A Taxonomy of Security Attacks and Issues in Vehicular Ad-Hoc Networks (VANETs)

VANET has turned into an effective area of research, standardization and advancement, because it has impressive potential to raise vehicle and road safety, welfare, as well as convenience to both drivers and passengers and traffic adaptability. A lot of VANET Research work has been centered on particular areas including broadcasting, routing, surveillance and quality of service. The security benchmarks of vehicular Ad hoc network are examined here. Due to the unguarded nature of the VANET system routing protocols, such networks are also unsafe from the malicious mobile nodes in the structure itself. Hence the fundamental objective of vehicular ad hoc networks (VANETs), i.e., safe transmission of the time critical data, is possible only if a sturdy framework provides this insurance at all times. In this paper, various security protocols for vehicular ad hoc networks and achievement of mechanisms are discussed to give security. In this paper various types of security complications and objections of VANET have been figured out and examined.

[1]  Mahmut T. Kandemir,et al.  The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense , 2006, Int. J. Distributed Sens. Networks.

[2]  Josep Domingo-Ferrer,et al.  Balanced Trustworthiness, Safety, and Privacy in Vehicle-to-Vehicle Communications , 2010, IEEE Transactions on Vehicular Technology.

[3]  Panagiotis Papadimitratos,et al.  Secure vehicular communication systems: design and architecture , 2008, IEEE Communications Magazine.

[4]  Xiaoyan Hong,et al.  A new set of passive routing attacks in mobile ad hoc networks , 2003, IEEE Military Communications Conference, 2003. MILCOM 2003..

[5]  Ciprian Dobre,et al.  A Security Protocol for Vehicular Distributed Systems , 2010, 2010 12th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing.

[6]  Bin Lu,et al.  Security in Mobile Ad Hoc Networks , 2008 .

[7]  Panagiotis Papadimitratos,et al.  Securing Mobile Ad Hoc Networks , 2004, Mobile Computing Handbook.

[8]  Marco Conti,et al.  Body, personal, and local ad hoc wireless networks , 2003 .

[9]  Gongjun Yan,et al.  Securing Vehicular Ad-hoc Networks Against Malicious Drivers: A Probabilistic Approach , 2011, 2011 International Conference on Complex, Intelligent, and Software Intensive Systems.

[10]  Yih-Chun Hu,et al.  Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.

[11]  Damla Turgut,et al.  Defense against Sybil attack in vehicular ad hoc network based on roadside unit support , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.

[12]  Shiyong Zhang,et al.  Resisting flooding attacks in ad hoc networks , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.

[13]  V. S. Sheeba,et al.  Security in Mobile Ad-Hoc Networks , 2012, 2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12).

[14]  Nader Moayeri,et al.  Design of Secure and Application-Oriented VANETs , 2008, VTC Spring 2008 - IEEE Vehicular Technology Conference.

[15]  Refik Molva,et al.  Security in wireless ad hoc networks , 2003 .

[16]  Nei Kato,et al.  Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method , 2007, Int. J. Netw. Secur..

[17]  Amitabh Mishra,et al.  Security in wireless ad hoc networks , 2003 .

[18]  Hsiao-Hwa Chen,et al.  DESCV—A Secure Wireless Communication Scheme for Vehicle ad hoc Networking , 2009, Mob. Networks Appl..

[19]  Rashid Mehmood,et al.  Vehicular ad hoc and grid networks: discussion, design and evaluation , 2007 .