Security Attacks, Requirements and Authentication Schemes in VANET

Vehicular Ad-hoc Networks (VANET), the promising technique, is getting attention for managing the traffic efficiently and making the road safe. The topographies and its vast applications varying from road safety, to the traffic management, payment service to infotainment. VANETs are characterized as a self-organized, distributed, highly mobile, dynamic topology, unconstrained power, computational and storage networks. The communication in VANET is performed in open-access environment which demands the security issues must be deal with utter importance. Security requirements includes authentication, availability, message confidentiality, message integrity, data availability, access control, privacy, message non-repudiation and real time guarantees of message delivery. In order to have a secure and efficient VANET infrastructure, an extensive overview of characteristics, challenges, security attacks and requirements must be dealt with. The prime objective of this paper is to provide a classification of security requirements, security characteristics and challenges.

[1]  Panagiotis Papadimitratos,et al.  Efficient and robust pseudonymous authentication in VANET , 2007, VANET '07.

[2]  Victor I. Chang,et al.  Computationally efficient privacy preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks , 2018, Future Gener. Comput. Syst..

[3]  Mohsen Guizani,et al.  ACPN: A Novel Authentication Framework with Conditional Privacy-Preservation and Non-Repudiation for VANETs , 2015, IEEE Transactions on Parallel and Distributed Systems.

[4]  Adrian Perrig,et al.  Flexible, extensible, and efficient VANET authentication , 2009, Journal of Communications and Networks.

[5]  Xuemin Shen,et al.  EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks , 2013, IEEE Transactions on Mobile Computing.

[6]  Shrikant S. Tangade,et al.  A survey on attacks, security and trust management solutions in VANETs , 2013, 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT).

[7]  M. Sivasakthi,et al.  Research on vehicular ad hoc networks (VANETs): An overview , 2013 .

[8]  Jinhua Guo,et al.  A Group Signature Based Secure and Privacy-Preserving Vehicular Communication Framework , 2007, 2007 Mobile Networking for Vehicular Environments.

[9]  S. A. Kulkarni,et al.  A secure message authentication scheme for VANET using ECDSA , 2013, 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT).

[10]  E. A. Mary Anita,et al.  Secure Vehicular Communication Using ID Based Signature Scheme , 2018, Wirel. Pers. Commun..

[11]  Liehuang Zhu,et al.  LESPP: lightweight and efficient strong privacy preserving authentication scheme for secure VANET communication , 2014, Computing.

[12]  Eylem Ekici,et al.  Vehicular Networking: A Survey and Tutorial on Requirements, Architectures, Challenges, Standards and Solutions , 2011, IEEE Communications Surveys & Tutorials.

[13]  Hannes Hartenstein,et al.  A tutorial survey on vehicular ad hoc networks , 2008, IEEE Communications Magazine.

[14]  Zhili Sun,et al.  A lightweight authentication and privacy-preserving scheme for VANETs using TESLA and Bloom Filters , 2017, ICT Express.

[15]  Qing Yang,et al.  A Secure and Efficient Group Key Agreement Scheme for VANET , 2019, Sensors.

[16]  Arun Kumar Tripathi,et al.  A Qualitative Analysis of Secured Handover Management Schemes for Mobile IPv6 Enabled Networks , 2018, 2018 3rd International Innovative Applications of Computational Intelligence on Power, Energy and Controls with their Impact on Humanity (CIPECH).

[17]  Lukas Malina,et al.  Short-Term Linkable Group Signatures with Categorized Batch Verification , 2012, FPS.

[18]  Pin-Han Ho,et al.  An Efficient Message Authentication Scheme for Vehicular Communications , 2008, IEEE Transactions on Vehicular Technology.

[19]  Joel J. P. C. Rodrigues,et al.  Secure and stable Vehicular Ad Hoc Network clustering algorithm based on hybrid mobility similarities and trust management scheme , 2018, Veh. Commun..

[20]  Srinivas Sampalli,et al.  A novel sender authentication scheme based on hash chain for Vehicular Ad-Hoc Networks , 2011, 2011 IEEE Symposium on Wireless Technology and Applications (ISWTA).

[21]  Arun Kumar Tripathi,et al.  Secure and Optimized Authentication Scheme in Proxy Mobile IPv6 (SOAS-PMIPv6) to reduce Handover Latency , 2017 .

[22]  Shahrokh Valaee,et al.  Vehicular ad hoc networks: architectures, research issues, methodologies, challenges, and trends , 2015, AdHocNets 2015.

[23]  Pin-Han Ho,et al.  TSVC: timed efficient and secure vehicular communications with privacy preserving , 2008, IEEE Transactions on Wireless Communications.