Security Issues in Vehicular Ad Hoc Network: A Critical Survey

  • Mohammad Arif
  • Shish Ahmad
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 624)


A vehicular ad hoc network or VANET is a new and advanced approach for communication between vehicles while running on the roads. This has drawn the attention of many researchers. VANET is very helpful in enhancing the safety of the vehicles, passengers and drivers, and the management of traffic using real-time traffic information. VANET is the advancement of MANET. The key distinction between VANET as well as MANET is that in VANET the topology is extremely vibrant due to fast movement of the motor vehicles. VANET network is also susceptible to attacks. One of the very important goals of design of VANET is to prevent the communication from malicious intentions and the security attacks and setting up trustworthy end-to-end connection and having proficient data transfer. In this paper, we firstly focused on security features, confrontations, and different types of possible assaults on VANET and then we threw light on different types of security techniques.


MANET VANET Attacks Security Trust Threats 


  1. 1.
    Horng, S.; Tzeng, S.; Li, T.; Wang, X.; Huang, P.; Khan, M., 2015. Enhancing Security and Privacy for Identity-based Batch Verification Scheme in VANET, IEEE Transactions on Vehicular Technolog, (2015).Google Scholar
  2. 2.
    Yiliang Han; Dingyi Fang; Zelun Yue; Jian Zhang, 2014. SCHAP: Aggregate syncryption based hybrid authentication protocol for VANET in Springer international publishing Switzerland, (2014).218–226.Google Scholar
  3. 3.
    Pouyan, Ali Akbar, and Mahdiyeh Alimohammadi. 2014. Sybil Attack Detection in Vehicular Networks In Computer Science and Information Technology journal, (2014). vol.2, no.4, pp. 197 –202.Google Scholar
  4. 4.
    Manish Kumar Soni and Ashish Vashistha. 2014. HAP: Hybrid Authentication Protocol for VANET in IJCA Proceedings on NWNC (3):10–14, (April 2014).Google Scholar
  5. 5.
    Adigun; Bensaber.;Biskri. 2013. Protocol of Change Pseudonyms for VANETs in IEEE 38th Conference on LCN Workshops, 2013.Google Scholar
  6. 6.
    Ghaleb, Fuad A., M. A. Razzaque, and Ismail Fauzi Isnin. 2013. Security and privacy enhancement in vanets using mobility pattern. In IEEE Fifth International Conference on Ubiquitous and Future Networks (ICUFN), (2013).Google Scholar
  7. 7.
    Alam, Nima, A. T. Balaei, and A. G. Dempster. (2013). Relative positioning enhancement in VANETs: A tight integration approach. IEEE Transactions on Intelligent Transportation Systems, vol.14, no.1, (March 2013) 47, 55.Google Scholar
  8. 8.
    Tong Zhou; R.R Choudhury; Peng Ning; K Chakrabarty. 2011. P2DAP—Sybil Attacks Detection in VANET in IEEE Journal on Selected Areas in Communications Volume:29, Issue: 3 (2011).Google Scholar
  9. 9.
    Priya Karunanithi, Komathy Karuppanan. 2011. Efficient Distributed Group Authentication Protocol for Vehicular Ad Hoc Network In Proceedings of International Conference, ACC 2011, vol 192, (2011) 624–633.Google Scholar
  10. 10.
    Catalin Gosman, Ciprian Dobre, Valentin Cristea, 2010. A Security Protocol for Vehicular Distributed Systems, in 12th international conference on symbolic and numeric algorithms for scientific computing, IEEE digital library (2010).Google Scholar
  11. 11.
    X. Lin, X. Sun, P. H. Ho, and X. Shen, 2007. GSIS: A secure and privacy-preserving protocol for vehicular communications, IEEE Transactions on Vehicular Technology, vol. 56, no. 6, pp. 3442–3456, (2007).Google Scholar
  12. 12.
    P. Papadimitratos and Z. J. Haas, 2013. Secure Data Transmission in MANET, in ACM Workshop on Wireless Security, San Diego, CA, (Sept. 2003).Google Scholar
  13. 13.
    Y. C. Hu, D. B. Johnson and A. Perrig, 2003. SEAD: Secure efficient distance vector routing for MANETs, in Elsevier B. V. (2003) 175–192.Google Scholar
  14. 14.
    Y. C. Hu, A. Perrig and D. B. Johnson, 2002. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks, MobiCom’02, (2002) 23–26.Google Scholar
  15. 15.
    Mohammad Arif, Tara Rani. “Enhanced Ant Colony based Routing in MANETs”. Published in the Proceedings of 5th IEEE International Conference on Advanced Computing & Communication Technologies [ICACCT-2011]. Pages: 48–54, Panipat, November 5, 2011. ISBN 81-87885-03-3.Google Scholar
  16. 16.
    Mohammad Arif, Tara Rani. ACO based Routing for MANETs. Published in International Journal of Wireless & Mobile Networks. April 2012, Volume 4. Number 2. ISSN: 0975-3834[Online]; 0975-4679[Print]. Pages: 163–174.Google Scholar
  17. 17.
    Mohammad Arif and Khalid Imam Rahmani. Adaptive ARA (AARA) for MANETs. Published in IEEE Xplore in the Proceedings of 3rd Nirma University International Conference on Engineering [NUiCONE 2012], Ahmedabad, Gujarat, India, November 5, 2012. ISBN 978-1-4673-1720-7.Google Scholar
  18. 18.
    Mohammad Arif, Kavita Satija, Sachin Chaudhary, “ERBR: Enhanced and Improved Delay for Requirement Based Routing in Delay Tolerant Networks”. Published in the Proceedings of NetCoM—2010, by SPRINGER, pages: 223–232, Chennai, December 27–29, 2010. ISSN: 978-3-642-17878-8_23.Google Scholar
  19. 19.
    Mohammad Arif, Abu Daud, “Adaptive Routing Techniques in Disruption Tolerant Networks”. Published in the Proceedings of the Second International Conference on Wireless & Mobile Networks (WiMoN—2010), by SPRINGER pages: 336–348, Chennai, July 23–25, 2010. ISSN: 978-3-642-14493-6_35.Google Scholar
  20. 20.
    Dahill, B.N. Levine, E. Royer and Clay Shields, A Secure Routing Protocol for Ad Hoc Networks, in Proceeding of IEEE ICNP (Nov. 2002), 78–87.Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  1. 1.Department of Computer ScienceIntegral UniversityLucknowIndia

Personalised recommendations