Share This Article:

Review of the Security Issues in Vehicular Ad Hoc Networks (VANET)

Abstract Full-Text HTML XML Download Download as PDF (Size:1429KB) PP. 552-566
DOI: 10.4236/ijcns.2015.813050    4,817 Downloads   6,139 Views   Citations

ABSTRACT

There is a significant increase in the rates of vehicle accidents in countries around the world and also the casualties involved ever year. New technologies have been explored relating to the Vehicular Ad Hoc Network (VANET) due to the increase in vehicular traffic/congestions around us. Vehicular communication is very important as technology has evolved. The research of VANET and development of proposed systems and implementation would increase safety among road users and improve the comfort for the corresponding passengers, drivers and also other road users, and a great improvement in the traffic efficiency would be achieved. This research paper investigates the current and existing security issues associated with the VANET and exposes any slack amongst them in order to lighten possible problem domains in this field.

Conflicts of Interest

The authors declare no conflicts of interest.

Cite this paper

Sari, A. , Onursal, O. and Akkaya, M. (2015) Review of the Security Issues in Vehicular Ad Hoc Networks (VANET). International Journal of Communications, Network and System Sciences, 8, 552-566. doi: 10.4236/ijcns.2015.813050.

References

[1] Kadum, A. (2013) A Survey on Vehicular Ad Hoc and Sensor Networks (VASNET).
[2] Sari, A. and Necat, B. (2012) Securing Mobile Ad Hoc Networks against Jamming Attacks through Unified Security Mechanism. International Journal of Ad Hoc, Sensor & Ubiquitous Computing, 3, 79-94.
http://dx.doi.org/10.5121/ijasuc.2012.3306
[3] Sari, A. (2015) Lightweight Robust Forwarding Scheme for Multi-Hop Wireless Networks. International Journal of Communications, Network and System Sciences, 8, 19-28.
http://dx.doi.org/10.4236/ijcns.2015.83003
[4] Sivasakthi, M. and Suresh, S. (2013) Research on Vehicular Ad Hoc Networks (VANETs): An Overview. Journal of Applied Sciences and Engineering Research, 2, 23-27.
[5] Sari, A. (2014) Security Issues in RFID Middleware Systems: A Case of Network Layer Attacks: Proposed EPC Implementation for Network Layer Attacks. Transactions on Networks & Communications, Society for Science and Education, United Kingdom, 2, 1-6.
[6] (2011) Vehicular Ad Hoc and Sensor Networks—Principles and Challenges. International Journal of Ad Hoc, Sensor & Ubiquitous Computing (IJASUC), 2.
[7] Li, F. and Wang, Y. (2007) Routing in Vehicular Ad Hoc Networks: A Survey. IEEE Vehicular Technology Magazine, 2, 12-22.
[8] Sari, A. and Necat, B. (2012) Impact of RTS Mechanism on TORA and AODV Protocol’s Performance in Mobile Ad Hoc Networks. International Journal of Science and Advanced Technology, 2, 188-191.
[9] Li, F. and Wang, Y. (2007) Routing in Vehicular Ad Hoc Networks: A Survey. IEEE of Vehicular Technology Magazine, 2, 12-22.
http://dx.doi.org/10.1109/MVT.2007.912927
[10] Saha, A.K. and Johnson, D.B. (2004) Modelling Mobility for Vehicular Ad Hoc Networks. ACM International Workshop on Vehicular Ad Hoc Networks, Philedelphia, 91-92.
[11] Sari, A. (2014) Security Approaches in IEEE 802.11 MANET—Performance Evaluation of USM and RAS. International Journal of Communications, Network, and System Sciences, 7, 365-372.
http://dx.doi.org/10.4236/ijcns.2014.79038
[12] Manvi, S.S., Kakkasageri, M.S. and Mahapurush, C.V. (2009) Performance Analysis of AODV, DSR, and Swarm Intelligence Routing Protocols in Vehicular Ad Hoc Network Environment. International Conference on Future Computer and Communication, Kuala Lumpar, 3-5 April 2009, 21-25.
[13] Sari, A. and Rahnama, B. (2013) Addressing Security Challenges in WiMAX Environment. Proceedings of the 6th International Conference on Security of Information and Networks (SIN ’13). Aksaray, 26-28 November 2013, 454-456.
http://dx.doi.org/10.1145/2523514.2523586
[14] Sari, A. and Rahnama, B. (2013) Simulation of 802.11 Physical Layer Attacks in MANET. 2013 5th International Conference on Computational Intelligence, Communication Systems and Networks (CICSyN), Madrid, 5-7 June 2013, 334-337.
http://dx.doi.org/10.1109/cicsyn.2013.79
