Skip to main content

Information Security Risk Analysis of Vehicular Ad Hoc Networks

  • Conference paper
  • First Online:
Mobile Networks and Management (MONAMI 2016)

Abstract

The main purpose of VANETs is to improve road safety and to provide passengers’ comfort. Thus, information security is one of the most important issue which attracts researchers’ attention due to its open access environment. VANET requires high degree of reliability with an acceptable risk, that develops the trust between the system and users. The risk management is an essential method whose main objective is to advise and determine the appropriate actions as well as priorities to ensure information security. In this paper, we aim to apply the ISO/IEC 27005 Standard - Information Security Risk Management - on VANETs in order to classify and mitigate risks in this technology. Our contribution is an essential process that will help researchers to propose adequate solutions against the attacks in VANET based on classification results.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    ITIL: http://www.itilfrance.com/.

References

  1. Sumra, I.A., Hasbullah, H.B., AbManan, J.B.: Attacks on security goals (confidentiality, integrity, availability) in VANET: a survey. In: Laouiti, A., Qayyum, A., Mohamad Saad, M.N. (eds.) Vehicular Ad-hoc Networks for Smart Cities. AISC, vol. 306, pp. 51–61. Springer, Heidelberg (2015). doi:10.1007/978-981-287-158-9_5

    Google Scholar 

  2. Tyagi, P., Dembla, D.: Investigating the security threats in vehicular ad hoc networks (VANETs): towards security engineering for safer on-road transportation. In: 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 2084–2090. IEEE (2014)

    Google Scholar 

  3. Malla, A.M., Sahu, R.K.: Security attacks with an effective solution for dos attacks in VANET. Int. J. Comput. Appl. 66(22), 45–49 (2013)

    Google Scholar 

  4. Hamida, E.B., Noura, H., Znaidi, W.: Security of cooperative intelligent transport systems: standards, threats analysis and cryptographic countermeasures. Electronics 4(3), 380–423 (2015)

    Article  Google Scholar 

  5. Hussain, R., Oh, H.: On secure and privacy-aware sybil attack detection in vehicular communications. Wirel. Pers. Commun. 77(4), 2649–2673 (2014)

    Article  Google Scholar 

  6. Ali Mohammad, M., Pouyan, A.A.: Defense mechanisms against sybil attack in vehicular ad hoc network. Secur. Commun. Netw. 8(6), 917–936 (2015)

    Article  Google Scholar 

  7. Malebary, S., Xu, W.: A survey on jamming in VANET. Int. J. Sci. Res. Innovative Technol. 2, 142–156 (2015)

    Google Scholar 

  8. ISO/IEC 2700x Family (2016). http://www.iso.org/

  9. ISO/IEC, ISO/IEC 27005, Information technology - Security techniques - Information security risk management. ISO/IEC (2011)

    Google Scholar 

  10. Hasbullah, H., Soomro, I.A., et al.: Denial of service (dos) attack and its possible solutions in VANET. World Acad. Sci. Eng. Technol. Int. J. Electr. Comput. Energ. Electron. Commun. Eng. 4(5), 813–817 (2010)

    Google Scholar 

  11. Pathre, A.: Identification of malicious vehicle in VANET environment from ddos attack. J. Glob. Res. Comput. Sci. 4(6), 30–34 (2013)

    Google Scholar 

  12. Hamieh, A., Ben-Othman, J., Mokdad, L.: Detection of radio interference attacks in VANET. In: IEEE Global Telecommunications Conference, GLOBECOM 2009, pp. 1–5. IEEE (2009)

    Google Scholar 

  13. Vijayalakshmi, V., Sathya, M., Saranya, S., Selvaroopini, C.: Survey on various mechanisms for secure and efficient VANET communication. In: 2014 International Conference on Information Communication and Embedded Systems (ICICES), pp. 1–5. IEEE (2014)

    Google Scholar 

  14. Mejri, M.N., Ben-Othman, J., Hamdi, M.: Survey on vanet security challenges and possible cryptographic solutions. Veh. Commun. 1(2), 53–66 (2014)

    Article  Google Scholar 

  15. Azogu, I.K., Ferreira, M.T., Larcom, J.A., Liu, H.: A new anti-jamming strategy for VANET metrics-directed security defense. In: 2013 IEEE Globecom Workshops (GC Wkshps), pp. 1344–1349, IEEE (2013)

    Google Scholar 

  16. Horng, S.-J., Tzeng, S.-F., Huang, P.-H., Wang, X., Li, T., Khan, M.K.: An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks. Inf. Sci. 317, 48–66 (2015)

    Article  MathSciNet  Google Scholar 

  17. Mokhtar, B., Azab, M.: Survey on security issues in vehicular ad hoc networks. Alexandria Eng. J. 54(4), 1115–1126 (2015)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kanza Bayad .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Bayad, K., Rziza, M., Oumsis, M. (2017). Information Security Risk Analysis of Vehicular Ad Hoc Networks. In: Agüero, R., Zaki, Y., Wenning, BL., Förster, A., Timm-Giel, A. (eds) Mobile Networks and Management. MONAMI 2016. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 191. Springer, Cham. https://doi.org/10.1007/978-3-319-52712-3_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-52712-3_14

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-52711-6

  • Online ISBN: 978-3-319-52712-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics