Browse > Article
http://dx.doi.org/10.33851/JMIS.2020.7.1.45

Security Attacks and Challenges of VANETs : A Literature Survey  

Quyoom, Abdul (University of Jammu)
Mir, Aftab Ahmad (Shri Venkateshwara University)
Sarwar, Abid (University of Jammu)
Publication Information
Journal of Multimedia Information System / v.7, no.1, 2020 , pp. 45-54 More about this Journal
Abstract
This paper presented a brief introduction along with various wireless standards which provide an interactive way of interaction among the vehicles and provides effective communication in VANET. Security issues such as confidentiality, authenticity, integrity, availability and non-repudiation, which aims to secure communication between vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I). A detailed discussion and analysis of various possible attacks based on security services are also presented that address security and privacy concern in VANETs. Finally a general analysis of possible challenges is mentioned. This paper can serve as a source and reference in building the new technique for VANETs.
Keywords
Security Attacks; Security Services; VANET;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Javed Muhammad Noman et al., "VANET's Security Concerns and Solutions: A Systematic Literature Review," in Proceedings of the 3-rd International Conference on Future Networks and Distributed Systems (ICFNDS) ACM, pp. 1-12, July 1-2, 2019.
2 Abdul Quyoom, "Security Issues of Vehicular Ad Hoc Networks in OSI layers," International Journal of Scientific Research in Computer Science, Engineering and Information Technology, ISSN: 2456-3307, vol. 2, no. 4, 2017.
3 Abu Talib, Manar, et al., "Systematic literature review on Internet-of-Vehicles communication security," International Journal of Distributed Sensor Networks, ISSN: 1550147718815054, vol. 14, no. 12, 2018.
4 Abdul Quyoom, MohdSaleem, MudasserNazar, Yusera Farooq Khan, "VANETs Applications, Challenges and Possible Attacks: A Survey, "International Journal of Advanced Research in Computer and Communication Engineering, ISO 3297:2007 Certified Vol. 6, Issue 7, July 2017.
5 J. Cui, L. Wei, J. Zhang, Y. Xu, and H. Zhong, "An efficient message-authentication scheme based on edge computing for vehicular ad hoc networks," IEEE Transactions on Intelligent Transportation Systems, vol. 20, no. 5, pp. 1621-1632, 2019.   DOI
6 Saif Al-Sultan, Moath M. Al-Doori, Ali H. Al-Bayatti, and HussienZedan, "A comprehensive survey on vehicular ad hoc network," Journal of Network and Computer Applications, vol.37, no. 1, pp. 380-392, 2014.   DOI
7 Z. Lu, G. Qu, and Z. Liu, "A survey on recent advances in vehicular network security, trust, and privacy, "IEEE Transactions on Intelligent Transportation Systems, vol. 20, no. 2, pp. 760-776, 2019.   DOI
8 Abdul Quyoom, Raja Ali and Devki Nandan Gouttam, "A Novel Mechanism of Detection of Denial of Service Attack (DoS) in VANET using Malicious and Irrelevant Packet Detection Algorithm (MIPDA)," in Proceedings of the IEEE International Conference on Computing, Communication and Automation (ICCCA2015), pp. 414-419, 2015.
9 Karimireddy, T. and Bakshi, A., "A Hybrid Security Framework for the Vehicular Communications in VANET," in Proceedings of the International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), pp. 1929-1934, 2016.
10 Jafer, Muhammad, et al., "Secure Communication in VANET Broadcasting," ICST Transaction on Security Safety, vol.5, no.17, 2019.
11 J. Cui, L. Wei, J. Zhang, Y. Xu, and H. Zhong, "An efficient message authentication scheme based on edge computing for vehicular ad hoc networks," IEEE Transactions on Intelligent Transportation Systems, vol. 20, no. 5,p p. 1621-1632, 2019.   DOI
12 A. Festag. "Cooperative intelligent transport systems standards in Europe," Communications Magazine, IEEE, vol. 52, no.12, pp. 166-172, Dec. 2014.   DOI
13 Mishra R., Singh A. and Kumar R., "VANET Security: Issues, Challenges and Solutions," in Proceedings of International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), pp. 1050-1055, 2016.
14 Md Whaiduz-zaman, Mehdi Sookhak, Abdullah Gani, and Rajkumar Buyya, "A survey on vehicular cloud computing," Journal of Network and Computer Applications, vol. 40, pp. 325-344, 2014.   DOI
15 Sumra, Irshad Ahmed, Iftikhar Ahmad, HalabiHasbullah, and J-L. bin Ab Manan, "Classes of Attacks in VANET," in Proceedings of Saudi International Electronics, Communications and Photonics Conference (SIECPC), pp. 1-5, 2011.
