Abstract
Elevation of technology in hardware, software and communication have lead to an idea of Intelligent Vehicles, which communicate via Vehicular Ad hoc Networks (VANET) to provide road safety and improved driving conditions. In VANETs, both multi-cast and uni-cast routing is applicable. These protocols can be used by an attacker to breach and endanger the network by accessing and manipulating information of the vehicle and communicating data. As authentication allows to trust both user and data, it requires considerable attention in the security framework of VANETs. Here, we provide a classification of attacks on the basis of security requirements to narrow down the parameters of consideration and comparison of previously proposed protocols in VANET. Pointing out security gaps regarding distinct threats, the classification will allow to designed new secure network control methods.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Agrawal A, Garg A, Chaudhiri N, Gupta S, Pandey D, Roy T (2013) Security on Vehicular Ad-hoc Networks (VANET): a review paper. Int J Emerg Technol Adv Eng 3(1)
Akbar MS, Khaliq KA, Qayyum A (2014) Vehicular MAC Protocol Data Unit (V-MPDU): IEEE 802.11 p MAC protocol extension to support bandwidth hungry applications. In: Vehicular ad-hoc networks for smart cities. Springer, pp 31–39
Akbar MS, Khan MS, Khaliq KA, Qayyum A, Yousaf M (2014) Evaluation of IEEE 802.11n for multimedia application in VANET. Proc Comput Sci 32:953–958
Al-Kahtani MS (2012) Survey on security attacks in Vehicular Ad hoc Networks (VANETs). In: Proceedings of the 6th International Conference on Signal Processing and Communication Systems (ICSPCS), pp 1–9
Biswas S, Mišić J, Mišić V (2011) ID-based safety message authentication for security and trust in vehicular networks. In: Proceedings of the 31st International Conference On Distributed Computing Systems Workshops (ICDCSW), pp 323–331
Čapkun S, Hamdi M, Hubaux J-P (2002) GPS-Free positioning in mobile ad hoc networks. Cluster Comput 5(2):157–167
Caruso A, Chessa A, De S, Urpi A (2005) GPS free coordinate assignment and routing in wireless sensor networks. In: Proceedings of the 24th annual joint conference of the IEEE Computer and Communications Societies (INFOCOM), pp 150–160
Dötzer F, Fischer L, Magiera P (2005) Vars: a vehicle ad-hoc network reputation system. In: Proceedings of the 6th IEEE international symposium on a world of wireless mobile and multimedia networks, pp 454–456
Douceur JR (2002) The Sybil attack. In: Peer-to-peer systems, pp 251–260
Engoulou RG, Bellaïche M, Pierre S, Quintero A (2014) VANET security surveys. Comput Commun 44:1–13
Fuentes JMD, González-Tablas AI, Ribagorda A (2010) Overview of security issues in vehicular ad-hoc networks
Golle P, Greene D, Staddon J (2004) Detecting and correcting malicious data in VANETs. In: Proceedings of the 1st ACM international workshop on vehicular ad hoc networks, pp 29–37
Guo J, Baugh JP, Wang S (2007) A group signature based secure and privacy-preserving vehicular communication framework. Mob Netw Veh Environ 2007:103–108
Harsch C, Festag A, Papadimitratos P (2007) Secure position-based routing for VANETs. In: Proceedings of the 66th IEEE Vehicular Technology Conference (VTC-2007), pp 26–30
Hartenstein H, Laberteaux K (2009) VANET Vehicular Applications and Inter-networking Technologies
Juwad M, Al-Raweshidy H (2008) Experimental performance comparisons between SAODV & AODV. In: Second Asia International Conference on Modeling & Simulation (AICMS 2008), pp 247–252
Kamat P, Baliga A, Trappe W (2006) An identity-based security framework for VANETs. In: Proceedings of the 3rd international workshop on vehicular ad hoc networks, pp 94–95
Kumar V, Mishra S, Chand N (2013) Applications of VANETs: present & future. Commun Netw 5(1):12
Lin X, Sun X, Ho P-H, Shen X (2007) GSIS: a secure and privacy-preserving protocol for vehicular communications. IEEE Trans Veh Technol 56(6):3442–3456
