Next Article in Journal
Silicon-Germanium Heterojunction Bipolar Transistor DC and AC Analysis Operating under Cryogenic Temperature
Next Article in Special Issue
Analysis of Teachers’ Cognitive Ability and Teaching Motivation on the Academic Achievement of Students in Higher Education via Employment Data Guidance
Previous Article in Journal
An Artificial Visual System for Three Dimensional Motion Direction Detection
Previous Article in Special Issue
Improving Healthcare Applications Security Using Blockchain
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Privacy-Preserving Mobility Model and Optimization-Based Advanced Cluster Head Selection (P2O-ACH) for Vehicular Ad Hoc Networks

by
Nejood Faisal Abdulsattar
1,
Dheyaa Abdulameer Mohammed
1,
Ahmed Alkhayyat
2,3,
Shemaha Z. Hamed
4,
Hussein Muhi Hariz
5,
Ali S. Abosinnee
6,
Ali Hashim Abbas
1,*,
Mustafa Hamid Hassan
1,
Mohammed Ahmed Jubair
1,
Fatima Hashim Abbas
7,
Abeer D. Algarni
8,
Naglaa F. Soliman
8,9 and
Walid El-Shafai
10,11
1
College of Information Technology, Imam Ja’afar Al-Sadiq University, Al-Muthanna 66002, Iraq
2
College of Technical Engineering, The Islamic University, Najaf 54001, Iraq
3
Department of Medical Instruments Engineering Techniques, Al-Turath University College, Baghdad 10021, Iraq
4
Department of Medical Instruments Engineering Techniques, Al-Farahidi University, Baghdad 10011, Iraq
5
Computer Engineering Department, Mazaya University College, Nasiriya 64001, Iraq
6
Altoosi University College, Najaf 54001, Iraq
7
Medical Laboratories Techniques Department, Al-Mustaqbal University College, Hillah 51001, Iraq
8
Department of Information Technology, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh 11671, Saudi Arabia
9
Department of Electronics and Communications, Faculty of Engineering, Zagazig University, Zagazig 44519, Egypt
10
Security Engineering Lab, Computer Science Department, Prince Sultan University, Riyadh 11586, Saudi Arabia
11
Department of Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering, Menoufia University, Menouf 32952, Egypt
*
Author to whom correspondence should be addressed.
Electronics 2022, 11(24), 4163; https://doi.org/10.3390/electronics11244163
Submission received: 8 October 2022 / Revised: 24 November 2022 / Accepted: 25 November 2022 / Published: 13 December 2022
(This article belongs to the Special Issue Artificial Intelligence in Cybersecurity for Industry 4.0)

Abstract

:
In vehicular ad hoc networks (VANETs), due to the fast-moving mobile nodes, the topology changes frequently. This dynamically changing topology produces congestion and instability. To overcome this issue, privacy-preserving optimization-based cluster head selection (P2O-ACH) is proposed. One of the major drawbacks analyzed in the earlier cluster-based VANETs is that it creates a maximum number of clusters for communication that leads to an increase in energy consumption which reflects in a degradation of the performance. In this paper, enhanced rider optimization algorithm (ROA)-based CH selection is performed and that optimally selects the CH so that effective clusters are created. By analyzing this, the behavior of the bypass rider’s CH is chosen, and this forms the optimized clusters, and during the process of transmission, privacy-preserving mobility patterns are used to secure the network from all kinds of malfunctions which are performed by the new vehicle blending and migration process. The proposed P2O-ACH is simulated using NS-2, and for performance analysis, two scenarios are taken, which contain a varying number of vehicles and varying speeds. For a varying number of vehicles and speeds, the considered parameters are energy efficiency, energy consumption, network lifetime, packet delivery ratio, packet loss, network latency, network throughput, and routing overhead. From the results, it is understood that the proposed method performed better when compared with earlier work, such as GWO-CH, ACO-SCRS, and QMM-VANET.

1. Introduction

Vehicular ad hoc networks (VANETs) are a type of mobile ad hoc network (MANETs), and their main motivation is to control accidents and obtain better road safety. VANETs consist of intelligent vehicles to monitor and control the traffic of intelligent transportation systems, and they concentrate on issues such as accident control, congestion control, traffic patterns, and energy [1]. Here, for connectivity purposes, vehicles are equipped with the onboard unit (OBU). The types of communication in VANETs are vehicle-to-vehicle, vehicle-to-Internet, and vehicle-to-infrastructure [2]. VANETs’ intelligent vehicles are highly talented at accessing new services to provide road safety [3]. Now, the Internet of Energy (IoE) is newly introduced to compete for the industrial application to satisfy the utilization of energy and demand [4]. For effective communication, delay, and scalability, the dangerous issues this creates cause most of the damage in the network. In this situation, intelligent clustering approaches were introduced into a process that plays a significant role in the vehicular communication system. Clustering represents a grouping of the network based on the similarity according to certain parameters, such as node distance, bandwidth, etc. A cluster is a group of members that selects one among the nodes as the cluster head (CH) and all other nodes are cluster members (CM) [5,6]. In a vehicular network, cooperative communication is a preferable choice. It examines the V2V links based on VANETs in depth; particularly because the vehicle-to-vehicle (V2V) connections have more difficult mobility contexts than vehicle-to-infrastructure (V2I). Dynamic nature is a crucial property of VANETs; dynamic topology commonly happens and that leads to unreliable communications. Clustering, in reality, makes network structures and communication more reliable, and an adaptable manner and stable power control (RPC) technique could produce higher outcomes even when the mobile channel fluctuates. The joint clustering and RPC techniques are critically based on these findings [7].
VANET categorization is recognized as a critical strategy for improving the network efficiency. It is linked to several different aspects. Stable clustering, for instance, has been evident through strong MAC scheduler efficiency, efficient routing, and, as a consequence, a durable and secure system [8]. There are many different types and classes of clustering in VANET. Both single-hop networks and multi-hop networks are differentiated based on their architecture [9]. In regard to systems, there are centered as well as distributed forms of the present network; there are highway vs. urban models; based on volume, there are dense vs. sparse concepts; and based on capability, there are high vs. slow speed concepts. Morphology statistics, such as the kind of vehicle, driver’s goal of moving from one place to another, and so on, and movement knowledge, including direction, velocity, and acceleration, can all be utilized to cluster VANETs [10].
Clustering is scalable and stable network structures provide an easy way for effective communication. Vehicles inside the clusters are CH, CM, and gateway. CH acts as an access point to manage the traffic pattern of the cluster. All of the CM nodes will communicate with the CH, and then inter-cluster communication is initiated to reach the destination. Cluster-based routing improves the network capacity, which leads to efficient data delivery and utilization of bandwidth [11]. In certain protocols, parameter-based CH is initiated, which is based on distance, direction, and speed. Such processes increased the network overhead. Some clustering protocols concentrate on reducing malfunctions and vulnerabilities in the network [12,13,14]. Infrastructure-less vehicular communication and group communication is essential in providing effective communication. To improve the security of the network, new methods need to be introduced in VANETs [15,16,17]. However, due to the huge dynamic mobility of vehicles, these protocols become inefficient for VANETs. To overcome these drawbacks in this research, privacy-preserving optimization-based advanced CH selection (P2O-ACH) is proposed, which helps to reduce network congestion and instability. The two main sections of the protocol are enhanced rider optimization algorithm-based CH selection and privacy-preserving mobility patterns. By using these methods, the network stability is increased, which leads to effective communication in VANETs.

Contribution of the Research

  • The purpose of the development of the proposed P20-ACH method is to improve the privacy and energy efficiency of the VANETs network by reducing energy consumption, delay, and routing overhead.
  • Effective cluster heads are chosen using the advanced ROA-based CH selection process that results in improving network connectivity and stability that reflects in the reduction of energy consumption and delay in the network.
  • To protect the vehicles from malicious activities in this paper, the privacy-preserving mobility model is introduced so that the vehicle behavior is monitored, which reflects in the increase of the trustworthiness of the network.
  • Through this effective CH selection and privacy-preserving mobility model, the effectiveness of the network is highly increased, which reflects in the increase of the network lifetime.
The rest of the paper is organized into the following sections. The related works are discussed in Section 2. The system model with network model assumptions is elaborated on in Section 3. The proposed P20-ACH method is detailed in Section 4. The simulation results are evaluated in Section 5. Finally, in Section 6, the conclusion as well as the possible future directions are given.

2. Related Works

2.1. Clustering Associated Research

Clustering is utilized in a variety of communication networks [18] and VANET cluster analysis [19]. The clustering of VANETs is the emphasis of this research study. Some additional method uses density as the major parameter for several VANET clustering techniques. A strategy for clustering depending on density measure is presented in [20].
In [21], the idea is proposed of presenting two CHs in a single cluster, which are the main CH and secondary CH. The maximum weight is given to the main CH (PCH), which is calculated using parameters such as the average rate of speed between vehicles. To enhance cluster stability, the secondary CH will act as the backup to the PCH and assumes responsibilities when the PCH leaves the cluster. Presented in [22] is the double-head clustering (DHC) approach, which used new measures for channel access to improve cluster stability and efficiency. It analyzes the signal strength and the connection expiry time, in addition to the vehicle’s velocity, orientation, and location (LET).
Presented in [23] is a clustering algorithm to reduce power consumption. To enhance the lifetime of the network cluster, head and load balancing are concentrated. Elective CH election with CH rotation is done. This method improves the throughput and lifetime of the network, but fails to achieve a high packet delivery ratio; hence, this is not suitable for a network with dynamically varying topology.
In [24], the author recommended a destination-aware context-based routing scheme to increase the packet delivery ratio and reduce network delay. This structure includes cluster formation, motor location, and speed of the vehicles. The cluster creation and CH selection are done with the help of the motor mobility and connection details, but this method fails to achieve high throughput.
In [25], the author suggests a novel clustering method to improve the throughput and packet delivery ratio of the VANETs. The proposed method combines the modified k-means algorithm and the maximum stable set problem. Effective cluster formation and CH selection are done through this method. However, this method produces more overhead and delays during the process of transmission.
Presented in [26] is a two-fold model for a stable CH election process, which consists of one or many kinds of communication with the hyper-graph spectral clustering method and cluster maintenance. This method greatly helps to increase the lifetime of the network and achieves moderate improvement in the throughput and delivery ratio. Furthermore, this produces high routing overhead and delay.
Suggested in [27] is a fuzzy logic-based cluster selection to improve the stability of the network. This method greatly improves the lifetime and efficiency of the network, but fails to achieve high throughput and packet delivery ratio.
Presented in [28] is a cluster-based routing protocol to improve the path length and data delivery ratio, as well as to reduce the average end-to-end delay. Here, a named data network technique is used in a hybrid communication model for dedicated short-range communication. However, this method produces more overhead and fails to achieve high throughput.
Introduced in [29] is a multi-channel clustering-based congestion control algorithm to significantly improve the network performance by minimizing the energy consumption in VANETs. It is one of the proactive infrastructure-based clustering approaches. Though this method’s energy efficiency has increased, this type of approach is not suitable for a network with a huge dynamic mobility model.

