Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET: A Survey

In recent years, the VANET has received a greater attention among researchers in academia and industry due to its potential safety application and nonsafety application. Malicious users are one of the types of attackers in VANET and create the security problems. Confidentiality, integrity and availability (CIA) are major components of security goals. The increasing research interest, potential applications, and security problem in VANET lead to the needs to review the attacks on security goals. In this paper, the aim is to present the survey of attacks on security goals and to describe in details the nature of attacks and the behaviour of attackers through different scenarios in the network. The paper also provides a better understanding of security goals and finally it provides an analysis and classifies the attacks on the basis of security goals into different threat levels that can help in the implementation of VANET in real life.

[1]  Salvatore Casale,et al.  Generation of random variables for modelling VBR multimedia sources , 1998, Telecommun. Syst..

[2]  Adrian Perrig,et al.  Challenges in Securing Vehicular Networks , 2005 .

[3]  Maxim Raya,et al.  The security of vehicular ad hoc networks , 2005, SASN '05.

[4]  Panagiotis Papadimitratos,et al.  Securing Vehicular Communications - Assumptions, Requirements, and Principles , 2006 .

[5]  Thomas Nowey,et al.  Towards a security architecture for vehicular ad hoc networks , 2006, First International Conference on Availability, Reliability and Security (ARES'06).

[6]  Maxim Raya,et al.  Securing vehicular ad hoc networks , 2007, J. Comput. Secur..

[7]  Nader Moayeri,et al.  Design of Secure and Application-Oriented VANETs , 2008, VTC Spring 2008 - IEEE Vehicular Technology Conference.

[8]  Sherali Zeadally,et al.  Security attacks and solutions for vehicular ad hoc networks , 2010, IET Commun..

[9]  Ana I. González-Tablas,et al.  Overview of security issues in Vehicular Ad-hoc Networks , 2011 .

[10]  Jamalul-lail Ab Manan,et al.  Behavior of attacker and some new possible attacks in Vehicular Ad hoc Network (VANET) , 2011, 2011 3rd International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT).

[11]  Jelena V. Misic,et al.  DDoS attack on WAVE-enabled VANET through synchronization , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).

[12]  Sherali Zeadally,et al.  Vehicular ad hoc networks (VANETS): status, results, and challenges , 2010, Telecommunication Systems.

[13]  Alejandro Quintero,et al.  VANET security surveys , 2014, Comput. Commun..

[14]  Irshad Ahmed Sumra,et al.  Effects of attackers and attacks on availability requirement in vehicular network: A survey , 2014, 2014 International Conference on Computer and Information Sciences (ICCOINS).