Advertisement

VANET Security Analysis on the Basis of Attacks in Authentication

  • Nimra Rehman Siddiqui
  • Kishwer Abdul Khaliq
  • Jürgen Pannek
Conference paper
Part of the Lecture Notes in Logistics book series (LNLO)

Abstract

Elevation of technology in hardware, software and communication have lead to an idea of Intelligent Vehicles, which communicate via Vehicular Ad hoc Networks (VANET) to provide road safety and improved driving conditions. In VANETs, both multi-cast and uni-cast routing is applicable. These protocols can be used by an attacker to breach and endanger the network by accessing and manipulating information of the vehicle and communicating data. As authentication allows to trust both user and data, it requires considerable attention in the security framework of VANETs. Here, we provide a classification of attacks on the basis of security requirements to narrow down the parameters of consideration and comparison of previously proposed protocols in VANET. Pointing out security gaps regarding distinct threats, the classification will allow to designed new secure network control methods.

Keywords

VANET IEEE 802.11p Authentication Security Attacks 

Notes

Acknowledgments

This research was supported by the European Commission in the framework of Erasmus MUNDUS and within the project FUSION.

References

  1. Agrawal A, Garg A, Chaudhiri N, Gupta S, Pandey D, Roy T (2013) Security on Vehicular Ad-hoc Networks (VANET): a review paper. Int J Emerg Technol Adv Eng 3(1)Google Scholar
  2. Akbar MS, Khaliq KA, Qayyum A (2014) Vehicular MAC Protocol Data Unit (V-MPDU): IEEE 802.11 p MAC protocol extension to support bandwidth hungry applications. In: Vehicular ad-hoc networks for smart cities. Springer, pp 31–39Google Scholar
  3. Akbar MS, Khan MS, Khaliq KA, Qayyum A, Yousaf M (2014) Evaluation of IEEE 802.11n for multimedia application in VANET. Proc Comput Sci 32:953–958CrossRefGoogle Scholar
  4. Al-Kahtani MS (2012) Survey on security attacks in Vehicular Ad hoc Networks (VANETs). In: Proceedings of the 6th International Conference on Signal Processing and Communication Systems (ICSPCS), pp 1–9Google Scholar
  5. Biswas S, Mišić J, Mišić V (2011) ID-based safety message authentication for security and trust in vehicular networks. In: Proceedings of the 31st International Conference On Distributed Computing Systems Workshops (ICDCSW), pp 323–331Google Scholar
  6. Čapkun S, Hamdi M, Hubaux J-P (2002) GPS-Free positioning in mobile ad hoc networks. Cluster Comput 5(2):157–167CrossRefGoogle Scholar
  7. Caruso A, Chessa A, De S, Urpi A (2005) GPS free coordinate assignment and routing in wireless sensor networks. In: Proceedings of the 24th annual joint conference of the IEEE Computer and Communications Societies (INFOCOM), pp 150–160Google Scholar
  8. Dötzer F, Fischer L, Magiera P (2005) Vars: a vehicle ad-hoc network reputation system. In: Proceedings of the 6th IEEE international symposium on a world of wireless mobile and multimedia networks, pp 454–456Google Scholar
  9. Douceur JR (2002) The Sybil attack. In: Peer-to-peer systems, pp 251–260Google Scholar
  10. Engoulou RG, Bellaïche M, Pierre S, Quintero A (2014) VANET security surveys. Comput Commun 44:1–13CrossRefGoogle Scholar
  11. Fuentes JMD, González-Tablas AI, Ribagorda A (2010) Overview of security issues in vehicular ad-hoc networksGoogle Scholar
  12. Golle P, Greene D, Staddon J (2004) Detecting and correcting malicious data in VANETs. In: Proceedings of the 1st ACM international workshop on vehicular ad hoc networks, pp 29–37Google Scholar
  13. Guo J, Baugh JP, Wang S (2007) A group signature based secure and privacy-preserving vehicular communication framework. Mob Netw Veh Environ 2007:103–108Google Scholar
  14. Harsch C, Festag A, Papadimitratos P (2007) Secure position-based routing for VANETs. In: Proceedings of the 66th IEEE Vehicular Technology Conference (VTC-2007), pp 26–30Google Scholar
  15. Hartenstein H, Laberteaux K (2009) VANET Vehicular Applications and Inter-networking TechnologiesGoogle Scholar
  16. Juwad M, Al-Raweshidy H (2008) Experimental performance comparisons between SAODV & AODV. In: Second Asia International Conference on Modeling & Simulation (AICMS 2008), pp 247–252Google Scholar
  17. Kamat P, Baliga A, Trappe W (2006) An identity-based security framework for VANETs. In: Proceedings of the 3rd international workshop on vehicular ad hoc networks, pp 94–95Google Scholar
  18. Kumar V, Mishra S, Chand N (2013) Applications of VANETs: present & future. Commun Netw 5(1):12CrossRefGoogle Scholar
  19. Lin X, Sun X, Ho P-H, Shen X (2007) GSIS: a secure and privacy-preserving protocol for vehicular communications. IEEE Trans Veh Technol 56(6):3442–3456CrossRefGoogle Scholar
  20. Lin X, Lu R (2015) Vehicular ad hoc network security and privacyGoogle Scholar
  21. Liu B, Zhong Y, Zhang S (2007) Probabilistic isolation of malicious vehicles in pseudonym changing VANETs. In: Proceedings of the 7th IEEE international conference on Computer and Information Technology (CIT-2007), pp 967–972Google Scholar
  22. Lu H, Li J, Guizani M (2012) A novel id-based authentication framework with adaptive privacy preservation for VANETs. In: Proceedings of the Computing, Communications and Applications Conference (ComComAp), pp 345–350Google Scholar
  23. Mokhtar B, Azab M (2015) Survey on security issues in vehicular ad-hoc networks. Alexandria Eng J 54(4):1115–1126CrossRefGoogle Scholar
  24. Nantulya VM, Reich MR (2002) The neglected epidemic: road traffic injuries in developing countries. Br Med J 324(7346):1139CrossRefGoogle Scholar
  25. Newsome J, Shi E, Song D, Perrig A (2004) The sybil attack in sensor nnetworks: analysis & defenses. In: Proceedings of the 3rd international symposium on information processing in sensor networks, pp 259–268Google Scholar
  26. Niranjan P, Srivastava P, Soni RK, Pratap R (2012) Detection of wormhole attack using hop-count and time delay analysis. Int J Sci Res Publ 2(4):1Google Scholar
  27. Papadimitratos P, Buttyan L, Holczer TS, Schoch E, Freudiger J, Raya M, Ma Z, Kargl F, Kung A, Hubaux J-P (2008) Secure vehicular communication systems: design and architecture. IEEE Commun Mag 46(11):100–109CrossRefGoogle Scholar
  28. Perrig A, Canetti R, Song D, Tygar JD (2001) Efficient and secure source authentication for multicast. In: Network and Distributed System Security Symposium. NDSS, vol 1, pp 35–46Google Scholar
  29. Qian Y, Moayeri N (2008) Design of secure and application-oriented VANETs. In: Proceedings of the 67th IEEE vehicular technology conference (VTC-2008), pp 2794–2799Google Scholar
  30. Raya M, Papadimitratos P, Hubaux J-P (2006) Securing vehicular communications. IEEE Wirel Commun Mag 13:8–15 Special Issue on Inter-Vehicular CommunicationsCrossRefGoogle Scholar
  31. Raya M, Hubaux J-P (2007) Securing vehicular ad hoc networks. J Comput Secur 15(1):39–68CrossRefGoogle Scholar
  32. Sakib RK, Reza B (2010) Security issues in VANET. Ph.D. dissertation, Department of Electronics and Communication Engineering, BRAC UniversityGoogle Scholar
  33. Sanzgiri K, Dahill B, Levine BN, Shields C, Royer EMB (2002) A secure routing protocol for ad hoc Networks. In: Proceedings of 10th IEEE international conference on network protocols, 2002, pp 78–87Google Scholar
  34. Sethi D, Mitis F (2013) Road traffic injuries. In: Successes and failures of health policy in Europe: four decades of divergent trends and converging challenges, p 215Google Scholar
  35. Sung-Ming Y, Kuo-Hong L (1997) Shared authentication token secure against replay and weak key attacks. Inf Process Lett 62(2):77–80Google Scholar
  36. Toroyan T (2013) Global status report on road safety 2015 Supporting a decade of action. World Health Organization, Department of Violence and Injury Prevention and Disability, GenevaGoogle Scholar
  37. Wasef A, Lu R, Lin X, Shen X (2010) Complementing public key infrastructure to secure vehicular ad hoc networks. IEEE J Wirel Commun 17(5):22–28Google Scholar
  38. Wu B, Chen J, Wu J, Cardei M (2007) A survey of attacks and countermeasures in mobile ad-hoc networks. In: Wireless network security, pp 103–135Google Scholar
  39. Zeadally S, Hunt R, Chen Y-S, Irwin A, Hassan A (2012) Vehicular ad hoc Networks (VANETS): Status, results, and challenges. Telecommun Syst 50(4):217–241CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2017

Authors and Affiliations

  • Nimra Rehman Siddiqui
    • 1
    • 3
  • Kishwer Abdul Khaliq
    • 1
    • 3
  • Jürgen Pannek
    • 2
    • 3
  1. 1.International Graduate School for Dynamics in LogisticsUniversität BremenBremenGermany
  2. 2.Department of Production EngineeringUniversität BremenBremenGermany
  3. 3.BIBA – Bremer Institut für Produktion und Logistik GmbHBremenGermany

Personalised recommendations