Skip to main content

VANET Security Analysis on the Basis of Attacks in Authentication

  • Conference paper
  • First Online:
Dynamics in Logistics

Part of the book series: Lecture Notes in Logistics ((LNLO))

Abstract

Elevation of technology in hardware, software and communication have lead to an idea of Intelligent Vehicles, which communicate via Vehicular Ad hoc Networks (VANET) to provide road safety and improved driving conditions. In VANETs, both multi-cast and uni-cast routing is applicable. These protocols can be used by an attacker to breach and endanger the network by accessing and manipulating information of the vehicle and communicating data. As authentication allows to trust both user and data, it requires considerable attention in the security framework of VANETs. Here, we provide a classification of attacks on the basis of security requirements to narrow down the parameters of consideration and comparison of previously proposed protocols in VANET. Pointing out security gaps regarding distinct threats, the classification will allow to designed new secure network control methods.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Agrawal A, Garg A, Chaudhiri N, Gupta S, Pandey D, Roy T (2013) Security on Vehicular Ad-hoc Networks (VANET): a review paper. Int J Emerg Technol Adv Eng 3(1)

    Google Scholar 

  • Akbar MS, Khaliq KA, Qayyum A (2014) Vehicular MAC Protocol Data Unit (V-MPDU): IEEE 802.11 p MAC protocol extension to support bandwidth hungry applications. In: Vehicular ad-hoc networks for smart cities. Springer, pp 31–39

    Google Scholar 

  • Akbar MS, Khan MS, Khaliq KA, Qayyum A, Yousaf M (2014) Evaluation of IEEE 802.11n for multimedia application in VANET. Proc Comput Sci 32:953–958

    Article  Google Scholar 

  • Al-Kahtani MS (2012) Survey on security attacks in Vehicular Ad hoc Networks (VANETs). In: Proceedings of the 6th International Conference on Signal Processing and Communication Systems (ICSPCS), pp 1–9

    Google Scholar 

  • Biswas S, Mišić J, Mišić V (2011) ID-based safety message authentication for security and trust in vehicular networks. In: Proceedings of the 31st International Conference On Distributed Computing Systems Workshops (ICDCSW), pp 323–331

    Google Scholar 

  • Čapkun S, Hamdi M, Hubaux J-P (2002) GPS-Free positioning in mobile ad hoc networks. Cluster Comput 5(2):157–167

    Article  Google Scholar 

  • Caruso A, Chessa A, De S, Urpi A (2005) GPS free coordinate assignment and routing in wireless sensor networks. In: Proceedings of the 24th annual joint conference of the IEEE Computer and Communications Societies (INFOCOM), pp 150–160

    Google Scholar 

  • Dötzer F, Fischer L, Magiera P (2005) Vars: a vehicle ad-hoc network reputation system. In: Proceedings of the 6th IEEE international symposium on a world of wireless mobile and multimedia networks, pp 454–456

    Google Scholar 

  • Douceur JR (2002) The Sybil attack. In: Peer-to-peer systems, pp 251–260

    Google Scholar 

  • Engoulou RG, Bellaïche M, Pierre S, Quintero A (2014) VANET security surveys. Comput Commun 44:1–13

    Article  Google Scholar 

  • Fuentes JMD, González-Tablas AI, Ribagorda A (2010) Overview of security issues in vehicular ad-hoc networks

    Google Scholar 

  • Golle P, Greene D, Staddon J (2004) Detecting and correcting malicious data in VANETs. In: Proceedings of the 1st ACM international workshop on vehicular ad hoc networks, pp 29–37

    Google Scholar 

  • Guo J, Baugh JP, Wang S (2007) A group signature based secure and privacy-preserving vehicular communication framework. Mob Netw Veh Environ 2007:103–108

    Google Scholar 

  • Harsch C, Festag A, Papadimitratos P (2007) Secure position-based routing for VANETs. In: Proceedings of the 66th IEEE Vehicular Technology Conference (VTC-2007), pp 26–30

    Google Scholar 

  • Hartenstein H, Laberteaux K (2009) VANET Vehicular Applications and Inter-networking Technologies

    Google Scholar 

  • Juwad M, Al-Raweshidy H (2008) Experimental performance comparisons between SAODV & AODV. In: Second Asia International Conference on Modeling & Simulation (AICMS 2008), pp 247–252

    Google Scholar 

  • Kamat P, Baliga A, Trappe W (2006) An identity-based security framework for VANETs. In: Proceedings of the 3rd international workshop on vehicular ad hoc networks, pp 94–95

    Google Scholar 

  • Kumar V, Mishra S, Chand N (2013) Applications of VANETs: present & future. Commun Netw 5(1):12

    Article  Google Scholar 

  • Lin X, Sun X, Ho P-H, Shen X (2007) GSIS: a secure and privacy-preserving protocol for vehicular communications. IEEE Trans Veh Technol 56(6):3442–3456