2.2. Optimization-Associated Research

Suggested in [30] is a novel approach to improve the packet delivery ratio of the network called reliability aware multi-objective optimization using the enhanced Gaussian mutation harmony searching method. The core process of this method is Gaussian mutation, objective decomposition, and a harmony memory extraction algorithm. This method improves the packet delivery ratio and reduced the delay. However, the routing overhead is high.
Promoted in [31] is a two-hop routing algorithm to improve the throughput, delay, packet delivery ratio, packet loss rate, and communication overhead of the VANETs. This algorithm is based on multi-objective Harris Hawks optimization. Though this method achieves a better overall performance, this type of approach is not suitable for a network with a huge dynamic mobility model.
In [32], the author described the federated learning and blockchain to improve the trust and integrity of the network. This paper shows the current research challenges of the VANETs in terms of security and privacy perspectives.
Introduced in [33] is a method to improve the convergence speed of the network called the Hybrid Genetic Firefly Algorithm-based Routing Protocol. The essential feature of GA is combined with the Firefly Algorithm and it is applied in both the lightly populated and heavily populated areas. The performance is better in both scenarios, but it fails to achieve higher throughput.
Suggested in [34] is a reactive routing protocol called AODV with ant colony optimization (ACO) to improve the data transmission in VANETs during the process of communication. The multicasting approach is used for path establishment. Due to this method, the system achieves high throughput, low packet loss, and low end-to-end delay, but it produces more routing overhead during transmission.
Developed in [35] is a method to improve the packet delivery ratio and throughput of unmanned aerial vehicles (UAVs). Here, the particle swarm optimization algorithm is utilized for finding the optimal deployment of UAVs, which is based on vehicle density, heading direction, and previous coverage information. This method produces high routing overhead.
In [36], the instability is reduced, which is created by random topology in VANETs after the author introduced a grey wolf optimization-based clustering algorithm. In this concept, the cluster head is chosen according to the social behavior and hunting mechanism of grey wolves. This method produced a high packet delivery ratio with reduced energy consumption, but the network throughput is very low. The efficiency of the network is reduced with the increase of the throughput in the network.
Proposed in [37] is a street-centric routing scheme (SCRS) for the process of optimal path selection in the VANET network. Concepts such as multipath routing and ant colony optimization (ACO)-based clustering play a major role in improving the performance of the network. This method greatly reduces the computational cost and end-to-end delay, and produced more packet delivery ratio. However, the routing overhead is high and throughput is moderate.
In [38], the author proposed the concept called QMM-VANET, which is the quality of service (QoS)-based mobility management; it is the reliable and stable CH selection method with the trustier vehicle. Additionally, it concentrates on retransmitting the packets using gateways and gateway recovery algorithms. This method achieves a high packet delivery ratio and network stability. However, throughput is moderate. Table 1 shows the summary of previous related works.
After analyzing the earlier study, the major limitations which are present in the earlier research are improper mobility management in dynamic communication range, improper inter-vehicular link reliability, ineffective cluster formation, and lack of security. Due to these drawbacks, the effectiveness of VANETs’ communication is highly affected, which leads to a reduction in the performance of the network.
So, there is a need to develop a new model which fulfills these criteria. Therefore, in our proposed work, the privacy-preserving mobility mode and optimization-based advanced cluster head selection are performed. ROA-based CH selection is done to improve efficiency and reduce the congestion and overhead in the network. The privacy-preserving mobility model is used to improve the accuracy of the network by enhancing security. A detailed elaboration of the proposed method is given below.

3. System Model

Due to the increase in population in urban areas, the enhancement of infrastructures with appropriate facilities becomes essential. Hence, IoT-based smart cities are introduced to meet the requirements of the city inhabitants. The required system model with a WSN embedded IoT network is constructed. At the initial stage, clusters are generated and it is improvised in Section 4. Generally, the network is subdivided into N clusters. Each cluster consists of one cluster head (CH) and N number of cluster members (CM). The sink node S n o d e is used to collect the data packets from the CHs from each cluster and then transmit that to the required end user. The core objectives, which are used for the selection of CH are residual energy, coverage area, latency, and network traffic. Thus, the CH node is only able to communicate with the S n o d e and the other nodes in the network. Hence, the selection of CH becomes a more complex process in an IoT network; we are using multiple objectives for the selection of CH in our proposed work. In Table 2 the symbols and descriptions used for the entire proposed work are given.

3.1. Network Model Assumptions

The nodes are static in nature as well as homogeneous. The residual energy allocated to each CM node is 0.5 Joules. The structure of the S n o d e is centralized. At the initial stage, all the nodes are localized randomly. Then, groups are divided and CH is chosen, which helps transfer the data packets to the S n o d e using a single or multi-hop communication model. The node with maximum residual energy is chosen as a CH for better performance. Mobility model selection is given in Table 3.

3.2. Initial CH Selection

The major objective functions used for the selection process of the CH and CM are velocity, link capacity, latency, and residual energy of the node. The expression for the calculation of
R E C H C M e n e r g y = i = 1 n O F C H e n e r g y ( r e m ) O F C H e n e r g y ( i n i t i a l ) i = 1 n O F C M e n e r g y ( r e m ) O F C M e n e r g y ( i n i t i a l )
where, O F C H e n e r g y ( r e m ) represents residual energy of the CH, O F C H e n e r g y ( i n i t i a l ) represents initial energy of CH, O F C M e n e r g y ( r e m ) represents remaining energy of the CM, O F C M e n e r g y ( i n i t i a l ) represents initial energy of CM.
O F C H e n e r g y ( r e m ) O F C H e n e r g y ( i n i t i a l ) = i = 1 N R E ( C H j ) i = 1 N I E ( C H j )
O F C M e n e r g y ( r e m ) O F C M e n e r g y ( i n i t i a l ) = i = 1 N R E ( C M j ) i = 1 N I E ( C M j )
where, N is the number of nodes inside the cluster, R E ( C H j ) represents the remaining energy of the CH inside the cluster, I E ( C H j ) represents the initial energy of the CH inside the cluster, R E ( C M j ) represents the remaining energy of the CMs inside the cluster, I E ( C M j ) represents the initial energy of the CMs inside the cluster,
Velocity calculation of the network is calculated according to the average speed of the network. For example, a vehicle moves at the speed of 72 km/h and 100 km/h. Hence, the average speed ( A s p e e d ) for the assumption is given below [38].
O F v e l o c i t y = A s p e e d = 2 × 72 × 100 ( 72 + 100 ) = 66.27   ( Km / h )
In Equation (4) the numerical values 72 and 100 denote the varying speed of the vehicle. The link capacity is defined as the maximum throughput produced for each transmission. The mathematical expression for link capacity is given below.
O F L C = S p a c k e t s ( P r e a d y P r e c e i v e d ) T o
where, S p a c k e t s represents the packet size, P r e a d y represents the calculation of packets ready to transfer, P r e c e i v e d represents the calculation of packets received, and T o represents the time taken for the transmission.
Latency Calculation: The latency calculation of the nodes is calculated using Equation (6) by the ratio of the number of CH nodes in the network with the number of nodes in the network. The math expression for the calculation of latency is given below.
O F l a t e n c y = i = 1 M L C H C M M
where, M represents the transmission count among the CH and CM, L C H C M represents the latency produced during the process of communication between the CH and CM.
Using these parameters in weight, the node to become CH is measured. The expression for the calculation of a node to become CH is described.
W C N C H = ( W 1 × R E C H C M e n e r g y ) + ( W 2 × O F v e l o c i t y ) + ( W 3 × O F L C ) + ( W 4 × O F l a t e n c y )
In Equation (7) the terms W 1 , W 2 , W 3 ,   and   W 4 are the experimental constants. Using Equation (7), initially CH is chosen and the optimal CH is selected using the ROA-based CH selection process, which is elaborated on in the upcoming section.

4. Privacy-Preserving Optimization Based on Advanced CH Selection (P2O-ACH)

The privacy-preserving optimization-based advanced CH selection (P2O-ACH) method is designed to improve the overall performance of the network. The major category which affects the network performance is lack of security and increased energy utilization due to the usage of a huge number of devices in the network. The proposed P2O-ACH method is mainly designed to overcome these issues, such as security and energy utility. The proposed method is subdivided into two sections, namely ROA-based CH selection and the privacy-preserving mobility model. ROA is a rider optimization-based algorithm used for the optimization-based CH selection approach, which concentrates both the energy consumption reduction and reducing the congestion in the network. The privacy-preserving mobility model is used to provide security to the network mainly during the process of new member blending and leaving the cluster in the network. The diagrammatical representation of the proposed P2O-ACH method is given below in Figure 1.
The proposed P2O-ACH methods concentrated on improving both the energy efficiency and privacy of VANETs. For the purpose, the enhanced ROA-based CH selection and privacy-preserving mobility model are introduced. In the enhanced ROA algorithm, optimization issues are solved, and with the help of the principle of ROA the process of CH is performed so that the CH is highly optimal, which reflects in the reduction of energy consumption, delay, and overhead during communication. On the other hand, the privacy-preserving mobility model is employed, which provides security during the process of node joining and migration process. This is the proposed methodology which is done in this research.

4.1. Data Routing in Clustering

At the initial stage, the network is subdivided into several clusters that are headed by the CH. CH will collect the data packets from the CM nodes and transfer that to the SINK S n o d e . To reduce the delay and energy consumption, the data are fused and the volume is reduced. The core concept of clustering is data routing and data collection, and then forwarding that to that S n o d e . For the process of data routing, we are using a model called anchor-based routing. N number of anchors γ can be used for experimentation. In our research simulation, we used γ = 3. In the first segment, the S n o d e chooses the nearest node as an anchor and that is represented as A R 1 , Then, S n o d e transmits the DiscoverNearestNode message to all the nodes in its coverage area. The nodes which are in that coverage area will receive the message and transmit an acknowledgement message with its ID and the residual energy at each instance of time. According to the signal strength, the best node is chosen by the S n o d e . The S n o d e transmits the SINKRequest message ( S n o d e , A R 1 , E , δ t h ); here, E is represented as the event and the δ t h is represented as the threshold value of the event.
A R 1 transmits the EVENTRequest message ( A R 1 , E , δ t h , H = 0 ) in a flooding manner. The node which receives the transmitted message is represented as N j for the first time and then the hop count is incremented by 1. That node that transmits the message is denoted as the parent node P. Then, currently the packet format of the EVENTRequest message becomes ( N j , E , δ t h , H ). Finally, the flow of the process becomes: the CM node transmits the event report to CH, from CH to A R 1 along with P and A R 1 to the S n o d e only in case the S n o d e is in the coverage area of the A R 1 . If the S n o d e is not in the coverage area, then the new anchor node A R 2 is selected. Then, the new anchor request message will be transmitted by the S n o d e  LatestAnchorRequest ( S n o d e , A R 1 ). The node that receives the message becomes N j , and transmits the latest message to the next hop called ( S n o d e , A R 1 , N j ). If this process is successful, then the node N j becomes the next anchor with the reply message LatestAnchorAck ( S n o d e , A R 1 , N j ). Finally, the flow of the path becomes ( n o d e C H A R 1 A R 2 S n o d e ). The same process will be continued to A R 3 , if required.

4.2. Conventional ROA

Generally, rider optimization algorithm (ROA) is developed based on the concept of the riders being grouped to achieve the target. Here, bypass rider, follower, overtaker, and attacker are considered groups of riders. All the riders are arranged and then divided into groups according to this order. Each group produces their performance separately to achieve their goal. This algorithm pursues a sequential process in a step-by-step manner. At the initial stage, parameter initialization of riders and groups take place. In the ROA method, the determined groups are together represented as T and it randomly takes their position. Hence, the mathematical expression for the process of their group initialization is given below.
G t = { G t ( S a , S b ) } ; 1 S a N R t ; 1 S b D I t
In Equation (8), N R t denotes the number of riders present in the race concerning time, D I t denotes represents the dimension concerning time t. The position of the riders is denoted as G t ( S a , S b ) . The notation represents the total number of riders such as bypass rider, follower, overtaker, as well as attacker are BR, F, O, and AT, where (T = BR + F + O + AT). The parameters that are considered are steering angle, acceleration, gear, as well as the brake, and they are installed in each group of riders. The mathematical expression for the calculation of steering angle ( S A t ) is given below.
S A t = { S A S a , S b t } ; 1 S a N R t ; 1 S b D I t
In Equation (9), the steering angle of the current rider is denoted as S A S a , S b t and the beginning stage of the steering angle is shown in Equation (10).
S A S a , S b t = 0 = { θ a ;                                                                   i f   S b = 1 S A S a , S b t = 0 = 1 + α                           i f   S b 1       0 ;                                                                             O t h e r w i s e
The angle of the current rider is represented as θ a and the term α is the current rider position. To measure the success rate, the group leader is created. The leaders are centralized in nature and use the idea of an arbitrary search in all directions that reflects in the improvement of the success rate. The major parameter which is considered for the measure of the success rate is distance. The mathematical expression for the calculation of distance ( C R d i s ) is given below.
C R d i s = S a + D v S a D v
In Equation (11), S a denoted the location of the current rider and D v denotes the location of the destination. To increase the success, the rate of the process of leader identification is preceded. The major principle behind the process of leader selection is that the leader that is chosen has the minimum distance (high success rate) from the destination and the leaders are dynamic in nature, varying according to speed, position, and time. Now, the position update takes place according to the groups of riders. At the initial stage, the position update of the bypass rider is mathematically expressed below.
G t + 1 B R j ( S a , S b ) = γ [ G t ( η , S b ) × μ ( S b ) + G t ( ϵ , S b ) × [ 1 μ ( S b ) ] ]
In Equation (12), γ denotes an arbitrary number which lies between 0 and 1, η denotes a random value which ranges from 1 to T, ϵ a random value which ranges from 1 to T, μ represents an arbitrary value ranging between 0 and 1 of size 1 × D. Secondly, the position update of the follower rider is mathematically expressed below.
G t + 1 F ( S a , S b ) = G L i n d e x ( L i n d e x , c ) + [ cos ( S A S a , S b t = 0 ) × G L i n d e x ( L i n d e x , c ) × d S a t ]
In Equation (13), G L i n d e x denoted the leader location, L i n d e x denoted the leader index, S A S a , S b t = 0 denotes the current rider steering angle, and d S a t denotes the additional distance needed to cover the current rider. Thirdly, the position update of the overtaker rider is mathematically expressed below.
G t + 1 O ( S a , S c ) = G t ( S a , S c ) + [ Y t I ( S a ) G L i n d e x ( L i n d e x , S c )
In Equation (14), G t ( S a , S c ) denotes the current rider location, and Y t I ( S a ) denotes the current rider direction. Finally, the position update of the attacker rider is mathematically expressed below.
G t + 1 A T ( S a , S c ) = G L i n d e x ( L i n d e x , S b ) + [ cos ( S A S a , S b t = 0 ) × G L i n d e x ( L i n d e x , S b ) ] + d S a t
In Equation (15), G L i n d e x ( L i n d e x , S b ) denotes the leader position, and S A S a , S b t = 0 denoted the steering angle of the current rider. After the calculation of the group updates, the success rates are estimated among the riders. Based on those measurements, the newer positions and the leaders are chosen. To obtain improved performance, it is essential to update the steering angle and gear values. The process of leader selection is repeated according to the allocated time.

4.3. Enhanced ROA-Based CH Selection

In general, the ROA algorithm is used to solve complicated optimization issues. So, it is essential to improve the algorithm when it is applied to the dynamically varying VANETs. To improve the performance further, a trusted ROA is introduced. In general, ROA consist of four patterns, such as bypass, follower, overtaker, and attacker, which are chosen randomly to obtain the solution. Here, the pattern consists of an order to obtain better performance. Simultaneously, to protect the network from route request flooding, the selected patterns have to be encoded properly. Now, the patterns are processed in the order that is represented as C H b y , C H f r , C H o t , C H a t . Only this sequence will be repeated again and again. If any order changes occur, then we can identify if route request flooding happens.
So, detection and prevention of route request flooding are essential to finding the shortest path. To protect the network from this, an express trust model is initiated. The parameter which is considered for the express trust model is the rate of packet delivered, rate of packet loss, average latency, average energy, and integrity. The calculation of these parameters is given below.
Rate of packet delivered: Delivered packet rate is defined as the ratio of the total number of packets transmitted from the sender T P s ( t ) to the total number of packets accepted by the receiver A P r ( t ) . The computation of delivered packets is given below.
D P r a t e ( t ) = T P s ( t ) A P r ( t ) × 100
Rate of packet loss: Loss of packet rate is defined as the ratio of the total number of packets accepted by the receiver to the total number of packets transmitted by the sender. The computation of packet loss is given below.
L P r a t e ( t ) = A P s ( t ) T P r ( t ) × 100
Average latency: Average latency is defined as the delay in time taken during the process of communication from the sender to the target. The latency can occur during route finding and request flooding. The computation of average latency is given below.
L a v e r a g e = i = 1 N ( P T i ( t i m e ) P A i ( t i m e ) ) T P s ( t )
where, P T i ( t i m e ) represents the packets transmitted time to the receiver and P A i ( t i m e ) represents the packets allocated time by the sender to reach the receiver.
Average energy: The average energy remaining in the CH after the process of energy indulgence is computed below.
E a v e r a g e = j = 1 C H * R E j C H C E j C H I E j C H
where, R E j C H represents the residual energy of C H j and C E j C H represents the consumed energy of C H j .
Integrity calculation: It is the final trust measure to improve trustworthiness. The trust values of CH and the CM are determined using the history that considers the normal joining, abnormal joining, normal leaving, and abnormal leaving of the neighbors, as well as the multiple distributions. Integrity is calculated according to the successful and unsuccessful transmission.
I C H C M ( t ) = 1 r   S C H C M ( t ) S C H C M ( t ) + U S C H C M ( t )
where, r represents the node’s overall neighbors, S C H C M ( t ) represents the successful transmission, and U S C H C M ( t ) represents the unsuccessful transmission. These are the parameters calculated to protect the network from the route request flooding attack using an express trust-based ROA optimization approach. The process of ROA-based CH selection is described in a pseudo code in Algorithm 1.
Pseudo code for ROA-based CH selection:
Algorithm 1. ROA-based CH selection
Inputs—Rider inputs
Output—Optimal CH selection
Start
Step 1—For CH selection
  • ROA rider’s initialization—bypass rider, follower, overtaker, and attacker;
  • ROA group initialization— G t = { G t ( S a , S b ) } ; 1 S a N R t ; 1 S b D I t ;
  • ROA steering angle of riders— S A t = { S A S a , S b t } ; 1 S a N R t ; 1 S b D I t ;
  • Distance calculation for the current rider to reach the destination— C R d i s = S a + D v S a D v ;
Step 2—Update the rider’s positions
  • Bypass rider position update— G t + 1 B R j ( S a , S b ) = γ [ G t ( η , S b ) × μ ( S b ) + G t ( ϵ , S b ) × [ 1 μ ( S b ) ] ] ;
  • Follower rider position update— G t + 1 F ( S a , S b ) = G L i n d e x ( L i n d e x , c ) + [ cos ( S A S a , S b t = 0 ) × G L i n d e x ( L i n d e x , c ) × d S a t ] ;
  • Overtaker rider position update— G t + 1 O ( S a , S c ) = G t ( S a , S c ) + [ Y t I ( S a ) × G L i n d e x ( L i n d e x , S c ) ;
  • Attacker rider position update— G t + 1 A T ( S a , S c ) = G L i n d e x ( L i n d e x , S b ) + [ cos ( S A S a , S b t = 0 ) × G L i n d e x ( L i n d e x , S b ) ] + d S a t ;
Step 3—Enhanced ROA-based CH selection—riders’ pattern bypass, follower, overtaker, and attacker CH is chosen;
  • CH pattern— C H b y , C H f r , C H o t , C H a t ;
Step 4—Attack prevention—trust model initialization—packets delivered, rate of packets loss, average latency, average energy, and integrity;
  • Calculation for packets delivered— D P r a t e ( t ) = T P s   ( t ) A P r ( t ) × 100 ;
  • Calculation for rate of packet loss— L P r a t e ( t ) = A P s   ( t ) T P r ( t ) × 100 ;
  • Calculation for average latency— L a v e r a g e = i = 1 N ( P T i ( t i m e ) P A i ( t i m e ) ) T P s   ( t ) ;
  • Calculation for average energy— E a v e r a g e = j = 1 C H * R E j C H C E j C H I E j C H ;
  • Calculation for integrity for a node to become CH— I C H C M ( t ) = 1 r   S C H C M ( t ) S C H C M ( t ) + U S C H C M ( t ) ;
Step 5—Process is repeated until finding the best CH;
Step 6—Return
End.

4.4. Privacy-Preserving Mobility Model

A privacy-preserving mobility model is introduced here to secure the devices in the network. The major steps involved in this model are new node fusion and migration process. The process of new node fusion is defined as the frequent action taken to improve the computation and memory so as to reduce the transmission overhead of the network. The process of migration process is defined as for the active mobile node to endow with security during the process of joining the new code and migrating the node. The process of cluster creation and CH selection is done using a rider optimization-based CH selection approach. For the privacy-preserving mobility model, we concentrate on new node fusion and node migration.

4.4.1. New Node Fusion

Every node in the network is constructed with a chaotic map-based hash pin P I N h a s h which helps to compute the secure key among the CH and the CM. In case the node N j is interested in joining a cluster of C H j , the joining process is described below. At the initial condition, the S n o d e is ready to transmit the P I N h a s h into a new node to compute the hash key among the C H j and the node N j . Next, the N j transmit the joining request message to the C H j with its identification I D N j , time stamp T S N j with the P I N h a s h code. After receiving the joining request message, the C H j completely checks the message and then the network maintains its blocked node list. The C H j checks whether the current ID is present in the blocked node list or not, then the C H j asks the S n o d e to transmit the P I N h a s h code. The PIN code request message P I N C o d e R E Q is encrypted with the help of the symmetric of the S n o d e as well as the C H j . The encrypted message consists of the I D N j details and P I N h a s h is retransmitted to the C H j from the S n o d e . In this process, the C H j computes the P I N h a s h and then checks that this pin is equal to the P I N h a s h or not. The cluster head C H j also transmits the key creation request message K e y C r e a t R E Q to the node N j . This request message maintains I D j and n C H j .
After the process of this key creation, N j transmits a reply message to C H j , which is the encrypted acknowledgement including the newly created hash key and the new message contains ( I D N j , nonce, K e y C r e a t R E P ) . If the nonce of the message is not a valid one, then the message is neglected and the node is block listed. Once the node N j is added as a CM node of C H j it transmits a join success encrypted data packet to the node N j . After joining, the node N j becomes the CM of the C H j and then the CM node transmits the secure data to its destination through C H j . By using the same method, the C H j also transmits the data to the S n o d e .

4.4.2. Node Migration Process

As we know that the nodes used in our network are mobile in nature, during the process of communication they will migrate from one place to another. Due to this process at each instance of time anywhere in the network, new nodes joining and leaving the cluster will occur simultaneously. To secure this process of migration in the network, the concept of node migration is initiated. The core idea of this process is to provide both forward privacy as well as backward privacy in an effective way. In the above section, each node uses the authenticate key to join or leave a cluster and the presence and absence of the node in each cluster are periodically monitored by the C H j with the help of transmitting the beacon signals. If any node is absent in the group, then automatically, C H j neglects the node from its routing list. At the time of migration, the node N j moves away from the coverage area of the C H j as well as receives a request message from the neighbor CH. If the node in any cluster leaves the current cluster C H j , then that node N j tries to transmit a joining request message to any neighbor cluster C H n e w with the transfer ID I D j . Then, C H n e w will accept the request of the node N j . Then, the C H n e w will check the neglect list. If the current node ID is not present in that list, then it will precede the process further. Otherwise, neglect the request. If the I D j is not found, then the C H n e w will send the key request message to the N j . Continued on from that, the C H n e w transmits the encrypted request message with the I D j and time stamp. Then, the S n o d e sends the encrypted request message to the C H n e w . Next, C H n e w transmits the message to the N j along with the encrypted key received from the S n o d e . Now, this message consists of the I D j , nonce, as well as the transmitted request message.
Following this, the node N j transmits the reply message to the C H n e w in response to the transmitted request message. This reply also consists of the I D j , nonce, and time stamp, and the message is encrypted. The time stamp and the worth of the nonce is checked by the C H n e w . Once all the verification is done and after obtaining satisfaction, the C H n e w node will accept the N j node as its CM node. Finally, the C H n e w node will update the finalized list to its S n o d e .

5. Results and Analysis

The major operations which are proposed in the P2O-ACH approach are ROA-based CH selection and the privacy-preserving mobility model. At the initial stage of simulation, the vehicles are distributed randomly. Then, CH selection parameters are measured using the Equations (1)–(7) and the optimal CH is chosen according to the process of the ROA algorithm from Equations (16)–(20). Following that, the mobility model is assigned according to the rekeying and mobility supervision process, which consists of vehicle blending and the vehicle migration process.
To calculate the performance of the network, we assess the parameters, which, concentrated in this research, are energy efficiency, energy consumption, network lifetime, packet delivery ratio, packet loss, network latency, network throughput, and routing overhead. For the process of performance comparison, our proposed P2O-ACH is compared with earlier works, such as GWO-CH [36], ACO-SCRS [37], and QMM-VANET [38]. The software used for the simulation experimentation is NS2.35 with frond-end OTCL and back-end C language on Ubuntu 16.04. OTCL is used for network construction, data transmission, and configuration. The initial energy allocated for the network is 1000 Joules, and the data transmission and reception energies are 0.005 Joules and 0.001 Joules, respectively. The network coverage area is 1500 × 1500 m. Eight clusters are deployed and the coverage area of each cluster is 500 m and the sensing range of the cluster head is 15 m. The network parameters [39,40,41] are listed in parameter Table 4.

5.1. Scenarios Details

For the performance analysis process, two scenarios are taken, which are according to the number of vehicles and speed of vehicles. The parameters, which are calculated according to the number of vehicles, are energy efficiency, energy consumption, network lifetime, packet delivery ratio, packet loss, network latency, network throughput, and routing overhead. The parameters, which are calculated according to the various speed of vehicles, are cluster head efficiency and cluster member efficiency. All the calculations are elaborated on below.

