Secure Opportunistic Routing for Vehicular Ad Hoc Networks

Vehicular Ad-hoc Networks (VANETs) is a growing interest and research area over recent years for it offers enhanced safety and non-safety applications for transportation. Vehicular Ad-Hoc Networks (VANETs) is a developing technology that is yet unclear to many security issues. Security and routing concerns that are unique to VANET present great challenges. In this paper, we have proposed a scheme basically solve the black hole and gray hole attack in vehicular ad hoc networks. Black-hole and gray hole are the well-known routing attacks through which malicious nodes try to downgrade the communication performance of VANETs. In this paper, we focus on recent proposals that aim to enhance VANETs security and routing in systematic and architectural approaches.

[1]  Adrian Perrig,et al.  Flexible, extensible, and efficient VANET authentication , 2009, Journal of Communications and Networks.

[2]  Han Yu,et al.  Anonymous authentication based on cloud storage for cross-regional vehicles in VANET , 2016, 2016 IEEE International Conference on Ubiquitous Wireless Broadband (ICUWB).

[3]  Bu-Sung Lee,et al.  Position Based Opportunistic Routing for Robust Data Delivery in MANETs , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[4]  Shi-Jinn Horng,et al.  Enhancing Security and Privacy for Identity-Based Batch Verification Scheme in VANETs , 2017, IEEE Transactions on Vehicular Technology.

[5]  Rajiv Misra,et al.  Approximating geographic routing using coverage tree heuristics for wireless network , 2015, Wirel. Networks.

[6]  E. A. Mary Anita,et al.  A survey on authentication schemes of VANETs , 2016, 2016 International Conference on Information Communication and Embedded Systems (ICICES).

[7]  Changle Li,et al.  LSGO: Link State aware Geographic Opportunistic routing protocol for VANETs , 2014, EURASIP Journal on Wireless Communications and Networking.

[8]  Mario Gerla,et al.  Geo-opportunistic routing for vehicular networks [Topics in Automotive Networking] , 2010, IEEE Communications Magazine.

[9]  Felipe Gil-Castineira Opportunistic routing and delay-tolerant networking in vehicular communication systems , 2015 .

[10]  Debasis Das,et al.  Caching algorithm for fast handoff using AP graph with multiple vehicles for VANETs , 2015, Int. J. Commun. Networks Distributed Syst..

[11]  Hyun-Jong Cha,et al.  A node management scheme for stable P2P service in mobile ad-hoc networks , 2015, Peer-to-Peer Networking and Applications.

[12]  Wenjia Li,et al.  ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks , 2016, IEEE Transactions on Intelligent Transportation Systems.

[13]  Fuad A. Ghaleb,et al.  Security and privacy enhancement in VANETs using mobility pattern , 2013, 2013 Fifth International Conference on Ubiquitous and Future Networks (ICUFN).

[14]  Ciprian Dobre,et al.  Analysis of Security Approaches for Vehicular Ad-Hoc Networks , 2015, 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC).

[15]  Vinh Hoa La,et al.  SECURITY ATTACKS AND SOLUTIONS IN VEHICULAR AD HOC NETWORKS : A SURVEY , 2014 .

[16]  Janise McNair,et al.  In Vivo Evaluation of the Secure Opportunistic Schemes Middleware Using a Delay Tolerant Social Network , 2017, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).

[17]  V. Lakshmi Praba,et al.  Isolating malicious vehicles and avoiding collision between vehicles in VANET , 2013, 2013 International Conference on Communication and Signal Processing.

[18]  Azzedine Boukerche,et al.  On the Effect of Black-hole Attack on Opportunistic Routing Protocols , 2015, PE-WASUN '15.

[19]  Pabitra Mohan Khilar,et al.  A secure routing protocol for Vehicular Ad Hoc Network to provide ITS services , 2013, 2013 International Conference on Communication and Signal Processing.

[20]  Mario Gerla,et al.  Opportunistic vehicular routing , 2010, 2010 European Wireless Conference (EW).

[21]  T. Zia,et al.  Vehicular Ad-Hoc Networks (VANETs): An Overview and Challenges , 2013 .

