Energy-Efﬁcient Fuzzy Management System for Internet of Things Connected Vehicular Ad Hoc Networks

: Many algorithms use clustering to improve vehicular ad hoc network performance. The expected points of many of these approaches support multiple rounds of data to the roadside unit and constantly include clustering in every round of single-hop data transmission towards the road side unit; however, the clustering in every round maximizes the number of control messages and there could be the possibility of collision and decreases in network energy. Multi-hop transmission prolongs the cluster head node’s lifetime and boosts the network’s efﬁciency. Accordingly, this article proposes a new fuzzy-clustering-based routing algorithm to beneﬁt from multi-hop transmission clustering simultaneously. This research has analyzed the limitation of clustering in each round, different algorithms were used to perform the clustering, and multi-hop routing was used to transfer the data of every cluster to the road side unit. The fuzzy logic was used to choose the head node of each cluster. Three parameters, (1) distance of each node, (2) remaining energy, and (3) number of neighbors of every node, were considered as fuzzy criteria. The results of this research were compared to various other algorithms in relation to parameters like dead node in every round, ﬁrst node expire, half node expire, last node expire, and the network lifetime. The simulation results show that the proposed approach outperforms other methods. On the other hand, the vehicular ad hoc network (VANET) environment is vulnerable at the time of data transmission. The NS-2 software tool was used to simulate and evaluate the proposed fuzzy logic opportunistic routing’s performance results concerning end-to-end delay, packet delivery, and network throughput. We compare to the existing protocols, such as fuzzy Internet of Things (IoT), two fuzzy, and Fuzzy-Based Driver Monitoring System (FDMS). The performance comparison also emphasizes an effective utilization of the resources. Simulations on the highway environment show that the suggested protocol has an improved Quality of Service (QoS) efﬁciency compared to the above published methods in the literature.


