Abstract
VANET is mainly aimed at providing safety and security related information and traffic management. In future, VANET contributes to smart transportation system. Based on vehicle mobility, different routing protocols and traffic models were developed. In routing, trust between vehicles place an important role to forward safety related information. This paper aims at design of trust and delay based routing for hybrid communication in sparse VANET to avoid network attacks by malicious nodes. The proposed hybrid routing protocol works on the computation of trust in between vehicles and message reachable time (MRT). Route selection is done by considering the highest trust factor and minimum MRT. The performance effectiveness of the proposed scheme is evaluated by comparing with the Delay-aware and Backbone-based Geographic Routing for Urban VANETs (DBGR). The proposed scheme exhibits better performance in terms of packet delivery ratio, bandwidth utilization, end-to-end delay and control overheads.
Keywords
Introduction
A VANET is an emerging technology with vehicles equipped with a communication device called on-board unit (OBU), and a set of stationary units along the road, referred to as road side units (RSUs) which act as a portal to connect different communication networks. The OBU of each vehicle has wireless interface to connect with all vehicles and RSUs in its communication range. By employing Vehicle-to-Vehicle (V2V) and vehicle-to-RSU (V2R) communications, many applications are supported by VANET such as road safety, passenger infotainment, and vehicle traffic optimization for which VANETs have received significant support from industry, government,and academia over the globe. Due to VANET unique feature such as high speed, dynamic variations in the topology takes place which leads to many challenges such as data aggregation, clustering, data validation, data dissemination, routing, security, etc. [25,45].
Due to highly dynamic topology, on time data delivery and exchange of data packets is a challenging issue in VANET. Hence exchange of emergency alert messages are required to transmit against intentionally inserted attacks in the network. The different classes of attacks and their identification in VANET is presented in [46]. The main attacks affecting the VANET performance are Denial of Service (DOS), Distributed Denial of Service (DDOS), sybil and timing attack. The security related attacks are application attack, timing attack and monitoring attack. Node impersonation attack, blackhole attack, timing attack, social attack and monitoring attacks are mainly caused in V2V communication whereas DOS, DDOS, sybil and application attacks are affecting hybrid communication. The algorithm related to security mechanism in AODV to detect and prevent blackhole attack is proposed in [49].
Due to such attacks induced in VANET, security is an important factor to protect the driver and vehicle from flawful messages and also to get network services. One of the network attack related to safety applications is attack due to malicious nodes. Malicious nodes send false information to the vehicles. These malicious nodes prevent the genuine users to get the emergency services such as accident alerts, traffic jam notification etc. Thus in our proposed work, secured routing with minimum delay for hybrid communication is addressed. The proposed scheme prevents the network from malicious node attack (also known as denial of service attack).
To be specific, our contributions are as follows. (1) Identification of routes based on trust of neighboring nodes, (2) Selection of route with minimum delay and maximum trust, (3) Enhancing the basic routing performance metrics such as Packet Delivery Ratio (PDR), end to end delay, control overhead and throughput.
The remaining part of the paper is summarized as follows: Details about the literature survey is given in Section 2. Section 3 proposes our hybrid routing protocol for VANETs. Simulation inputs and simulation procedure are presented in Section 4. Simulation results are discussed in Section 5.
Related works
Many routing mechanisms for VANET have been proposed. Proactive and reactive routing algorithms for VANETs with different mobility models and network scenario are presented in [6,18,23,32,50]. Position and topology based routing protocols are explained in [9,29,38]. In [12,33,41,51], routing protocols using some of the intelligent techniques such as fuzzy logic, software agents, bio inspired, game theory, etc., are proposed to improve delay, packet delivery ratio, security, and throughput for high dense VANET environment.
User mobility and node density (ESRA-MD) are used to get the efficient and stable route for urban VANET environments [8]. A centralized routing scheme by predicting the mobility of vehicle is proposed in [10,47] to minimize the delay for VANET using an artificial intelligence powered Software-Defined Network (SDN) controller. Based on the information of network collected from RSUs and base station (BS), switches computes optimal routing paths to minimize the overall vehicular service delay. An Ant colony optimization (ACO) is used to compute optimal route in VANET [30] using local road segment delay and global delay from current intersection to the terminal intersection of the destination. In [14], an Artificial Spider-web based Geographic Routing protocol (ASGR) is addressed by using the different parameters of the paths like connectivity, number of hops and delay.
Applications and security approaches for intelligent transportation system of VANET such as authenticity, integrity, availability, confidentiality, anonymity and non-repudiation to provide the secure communication between Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) are presented in [2,36]. The routing protocol based on trustworthiness of the path and the number of hops in order to find the optimal route for transmitting reliable information is proposed in [26,48]. Due to selfishness, some vehicles exhibit various misbehavior such as packet dropping leads to degrade the efficiency of network. Hence it is necessary to stop such vehicles to participate in network communication by proposing an effective revocation scheme for disconnected delay tolerant VANETs [5].
To prevent the attacks in VANET from malicious nodes a trust management is approached in [3]. In [19] secured routing protocol with minimum delay is presented to prevent the VANET from Denial of Service attack. The swarm intelligence based secure routing in VANET is proposed in [28] which uses Intelligent Water Drops (IWD) method. This method protects the VANET from blackhole and wormhole attacks.
