A Survey on VANET Intrusion Detection Systems

In recent years, the security issues on Vehicular ad hoc networks (VANETs) have become one of the primary concerns. The VANET is inherently very vulnerable to attacks than wired network because it is characterized by high mobility, shared wireless medium and the absence of centralized security services offered by dedicated equipment such as firewalls and authentication servers. Attack countermeasures such as digital signature and encryption, can be used as the first line of defense for reducing the possibilities of attacks. However, these techniques have limited prevention in general, and they are designed for a set of known attacks. They are unlikely to avoid most recent attacks that are designed to circumvent existing security measures. For this reason, there is a need of second technique to "detect and notify" these newer attacks, i.e. "intrusion detection". This article aims to present and classify current techniques of Intrusion Detection System (IDS) aware VANETs. Keyword- Intrusion Detection System (IDS), VANET, Survey. I. INTRODUCTION A Vehicular ad hoc network called VANETs (1,2) is a mobile network allowing to vehicles to communicate with each other in the absence of fixed infrastructure, with the aim of improving road safety through the exchange of alerts between neighborhood vehicles or to offer new comfort services to road users. The characteristics of these networks such as: shared wireless medium, the highly dynamic network topology absence of conventional security infrastructures pose a number of nontrivial challenges to security design.

[1]  David B. Johnson,et al.  The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks , 2003 .

[2]  Khaled Masmoudi,et al.  An Identity-Based Key Management Framework for Personal Networks , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).

[3]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[4]  Jie Wu,et al.  A Survey on Intrusion Detection in Mobile Ad Hoc Networks , 2007 .

[5]  M. Jerbi,et al.  Protocoles pour les communications dans les réseaux de véhicules en environnement urbain : routage et geocast basés sur les intersections , 2008 .

[6]  Udo W. Pooch,et al.  Alert aggregation in mobile ad hoc networks , 2003, WiSe '03.

[7]  R. Sunder,et al.  WIRELESS NODE BEHAVIOR BASED INTRUSION DETECTION USING GENETIC ALGORITHM , 2007 .

[8]  Amitabh Mishra,et al.  Intrusion detection in wireless ad hoc networks , 2004, IEEE Wireless Communications.

[9]  Wenke Lee,et al.  Intrusion Detection , 2013 .

[10]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[11]  M. Suganthi,et al.  Wireless Node Misbehavior Detection Using Genetic Algorithm , 2008 .

[12]  Wenke Lee,et al.  Intrusion detection in wireless ad-hoc networks , 2000, MobiCom '00.

[13]  David A. Maltz,et al.  The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for IPv4 , 2007, RFC.

[14]  Saswati Sarkar,et al.  Signature based intrusion detection for wireless ad-hoc networks: a comparative study of various routing protocols , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).

[15]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[16]  Jaydip Sen,et al.  An Intrusion Detection Architecture for Clustered Wireless Ad Hoc Networks , 2010, 2010 2nd International Conference on Computational Intelligence, Communication Systems and Networks.

[17]  Shiyong Zhang,et al.  Distributed Intrusion Detection for Mobile Ad Hoc Networks , 2005 .