Lin X, Lu R (2015) Vehicular ad hoc network security and privacy
Liu B, Zhong Y, Zhang S (2007) Probabilistic isolation of malicious vehicles in pseudonym changing VANETs. In: Proceedings of the 7th IEEE international conference on Computer and Information Technology (CIT-2007), pp 967–972
Lu H, Li J, Guizani M (2012) A novel id-based authentication framework with adaptive privacy preservation for VANETs. In: Proceedings of the Computing, Communications and Applications Conference (ComComAp), pp 345–350
Mokhtar B, Azab M (2015) Survey on security issues in vehicular ad-hoc networks. Alexandria Eng J 54(4):1115–1126
Nantulya VM, Reich MR (2002) The neglected epidemic: road traffic injuries in developing countries. Br Med J 324(7346):1139
Newsome J, Shi E, Song D, Perrig A (2004) The sybil attack in sensor nnetworks: analysis & defenses. In: Proceedings of the 3rd international symposium on information processing in sensor networks, pp 259–268
Niranjan P, Srivastava P, Soni RK, Pratap R (2012) Detection of wormhole attack using hop-count and time delay analysis. Int J Sci Res Publ 2(4):1
Papadimitratos P, Buttyan L, Holczer TS, Schoch E, Freudiger J, Raya M, Ma Z, Kargl F, Kung A, Hubaux J-P (2008) Secure vehicular communication systems: design and architecture. IEEE Commun Mag 46(11):100–109
Perrig A, Canetti R, Song D, Tygar JD (2001) Efficient and secure source authentication for multicast. In: Network and Distributed System Security Symposium. NDSS, vol 1, pp 35–46
Qian Y, Moayeri N (2008) Design of secure and application-oriented VANETs. In: Proceedings of the 67th IEEE vehicular technology conference (VTC-2008), pp 2794–2799
Raya M, Papadimitratos P, Hubaux J-P (2006) Securing vehicular communications. IEEE Wirel Commun Mag 13:8–15 Special Issue on Inter-Vehicular Communications
Raya M, Hubaux J-P (2007) Securing vehicular ad hoc networks. J Comput Secur 15(1):39–68
Sakib RK, Reza B (2010) Security issues in VANET. Ph.D. dissertation, Department of Electronics and Communication Engineering, BRAC University
Sanzgiri K, Dahill B, Levine BN, Shields C, Royer EMB (2002) A secure routing protocol for ad hoc Networks. In: Proceedings of 10th IEEE international conference on network protocols, 2002, pp 78–87
Sethi D, Mitis F (2013) Road traffic injuries. In: Successes and failures of health policy in Europe: four decades of divergent trends and converging challenges, p 215
Sung-Ming Y, Kuo-Hong L (1997) Shared authentication token secure against replay and weak key attacks. Inf Process Lett 62(2):77–80
Toroyan T (2013) Global status report on road safety 2015 Supporting a decade of action. World Health Organization, Department of Violence and Injury Prevention and Disability, Geneva
Wasef A, Lu R, Lin X, Shen X (2010) Complementing public key infrastructure to secure vehicular ad hoc networks. IEEE J Wirel Commun 17(5):22–28
Wu B, Chen J, Wu J, Cardei M (2007) A survey of attacks and countermeasures in mobile ad-hoc networks. In: Wireless network security, pp 103–135
Zeadally S, Hunt R, Chen Y-S, Irwin A, Hassan A (2012) Vehicular ad hoc Networks (VANETS): Status, results, and challenges. Telecommun Syst 50(4):217–241
Acknowledgments
This research was supported by the European Commission in the framework of Erasmus MUNDUS and within the project FUSION.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing Switzerland
About this paper
Cite this paper
Siddiqui, N.R., Khaliq, K.A., Pannek, J. (2017). VANET Security Analysis on the Basis of Attacks in Authentication. In: Freitag, M., Kotzab, H., Pannek, J. (eds) Dynamics in Logistics. Lecture Notes in Logistics. Springer, Cham. https://doi.org/10.1007/978-3-319-45117-6_43
Download citation
DOI: https://doi.org/10.1007/978-3-319-45117-6_43
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-45116-9
Online ISBN: 978-3-319-45117-6
eBook Packages: EngineeringEngineering (R0)