Security issues in vehicular networks

Vehicular ad-hoc networks (VANETs) have become the focus of much discussion due to its potential role in helping to improve traffic management and safety and enable a wide range of value-added services such as collision warning/avoidance and work zone warning. Because information transmitted over a vehicular network is sensitive and can affect important safety decisions, security requirements for VANETs applications prove stringent. Thus, fail-safe security is mandatory. However, providing security in vehicular networks raises important privacy concerns also worth considering. Security and privacy are the two main concerns motivating robust vehicular network designs. In this paper, we will discuss some threats and attacks that can be exploited, and in response, present some viable security solutions.

[1]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[2]  Eylem Ekici,et al.  Vehicular Networking: A Survey and Tutorial on Requirements, Architectures, Challenges, Standards and Solutions , 2011, IEEE Communications Surveys & Tutorials.

[3]  M. Cruz-cunha,et al.  Handbook of Research on Mobility and Computing : Evolving Technologies and Ubiquitous Impacts , 2011 .

[4]  Maxim Raya,et al.  The security of vehicular ad hoc networks , 2005, SASN '05.

[5]  Jessica Staddon,et al.  Detecting and correcting malicious data in VANETs , 2004, VANET '04.

[6]  Tim Leinmüller,et al.  Improved security in geographic ad hoc routing through autonomous position verification , 2006, VANET '06.

[7]  Srdjan Capkun,et al.  The security and privacy of smart vehicles , 2004, IEEE Security & Privacy Magazine.

[8]  Y. Koucheryavy,et al.  State of the Art and Research Challenges for VANETs , 2008, 2008 5th IEEE Consumer Communications and Networking Conference.

[9]  Panagiotis Papadimitratos,et al.  SECURING VEHICULAR COMMUNICATIONS , 2006, IEEE Wireless Communications.

[10]  J.-P. Hubaux,et al.  Impact of Denial of Service Attacks on Ad Hoc Networks , 2008, IEEE/ACM Transactions on Networking.

[11]  Hovav Shacham,et al.  Group signatures with verifier-local revocation , 2004, CCS '04.

[12]  Ana I. González-Tablas,et al.  Overview of security issues in Vehicular Ad-hoc Networks , 2011 .

[13]  Adrian Perrig,et al.  Challenges in Securing Vehicular Networks , 2005 .

[14]  Panagiotis Papadimitratos,et al.  Eviction of Misbehaving and Faulty Nodes in Vehicular Networks , 2007, IEEE Journal on Selected Areas in Communications.