1 Introduction

The vehicular ad-hoc network is generally used to communicate among moving vehicles in a definite atmosphere. Here, Vehicle to Vehicle (V2V) communication is explained about the communication between vehicles directly [1, 2]. Additionally, Vehicle-to-Infrastructure is illustrating about the communication between a vehicle and an infrastructure like a Road Side Unit (RSU) [3, 4]. Normally, the VANET has no predetermined structural design or topology. On the other hand, a common VAN ET is used to communicate between moving vehicles or some nearby RSU. According to this situation, VANET is dissimilar to a MANET, in which, vehicles are not moving arbitrarily like nodes in MANETs, rather than moving vehicles encompass predetermined paths like urban roads and highways. At the same time, it thinks about VANETs as a division of MANETs. Suppose, if it takes in designing of network structural design, then it is significant to consider of VANETs like an entity study area. In VANET structural design, an onboard unit (OBU) includes a wireless transmitter and receiver in a vehicle. Here, we can easily describe three feasible communication circumstances for vehicles. The initial communication is that every vehicle communicates with each other with the help of RSU. This structural design also looks like wireless local area networks (WLAN). The second communication is that vehicles openly communicate with each other and without RSU, which is categorized as Ad-hoc structural design. The third communication is that the combination of both like some vehicles can communicate openly and further need some RSU to communicate [5].

In VANET, security is a significant process to protect further networks in communication. Moreover, the VANETs contain several possible attacks. The foremost intention of attacks is to generate difficulty for consumers to contact the system or stealing the information [6, 7]. In a vehicular network, every application is premeditated to protect the extremely sensitive information from malicious manipulation which is communicated through VANET. Suppose, if it is not detected that the sensitive message is manipulated, and then it will origin the. Additionally, comfort and eminence functions are necessitating protecting from profits failure in VANET. Therefore, our anticipated method contains cluster-related secure communication through a certificate revocation system. In this method, the certificate authority is exploited to authorize the certificate for safe communication.

Moreover, we need an effective routing algorithm to send data packages from one node to another node inappropriate manner [8,9,10,11]. Here, an effectual routing algorithm is a routing format among least postponement, greatest system capability, and less computational difficulty. This kind of algorithm is executed in multiple topology networks which is a current study in VANET. Normally, the foremost intention of a routing algorithm is to sense and maintain the finest route to send data packages through intermediate nodes. According to the dynamic mobile nodes, searching and accumulating routes is a difficult process in VANETs. As an extension of our previous work, we present an Energy-efficient enhanced OLSR routing protocol using Particle Swarm Optimization with Certificate Revocation Scheme for VANET. The contribution of our work is described as below,

  • As the cluster formation has been presented in our previous work, cluster formation is to be done in this paper.

  • Revoked (attacked) nodes are preserved in the Certificate Revocation List (CRL). Before transmission, each node in a cluster verifies the validation of certificate from the Certificate Authority (CA) for secure communication.

  • After the verification, the source node forwards the data to the destination by the way of optimal path. This optimal path is to be established based on the enhanced OLSR routing protocol. Multi-point relay (MPR) selection is the major component in OLSR. For optimal MPR selection, Particle Swarm Optimization (PSO) algorithm is presented in this work.

  • We simulate this proposed technique on the network simulator NS2.

  • Experiments results show that performance of our proposed approach is superior to that of the existing work in terms of energy efficiency.

Rest of this paper is organized as follows. Section 2 surveys some previous literature that focused on the research of routing and security in VANET. Our proposed energy efficientenhanced OLSR routing protocol using Particle Swarm Optimization with Certificate Revocation Scheme for VANET is presented in Sect. 3. Results of our proposed approach are discussed in Sect. 4. This paper is concluded with Sect. 5.