[22]  Azzedine Boukerche,et al.  Software-defined Vehicular Ad Hoc Networks with Trust Management , 2016, DIVANet@MSWiM.

[23]  Matthias Grossglauser,et al.  Least-Cost Opportunistic Routing , 2007 .

[24]  Rahul Rishi,et al.  Routing and security analysis in vehicular ad-hoc networks (VANETs) , 2016, 2016 IEEE 1st International Conference on Power Electronics, Intelligent Control and Energy Systems (ICPEICES).

[25]  Hao Hu,et al.  REPLACE: A Reliable Trust-Based Platoon Service Recommendation Scheme in VANET , 2017, IEEE Transactions on Vehicular Technology.

[26]  Alejandro Quintero,et al.  A flexible testbed architecture for VANET , 2017, Veh. Commun..

[27]  Robert Tappan Morris,et al.  ExOR: opportunistic multi-hop routing for wireless networks , 2005, SIGCOMM '05.

[28]  Matti Latva-aho,et al.  Distributed resource allocation for MISO downlink systems via the alternating direction method of multipliers , 2012, EURASIP Journal on Wireless Communications and Networking.

[29]  Md. Abu Naser Bikas,et al.  VANET Routing Protocols: Pros and Cons , 2011, ArXiv.

[30]  Heekuck Oh,et al.  A Hierarchical Privacy Preserving Pseudonymous Authentication Protocol for VANET , 2016, IEEE Access.

[31]  Azzedine Boukerche,et al.  A novel packet salvaging model to improve the security of opportunistic routing protocols , 2017, Comput. Networks.

[32]  Gongjun Yan,et al.  Security challenges in vehicular cloud computing , 2013, IEEE Transactions on Intelligent Transportation Systems.

[33]  Mohamed Hamdy,et al.  A comparison on VANET authentication schemes: Public Key vs. Symmetric Key , 2015, 2015 Tenth International Conference on Computer Engineering & Systems (ICCES).

[34]  Dayanand Ambawade,et al.  Security enhancement in group based authentication for VANET , 2016, 2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT).

[35]  Azzedine Boukerche,et al.  Trust-based Secure Routing in Software-defined Vehicular Ad Hoc Networks , 2016, ArXiv.

[36]  Azzedine Boukerche,et al.  Opportunistic Routing in Wireless Networks: Models, Algorithms, and Classifications , 2014 .

[37]  Teddy Mantoro,et al.  Car to car communication in VANET using Co-operative Mobility Services of the Future (CoMoSeF) , 2016, 2016 5th International Conference on Multimedia Computing and Systems (ICMCS).

[38]  Shaojie Tang,et al.  Recent progress in routing protocols of mobile opportunistic networks: A clear taxonomy, analysis and evaluation , 2016, J. Netw. Comput. Appl..

[39]  Craig A. Knoblock,et al.  A Survey of Digital Map Processing Techniques , 2014, ACM Comput. Surv..

[40]  Maurizio Morisio,et al.  Connected Car , 2016, ACM Comput. Surv..

[41]  Meng-Hsun Tsai,et al.  iParking - a real-time parking space monitoring and guiding system , 2017, Veh. Commun..

[42]  Abdelhamid Mellouk,et al.  QoS Swarm Bee Routing Protocol for Vehicular Ad Hoc Networks , 2011, 2011 IEEE International Conference on Communications (ICC).

[43]  Azzedine Boukerche,et al.  Mobility-based opportunistic routing for mobile ad-hoc networks , 2014, PE-WASUN '14.

[44]  Anis Laouiti,et al.  VANet security challenges and solutions: A survey , 2017, Veh. Commun..

[45]  Azzedine Boukerche,et al.  Modeling and performance evaluation of security attacks on opportunistic routing protocols for multihop wireless networks , 2016, Ad Hoc Networks.

[46]  S. Vinothini,et al.  An efficient CRL authentication scheme for vehicular communications , 2015, 2015 International Conference on Computing and Communications Technologies (ICCCT).

[47]  Gongjun Yan,et al.  Trust On the Security of Wireless Vehicular Ad-hoc Networking , 2015, Ad Hoc Sens. Wirel. Networks.