5.2. Performance Analysis Based on the Number of Vehicles

In Figure 2, the graphical representation of the energy efficiency calculation of the proposed P2O-ACH is given and it is compared with the earlier approaches. The major parameters, which are concentrated by the proposed P2O-ACH, are to reduce the energy consumption of the network using the enhanced ROA-based CH selection. During the simulation, it is greatly achieved and the energy efficiency of the proposed P2O-ACH is much better than others. Because of using the rider optimization-based CH selection process, an optimized stable CH is chosen that reduces the energy consumption of the network.
In Figure 3, the energy consumption of the network is shown. In Table 5 the simulation result values of energy efficiency and energy consumption are given.
The values stated in Table 5 prove that the efficiency achieved by the proposed P2O-ACH is better than earlier works where the efficiency of the P2O-ACH is 864 Joules and the efficiency of the GWO-CH, ACO-SCRS, and QMM-VANET is 357 Joules, 598 Joules, and 657 Joules, respectively. Then, the energy consumption of the proposed P2O-ACH is lower than earlier works where the consumption of the P2O-ACH is 157 Joules and the consumption of the GWO-CH, ACO-SCRS, and QMM-VANET is 658 Joules, 486 Joules, and 358 Joules, respectively. In the proposed P2O-ACH method, advanced CH selection is done using a rider optimization algorithm, especially to reduce the energy consumption of the network. The network becomes more stable with the help of this CH selection process.
In Figure 4, the pictorial representation of the calculation packet loss is shown where the performance of the proposed P2O-ACH is compared with the earlier approaches. With the use of the enhanced ROA method privacy-preserving mobility model, congestion of the network is reduced and security is improved, which leads to the reduction of the packet loss in the network. From the results, it is proven that the proposed P2O-ACH generates very low packet loss when compared with the others. In the proposed P2O-ACH method, the concept of a privacy-preserving mobility model is used that works on the fusion of nodes and the node migration process. In a maximum of the cases, the packet loss will occur during grouping and migration. This mobility pattern creates a stable grouping and migration; this leads to reducing the loss of packets in the network.
In Figure 5, the lifetime of the network is calculated. Hence, our method achieves high energy efficiency, which automatically reflects in the generation of a higher lifetime. This is achieved with the help of the stable and optimized cluster head selection process where energy consumption is reduced during the process of communication in the network, which increased efficiency and lifetime. In Table 6, the simulation result values of packet loss and network lifetime are given.
The values stated in Table 6 prove that the lifetime achieved by the proposed P2O-ACH is better than earlier works where the lifetime of the P2O-ACH is 97.46% and the lifetimes of the GWO-CH, ACO-SCRS, and QMM-VANET are 65.22%, 71.86%, and 85.47%, respectively. The proposed P2O-ACH method achieved around 10% to 30% more life time by using the rider optimization-based CH selection process. Hence, firmer and more effective CH is created, which helps communication with minimum utilization of energy. Then, the packet loss of the proposed P2O-ACH is lower than earlier works where the packet loss of the P2O-ACH is 458 packets and the packet losses of the GWO-CH, ACO-SCRS, and QMM-VANET are 1578 packets, 1248 packets, and 867 packets, respectively. The proposed method works with an effective mobility pattern where the grouping and migration of the vehicle are processed stably. This reduces the packet loss of the network, which amounts to 400 packets to 1000 packets lower than the earlier works.
From Figure 6, the graphical representation of the packet delivery ratio calculation of the proposed P2O-ACH is given and it is compared with the earlier approaches. The packet delivery ratio is one of the core parameters which decide the quality of the network. The proposed P2O-ACH has a higher packet delivery ratio when compared with the earlier works. Lower packet loss reflects an increase in the packet delivery ratio of the network. In the proposed P2O-ACH method, the packet loss is very low using the mobility patterns that lead to improving the packet delivery ratio.
In Figure 7, the latency is calculated, which is defined as the overall delay time of the network. In Table 7, the simulation result values of packet delivery ratio and latency are given.
The values stated in Table 7 prove that the packet delivery ratio achieved by the proposed P2O-ACH is better than earlier works where the packet delivery ratio of the P2O-ACH is 95.13% and the packet delivery ratios of the GWO-CH, ACO-SCRS, and QMM-VANET are 75.12%, 81.28%, and 89.46%, respectively. This is achieved because the privacy-preserving mobility pattern provides security during the process of vehicles joining and leaving the cluster, which reduces the loss of packets, and automatically increases the packet delivery ratio. Then, the latency of the proposed P2O-ACH is lower than earlier works where the latency of the P2O-ACH is 253.79 ms and the latencies of the GWO-CH, ACO-SCRS, and QMM-VANET are 681.92 ms, 546.23 ms, and 502.48 ms, respectively. The network is constructed stably so as to reduce the latency. Due to the advanced clustering method, the communication is highly standardized, which reduced the latency in the network. In Figure 8, the routing overhead is calculated and in the comparative graph the values of all the methods are shown. The main aim of the research is to reduce the energy consumption and overhead of the network. From the results, it is understood that the overhead produced by the proposed P2O-ACH is very much lower than that of the other works. This is because the privacy-preserving mobility pattern generation measures each action of the clusters, such as vehicle migration and fusion. Additionally, hash-based security is provided in it. So, the traffic pattern is secured and stable, which reflects in the overhead.
In Figure 9, network throughput is calculated and the throughput achieved by the proposed P2O-ACH is higher than the earlier works. The parameters, such as latency and overhead, are comparatively low in the proposed P2O-ACH method. That is the main reason to achieve high throughput in the network.
The values stated in Table 8 prove that the routing overhead achieved by the proposed P2O-ACH is low when compared with the earlier works where the overhead of the P2O-ACH is 2547 packets and the overheads of the GWO-CH, ACO-SCRS, and QMM-VANET are 7658 packets, 5967 packets, and 3467 packets, respectively. This performance is achieved mainly using the idea of CH selection that makes the network more reliable during the process of communication. Hence, VANETs are networks with huge mobility. The mobility pattern is properly scheduled so that the overhead should be low. Then, the throughput achieved by the proposed P2O-ACH is higher than earlier works where the throughput of the P2O-ACH is 1047.467 Kbps and the throughputs of the GWO-CH, ACO-SCRS, and QMM-VANET are 301.124 Kbps, 457.128 Kbps, and 857.845 Kbps, respectively. Lowering the network overhead increases the throughput of the network. In the proposed P2O-ACH method, around 1000 packets to 5000 packets are comparatively saved from overhead, which reflects in the increase of throughput from 200 Kbps to 500 Kbps.

Discussion Performance Analysis Based on the Number of Vehicles

The major conceptual concentration of the proposed P2O-ACH method is the creation of advanced CH selection with rider optimization algorithm and security-based privacy-preserving mobility pattern generation. Due to this, we can increase the efficiency, throughput, and packet delivery ratio, whilst likewise reducing the latency, overhead, and packet loss. Because the major drawbacks identified from the earlier works are, in the GWO-CH method, energy efficiency and the lifetime are moderate, in ACO-SCRS, the overhead is high and throughput is low, and in QMM-VANET the throughput is low. These are the major drawbacks of the earlier works.
The parameters that are used for performance analysis of the proposed research are energy efficiency, energy consumption, packet loss, network lifetime, packet delivery ratio, latency, routing overhead, and throughput. According to these parameters, the proposed P2O-ACH is compared with earlier works. Some of the common drawbacks which are identified in this earlier work are low throughput, low efficiency, high congestion, overhead, and delay. So to overcome these drawbacks in the proposed P2O-ACH, CH selection, optimization, and secured mobility models are constructed. Due to ROA optimization-based clustering in the proposed method, network efficiency reached up to 864 Joules, whereas the earlier work reached up to 650 Joules at maximum. The network energy consumption is reduced up to 157 Joules, whereas the earlier works range from 358 Joules to 658 Joules. By the use of ROA optimization, congestion is reduced, which reduced the packet loss and routing overhead of the network. The packet loss of the proposed P2O-ACH is 458 packets, whereas the earlier work ranged from 867 packets to 1578 packets. The routing overhead of the proposed P2O-ACH is 2547 packets, whereas the earlier work ranged from 3467 packets to 7658 packets. Similarly, by using the secured mobility model, the parameters which are improved are packet delivery ratio, throughput, and latency. The packet delivery ratio of the proposed P2O-ACH is 95.13%, whereas the earlier work ranges from 75.12% to 89.46%. The throughput achieved by the proposed P2O-ACH is 1047.467 Kbps, whereas the earlier work ranges from 301.124 Kbps to 857.845 Kbps. The latency produced by P2O-ACH is 253.79 ms, whereas the earlier work ranges from 502.48 ms to 681.92 ms. Finally, by analyzing all the parameters, it is understood that our proposed P2O-ACH outperforms the earlier methods in many cases.

5.3. Performance Analysis Based on Speed

In Figure 10, the graphical representation of energy efficiency calculation is performed. The results show that the proposed P2O-ACH outperforms when compared with the earlier works in terms of energy efficiency. It is achieved by using the optimization-based CH selection process.
The consumption of energy is highly reduced using this method. This leads to an increase in the energy efficiency. The graphical representation for the calculation of energy consumption is shown in Figure 11, but according to speed variation, it is understood that an increase in speed reduces efficiency and increases the energy consumption of the network.
In Figure 12, the packet loss is shown, where the performance of the proposed P2O-ACH is compared with the earlier approaches, such as GWO-CH, ACO-SCRS, and QMM-VANET. In the proposed P2O-ACH, congestion control is properly done, which helps to reduce packet loss compared to the earlier methods. Meanwhile, from the figure, it is understood that, according to the increase in speed, packet loss also increased.
In Figure 13, the lifetime of the network is calculated. The network lifetime is high when compared with the earlier methods, such as GWO-CH, ACO-SCRS, and QMM-VANET; however, according to the increase in speed, the lifetime of the network is reduced.
In Figure 14, the graphical representation of the packet delivery ratio calculation of the proposed P2O-ACH is given and it is compared with the earlier approaches. The packet delivery ratio of the proposed P2O-ACH is high because, here, optimization-based CH selection is done and the privacy-preserving mobility pattern is initiated, which helps to increase the packet delivery ratio of the P2O-ACH compared to the earlier works, but due to the increase in speed, the packet delivery ratio is slightly reduced.
In Figure 15, the latency of the proposed P2O-ACH is the calculation and it is compared with the earlier works. The proposed P2O-ACH is highly concerned with reducing the congestion in the network, which reflects in the reduction of latency when compared with the earlier works, but according to the increase of speed the latency is also increased.
In Figure 16, the routing overhead of the network is calculated. Hence, by using the enhanced ROA-based CH selection in the proposed P2O-ACH, energy consumption of the network is reduced, which reflects in the reduction of the routing overhead in the network. According to the varying speed, if the speed increases that will increase the overhead, comparatively.
In Figure 17, the throughput of the proposed P2O-ACH is calculated and then compared with the earlier works. The throughput performance of the proposed work is high when compared with the earlier works. According to the varying speed, the throughput of the proposed is maintained. That leads to an increase in the performance of the network.

