Optimizing VANET Lifetime and Energy Management Performance with ImCaG-Net
Received: 12 January 2025 | Revised: 15 February 2025 | Accepted: 6 March 2025 | Online: 4 June 2025
Corresponding author: Nagarjuna Karyemsetty
Abstract
Vehicular Ad Hoc Networks (VANETs) are essential components of modern intelligent transportation systems. Despite their advantages, VANETs face routing, network lifetime, and optimized energy consumption challenges due to their dynamic nature and high mobility. This paper introduces the ImCaG-Net model, a novel approach that addresses these challenges by combining the Imperialistic Competitive Algorithm (ICA) with Gated Recurrent Units (GRU). Comparative analysis of ImCaG-Net with existing models shows a 25% increase in network lifetime and a 30% increase in energy efficiency, confirming the effectiveness of the proposed model. The ImCaG-Net model demonstrates superior performance with an increase in packet transmissions to Cluster Heads (CHs) up to 60,000 and to Base Stations (BSs) up to 50,000 over 6000 rounds, highlighting its effectiveness compared to traditional models like LEACH and PEGASIS.
Keywords:
VANET, energy, network lifetime, nodes, ICS, GRU, cluster head selectionDownloads
References
Y. Kim and I. Kim, "Security issues in vehicular networks," in The International Conference on Information Networking, Bangkok, Thailand, Jan. 2013, pp. 468–472.
H. Al-Maliki, H. A. A. AL-Asadi, Z. A. Abduljabbar, and V. O. Nyangaresi, "Reliable Vehicular Ad Hoc Networks for Intelligent Transportation Systems based on the Snake Optimization Algorithm," Engineering, Technology & Applied Science Research, vol. 14, no. 6, pp. 18631–18639, Dec. 2024.
X. Liu, G. Yan, D. B. Rawat, and S. Deng, "Data Mining Intrusion Detection in Vehicular Ad Hoc Network," IEICE Transactions on Information and Systems, vol. E97.D, no. 7, pp. 1719–1726, 2014.
M. N. Mejri and J. Ben-Othman, "Detecting greedy behavior by linear regression and watchdog in vehicular ad hoc networks," in IEEE Global Communications Conference, Austin, TX, USA, Dec. 2014, pp. 5032–5037.
T. Nandy et al., "A Secure, Privacy-Preserving, and Lightweight Authentication Scheme for VANETs," IEEE Sensors Journal, vol. 21, no. 18, pp. 20998–21011, Sep. 2021.
G. S. Rawat, K. Singh, N. I. Arshad, K. Hadidi, and A. Ahmadian, "A lightweight authentication scheme with privacy preservation for vehicular networks," Computers and Electrical Engineering, vol. 100, May 2022, Art. no. 108016.
J. Sun, C. Zhang, Y. Zhang, and Y. Fang, "An Identity-Based Security System for User Privacy in Vehicular Ad Hoc Networks," IEEE Transactions on Parallel and Distributed Systems, vol. 21, no. 9, pp. 1227–1239, Sep. 2010.
H. Tan and I. Chung, "Secure Authentication and Key Management With Blockchain in VANETs," IEEE Access, vol. 8, pp. 2482–2498, Jan. 2020.
P. Chithaluru et al., "A Lightweight Energy-Efficient Routing Scheme for Real-Time WSN-VANET-Based Applications," IEEE Transactions on Consumer Electronics, vol. 70, no. 1, pp. 3820–3826, Oct. 2024.
Y. Tang, N. Cheng, W. Wu, M. Wang, Y. Dai, and X. Shen, "Delay-Minimization Routing for Heterogeneous VANETs With Machine Learning Based Mobility Prediction," IEEE Transactions on Vehicular Technology, vol. 68, no. 4, pp. 3967–3979, Apr. 2019.
C. Wan and J. Zhang, "Efficient identity-based data transmission for VANET," Journal of Ambient Intelligence and Humanized Computing, vol. 9, no. 6, pp. 1861–1871, Nov. 2018.
M. Gayathri and C. Gomathy, "Design of CSKAS-VANET model for stable clustering and authentication scheme using RBMA and signcryption," Frontiers in Computer Science, vol. 6, May 2024, Art. no. 1384515.
S. I. Ahsan, P. Legg, and S. M. I. Alam, "A Stacked Ensemble Learning IDS Model for Software-Defined VANET." arXiv, May 20, 2024.
M. Elhoseny, I. M. El-Hasnony, and Z. Tarek, "Intelligent energy aware optimization protocol for vehicular adhoc networks," Scientific Reports, vol. 13, no. 1, Jun. 2023, Art. no. 9019.
G. P. K. Marwah and A. Jain, "A hybrid optimization with ensemble learning to ensure VANET network stability based on performance analysis," Scientific Reports, vol. 12, no. 1, Jun. 2022, Art. no. 10287.
A. K. Kazi and S. M. Khan, "DyTE: An Effective Routing Protocol for VANET in Urban Scenarios," Engineering, Technology & Applied Science Research, vol. 11, no. 2, pp. 6979–6985, Apr. 2021.
U. Rajput, F. Abbas, H. Eun, and H. OH, "A Hybrid Approach for Efficient Privacy-Preserving Authentication in VANET," IEEE Access, vol. 5, pp. 12014–12030, Jan. 2017.
P. Upadhyay, S. J. Goyal, V. Marriboyina, and S. Kumar, "Securing Vehicular Internet of Things (V-IoT) Communication in Smart VANET Infrastructure using Multi-layered Communication Framework and Novel Threat Detection Algorithm," International Journal of Intelligent Systems and Applications in Engineering, vol. 12, no. 6s, pp. 789–803, 2024.
V. O. Nyangaresi et al., "Smart city energy efficient data privacy preservation protocol based on biometrics and fuzzy commitment scheme," Scientific Reports, vol. 14, no. 1, Jul. 2024, Art. no. 16223.
V. O. Nyangaresi et al., "Energy Efficient Dynamic Symmetric Key Based Protocol for Secure Traffic Exchanges in Smart Homes," Applied Sciences, vol. 12, no. 24, Jan. 2022, Art. no. 12688.
Downloads
How to Cite
License
Copyright (c) 2025 Uma Maheswari Gali, Nagarjuna Karyemsetty

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.