Introduction
The collection of network's physical items (nodes) embedded with software, actuators, sensors, and other various connectivity modules that allow them to send and receive data is considered the Internet of Things (IoT). A number of transmission medium technologies can be used by IoT, such as Wireless Fidelity (Wi-Fi), Bluetooth, and ZigBee, in which nodes can share data in both infrastructures in an ad hoc way. Because of the huge number of nodes, the Internet of Things (IoT) accommodates huge amounts of data; moreover, these nodes are usually battery-powered, so they have a tendency toward energy depletion. However, traffic jamming is one of the most common and serious issues faced by small to big cities globally and has challenged the public's lives in a challenging environment. The smart cities in the world would like to plan a strategy to decrease their transportation problem because of the increasing population, which affects overfilled roads [1,2]. Smart cities implement emerging computing technologies to make smart infrastructure objects, facilities, and other city services, which may include education, public safety, transportation, administration, healthcare, real estate, and more intelligent interconnected utilities [3].
The vehicular ad hoc networks (VANETs) can help to overcome this problem by increasing road safety and improving vehicles' mobility. The Internet of Things (IoT) is a fast-growing field in this modern digital era, with millions of functioning physical devices (nodes) interconnected to each other deprived of human interactivity [4]. The Internet of Things can flawlessly, constantly, and pervasively connect and control the real world's different objects through nodes (physical objects) with different types of intelligent wireless sensors. This multiple set of nodes present among the neighbors is defined as sending set [4]. Therefore, choosing an appropriate criterion to select the rebroadcasting node in opportunistic routing can improve the performance of inter-vehicle network characteristics. In addition, the car following model is limited to roads and highways. Hence, drivers must know the vehicle position and direction to make better decisions and avoid link disconnection. To obtain this information, the beacon messages will be used periodically between neighbors. These updates are very costly in many ways. Each update leads to increased bandwidth usage, packet advancement delay, and increased collision risk in the media access layer [5]. Packet collision will cause packet loss, affecting routing efficiency, and, consequently, a crowded condition occurs when the channel is used by vehicles. As a result, collisions will occur by increasing car densities, leading to increased congestion within the network. This crowded condition in the network causes an increase in pocket loss and delay, consequently decreasing the system functionality [6,7]. In this work, beacon messages were not used in the opportunistic routing protocol to solve this problem. They were introduced as a fault-tolerant protocol for vehicular networks that use the wireless channel broadcast feature and improve the network performance during data forwarding.
Additionally, the number of duplicated packets, packet advancement toward the destination, and density are used as the prioritization criteria for rebroadcasting nodes. In this way, the packets are transferred with the least consumed resources and provide appropriate performance considering opportunistic routing schemes. In our proposed method, it is unnecessary to send beacon packets to keep informed of the status of neighbors and the density of the network. Therefore, it is necessary to calculate these parameters; this leads to reduce the congestions and packet loss. Given the above-mentioned items, a fuzzy protocol is presented in this paper for decision-making on rebroadcasting the packets and their routings to the destination. This fuzzy protocol uses three input parameters with the objective of proper decision-making for rebroadcasting. Given the importance of the packet's advancement, the variation and local density of the vehicles, and controlling duplicate packets in the network, these three variables are chosen as the inputs to the fuzzy system for proper decision-making. The routing tries to choose the rebroadcasting nodes with the maximum advancement toward the destination.
Moreover, the local density of a parameter is dynamic in the network. Routing should make proper decisions considering the density. Finally, the number of duplications of the packets cause congestions and collisions in the network for which the routing should have required to control. Consequently, routing and packet rebroadcasting use fuzzy decision-making with these three parameters. For improving the limitations found in the research literature and for choosing the right routes for retransmission, we proposed the fuzzy logic to merge the following three concepts: (i) packet improvement to minimize delay between links; (ii) local control to manage rapid communicational changes, which may minimize retransmission and maximize throughput; and (iii) choosing nodes with the least number of received duplicate packets. With the implementation of fuzzy logic on the rebroadcasting physical device (node), the nearest best node is selected from the set of relays, leading to generating routes with maximum throughput and lower delay for end-to-end node with the effective rate of data delivery.
In multi-hop wireless sensor network unequal clustering, the size of clusters increases as the get farther from the road side unit. Therefore, when the nodes are densely aggregated around the roadside unit, the cluster head energy decreases rapidly. In addition to its packets, the cluster head node must guide other clusters' packets. Using the fuzzy system while considering measures like the grade of each device and its space (distance) to the road side unit leads to decreasing transmission delay, increasing network lifetime and decreasing energy consumption during cluster head selection and cluster formation [7,8].
Employing fuzzy system is a solution to overcome wireless sensor networks uncertainty problem [9]. Compared to non-fuzzy methods, employing fuzzy systems has many advantages: decreasing computational complexity, requiring less memory, and decreasing network development cost [6]. According to the wireless sensor network limitations and clustering, designing suitable routing methods can also improve performance and prolong lifetime in multi-hop wireless sensor networks [10].
The multi-hop (more than one hope) communications provide a consistent mechanism of communication for transferring the information in VANETs. Given the unique features of VANETs, several routing solutions have been proposed for these networks. Their main characteristics include being dynamic, high-mobility, and responsive to the network density. The network density parameter is one of the main parameters functioning to deliver the data packets to the destination. For minimum density in VANETs the routing protocols frequently desired negotiation between latency and reliability [8] Multi-hop routing has recently taken the devotion of the researchers. In this protocol, a packet is sent to all vehicles in the network in a flooding manner. Different protocols have been proposed in the recent years for the efficiency of broadcast communications and reliable transmissions that are known as smart flooding protocols [11]. The objective of presenting these procedures is to minimize the quantity of the multicast packets and an efficient use of the bandwidth in the network. Flooded transmission of the data is a protocol for sending a data packet from a source to all of its neighboring nodes. The first protocol for the flooded transmission is the simple flooding protocol [12], in which when a packet is generated and sent from a node, the receiving node rebroadcasts the packet. In order to prevent multiplier broadcasting of the same packet, each node contains a list of delivered data packets and their lifetimes. Nevertheless, this protocol leads to the multi-broadcast storm issue and the performance of the network gradually deteriorates, particularly in scenarios with a high density. Distancebased protocols are the routing protocols that use geographical data for enhancing the performance of the data rebroadcasting in the network.
There are several types of research that have been conducted for VANETs. In Reference [13], the authors suggested a Message Suppression Controller (MSC) technique for V2I and V2V communications. They dynamically control message suppression by considering some parameters; however, to calculate the time amount of message suppression, a fixed parameter is still used. Furthermore, to solve this fixed parameter problem authors suggested an Enhanced Message Suppression Controller (EMSC) [14] for (V-DTN) Vehicular-DTN the Enhanced Message Suppression Controller (EMSC) is an extended version of Message Suppression Controller (MSC) [15], which can be beneficial for different network criteria. However, the reliability and security in VANETs is very primary element to avoid unauthorized agents who may interrupt the road safety system of VANETs framework. Various researchers analyzed the disruption of traffic flows and road safety and have based their research on this serious issue. Cluster head can support in recognizing malevolent vehicles and moderate their impact by negating them to access cluster resources). Safety and security of the messages could be achieved by authentication vehicles in communication range of Road Side Unit (RSU) can be combined into one cluster to make the authentication Electronics 2021, 10, 1068 4 of 25 process faster and a head cluster is used to verify that all the vehicles of Road Side Unit (RSU) available into the same cluster. Cluster formation in dynamic-VANET (D-VANETs) and head cluster selection mechanism play a very important role. We propose a method to compute the complexity of head cluster selection base on the following parameters: (i) direction of vehicle, (ii) degree of connectivity, (iii) an entropy threshold computed from the mobility of devices (nodes) in network, and (iv) level of distrust calculated based on the node's reliability, vehicles are allocated verifiers who are neighbors with having minimum distrust value. The verifiers used to pursue the vehicle's network control and ensure whether or not it is routing packets, advertising mobility by comparing the data of traffic messages with the verifier's neighborhood. The distrust value of devices (nodes) who act unsatisfactory is then increasing continuously; however, those nodes who perform reliably decrease continuously. Thorough this mechanism the reliability of a node is computed for the selection of head cluster process. Fuzzy logic is a primary method of reasoning logic which results approximate rather than fixed and exact. Fuzzy logic is very important in real life also it inherit facts that most modes of human reasoning and sense of common reasoning are the approximate in nature. Fuzzy logic also uses variables in linguistic nature to define the parameters. A simple expression written in linguistic can describe the understanding of a very difficult problems. The further advancement of this paper is as follows: (i) We propose a new mechanism for broadcasting data in VANETs based on few expectations, and it is very easy to implement in distributed approach.
(ii) We also compare our method with different research in the literature based [7-9] on a connected cover set that helps to optimize the near-optimality, Time to Live (TTL), overhead, and aggregation of suggest method.
(iii) The Contention-Based-Forwarding (CBF) method is also compared with proposed, which is also standardized by European Telecommunications Standards Institute (ETSI) bodies, with name evolution as Energy-Efficient Fuzzy Management (EEFM) with IoT in VANET of proposed method is measured much better in terms of capability and to minimize the quantity of involved vehicle nodes.

