Security Challenges, Authentication, Application and Trust Models for Vehicular Ad Hoc Network- A Survey

Vehicular Ad hoc Network could manage the various critical issues of road transport. That is why it is the most crucial field of research for most of the researchers. This survey paper discusses various issues related to Security Challenges, Security Architecture actors, Security Authentication, Application Constraints, various trust models etc. this paper encourages you to think about various fields of work need to be carried out in this field for the better VANET environment. Various schemes have been mentioned which could be improved further as per considering various real time conditions.

[1]  Hsiao-Hwa Chen,et al.  Message Authentication Using Proxy Vehicles in Vehicular Ad Hoc Networks , 2015, IEEE Transactions on Vehicular Technology.

[2]  Nitin H. Vaidya,et al.  A vehicle-to-vehicle communication protocol for cooperative collision warning , 2004, The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004..

[3]  Radha Poovendran,et al.  AMOEBA: Robust Location Privacy Scheme for VANET , 2007, IEEE Journal on Selected Areas in Communications.

[4]  Joseph Mouzna,et al.  An optimized adaptive algorithm for authentication of safety critical messages in VANET , 2013, 2013 8th International Conference on Communications and Networking in China (CHINACOM).

[5]  Narottam Chand,et al.  Applications of VANETs: Present & Future , 2013 .

[6]  Na Ruan,et al.  DoS attack-tolerant TESLA-based broadcast authentication protocol in Internet of Things , 2012, 2012 International Conference on Selected Topics in Mobile and Wireless Networking.

[7]  Pin-Han Ho,et al.  An Efficient Message Authentication Scheme for Vehicular Communications , 2008, IEEE Transactions on Vehicular Technology.

[8]  Ana I. González-Tablas,et al.  Overview of security issues in Vehicular Ad-hoc Networks , 2011 .

[9]  Yi-Hu Xu,et al.  Hardware Design of Noble MAC Protocol for Vehicle System , 2011 .

[10]  Fangchun Yang,et al.  A security authentication method based on trust evaluation in VANETs , 2015, EURASIP J. Wirel. Commun. Netw..

[11]  Xiaomei Zhang,et al.  Efficient, fast and scalable authentication for VANETs , 2013, 2013 IEEE Wireless Communications and Networking Conference (WCNC).

[12]  Shrikant S. Tangade,et al.  A survey on attacks, security and trust management solutions in VANETs , 2013, 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT).

[13]  Mohamed Salah Bouassida Authentication vs. Privacy within Vehicular Ad Hoc Networks , 2011, Int. J. Netw. Secur..

[14]  Jie Zhang,et al.  A Survey on Trust Management for VANETs , 2011, 2011 IEEE International Conference on Advanced Information Networking and Applications.

[15]  Ryma Abassi Trust Management in Vehicular Ad hoc NETwork , 2018 .

[16]  Liehuang Zhu,et al.  2FLIP: A Two-Factor Lightweight Privacy-Preserving Authentication Scheme for VANET , 2016, IEEE Transactions on Vehicular Technology.

[17]  Adrian Perrig,et al.  Flexible, extensible, and efficient VANET authentication , 2009, Journal of Communications and Networks.

[18]  Matthias Gerlach,et al.  Trust for Vehicular Applications , 2007, Eighth International Symposium on Autonomous Decentralized Systems (ISADS'07).

[19]  Jun Tao,et al.  Anonymous authentication-oriented vehicular privacy protection technology research in VANET , 2011, 2011 International Conference on Electrical and Control Engineering.

[20]  Zhengtao Xiang,et al.  An improved AOMDV routing protocol for V2V communication , 2009, 2009 IEEE Intelligent Vehicles Symposium.

[21]  Panagiotis Papadimitratos,et al.  On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[22]  Maxim Raya,et al.  Securing vehicular ad hoc networks , 2007, J. Comput. Secur..

[23]  Jie Zhang,et al.  Towards Expanded Trust Management for Agents in Vehicular Ad-hoc Networks , 2017 .