies for Intelligent Transportation System,” Electronics, vol. 11, no. 15, pp. 1-36, 2022. https://doi.org/10.3390/electronics11152298

[52] Wang R., Li Y., Xu Y., Xie H., Lui J., and He S., “Toward Fast and Scalable Random Walks over Disk-Resident Graphs via Efficient I/O Management,” ACM Transactions on Storage, vol. 18, no. 4, pp. 1-33, 2022. https://doi.org/10.1145/3533579

[53] Wu J., Fang M., Li H., and Li X., “RSU-Assisted Traffic-Aware Routing Based on Reinforcement Learning for Urban VANETs,” IEEE Access, vol. 8, pp. 5733-5748, 2020. https://doi.org/10.1109/access.2020.2963850

[54] Xia H., Zhang S., Li B., Li L., and Cheng X., “Towards a Novel Trust‐based Multicast Routing for VANETs,” Security and Communication Networks, vol. 2018, no. 1, pp. 1-12, 2018. https://doi.org/10.1155/2018/7608198

[55] Xia Z., Wu J., Wu L., Chen Y., Yang J., and Yu P., “A Comprehensive Survey of the Key Technologies and Challenges Surrounding Vehicular Ad Hoc Networks,” ACM Transactions on Intelligent Systems and Technology, vol. 12, no. 7, pp. 1-30, 2021. https://doi.org/10.1145/3451984

[56] Xu S., Li H., Li T., and Li S., et al., “Neutrophil Extracellular Traps and Macrophage Extracellular Traps Predict Postoperative Recurrence in Resectable Nonfunctional Pancreatic Neuroendocrine Tumors,” Frontiers in Immunology, vol. 12, pp. 1-9, 2021. https://doi.org/10.3389/fimmu.2021.577517

[57] Yao X., Farha F., Li R., Psychoula I., Chen L., and Ning H., “Security and Privacy Issues of Physical Objects in the IoT: Challenges and Opportunities,” Digital Communications and Networks, vol. 7, no. 3, pp. 373-384, 2021. https://doi.org/10.1016/j.dcan.2020.09.001