Related Work
This section briefly introduces IoT, fog computing, and edge computing as enabling technologies for the full deployment and management of VANET applications and services. The expected points of many of these approaches support multiple rounds of data to roadside unit and constantly includes clustering in every round of single-hop data transmission toward the road side unit, however, the clustering in every round maximize the number of control messages and there could be the possibility of collision and decreases network energy. Multi-hop transmission prolongs cluster head node's lifetime and boosts the network's efficiency. Accordingly, this article proposes a new fuzzy clustering-based routing algorithm to benefit from multi-hop transmission clustering simultaneously Moreover, we provide a short description of VANETs in terms of the coordination of the computing resources as well as several research papers relevant to this work.

IoT Architecture
The IoT has become one of the most popular networking concepts that can bring out many benefits by creating a smart environment, which will permit the collection of information from the environment and make the daily life more convenient by helping people make tough decisions. For that to happen, a high interaction between people, objects, processes and services must be guaranteed [16]. While there will be a significant increase in the number of deployed devices within the environment, there should be a scalable infrastructure to enable sufficient and full utilization of available resources to take advantage of the IoT. Smart transportation and smart cities are the most important applications of IoT based in VANETs. They include intelligent traffic management in which data from the smart traffic light nodes and traffic information center infrastructures Electronics 2021, 10, 1068 5 of 25 could be reachable by any vehicle, at any point and at any time. Such applications are delay-sensitive and require mobility support, and to satisfy these demands, the use of fog computing was proposed [17].
Fog computing is a highly virtualized platform that provides compute, storage, and networking services between end devices and traditional Cloud computing data centers offering low latency and location awareness, geographical distribution, mobility support, interoperability, and real-time interactions [2]. These attributes make fog computing the appropriate platform that meets all VANET scenarios' requirements [5,6]. However, as the number of vehicles increases, so does the amount of data generated by these vehicles. Therefore, Cloud computing still has an important role when it comes to big data management and analytics. As more and more sensors are installed on modern vehicles, massive amounts of data are generated from monitoring the on road and on-board status [18]. If those data are sent back across a long network link, to be analyzed, logged, and tracked, that takes much more time than if the data are processed at the edge, close to the source of the data [19]. Vehicles, which are equipped with networking capabilities, powerful computing units, and large storage devices, will try to process the data, and if not capable, they will seek to use the resources of adjacent vehicles. This becomes crucial, in particular, when a connection vehicle-fog server cannot be established, as well as when the fog servers where vehicles are trying to get services are overloaded. Edge computing can help monitor the massive traffic flow from the core networks and an efficient content distribution [20].

IoT Protocols for IoT in VANET
In the following we will briefly describe the most frequently used protocols for Machine-to-Machine (M2M) communication. The Message Queue Telemetry Transport (MQTT) is a Client Server that publishes or subscribes messaging transport protocol. It is light weight, open, simple and designed so as to be easy to implement. The protocol runs over Transmission Control Protocol/ Internet protocol (TCP/IP) or over other network protocols that provide ordered, lossless, bi-directional connections. The MQTT features include the usage of the publish/subscribe message pattern which provides one-to-many message distribution, a messaging transport that is agnostic to the content of the payload. Furthermore, the MQTT protocol has minimized transport overhead and protocol exchange to reduce network traffic and has an extraordinary mechanism to notify interested parties when an abnormal disconnection occurs as well [21].
The Constraint Application Protocol (CoAP) is a specialized Web transfer protocol for use with constrained nodes and constrained networks. The nodes often have 8-bit microcontroller with small amounts of Read Only Memory (ROM) and Random Access Memory (RAM), while constrained network often have high packet error rate and typical throughput is 10 kbps. This protocol designed for M2M application such as smart city and building automation. The CoAP provides a request and response interaction model between application end points, support build-in discovery services and resources, and includes key concepts of the Web, such as Universal Resources Locator (URls) and Internet media types. CoAP is designed to have a friendly interface with Hypertext Transfer Protocol (HTTP) for integration with the Web, while meeting specialized requirements such as multicast support, very low overhead and simplicity for constrained environments. On the other side, many people will still be driving even on the era of autonomous cars. The high cost of driverless cars, lack of trust and not wanting to give up driving might be among the reasons why those people will continue to drive their cars. Hence, many researchers and automotive engineers keep working on Driver Assistance Systems (DASs) and Driver Monitoring System (DMSs) as a primary safety feature required in order to achieve full marks in safety. DASs and DMSs are intelligent systems that reside inside the vehicle and help the driver in a variety of ways. These systems rely on a comprehensive sensing network and artificial intelligence techniques, and have made it possible to commence the era of connected cars. They can invoke action to maintain driver attention in both manual and autonomous driving. While the sensors are used to gather data regarding the Electronics 2021, 10, 1068 6 of 25 inside/outside environment, vehicle's technical status, driving performance and driver's condition, the intelligent systems task is to make decisions based on these data. If the vehicle measurements are combined with those of the surrounding vehicles and infrastructure, a better environment perception can be achieved. In addition, with different intelligent systems located at these vehicles as well as at fog servers more efficient decisions can be attained. Substantial research has been done over the years to build and improve DASs and DMSs. Many big automotive companies such as Toyota, Nissan, Mercedes-Benz, BMW, Volvo, and Saab, as well as third parties including Seeing Machines, Veoneer, and Smart Eye, are conducting continuous research to develop such intelligent systems.