To decrease the hop count and delay, and to increase the network throughput and the packet delivery ratio, a routing protocol based on cost metric is proposed in [39]. In some situations where the target vehicle is moved away from the expected range and in sparse traffic conditions connectivity is the main issue for routing in VANETs. To overcome such situations Connectivity aware Minimum-delay Geographic Routing (CMGR) [42] and Connectivity Aware Intersection-based Routing (CAIR) [13] protocols are proposed to select an optimal path with high probability of connectivity and low delay. Light weight Intersection-based Traffic Aware Routing (LITAR) protocol [15] for V2V communication in urban scenario uses two algorithms where route decision is made based on density of the network, network connectivity and distance from destination to minimize overhead of the network due to traffic condition measurements.
Many time critical applications competing for wireless access leads to congestion and “hotspot” problem in urban areas with high traffic scenario. The algorithm proposed in [20] choose the optimal route with the knowledge of traffic conditions by calculating the load status in order to avoid congestion. In Real Time Intersection based Segment Aware Routing (RTISAR) [7], the traffic segment status based on connectivity, density, load segment, and cumulative distance toward the destination is used to choose the next intersection on road to forward the packets. To support Internet access in urban environment using cellular networks, a novel infrastructure-based dynamic and Connectivity Aware Routing protocol (iCARII) is proposed in [4]. Considering the real time traffic conditions for route selection precess in case of link connection/disconnection and historical traffic condition is explained in [22].
To exchange the information over distances more than communication range of the vehicle, multi hop communication is used. To ensure stable multi hop communication with low delay for high mobile vehicles a routing protocol is presented in [35], based on medium access control (MAC) protocol. Time Division Multiple Access (TDMA) scheduling algorithm is used to select the intermediate vehicles to transmit/receive packets for longer distances. Secure routing is an important challenge in VANET as some malicious nodes try to disrupt the route discovery process in routing. In [16], survey of various techniques to improve routing protocols for secure routing process by enhancing the trust among different nodes in VANETs. In VANET all vehicles must work with full cooperation to generate and broadcast some important messages for safety purpose. Hence trusted and secured routing protocol named as Trusted Vehicular Ad-hoc On-demand Distance Vector (TVAODV) is explained in [37]. A secure group authentication technique for VANET is proposed in [34]. It operates in three phases: (1) a group is formed which consists of several vehicles within the communication range using beacon message, (2) the message is checked for reliability, and (3) the co-operative message authentication is performed.
To select the next-hop in vehicle communication the “bridging approach” for message forwarding is used in [21] i.e., vehicles on the east select from west and vice versa to improve the Quality of Service (QoS) parameters like packet delivery ratio and throughput. In city scenario with buses and cars as nodes, a hybrid protocol is proposed in [44]. It uses the greedy forwarding approach and the store-carry-and-forward approach to improve the performance parameters.
Blockchain is the recent technology used now a days to build trust and track asset in network. There are two types of blockchain: Private and Public. The routing using both private and public blockchain called as regional blockchain is used to prevent a minimum 51% attack in VANET is proposed in [43]. In [24], MAC layer attacks in VANET are reduced by using block chain method to increase the security and privacy to the users. Fog computing is a method where computing resources are placed between data source and data center. It uses edge devices for computation. The current research issues and future opportunities of fog computing in VANET are presented in [11] along with its characteristics and services. Streaming of accident and disaster videos to the nearby vehicles for V2V communication using fog computation is presented in [27]. It uses speed, position, and video recording angle parameters of each vehicle to minimize unnecessary exchange of video data. Fog computing along with intelligent optimization algorithms is described in [40] to secure the VANET. Back propagation with feed forward neural network is used to differentiate the authenticate vehicles and attacked vehicles.
Machine learning is an application of Artificial Intelligence (AI) provides the ability to automatically learn and improve from experience without being explicitly programmed. Essential data for routing in VANET using Deep Reinforcement Learning (DRL) method is described in [53]. In this work, the vehicle movement is predicted by DRL and transmits the packets with proper route. In [52], the improvement of Greedy Perimeter Stateless Routing (GPSR) using Support Vector Machine (SVM) method is used named as Greedy Machine Learning Routing (GMLR) algorithm. In [1], a Q-learning based routing in VANET to improve the speed of routing process is presented.
Comparison of existing routing protocols is presented in Table 1. Limitations of these routing protocols are listed as follows: requirement of trust between vehicles, needs better connection between vehicles and Internet through RSU when trusted nodes are not their in the neighbors, takes more delay to send the packets, minimum flexibility for rapid change in important information parameters, and more loss of data packets due to rapid change in topology and link disconnection.
Summary of routing protocols in VANETs
Summary of routing protocols in VANETs
This section explains the proposed trust and delay based routing for Vehicle to Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) i.e., hybrid communication under the VANET constraints such as rapid change in topology, high dense network, link failures etc. The proposed hybrid routing protocol operates in the following sequence: (1) based on the prior knowledge about the neighbors, determine trust between the source vehicle and neighboring vehicles, (2) identify trusted neighboring vehicles (i.e., vehicles having trust factor more than the threshold assigned), (3) the process repeats until the destination vehicle is reached, (4) compute the message reachable time (MRT) from source vehicle to the destination vehicle for identified routes of involved trusted neighbors, (5) select the route among the available routes based on highest trust factor and minimum MRT.
Network environment
The vehicular network shown in Fig. 1 has highway scenario with dual lane consisting of vehicles and RSU for communication. Few assumptions are made within network for communication purpose. Every vehicle is installed with GPS, digital map, sensors, network devices, which gives the information about road segment and computing devices. Wi-Fi is used as technology of communication between vehicles which have an ability of charging their batteries constantly. It is assumed that all vehicles are traveling in same direction.

