Advertisement

Security and Privacy Challenges in Vehicular Ad Hoc Networks

  • Muath ObaidatEmail author
  • Matluba Khodjaeva
  • Jennifer Holst
  • Mohamed Ben Zid
Chapter

Abstract

The steady increase in the number of vehicles on the roads comes with an increased number of accidents and fatalities. The manufacturers’ interest in providing services to the driver (customer), along with safety applications, have contributed to connecting vehicles in networks on the fly (i.e., Ad Hoc networks), to provide certain services and information to the driver. These Ad Hoc networks consist of mobile vehicles that are located in a certain geographical zone and within a certain radius of each other, and communicate with each other or with road side units (RSUs) over the wireless medium. In addition, these mobile vehicles share some common characteristic, e.g., driving direction. These networks are well known as Vehicular Ad Hoc Networks (VANETs). From the extensive adoption and development of Internet of Things (IoT), and the integration of and convergence between VANETs and IoT, has emerged a new type of network known as Internet of Vehicles (IoV). VANETs, IoV and Intelligent Transportation Systems (ITS) have witnessed an explosive growth over the past two decades. This growth and the wide gamut of applications and services, these systems and networks have also increased the threats and attacks against these networks as well as raised many security and privacy concerns. In this book chapter, we describe the need for security in VANETs in terms of security requirements, current challenges in securing VANETs and present current security issues related to these networks. In particular, we deliver a comprehensive and up-to-date summary of threats and attacks in VANETs. Additionally, we present proposed solutions and countermeasures to mitigate these threats and attacks in order to secure and defend VANETs against them.

Keywords

VANET Security Safety Attack Privacy Threat Countermeasure RSU Availability Authentication Integrity Non-repudiation Topology Mobility Key Encryption 

