SECURITY FRAMEWORK FOR VANET: SURVEY AND EVALUATION |
Felemban, Emad
(Umm Al-Qura University)
Albogamind, Salem M. (Umm Al-Qura University) Naseer, Atif (Umm Al-Qura University) Sinky, Hassan H. (Umm Al-Qura University) |
1 | online:https://internetofthingsagenda.techtarget.com/definition/Cellular-Vehicle-to-Everything-C-V2X |
2 | M. Kadam, S. Limkar (2013) "Detection and Mitigation of Misbehaving Vehicle from VANET" ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of CSI, Vol. 1, pp. 267-276. |
3 | G. B. Santhi, D. Sheela (2020) " Reliability refinement in VANET with hybrid jamming attacks using novel index based voting algorithm" Peer-to-Peer Networking and Applications, vol.13. |
4 | Khairnar, D. Pradhan, N. (2013) "Simulation Based Evaluation of Highway Road Scenario between DSRC/802.11p MAC Protocol and STDMA for Vehicle-to-Vehicle Communication" . Journal of Transportation Technologies, 3, 88-104 DOI |
5 | Azees, M., Vijayakumar, P., Deborah, L,J. (2016) "Comprehensive survey on security services in vehiclear ad-hoc network". Intell. Transp. Syst. 10(6), 12. |
6 | Cheng X., Chen C., Zhang W., Yang Y. (2017) "5G-Enabled Cooperative Intelligent Vehicular (5GenCIV) Framework" IEEE Intell. Syst. ;32:53-59. doi: 10.1109/MIS.2017.53. DOI |
7 | Y. L. Morgan, (2010) "Notes on DSRC WAVE standards suite: its architecture, design, and characteristics," IEEE Communications Surveys Tutorials, vol. 12, no. 4, pp. 504-518. DOI |
8 | M. Gonzalez-Martin, M. Sepulcre, R. Molina-Masegosa, and J. Gozalvez, (2019) "Analytical models of the performance of C-V2X mode 4 vehicular communications," IEEE Transactions on Vehicular Technology, vol. 68, no. 2, pp. 1155-1166. DOI |
9 | J. M. de Fuentes, A. I. Gonzalez-Tablas, and A. Ribagorda, (2010) "Overview of Security Issues in Vehicular Ad Hoc Networks", Hershey, Derry Township, PA, USA. |
10 | Jakubiak J., Koucheryavy Y. (2008) "State of the Art and Research Challenges for VANETs", 5th IEEE Consumer Communications and Networking Conference. |
11 | Muhammad Sameer Sheikh, Jun Liang, W. Wang, (2020)" Security and Privacy in Vehicular Ad Hoc Network and Vehicle Cloud Computing: A Survey", Wireless Communications and Mobile Computing, vol. 2020, Article ID 5129620, 25 pages. |
12 | Sheikh, Liang, Wang,. (2019). A Survey of Security Services, Attacks, and Applications for Vehicular Ad Hoc Networks (VANETs). Sensors. 19. 3589. 10.3390/s19163589. DOI |
13 | Avleen Kaur Malhi, and Shalini Batra, (2016) "Genetic-based framework for prevention of masquerade and DDoS attacks in vehicular ad-hoc net-works," Journal of Security and Communication Networks, vol. 9, no. 15, pp.2612-2626. DOI |
14 | B. K. Pattanayak, (2019) "Design and Development of Secured Framework for Efficient Routing in Vehicular Ad-Hoc Network" International Journal of Business Data Communications and Networking, Vol.15, pp. 55-72. DOI |
15 | Yousefi S., Mousavi M., Fathy M., (2006) "Vehicular ad hoc networks (VANETs): challenges and perspectives", 6th International Conference on ITS Telecommunications, pp 761-766. |
16 | Muhammad Sameer Sheikh, Jun Liang, (2019) "A Comprehensive Survey on VANET Security Services in Traffic Management System", Wireless Communications and Mobile Computing, Article ID 2423915, 23 pages. |
17 | Hasrouny H., Abed Ellatif S., Bassil C., Laouiti, A. (2017). "VANET Security Challenges and Solutions: A Survey" Vehicular Communications 7:7-20 DOI |
18 | Bharati S; Sindhankeri, Shraddha K. (2017), "A Multi Constrained Qos Routing Algorithm for Vehicular Adhoc Networks". International Journal of Advanced Research in Computer Science, [S.l.], v. 8, n. 7, p. 736-740. |