Cluster Protocol in VANET
This component defines few clustering algorithms of Hypertext Transfer Protocol (Wireless sensor networks WSNs), and their advantages and disadvantages are studied. Hypertext Transfer Protocol (LEACH) [22] is a self-organizer clustering protocol that uses cluster based hierarchical routing to distribute an energy load on network devices. In this algorithm, the role of the cluster head is played by all existing nodes in each round in order to achieve uniform energy consumption. LEACH algorithm has two stages: 1-setting up stage 2-stable stage. In the first stage, clusters are formed and in the stable stage, communications are directed to cluster head sent to the roadside unit after being received and aggregated. For each node, the value between 0 and 1 is computed in the first round, if the computed value is less than the specified value (called threshold) for a node and is considered a head cluster. Ignoring "node residual energy" in selecting the cluster head and random selection at beginning of each round are the weak points of this algorithm. Distributed load balancing unequal clustering using fuzzy approach (DUCF) [23] is a clustering algorithm-based o fuzzy system. In this algorithm criteria such as "residual energy", "node grade" and "each node distance to the road side unit" are used to form the cluster. In DUCF, unequal clustering is used to yield balanced energy consumption. Using imbalanced clustering and FSs (fuzzy systems) is said to be the advantage of this method. The disadvantages are to select head cluster in very round which leads to maximize consumption of energy. Multi-objective fuzzy clustering algorithm (MOFCA) [24] is an extra clustering algorithm based on fuzzy system. This algorithm is presented to solve "energy hole" and "hotspot" problems. In this method "residual energy", "distance to road side unit," and "node density" are all used as fuzzy parameters, and in the starting of every round, random head clusters are selected. The selection of head cluster in this method is according to energy-based competition radius. Using unequal clustering in this algorithm causes balanced energy consumption, which is considered an advantage, and clustering in each round is taken to be a disadvantage.
Energy aware unequal clustering fuzzy (EAUCF) [25] is another clustering method presented to increase a network's lifetime. This algorithm is based on fuzzy system in which "residual energy" and "distance to road side unit" are used as fuzzy parameters. In order to improve previous methods' performances, a complete probable approach is not used for node selection, and periodic exchange of cluster head role among the nodes is done using fuzzy system. This algorithm increases lifetime in static networks, but it is not suitable for dynamic ones [26]. One weak point of this algorithm is that clusters must be estimated before clustering, making the algorithm complicated. Another problem in EAUCF method is ignoring "node density" as a parameter in cluster head selection. As a result of this, a node with few neighbors might be selected as the cluster head. Stability can be considered as one of the advantages of this algorithm. The EAFCA algorithm [27] is presented to improve clustering in wireless sensor networks. In this algorithm, data transmission inside each cluster is done in a multi-hop way, and the competition radius for each cluster is considered to be equal to two hops. It uses "residual energy", "node density", and "centralization degree" for cluster head selection. Considering communications inside the cluster in a multi-hop way is one of the advantages of this method. In this algorithm, clustering is done in every round, which increases the quantity of sent control messages and decreases the lifetime. The FLECH algorithm [28] is a hierarchical clustering algorithm based on fuzzy system. In this algorithm, "residual energy", "centralization degree", and "distance to road side unit" are used to elect the cluster head. Cluster head selection in this method is a combination of weighted and probable approaches that can be considered as an advantage. Clustering in each round is one of the disadvantages. In Reference [29], the author proposed the fuzzy logic system to resolve the multicasting issue distribution and inhomogeneous high vehicle mobility for some section crowded/not crowded to increase the routing protocol make the dynamic decision, which consisted of three input parameters of packet advancement number of duplicate packet delivered and local density.

Proposed Method
The algorithm assumptions are given as follows: All the vehicles (nodes) are homogenous, and they have balanced initial energy.
The vehicles (nodes) are distributed in the network randomly. All road side units and other devices (nodes) are static. For calculating the distance Euclidean method is used. Road side unit receive the data by cluster head in a multi-hop way and in certain cases in a single-hop way. The nodes which are positioned inside R distance to a certain device are considered as its neighbors.
The energy consumption model for sending L bit data package from the transmitter to receiver in d (distance) is as follows [29]: where d is mention for distance, E elec is considered as the amount of energy consumption for sending every binary digit (0,1) representing some sort of energy consumption to transfer data from sender to receiver, and ε fs is for more than one route operation. Required energy (ERX) is the required energy for the receiver to receive data and is obtained from the following relation [30]:

Symbolizations and Descriptions
The symbolizations of this paper are defined in Table 1, below.

Fuzzy Logic System
Geometric, coordinate points and other various methods used to measure the distance earlier. In proposed method the longitude and latitude points have been used to measure the distance of neighbors. We supposed that each vehicle is connected with GPS Global Positioning system [31]. Using GPS, we calculated the latitude and longitude points to compute neighbor vehicles' distance, according to these points among the neighbor vehicles computed. Here L A1 is the latitude point and L O1 is the longitude point of vehicle 01 noted as (V1); however, L A2 is the latitude point and L O2 is the longitude point of vehicle 02 noted as (V2). The distance between V1 and V2 was measured by using D = R*C notation, where R denotes the circle radius and C is computed as the range of center of radius equal to the distance between two points.

Speed
Data transmission can be interrupted by the speed of the vehicle in VANET, and it can cause dynamic topology changes in VANET. We supposed that every vehicle is connected with the speedometer of the vehicle to measure the speed of the vehicle in VANET [32].

Link Residual Time
Link Residual Time (LRT) is the time duration of vehicles when vehicles are in the communication range. The LRT is calculated by using a physical layer and distance parameters [33] like receiver power, transmission power and SNR signal-to-noise ratio. We can also optimize the efficiency of data transmission by using these LRT [34], where SNR0 is the received signal and noise ratio, SNRth is the threshold value of signal-to-noise ratio, d is the distance, and λ is the path loss.
The FLS (fuzzy logic system) contains main three parts: (i) fuzzy logic engine, (ii) fuzzifier, and (iii) defuzzifer. The fuzzification system receives three input parameters, namely speed, distance, and LRT (Link Residual Time). We used the member function, which is responsible for converting input data into fuzzy logic data. The value of distance in member function is {less, Medium, High}, the value of speed in member function is {slow, Medium, High}, and the value of LRT in member function is {Poor, Good, Average}. The member functions are defined inside triangular functions with value ranges between 0 and 1 [35].

Algorithm and Model
The fuzzy sets model gradual properties to model a theoretical possibilities matter the degree of satisfaction, and the data provided with uncertainty and imprecision allows them to be used in a vast variety of applications. The fuzzy control (FC) is the most famous application. The industrial applications since the appearance are the domestic appliances, process control, and automotive systems from the multiple other fields [36] shown in Figure 1.

Fuzzy Control in the Fuzzy Control Systems
The knowledge based expert is encoded fuzzy rules mechanism which helps to decide specific operation(s) for different modules of environment which represented by FS. The fuzzy control methodology also allows to model any type of control law which depend upon some sort of conditions that this law can be defined as "if …. then …." set of rules as in expert systems case. The fuzzy logic diverges from approach called SES Standard Expert System with mechanism called interpolation. According to the complex processes approach, it can be helpful to get more knowledge based on practical and expert operators rather than to compute optimal control [37][38][39].

Linguistic Variables
A central idea of fuzzy logic that plays a very important role in the application of fuzzy logic is linguistic variable. Multiple numerical values can be represented by a single linguistic variable therefore it is so called the form of a data compression. It is recom-

Fuzzy Control in the Fuzzy Control Systems
The knowledge based expert is encoded fuzzy rules mechanism which helps to decide specific operation(s) for different modules of environment which represented by FS. The fuzzy control methodology also allows to model any type of control law which depend upon some sort of conditions that this law can be defined as "if . . . . then . . . ." set of rules as in expert systems case. The fuzzy logic diverges from approach called SES Standard Expert System with mechanism called interpolation. According to the complex processes approach, it can be helpful to get more knowledge based on practical and expert operators rather than to compute optimal control [37][38][39].

Linguistic Variables
A central idea of fuzzy logic that plays a very important role in the application of fuzzy logic is linguistic variable. Multiple numerical values can be represented by a single linguistic variable therefore it is so called the form of a data compression. It is recommended to suggest to use and refer linguistic variable data compression form [40]. Similar results can be achieved using conventional quantization since in this case of quantization the interval values are used however in the other hand granulation the overlapping values are used in fuzzy sets. The strangeness of granulation then quantization are as follows: (i) it is generalized, (ii) it provides the way to compile linguistic values, and (iii) transition of linguistic value from or to contiguous linguistic value is more gradual than abrupt, and the performance is more robust.

FC Rules
Fuzzy control explores an algorithmic approach for the process control between data and rules(conditions), which can control the process. Here we supposed variables i,j as input variables and k for the out of the process. Here we used control algorithm's rules in expression like "if . . . then . . . "; likewise, if I is less and j is greater than k is average; if I is greater and j is average then k is greater; these conditional rules are termed as fuzzy control rules. The "if" section of rule set is known as the antecedent and the "then" section of rule set is known as the consequent. As we defined that I and j variables are used as input and k is the output variable [39]. The values "less", "greater", and "Average" are called fuzzy values of i and j; however, they are mapped by FS fuzzy sets. Fuzzy controllers are the set of rules which receives the input of I and j variables and based on those input variables the output is computed through the fuzzy interface [40].

Control Knowledge Base
While designing the control knowledge base (CKB), the two main parameters must be considered first, the linguistic variable set that describes the values for the whole process's major parameters. Here both input, as well as output parameters, must be expressed in the form of linguistic variable definition by using complete and clear term sets. In the smoothness of process control, granularity selection of an input and output variables plays an important role. Secondly a mechanism of control knowledge base is very primary to develop for using the input and output linguistic parameter's description. Four different methods have been suggested for achieving this [41][42][43][44][45]: self-organization, modeling of operator's control operation, expert's experience and knowledge, and modeling a process. From the methods discussed above, the third one is the most widely used method. In the third method, called expert operator's knowledge, the fuzzy rules of the form "If Error is small and Change-in-error is small then the Force is small" used in various research studies [46][47][48]. This method performs more efficiently when human expertise is used to express the knowledge base heuristic to control the process in the form of linguistic variable.

Defuzzification Methods
The operation termed as defuzzification operation generates a non-fuzzy control action which show the member function for an inferred fuzzy control action. Different defuzzification approaches have been found in the literature out of them the four different methods have been selected to often apply here: The x coordinates of four angles of trapezoidal MF can be determined using parameters {a, b, c, d} (with a < b <= c < d).

Generalized bell MFs
bell(x; a, b, c, d) = 1 1 + x−c a 2b 4. Express multicast VANETS 5. Allocate the VANET among controller and user node. 6. Discontinuing conditions. 7. Assess parameter. Flowchart steps 1. Start the process. 2. Deploy, stands for the VANET nodes, Road Side Units (RSUs), and VANET server [50]. 3. To assess the vehicular nodes and vehicular register. Each initiated node must have its own destination and source. 4. Perform data aggregation. 5. Allocate the Addresses, mobility and Names using fuzzy member functions. 6. Perform data retrieval process which depends on fuzzy specified for the limit contrary to natural which is developed to support the fuzzy system.

Experimental and Evaluation
For performance evaluation of suggested system and for comparison with existing systems, we utilized the software simulator tool named NS-2 [51]; in Table 2, the suggested system is evaluated with different significant challenges such as CH duration, Average, Stability convergence, cluster member, control overhand by speed and vehicle, energy consumption and throughput of various parameters. Secure Stable-CA [51][52][53][54][55][56][57] and Moth-Flame-CA [58] were used to perform the comparison of stab Trust. Once the operation on different elements of trust, the value of stab Trust is between 0.0 to 1.0. This simulation is integrated with Simulation Urban Mobility (SUMO) for evaluation of runtime environment. For the simulation, we arrayed 10,000 different nodes randomly in the distance of 200 m, and IEEE 802.11 standard protocol was used for medium access [59] with the transmission speed of 8Mbps. The remaining parameters are shown in Table 2. Whole simulation was implemented with different types of vehicles which enter through different entry points and meet other vehicles' genetic algorithm for training the behaviors and patterns of traffic network, using unsupervised machine learning method. Additionally, it has the features to deal with reservations available in traffic network data because it also has soft computing characteristics. The numeric chromosome encoding method is used in proposed system. However, the binary encoding method is commonly used method since the runtime value encoding is primarily applicable, as shown in Figure 3. Evaluation of fitness as per time intervals [60][61][62][63][64][65][66]. Furthermore, the tributes are considered as numeric values in this case it is not mandatory to encrypt and decrypt binary digits into numeric or any other type of values. Here every chromosome is said to be a single value (numeric) for every property rather than considering whole values as time intervals or all properties as chromosome. We supposed two reasons to follow this encoding process: (1) Every time interval could be elevated uniquely with the analysis of real time, and (2) every attribute could be elevated in parallel form, which speeds up the analysis process. Due to chromosomes encoding numerically arithmetic operations used to implement the crossover and mutation operations, the output of chromosome after crossover operation is the average of a particular chromosome. The mutation operation can affect the chromosomes value as 1% chances of subtraction and 3% chances of adding in/from the current value of chromosome. If the change is in small value portion, then the technique works for multiple solutions. It was perceived that the maximum mutation can lead to delay the evaluation mechanism due to non-convergence values of chromosomes. Every interval's superior and interior limits are computed to create essential population values that are very close to optimal point. To generate a greater number of creations, the genetic actions of mutation, crossover and selection are performed. The function called fk is used to assess the creation of chromosomes in Euclidean distance among chromosomes and every component of input variable [67][68][69][70][71][72][73][74][75][76][77].
lead to delay the evaluation mechanism due to non-convergence values of chromosomes. Every interval's superior and interior limits are computed to create essential population values that are very close to optimal point. To generate a greater number of creations, the genetic actions of mutation, crossover and selection are performed. The function called fk is used to assess the creation of chromosomes in Euclidean distance among chromosomes and every component of input variable [67][68][69][70][71][72][73][74][75][76][77].

Performance Results
We show the simulation-based results computed using and fuzzy-IoT, two fuzzy, Fuzzy-Based Driver Monitoring System (FDMS) the vehicle speed (VS), which has been considered a fixed parameter. The relation of fuzzy-IoT, two fuzzy, and FDMS for various values is shown Figure 3 shows the simulation based results with the value of VS as 50. The proposed method goes to its highest value, which is 50, as compared to fuzzy-IoT, two fuzzy, and FDMS; for this specific value, the vehicle speed and velocity are the same as other clusters' vehicles. The vehicles leave the cluster if the vehicle moves faster or