Results Discussion

The parameters that are calculated according to the varying speed are energy efficiency, energy consumption, packet loss, network lifetime, packet delivery ratio, latency, routing overhead, and throughput. In Table 9, the performance analysis values of the parameters, such as energy efficiency, energy consumption, packet loss, and network lifetime, are given.
The energy efficiency of the proposed P2O-ACH varies from 97% to 91%, whereas earlier works, such as GWO-CH, ACO-SCRS, and QMM-VANET, vary from 73% to 55%, 75% to 62%, and 88% to 78%, respectively. In terms of speed variation, the efficiency of the P2O-ACH is reduced by up to 6%, and the performance of the earlier work GWO-CH reduced by 18%; ACO-SCRS reduced by 13%; and QMM-VANET reduced by 10%. Finally, according to the analysis, it is understood that the overall energy efficiency performance of the proposed P2O-ACH is more improved than the others.
The energy consumption of the proposed P2O-ACH increases from 8% to 22%, whereas earlier works, such as GWO-CH, ACO-SCRS, and QMM-VANET, increase from 18% to 48%, 15% to 41%, and 11% to 33%, respectively. In terms of speed variation, the consumption of the P2O-ACH increased by up to 14%, and the performance of the earlier work GWO-CH increased by 30%; ACO-SCRS increased by 26%; and QMM-VANET increased by 20%. According to the analysis, it is understood that the overall energy consumption performance of the proposed P2O-ACH is reduced compared to the existing works.
The packet loss of the proposed P2O-ACH increases from 86 packets to 182 packets, whereas earlier works, such as GWO-CH, ACO-SCRS, and QMM-VANET, increase from 169 packets to 359 packets, 153 packets to 350 packets, and 125 packets to 287 packets, respectively. In terms of speed variation, the packet loss of the P2O-ACH is increased by up to 100 packets, and the performance of the earlier work GWO-CH increased by 250 packets; ACO-SCRS increased by 200 packets; and QMM-VANET increased by 150 packets. According to the analysis, it is understood that the overall packet loss performance of the proposed P2O-ACH is lesser than the other works.
The network lifetime of the proposed P2O-ACH varies from 98% to 94%, whereas earlier works, such as GWO-CH, ACO-SCRS, and QMM-VANET, vary from 72% to 65%, 78% to 71%, and 85% to 81%, respectively. In terms of speed variation, the lifetime of the P2O-ACH is reduced by up to 4%, and the performance of the earlier work GWO-CH is reduced by 7%; ACO-SCRS is reduced by 7%; and QMM-VANET is reduced by 5%. From the analysis, it is understood that the network lifetime of the proposed P2O-ACH is superior to the earlier works, such as GWO-CH, ACO-SCRS, and QMM-VANET. In Table 10, the performance analysis values of the parameters, such as packet delivery ratio, latency, routing overhead, and throughput, are given.
The packet delivery ratio of the proposed P2O-ACH is reduced from 98% to 95%, whereas earlier works, such as GWO-CH, ACO-SCRS, and QMM-VANET, are reduced from 68% to 57%, 73% to 65%, and 88% to 84%, respectively. In terms of speed variation, the packet delivery ratio of the P2O-ACH is reduced up to 3%, and the performance of the earlier work GWO-CH is reduced by 11%; ACO-SCRS is reduced by 8%; and QMM-VANET is reduced by 5%. From the analysis, it is stated that the packet delivery ratio performance of the proposed P2O-ACH is more improved than the others.
The latency of the proposed P2O-ACH increases from 55.13 ms to 88.76 ms, whereas earlier works, such as GWO-CH, ACO-SCRS, and QMM-VANET, increase from 168.24 ms to 243.68 ms, 142.71 ms to 167.28 ms, and 102.41 ms to 151.23 ms, respectively. In terms of speed variation, the latency of the P2O-ACH is increased up to 33 ms, and the performance of the earlier work GWO-CH is increased by 75 ms; ACO-SCRS is increased by 25 ms; and QMM-VANET is increased by 50 ms. According to the analysis, it is understood that the overall latency performance of the proposed P2O-ACH is lesser than the earlier works.
The routing overhead of the proposed P2O-ACH increases from 568 packets to 692 packets, whereas earlier works, such as GWO-CH, ACO-SCRS, and QMM-VANET, increase from 1356 packets to 1869 packets, 1243 packets to 1689 packets, and 865 packets to 1142 packets, respectively. In terms of speed variation, the routing overhead of the P2O-ACH is increased by up to 130 packets, and the performance of the earlier work GWO-CH is increased by 310 packets; ACO-SCRS is increased by 400 packets; and QMM-VANET is increased by 280 packets. From the analysis, it is proved that the routing overhead performance of the proposed P2O-ACH is lesser than the other works.
The throughput of the proposed P2O-ACH improved from 356 Kbps to 489 Kbps, whereas earlier works, such as GWO-CH, ACO-SCRS, and QMM-VANET, improved from 121 Kbps to 156 Kbps, 153 Kbps to 175 Kbps, and 212 Kbps to 259 Kbps, respectively. In terms of speed variation, the throughput of the P2O-ACH increased up to 150 Kbps, and the performance of the earlier work GWO-CH improved by 35 Kbps; ACO-SCRS improved by 30 Kbps; and QMM-VANET improved by 45 Kbps. From the analysis, it is stated that the throughput of the proposed P2O-ACH is more improved than the others. This detail’s analysis in terms of both the number of vehicles and speed shows that the overall performance of the proposed P2O-ACH is better when compared with the earlier works, such as GWO-CH, ACO-SCRS, and QMM-VANET.

5.4. Algorithm Comparison

In the GWO-CH method [36], a grey wolf optimization algorithm-based clustering approach is proposed to solve the scalability issues in the VANETs. The social characteristics and hunting of the grey wolf are utilized to find the effective CHs in the network. Through this method, the energy consumption, delay, and routing overhead of the network fail to improve the packet delivery ratio and throughput of the network. Due to a lack of security, packet loss occurred in the network, which affects the effectiveness of the network. In the ACO-SCRS method [37], the ant colony optimization (ACO) algorithm is used to rely on the bus selection and effective clustering to improve the communication standard of VANETs. The model improves the energy efficiency of the network, but fails to reduce the data loss which happens due to the ground-level obstacles in the VANETs environment, which is reflected in the effective communication in the network. In the QMM-VANETs model [38], to improve the connectivity and network stability, an improved trust-based clustering algorithm is proposed so that trusted vehicles are introduced in the network, which leads to reduced packet loss, and the energy consumption is also reduced; however, this method consumes more energy when it reaches high speed with dynamic mobility. The major drawbacks, which are identified in the earlier approaches, are low density of vehicle, high packet loss due to ineffective security, and high delay and overhead. To solve these issues, in the proposed P2O-ACH approach, an efficient optimization with CH selection and the privacy-preserving mobility model is introduced, which concentrates on reducing the energy consumption and packet loss in an effective manner so that it directly improves the energy efficiency, packet delivery ratio, and network throughput.
In terms of algorithm, when compared with the grey wolf optimization and the ant colony optimization, our enhanced ROA optimization shows better performance in the parameters such as delay, overhead, and energy consumption. When compared with other CH selection processes, our method is highly effective in achieving high energy efficiency. The whole the overall performance of the proposed P2O-ACH is better when compared with the earlier approaches, namely GWO-CH, ACO-SCRS, and QMM-VANET.

6. Conclusions

In this research, the major drawbacks to concentrate on are reducing energy consumption and improving security during the process of communication in VANETs. For this purpose, an efficient privacy-preserving mobility model and enhanced ROA-based CH selection are implemented, and they greatly improve the overall performance of the network by reducing energy consumption and congestion as well as improving the security of the network. Advanced CH selection is performed, which becomes a great solution for security and energy utility issues. By using an optimization-based CH selection process, the congestion is reduced. The enhanced ROA model solves the complication in the high-speed VANET network, which reflects in the trustworthiness of the network. Through the privacy-preserving mobility model, each data transmission at each instant of time is protected, and the data are free from the malfunction that occurred in the eternal environment. Results of the proposed P2O-ACH are found effective when compared with the GWO-CH, ACO-SCRS, and QMM-VANET. By the use of an enhanced ROA-based CH selection method, the energy consumption is reduced, which leads to improving energy efficiency and the lifetime of the network. The privacy-preserving mobility model provides security, especially during the process when the nodes leave the cluster during the process of communication and when the nodes try to join in the other cluster. Then, the routing list of all the clusters is securely updated to the SINK. From the simulation analysis, according to the number of vehicles, it is proven that our proposed P2O-ACH produced around 200 Joules with higher efficiency, 200 joules lower energy consumption, around 800 packets lower loss, around 2000 packets lower overhead, around 10% higher packet delivery ratio, and around 400 Kbps high throughput when compared with the earlier approaches, such as GWO-CH, ACO-SCRS, and QMM-VANET. According to the speed variation, the differences achieved are very low and normal. Our proposed research is highly beneficial to the community because it is a highly-cost effective method, which can achieve high energy efficiency and high security as well. For vehicular communication, the proposed method can provide an effective experience in communication. In future work, many scenarios will be introduced and the performance of the network will be analyzed using the proposed P2O-ACH method.

Author Contributions

Investigation, N.F.A. and N.F.S.; resources, D.A.M.; writing—original draft preparation, A.A. and S.Z.H.; methodology, H.M.H.; software, A.S.A.; supervision and writing—review and editing, A.H.A.; visualization, M.H.H.; visualization, M.A.J.; project administration, F.H.A.; formal analysis and funding acquisition, N.F.A. and A.D.A. and funding acquisition W.E.-S. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

Not applicable.