2 Literature Survey

In this section, some previous literature that focused on the research of routing and security in VANET is survived. In VANET, efficient routing is one of the major components to solve the problem of energy efficiency. So, Husain and Sharma [12] have proposed geographical location based routing protocols in VANET. They have implementedtwo geographical routing protocolsbased on IEEE802.11pthat are LAR (location-aided-routing protocol) and ZRP (zone-routingprotocol) to solve the problem of communication breaks between the vehicles. However theperformance of the LARP outperformed the performance of the ZRP, it should be improved in terms of energy efficiency. Similarly, Toutouh et al. [13] have introduced aparallel evolutionary algorithm which has been used to explore for energyefficient OLSR structures. This algorithm outperformed the existing configuration in terms of energy consumption. However, they have not focused on secure transmission. For securable transmission, Ganan et al. [14] have proposed an Efficient and Privacy-Aware revocation Mechanism (EPA). This proposed approach has been performed with the support of a Crowds-based anonymous protocol and Merkle Hash Trees. It replaced the time-consuming certificate revocation lists verifying process. Similarly, Rahbar and Daeinabi [15] have presented an advanced Secure scheme based on Clustering and Key Distribution. This scheme has been executed among cluster-heads and members in VANET. For securable communication, this scheme has deployed proxy signature, message authentication, and symmetric cryptography.However, efficient routing should be combined with the security system to improve the energy efficiency of the network.

Saleh et al. [16] have introduced a Reliable Routing Protocol for VANET. The network has been divided into overlapping zones using this protocol. A special node has been selected as a master node for each zone. This master node maintained the routing boards for inter-zone and intra zone communications. This protocol discovered available routes to the destination and selected the most efficient route among them. Similarly, Bitam et al. [17] have presented a Hybrid Bee swarm Routing (HyBR) protocol in VANET. This protocol combined the properties of geographic routing with those of topology routing. Mirjazaee and Moghim [18] have proposed an innovative opportunistic-based routing algorithm (OSTD) for urban scenarios. This proposed approach has evaluated the efficient routes by calculating the utility function.

Authors also have used the predictability of Vehicle’s driving path to transmit the packet. Liu et al. [19] have proposed limited broadcasting by connectivity zones based enhanced AODV routing protocol for data forwarding in large-scale VANET. Authors evaluated the performance of the connectivity zones with the function of grey correlation analysis method.

However theabove-mentioned protocols are improved in terms of delivery ratio and end-to-end delay, theenergy efficiency of the network has to be improved further.

3 Energy Efficient Enhanced OLSR Routing Protocol Using PSO With Certificate Revocation Scheme

3.1 Overview

As an extension of our previous work, Energy efficient enhanced OLSR routing protocol using PSO with Certificate Revocation Scheme for VANET is presented in this paper. Initially, vehicles in the region are grouped into separate clusters. In each cluster, cluster head (CH) is based on the trust degree of the vehicles. The vehicle with lesser trust degree than minimum trust degree or threshold value is identified as the attacked node. List of these attacked or revoked nodes are included in the Certificate Revocation List (CRL). The certificate authority is responsible to maintain the information of CRL.The CA is responsible to revoke and assign the certificates of the vehicle node. The Certificate Authority identifies, if any vehicle involves any malicious activity, immediately it revokes their certificates even before the expiration dates. To direct all the vehicles in the cluster, the certificate authority furnishes valid digital certificate to every CH. All the cluster heads are behave as a mobile repository to store the details about the active nodes (witness nodes) and the ids of the revoked nodes.After the validation of certificates, a vehicle within a cluster transmits its data packet to the corresponding cluster head and the CH sends the gathered data to the base station through the optimal path. This optimal path is selected using our proposed approach which is to be known as PSO based OLSR routing protocol. In this approach, multipoint relay selection (MPRs) that included in OLSR routing protocol is optimized using Particle Swarm Optimization. After the establishment of the optimal path, the data packets will be transmitted by using the symmetric cryptography application, over the selected path. By presenting this enhanced OLSR routing protocol, theenergy efficiency of the network will be improved. Figure 1 shows the block diagram of our proposed approach.