References

  1. 1.
    Obaidat M, Ali M, Shahwan I, Obeidat S, and Obaidat MS (2013) QoS-aware multipath communications over MANETs. J Netw (JNW) 8:26–36Google Scholar
  2. 2.
    Obaidat M, Ali M, Shahwan I, Obeidat S, Toce A (2014) Dynamic suppression broadcast scheme for vehicle adhoc networks (VANET). In: 10th international conference on wireless communications, networking and mobile computing (WiCOM 2014), Beijing, pp 589–592Google Scholar
  3. 3.
    Luckshetty A, Dontal S, Tangade S, Manvi SS (2016) A survey: comparative study of applications, attacks, security and privacy in VANETs. In: 2016 international conference on communication and signal processing (ICCSP), Melmaruvathur, 2016, pp 1594–1598Google Scholar
  4. 4.
    Abu Talib M, Abbas S, Nasir Q, Mowakeh MF (2018) Systematic literature review on Internet-of-Vehicles communication security. Int J Distrib Sens Netw 14(12)CrossRefGoogle Scholar
  5. 5.
    Alouache L, Nguyen N, Aliouat M, Chelouah R (2018) Survey on IoV routing protocols: security and network architecture. Int J Commun Syst, November 2018. WileyGoogle Scholar
  6. 6.
    Statista.com (2019) U.S. vehicle registrations 1990–2017. https://www.statista.com/statistics/183505/number-of-vehicles-in-the-united-states-since-1990/. Accessed May 2019
  7. 7.
    Statista.com (2018) Number of traffic-related fatalities in the United States 1975–2017. https://www.statista.com/statistics/191521/traffic-related-fatalities-in-the-united-states-since-1975/. Accessed May 2019
  8. 8.
    Abassi R (2019) VANET security and forensics: challenges and opportunities. WIREs Forensics Sci 1(2)Google Scholar
  9. 9.
    World Health Organization (2017) Global status report on road safety 2017. www.who.int/violence_injury_prevention/road_safety_status/report/en/. Accessed May 2019
  10. 10.
    Mejri MN, Ben-Othman J, Hamdi M (2014) Survey on VANET security challenges and possible cryptographic solutions. Veh Commun 1(2014):53–66. ElsevierGoogle Scholar
  11. 11.
    Ben Hamida E, Noura H, Znaidi W (2015) Security of cooperative intelligent transport systems: standards, threats analysis and cryptographic countermeasures. Electronics 4(3):380–423CrossRefGoogle Scholar
  12. 12.
    Ghori MR, Zamli KZ, Quosthoni N, Hisyam M, Montaser M (2018) Vehicular ad-hoc network (VANET): review. In: 2018 IEEE international conference on innovative research and development (ICIRD), Bangkok, 2018, pp 1–6Google Scholar
  13. 13.
    Mokhtar B, Azab M (2015) Survey on security issues in vehicular ad hoc networks. Alex Eng J 54:1115–1126. ElsevierGoogle Scholar
  14. 14.
    Al-Sultan S, Al-Doori M, Al-Bayatti A, Zedan H (2014) A comprehensive survey on vehicular ad hoc network. J Netw Comput Appl 37(2014):380–392. ElsevierCrossRefGoogle Scholar
  15. 15.
    Boualouache A, Senouci S, Moussaoui S (2018) A survey on pseudonym changing strategies for vehicular ad-hoc networks. IEEE Commun Surv Tutor 20(1):770–790. Firstquarter 2018CrossRefGoogle Scholar
  16. 16.
    Begum R, Prasad K (2016) A survey on VANETs applications and its challenges. In: International conference on advanced computer science and software engineering (ICACSSE), 2016, pp 1–7Google Scholar
  17. 17.
    Ayoub T, Mazri T (2018) Security challenges in V2I architectures and proposed solutions. In: IEEE 5th international congress on information science and technology (CiSt), Marrakech, 2018, pp 594–599Google Scholar
  18. 18.
    Dai Nguyen HP, Zoltán R (2018) The current security challenges of vehicle communication in the future transportation system. In: 2018 IEEE 16th international symposium on intelligent systems and informatics (SISY), Subotica, 2018, pp 161–166Google Scholar
  19. 19.
    Kumar DA, Bansal M (2017) A review on VANET security attacks and their countermeasure. In: 2017 4th international conference on signal processing, computing and control (ISPCC), Solan, 2017, pp 580–585Google Scholar
  20. 20.
    Lu Z, Qu G, Liu Z (2019) A survey on recent advances in vehicular network security, trust, and privacy. IEEE Trans Intell Transp Syst 20(2):760–776CrossRefGoogle Scholar
  21. 21.
    Asuquo P, Cruickshank H, Morley J, Anyigor O, Chibueze P, Lei A, Hathal W, Bao S, Sun Z (2018) Security and privacy in location-based services for vehicular and mobile communications: an overview, challenges, and countermeasures. IEEE Internet Things J 5(6):4778–4802CrossRefGoogle Scholar
  22. 22.
    Tangade SS, Manvi SS (2013) A survey on attacks, security and trust management solutions in VANETs. In: 2013 fourth international conference on computing, communications and networking technologies (ICCCNT), Tiruchengode, 2013, pp 1–6Google Scholar
