Total views : 498

VANET and its Security Aspects: A Review

Affiliations

  • School of Electronics Engineering ,VIT University, Chennai Campus, Chennai – 600127, Tamil Nadu, India

Abstract


Objectives: This paper reviews research on various routing protocols used in Vehicular Adhoc Network (VANET), with the aim to 1. examine the newly emerged routing strategies, 2. to identify the security aspect of these routing strategies, 3. to explore security importance to users and 4. to investigate the research direction for security in VANET. Methods/Statistical Analysis: This paper focuses on two major aspects which includes literature survey and review along with a conceptual analysis of VANET security aspects. For this 20 security in VANET related papers have compared and analyzed along with some basic paper on VANET and routing to provide security in vehicular adhoc network. Findings: The survey of this paper indicates that the security aspect for VANET secured communication requires successful accomplishment of all aspects. However, the recent survey concludes that there is still further scope for research in security aspects like integrity, non-repudiation, availability. Application/Improvements: This study (review) tries to suggest that understanding the approach of routing and will help to implement a better intelligent transport system with security.

Keywords

Routing Protocol, Security Study, Vehicular Adhoc Network.

Full Text:

 |  (PDF views: 688)

References


  • Feteiha M, Hassanein H. Enabling cooperative relaying VANET clouds over LTE-A networks. IEEE Transactions on Vehicular Technology; 2015. p. 1468–79.
  • Boyaci A, Zaim H, Sonmez C. A cross-layer adaptive channel selection mechanism for IEEE 802.11P suite. Journal on Wireless Communications and Networking; 2015.
  • Mir ZH, Filali F. LTE and IEEE 802.11p for vehicular networking: A performance evaluation. EURASIP Journal on Wireless Communications and Networking; 2014. p. 89.
  • Bhoi S, Khilar P. Vehicular communication: A survey. IET Networks. 2014; 3(3):204–17
  • Xiong W, Xu J, Li Y, Zhao N, Wan X, Liang J. Minimum node degree of k-connected vehicular ad hoc networks in highway scenarios. Journal on Wireless Communications and Networking; 2016.
  • Ahmed S, Ariffin S, Fisal N. Network coding techniques for VANET advertising applications. Journal on Wireless Communications and Networking. 2015; 1.
  • Zeadally S, Hunt R, Chen Y, Irwin A, Hassan A. Vehicular Ad hoc Networks (VANETS): Status, results, and challenges. Telecommunication Systems. 2010; 50(4):217–241.
  • Dressler F, Altintas O, Scheuermann B, Banerjee S. Special issue on advances in vehicular networks. Ad Hoc Networks. 2016; 37:1–2.
  • Eze E, Zhang S, Liu E, Eze J. Advances in Vehicular Ad-hoc Networks (VANETs): Challenges and road-map for future development. International Journal of Automation and Computing; 2016. p. 1–18.
  • Daniel A, Paul A, Ahmad A, Rho S. Cooperative intelligence of vehicles for Intelligent Transportation Systems (ITS). Wireless Personal Communications; 2015. p. 461–84.
  • Masini B, Molinaro A, Costa L, Sukuvaara T, Ducourthial B. Vehicular networking for mobile crowd sensing. Ad Hoc Networks; 2016. p. 407–8.
  • Engoulou R, BellaÃiche M, Pierre S, Quintero A. VANET security surveys. Elsevier. 2014:1–13.
  • Mejri M, Ben-Othman J, Hamdi M. Survey on VANET security challenges and possible cryptographic solutions. Vehicular Communications. 2014:53–66.
  • Singh A, Kad S. A review on the various security techniques for VANETs. Procedia Computer Science; 2016. p. 284–90.
  • Di Pietro R, Guarino S, Verde N, Domingo-Ferrer J. Security in wireless ad-hoc networks: A survey. Computer Communications; 2014. p. 1–20.
  • Al-Sultan S, Al-Doori AM, Al-Bayatti H, Zedan Z. A comprehensive survey on vehicular AdHoc network. Elsevier. 2013; 37:380–92.