Performance Results
We show the simulation-based results computed using and fuzzy-IoT, two fuzzy, Fuzzy-Based Driver Monitoring System (FDMS) the vehicle speed (VS), which has been considered a fixed parameter. The relation of fuzzy-IoT, two fuzzy, and FDMS for various values is shown Figure 3 shows the simulation based results with the value of VS as 50. The proposed method goes to its highest value, which is 50, as compared to fuzzy-IoT, two fuzzy, and FDMS; for this specific value, the vehicle speed and velocity are the same as other clusters' vehicles. The vehicles leave the cluster if the vehicle moves faster or slower velocity than the other vehicles [78][79][80][81][82][83]. The possibilities of vehicle to reside inside the cluster are more when the value of Fuzzy-IoT is increased. In Figure 3, the value of VS is considered 50 and 100 accordingly. When the value of VS increases the value of fuzzy-IoT, two fuzzy, FDMS is increased automatically, which shows that this vehicle possesses more chances to remain inside the cluster because it is considered more secure. Figure 4 also shows the proposed simulation results. Comparing our method Figure 5 with the results, we can see that the proposed method have less delay than other methods could have more possible chances for remaining inside the cluster. Thus, the vehicles are traveling with the same speed and velocity as other clusters' vehicles are traveling, have high connectivity, and have high security and trustworthiness (Table 3). Electronics 2021, 10, x FOR PEER REVIEW 16 of 25   We also optimized the parameter of trustworthiness in the proposed system, in this regard we reflected the VS and vehicle time (VT) as fixed parameters Tables 4-6 in this table we fixed value 10 in this case if VT and CS both are 10. The vehicle has to leave the cluster, this define that if any vehicle has low security and low trustworthiness has to    We also optimized the parameter of trustworthiness in the proposed system, in this regard we reflected the VS and vehicle time (VT) as fixed parameters Tables 4-6 in this table we fixed value 10 in this case if VT and CS both are 10. The vehicle has to leave the cluster, this define that if any vehicle has low security and low trustworthiness has to   The comparative results represent the satisfactory performance of mobility models in VANET [72][73][74][75].
We also optimized the parameter of trustworthiness in the proposed system, in this regard we reflected the VS and vehicle time (VT) as fixed parameters Tables 4-6 in this table we fixed value 10 in this case if VT and CS both are 10. The vehicle has to leave the cluster, this define that if any vehicle has low security and low trustworthiness has to leave the cluster even the vehicles are traveling in same speed as other vehicles are traveling. (1) Overhead Here overhead is illustrated by using the set of additional or even oblique period of computation, data transfer speed, storage, and a few other features that are mandatory to be considered for achieving specific output. As shown in Table 4, it is assumed that the control overhead technique has achieved significant results rather than the other techniques reviewed in the literature.
The comparative results of control overhead among the proposed method and existing is shown in Figure 6. Here the x-axis illustrates the speed of vehicles, and the y-axis shows the time value. In the case of the proposed system, overhead is compared as lower than [7]. The comparative results of control overhead among the proposed method and existing is shown in Figure 6. Here the x-axis illustrates the speed of vehicles, and the y-axis shows the time value. In the case of the proposed system, overhead is compared as lower than [7]. (2) Aggregation Time Aggregation time is time period which consumed to aggregate the data. Basically it combines very close and similar data details which could be sent via unique nodes. As shown in Table 5, it is desirable to decrease the data volume before sending them. The comparative results show the better performance of proposed data aggregation time then the existing techniques found in the literature [7]. (2) Aggregation Time Aggregation time is time period which consumed to aggregate the data. Basically it combines very close and similar data details which could be sent via unique nodes. As shown in Table 5, it is desirable to decrease the data volume before sending them. The comparative results show the better performance of proposed data aggregation time then the existing techniques found in the literature [7].
The comparative result of aggregation time of proposed method and existing method is shown in Figure 7, where the x-axis illustrates the speed of vehicles, and the y-axis illustrates the time. The comparative results show the better performance with lower numeric values of proposed data aggregation time than the existing techniques found in the literature.  The comparative result of aggregation time of proposed method and existing method is shown in Figure 7, where the x-axis illustrates the speed of vehicles, and the y-axis illustrates the time. The comparative results show the better performance with lower numeric values of proposed data aggregation time than the existing techniques found in the literature. (3) Time to Live A mechanism which limits this lifecycle and duration of facts during computer network is known as TTL (Time to Live). This Time to Live is also considered as timestamp embedded and mounted on this data. When the feature called timestamp is elapsed then the data details are automatically discarded. TTL is acquainted for performance and privacy increment as shown in Table 6. (3) Time to Live A mechanism which limits this lifecycle and duration of facts during computer network is known as TTL (Time to Live). This Time to Live is also considered as timestamp embedded and mounted on this data. When the feature called timestamp is elapsed then the data details are automatically discarded. TTL is acquainted for performance and privacy increment as shown in Table 6.
The comparative result of Time to Live (TTL) of proposed method and existing method is shown in Figure 8, where the x-axis illustrates the speed of vehicles, and the y-axis illustrates the time. The comparative results show the better performance with lower numeric values of proposed Time to Live (TTL) than the existing techniques found in the literature. The comparative result of Time to Live (TTL) of proposed method and existing method is shown in Figure 8, where the x-axis illustrates the speed of vehicles, and the yaxis illustrates the time. The comparative results show the better performance with lower numeric values of proposed Time to Live (TTL) than the existing techniques found in the literature.  Figure 9 shows the fuzzy sets model gradual properties to model a theoretical possibilities matter the degree of satisfaction, and the data provided with uncertainty and imprecision allows them to be used in a vast variety of applications (RSS) feature of the member function, which also represents the performance of received signal. The received signal leads to obtain the parameter and then it is measured with range of radio. The RSS member function express the total in percent of radio ranges. The values for the x-axis are expressed in the range between 0 to 100%; the calculated percentage tells the closeness between two vehicles in the radio range, usually the total radio range is 100 m. The 0% defines that the smart device is out of radio range and radio signals are unreachable to the smart device, while 100% defines that the vehicles are close to each other and radio signal frequency is very strong. The communication and data transmission can be done once the radio signal's receiving rate is greater than of 30%. Effective and strong communication takes place when the rate receiving radio signal is above 70%; this describes that the vehicles are very close to each other; however, there would be no packet or frame loss while communication takes place at a distance.  Figure 9 shows the fuzzy sets model gradual properties to model a theoretical possibilities matter the degree of satisfaction, and the data provided with uncertainty and imprecision allows them to be used in a vast variety of applications (RSS) feature of the member function, which also represents the performance of received signal. The received signal leads to obtain the parameter and then it is measured with range of radio. The RSS member function express the total in percent of radio ranges. The values for the x-axis are expressed in the range between 0 to 100%; the calculated percentage tells the closeness between two vehicles in the radio range, usually the total radio range is 100 m. The 0% defines that the smart device is out of radio range and radio signals are unreachable to the smart device, while 100% defines that the vehicles are close to each other and radio signal frequency is very strong. The communication and data transmission can be done once the radio signal's receiving rate is greater than of 30%. Effective and strong communication takes place when the rate receiving radio signal is above 70%; this describes that the vehicles are very close to each other; however, there would be no packet or frame loss while communication takes place at a distance. Figure 10 defines the value of traffic between devices and this value can be high, low and normal. Here the ratio parameter of channel capacity and capture packets is defined. The value of traffic is normal if traffic is represented greater than 30% but less than 70% in the channel capacity. Moreover, the value of traffic can be seen low if capacity of radio signal is less than of 30%, finally the value of traffic can be high if capacity of radio signal is less than of 70%.  Figure 10 defines the value of traffic between devices and this value can be high, low and normal. Here the ratio parameter of channel capacity and capture packets is defined. The value of traffic is normal if traffic is represented greater than 30% but less than 70% in the channel capacity. Moreover, the value of traffic can be seen low if capacity of radio signal is less than of 30%, finally the value of traffic can be high if capacity of radio signal is less than of 70%.  Figure 11 defines the signal interference ration (SIR) parameter for the calculated range of every cluster, and this wanted a signal energy to interfere with the vehicles range. However, the interference is dedicated for each device on selected cluster, and this is satisfied once the value is greater than 1; however, cluster is unsatisfied for the vehicle if the   Figure 10 defines the value of traffic between devices and this value can be high, low and normal. Here the ratio parameter of channel capacity and capture packets is defined. The value of traffic is normal if traffic is represented greater than 30% but less than 70% in the channel capacity. Moreover, the value of traffic can be seen low if capacity of radio signal is less than of 30%, finally the value of traffic can be high if capacity of radio signal is less than of 70%.  Figure 11 defines the signal interference ration (SIR) parameter for the calculated range of every cluster, and this wanted a signal energy to interfere with the vehicles range. However, the interference is dedicated for each device on selected cluster, and this is satisfied once the value is greater than 1; however, cluster is unsatisfied for the vehicle if the  Figure 11 defines the signal interference ration (SIR) parameter for the calculated range of every cluster, and this wanted a signal energy to interfere with the vehicles range. However, the interference is dedicated for each device on selected cluster, and this is satisfied once the value is greater than 1; however, cluster is unsatisfied for the vehicle if the value is less than 1. Once the member function has been defined for every parameter, the next step of definition is to define the heuristic rules.
Electronics 2021, 10, x FOR PEER REVIEW 21 of 25 value is less than 1. Once the member function has been defined for every parameter, the next step of definition is to define the heuristic rules. The channel assignment mechanism needs to select the cluster first and then take the value for the vehicle figure's rank. Figure 12 shows the output of the fuzzy logic of Node 1. The value of every vehicle's rank depends on the input parameters and set of heuristic rules described in FL fuzzy logic. The maximum value illustrates the effectiveness of channel of communication. Here the fuzzy logic runs on very device and in-fact the parameters can vary depending on the quantity of vehicles within the radio range. PU activity, traffic, and channel ranking support cluster selection.  The channel assignment mechanism needs to select the cluster first and then take the value for the vehicle figure's rank. Figure 12 shows the output of the fuzzy logic of Node 1. The value of every vehicle's rank depends on the input parameters and set of heuristic rules described in FL fuzzy logic. The maximum value illustrates the effectiveness of channel of communication. Here the fuzzy logic runs on very device and in-fact the parameters can vary depending on the quantity of vehicles within the radio range. PU activity, traffic, and channel ranking support cluster selection.
Electronics 2021, 10, x FOR PEER REVIEW 21 of 25 value is less than 1. Once the member function has been defined for every parameter, the next step of definition is to define the heuristic rules. The channel assignment mechanism needs to select the cluster first and then take the value for the vehicle figure's rank. Figure 12 shows the output of the fuzzy logic of Node 1. The value of every vehicle's rank depends on the input parameters and set of heuristic rules described in FL fuzzy logic. The maximum value illustrates the effectiveness of channel of communication. Here the fuzzy logic runs on very device and in-fact the parameters can vary depending on the quantity of vehicles within the radio range. PU activity, traffic, and channel ranking support cluster selection.  The higher vehicle rank value is shown that defines the more effectiveness of vehicle rank for communication. Only one parameter, based on rank, is not enough to express the communication quality. Because of the high SIR (signal interference ration) value of communication channel can encompass more traffic. However, the channel having more traffic for the communication is not reliable, since channels have no space for the packets.