  23. 23.
    Salagar PG, Tangade SS (2015) A survey on security in VANETs. Int J Technol Res Eng 2(7)Google Scholar
  24. 24.
    Al-ani R, Zhou B, Shi Q, Sagheer A (2018) A survey on secure safety applications in VANET. In: 2018 IEEE 20th international conference on high performance computing and communications; IEEE 16th international conference on smart city; IEEE 4th international conference on data science and systems (HPCC/SmartCity/DSS), Exeter, United Kingdom, 2018, pp 1485–1490Google Scholar
  25. 25.
    Kaura N, Kad S (2016) A review on security related aspects in vehicular ad hoc networks. Procedia Comput Sci J 78:387–394  CrossRefGoogle Scholar
  26. 26.
    Sumra A, Hasbullah H, Manan JA (2011) VANET security research and development ecosystem. In: National postgraduate conference, Kuala Lumpur, 2011, pp 1–4Google Scholar
  27. 27.
    Hasrouny H, Samhat A, Bassil C, Laouiti A (2017) VANet security challenges and solutions: a survey. Veh Commun 7(2017):7–20. ElsevierCrossRefGoogle Scholar
  28. 28.
    Rawat DB, Bista B, Yan G (2016) Securing vehicular ad-hoc networks from data falsification attacks. In: IEEE region 10 conference (TENCON), Singapore, 2016, pp 99–102Google Scholar
  29. 29.
    Elsadig MA, Fadlalla YA (2016) VANETs security issues and challenges: a survey. Indian J Sci Technol 9(28):2016Google Scholar
  30. 30.
    Markey EJ (2014) Tracking & hacking: security & privacy gaps put American drivers at risk. US Senate, 2015Google Scholar
  31. 31.
    Kelarestaghi KB, Foruhandeh M, Heaslip K, Gerdes R (2019) Intelligent transportation system security: impact-oriented risk assessment of in-vehicle networks. IEEE Intell Transp Syst MagGoogle Scholar
  32. 32.
    Engoulou RG, Bellaïche M, Pierre S, Quintero A (2014) VANET security surveys. J Comput Commun 44(2014):1–13. ElsevierCrossRefGoogle Scholar
  33. 33.
    Tanwar S, Vora J, Tyagi S, Kumar N, Obaidat MS (2018) A systematic review on security issues in vehicular ad hoc network. Secur Priv 1(5). September/October 2018Google Scholar
  34. 34.
    Jana B, Mitra S, Poray J (2016) An analysis of security threats and countermeasures in VANET. In: 2016 international conference on computer, electrical & communication engineering (ICCECE), 2016, pp 1–6Google Scholar
  35. 35.
    Sirola P, Joshi A, Purohit KC (2014) An analytical study of routing attacks in VANETs. Int J Comput Sci Eng (IJCSE) 3Google Scholar
  36. 36.
    Kaur R, Singh TP, Khajuria V (2018) Security issues in vehicular ad-hoc network (VANET). In: 2nd international conference on trends in electronics and informatics (ICOEI), Tirunelveli, 2018, pp 884–889Google Scholar
  37. 37.
    Al-Raba’nah Y, Al-Refai M (2016) Toward secure vehicular ad hoc networks an overview and comparative study. J Comput Commun 4:12–27CrossRefGoogle Scholar
  38. 38.
    Qu F, Wu Z, Wang F, Cho W (2015) A security and privacy review of VANETs. IEEE Trans Intell Transp Syst 16(6):2985–2996CrossRefGoogle Scholar
  39. 39.
    Sun Y, Wu L, Wu S, Li S, Zhang T, Zhang L, Xu J, Xiong Y (2015) Security and privacy in the internet of vehicles. In: International conference on identification, information, and knowledge in the internet of things (IIKI), Beijing, 2015, pp 116–121Google Scholar
  40. 40.
    Kim Y, Kim I (2013) Security issues in vehicular networks. In: The international conference on information networking 2013 (ICOIN), Bangkok, 2013, pp 468–472Google Scholar
  41. 41.
    Chaubey NK (2016) Security analysis of vehicular ad hoc networks (VANETs): a comprehensive study. Int J Secur Appl 10(5):261–274CrossRefGoogle Scholar
  42. 42.
    Abdelgader AMS, Shu F, Zhu W, Ayoub K (2017) Security challenges and trends in vehicular communications. In: IEEE conference on systems, process and control (ICSPC), Malacca, 2017, pp 105–110Google Scholar
  43. 43.
    Vaibhava A, Shuklab D, Dasc S, Sahanad S, Johrie P (2017) Security challenges, authentication, application and trust models for vehicular ad hoc network—a survey. Int J Wirel Microw Technol 3:36–48CrossRefGoogle Scholar
  44. 44.
    Samara G, Al-Salihy WAH, Sures R (2010) Security analysis of vehicular ad hoc networks (VANET). In: 2010 Second international conference on network applications, protocols and services, Kedah, 2010, pp 55–60Google Scholar
  45. 45.
    Riley M, Akkaya K, Fong K (2011) A survey of authentication schemes for vehicular ad hoc networks. Secur Commun Netw 4(10):1137–1152CrossRefGoogle Scholar
  46. 46.
    Shahid MA, Jaekel A, Ezeife C, Al-Ajmi Q, Saini I (2018) Review of potential security attacks in VANET. In: Majan international conference (MIC), Muscat, 2018, pp 1–4Google Scholar