[15] Bernsen, J. and Manivannan, D. (2008) Routing Protocols for Vehicular Ad Hoc Networks That Ensure Quality of Service. The 4th International Conference on Wireless and Mobile Communications, Athens, 27 July-1 August 2008, 1-6.
http://dx.doi.org/10.1109/icwmc.2008.15
[16] Taleb, T., Sakhaee, E., Jamalipour, A., Hashimoto, K., Kato, N. and Nemoto, Y. (2007) A Stable Routing Protocol to Support ITS Services in VANET Networks. IEEE Transactions on Vehicular Technology, 56, 3337-3347.
http://dx.doi.org/10.1109/TVT.2007.906873
[17] Sari, A. (2014) Economic Impact of Higher Education Institutions in a Small Island: A Case of TRNC. Global Journal of Sociology, 4, 41-45.
[18] Hartenstein, H. and Laberteaux, K.P. (2008) A Tutorial Survey on Vehicular Ad Hoc Networks. IEEE Communication Magazine, 46, 164-171.
[19] Sari, A. and Onursal, O. (2013) Role of Information Security in E-Business Operations. International Journal of Information Technology and Business Management, 3, 90-93.
[20] Eichler, S., Ostermaier, B., Schroth, C. and Kosch, T. (2005) Simulation of Car-to-Car Messaging: Analyzing the Impact on Road Traffic. IEEE ASCOTS, 507-510.
[21] Sari, A. (2015) Two-Tier Hierarchical Cluster Based Topology in Wireless Sensor Networks for Contention Based Protocol Suite. International Journal of Communications, Network and System Sciences, 8, 29-42.
http://dx.doi.org/10.4236/ijcns.2015.83004
[22] Sari, A. (2015) A Review of Anomaly Detection Systems in Cloud Networks and Survey of Cloud Security Measures in Cloud Storage Applications. Journal of Information Security, 6, 142-154.
http://dx.doi.org/10.4236/jis.2015.62015
[23] Obasuyi, G. and Sari, A. (2015) Security Challenges of Virtualization Hypervisors in Virtualized Hardware Environment. International Journal of Communications, Network and System Sciences, 8, 260-273.
http://dx.doi.org/10.4236/ijcns.2015.87026
[24] Gerlach, M. (2006) Full Paper: Assessing and Improving Privacy in VANETs.
http://citeseerx.ist.psu.edu/viewdoc/download;jsessionid=84FC4EF0852B23FBF15CF35E16E0450D?doi=10.1.1.84.8167&rep=rep1&type=pdf
[25] Dahiya, A. and Chauhan, R. (2010) A Comparative Study of MANET and VANET Environment. Journal of Computing, 2.
[26] Sesay, S., Yang, Z. and He, J.H. (2004) A Survey on Mobile Ad Hoc Network. Information Technology Journal, 3, 168-175.
http://dx.doi.org/10.3923/itj.2004.168.175
[27] Rahnama, B., Sari, A. and Makvandi, R. (2013) Countering PCIe Gen. 3 Data Transfer Rate Imperfection Using Serial Data Interconnect. 2013 International Conference on Technological Advances in Electrical, Electronics and Computer Engineering (TAEECE), Konya, 9-11 May 2013, 579-582.
http://dx.doi.org/10.1109/TAEECE.2013.6557339
[28] Toor, Y., Muhlethaler, P. and Laouiti, A. (2008) Vehicle Ad Hoc Networks: Applications and Related Technical Issues. IEEE Communications Surveys & Tutorials, 10, 74-88.
http://dx.doi.org/10.1109/comst.2008.4625806
[29] Sari, A., Rahnama, B. and Caglar, E. (2014) Ultra-Fast Lithium Cell Charging for Mission Critical Applications. Transactions on Machine Learning and Artificial Intelligence, 2, 11-18.
http://dx.doi.org/10.14738/tmlai.25.430
[30] Hu, Y.-C. and Laberteaux, K. (2006) Strong Security on a Budget. Wksp. Embedded Security for Cars.
http://www.laberteaux.org/papers/vanet08-epidemic.pdf
[31] Raya, M. and Hubaux, J. (2005) The Security of Vehicular Ad Hoc Networks. Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2005), Alexandria, 7-10 November 2005, 11-21.
http://dx.doi.org/10.1145/1102219.1102223
[32] Robinson, C.L., Caminiti, L., Caveney, D. and Laberteaux, K. (2006) Efficient Coordination and Transmission of Data for Cooperative Vehicular Safety Applications. In VANET’06: Proceedings of the 3rd International Workshop on Vehicular Ad Hoc Networks, New York, 10-19.
[33] Sari, A. and Mahmutoglu, H. (2013) Potential Issues and Impacts of ICT Applications through Learning Process in Higher Education. Procedia—Social and Behavioral Sciences, 89, 585-592.
http://dx.doi.org/10.1016/j.sbspro.2013.08.899
[34] Aijaz, A., Bochow, B., Dotzer, F., Festag, A., Gerlach, M., Kroh, R., et al. (2006) Attacks on Inter-Vehicle Communication Systems—An Analysis. International Workshop on Intelligent Transportation, Hamburg, 189-194.
[35] Buttyan, L. and Hubaux, J.-P. (2001) Nuglets: A Virtual Currency to Stimulate Cooperation in Self-Organized Mobile Ad Hoc Networks. Swiss Federal Institute of Technology, Laussane.
[36] Sari, A. (2012) Impact of Determinants on Student Performance towards Information Communication Technology in Higher Education. International Journal of Learning and Development, 2, 18-30.
http://dx.doi.org/10.5296/ijld.v2i2.1371
[37] Callandriello, G., Papadimitratos, P., Lloy, A. and Hubaux, J.-P. (2007) Efficient and Robust Pseudonymous Authentication in VANET. International Workshop on Vehicular Ad Hoc Networks, Montreal, 9-14 September 2007, 19-28.
[38] Boneh, D. and Shacham, H. (2004) Group Signatures with Verifier-Local Revocation. Proceedings of the 11th ACM Conference on Computer and Communications Security, Washington DC, 25-29 October 2004, 168-177.
http://dx.doi.org/10.1145/1030083.1030106
[39] Armstrong Consulting Inc. (n.d.). Dedicated Short Range Communications (DSRC) Home. Retrieved October 2009.
http://www.leearmstrong.com/DSRC/DSRCHomeset.htm
[40] Sakib, R.K. and Reza, B. (2010) Security Issues in VANET.
[41] de Fuentes, J.M., González-Tablas, A.I. and Ribagorda, A. (2010) Overview of Security Issues in Vehicular Ad-Hoc Networks.
[42] Harsch, C., Festag, A. and Papadimitratos, P. (2007) Secure Position-Based Routing for VANETs. Proceedings of IEEE 66th Vehicular Technology Conference, VTC-2007, Baltimore, 30 September-3 October 2007, 26-30.
http://dx.doi.org/10.1109/vetecf.2007.22
[43] Sari, A. (2014) Influence of ICT Applications on Learning Process in Higher Education. Procedia—Social and Behavioral Sciences, 116, 4939-4945.
http://dx.doi.org/10.1016/j.sbspro.2014.01.1053
[44] Sun, S., Kim, J., Jung, Y. and Kim, K. (2009) Zone-Based Greedyperimeter Stateless Routing for VANET. Proceedings of International Conference on Information Networking, ICOIN 2009, Chiang Mai, 21-21 January 2009, 1-3.
[45] Yu, D. and Ko, Y.-B. (2009) FFRDV: Fastest-Ferry Routing in DTN-Enabled Vehicular Ad Hoc Networks. Proceedings of 11th International Conference on Advanced Communication Technology, 2, 1410-1414.
[46] Ali, S. and Bilal, S. (2009) An Intelligent Routing Protocol for VANETs in City Environments. Proceedings of 2nd International Conference on Computer, Control and Communication, IC4 2009, Karachi, 17-18 February 2009, 1-5.
http://dx.doi.org/10.1109/ic4.2009.4909249
[47] Yang, J. and Fei, Z. (2013) Broadcasting with Prediction and Selective Forwarding in Vehicular Networks. International Journal of Distributed Sensor Networks, 2013, Article ID: 309041.
http://dx.doi.org/10.1155/2013/309041
[48] Chen, W., Guha, R.K., Taek, J.K., Lee, J. and Hsu, I.Y. (2008) A Survey and Challenges in Routing and Data Dissemination in Vehicular Ad-Hoc Networks. Proceedings of the IEEE International Conference on Vehicular Electronics and Safety (ICVES ’08), Columbus, 22-24 September 2008, 328-333.
[49] Wahid, A., Yoo, H. and Kim, D. (2010) Unicast Geographic Routing Protocols for Inter-Vehicle Communications: A Survey. Proceedings of the 5th ACM Workshop on Performance Monitoring and Measurement of Heterogeneous Wireless and Wire Networks (PM2HW2N ’10), Bodrum, 17-21 October 2010, 17-24.
http://dx.doi.org/10.1145/1868612.1868616
[50] Moustafa, H. and Zhang, Y. (2009) Vehicular Networks: Techniques, Standards, and Applications. CRC Press, Boca Raton.
http://dx.doi.org/10.1201/9781420085723
[51] https://www.academia.edu/8721918/VANET_Vehicle_Ad_hoc_Networks
[52] http://en.wikipedia.org/wiki/OSImodel
[53] Hartenstein, H. and Laberteaux, K. (2010) VANET-Vehicular Applications and Inter-Networking Technologies. John Wiley & Sons, Hoboken.
[54] Maier, M.W., Emery, D. and Hilliard, R. (2004) ANSI/IEEE 1471 and Systems Engineering. Systems Engineering, 7, 257-270.
http://dx.doi.org/10.1002/sys.20008
[55] https://en.wikipedia.org/wiki/IEEE_802.11p
[56] Kosch, T., Schroth, C., Strassberger, M. and Bechler, M. (2012) Automotive Internetworking. Wiley, New York.
http://dx.doi.org/10.1002/9781119944737

  
comments powered by Disqus

Copyright © 2019 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.