Conclusions
The VANET is variable-infrastructure, decentralized, and self-organizing connectivity of WSDs wireless vehicles, allowing communication between different WSDs inside the transmission range. In this research, we performed the mobility modeling evaluation through EEFM with IoT in VANET, using the location of vehicle gadgets. We analyzed the supposed FL fuzzy logic rules and checked the probability of connection, determined through EEFM with IoT in VANET. The proposed method implemented and tested the evaluated results having high-throughput, efficient and smooth values. Here, we concluded that the EEFM with IoT in VANET system could generate accurate communication data with IoT in VANET. Our prosed method is different from the existing method [84] because three parameters, namely the (1) distance of each node, (2) remaining energy, and (3) number of neighbors of every node, were considered as fuzzy criteria. Results of this research compared to various other algorithms in relation to parameters like dead node in every round, the first node expires, half node expire, last node expire, and the network lifetime. The simulation results show that the proposed approach outperforms other methods. On the other hand, the VANET environment is vulnerable at the time of data transmission, compared to the existing protocols, such as fuzzy-IoT, two fuzzy, and FDMS. The performance comparison also emphasizes the effective utilization of the resources. Simulations on highway environment show that the suggested protocol has an improved QoS efficiency compared to the above published methods in the literature. We proposed the method discussed overhead, aggregation time, time to live, RRS membership function, and traffic membership function shown in the Results section. We will propose mobile vehicle privacy, using the clustering method to secure communication in fog computing in future work.