  • Zhioua G, Tabbane N, Labiod, Tabbane S. A fuzzy multi-metric QoS-balancing gateway selection algorithm in a clustered VANET to LTE advanced hybrid cellular network. IEEE Transactions on Vehicular Technology; 2015. p. 804–17.
  • Campolo C, Molinaro A, Scopigno R. From today's VANETs to tomorrow's planning and the bets for the day after. Vehicular Communications. 2015; 2(3):158–71.
  • Kumar V, Mishra S, Chand N. Applications of VANETs: Present and Future, Communications and Network. 2013; 5(1B):12–15.
  • Cunha F, Villas L, Boukerche A, Maia G, Viana A, Mini R, Loureiro A. Data communication in VANETs: Protocols, applications and challenges, Ad Hoc Networks; 2016. p. 90–103.
  • Saravanan D, Agalya V, Amudhavel J, Janakiraman S. a brief survey on performance analysis and routing strategies on Vanets. Indian Journal of Science and Technology. 2016 Mar; 9(11):1–6.
  • Raw RS, Singh KM. Security challenges, issues and their solutions for Vanet. International Journal of Network Security and its Applications. 2013:95–105.
  • Nasir MK, Hossain A, Hassan M, Ali M. Security challenges and implementation mechanism for vehicular ad hoc network. International Journal of Scientific & Technology Research. 2013:156–61.
  • Ertaul L, Mullapudi S. The security problems of Vehicular Ad hoc Networks (VANETs) and proposed solutions in securing their operation. DBLP Conference: Proceedings of the 2009 International Conference on Wireless Networks, ICWN 2009, Las Vegas Nevada, USA; 2009. p. 13–16.
  • Mohanty S, Jena D. Secure data aggregation in Vehicular-Adhoc Networks: A survey. Procedia Technology; 2012. p. 922–9.
  • Fernández-Caramés T, González-López M, Castedo L. Mobile WiMAX for vehicular applications: Performance evaluation and comparison against IEEE 802.11p/a. Computer Networks; 2011. p. 3784–95.
  • Rahim A, Muhaya FB, Sher M, Khan ZS, Ahmad I. Performance evaluation of broadcast techniques in VANETs. Indian Journal of Science and Technology. 2009 Oct; 2(10):1–4.
  • Rohani M, Gingras D, Gruyer D. A novel approach for improved vehicular positioning using cooperative map matching and dynamic base station DGPS concept. IEEE Transactions on Intelligent Transportation Systems; 2016. p. 230–9.
  • Darisini PSN, Kumari NS. Geo-reactive: An efficient and reliable hybrid routing protocol for VANETs. Indian Journal of Science and Technology. 2015 Oct; 8(27):1–6.
  • Kanchanasut K, Boonsiripant S, Tunpan A, Kim H, Ekpanyapong M. Internet of cars through commodity V2V and V2X mobile routers: Applications for developing countries. KSCE Journal of Civil Engineering; 2014. p. 1897–1904.
  • Gantsou D. Invited Paper: VANET security: Going beyond cryptographic-centric solutions. Chapter Vehicular ad-hoc networks for smart cities, of the series Advances in Intelligent Systems and Computing; 2015. p. 43–9.
  • Mokhtar B, Azab M. Survey on security issues in vehicular ad hoc networks. Alexandria Engineering Journal; 2015. p. 1115–26.
  • Lim HJ, Chung TM. A survey on privacy problems and solutions for VANET based on network model. Springer-Verlag Berlin Heidelberg; 2011. p. 74–88.
  • Feng X, Li C, Chen D, Tang J. A method for defensing against multi-source Sybil attacks in VANET. Peer-to-Peer Networking and Applications; 2016.
  • Samara G, Al-Salihy WAH, Sures R. Security analysis of Vehicular Ad Hoc Networks (VANET). ACM, NETAPPS '10 Proceedings of the 2010 Second International Conference on Network Applications, Protocols and Services; 2010. p. 55–60.
  • Balasubramani S, Rani S, Rajeswari KS. Review on security attacks and mechanism in VANET and MANET. Springer India, Artificial Intelligence and Evolutionary Computations in Engineering Systems, Advances in Intelligent Systems and Computing; 2016. p. 655–66.
  • Sumra IA, Bin Hasbullah H, Bin AbManan J. Attacks on security goals (confidentiality, integrity, availability) in VANET: A survey. Vehicular Ad-hoc Networks for Springer. Smart Cities, Advances in Intelligent Systems and Computing; 2015. p. 51–61.
  • Rivas DA, Barceló-Ordinas J, Zapata MG, Morillo-Pozo J. Security on VANETs: Privacy, misbehaving nodes, false information and secure data aggregation. Journal of Network and Computer Applications; 2011. p. 1942–55.
  • Khan U, Agrawal S, Silakari S. Detection of Malicious Nodes (DMN) in Vehicular Ad-Hoc Networks. Procedia Computer Science; 2015. p. 965–72.
  • Rupareliya J, Vithlani S, Gohel C. Securing VANET by preventing attacker node using watchdog and bayesian network theory. Procedia Computer Science; 2016. p. 649–56.
  • Yan G, Olariu S, Weigle M. Providing VANET security through active position detection. Computer Communications; 2008. p. 2883–97.
  • Lo N, Tsai J. An efficient conditional privacy-preserving authentication scheme for Vehicular Sensor Networks without pairings. IEEE Transactions on Intelligent Transportation Systems; 2015. p. 1–10.
  • Horng S, Tzeng S, Li T, Wang X, Huang P, Khan M. Enhancing security and privacy for identity-based batch verification scheme in VANET. IEEE Transactions on Intelligent Transportation Systems; 2015. p. 1–1.
  • Kamat P, Baliga A, Trappe W. An identity based security framework for VANETs. ACM; 2016. p. 94–5.
  • Zhou A, Li J, Sun Q, Fan C, Lei T, Yang F. A security authentication method based on trust evaluation in VANETs. EURASIP Journal on Wireless Communications and Networking; 2015, p. 59.
  • Wu H, Hsieh W. RSU-based message authentication for vehicular ad-hoc networks. Multimedia Tools and Applications; 2011. p. 215–27.
  • Singh K, Saini P, Rani S, Singh AK. Authentication and privacy preserving message transfer scheme for Vehicular Ad Hoc Networks (VANETs). Proceedings of the 12th ACM International Conference on Computing Frontiers; 2015.
  • Mondal A, Mitra S. Identification, authentication and tracking algorithm for vehicles using VIN in centralized VANET. Advances in Communication, Network, and Computing; 2012. p. 115–20.
  • Hasrouny H, Bassil C, Samhat A, Laouiti A. Group-based authentication in V2V communications. 2015 Fifth International Conference on Digital Information and Communication Technology and its Applications (DICTAP); 2015. p. 173–7.
  • Kang Q, Liu X, Yao Y, Wang Z, Li Y. Efficient authentication and access control of message dissemination over vehicular ad hoc network. Neurocomputing; 2016. p. 132–8.
  • Wang C, Shi D, Xu X, Fang J. An anonymous data access scheme for VANET using pseudonym-based cryptography. Journal of Ambient Intelligence and Humanized Computing. 2015:63–71.
  • Remyakrishnan P, Tripti C. A novel approach for enhancing the security of user authentication in VANET using biometrics. Advances in Intelligent Systems and Computing. 2015; 338:299–306.
  • Patel N, Jhaveri R. Trust based approaches for secure routing in VANET: A survey. Procedia Computer Science; 2015. p. 592–601
  • Moghraoui K, Amar Bensaber B. An efficient pseudonym change protocol based on trusted neighbours for privacy and anonymity in VANETs. DIVANet '15 Proceedings of the 5th ACM Symposium on Development and Analysis of Intelligent Vehicular Networks and Applications, ACM; 2015. p. 93–9.
  • Mandala S. Trust management in vehicular ad hoc network: a systematic review. EURASIP Journal on Wireless Communications and Networking. 2015.
  • Biswas S, Misie J. Establishing Trust on VANET Safety Messages. ADHOCNETS; 2010. p. 314–27.
  • Punal O, Pereira C, Aguiar A, Gross J. Experimental characterization and modeling of RF jamming attacks on VANETs. IEEE Transactions on Vehicular Technology; 2015. p. 524–40.
  • Wagan A, Mughal B, Hasbullah H. VANET security framework for safety applications using trusted hardware. Communications in Computer and Information Science; 2011. p. 426–39.
  • Wang C, Chiou Y, Liaw G. Nexthop selection mechanism for nodes with heterogeneous transmission range in VANETs. Computer Communications; 2015. p. 22–31.