Acknowledgments

The authors would like to acknowledge the support of Prince Sultan University for paying the Article Processing Charges (APC) of this publication.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Ullah, A.; Yao, X.; Shaheen, S.; Ning, H. Advances in position based routing towards ITS enabled FoG-oriented VANET-A survey. IEEE Trans. Intell. Transp. Syst. 2020, 21, 828–840. [Google Scholar] [CrossRef]
  2. Al-Mayouf, Y.R.B.; Mahdi, O.A.; Taha, N.A.; Abdullah, N.F.; Khan, S.; Alam, M. Accident management system based on vehicular network for an intelligent transportation system in urban environments. J. Adv. Transp. 2018, 2018, 6168981. [Google Scholar] [CrossRef]
  3. Abizar; Farman, H.; Jan, B.; Khan, Z.; Koubaa, A. A smart energy-based source location privacy preservation model for Internet of Things-based vehicular ad hoc networks. Trans. Emerg. Telecommun. Technol. 2020, 33, e3973. [Google Scholar] [CrossRef]
  4. Wei, L.; Wu, J.; Long, C.; Lin, Y.-B. The Convergence of IoE and Blockchain: Security Challenges. IT Prof. 2019, 21, 26–32. [Google Scholar] [CrossRef]
  5. Abbas, A.H.; Habelalmateen, M.I.; Audah, L.; Alduais, N. A Novel Intelligent Cluster-Head (ICH) to Mitigate the Handover Problem of Clustering in VANETs. Int. J. Adv. Comput. Sci. Appl. 2019, 10, 0100627. [Google Scholar] [CrossRef] [Green Version]
  6. Abbas, A.H.; Mansour, H.S.; Al-Fatlawi, A.H. Self-Adaptive Efficient Dynamic Multi-Hop Clustering (SA-EDMC) Approach for Improving VANET’s Performance. Int. J. Interact. Mob. Technol. 2022, 16, 136–151. [Google Scholar] [CrossRef]
  7. Wang, H.; Liu, R.P.; Ni, W.; Chen, W.; Collings, I.B. VANET modeling and clustering design under practical traffic, channel and mobility conditions. IEEE Trans. Commun. 2015, 63, 870–881. [Google Scholar]
  8. Oubabas, S.; Aoudjit, R.; Rodrigues, J.J.P.C.; Talbi, S. Secure and stable Vehicular Ad Hoc Network clustering algorithm based on hybrid mobility similarities and trust management scheme. Veh. Commun. 2018, 13, 128–138. [Google Scholar] [CrossRef]
  9. Zhang, D.; Ge, H.; Zhang, T.; Cui, Y.-Y.; Liu, X.; Mao, G. New Multi-Hop Clustering Algorithm for Vehicular Ad Hoc Networks. IEEE Trans. Intell. Transp. Syst. 2018, 20, 1517–1530. [Google Scholar] [CrossRef]
  10. Tseng, H.-W.; Wu, R.-Y.; Lo, C.-W. A stable clustering algorithm using the traffic regularity of buses in urban VANET scenarios. Wirel. Networks 2019, 26, 2665–2679. [Google Scholar] [CrossRef]
  11. Bylykbashi, K.; Elmazi, D.; Matsuo, K.; Ikeda, M.; Barolli, L. Effect of security and trust- worthiness for a fuzzy cluster management system in VANETs’. Cogn. Syst. Res. 2019, 55, 153–163. [Google Scholar] [CrossRef]
  12. Touil, A.; Ghadi, F. Efficient dissemination based on passive approach and dynamic clustering for VANET. Procedia Comput. Sci. 2018, 127, 369–378. [Google Scholar] [CrossRef]
  13. Khan, A.A.; Abolhasan, M.; Ni, W. An evolutionary game theoretic approach for stable and optimized clustering in VANETs. IEEE Trans. Veh. Technol. 2018, 67, 4501–4513. [Google Scholar] [CrossRef]
  14. Otrok, H.; Mourad, A.; Robert, J.M.; Moati, N.; Sanadiki, H. A cluster-based model for QoS-OLSR protocol for urban vehicular ad hoc networks. In Proceedings of the 2011 7th International Wireless Communications and Mobile Computing Conference, Istanbul, Turkey, 4–8 July 2011; pp. 1099–1104. [Google Scholar]
  15. Tan, H.; Zheng, W.; Vijayakumar, P.; Sakurai, K.; Kumar, N. An Efficient Vehicle-Assisted Aggregate Authentication Scheme for Infrastructure-Less Vehicular Networks. IEEE Trans. Intell. Transp. Syst. 2022, 1–11. [Google Scholar] [CrossRef]
  16. Tan, H.; Kim, P.; Chung, I. Practical Homomorphic Authentication In Cloud-Assisted Vanets With Blockchain-Based Healthcare Monitoring For Pandemic Control. Electronics 2022, 9, 1683. [Google Scholar] [CrossRef]
  17. Xue, K.; Luo, X.; Ma, Y.; Li, J.; Liu, J.; Wei, D.S.L. A Distributed Authentication Scheme Based on Smart Contract for Roaming Service in Mobile Vehicular Networks. IEEE Trans. Veh. Technol. 2022, 71, 5284–5297. [Google Scholar] [CrossRef]
  18. Alami, E.H.; Najid, A. ECH: An Enhanced Clustering Hierarchy Approach to Maximize Lifetime of Wireless Sensor Networks. IEEE Access 2019, 7, 107142–107153. [Google Scholar] [CrossRef]
  19. Awan, K.A.; Din, I.U.; Almogren, A.; Guizani, M.; Khan, S. StabTrust-A Stable and Centralized Trust-Based Clustering Mechanism for IoT Enabled Vehicular Ad-Hoc Networks. IEEE Access 2020, 8, 21159–21177. [Google Scholar] [CrossRef]
  20. Du, M.; Ding, S.; Xue, Y.; Shi, Z. A novel density peaks clustering with sensitivity of local density and density-adaptive metric. Knowl. Inf. Syst. 2018, 59, 285–309. [Google Scholar] [CrossRef]
  21. Tambawal, A.B.; Noor, R.; Salleh, R.; Chembe, C.; Oche, M. Enhanced weight-based clustering algorithm to provide reliable delivery for VANET safety applications. PLoS ONE 2019, 14, e0214664. [Google Scholar] [CrossRef]
  22. Alsuhli, G.H.; Khattab, A.; Fahmy, Y.A. Double-Head Clustering for Resilient VANETs. Wirel. Commun. Mob. Comput. 2019, 2019, 2917238. [Google Scholar] [CrossRef]
  23. Behera, T.M.; Mohapatra, S.K.; Samal, U.C.; Khan, M.S.; Daneshmand, M.; Gandomi, A.H. Residual Energy-Based Cluster-Head Selection in WSNs for IoT Application. IEEE Internet Things J. 2019, 6, 5132–5139. [Google Scholar] [CrossRef] [Green Version]
  24. Elira, B.; Keerthana, K.P.; Balaji, K. Clustering scheme and destination aware context based routing protocol for VANET. Int. J. Intell. Netw. 2021, 2, 148–155. [Google Scholar] [CrossRef]
  25. Kandali, K.; Bennis, L.; Bennis, H. A New Hybrid Routing Protocol Using a Modified K-Means Clustering Algorithm and Continuous Hopfield Network for VANET. IEEE Access 2021, 9, 47169–47183. [Google Scholar] [CrossRef]
  26. Jabbar, M.K.; Trabelsi, H. A Novelty of Hypergraph Clustering Model (HGCM) for Urban Scenario in VANET. IEEE Access 2022, 10, 66672–66693. [Google Scholar] [CrossRef]
  27. Alsarhan, A.; Kilani, Y.; Al-Dubai, A.; Zomaya, A.Y.; Hussain, A. Novel Fuzzy and Game Theory Based Clustering and Decision Making for VANETs. IEEE Trans. Veh. Technol. 2019, 69, 1568–1581. [Google Scholar] [CrossRef] [Green Version]
  28. Ardakani, S.P.; Kwong, C.F.; Kar, P.; Liu, Q.; Li, L. CNN: A Cluster-Based Named Data Routing for Vehicular Networks. IEEE Access 2021, 9, 159036–159047. [Google Scholar] [CrossRef]
  29. Sewalkar, P.; Seitz, J. MC-COCO4V2P: Multi-Channel Clustering-Based Congestion Control for Vehicle-to-Pedestrian Communication. IEEE Trans. Intell. Veh. 2020, 6, 523–532. [Google Scholar] [CrossRef]
  30. Rashid, S.A.; Alhartomi, M.; Audah, L.; Hamdi, M.M. Reliability-Aware Multi-Objective Optimization-Based Routing Protocol for VANETs Using Enhanced Gaussian Mutation Harmony Searching. IEEE Access 2022, 10, 26613–26627. [Google Scholar] [CrossRef]
  31. Hossain, M.A.; Noor, R.M.; Yau, K.-L.A.; Azzuhri, S.R.; Z’Abar, M.R.; Ahmedy, I.; Jabbarpour, M.R. Multi-Objective Harris Hawks Optimization Algorithm Based 2-Hop Routing Algorithm for CR-VANET. IEEE Access 2021, 9, 58230–58242. [Google Scholar] [CrossRef]
  32. Javed, A.R.; Hassan, M.A.; Shahzad, F.; Ahmed, W.; Singh, S.; Baker, T.; Gadekallu, T.R. Integration of Blockchain Technology and Federated Learning in Vehicular (IoT) Networks: A Comprehensive Survey. Sensors 2022, 22, 4394. [Google Scholar] [CrossRef] [PubMed]
  33. Singh, G.D.; Prateek, M.; Kumar, S.; Verma, M.; Singh, D.; Lee, H.-N. Hybrid Genetic Firefly Algorithm-Based Routing Protocol for VANETs. IEEE Access 2022, 10, 9142–9151. [Google Scholar] [CrossRef]
  34. Sindhwani, M.; Singh, R.; Sachdeva, A.; Singh, C. Improvisation of optimization technique and AODV routing protocol in VANET. Mater. Today: Proc. 2021, 49, 3457–3461. [Google Scholar] [CrossRef]
  35. Islam, M.; Khan, M.T.R.; Saad, M.M.; Tariq, M.A.; Kim, D. Dynamic positioning of UAVs to improve network coverage in VANETs. Veh. Commun. 2022, 36, 100498. [Google Scholar] [CrossRef]
  36. Fahad, M.; Aadil, F.; Rehman, Z.; Khan, S.; Shah, P.A.; Muhammad, K.; Lloret, J.; Wang, H.; Lee, J.W.; Mehmood, I. Grey wolf optimization based clustering algorithm for vehicular ad-hoc networks. Comput. Electr. Eng. 2018, 70, 853–870. [Google Scholar] [CrossRef]
  37. Khan, Z.; Fang, S.; Koubaa, A.; Fan, P.; Abbas, F.; Farman, H. Street-centric routing scheme using ant colony optimization-based clustering for bus-based vehicular ad-hoc network. Comput. Electr. Eng. 2020, 86, 106736. [Google Scholar] [CrossRef]
  38. Fatemidokht, H.; Rafsanjani, M.K. QMM-VANET: An efficient clustering algorithm based on QoS and monitoring of malicious vehicles in vehicular ad hoc networks. J. Syst. Softw. 2020, 165, 110561. [Google Scholar] [CrossRef]
  39. Alazab, M.; Lakshmanna, K.; Reddy, T.; Pham, Q.-V.; Maddikunta, P.K.R. Multi-objective cluster head selection using fitness averaged rider optimization algorithm for IoT networks in smart cities. Sustain. Energy Technol. Assess. 2021, 43, 100973. [Google Scholar] [CrossRef]
  40. Sharef, B.; Alsaqour, R.; Alawi, M.; Abdelhaq, M.; Sundararajan, E. Robust and trust dynamic mobile gateway selection in heterogeneous VANET-UMTS network. Veh. Commun. 2018, 12, 75–87. [Google Scholar] [CrossRef]
  41. Abbas, A.H.; Ahmed, A.J.; Rashid, S.A. A Cross-Layer Approach MAC/NET with Updated-GA (MNUG-CLA)-Based Routing Protocol for VANET Network. World Electr. Veh. J. 2022, 13, 87. [Google Scholar] [CrossRef]