  47. 47.
    Mishra R, Singh A, Kumar R (2016) VANET security: issues, challenges and solutions. In: International conference on electrical, electronics, and optimization techniques (ICEEOT), 2016Google Scholar
  48. 48.
    Dhamgaye A, Chavhan N (2013) Survey on security challenges in VANET. Int J Comput Sci Netw (IJCSN) 2(1)Google Scholar
  49. 49.
    Azees M, Vijayakumar P, Deborah LJ (2016) Comprehensive survey on security services in vehicular ad-hoc networks. IET Intell Transp Syst J 10(6):379–388CrossRefGoogle Scholar
  50. 50.
    Sarencheh A, Asaar M R, Salmasizadeh M, Aref MR (2017) An efficient cooperative message authentication scheme in vehicular ad-hoc networks. In: 2017 14th international ISC (Iranian Society of Cryptology) conference on information security and cryptology (ISCISC), Shiraz, 2017, pp 111–118Google Scholar
  51. 51.
    Kumar A, Sinha M (2014) Overview on vehicular ad hoc network and its security issues. In: International conference on computing for sustainable global development (INDIACom), New Delhi, 2014, pp 792–797Google Scholar
  52. 52.
    Nguyen HPD, Zoltán R (2018) The current security challenges of vehicle communication in the future transportation system. In: IEEE 16th international symposium on intelligent systems and informatics, SISY 2018, September 13–15, 2018, Subotica, SerbiaGoogle Scholar
  53. 53.
    Amoozadeh M, Raghuramu A, Chuah C, Ghosal D, Zhang HM, Rowe J, Levitt K (2015) Security vulnerabilities of connected vehicle streams and their impact on cooperative driving. IEEE Commun Mag 53(6):126–132CrossRefGoogle Scholar
  54. 54.
    Sun Y, Wu L, Wu S, Li S, Zhang T, Zhang L, Xu J, Xiong Y, Cui X (2017) Attacks and countermeasures in the internet of vehicles. Ann Telecommun 72:283–295CrossRefGoogle Scholar
  55. 55.
    Le V, Hartog J, Zannone N (2018) Security and privacy for innovative automotive applications: a survey. Comput Commun 132:17–41CrossRefGoogle Scholar
  56. 56.
    Bariah L, Shehada D, Salahat E, Yeun CY (2015) Recent advances in VANET security: a survey. In: IEEE 82nd vehicular technology conference (VTC2015-Fall), Boston, MA, 2015, pp 1–7Google Scholar
  57. 57.
    Wazid M, Das AK, Kumar N, Odelu V, Reddy AG, Park K, Park Y (2017) Design of lightweight authentication and key agreement protocol for vehicular ad hoc networks. IEEE Access 5:14966–14980CrossRefGoogle Scholar
  58. 58.
    Kumar N, Preet Singh J, Bali RS, Misra S, Ullah S (2015) An intelligent clustering scheme for distributed intrusion detection in vehicular cloud computing. Clust Comput 18(3):1263–1283CrossRefGoogle Scholar
  59. 59.
    Jacobs S (2015) Optimizing cryptographically based security in wireless networks. In: International conference on information systems security and privacy (ICISSP), 2015, pp 39–45Google Scholar
  60. 60.
    Smitha, A, Pai MM, Ajam N, Mouzna J (2013) An optimized adaptive algorithm for authentication of safety critical messages in Vanet. In: Proceedings of the IEEE 2013 8th international ICST conference on communications and networking in China (CHINACOM), Guilin, China, 14–16 August 2013, pp 149–154Google Scholar
  61. 61.
    Zhang C, Lin X, Lu R, Ho PH (2008) RAISE: An efficient RSU-aided message authentication scheme in vehicular communication networks. In: Proceedings of the IEEE international conference on communications, 2008. IEEE, pp 1451–1457Google Scholar
  62. 62.
    Perrig A, Canetti R, Tygar JD, Song D (2002) The TESLA broadcast authentication protocol. RSA Lab 5(2):2002Google Scholar
  63. 63.
    Studer A, Bai F, Bellur B, Perrig A (2009) Flexible, extensible, and efficient VANET authentication. J Commun Netw 11(6):574–588CrossRefGoogle Scholar
  64. 64.
    Sanzgiri K, Dahill B, Levine BN, Shields C, Belding-Royer EM (2002) A secure routing protocol for ad hoc networks. In: Proceeding of IEEE ICNP 2002, November 2002, pp 78–87Google Scholar
  65. 65.
    Manvi SS, Kakkasageri MS, Adiga DG (2009) Message authentication in vehicular ad hoc networks: ECDSA based approach. In: International conference on future computer and communication, 2009, pp 16–20Google Scholar
  66. 66.
    Chen IC, Wang X, Han W, Zang B (2009) A robust detection of the Sybil attack in urban VANETs. In: Distributed computing systems workshop, ICDCS workshops ’09. 29th IEEE international conference, 2009, pp 270–276Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Muath Obaidat
    • 1
    Email author
  • Matluba Khodjaeva
    • 1
  • Jennifer Holst
    • 1
  • Mohamed Ben Zid
    • 1
  1. 1.Center for Cybercrime StudiesJohn Jay College of Criminal Justice of the City University of New YorkNew YorkUSA

Personalised recommendations