  • Agrawal S, Raw RS, Tyagi N, Misra AK. Fuzzy Logic based Greedy Routing (FLGR) in multi-hop vehicular ad hoc networks. Indian Journal of Science and Technology. 2015 Nov; 8(30):1–14.
  • Urquiza-Aguiar L, Vázquez-Rodas A, Tripp-Barba C, Mezher AM, Igartua MA, Llopis LD. Efficient deployment of gateways in multi-hop ad-hoc wireless networks. PE-WASUN '14 Proceedings of the 11th ACM Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks; 2014. p. 93–100.
  • Chen Y, Fang M, Shi S, Guo X, Zheng X. Distributed multi-hop clustering algorithm for VANETs based on neighborhood follow. EURASIP Journal on Wireless Communications and Networking. 2015.
  • Bitam S, Mellouk A, Zeadally S. VANET-cloud: A generic cloud computing model for vehicular Ad Hoc networks. IEEE Wireless Communications; 2015. p. 96–102.
  • Hussain R, Rezaeifar Z, Lee Y, Oh H. Secure and privacy-aware traffic information as a service in VANET-based clouds. Pervasive and Mobile Computing; 2015. p. 194–209.
  • Jelassi S, Bouzid A, Youssef H. QoE-driven video streaming system over cloud-based VANET. Springer International Publishing Switzerland; 2015. p. 84–93.
  • Malina L, Hajný J, Zeman V. Group signatures for secure and privacy preserving vehicular ad hoc networks. Q2SWinet '12 Proceedings of the 8th ACM Symposium on QoS and Security for Wireless and Mobile Networks, ACM; 2012. p. 71–4.
  • Zhang L, Wu Q, Qin B, Domingo-Ferrer J, Liu B. Practical secure and privacy-preserving scheme for value-added applications in VANETs. Computer Communications; 2015. p. 50–60.
  • Yang C, Qin B, Zhou X, Sun Y, He S, Wu Q. Privacy-preserving traffic monitoring in vehicular ad hoc networks. IEEE, International Conference on Advance Networking and Applications Workshops; 2015. p. 22–4.
  • Wongdeethai S, Siripongwutikorn P. Collecting road traffic information using vehicular ad hoc networks. EURASIP Journal on Wireless Communications and Networking. 2016; 1.
  • Younes M, Boukerche A. SCOOL: A secure traffic congestion control protocol for VANETs. IEEE Wireless Communications and Networking Conference (WCNC); 2015. p. 1960–5.
  • Balasubramani, Karthikeyan L, Deepalakshmi V. Comparative study on non-delay tolerant routing protocols in vehicular networks. Procedia Computer Science; 2015. p. 252–7.
  • Sobin CC, Raychoudhury V, Marfia G, Singla A. A survey of routing and data dissemination in Delay Tolerant Networks. Journal of Network and Computer Applications. 2016.
  • Sharef B, Alsaqour R, Ismail M. Comparative study of variant position-based VANET routing protocols. Procedia Technology; 2013. p. 532–9.
  • Tsai M, Wang P, Shieh C, Hwang W, Chilamkurti N, Rho S, Lee Y. Improving positioning accuracy for VANET in real city environments. The Journal of Supercomputing; 2014. p. 1975–95.
  • Husain A, Sharma S. Comparative analysis of location and zone based routing in VANET with IEEE802.11p in City Scenario, Computer Engineering and Applications (ICACEA), 2015 IEEE International Conference on Advances; 2015. p. 294–9.
  • Liu J, Wan J, Wang Q, Deng P, Zhou K, Qiao Y. A survey on position-based routing for vehicular ad hoc networks. Telecommunication Systems; 2015. p. 15–30.
  • Kumar S, Verma A. Position based routing protocols in VANET: A survey. Wireless Personal Communications; 2015. p. 2747–72.
  • Singh G, Chakrabarty N, Gupta K. Traffic congestion detection and management using Vehicular Ad-hoc Networks (VANETs) in India. International Journal of Advanced Computer Technology. 2014:19–26.
  • Salvo P, Cuomo F, Baiocchi A, Rubin I. Investigating VANET dissemination protocols performance under high throughput conditions.Vehicular Communications; 2015. p. 185–94.
  • Huo Y, Liu Y, Ma L, Cheng X, Jing T. An enhanced low overhead and stable clustering scheme for crossroads in VANETs. EURASIP Journal on Wireless Communications and Networking. 2016.