Fig. 1
figure 1

Block diagram of our proposed approach

3.2 Cluster Formation

Initially, vehicles in the zone are to be accumulated into different clusters based on trust degree of each vehicle as mentioned in our previous work. Among vehicles ormembers in a cluster, a cluster head (CH) is selected based on the weight of the vehicle. This weight is calculated for each vehicle using the parameters such as number of neighbor vehicles, transmission range, speed of the vehicle and the trust degree. Then the vehicle, which has less weight, is elected as a CH.The weight factor for each vehicle is calculated using the following equation.

$$w_{i} = \alpha * R_{T} + \beta * V_{{Neigh_{i} }} + \delta * S - \gamma * T_{\deg }$$
(1)

where \(\alpha ,\,\beta ,\,\gamma\) and \(\delta\) are the constant weights range from 0 to 1. \(R_{T} ,V_{{Neigh_{i} }} ,\;S\) and Tdeg are representedas the transmission range, number of neighbor vehicles, speed of the vehicle, and trust degree of the vehicle respectively.

From the above equation, trust degree is the significant parameter for the selection of CH and for the identification of inactive or attacked node. This trust degree value is calculated using direct trust and indirect trust values. Direct transmission between the sender and receiver node is known as direct trust. Transmission between the sender and receiver node is done with the support of in between trusted vehicle, is known as indirect trust. Direct trust value between the vehicles s and d is calculated using the following equation,

$$T_{n + 1}^{D} = \left\{ \begin{gathered} T_{n}^{D} \left( {s,d} \right) + RC,\left( {SC > 0} \right) \hfill \\ T_{n}^{D} \left( {s,d} \right) + PC,\left( {FC > 0} \right) \hfill \\ \end{gathered} \right.$$
(2)

where \(T_{n}^{D}\) denotes the previous trust degree that was calculated during the selection of previous CH. RC and PC are known as Reward Coefficient and Punishment Coefficient respectively, those are used to update the similarity between s and d.SC and FC are represented as the number of successful communications and number of unsuccessful communications respectively in the time interval Δt.

Direct trust value between the vehicles s and d is calculated using the following equation

$$T_{{\left( {s,d} \right)}}^{{{\text{ID}}}} = \frac{{\sum\nolimits_{j \in l} {S\left( {s,j} \right) * T^{D} \left( {j,d} \right)} }}{{\sum\nolimits_{j \in l} {S\left( {s,d} \right)} }}$$
(3)

where j represents the neighbor vehicle that is common to boths and d. S(s, j) represents the similarity between the vehicles s and j. l represents the most similar nearest-neighbors of s and d.

Using equations () and (), the trust degree is calculated using the below equation

$$T\left( {s,d} \right) = \eta * T^{D} \left( {s,d} \right) + \mu * T^{{{\text{ID}}}} \left( {s,d} \right)$$
(4)

where η and μ are represent the weighting factors direct trust degree and indirect trust degree respectively.

Each vehicle calculates the weight value using Eq. (16). Then the vehicle connects to the cluster head, responsible in that region. Thus the cluster is formed as shown in Fig. 2.

Fig. 2
figure 2

Cluster heads (CHs) selection

3.3 Isolation of Revoked Nodes

After the cluster formation, CH in each cluster receives information message about its non-CH members. This information message includes ID and trust degree of the vehicles. CH forwards these gathered information messageto the Certificate Authority (CA)which is a trusted third party, this authority will generate the signed certificate for requested vehicle. CA maintains the Certificate Revocation List (CRL) which maintains the list of the vehicles and their information. After receiving the information message from the CH, CRL verifies that whether the vehicle is normal or attacked one. If the trust degree of the vehicle is lesser than the threshold trust degree (T < Tth),the vehicle is identified as an attacked node.Then CA revokes the certificates of the malicious vehicles before the expired period.It forwards the revoked node ID to the corresponding CH as shown in Fig. 3. The CH forwards that information to all nodes except to the revoked node.After receiving the information from the CH, all nodes verifies their buffer whether the revoked node previously performed any abnormal activity or not.

Fig. 3
figure 3

Communication between CH and CA

3.4 Enhanced OLSR Routing Protocol Using Particle Swarm Optimization

When ever vehicle nodes need any details about its certificate, it can demand its respective cluster. After the collection of certificate details, the vehicle can start the communication only it its certificate is valid. Before transmission, efficient route will be established between the source and base station. For efficient routing, Enhanced OLSR routing protocol using Particle Swarm Optimization is presented.

