Security Threats and Privacy Issues in Vehicular Ad-Hoc Network (VANET): Survey and Perspective

In Vehicular Ad Hoc Networks (VANETs) Wireless-equipped vehicles are able to communicate with each other as well as Road-Side Units (RSUs) located at strategic places on the road, this enables the formation of self-organized networks connecting the vehicles and RSUs. The (vehicles) nodes are fast mobile causing the network topology to change frequently and unpredictably. Since VANETs do not really rely on any form of central administration or control, nodes in the wireless range dynamically discover each other and establish connection with each other. Due to the pervasive nature of the mobile nodes, it cannot be assumed that VANETs will always be under the control of their owners; nodes could be stolen or tampered with. Each vehicle (node) acts as an independent router and fault detection and network management becomes distributed and more difficult. The shared wireless medium is accessible to both legitimate and illegitimate users; and this has raise formidable research challenges to providing security for this network. This paper take a selective review of the published research work carried out in the security and privacy issue of VANET between 2003 and 2015 and derived a new perspective into the security and privacy attacks in VANET.

[1]  T. Zia,et al.  Vehicular Ad-Hoc Networks (VANETs): An Overview and Challenges , 2013 .

[2]  Adrian Perrig,et al.  Challenges in Securing Vehicular Networks , 2005 .

[3]  Panagiotis Papadimitratos,et al.  Secure vehicular communication systems: design and architecture , 2008, IEEE Communications Magazine.

[4]  P. Lawson,et al.  Federal Communications Commission , 2004, Bell Labs Technical Journal.

[5]  Eric Maiwald Fundamentals of network security , 2003 .

[6]  Bahadurgarh A SURVEY ON VEHICULAR AD-HOC NETWORK , 2017 .

[7]  Panagiotis Papadimitratos,et al.  On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[8]  Girish Identity-Based Cryptography and Comparison with traditional Public key Encryption : A Survey , 2014 .

[9]  Maxim Raya,et al.  The security of VANETs , 2005, VANET '05.

[10]  Trond Foss Safe and Secure Intelligent Transport Systems (ITS) , 2014 .

[11]  Kiyohito Tokuda,et al.  DSRC-Type Communication System for Realizing Telematics Services , 2004 .

[12]  Andreas Meier,et al.  Design of 5.9 ghz dsrc-based vehicular safety communication , 2006, IEEE Wireless Communications.

[13]  Kavita Rawat,et al.  Vehicular Ad Hoc Network , 2006 .

[14]  Ingrid Moerman,et al.  An overview of mobile ad hoc networks: applications and challenges , 2004 .

[15]  Azzedine Boukerche,et al.  Vehicular Ad Hoc Networks: A New Challenge for Localization-Based Systems , 2008, Comput. Commun..

[16]  Maxim Raya,et al.  Securing vehicular ad hoc networks , 2007, J. Comput. Secur..

[17]  Ghassan Samara,et al.  Security Analysis of Vehicular Ad Hoc Networks , 2010 .

[18]  Abdul Kalam,et al.  Performance Analysis of Authentication Protocols in Vehicular Ad Hoc Networks (VANET) , 2010 .

[19]  J. Misic,et al.  Establishing security and privacy in wave-enabled vehicular ad hoc networks , 2013 .

[20]  Katrin Bilstrup A survey regarding wireless communication standards intended for a high-speed vehicle environment , 2007 .

[21]  Amjad Khan Minimization of Denial of services attacks in Vehicular Adhoc networking by applying different constraints , 2013 .

[22]  Lorena González-Manzano,et al.  Security Models in Vehicular Ad-hoc Networks: A Survey , 2014 .

[23]  Vinh Hoa La,et al.  SECURITY ATTACKS AND SOLUTIONS IN VEHICULAR AD HOC NETWORKS : A SURVEY , 2014 .

[24]  Panagiotis Papadimitratos,et al.  SECURING VEHICULAR COMMUNICATIONS , 2006, IEEE Wireless Communications.

[25]  Sudip Misra,et al.  Security in Vehicular Ad Hoc Networks , 2016 .

[26]  Panagiotis Papadimitratos,et al.  Report on the "secure vehicular communications: results and challenges ahead" workshop , 2008, MOCO.

[28]  Sona Malhotra,et al.  AN INSIGHT OVERVIEW OF ISSUES AND CHALLENGES IN VEHICULARADHOC NETWORK , 2011 .

[29]  Imrich Chlamtac,et al.  Mobile ad hoc networking: imperatives and challenges , 2003, Ad Hoc Networks.

[30]  Robert D. Kent,et al.  Issues and solutions of Applying Identity-based Cryptography to Mobile Ad-Hoc Networks , 2012, AdhocNets 2012.