  • Cheng J, Cheng J, Zhou M, Liu F, Gao S, Liu C. Routing in internet of vehicles: A review. IEEE Transactions on Intelligent Transportation Systems. 2015; 16(5):2339–52.
  • Jayachandran S, DoraisamiJothi J, Krishnan S. A case study on various routing strategies of VANETs. Communications in Computer and Information Science; 2012. p. 353–62.
  • Lin Y, Chen, Lee S. Routing protocols in vehicular ad hoc networks: A survey and Future perspectives. Journal of Information Science and Engineering; 2010. p. 913–19.
  • Cheng C, Tsao S. Adaptive lookup protocol for two-tier VANET/P2P information retrieval services. IEEE Transactions on Vehicular Technology; 2015. p. 1051–64.
  • Orozco AM, Céspedes S, Michoud R, Llano G. Design and simulation of a collision notification application with geocast routing for car-to-car communications. European Transport Research Review. 2015:4.
  • Sheet D, Kaiwartya O, Abdullah A, Hassan A. Location information verification cum security using TBM in geocast routing. Procedia Computer Science; 2015. p. 219–25.
  • Khandelwal S, Jawandhiya P. Safe geo graphic location privacy scheme in the VANETs-survey methods and its limitation. International Journal of Scientific and Engineering Research; 2013. p. 1507–11.
  • Kim S. Timed bargaining-based opportunistic routing model for dynamic vehicular ad hoc network. EURASIP Journal on Wireless Communications and Networking. 2016: 1.
  • Farah MB, Mercier D, Delmotte F, LefèvreÉ. Methods using belief functions to manage imperfect information concerning events on the road in VANETs. Transportation Research Part C: Emerging Technologies. Journal of Network and Computer Applications. 2011:1942–55.
  • Hoeft M, Rak J. How to provide fair service for V2I communications in VANETs? Ad Hoc Networks; 2016. p. 283–94.
  • Abbassi S, Qureshi I, Abbasi H, Alyaie B. History-based spectrum sensing in CR-VANETs. EURASIP Journal on Wireless Communications and Networking. 2015.
  • Tabassum M, Razzaque M, Hassan M, Almogren A, Alamri A. Interference-aware high-throughput channel allocation mechanism for CR-VANETs. EURASIP Journal on Wireless Communications and Networking. 2016.
  • Silva C, Nogueira M, Kim D, Cerqueira E, Santos A. Cognitive radio based connectivity management for resilient end-to-end communications in VANETs. Computer Communications; 2016. p. 1–8.
  • Qureshi M, Noor R, Shamshirband S, Parveen S, Shiraz M, Gani A. A survey on obstacle modeling patterns in radio propagation models for vehicular ad hoc networks. Arabian Journal for Science and Engineering. 2015. p. 1385–407.
  • Kaur N, Kad S. A review on security related aspects in vehicular ad hoc network. Procedia Computer Science; 2016. p. 387–94.
  • de Fuentes JM, González-Tablas AI, Ribagorda A. Overview of security issues in Vehicular Ad-hoc Networks. 2010.
  • Dak A, Yahya S, Kassim M. A survey on security challenges in VANETs. International Journal of Computer Theory and Engineering; 2012. p. 1007–10.
  • Kaur M, Singh P. Performance evaluation of V2Vcommunication by implementing security algorithm in VANET. Advances in Computing and Information Technology; 2012. p. 757–63.
  • Chandramohan K, Kamalakkannan P. An efficient neighbor discovery and aloha based collision detection and correction in VANET. Indian Journal of Science and Technology. 2015 Dec; 8(35):1–9.
  • Bala R, Krishna C. Scenario base performance analysis of AODV and GPSR routin protocols in a VANET. 2015 IEEE International Conference on Computational Intelligence and Communication Technology (CICT); 2015. p. 432–7.
  • Elsadig MA, Fadlalla YA. VANETs security issues and challenges: A survey. Indian Journal of Science and Technology. 2016.
  • Jaiganesh S, Jarina S, Amudhavel J, Premkumar K, Sampathkumar S, Vengattaraman T. Performance analysis of collision avoidance frame works in VANETS. Indian Journal of Science and Technology. 2016.

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.