3.4.1 Overview of OLSR Protocol

Optimized Link State Routing protocol is a proactive LSR protocol.Multi-point relays (MPRs)selection is the major idea of the OLSR protocol. By the selection of these MPRs, information exchange overhead will be reduced in the network. The importance modules of the OLSR are described as follows,

3.4.1.1 Neighbor Sensing

In neighbor sensing, each CH forwards HELLO message to its neighbor nodes. This message contains ID of the neighbor nodes and their link status. The nodes located in 1-hop neighborhood of a node will be selected as MPRs. In this way, HELLO messages permit each node to detect its neighbors up to two hops away.

3.4.1.2 Efficient Broadcasting of Control Traffic

To control the traffic efficiently, the selected multi point relay nodes only permitted to broadcast the information.

3.4.1.3 Broadcasting Sufficient Topological Information

Topology Control (TC)message is the other type of control packets. It is used to broadcast sufficient topological details in the network. This topology control messages are originated by the MPRs to know which other CHs have chosen it as their MPR. Therefore all the heads of the cluster get some topological view and present the subset of links in the adhocnetwork.This TC message permits each CHto estimate its own routing table.

3.4.2 Proposed Optimal MPR (OMPR) Selection

Multi point relay nodes are responsible to control and forward the traffic details of the network. It is very essential to create the best non-CHs in a cluster as a MPR node because the effectiveness of the OLSR protocol is based on the multi point relay node.To select the optimal MPR nodes form the set of MPRs, Particle Swarm Optimization (PSO) is presented.

Kennedy and Eberhart developed the Particle Swarm Optimization., PSO was influenced by the social response and natural movement of a flock of birds moving towards a common intention like Genetic Algorithm (GA) that imitates the process of natural progression. This algorithm considered the particles are like the swarm of birds as the multi-dimensional problem area and also considered the speed they travel as the velocity of the particles.Optimal MPR selection using this algorithm is presented phase by phase.

3.4.2.1 Initialization

Initially, the selected MPR nodes are initialized as the candidate solutions or particles i.e.,

$$P_{i} = \left[ {X_{i,1} \left( t \right),X_{i,2} \left( t \right), \ldots ,X_{i,D} \left( t \right)} \right]$$
(5)

where Xi,d(t) denotes the position of the ith particle or MPR in the dth dimension. This is also represented as,

$$X_{i,d} \left( t \right) = \left( {x_{i,d} \left( t \right),y_{i,d} \left( t \right)} \right),\;\;\;\;1 \le i \le N_{P} ,\,\,1 \le d \le D$$
(6)

where NP denotes the population size of the particles.

3.4.2.2 Fitness Measure

From the initialized particles or MPRs, optimal MPRs are selected by measuring fitness value of each MPR. This fitness value is measured using the metrics Residual energy, Link stability and Buffer occupancy of each MPR node. Evaluation of these metrics is described below.

3.4.2.3 Residual Energy

Residual energy of each MPR node is calculated as using below equation

$$E_{residual,i} = E_{initial,i} - E_{consumed,i}$$
(7)

where \(E_{initial,i} \;{\text{and}}\;E_{consumed,i}\) are characterized as initial and consumed energy of node i. By scheming the total amount of transmission and reception energy of a node i, energy ingestion of the node is calculated as follows

$$E_{consumed,i} = u_{i} \times E_{T} + v_{i} \times E_{R}$$
(8)

where \(u_{i} \;{\text{and}}\;v_{i}\) are characterized as the number of transmitted bits and received bits in node i. \(E_{T} \;{\text{and}}\;E_{R}\) are characterized as transmission energy and reception energy correspondingly and are calculated as

$$E_{T} = E_{{T_{radio} }} + E_{A} \times dis_{{{\text{mn}}}}^{2}$$
(9)
$$E_{R} = E_{{R_{radio} }}$$
(10)

where \(E_{{T_{radio} }} \;{\text{and}}\;E_{{R_{radio} }}\) are the energy that the radio requirements for the transmitter and the receiver correspondingly, EA is signified as the energy of the transmit amplifier and the distance within two nodes m and n is signified as dis.