16 Hussain Rasheed, Fatima Hussain, and Sherali Zeadally, "Integration of VANET and 5G Security: A review of design and implementation issues," Journal of Future Generation Computer Systems, pp. 843-864, 2019.
17 Kumar Mr Kamal, and Rahul Malhotra, "Analysis of Sybil Attack Isolation Technique in VANET," International Journal of Computer Science and Mobile Computing (IJCSMC), vol. 8, no. 5, pp.187-192, May 2019.
18 Safi, Q.G.K., Luo, S., Wei, C., Pan, L. and Yan, G., "Cloud-based security and privacy-aware information dissemination over ubiquitous VANETs," Computer Standards and Interfaces, vol.56, pp. 107-115, 2018.   DOI
19 Singh Avinash et al., "Implementing Security Services in VANET Using Cryptography Based on Artificial Neural Network," Journal of Computer and Mathematical Sciences, vol. 10, no. 9, pp. 1573-1584, 2019.
20 Karagiannis D. and Argyriou A., "Jamming attack detection in a pair of RF communicating vehicles using unsupervised machine learning," Vehicular Communications, vol.13, pp. 56-63, 2018.   DOI
21 J. Liu, Y. Yu, Y. Zhao et al., "An efficient privacy preserving batch authentication scheme with deterable function for VANETs," in Proceedings of the International Conference on Network and System Security, pp. 288-303, 2018.
22 Usha M., Ramakrishnan B, "An enhanced MPR-OLSR protocol for efficient node selection process in cognitive radio based VANET," Wireless pers. Commun. vol.106, no.2, pp. 763-787, 2019.   DOI
23 Usha M., Ramakrishnan B, "A robust architecture of the OLSR protocol for channel utilization and optimized transmission using minimal multi point relay selection in VANET," Wireless Pers. Commun. Now, pp. 1-25, 2019.
24 K. Bylykbashi, D. Elmazi, K. Matsuo, M. Ikeda, and L. Barolli, "Effect of security and trustworthiness for a fuzzy cluster management system in VANETs," Cognitive Systems Research, vol. 55, pp. 153-163, 2019.   DOI
25 A. Singh, R. Mishra and R. Kumar, "VANET security: Issues, challenges and solutions," International Conference on Electrical, Electronics, and Optimization Techniques, pp. 1050-1055, 2016.
26 A. Ribagorda, J. M. de Fuentes and A. I. Gonzalez-Tablas "Overview of security issues in vehicular ad-hoc networks," Handbook of Research on Mobility and Computing, IGI Global, 2010.
27 A. A. Wagan, Bittl, S., Gonzalez, A. A., Myrtus, M., Beckmann, H., Sailer, S. and Eissfeller, B., "Emerging attacks on VANET security based on GPS Time Spoofing," in Proceedings of the IEEE Conference on Communications and Network Security, pp. 344-352, 2015.
28 Horng S., Tzeng S., Li T., Wang X., and Huang P., Khan M., "Enhancing Security and Privacy for Identity-based Batch Verification Scheme in VANET," IEEE Transactions on Vehicular Technology, vol. 66, no. 4 (2015): 3235-3248.   DOI
29 A. S. AI Hasan, Md. Shohrab Hossain, and Mohammed Atiq-uz-zaman, "Security threats in vehicular ad hoc networks," in Proceedings of the Conference on Advances in Computing, Communications and Informatic, pp. 21-24, Sept. 2016.
30 Chen, L., Tang, H., and Wang, J., "Analysis of VANET security based on routing protocol information," in Proceedings of the Fourth International Conference on Intelligent Control and Information Processing, pp. 134-138, Jun. 2013.
31 G. Samara, Al-Salihy, W. A., and Sures, R, "Security analysis of vehicular ad hoc networks (VANET),"in Proceedings of the Second International Conference on Network Applications Protocols and Services, pp. 55-60, Sep. 2010.
32 Sung-Ki Kim, Byung-Gyu Kim, Byoung-Joon Min, "Reducing Security Overhead to Enhance Service Delivery in Jini IoT," International Journal of Distributed Sensor Networks, vol. 2015, Article ID. 205793, pp. 1-7, 2015.
33 R. S. Raw, Kumar, M. and Singh, N., "Security challenges, issues and their solutions for VANET," International Journal of Network Security & Its Applications, vol. 5, no. 95, Sep. 2013.