Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

Comprehensive survey on security services in vehicular ad-hoc networks

Comprehensive survey on security services in vehicular ad-hoc networks

For access to this article, please select a purchase option:

Buy article PDF
$19.95
(plus tax if applicable)
Buy Knowledge Pack
10 articles for $120.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IET Intelligent Transport Systems — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Vehicular ad-hoc networks (VANETs) are the most hopeful approach to provide safety information and other infotainment applications to both drivers and passengers. VANETs are formed by intelligent vehicles equipped with On Board Units and wireless communication devices. Hence, VANETs become a key component of the intelligent transport system. Even though VANETs are used in enormous number of applications, there are many security challenges and issues that need to be overcome to make VANETs usable in practice. A great deal of study has been done towards it, but security mechanisms in VANETs are not effective. This study provides a summary about the VANET, characteristics and security challenges. This study also provides a summary of some major security attacks on security services such as availability, confidentiality, authentication, integrity and non-repudiation and the corresponding countermeasures to make VANET communications more secure.

References

    1. 1)
      • 21. Hawi, F.A., Yeun, C.Y., Qutayti, M.A.: ‘Security challenges for emerging VANETs’. The Fourth Int. Conf. on Information Tecnology, ICIT 2009, Amman, Jordan, October 2009, pp. 35.
    2. 2)
    3. 3)
      • 66. Misra, S., Bhattarai, K., Xue, G.: ‘BAMBi: blackhole attacks mitigation with multiple base stations in wireless sensor networks’. IEEE Int. Conf. on Communications (ICC), 2011.
    4. 4)
      • 13. Ghosh, M., Varghese, A., Kherani, A.A., et al: ‘Distributed misbehavior detection in VANETs’. IEEE Wireless Communication and Networking Conf., WCNC 2009, Budapest, Hungary, April 2009.
    5. 5)
      • 68. Grover, J., Laxmi, V., et al: ‘A sybil attack detection approach using neighboring vehicles in VANET’. Proc. Fourth Int. Conf. on Security of Information and Networks, 2011.
    6. 6)
      • 42. Lin, X., Lu, R., Liang, X., et al: ‘STAP: A social-tier-assisted packet forwarding protocol for achieving receiver-location privacy preservation in VANETs’. Proc. 30th IEEE INFOCOM, Shanghai, China, 2011, pp. 21472155.
    7. 7)
      • 2. Jiang, D., Delgrossi, L.: ‘IEEE 802.11p: towards an international standard for wireless access in vehicular environments’. Proc. IEEE 68th Vehicular Technology Conf (VTC 2008-Spring), 2008, pp. 20362040.
    8. 8)
      • 51. http://searchsecurity.techtarget.com/definition/masquerade.
    9. 9)
      • 14. ‘Draft guide for Wireless Access in Vehicular Environment (WAVE) Architecture’, http://ieeexplore.ieee.org/servlet/opac?punumber-6320593, 2012, pp. 174, accessed September 2012.
    10. 10)
      • 30. Zaharuddin, M.H.M., Rahman, R.A., Kassim, M.: ‘Technical comparison analysis of encryption algorithm on site-to-site IPSec VPN’. Proc. of Int. Conf. on Computer Applications and Industrial Electronics, ICCAIE 2010, art, no. 5735013, 2010, pp. 641645.
    11. 11)
    12. 12)
    13. 13)
      • 17. ‘DSRC’, http://grouper.ieee.org/groups/scc32/dsrc/.
    14. 14)
      • 23. Minhas, R., Tilal, M.: ‘Effects of jamming on IEEE 802.11 p systems’ (Chalmers University of Technology, 2010).
    15. 15)
    16. 16)
      • 55. Guo, J., Baugh, J.P., Wang, S.: ‘A group signature based secure and privacy-preserving vehicular communication framework’. Proc. of the Mobile Networking for Vehicular Environments (MOVE) Workshop in Conjunction with IEEE INFOCOM, Anchorage, Alaska, May 2007.
    17. 17)
      • 27. Okamoto, J., Ishihara, S.: ‘Distributing location-dependent data in VANETs by guiding data traffic to high vehicle density areas’. IEEE Vehicular Networking Conf., 2010.
    18. 18)
    19. 19)
      • 19. ‘DSRC Implementation Guide’ – a guide to users of SAE J2735 message sets over DSRC. SAE International, 2010.
    20. 20)
      • 49. Gong, Z., Long, Y., Hong, X., et al: ‘Two certificateless aggregate signatures from bilinear maps’. Proc. Eighth ACIS Int. Conf. on Software Engineering, Artificial Intelligence, Networking, and Parallel/ Distributed Computing, SNPD 2007, pp. 188193.
    21. 21)
      • 44. Zhang, C., Lin, X., Lu, R., et al: ‘RAISE: An efficient RSU-aided message authentication scheme in vehicular communication networks’. Proc. IEEE ICC, Beijing, China, May 2008, pp. 14511457.
    22. 22)
      • 37. Rawat, A., Sharma, S., Sushil, R.: ‘VANET: security attacks and its possible solutions’, J. Inf. Oper. Manag., 2012, 3, (1), pp. 301304.
    23. 23)
      • 24. Al-kahtani, M.S.: ‘Survey on security attacks in vehicular ad hoc networks (VANETs)’. Sixth Int. Conf. on Signal Processing and Communication Systems (ICSPCS), 2012, pp. 19.
    24. 24)
    25. 25)
      • 46. Wasef, A., Shen, X.: ‘MAAC: message authentication acceleration protocol for vehicular ad hoc networks’. Proc. IEEE GlobeCom, 2009.
    26. 26)
    27. 27)
    28. 28)
      • 54. Lo, N.-W., Tsai, H.-C.: ‘Illusion attack on VANET applications − a message plausibility problem’. IEEE Globecom Workshops, 2007, 2007.
    29. 29)
    30. 30)
      • 11. Raya, M., Hubaux, J.-P.: ‘Securing vehicular ad hoc networks’, J. Comput. Secrity, Special Issue on Security of Ad Hoc Sensor Netw., 2007, 15, (1), pp. 3968.
    31. 31)
      • 12. Federal Communications Commission: ‘Amendment of the commission's rules regarding dedicated short-range communication service in the 5.850–5.925 ghz band, fcc 02-302’. Tech. Rep., FCC, November2002.
    32. 32)
      • 28. Akila, M., Iswarya, T.: ‘An efficient data replication method for data access applications in VANETs’. Int. Conf. on Electronics, Communication and Computing Technologies (ICECCT), 2011.
    33. 33)
      • 57. Choi, J., Jung, S.: ‘A security framework with strong non-repudiation and privacy in VANETs’. Proc. Sixth IEEE Conf. on Consumer Communications and Networking Conf. Table, Las Vegas, NV, USA, 2009, pp. 835839.
    34. 34)
    35. 35)
      • 26. Kitani, T., Shinkawa, T., Shibata, N., et al: ‘Efficient VANET-based traffic information sharing using buses on regular routes’. Vehicular Technology Conf., VTC Spring, IEEE, 2008.
    36. 36)
      • 22. Kassim, M., Rahman, R.A., Mustapha, R.: ‘Mobile ad hoc network (MANET) routing protocols comparison for wireless sensor network’. Proc. of IEEE Int. Conf. on System Engineering and Technology, ICSET, no. 5993439, 2011, pp. 148152.
    37. 37)
      • 65. Raj, P.N., Swadas, P.B.: ‘DPRAODV: a dyanamic learning system against blackhole attack in aodv based manet’, Int. J. Comput. Sci. Issues (IJCSI), 2009, 7, (4), pp. 5459.
    38. 38)
      • 69. http://www.ipa.go.jp/security/english/virus/antivirus/pdf/Hacking_measures_eng.pdf.
    39. 39)
      • 35. Ameneh, D., Ghaffar, P.R.A.: ‘Detection of malicious vehicles (DMV) through monitoring in vehicular ad-hoc networks’. Accepted for publication in Springer Multimedia Tools and Applications, Special Issue on Secure Multimedia Communications in VANET.
    40. 40)
    41. 41)
      • 52. http://careerride.com/Networking-replay-attacks.aspx.
    42. 42)
      • 53. Parno, B., Perrig, A.: ‘Challenges in securing vehicular networks’. Workshop on Hot Topics in Networks (HotNets-IV), 2005, pp. 16.
    43. 43)
      • 64. Marti, S., Giuli, T.J., Lai, K., et al: ‘Mitigating routing misbehaviour in mobile ad hoc networks’. MobiCom ‘00: Proc. Sixth Annual Int. Conf. on Mobile Computing and Networking, 2000, pp. 255265.
    44. 44)
    45. 45)
    46. 46)
      • 60. RoselinMary, S., Maheshwari, M., Thamaraiselvan, M.: ‘Early detection of DOS attacks in VANET using attacked packet detection algorithm (APDA)’. Int. Conf. on Information Communication and Embedded Systems (ICICES), 2013.
    47. 47)
      • 15. Dedicated short range communications (DSRC) home’, available at http://www.leearmstrong.com/dsrc/dsrchomeset.htm.
    48. 48)
    49. 49)
    50. 50)
      • 62. Malla, A.M., Sahu, R.K.: ‘Security attacks with an effective solution for dos attacks in VANET’, Int. J. Comput. Appl., 2013, 66, (22).
    51. 51)
      • 63. http://www.slideshare.net/naMasood/common-malware-and-countermeasures.
    52. 52)
    53. 53)
    54. 54)
      • 48. Boneh, D., Gentry, C., Lynn, B., et al: ‘Aggregate and verifiably encrypted signatures from bilinear maps’. Proc. Advances in Cryptology, EUROCRYPT, 2003, pp. 416432.
    55. 55)
      • 59. He, L., Zhu, W.T.: ‘Mitigating dos attacks against signature-based authentication in VANETs’. 2012 IEEE Int. Conf. on Computer Science and Automation Engineering (CSAE), 2012, vol. 3, pp. 261265.
    56. 56)
      • 18. Morgan, Y.L.: ‘Notes on DSRC & WAVE standards suite: its architecture, design and characteristics’. Accepted by IEEE Comm. Surveys & Tutorials.
    57. 57)
      • 10. Zhang, C., Lu, R.: ‘An efficient identity based batch verification scheme for vehicular sensor networks’. Proc. 27th IEEE INFOCOM, Phoenix, AZ, USA, 2008, pp. 246250.
    58. 58)
      • 32. Raya, M., Hubaux, J.-P.: ‘Security aspects of inter-vehicle communications’. Proc. Fifth Swiss Transport Research Conf. (STRC), 2005.
    59. 59)
      • 25. Raya, M., Hubaux, J.-P.: ‘DOMINO: a system to detect greedy behavior in IEEE 802.11 hotspots’. Presented at the Second Int. Conf. Mobile Systems, Applications and Services (MobiSys2004), Boston, MA, June 2004.
    60. 60)
      • 72. Vijayakumar, P., Azees, M., Kannan, A., et al: ‘Dual authentication and key management techniques for secure data transmission in vehicular ad-hoc networks’, IEEE Trans. Intell. Transp. Syst., 2015, PP, (99), pp. 14.
    61. 61)
      • 20. Rappaport, T.S.: ‘Wireless communications: principles and practice’ (Pearson Education Inc., Singapore, 2002, 2nd edn.).
    62. 62)
      • 5. Jakubiak, J., Koucheryavy, Y.: ‘State of the art and research challenges for VANETs’. Fifth IEEE Consumer Communications and Networking Conf., 10–12 January 2008, pp. 912916.
    63. 63)
      • 4. Plossl, K., Nowey, T., Mletzko, C.: ‘Towards a security architecture for vehicular ad hoc networks’. Proc. First Int. Conf. Availability, Reliability and Security (ARES ‘06), April 2006.
    64. 64)
      • 67. Park, S., Turgut, D., et al: ‘Defense against sybil attack in vehicular ad hoc network based on roadside unit support’. Military Communications Conf. 2009, MILCOM 2009, 2009.
    65. 65)
      • 38. Wen, H., Dyer, J., et al: ‘Countermeasures for GPS signal spoofing’ (University of Oklahoma, 2011).
    66. 66)
      • 29. Park, S., Lee, S.K.: ‘Improving data accessibility in vehicle ad hoc network’, Int. J. Smart Home, 2012, 6, (4), pp. 169176.
    67. 67)
    68. 68)
      • 6. Dhamgaye, A., Chavhan, N.: ‘Survey on security challenges in VANET’, Int. J. Comput. Sci., 2013, 2, pp. 8896.
    69. 69)
      • 71. Xiao, B., Yu, B., Gao, C.: ‘Detection and localization of Sybil nodes in VANETs’. DIWANS ‘06, pp. 18.
    70. 70)
    71. 71)
      • 41. Lu, R., Lin, X., Ho, P.H., et al: ‘ECPP: efficient conditional privacy preservation protocol for secure vehicular communications’. Proc. IEEE INFOCOM, April 2008, pp. 12291237.
    72. 72)
      • 36. Douceur, J.R.: ‘The sybil attack, in: peer-to-peer systems’ (Springer, 2002), pp. 251260.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-its.2015.0072
Loading

Related content

content/journals/10.1049/iet-its.2015.0072
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address