Survey on Security Issues in Vehicular Ad Hoc Networks

Abstract Vehicular Ad hoc NETworks are special case of ad hoc networks that, besides lacking infrastructure, communicating entities move with various accelerations. Accordingly, this impedes establishing reliable end-to-end communication paths and having efficient data transfer. Thus, VANETs have different network concerns and security challenges to get the availability of ubiquitous connectivity, secure communications, and reputation management systems which affect the trust in cooperation and negotiation between mobile networking entities. In this survey, we discuss the security features, challenges, and attacks of VANETs, and we classify the security attacks of VANETs due to the different network layers.

[1]  Christoph Schroth,et al.  The scalability problem of vehicular ad hoc networks and how to solve it , 2006, IEEE Wireless Communications.

[2]  Radia J. Perlman,et al.  Network security - private communication in a public world , 2002, Prentice Hall series in computer networking and distributed systems.

[3]  Yuh-Shyan Chen,et al.  Routing Protocols in Vehicular Ad Hoc Networks: A Survey and Future Perspectives , 2010, J. Inf. Sci. Eng..

[4]  Djamel Djenouri,et al.  A survey of security issues in mobile ad hoc and sensor networks , 2005, IEEE Communications Surveys & Tutorials.

[5]  Mario Gerla,et al.  Survey of Routing Protocols in Vehicular Ad Hoc Networks , 2010 .

[6]  Nader Moayeri,et al.  Design of Secure and Application-Oriented VANETs , 2008, VTC Spring 2008 - IEEE Vehicular Technology Conference.

[7]  Zheng Liu,et al.  GeoSVR: A map-based stateless VANET routing , 2013, Ad Hoc Networks.

[8]  Pin-Han Ho,et al.  Secure Vehicular Communications Based on Group Signature and ID-Based Signature Scheme , 2007, 2007 IEEE International Conference on Communications.

[9]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.

[10]  Jessica Staddon,et al.  Detecting and correcting malicious data in VANETs , 2004, VANET '04.

[11]  Yu Wang,et al.  Routing in vehicular ad hoc networks: A survey , 2007, IEEE Vehicular Technology Magazine.

[12]  Dawn Song,et al.  The TESLA Broadcast Authentication Protocol , 2002 .

[13]  Joaquim Celestino,et al.  Mobility-aware Ant Colony Optimization routing for vehicular ad hoc networks , 2011, 2011 IEEE Wireless Communications and Networking Conference.

[14]  Mingliu Zhang,et al.  Border Node Based Routing Protocol for VANETs in Sparse and Rural Areas , 2007, 2007 IEEE Globecom Workshops.

[15]  Srdjan Capkun,et al.  SECTOR: secure tracking of node encounters in multi-hop wireless networks , 2003, SASN '03.

[16]  Luca Delgrossi,et al.  IEEE 802.11p: Towards an International Standard for Wireless Access in Vehicular Environments , 2008, VTC Spring 2008 - IEEE Vehicular Technology Conference.

[17]  Mihaela Cardei,et al.  A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks , 2007 .

[18]  Nitin H. Vaidya,et al.  Detection and handling of MAC layer misbehavior in wireless networks , 2003, 2003 International Conference on Dependable Systems and Networks, 2003. Proceedings..

[19]  Denh Sy,et al.  ODAR: On-Demand Anonymous Routing in Ad Hoc Networks , 2006, 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems.

[20]  Ahmed Yassin Al-Dubai,et al.  Fast and Reliable Hybrid routing for Vehicular Ad hoc Networks , 2013, 2013 13th International Conference on ITS Telecommunications (ITST).

[21]  Raúl Aquino-Santos,et al.  A location-based routing algorithm for vehicle to vehicle communication , 2004, Proceedings. 13th International Conference on Computer Communications and Networks (IEEE Cat. No.04EX969).

[22]  Dharma P. Agrawal,et al.  Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..

[23]  S. Yousefi,et al.  Vehicular Ad Hoc Networks (VANETs): Challenges and Perspectives , 2006, 2006 6th International Conference on ITS Telecommunications.

[24]  P. S. Nithya Darisini,et al.  A survey of routing protocols for VANET in urban scenarios , 2013, 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering.

[25]  Mun Choon Chan,et al.  Greedy Face Routing with Face ID Support in Wireless Networks , 2007, 2007 16th International Conference on Computer Communications and Networks.

[26]  Bharat K. Bhargava,et al.  AO2P: ad hoc on-demand position-based private routing protocol , 2005, IEEE Transactions on Mobile Computing.

[27]  Yih-Chun Hu,et al.  Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.

[28]  R. Ramesh,et al.  Secure Position Routing Using Ad hoc Network , 2006, 2006 International Symposium on Ad Hoc and Ubiquitous Computing.

[29]  J. Redi,et al.  A brief overview of ad hoc networks: challenges and directions , 2002, IEEE Communications Magazine.

[30]  Rahim Tafazolli,et al.  CLWPR — A novel cross-layer optimized position based routing protocol for VANETs , 2011, 2011 IEEE Vehicular Networking Conference (VNC).

[31]  Jie Wu,et al.  Guest Editors' Introduction: Ad Hoc Networks , 2004, Computer.

[32]  Raghupathy Sivakumar,et al.  Transport over wireless networks , 2002 .

[33]  Hannes Hartenstein,et al.  A tutorial survey on vehicular ad hoc networks , 2008, IEEE Communications Magazine.

[34]  Ravi M. Yadumurthy,et al.  Reliable MAC broadcast protocol in directional and omni-directional transmissions for vehicular ad hoc networks , 2005, VANET '05.

[35]  P. Khatri,et al.  A Survey on Security issues in Mobile ADHOC networks , 2009 .

[36]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[37]  Panagiotis Papadimitratos,et al.  SECURING VEHICULAR COMMUNICATIONS , 2006, IEEE Wireless Communications.

[38]  Haiyun Luo,et al.  Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.

[39]  Kamanashis Biswas,et al.  Security Threats in Mobile Ad Hoc Network , 2007 .