Network environment.
Trust originator node: It is the node that calculates the trust of other nodes to send the packet. Neighbor nodes: The nodes coming in the communication range of originator node. Trusty node: The node whose trust is above the assigned threshold value is called as trusty node. Advisor node: The node which gives the trust information about the neighbor nodes based on the history in case of all neighbor nodes fail to meet the assigned threshold value. Message Reachable Time (MRT): The total time taken by nodes to reach the message from source node to the destination node.
Delay and trust based routing scheme
The proposed hybrid routing protocol protects the network from denial of service attacks where malicious node activities are minimized. The different parameters used to identify the malicious nodes in network are received signal strength, less hop count and more sequence number, link life time, trust interval and number of transactions [17]. The transactions may be positive or negative. Positive transactions are sending the information regarding current position, road condition and traffic condition to the nearby vehicles. In our research work, we have considered the malicious node as node which has less number of transactions and trusted node as a node with more number of transactions.
The proposed routing protocol operates in the following sequence: (1) based on the prior knowledge about the neighbors, determine trust between the source vehicle and neighboring vehicles, (2) identify trusted neighboring vehicles (i.e., vehicles having trust factor more than the threshold assigned), (3) the process repeats until the destination vehicle is reached, (4) compute the message reachable time (MRT) from source vehicle to the destination vehicle for identified routes of involved trusted neighbors, (5) select the route among the available routes based on highest trust factor and minimum MRT.
Trust computation: Two types of trust are calculated, direct trust and advised trust. Direct trust is computed based on the vehicle individual trust which are above the assigned threshold value. Advised trust is computed depending on the feedback taken from the advisor node in the network. Advisor node gives the trust information about the neighbor nodes based on the history if all neighbor nodes fail to meet the assigned threshold value. Direct trust computation: As shown in Fig. 2, the originator node (source vehicle S) fetches the trust value of its neighbors from RSU 1. Direct trust value of the neighbor vehicle (whose value is not fetched from the RSU 1) is computed using the previous knowledge that the trust originator node has upon the neighbor trusty node. The originator node has more number direct knowledge about its neighbors which may be positive knowledge or negative knowledge based on importance level of every message. For example in VANET, accidental alert message has more importance level than searching shopping mall message. If the neighbor trusty node confirms the alert message then the originator node considers this knowledge as positive for computing direct trust. Each knowledges are having different importance level. In the proposed work, direct trust computation Where j represents knowledge, n represents number of neighbor nodes in range of originator node,
Trust computation. Degree of trust

