Print ISSN 1751-8628"/>
http://iet.metastore.ingenta.com
1887

Security attacks and solutions for vehicular ad hoc networks

Buy article PDF
$19.95
Buy Knowledge Pack
10 articles for $120.00

Abstract

Vehicular ad hoc networks (VANETs) have attracted a lot of attention over the last few years. They have become a fundamental component of many intelligent transportation systems and VANETs are being used to improve road safety and enable a wide variety of value-added services. Many forms of attacks against VANETs have emerged recently that attempt to compromise the security of such networks. Such security attacks on VANETs may lead to catastrophic results such as the loss of lives or loss of revenue for those value-added services. Therefore making VANETs secure has become a key objective for VANET designers. To develop and deploy secure VANET infrastructures remains a significant challenge. The authors discuss some of the main security threats and attacks that can be exploited in VANETs and present the corresponding security solutions that can be implemented to thwart those attacks.

References

    1. 1)
      • Liu, B., Zhong, Y., Zhang, S.: `Probabilistic isolation of malicious vehicles in pseudonym changing VANETs', Seventh Int. Conf. on Computer and Information Technology (CIT 2007), 2007, p. 967–972.
    2. 2)
      • Suen, T.: `Geographic ad-hoc routing with anonymous properties', 2007, PhD, The Florida State University College of Arts & Sciences.
    3. 3)
      • Vehicle Safety Communications Consortium, Vehicle Safety Communications Project, Task 11: WAVE/DSRC Security Extension, Final Task Report, 2004.
    4. 4)
      • Langley, C., Lucas, R., Fu, H.: `Key management in vehicular ad-hoc networks', IEEE Int. Conf. on Electro/Information Technology (EIT 2008), 2008, p. 223–226.
    5. 5)
      • M. Raya , P. Papadimitratos , I. Aad , D. Jungels , J. Hubaux . Eviction of misbehaving and faulty nodes in vehicular networks. IEEE J. Sel. Areas Commun. , 8 , 1557 - 1568
    6. 6)
      • Xi, Y., Sha, K., Shi, W., Schwiebert, L., Zhang, T.: `Enforcing privacy using symmetric random key-set in vehicular networks', Eighth Int. Symp. on Autonomous Decentralized Systems (ISADS 2007), 2007, p. 344–351.
    7. 7)
      • Berthold, O., Federrath, H., Köhntopp, M.: `Project anonymity and unobservability in the Internet', Tenth Conf. on Computer (CFP 2000), 2000, p. 57–65.
    8. 8)
      • P. Cencioni , R. Di Pietro . A mechanism to enforce privacy in vehicle-to-infrastructure communication. Comput. Commun. , 12 , 2790 - 2802
    9. 9)
      • Tsiounis, Y., Yung, M.: `On the security of ElGamal based encryption', First Int. Workshop on Practice and Theory in Public Key Cryptography (PKC'98), 1998, p. 117–134.
    10. 10)
      • Florian, D., Lars, F., Przemyslaw, M.: `VARS: a vehicle ad hoc network reputation system', Int. Conf. on a World of Wireless, Mobile and Multimedia Networks (WOWMOM 2005), 2005, p. 454–456.
    11. 11)
      • Lo, N., Tsa, H.: `Illusion attack on VANET applications – a message plausibility problem', IEEE Globecom Workshops, 2007, p. 1–8.
    12. 12)
      • G. Yan , S. Olariu , M. Weigle . Providing VANET security through active position detection. Comput. Commun. , 12 , 2883 - 2897
    13. 13)
      • Leinmüller, T., Maihöfer, C., Schoch, E., Kargl, F.: `Improved security in geographic ad hoc routing through autonomous position verification', Third Int. Workshop on Vehicular Ad Hoc Networks (VANET 2006), 2006, p. 57–66.
    14. 14)
      • Burmester, M., Magkos, E., Chrissikopoulos, V.: `Strengthening privacy protection in VANETs', IEEE Int. Conf. on Wireless & Mobile Computing, Networking & Communication (WIMOB 2008), 2008, p. 508–513.
    15. 15)
      • Jakubiak, J., Koucheryav, Y.: `State of the art and research challenges for VANETs', Fifth IEEE Consumer Communications and Networking Conf. (CCNC 2008), 2008, p. 912–916.
    16. 16)
      • Parno, B., Perrig, A.: `Challenges in securing vehicular networks', Fourth Workshop on Hot Topics in Networks (HotNets-IV), 2005.

Related content

content/journals/10.1049/iet-com.2009.0191
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address