    Article  Google Scholar 

  • Lin X, Lu R (2015) Vehicular ad hoc network security and privacy

    Google Scholar 

  • Liu B, Zhong Y, Zhang S (2007) Probabilistic isolation of malicious vehicles in pseudonym changing VANETs. In: Proceedings of the 7th IEEE international conference on Computer and Information Technology (CIT-2007), pp 967–972

    Google Scholar 

  • Lu H, Li J, Guizani M (2012) A novel id-based authentication framework with adaptive privacy preservation for VANETs. In: Proceedings of the Computing, Communications and Applications Conference (ComComAp), pp 345–350

    Google Scholar 

  • Mokhtar B, Azab M (2015) Survey on security issues in vehicular ad-hoc networks. Alexandria Eng J 54(4):1115–1126

    Article  Google Scholar 

  • Nantulya VM, Reich MR (2002) The neglected epidemic: road traffic injuries in developing countries. Br Med J 324(7346):1139

    Article  Google Scholar 

  • Newsome J, Shi E, Song D, Perrig A (2004) The sybil attack in sensor nnetworks: analysis & defenses. In: Proceedings of the 3rd international symposium on information processing in sensor networks, pp 259–268

    Google Scholar 

  • Niranjan P, Srivastava P, Soni RK, Pratap R (2012) Detection of wormhole attack using hop-count and time delay analysis. Int J Sci Res Publ 2(4):1

    Google Scholar 

  • Papadimitratos P, Buttyan L, Holczer TS, Schoch E, Freudiger J, Raya M, Ma Z, Kargl F, Kung A, Hubaux J-P (2008) Secure vehicular communication systems: design and architecture. IEEE Commun Mag 46(11):100–109

    Article  Google Scholar 

  • Perrig A, Canetti R, Song D, Tygar JD (2001) Efficient and secure source authentication for multicast. In: Network and Distributed System Security Symposium. NDSS, vol 1, pp 35–46

    Google Scholar 

  • Qian Y, Moayeri N (2008) Design of secure and application-oriented VANETs. In: Proceedings of the 67th IEEE vehicular technology conference (VTC-2008), pp 2794–2799

    Google Scholar 

  • Raya M, Papadimitratos P, Hubaux J-P (2006) Securing vehicular communications. IEEE Wirel Commun Mag 13:8–15 Special Issue on Inter-Vehicular Communications

    Article  Google Scholar 

  • Raya M, Hubaux J-P (2007) Securing vehicular ad hoc networks. J Comput Secur 15(1):39–68

    Article  Google Scholar 

  • Sakib RK, Reza B (2010) Security issues in VANET. Ph.D. dissertation, Department of Electronics and Communication Engineering, BRAC University

    Google Scholar 

  • Sanzgiri K, Dahill B, Levine BN, Shields C, Royer EMB (2002) A secure routing protocol for ad hoc Networks. In: Proceedings of 10th IEEE international conference on network protocols, 2002, pp 78–87

    Google Scholar 

  • Sethi D, Mitis F (2013) Road traffic injuries. In: Successes and failures of health policy in Europe: four decades of divergent trends and converging challenges, p 215

    Google Scholar 

  • Sung-Ming Y, Kuo-Hong L (1997) Shared authentication token secure against replay and weak key attacks. Inf Process Lett 62(2):77–80

    Google Scholar 

  • Toroyan T (2013) Global status report on road safety 2015 Supporting a decade of action. World Health Organization, Department of Violence and Injury Prevention and Disability, Geneva

    Google Scholar 

  • Wasef A, Lu R, Lin X, Shen X (2010) Complementing public key infrastructure to secure vehicular ad hoc networks. IEEE J Wirel Commun 17(5):22–28

    Google Scholar 

  • Wu B, Chen J, Wu J, Cardei M (2007) A survey of attacks and countermeasures in mobile ad-hoc networks. In: Wireless network security, pp 103–135

    Google Scholar 

  • Zeadally S, Hunt R, Chen Y-S, Irwin A, Hassan A (2012) Vehicular ad hoc Networks (VANETS): Status, results, and challenges. Telecommun Syst 50(4):217–241

    Article  Google Scholar 

Download references

Acknowledgments

This research was supported by the European Commission in the framework of Erasmus MUNDUS and within the project FUSION.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nimra Rehman Siddiqui .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing Switzerland

About this paper

Cite this paper

Siddiqui, N.R., Khaliq, K.A., Pannek, J. (2017). VANET Security Analysis on the Basis of Attacks in Authentication. In: Freitag, M., Kotzab, H., Pannek, J. (eds) Dynamics in Logistics. Lecture Notes in Logistics. Springer, Cham. https://doi.org/10.1007/978-3-319-45117-6_43

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-45117-6_43

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-45116-9

  • Online ISBN: 978-3-319-45117-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics