Vehicular Networks Security: Attacks, Requirements, Challenges and Current Contributions

This article provides a panorama on the security in vehicular networks’ environments. The special characteristics of these environments are presented and a general classification for the different types of attacks illustrated by some relevant attacks examples is introduced. Consequently, some key security requirements and security challenges are derived, considering Intelligent Transportation System (ITS) or Safety services as well as non-ITS or non-Safety services. Finally, some existing contributions in this subject are presented, and their deployment feasibility is discussed.

[1]  C. Loebbecke,et al.  Virtual Organizations That Cooperate and Compete: Managing the Risks of Knowledge Exchange , 2002 .

[2]  Vijayan Sugumaran Intelligent support systems : knowledge management , 2002 .

[3]  Gerasimos C. Pagiatakis Active optical access networks , 2003 .

[4]  Srdjan Capkun,et al.  The security and privacy of smart vehicles , 2004, IEEE Security & Privacy Magazine.

[5]  Jessica Staddon,et al.  Detecting and correcting malicious data in VANETs , 2004, VANET '04.

[6]  Nitin H. Vaidya,et al.  A vehicle-to-vehicle communication protocol for cooperative collision warning , 2004, The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004..

[7]  Azim Eskandarian,et al.  The threat of intelligent collisions , 2004, IT Professional.

[8]  Maxim Raya,et al.  The security of vehicular ad hoc networks , 2005, SASN '05.

[9]  Yvon Gourhant,et al.  Providing Authentication and Access Control in Vehicular Network Environment , 2006, SEC.

[10]  Maxim Raya,et al.  Securing vehicular ad hoc networks , 2007, J. Comput. Secur..

[11]  Panagiotis Papadimitratos,et al.  Secure Position-Based Routing for VANETs , 2007, 2007 IEEE 66th Vehicular Technology Conference.

[12]  Vijayan Sugumaran Intelligent Information Technologies and Applications , 2008 .

[13]  Stavros Kotsopoulos,et al.  Handbook of Research on Heterogeneous Next Generation Networking: Innovations and Platforms , 2008 .

[14]  Alejandro Pazos Sierra,et al.  Encyclopedia of Artificial Intelligence , 2008 .

[15]  Houda Labiod,et al.  Performance Analysis of a Layer-2 Multi-Hop Authentication and Credential Delivery Scheme for Vehicular Networks , 2008, VTC Spring 2008 - IEEE Vehicular Technology Conference.

[16]  R. Nedunchezhian,et al.  Improved Privacy: Preserving Techniques in Large Database , 2008 .

[17]  Francisco Javier Díaz Pernas,et al.  Stream Processing of a Neural Classifier II , 2009, Encyclopedia of Artificial Intelligence.

[18]  Huaqun Guo Automotive Informatics and Communicative Systems: Principles in Vehicular Networks and Data Exchange , 2009 .

[19]  Javier Ibanez-Guzman The Localisation Problem in Cooperative Vehicle Applications , 2009 .

[20]  Chung-ming Huang,et al.  Telematics Communication Technologies and Vehicular Networks: Wireless Architectures and Applications , 2009 .

[21]  Hussein T. Mouftah,et al.  Dynamic Bandwidth Allocation for Ethernet Passive Optical Networks , 2009 .

[22]  Floriano De Rango,et al.  Trust-Based SAODV Protocol with Intrusion Detection, Trust Management and Incentive Cooperation in MANETs , 2009, Int. J. Interdiscip. Telecommun. Netw..

[23]  Stelios C. A. Thomopoulos,et al.  Simulation of Small-Scale Fading in Mobile Channel Models for Next-Generation Wireless Communications , 2009 .

[24]  Satish V. Ukkusuri,et al.  Integrating Traffic Flow Features to Characterize the Interference in Vehicular Ad Hoc Networks , 2009 .

[25]  Ioannis P. Chochliouros,et al.  Optical Access Networks and Advanced Photonics: Technologies and Deployment Strategies , 2009 .

[26]  Starsky H. Y. Wong,et al.  Inter-Domain Routing in Mobile Ad Hoc Networks : Challenges and New Directions , 2010 .