VANet security challenges and solutions: A survey

Abstract VANET is an emergent technology with promising future as well as great challenges especially in its security. In this paper, we focus on VANET security frameworks presented in three parts. The first presents an extensive overview of VANET security characteristics and challenges as well as requirements. These requirements should be taken into consideration to enable the implementation of secure VANET infrastructure with efficient communication between parties. We give the details of the recent security architectures and the well-known security standards protocols. The second focuses on a novel classification of the different attacks known in the VANET literature and their related solutions. The third is a comparison between some of these solutions based on well-known security criteria in VANET. Then we draw attention to different open issues and technical challenges related to VANET security, which can help researchers for future use.

[1]  Ghassan Samara,et al.  Security Analysis of Vehicular Ad Hoc Networks , 2010 .

[2]  Bart Preneel,et al.  Location verification using secure distance bounding protocols , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..

[3]  Eylem Ekici,et al.  Vehicular Networking: A Survey and Tutorial on Requirements, Architectures, Challenges, Standards and Solutions , 2011, IEEE Communications Surveys & Tutorials.

[4]  Adil Mudasir Malla,et al.  Security Attacks with an Effective Solution for DOS Attacks in VANET , 2013 .

[5]  Mohammed Saeed Al-kahtani,et al.  Survey on security attacks in Vehicular Ad hoc Networks (VANETs) , 2012, 2012 6th International Conference on Signal Processing and Communication Systems.

[6]  William Whyte,et al.  A security credential management system for V2V communications , 2013, 2013 IEEE Vehicular Networking Conference.

[7]  Gongjun Yan,et al.  Providing VANET security through active position detection , 2008, Comput. Commun..

[8]  Rens van der Heijden Security Architectures in V 2 V and V 2 I Communication , 2010 .

[9]  Jeng-Farn Lee,et al.  TEAM: Trust-Extended Authentication Mechanism for Vehicular Ad Hoc Networks , 2011, IEEE Systems Journal.

[10]  Anis Laouiti,et al.  Group-based authentication in V2V communications , 2015, 2015 Fifth International Conference on Digital Information and Communication Technology and its Applications (DICTAP).

[11]  Panagiotis Papadimitratos,et al.  Efficient and robust pseudonymous authentication in VANET , 2007, VANET '07.

[12]  Jalel Ben-Othman,et al.  Survey on VANET security challenges and possible cryptographic solutions , 2014, Veh. Commun..

[13]  Adil Mudasir Malla,et al.  A Review on Vehicle to Vehicle Communication Protocols in VANETs , 2013 .

[14]  Sherali Zeadally,et al.  Vehicular ad hoc networks (VANETS): status, results, and challenges , 2010, Telecommunication Systems.

[15]  Peng Fan,et al.  Cluster-Based Framework in Vehicular Ad-Hoc Networks , 2005, ADHOC-NOW.

[16]  Nanhay Singh,et al.  SECURITY CHALLENGES , ISSUES AND THEIR SOLUTIONS FOR VANET , 2013 .

[17]  Panagiotis Papadimitratos,et al.  SECURING VEHICULAR COMMUNICATIONS , 2006, IEEE Wireless Communications.

[18]  Richard Engoulou,et al.  Sécurisation des VANETS par la méthode de réputation des noeuds , 2013 .

[19]  Jianwei Liu,et al.  Investigate key management and authentication models in VANETs , 2011, 2011 International Conference on Electronics, Communications and Control (ICECC).

[20]  Sapna S. Kaushik REVIEW OF DIFFERENT APPROACHES FOR PRIVACY SCHEME IN VANETS , 2013 .

[21]  Vinh Hoa La,et al.  SECURITY ATTACKS AND SOLUTIONS IN VEHICULAR AD HOC NETWORKS : A SURVEY , 2014 .

[22]  Hannes Federrath,et al.  A privacy aware and efficient security infrastructure for vehicular ad hoc networks , 2008, Comput. Stand. Interfaces.

[23]  Colette Johnen,et al.  Hiérarchisation dans les réseaux ad hoc de véhicules , 2012 .

[24]  Peng Ning,et al.  P2DAP — Sybil Attacks Detection in Vehicular Ad Hoc Networks , 2011, IEEE Journal on Selected Areas in Communications.

[25]  A.A. Kherani,et al.  Secure V2V Communication With Certificate Revocations , 2007, 2007 Mobile Networking for Vehicular Environments.

[26]  Maxim Raya,et al.  Efficient secure aggregation in VANETs , 2006, VANET '06.

[27]  Rutvij H. Jhaveri,et al.  Trust Based Approaches for Secure Routing in VANET: A Survey , 2015 .

[28]  Stephan Olariu,et al.  A Secure and Privacy Aware Data Dissemination For The Notification of Traffic Incidents , 2009, VTC Spring 2009 - IEEE 69th Vehicular Technology Conference.

[29]  Eylem Ekici,et al.  Wireless Access in Vehicular Environments , 2009, EURASIP J. Wirel. Commun. Netw..

[30]  Li He,et al.  Mitigating DoS attacks against signature-based authentication in VANETs , 2012, 2012 IEEE International Conference on Computer Science and Automation Engineering (CSAE).

[31]  Azim Eskandarian,et al.  The threat of intelligent collisions , 2004, IT Professional.

[32]  Gongjun Yan,et al.  Use of Infrastructure in VANETs , 2009 .

[33]  Bin Xiao,et al.  Detection and localization of sybil nodes in VANETs , 2006, DIWANS '06.

[34]  Anis Laouiti,et al.  Security Risk Analysis of a Trust Model for Secure Group Leader-Based Communication in VANET , 2017 .

[35]  Youngho Park,et al.  A Robust Conditional Privacy-Preserving Authentication Protocol in VANET , 2009, MobiSec.

[36]  D. Manivannan,et al.  An efficient protocol for authenticated and secure message delivery in vehicular ad hoc networks , 2016, Veh. Commun..

[37]  Mohamed Azab,et al.  Survey on Security Issues in Vehicular Ad Hoc Networks , 2015 .

[38]  Maxim Raya,et al.  The security of vehicular ad hoc networks , 2005, SASN '05.

[39]  Rizwanul Karim Sakib,et al.  Security issues in VANET , 2010 .

[40]  Alejandro Quintero,et al.  VANET security surveys , 2014, Comput. Commun..

[41]  Murizah Kassim,et al.  A Literature Survey on Security Challenges in VANETs , 2012 .

[42]  Shubham Gandhi,et al.  Survey of Various Security Techniques in VANET , 2014 .

[43]  Piyush Kumar Shukla,et al.  A Survey on Sybil Attack in Vehicular Ad-hoc Network , 2014 .

[44]  Fatty M. Salem,et al.  Non-interactive Authentication Scheme Providing Privacy among Drivers in Vehicle-to-Vehicle Networks , 2010, 2010 Sixth International Conference on Networking and Services.

[45]  Baber Aslam,et al.  Distributed certificate and application architecture for VANETs , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.

[46]  K. Indumathi,et al.  Vehicular Network: Properties, Structure, Challenges, Attacks, Solutions for Improving Scalability and Security , 2013 .

[47]  Jinhua Guo,et al.  A Group Signature Based Secure and Privacy-Preserving Vehicular Communication Framework , 2007, 2007 Mobile Networking for Vehicular Environments.

[48]  Nirbhay Chaubey,et al.  Security Analysis of Vehicular Ad Hoc Networks (VANETs): A Comprehensive Study , 2016 .