19 | Malhi, A., Batra, S. (2016). Privacy-preserving authentication framework using bloom filter for secure vehicular communications. International Journal of Information Security, 15(4), 433-453. DOI |
20 | Song J., He C., Yang F., Zhang H., (2016) "A privacy-preserving distance-based incentive scheme in opportunistic VANETs Security and Communication Networks" vol.9, pp- 2789-2801. DOI |
21 | Gopikrishnan, S., Krishnaraj, C., and Kokilavani. K, (2018) "HAAC: Reinforcing VANET Security Using Ant Colony Optimization through Heuristic Approach", in International Journal of Vehicle Structures Systems, vol. 10, no. 1, pp. 345-351 (Impact factor: 0.25). |
22 | I. Bhattacharya, S.Ghosh and D. Show, (2014) "An Efficient and Secured Routing Protocol for VANET" Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA), vol. 2, pp. 775-783. |
23 | M. A. Elsadig, Y. A. Fadlalla (2016) . "VANETs security issues and challenges: A survey", Indian Journal of Science and Technology, Vol (9). |
24 | Sajjad Akbar Mohammad, Asim Rasheed, Amir Qayyum (2011) "VANET architectures and protocol stacks: a survey" International Workshop on Communication Technologies for Vehicles, Page 95-105. |
25 | Y. R. B. Al-Mayouf, M. Ismail, N. F. Abdullah, S. M. Al-Qaraawi and O. A. Mahdi (2016). "Survey On Vanet Technologies And Simulation Models" , ARPN Journal of Engineering and Applied Sciences, VOL. 11, NO. 15 |
26 | J. Jenefa, E. A. Mary Anita, (2018) "Secure Vehicular Communication Using ID Based Signature Scheme". Wireless Personal Communications 98(1): 1383-1411. DOI |
27 | R. Pradweap , R. Hansdah, (2013) " A Novel RSU-Aided Hybrid Architecture for Anonymous Authentication (RAHAA) in VANET" , International Conference on Information Systems Security, ICISS 2013, LNCS 8303, pp. 314-328. |
28 | Y. Wang, J. Hu, X. Li and Z. Feng (2019) "An Efficient Mutual Authentication Framework with Conditional Privacy Protection in VANET" Collaborative Computing: Networking, Applications and worksharing, pp. 799-815. |
29 | G. Kumaresan, T. Adiline Macriga (2016) "Group Key Authentication scheme for Vanet intrusion detection (GKAVIN)" Wireless Networks, vol. 23, pp. 935-945. DOI |
30 | A. khan, M. Ishtiaq, S. Anwar and M. A. Shah (2019). "A Survey on secure routing strategies in VANETs", 2019 25th International Conference on Automation and Computing (ICAC) |
31 | M. Rath, B. K. Pattanayak (2017) "SCICS: A Soft Computing Based Intelligent Communication System in VANET" Communications in Computer and Information Science, vol,808, pp. 255-261. |
32 | Molina-Masegosa R., Gozalvez, J. (2017). "TE-V for Sidelink 5G V2X Vehicular Communications: A New 5G Technology for Short-Range Vehicle-to-Everything Communications", IEEE Vehicular Technology Magazine 12(4):30-39 DOI |
33 | R. Hussain, S. Kim and H. Oh (2016) "Traffic Information Dissemination System: Extending Cooperative Awareness Among Smart Vehicles with only Single-Hop Beacons in VANET" Wireless Personal Communications , vol. 88, pp. 151-172. DOI |
34 | C. Chen, Y. Chen, C. Lee and Y. Deng (2018). "A Survey of Authentication Protocols in VANET Advances on Broadband and Wireless Computing, Communication and Applications (pp.572-577) |
35 | V. Vijayalakshmi ; M. Sathya ; S Saranya ; C. Selvaroopini (2015). "Survey on various mechanisms for secure and efficient VANET communication", International Conference on Information Communication and Embedded Systems. |
36 | Fengzhong Qu ; Zhihui Wu ; Fei-Yue Wang ; Woong Cho (2015). "A Security and Privacy Review of VANETs", IEEE Transactions o Intelligent Transportation Systems (Volume): 16 , Issue: 6. |
37 | Tahani Gazdar, Abdelfettah Belghith, Ahmad AlMogren, (2017) "DTCF: A distributed trust computing framework for vehicular ad hoc networks", KSII Transactions on Internet and Information Systems (TIIS). |