3.4.2.4 Link Stability

Link stability that establishes a route betweentwo nodesand it is calculated as

$$LS = \frac{R}{{dis\left( {m,n} \right)}}$$
(11)

where R denotes the transmission range, \(dis\left( {m,\,n} \right)\) between two neighboring nodes.

Finally, Fitness function for selecting optimal MPR is calculated using equation () and () i.e.,

$$Fitness_{i} = \alpha * E_{residual,i} + \beta * LS_{i} + \gamma * B_{i}$$
(12)

where α, β and γ are denoted as a weighting factor ranging from 0 to 1. Bi denotes the buffer occupancy of ith node.The particle with maximum fitness value is our optimal solution to select the OMPR.

3.4.2.5 Updation

The direction and velocity will be changed until the particles finally meet at a solution with each creation of motion, The Velocities and locations are explained in PSO as:

$$v_{i + 1} = w \cdot v_{i} + c_{1} \cdot r_{1} \cdot \left( {pbest_{i} - Y_{i} } \right) + c_{2} \cdot r_{2} \left( {gbest_{i} - Y_{i} } \right)$$
(13)
$$Y_{i + 1} = v_{i + 1} + Y_{i}$$
(14)

where \(c_{1}\) and \(c_{2}\) are represented as the self-recognition component coefficient and social component coefficient respectively. These values have same positive constant value. \(r_{1} \;{\text{and}}\;r_{2}\) approach for a uniformly distributed random number in the interval (0, 1). \(w\) is represented as the inertial weight of the particle, which is initialized to 1 and is gradually reduced over time. The value \(pbest_{i}\) is the best position of the particle. \(gbest_{i}\) is the global best value among the pbesti value. Yi represents a position of ith particle in the search area which alters based on updates on vi which represents the velocity.

3.4.2.6 Termination

When the fitness of particle (P) is greater than the fitnessof pbest, then the particle P is considered as the pbest particle. Otherwise the pbest particle is updated using Eqs. (13) and (14). If the fitness of updated pbest is better than the fitness of gbest, then the updated pbest particle is assigned as gbest particle. Otherwise the gbest particle is updated. This process is repeated until we get the optimal solution or optimal MPR from the initialized MPRs. Once the optimal solution is attained, the algorithm will be terminated.Algorithm for OMPR selection is described below and Fig. 4 shows the flow diagram of this algorithm. Figure 5 shows the selection of optimal MPRs or vehicles in a cluster.

figure c
Fig. 4
figure 4

Flow diagram of the optimal MPR selection

Fig. 5
figure 5

Optimal MPRs selection

By selecting these optimal MPRs, OLSR protocol can establish an efficient route between the CHs and the base station. After the establishment of an efficient route, the data packet of the certificate validated vehicle is forwarded from the CH through this established route. After that with the help of symmetric cryptography application, the secure message transmission will take place.

3.5 Secure Transmission

For secure transmission of data packet from the vehicle V1 (source) to V2 (destination) through the CHs, symmetric cryptography approach is presented as proposed in our previous work. The prime aim of symmetric cryptography approach is to provide the secured message transmission. It establishes the communication only, after noticed the authentic certificate information from the cluster head. Also it encrypts and decrypts the certificates to enhance the security of the certificates. Then the message will be forwarded through the selected OMPRs as shown in Fig. 6.Process of secure transmission is discussed below.

  • All CHslocated inside the region of CA gain a key (certificate) pair of cluster head that related to the neighbor cluster of certificate authority.

  • The proposed OLSR protocol helps to identify the destination. Here the destination vehicle may be in similar cluster or different cluster. When the destination is in different cluster, vehicle V1 must find out the location of the destination vehicle V2 before the connection establishment.

  • The symmetrical encryption algorithm is performed based on Advanced Encryption Standard (AES) algorithm.

  • During the time of communication, the privacy of the cluster member vehicle’s are preserved effectively.

  • The communication to the destination is classified into two cases, first one is the communication between the vehicles located in a same cluster and the second one is the communication between the vehicles located in different cluster.

  • Communication between the vehicles located in a same cluster: Thevehicle V1 must encode the message to be transmitted to destination vehicle V2 by using the key ‘ks’. More over the destination vehicle V2, must able to calculate the key ‘ks’ to decrypt the received message. Here the prime factor is, the cluster head must able to receive the key ‘ks’ and decrypts the communication of all the cluster member vehicles. Since the CH is elected from the trusted vehicle and it’s operation is frequently monitored by the other verifier nodes, the privacy of the message transmission is preserved.

  • Communication between the vehicles located in different cluster: When the source vehicle V1 is in need to communicate with the destination vehicle V2 located in different cluster, the cluster head must verify both source and destination and receive the necessary keys by using the corresponding cluster head. After that vehicle V1 and V2 can communicate with each other. If the vehicle node V1 wants to connects with the cluster, it uses its current key to communicate with the vehicle node V2

Fig. 6
figure 6

Secure transmission by selecting the OMPRs

4 Experiment Results

Our proposed approach OLSR-PSO (OLSR routing protocol using Particle Swarm Optimization with Certificate Revocation Scheme) is implemented in network simulatorNS2.

In this simulation process, five hundred vehicle nodes are placed in 2500 m × 1000 m region. 0.66 W is assigned as transmission power and 0.395 W is assigned as receiving power to all the vehicles in the simulation area. Optimized link state routing algorithm is used in this simulation process. Each vehicle node possesses omni directional antenna and the transmission power is uniform in all the sides. Transmission range of every vehicle node is 250 m. To predict the power of the every received packet, two ray ground radio propagation frame work is used. Table 1 reveals the various parameters used for the simulation and its value.

Table 1 Simulation parameters and its values

4.1 Performance Metrics

Performance of our proposed approach is evaluated using the following metrics. Performance metrics of our proposed approach OLSR-PSOare compared with that of LAPR [12] and OLSR [13].

4.1.1 Delivery Ratio

Delivery ratio indicates number of successful arrival of the packet. It is calculated from the following equation.

$$Delivery\;ratio = \frac{Number\;of\;packets\;received}{{Number\;of\;packets\;transmitted}}$$
(15)

4.1.2 Packet Drop

Packet drop means, total number of packets are dropped or discarded during the transmission. This is occurred because of the unreachable destination, duplicate packet, destination address mismatch etc.,

4.1.3 Packet Delay

Packet delay indicateshow much time takes by the packet to reach the destination. Unit of this parameter is seconds (s).

4.1.4 Throughput

The amount of data packet can be transmitted from the sources node to the destination node within a second is called as throughput. Unit of this parameter is kb/s.

$$Throughput = \frac{Amount\;of\;transmitted\;data\;(kb)}{{Transmitted\;time\;(s)}}$$
(16)

4.1.5 Overhead

Overhead indicates number of additional fields is embedded into the data packet for the transmission of the data packet.

4.1.6 Energy Consumption

During the time of packet transmission, the amount of energy consumed by every vehicle nodes is called as energy consumption. It is the difference between the initial energy and current energy of a vehicle node. Unit of energy consumption is Joule (J).

$$Energy\;consumption = Initial\;energy - current\;energy$$
(17)

4.2 Performance Based on Rates

The performance of the proposed OLSR-PSO model is analyzed with the existing algorithm LAPR and OLSR by varying the rates 100, 200, 300, 400 and 500 kb. The comparison of the performance analysis is diagrammatically shown in the Figs. 7, 8, 9, 10, 11 and 12. Figure 7 reveals the analysis of delivery ratio of the OLSR-PSO model with the existing algorithms for varying rates. By presenting efficient cluster head selection using weight based on trust degree, the cluster members are controlled by forwarding the data packet to the destination without the direction of CH the delivery ratio of OLSR-PSO is raised to 31% and 45% than that of existing LAPR and OLSR.

Fig. 7
figure 7

Rate Vs delivery ratio

Fig. 8
figure 8

Rate Vs drop

Fig. 9
figure 9

Rate Vs delay

Fig. 10
figure 10

Rate Vs throughput

Fig. 11
figure 11

Rate Vs overhead

Fig. 12
figure 12

Rate Vs energy consumption

Figure 8 reveals the comparison of packet drop of OLSR-PSO with the existing work for varying rates. Since the apt route is selected efficiently in OLSR-PSO routing protocol, the number of successful received packets are increased and at the same time the amount of lost packets are declined. From the Fig. 8, it concluded that, compared with the existing LAPR and OLSR, packet drop of OLSR with PSO approach is declined to 4% and 9% respectively. The Fig. 9 represents the comparison of end to end delay of the existing LAPR and OLSR approach with the proposed work varying with rates. Since OLSR-PSO approach, selected the apt node as a CH and immediately revoked the certificates of malicious nodes, the forwarded data packets were reached the destination within the stipulated time. Hence the packet delay of OLSR-PSO protocol is declined to 24% and 28%, when compared with the existing LAPR and OLSR protocols.

Figure 10 reveals the throughput comparison of OLSR-PSO with the LAPR and OLSR work for varying rates. Because of the successful selection of optimal route, the number of data packets transmitted per second is improved and the throughput also increased. When compared with the existing approach, the throughput of the OLSR-PSO protocol is raised to 56% and 84% respectively. Figure 11 shows the overhead comparison of the existing LAPR and OLSR protocols with the proposed OLSR-PSO protocol. Overhead of the proposed OLSR-PSO is declined to 47% and 52% than that of LAPR and OLSR. Figure 12 shows the comparison of energy consumption of OLSR-PSO with the existing work. For the apt selection of cluster head and the successful route selection, the energy consumption is reduced to 48% and 63% respectively, when compared with the existing works.

4.3 Performance Based on Attackers

The proposed approach OLSR-PSO’s performance metrics are evaluated by changing the number of attacker nodes 2, 4, 6, 8, and 10. Figures 13, 14, 15 and 16 demonstrate the performance analysis of OLSR-PSO with the existing work LAPR and OLSR. Figure 13 demonstrates the comparison of end-to-end delay of the OLSR-PSO protocol with the previous work by varying the number of attacker nodes. When compared with the existing works LAPR and OLSR, the proposed OLSR-PSO protocol reduced the delay to 20% and 34% respectively. A comparison of drop and energy consumption of the OLSR-PSO approach with the existing work is ssshown in Figs. 14 and 15 respectively. Packet delay of the OLSR-PSO is declined to 83% and 85% than that of LAPR and OLSR respectively. When compared with the previous approach LAPR and OLSR, the proposed approach energy consumption is declined to 60% and 71%. Figure 16 reveals the delivery ratio comparison of OLSR-PSO with the existing LAPR and OLSR for a varying number of attackers. The delivery ratio of the proposed work OLSR-PSO is increased to 23% and 34% than that of LAPR and OLSR respectively.

Fig. 13
figure 13

Number of attackers Vs delay

Fig. 14
figure 14

Number of attackers Vs drop

Fig. 15
figure 15

Number of attackers Vs energy consumption

Fig. 16
figure 16

Number of attackers Vs delivery ratio

5 Conclusion

In this paper, energy-efficient enhanced OLSR routing protocol using Particle Swarm Optimization with Certificate Revocation Scheme for VANET has been presented. The performance of the OLSR-PSO protocol has been evaluated by using the simulator NS2. In this approach, vehicles or nodes in the zone were grouped as a number of clusters by selecting the cluster head using the weight based on trust degree. This trust degree has been calculated using direct and indirect trust degree values. The node with maximum weight has been selected as a cluster head. Node with less trust value than the threshold value was identified and revoked as attacked nodes using the Certificate Revocation List. Then certificates to those attacked nodes were revoked by a certificate authority. Validation of each node in a cluster has been verified by CA before individual transmission. Then the transmission has been done on the apt path and it has been established by using the OLSR-PSO routing protocol. From the simulation results, it is concluded that the energy efficiency of the network has been improved by using the proposed OLSR-PSO routing approach.