Advised trust calculation: It is used where the originator node has more neighbors. Whenever the trust originator node doesn’t have enough prior direct knowledge about trusty node in its neighbors, the originator node may send queries to advisor nodes to get advise about trusty node. Here it is expected that the advisor nodes are as of now having the trust value
Where,
Mixed trust computation: When the originator node is having both trust values (direct and advised) then mixed trust
(
If
Computation of message reachable time (MRT): The Message Reachable Time (MRT) [17] between two nodes is the time taken by nodes to send the packet which is calculated as ratio of distance between two nodes and speed difference between those nodes as given in equation (4) and (5).
Where
Where
Once the MRT between two nodes is calculated, the total path delay is computed using equation (7) which is the time taken for the message to reach its destination from the source vehicle. It is calculated for all routes.
Then the Minimum Message Reachable Time (MMRT) is computed using equation (8), which is the lesser delay amongst all total path delays calculated for trusted routes between source and destination.
Route selection: In our proposed routing algorithm, trust is computed locally by each vehicle. The trust data table must be kept update by every vehicle and the table consists of data about trusty vehicle’s ID number, direct, advised and mixed trust values. The trust data might be invigorated intermittently. The data will be lapsed if it isn’t revised within the time frame t as accepted by the system and the relating trust value becomes zero. Finally the trust decision TD is evaluated based on equation (9).
Where,
Route decision
Route decision: Once all the trust paths between source and destination are calculated the MRT for each path is calculated using equation (5). Then the path with maximum trust and minimum MRT is selected as final path to forward the message using Table 3. The trust value greater than the set trust threshold (0.6) is taken as maximum trust and lesser is taken as minimum trust value. The maximum and minimum path delay depends on the calculated value in seconds. Thus any safety message is delivered with minimum delay and more trust by avoiding the malicious node for routing. Sometimes even though the MRT is more the route with more trust is selected. If no trustworthy vehicles in the path then packet is forwarded through respective RSU.
See Algorithm 1.
Example scenario
The Fig. 3 shows the example scenario of trust and delay based hybrid routing protocol for VANET. A highway scenario with six vehicles is considered, where V1 is the source and V4 is the destination vehicle. The source vehicle V1 sends RREQ packet to RSU1 to get the information of neighbor vehicles (V2, V3 and V6). The information is trust value, number of positive transactions and negative transactions of vehicles V1, V2, V3 and V6. The RSU1 sends RREP packet consisting of these information values. Based on the values, the source vehicle V1 selects neighbor vehicle having high trust and more number of positive transactions. The trust value and delay between two vehicles is calculated using equation (3) and (5) respectively. The initial trust and delay values are tabulated in Table 4. Now there are two paths available from V1 to V4. The total path delay computed for first path i.e., V1-V2-V5-V4 is 0.47 seconds and for second path, V1-V3-V5-V4 is 0.59 seconds. MMRT is the path with minimum delay i.e., V1-V3-V5-V4. If V2 and V3 has low trust value, then the source vehicle transmits the packet to RSU1. In this way the proposed routing algorithm selects the best route based on minimum delay and maximum trust.

Proposed routing algorithm

Example scenario.
Initial trust and delay values
The simulation of the proposed model is done using “C
Simulation inputs
Simulation inputs
For simulation, n number of nodes are considered, whose position and ID’s are assigned randomly. We have considered highway network with dual lane and all vehicles running at a speed of V kmph with safe distance of S meters in the same direction throughout the simulation. The communication range of vehicle is R meters. It is assumed that every vehicle is installed with GPS and communication device to get the position, and its traveling speed. All vehicles are distributed uniformly with different speed and are assumed to be connected each other.
Simulation inputs
The simulation inputs taken for the proposed scheme are given in Table 5.
Simulation procedure
The process of simulation for the projected hybrid routing protocol is as follows.
Give the input as total number of vehicles. Enter the source and destination vehicles. Search neighbor nodes. Calculate trust and MRT for all neighbors. Select path with maximum trust and minimum delay.
Performance parameters
The performance metrics analyzed through simulation in our proposed routing algorithm are as follows.
Packet Delivery Ratio (PDR): The ratio of total number of packets delivered to destination to the total number of packets sent by the source. It is evaluated in %. End to end delay: It gives the total time taken for a packet to reach from source to destination. It is measured in milliseconds. Control overhead: It is the overhead of control packets in routing. It is measured in %. Available paths: These are total number of trusted routes in between source and destination. Bandwidth utilization: It is defined as the amount of data that can be transmitted in the fixed amount of time and it is expressed in bits per second (bps). Throughput: It is defined as number of bits received by destination vehicle per unit time. It is measured in kilobits per second (kbps).
Result analysis
The above performance metrics defined are simulated and analyzed to check the performance efficiency of the projected routing scheme and compared with a delay-aware and backbone-based geographic routing for urban VANETs routing protocol (referred as DBGR in graphs) [31] for supporting vehicle-to-vehicle and vehicle-to-infrastructure communication in VANETs. In DBGR, the urban scenario is considered where the path with minimum delay is selected. In our research work, the trust between vehicles is computed to find the path to the destination. Trust plays an important role which secure the network from malicious nodes attack. Along with trust, the delay is also minimized in our proposed protocol.
Figure 4 shows increase in end to end delay with increase in number of vehicles by varying the speed of vehicles. It is due to more number of intermediate nodes between source and destination. The delay decreases with increase in speed of vehicle because less time is required to cross the range of the RSU. Further observation shows that the end to end delay is more in DBGR compared to our proposed algorithm.

End to End Delay Vs. Number of Vehicles.
From Fig. 5, as the number of vehicles increase within the range, the intermediate hops are more. Hence while transferring packets to destination, packet loss is more which intern decreases PDR. It also shows that as the speed increases rapid change in network takes place and while making hand-off from one RSU to another RSU packet drop increases. Thus PDR reduces with more vehicle velocity. In our proposed work PDR is better as compared to DBGR.

PDR Vs. Number of Vehicles.
Variation of control overhead by increasing number of vehicles is shown in Fig. 6 keeping the speed of vehicles constant. It is observed that control overhead increases with more vehicles because the exchange of control packets such as RREQ, RREP, and ACK are more for more intermediate vehicles. But it is less in our proposed work compared to DBGR. This is because of the involvement of RSU in identifying the trusted neighbors.

Control Overhead Vs. Number of Vehicles.
Number of available paths depending on trust and delay are calculated from source node to destination node. There are more paths as the number of vehicles increases in the network due to less failure of path finding process (as shown in Fig. 7). The paths in DBGR considers only delay. But our proposed algorithm can send packets with more trusted route in minimized end-to-end delay. The number of paths are decreased by increasing speed of vehicles, as there are chances of frequent network disconnections for high speed vehicles.

Available Paths Vs. Number of Vehicles.

Bandwidth Utilization Vs. Number of Vehicles.

Throughput Vs. Number of Vehicles.
Bandwidth utilized by the channel with increase in number of vehicles is given in Fig. 8. As the number of vehicles increase, intermediate nodes increase hence bandwidth utilization will be more. The bandwidth utilized in our proposed work is less as compared to DBGR. As the number of vehicles increase throughput decreases due to more number of intermediate nodes as given in Fig. 9. Throughput is better in proposed routing algorithm as compared to DBGR.
Vehicular Ad hoc Networks (VANETs) provide safety and infotainment services for traffic management. Because of unique characteristics of VANETs, routing with trust between vehicles is a challenging task. As the safety information is bounded with time, routing with trust between vehicles plays an important role in VANET communication. In this paper, we have developed trust and delay based routing for Vehicle to Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) i.e., hybrid communication by considering rapid change in topology, high dense network, link failures etc. The proposed routing scheme is simulated and compared with a delay-aware and backbone-based geographic routing for urban VANETs (DBGR), which shows better performance in terms of packet delivery ratio, bandwidth utilization, end-to-end delay, and control overheads. The QoS parameters for routing and the other parameters to identify malicious node such as received signal strength of node, the link life time of node can be considered as future extension of the work.