38 | M. Selvi, B. Ramakrishnan, (2019) "Lion optimization algorithm (LOA) based reliable emergency message broadcasting system in VANET" Soft Computing, pp. 1-18. |
39 | Al-Sultan, S., Al-Doori, M.M., Al-Bayatti, A.H. and Zedan, H. (2014) "A Comprehensive Survey on Vehicular Ad Hoc Network". Journal of Network and Computer Applications, 37, 380-392. DOI |
40 | M. Kaur, R. Rajni, and P. Singh (2012) " Performance Evaluation of V2VCommunication by Implementing Security Algorithm in VANET" Advances in Computing and Information Technology, vol. 176 , pp.757-763. DOI |
41 | P. Manickam, K. Shankar, E. Perumal, M. Ilayaraja and K. S. Kumar (2019) "Secure Data Transmission Through Reliable Vehicles in VANET Using Optimal Lightweight Cryptography" Cybersecurity and Secure Information Systems, pp. 193-204. |
42 | D. Chuan (2012) "Towards a Trusted Vehicular Routing in VANET" Information Technology Convergence, Secure and Trust Computing, and Data Management, vol. 180, pp 103-117. DOI |
43 | Haerri, F. Filali, and C. Bonnet. (2006) "Performance comparison of AODV and OLSR in VANETs urban environments under realistic mobility patterns." Proceedings of the 5th IFIP mediterranean ad-hoc networking workshop. |
44 | MA Razzaque, Ahmad Salehi, Seyed M Cheraghi (2013). "Security and Privacy in Vehicular Ad-Hoc Networks: Survey and the Road Ahead", Wireless Networks and Security, SCT, pp. 107-132. |
45 | R. Sugumar, A. Rengarajan and C. Jayakumar (2018) "Trust based authentication technique for cluster based vehicular ad hoc networks (VANET)" Wireless Networks, vol. 24, pp. 373-382. DOI |
46 | S. DasGupta, R. Chaki, and S. Choudhury (2013) "TruVAL: Trusted Vehicle Authentication Logic for VANET" Advances in Computing, Communication, and Control, vol. 361, pp. 309-322. DOI |
47 | Aakash Luckshetty, Sindhu Dontal, Shrikant Tangade, Sunilkumar S Manvi (2016). "A survey: comparative study of applications, attacks, security and privacy in VANETs" International Conference on Communication and Signal Processing, April 6-8. |
48 | N. S. Patel, S. Singh. (2016) "A Survey on Techniques for Collision Prevention in VANET", International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET) |
49 | M. Kim, (2018)" A Survey of Vehicular Ad-Hoc Network Security", Mobile and Wireless Technologies 2017, Volume 425. |
50 | H. Hu, R. Lu and Z. Zhang (2016) "VTrust: A Robust Trust Framework for Relay Selection in Hybrid Vehicular Communications" 2015 IEEE Global Communications Conference (GLOBECOM). |
51 | S. S. Kaushik, (2013) "Review of different aproaches for privacy" International Journal of Advanced Engineering and Technology, vol. 5, no. 2, pp. 356-363. |
52 | S. Chen, J. Hu, Y. Shi, and L. Zhao, (2016) "LTE-V: a TD-LTE-based V2X solution for future vehicular network," IEEE Internet of Things Journal, vol. 3, no. 6, pp. 997-1005. DOI |
53 | A. Dhamgaye and N. Chavhan, (2013) "Survey on security challenges in VANET," International Journal of Computer Science, vol. 2, pp. 88-96. |
54 | Z. Lu, G. Qu, and Z. Liu, (2019) "A survey on recent advances in vehicular network security, trust, and privacy," IEEE Transactions on Intelligent Transportation Systems, vol. 20, no. 2, pp. 760-776. DOI |
55 | Abir Mchergui, Tarek Moulahi, Bechir Alaya, Salem Nasri (2017) . "A survey and comparative study of QoS aware broadcasting techniques in VANET", Telecommunication Systems, Vol (66), Pages 253-281. DOI |
56 | Irshad Ahmed Sumra, Halabi Bin Hasbullah, Jamalul-lail Bin AbManan (2015). "Attacks on security goals (confidentiality, integrity, availability) in VANET: a survey", Vehicular Ad-Hoc Networks for Smart Cities, page 51-61. |