Security Issues in Vehicular Ad Hoc Networks for Evolution Towards Internet of Vehicles

  • Atanu Mondal
  • Sulata MitraEmail author


This chapter elaborates on the security issues of vehicular communication as a need for future evolution of Vehicular Ad Hoc NETworks (VANET) towards the Internet of Vehicles (IoV). The communication between connected vehicles is a potential issue of concern with respect to road safety, detecting traffic accidents, etc. in vehicular Ad Hoc network. In the Internet of Vehicles paradigm, each vehicle is equipped with a powerful multi-sensor platform, communication technologies, computation units, IP-based connectivity to the Internet and to other vehicles for enabling communication between connected vehicles as well as between vehicles and roads. Such communication must be protected from unauthorized message injection and message alteration. Hence a robust security solution for such networks must facilitate authentication verification of vehicles and integrity verification of the disseminated messages. In the first part of this chapter, a lightweight scheme for identification, authentication, and tracking of vehicles in hierarchical vehicular Ad Hoc network is elaborated. In the second part, a low overhead digital watermark-based vehicle revocation scheme to identify and revoke attackers of disseminated message is discussed. The combination of these two schemes ensures secure inter vehicle communication in vehicular Ad Hoc networks.


IoT IoV VANET MANET IVC Vehicle identification Vehicle authentication VIN Vehicle revocation 


  1. 1.
    Mondal A, Mitra S (2012) Identification, authentication and tracking algorithm for vehicles using VIN in centralized VANET. In: International conference of communication, network and computing (CNC), proceedings. LNICST, vol 108. Springer, Berlin, pp 115–120. ISBN no. 978-3-642-35614-8Google Scholar
  2. 2.
    Mitra S, Mondal A (2012) Identification, authentication and tracking algorithm for vehicles using VIN in distributed VANET. In: International conference on advances in computing, communications and informatics (ICACCI), proceedings. ACM digital library, pp 279–286. ISBN no. 978-1-4503-1196-0Google Scholar
  3. 3.
    Mondal A, Mitra S (2018) Extending security horizon through identification authentication and tracking services in hierarchical vehicular networks. Int J Comput Electr Eng 69:479–496. ElsevierGoogle Scholar
  4. 4.
    Mondal A, Mitra S (2019) LoWVR: low overhead watermark based vehicle revocation scheme in VANET. Int J Sens Wirel Commun Control 9(1):2019Google Scholar
  5. 5.
    Fan CI, Sun WZ, Huang SW, Juang WS Huang JJ (2014) Strongly privacy preserving communication protocol for VANETs. In: 9th Asia joint conference on information security, pp 119–26Google Scholar
  6. 6.
    Moses SJ, Angelin PAC (2013) Enhancing the privacy through pseudonymous authentication and conditional communication in VANETs. J Eng Sci 2(7):45–49Google Scholar
  7. 7.
    Liu Y, Wang L, Chen H (2014) Message authentication using proxy vehicles in vehicular ad hoc networks. IEEE Trans Veh Technol 64(8):3697–3710CrossRefGoogle Scholar
  8. 8.
    Fulewar VV, Dorle S (2014) A scheme for authentication with multiple levels of anonymity in vehicular communication. J ResComput CommunTechnol 3(4):550–555Google Scholar
  9. 9.
    Dolev S, Krzywiecki L, Panwar N, Segal M (2014) Dynamic attribute based vehicle authentication. In: IEEE international symposium on network computing and applications, pp 1–8Google Scholar
  10. 10.
    Ashritha M, Sridhar CS (2015) RSU based efficient vehicle authentication mechanism for VANETs. In: IEEE international conference on intelligent systems and control, pp 1–5Google Scholar
  11. 11.
    Lee KH, Kim SK (2015) Authentication scheme based on biometric key for VANET information system in M2 M application service. Appl Math Inf Sci 9:645–651Google Scholar
  12. 12.
    Bharat M, Sree KS, Kumar TM (2014) Authentication solution for security attacks in VANETs. Int J Adv Res Comput Commun Eng 3(8):7661–7664Google Scholar
  13. 13.
    Caballero-Gil P, Fernandez FM, Caballero-Gil C (2014) Tree-based revocation for certificate less authentication in vehicular ad hoc network. Int J Comput Commun 2:14–21CrossRefGoogle Scholar
  14. 14.
    Abdulhussain SH (2013) Enhanced management of certificate caching and revocation lists in VANET. Int J Comput Appl 83(12)Google Scholar
  15. 15.
    Kenney JB (2011) Dedicated short-range communications (DSRC) standards in the United States. IEEE SAE Stand Wirel Access Veh Environ (WAVE) 99(7):1162–1182CrossRefGoogle Scholar
  16. 16.
    Hess KM, Orthmann CH, Cho HL (2013) Criminal investigation, 11 edn. Cengage Learning. ISBN: 978-1-285-86261-3, 2013Google Scholar
  17. 17.
    Xiao Y, Li J, Pan Y (2005) Security and routing in wireless networks. In: Wireless network mobile computing. Nova science publishers, New York; E-Publishing IncGoogle Scholar
  18. 18.
    Kahate A. Cryptography and network security, 3rd edn. McGrill education (India) Pvt. Ltd, India. 013Google Scholar
  19. 19.
    Vehicle identification number (2016). Accessed 31 Mar 2016
  20. 20.
  21. 21.
    Mondal A, Mitra S (2016) TDHA: a timestamp defined hash algorithm for message authentication in VANET. In: International conference on computational modeling and security (CMS), proceedings. Elsevier (Proc Comput Sci J), pp 182–189. ISSN: 1877-0509Google Scholar
  22. 22.
    Chaurasia BK, Verma S (2011) Infrastructure based authentication in VANETs. J Multimed Ubiquitous Eng 6(2)Google Scholar
  23. 23.
    Kim SH, Lee IY (2014) A secure and efficient vehicle-to-vehicle communication scheme using bloom filter in VANETs. Int J Secur Appl 8(2):9–24CrossRefGoogle Scholar
  24. 24.
    Hassnawi LA, Ahmad RB, Salih MH, Warip MNM,Elshaikh M (2014) Measurement study on packet size and packet effects over vehicular ad hoc network performance. J Theoret Appl Inf Technol 70(3):475–481Google Scholar
  25. 25.

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Ramakrishna Mission VidyamandiraHowrahIndia
  2. 2.Department of Computer Science and TechnologyIndian Institute of Engineering, Science and TechnologyShibpur, HowrahIndia

Personalised recommendations