Skip to main content

Towards the Security Measures of the Vehicular Ad-Hoc Networks

  • Conference paper
  • First Online:
Internet of Vehicles. Technologies and Services Towards Smart City (IOV 2018)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11253))

Included in the following conference series:

Abstract

The vehicles currently manufactured are becoming progressively associated with the Internet, supporting a variety of new highlights that are valuable towards both drivers and automakers. Therefore, the highlights given entail the new security issues. Vehicular Ad-Hoc Networks (VANET) have recently emerged as one of the solutions that could help connecting cars to the vast network. Not only could preserve the safety, but also the efficiency of the traffic.

The paper focuses on the VANETs that are vulnerable to attacks which can directly lead to the corruption of networks and then possibly provoke a considerable loss of time, money, and even the users’ lives. The analysis of the Sybil attacks is presented and the possible solutions that could solve the security leaks in vehicle networks are proposed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Car network structure. https://www.globalcarsbrands.com/top-10-newest-car-technologies-that-have-revolutionized-the-auto-industry/. Accessed 14 Apr 2018

  2. Al-Qutayri, M., Yeun, C., Al-Hawi, F.: Security and privacy of intelligent VANETs. In: Computational Intelligence and Modern Heuristics (2010)

    Google Scholar 

  3. Ad-hoc networks structure. https://www.researchgate.net/figure/VANET-Structure.fig1263545192. Accessed 14 Apr 2018

  4. Vehicle weakest points. http://www.intel.com/content/www/us/en/automotive/automotive- security-best-practices-white-paper.html. Accessed 14 Apr 2018

  5. Czosseck, C., Ottis, R., Ziolkowski, K.: Paradigm change of vehicle cyber security. In: Proceedings of 4th International Conference on Cyber-Conflict, pp. 380–384 (2012)

    Google Scholar 

  6. Isaac, J.T., Zeadally, S., Camara, J.S.: Security attacks and solutions for vehicular ad hoc networks. IET Commun. 4, 894–903 (2010)

    Article  MathSciNet  Google Scholar 

  7. Al-kahtani, A., Abdulaziz S., Kharj, A.: Survey on security attacks in vehicular ad hoc networks (VANETs). In.: Proceedings of 6th International Conference on Signal Processing and Communication Systems (ICSPCS), pp. 1–9 (2012)

    Google Scholar 

  8. Sumra, I.A., Iftikhar A., Hasbullah, H., Manan, J.: Classes of attacks in VANET. In: Proceedings of Tenth International Conference on Wireless and Optical Communications Networks (WOCN), pp. 1–5 (2013)

    Google Scholar 

  9. Chim, T., Yiu, S.M., Hui, L.C.K., Li, V.O.K.: Security and privacy issues for inter-vehicle communications in VANETs. In: proceedings of Sensor, Mesh and Ad Hoc Communications and Networks Workshops, pp. 1–3 (2009)

    Google Scholar 

  10. Wing, C.T.: Secure and privacy-preserving protocols for VANETs. Ph.D. thesis, Hong Kong (2011)

    Google Scholar 

  11. Zhang, L.: Research on security and privacy in vehicular ad hoc networks. Ph.D. thesis, Universitat Rovira i Virgili (2010)

    Google Scholar 

  12. Raw, R.S., Kumar, M., Singh, N.: Security issues and solutions in vehicular ad hoc network: a review approach. In: Wyld, D.C. (ed.) ICCSEA, pp. 339–347. WimoA, SPPR, CSIA (2013)

    Google Scholar 

  13. Karn, C.K., Gupta, C.P.: A survey on VANETs security attacks and sybil attack detection. Int. J. Sens. Wirel. Commun. Control 6, 45–62 (2016)

    Article  Google Scholar 

  14. Chen, C., Wang, X., Han, W., Zang, B.Y.: A robust detection of the sybil attack in urban VANETs. In: Proceedings of Distributed Computing Systems Workshops, ICDCS Workshops 2009, pp. 270–276 (2009)

    Google Scholar 

  15. Hamdan, S., Raad, S., Al-Qassas, S., Tedmori, S.: Comparative study on sybil attack detection schemes. Int. J. Comput. Technol. 14(7), 5869–5876 (2015)

    Article  Google Scholar 

  16. Park, S., Aslam, B., Turgut, D., Zou, C.C.: Defense against Sybil attack in vehicular ad hoc network based on roadside unit support. In: proceedings of Military Communications Conference, MILCOM (2009)

    Google Scholar 

  17. Samara, G., Al-Salihy, W.A., Sures, R.: Security analysis of vehicular ad hoc networks (VANET). In: Proceedings of Second International Conference on Network Applications, Protocols and Services, National Advanced IPv6 Center, Universiti Sains Malaysia, pp. 55–60 (2010)

    Google Scholar 

  18. Dyvak, M., Stakhiv, P., Pukas, A., Voytyuk, I., Porplytsya, N., Maslyiak, Y.: Interval model of dynamics of dispersion of harmful pollution from vehicular traffic. J. Appl. Comput. Sci. 24(3), 49–60 (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Aneta Poniszewska-Marańda .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Stepień, K., Poniszewska-Marańda, A. (2018). Towards the Security Measures of the Vehicular Ad-Hoc Networks. In: Skulimowski, A., Sheng, Z., Khemiri-Kallel, S., Cérin, C., Hsu, CH. (eds) Internet of Vehicles. Technologies and Services Towards Smart City. IOV 2018. Lecture Notes in Computer Science(), vol 11253. Springer, Cham. https://doi.org/10.1007/978-3-030-05081-8_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-05081-8_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-05080-1

  • Online ISBN: 978-3-030-05081-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics