DOI QR코드

DOI QR Code

SECURITY FRAMEWORK FOR VANET: SURVEY AND EVALUATION

  • Felemban, Emad (Umm Al-Qura University) ;
  • Albogamind, Salem M. (Umm Al-Qura University) ;
  • Naseer, Atif (Umm Al-Qura University) ;
  • Sinky, Hassan H. (Umm Al-Qura University)
  • Received : 2021.08.05
  • Published : 2021.08.30

Abstract

In the last few years, the massive development in wireless networks, high internet speeds and improvement in car manufacturing has shifted research focus to Vehicular Ad-HOC Networks (VANETs). Consequently, many related frameworks are explored, and it is found that security is the primary issue for VANETs. Despite that, a small number of research studies have taken into consideration the identification of performance standards and parameters. In this paper, VANET security frameworks are explored, studied and analysed which resulted in the identification of a list of performance evaluation parameters. These parameters are defined and categorized based on the nature of parameter (security or general context). These parameters are identified to be used by future researchers to evaluate their proposed VANET security frameworks. The implementation paradigms of security frameworks are also identified, which revealed that almost all research studies used simulation for implementation and testing. The simulators used in the simulation processes are also analysed. The results of this study showed that most of the surveyed studies used NS-2 simulator with a percentage of 54.4%. The type of scenario (urban, highway, rural) is also evaluated and it is found that 50% studies used highway urban scenario in simulation.

Keywords

Acknowledgement

This work was supported by the Deputyship for Research and Innovation, Ministry of Education, Saudi Arabia, under Grant UQU-IF-P2-20-001.

References

  1. Avleen Kaur Malhi, and Shalini Batra, (2016) "Genetic-based framework for prevention of masquerade and DDoS attacks in vehicular ad-hoc net-works," Journal of Security and Communication Networks, vol. 9, no. 15, pp.2612-2626. https://doi.org/10.1002/sec.1506
  2. B. K. Pattanayak, (2019) "Design and Development of Secured Framework for Efficient Routing in Vehicular Ad-Hoc Network" International Journal of Business Data Communications and Networking, Vol.15, pp. 55-72. https://doi.org/10.4018/IJBDCN.2019070104
  3. Malhi, A., Batra, S. (2016). Privacy-preserving authentication framework using bloom filter for secure vehicular communications. International Journal of Information Security, 15(4), 433-453. https://doi.org/10.1007/s10207-015-0299-4
  4. Song J., He C., Yang F., Zhang H., (2016) "A privacy-preserving distance-based incentive scheme in opportunistic VANETs Security and Communication Networks" vol.9, pp- 2789-2801. https://doi.org/10.1002/sec.1211
  5. Bharati S; Sindhankeri, Shraddha K. (2017), "A Multi Constrained Qos Routing Algorithm for Vehicular Adhoc Networks". International Journal of Advanced Research in Computer Science, [S.l.], v. 8, n. 7, p. 736-740.
  6. Tahani Gazdar, Abdelfettah Belghith, Ahmad AlMogren, (2017) "DTCF: A distributed trust computing framework for vehicular ad hoc networks", KSII Transactions on Internet and Information Systems (TIIS).
  7. Gopikrishnan, S., Krishnaraj, C., and Kokilavani. K, (2018) "HAAC: Reinforcing VANET Security Using Ant Colony Optimization through Heuristic Approach", in International Journal of Vehicle Structures Systems, vol. 10, no. 1, pp. 345-351 (Impact factor: 0.25).
  8. J. Jenefa, E. A. Mary Anita, (2018) "Secure Vehicular Communication Using ID Based Signature Scheme". Wireless Personal Communications 98(1): 1383-1411. https://doi.org/10.1007/s11277-017-4923-7
  9. R. Pradweap , R. Hansdah, (2013) " A Novel RSU-Aided Hybrid Architecture for Anonymous Authentication (RAHAA) in VANET" , International Conference on Information Systems Security, ICISS 2013, LNCS 8303, pp. 314-328.
  10. I. Bhattacharya, S.Ghosh and D. Show, (2014) "An Efficient and Secured Routing Protocol for VANET" Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA), vol. 2, pp. 775-783.
  11. Y. Wang, J. Hu, X. Li and Z. Feng (2019) "An Efficient Mutual Authentication Framework with Conditional Privacy Protection in VANET" Collaborative Computing: Networking, Applications and worksharing, pp. 799-815.
  12. M. Kadam, S. Limkar (2013) "Detection and Mitigation of Misbehaving Vehicle from VANET" ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of CSI, Vol. 1, pp. 267-276.
  13. G. Kumaresan, T. Adiline Macriga (2016) "Group Key Authentication scheme for Vanet intrusion detection (GKAVIN)" Wireless Networks, vol. 23, pp. 935-945. https://doi.org/10.1007/s11276-016-1197-z
  14. M. Selvi, B. Ramakrishnan, (2019) "Lion optimization algorithm (LOA) based reliable emergency message broadcasting system in VANET" Soft Computing, pp. 1-18.
  15. M. Kaur, R. Rajni, and P. Singh (2012) " Performance Evaluation of V2VCommunication by Implementing Security Algorithm in VANET" Advances in Computing and Information Technology, vol. 176 , pp.757-763. https://doi.org/10.1007/978-3-642-31513-8_77
  16. G. B. Santhi, D. Sheela (2020) " Reliability refinement in VANET with hybrid jamming attacks using novel index based voting algorithm" Peer-to-Peer Networking and Applications, vol.13.
  17. M. Rath, B. K. Pattanayak (2017) "SCICS: A Soft Computing Based Intelligent Communication System in VANET" Communications in Computer and Information Science, vol,808, pp. 255-261.
  18. P. Manickam, K. Shankar, E. Perumal, M. Ilayaraja and K. S. Kumar (2019) "Secure Data Transmission Through Reliable Vehicles in VANET Using Optimal Lightweight Cryptography" Cybersecurity and Secure Information Systems, pp. 193-204.
  19. D. Chuan (2012) "Towards a Trusted Vehicular Routing in VANET" Information Technology Convergence, Secure and Trust Computing, and Data Management, vol. 180, pp 103-117. https://doi.org/10.1007/978-94-007-5083-8_15
  20. R. Hussain, S. Kim and H. Oh (2016) "Traffic Information Dissemination System: Extending Cooperative Awareness Among Smart Vehicles with only Single-Hop Beacons in VANET" Wireless Personal Communications , vol. 88, pp. 151-172. https://doi.org/10.1007/s11277-015-3084-9
  21. R. Sugumar, A. Rengarajan and C. Jayakumar (2018) "Trust based authentication technique for cluster based vehicular ad hoc networks (VANET)" Wireless Networks, vol. 24, pp. 373-382. https://doi.org/10.1007/s11276-016-1336-6
  22. S. DasGupta, R. Chaki, and S. Choudhury (2013) "TruVAL: Trusted Vehicle Authentication Logic for VANET" Advances in Computing, Communication, and Control, vol. 361, pp. 309-322. https://doi.org/10.1007/978-3-642-36321-4_29
  23. H. Hu, R. Lu and Z. Zhang (2016) "VTrust: A Robust Trust Framework for Relay Selection in Hybrid Vehicular Communications" 2015 IEEE Global Communications Conference (GLOBECOM).
  24. Haerri, F. Filali, and C. Bonnet. (2006) "Performance comparison of AODV and OLSR in VANETs urban environments under realistic mobility patterns." Proceedings of the 5th IFIP mediterranean ad-hoc networking workshop.
  25. Khairnar, D. Pradhan, N. (2013) "Simulation Based Evaluation of Highway Road Scenario between DSRC/802.11p MAC Protocol and STDMA for Vehicle-to-Vehicle Communication" . Journal of Transportation Technologies, 3, 88-104 https://doi.org/10.4236/jtts.2013.31009
  26. Azees, M., Vijayakumar, P., Deborah, L,J. (2016) "Comprehensive survey on security services in vehiclear ad-hoc network". Intell. Transp. Syst. 10(6), 12.
  27. Al-Sultan, S., Al-Doori, M.M., Al-Bayatti, A.H. and Zedan, H. (2014) "A Comprehensive Survey on Vehicular Ad Hoc Network". Journal of Network and Computer Applications, 37, 380-392. https://doi.org/10.1016/j.jnca.2013.02.036
  28. Cheng X., Chen C., Zhang W., Yang Y. (2017) "5G-Enabled Cooperative Intelligent Vehicular (5GenCIV) Framework" IEEE Intell. Syst. ;32:53-59. doi: 10.1109/MIS.2017.53.
  29. Hasrouny H., Abed Ellatif S., Bassil C., Laouiti, A. (2017). "VANET Security Challenges and Solutions: A Survey" Vehicular Communications 7:7-20 https://doi.org/10.1016/j.vehcom.2017.01.002
  30. S. S. Kaushik, (2013) "Review of different aproaches for privacy" International Journal of Advanced Engineering and Technology, vol. 5, no. 2, pp. 356-363.
  31. M. Gonzalez-Martin, M. Sepulcre, R. Molina-Masegosa, and J. Gozalvez, (2019) "Analytical models of the performance of C-V2X mode 4 vehicular communications," IEEE Transactions on Vehicular Technology, vol. 68, no. 2, pp. 1155-1166. https://doi.org/10.1109/tvt.2018.2888704
  32. Molina-Masegosa R., Gozalvez, J. (2017). "TE-V for Sidelink 5G V2X Vehicular Communications: A New 5G Technology for Short-Range Vehicle-to-Everything Communications", IEEE Vehicular Technology Magazine 12(4):30-39 https://doi.org/10.1109/MVT.2017.2752798
  33. S. Chen, J. Hu, Y. Shi, and L. Zhao, (2016) "LTE-V: a TD-LTE-based V2X solution for future vehicular network," IEEE Internet of Things Journal, vol. 3, no. 6, pp. 997-1005. https://doi.org/10.1109/JIOT.2016.2611605
  34. J. M. de Fuentes, A. I. Gonzalez-Tablas, and A. Ribagorda, (2010) "Overview of Security Issues in Vehicular Ad Hoc Networks", Hershey, Derry Township, PA, USA.
  35. Jakubiak J., Koucheryavy Y. (2008) "State of the Art and Research Challenges for VANETs", 5th IEEE Consumer Communications and Networking Conference.
  36. A. Dhamgaye and N. Chavhan, (2013) "Survey on security challenges in VANET," International Journal of Computer Science, vol. 2, pp. 88-96.
  37. Y. L. Morgan, (2010) "Notes on DSRC WAVE standards suite: its architecture, design, and characteristics," IEEE Communications Surveys Tutorials, vol. 12, no. 4, pp. 504-518. https://doi.org/10.1109/SURV.2010.033010.00024
  38. Yousefi S., Mousavi M., Fathy M., (2006) "Vehicular ad hoc networks (VANETs): challenges and perspectives", 6th International Conference on ITS Telecommunications, pp 761-766.
  39. Z. Lu, G. Qu, and Z. Liu, (2019) "A survey on recent advances in vehicular network security, trust, and privacy," IEEE Transactions on Intelligent Transportation Systems, vol. 20, no. 2, pp. 760-776. https://doi.org/10.1109/tits.2018.2818888
  40. Muhammad Sameer Sheikh, Jun Liang, (2019) "A Comprehensive Survey on VANET Security Services in Traffic Management System", Wireless Communications and Mobile Computing, Article ID 2423915, 23 pages.
  41. Muhammad Sameer Sheikh, Jun Liang, W. Wang, (2020)" Security and Privacy in Vehicular Ad Hoc Network and Vehicle Cloud Computing: A Survey", Wireless Communications and Mobile Computing, vol. 2020, Article ID 5129620, 25 pages.
  42. Sheikh, Liang, Wang,. (2019). A Survey of Security Services, Attacks, and Applications for Vehicular Ad Hoc Networks (VANETs). Sensors. 19. 3589. 10.3390/s19163589.
  43. Y. R. B. Al-Mayouf, M. Ismail, N. F. Abdullah, S. M. Al-Qaraawi and O. A. Mahdi (2016). "Survey On Vanet Technologies And Simulation Models" , ARPN Journal of Engineering and Applied Sciences, VOL. 11, NO. 15
  44. M. A. Elsadig, Y. A. Fadlalla (2016) . "VANETs security issues and challenges: A survey", Indian Journal of Science and Technology, Vol (9).
  45. A. khan, M. Ishtiaq, S. Anwar and M. A. Shah (2019). "A Survey on secure routing strategies in VANETs", 2019 25th International Conference on Automation and Computing (ICAC)
  46. Sajjad Akbar Mohammad, Asim Rasheed, Amir Qayyum (2011) "VANET architectures and protocol stacks: a survey" International Workshop on Communication Technologies for Vehicles, Page 95-105.
  47. Abir Mchergui, Tarek Moulahi, Bechir Alaya, Salem Nasri (2017) . "A survey and comparative study of QoS aware broadcasting techniques in VANET", Telecommunication Systems, Vol (66), Pages 253-281. https://doi.org/10.1007/s11235-017-0280-9
  48. C. Chen, Y. Chen, C. Lee and Y. Deng (2018). "A Survey of Authentication Protocols in VANET Advances on Broadband and Wireless Computing, Communication and Applications (pp.572-577)
  49. MA Razzaque, Ahmad Salehi, Seyed M Cheraghi (2013). "Security and Privacy in Vehicular Ad-Hoc Networks: Survey and the Road Ahead", Wireless Networks and Security, SCT, pp. 107-132.
  50. Irshad Ahmed Sumra, Halabi Bin Hasbullah, Jamalul-lail Bin AbManan (2015). "Attacks on security goals (confidentiality, integrity, availability) in VANET: a survey", Vehicular Ad-Hoc Networks for Smart Cities, page 51-61.
  51. V. Vijayalakshmi ; M. Sathya ; S Saranya ; C. Selvaroopini (2015). "Survey on various mechanisms for secure and efficient VANET communication", International Conference on Information Communication and Embedded Systems.
  52. Aakash Luckshetty, Sindhu Dontal, Shrikant Tangade, Sunilkumar S Manvi (2016). "A survey: comparative study of applications, attacks, security and privacy in VANETs" International Conference on Communication and Signal Processing, April 6-8.
  53. N. S. Patel, S. Singh. (2016) "A Survey on Techniques for Collision Prevention in VANET", International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)
  54. Fengzhong Qu ; Zhihui Wu ; Fei-Yue Wang ; Woong Cho (2015). "A Security and Privacy Review of VANETs", IEEE Transactions o Intelligent Transportation Systems (Volume): 16 , Issue: 6.
  55. M. Kim, (2018)" A Survey of Vehicular Ad-Hoc Network Security", Mobile and Wireless Technologies 2017, Volume 425.
  56. online:https://internetofthingsagenda.techtarget.com/definition/Cellular-Vehicle-to-Everything-C-V2X