Figure 1. Architecture of the Proposed P2O-ACH Method.
Figure 1. Architecture of the Proposed P2O-ACH Method.
Electronics 11 04163 g001
Figure 2. Energy Efficiency Calculation.
Figure 2. Energy Efficiency Calculation.
Electronics 11 04163 g002
Figure 3. Energy Consumption Calculation.
Figure 3. Energy Consumption Calculation.
Electronics 11 04163 g003
Figure 4. Packet Loss Calculation.
Figure 4. Packet Loss Calculation.
Electronics 11 04163 g004
Figure 5. Network Lifetime Calculation.
Figure 5. Network Lifetime Calculation.
Electronics 11 04163 g005
Figure 6. Packet Delivery Ratio Calculation.
Figure 6. Packet Delivery Ratio Calculation.
Electronics 11 04163 g006
Figure 7. Latency Calculation.
Figure 7. Latency Calculation.
Electronics 11 04163 g007
Figure 8. Routing Overhead Calculation.
Figure 8. Routing Overhead Calculation.
Electronics 11 04163 g008
Figure 9. Network Throughput Calculation.
Figure 9. Network Throughput Calculation.
Electronics 11 04163 g009
Figure 10. Energy Efficiency Calculation.
Figure 10. Energy Efficiency Calculation.
Electronics 11 04163 g010
Figure 11. Energy Consumption Calculation.
Figure 11. Energy Consumption Calculation.
Electronics 11 04163 g011
Figure 12. Packet Loss Calculation.
Figure 12. Packet Loss Calculation.
Electronics 11 04163 g012
Figure 13. Network Lifetime Calculation.
Figure 13. Network Lifetime Calculation.
Electronics 11 04163 g013
Figure 14. Packet Delivery Ratio Calculation.
Figure 14. Packet Delivery Ratio Calculation.
Electronics 11 04163 g014
Figure 15. Latency Calculation.
Figure 15. Latency Calculation.
Electronics 11 04163 g015
Figure 16. Routing Overhead Calculation.
Figure 16. Routing Overhead Calculation.
Electronics 11 04163 g016
Figure 17. Network Throughput Calculation.
Figure 17. Network Throughput Calculation.
Electronics 11 04163 g017
Table 1. Summary of the Literature.
Table 1. Summary of the Literature.
Ref. NoMethodAdvantageDisadvantage
[24]Destination aware context-based routing schemePacket delivery ratio is high and network delay is lowThroughput is low
[25]Modified k-means algorithm and maximum stable set problemPacket delivery ratio is high and throughput is highOverhead and delay is high
[26]Hyper graph clustering modelEfficiency, throughput, and packet delivery ratio is highDelay and routing overhead is high
[27]Fuzzy and game theory-based clusteringLifetime and efficiency are highThroughput and packet delivery ratio is low
[28]Cluster-based routing protocolPacket delivery ratio is high and network delay is lowOverhead is more and throughput is low
[29]Multi-channel clustering-based congestion control algorithmEnergy consumption is low and energy efficiency is highThroughput is low
[30]Reliability aware multi-objective optimizationPacket delivery ratio is highRouting overhead is high
[31]Multi-objective Harris Hawks optimizationPacket delivery ratio is high, throughput is high, and network delay is lowNot suitable for a network with huge dynamic mobility model
[32]Cuckoo search optimizationPacket delivery ratio is highOverhead is more and throughput is low
[33]Hybrid Genetic Firefly Algorithm-based Routing ProtocolConvergence speed of the network is highThroughput is low
[34]AODV with ant colony optimizationThroughput is high, packet loss is lowRouting overhead is high
[35]Particle swarm optimization algorithmPacket delivery ratio is high and throughput is highOverhead is more
[36]A grey wolf optimization-based clustering algorithmThroughput is highEfficiency is low
[37]Ant colony optimization (ACO)-based clusteringComputational cost and end-to-end delay are lowRouting overhead is high, throughput is moderate
[38]Quality of service (QoS)-based mobility managementPacket delivery ratio and network stability is highThroughput is moderate
Table 2. Communication Model.
Table 2. Communication Model.
SymbolsDescriptions
CHCluster Head
NR energy   Normalized Residual Energy
OF velocity Objective Function for Velocity
OF LC Objective Function for Coverage Area
OF latency Objective Function for Latency
REResidual Energy
IEInitial Energy
A speed Average Speed
T o Transmission Time
S n o d e Sink Node
AR Anchor Node
EEvent
δ th Threshold Value of the Event
KProbability Factor
BRBypass Rider
FFollower
OOvertaker
ATAttacker
Table 3. Communication Model.
Table 3. Communication Model.
Communication TypeCommunication ItemsModel Type
Short-Distance CommunicationBetween CM and CHFree Space Mobility Model
Long-Distance CommunicationBetween CH and S n o d e Multi-Path Fading Model
Table 4. Simulation Parameters.
Table 4. Simulation Parameters.
ParametersValues
Simulator VersionNS-2.35
Simulation Time200 ms
Simulation Coverage Area1500 m × 1500 m
MAC InterfaceMAC/802.11
Number of Vehicles150 Vehicles
Cluster Radius500 m
Transmission Range150 m
Vehicle Speed Range10 m/s to 35 m/s
ChannelChannel/Wireless
Radio Propagation ModelTwo-Ray Propagation Model
Antenna TypeOmni-Directional Antenna
Queue TypeDropTail
Initial Power1000 Joules
Transmission Power0.005 Joules
Receiving Power0.001 Joules
Data Packet Size512 bytes
Agent TypeTransmission Control Protocol
Table 5. Performance Values of Energy Efficiency and Energy Consumption of the Network.
Table 5. Performance Values of Energy Efficiency and Energy Consumption of the Network.
S. NoGWO-CHACO-SCRSQMM-VANETP2O-ACH
Energy Efficiency357 Joules598 Joules657 Joules864 Joules
Energy Consumption658 Joules486 Joules358 Joules157 Joules
Table 6. Performance Values of Packet Loss and Lifetime Calculation of the Network.
Table 6. Performance Values of Packet Loss and Lifetime Calculation of the Network.
S. NoGWO-CHACO-SCRSQMM-VANETP2O-ACH
Packet Loss1578 Packets1248 Packets867 Packets458 Packets
Network Lifetime65.22%71.86%85.47%97.46%
Table 7. Performance Values of Packet Delivery Ratio and Latency Calculation of the Network.
Table 7. Performance Values of Packet Delivery Ratio and Latency Calculation of the Network.
S. NoGWO-CHACO-SCRSQMM-VANETP2O-ACH
Packet Delivery Ratio75.12%81.28%89.46%95.13%
Latency681.92 ms546.23 ms502.48 ms253.79 ms
Table 8. Performance Values of Routing Overhead and Throughput Calculation of the Network.
Table 8. Performance Values of Routing Overhead and Throughput Calculation of the Network.
S. NoGWO-CHACO-SCRSQMM-VANETP2O-ACH
Routing Overhead7658 Packets5967 Packets3467 Packets2547 Packets
Network Throughput301.124 Kbps457.128 Kbps857.845 Kbps1047.467 Kbps
Table 9. Performance Analysis of Energy Efficiency, Energy Consumption, Packet Loss, and Network Lifetime in Terms of Varying Speed.
Table 9. Performance Analysis of Energy Efficiency, Energy Consumption, Packet Loss, and Network Lifetime in Terms of Varying Speed.
ParametersSpeed (m/s)GWO-CHACO-SCRSQMM-VANETP2O-ACH
Energy Efficiency (%)1072.8675.1688.1897.17
1568.1772.1887.3596.35
2065.1771.9686.8995.92
2561.2366.8685.2796.75
3058.3965.1982.1794.17
3555.8462.1178.1691.17
Energy Consumption (%)1018.4615.4311.758.26
1525.7922.7615.6311.76
2031.2227.1321.7514.86
2535.4632.4929.4316.78
3041.7435.5531.2818.85
3548.3241.7633.8622.17
Packet Loss (packets)1016915312586
15218196149113
20249238182135
25283276205148
30329309246161
35359350287182
Lifetime (%)1072.8678.0685.9898.17
1570.1776.1884.3197.25
2068.1775.9686.1996.12
2566.2372.8685.0796.85
3066.3972.1984.2595.07
3565.8471.1181.2594.65
Table 10. Performance Analysis of Packet Delivery Ratio, Latency, Routing Overhead, and Throughput in Terms of Varying Speed.
Table 10. Performance Analysis of Packet Delivery Ratio, Latency, Routing Overhead, and Throughput in Terms of Varying Speed.
ParametersSpeed (km/h)GWO-CHACO-SCRSQMM-VANETP2O-ACH
Packet Delivery Ratio (%)1068.1673.1988.1498.15
1565.1772.4587.1698.01
2062.1771.2686.2997.46
2558.2968.4686.1196.17
3057.1969.1785.1395.44
3557.2465.2484.2595.02
Latency (ms)10168.2142.7102.4155.13
15171.2145.8114.8072.19
20189.2153.2129.7678.14
25201.3152.4141.2781.25
30221.5164.2145.7685.76
35243.6167.2151.2388.76
Overhead (packets)1013561243865568
1514751386874567
2015381427892586
2516891628964625
30175816251028645
35186916891142692
Throughput (Kbps)10121.3153.4212.45356.2
15129.4158.3221.35386.1
20136.2161.2235.27425.1
25137.1165.2245.69452.1
30141.8171.4249.38486.2
35156.7175.2259.36489.2
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Abdulsattar, N.F.; Mohammed, D.A.; Alkhayyat, A.; Hamed, S.Z.; Hariz, H.M.; Abosinnee, A.S.; Abbas, A.H.; Hassan, M.H.; Jubair, M.A.; Abbas, F.H.; et al. Privacy-Preserving Mobility Model and Optimization-Based Advanced Cluster Head Selection (P2O-ACH) for Vehicular Ad Hoc Networks. Electronics 2022, 11, 4163. https://doi.org/10.3390/electronics11244163

AMA Style

Abdulsattar NF, Mohammed DA, Alkhayyat A, Hamed SZ, Hariz HM, Abosinnee AS, Abbas AH, Hassan MH, Jubair MA, Abbas FH, et al. Privacy-Preserving Mobility Model and Optimization-Based Advanced Cluster Head Selection (P2O-ACH) for Vehicular Ad Hoc Networks. Electronics. 2022; 11(24):4163. https://doi.org/10.3390/electronics11244163

Chicago/Turabian Style

Abdulsattar, Nejood Faisal, Dheyaa Abdulameer Mohammed, Ahmed Alkhayyat, Shemaha Z. Hamed, Hussein Muhi Hariz, Ali S. Abosinnee, Ali Hashim Abbas, Mustafa Hamid Hassan, Mohammed Ahmed Jubair, Fatima Hashim Abbas, and et al. 2022. "Privacy-Preserving Mobility Model and Optimization-Based Advanced Cluster Head Selection (P2O-ACH) for Vehicular Ad Hoc Networks" Electronics 11, no. 24: 4163. https://doi.org/10.3390/electronics11244163

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop