Skip to main content

A Survey of Vehicular Ad-Hoc Network Security

  • Conference paper
  • First Online:
Mobile and Wireless Technologies 2017 (ICMWT 2017)

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 425))

Included in the following conference series:

Abstract

A variety of functional control of vehicles has developed along with information and communication technology. In particular, with the application of wireless network for real-time information offering, it has been possible to establish Vehicular Ad-hoc Network (VANET), an intelligent vehicle service for convenience and safety, which makes possible collision accident warning and avoidance, warning of dangerous factors on road, traffic information offering, and other kinds of service offering. However, the VANET service environment has physical and technical vulnerabilities caused by the vehicular internal/external communication based on wireless network. Therefore, Vehicular Security has emerged as an essential factor to prevent malicious threats and privacy violation from vehicles, drivers, and traffic network. This study tries to find the main security components of the VANET environment, analyze the latest research trend to overcome security vulnerabilities in each area, and propose the future research direction of Vehicular Security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Caballero-Gil P (2011) Security issues in vehicular ad hoc network. In: Mobile ad-hoc networks: applications, pp 67–88

    Google Scholar 

  2. Li F, Wang Yu (2007) Routing in vehicular ad hoc networks: a survey. IEEE Veh Technol Mag 2(2):12–22

    Article  Google Scholar 

  3. Martinez FJ, Toh C-K, Cano J-C, Calafate CT, Manzoni P (2010) Emergency services in future intelligent transportation systems based on vehicular communication networks. IEEE Intel Transp Syst Mag 2(2):6–20

    Article  Google Scholar 

  4. IEEE Std 802.11p, Part 11 (2010) Wireless LAN Medium Access Control(MAC) and Physical Layer(PHY) Specifications, Amendment: Wireless Access in Vehicular Environments

    Google Scholar 

  5. IEEE Guide for Wireless Access in Vehicular Environments(WAVE)-Architecture, IEEE Std 1609.0, 2013

    Google Scholar 

  6. IEEE 1609.1,2 (2006) Trial Use Standards for Wireless Access in Vehicular Environments(WAVE)-Resource Manager, Security Services for Applications and Management Messages, Networking Service

    Google Scholar 

  7. IEEE 1609.3 (2007) Trial Use Standards for Wireless Access in Vehicular Environments(WAVE)-Networking Service

    Google Scholar 

  8. IEEE 1609.4 (2006) Trial Use Standards for Wireless Access in Vehicular Environments(WAVE)-Multi Channel Operation

    Google Scholar 

  9. Delgrossi L, Zhang T (2012) Vehicle Safety Communications: Protocols Security, and Privacy. Wiley, Hoboken

    Book  Google Scholar 

  10. Al-Qutayri M, Yeun C, Al-Hawi F (2009) Security and privacy of intelligent VANETs. In: Computational intelligence & modern heuristics. IN—TECH Publisher

    Google Scholar 

  11. Yeun C, Al-Qutayri M, AlHawi F (2009) Efficient security implementation for emerging VANETs. Spec Issue Appl Comput Ubiquit Comput Commun J 4(4)

    Google Scholar 

  12. Raya M, Hubaux JP (2007) Security vehicular ad hoc NETworks. J Comput Secur 15(1):3–38

    Article  Google Scholar 

  13. Cho Y, Lee H, Park N, Choi D, Won D, Kim S (2009) Security technology trend in VANET. Korea Inst Inf Secur Cryptol 19(1)

    Google Scholar 

  14. Raw RS, Kumar M, Singh N (2013) Security challenges, issues and their solutions for VANET. Int J Netw Secur Appl 5(5):95–105

    Google Scholar 

  15. Chaubey NK (2016) Security analysis of vehicular ad hoc networks (VANETs): a comprehensive study. Int J Secur Appl 10(5):261–274

    Google Scholar 

  16. Chen L, Tang H, Wang J (2013) Analysis of VANET security based on routing protocol information. In: 2013 fourth international conference on intelligent control and information processing

    Google Scholar 

  17. Tomar RS, Verma S (2012) Enhanced SDMA for VANET communication. In: 26th international conference on advanced information networking and applications

    Google Scholar 

  18. Vijayakarthika R, Banumathi V (2014) Efficient data dissemination for secured communication in vanet. In: International conference on current trends in engineering and technology

    Google Scholar 

  19. Vijayalakshmi V, Saranya S, Sathya M, Selvaroopini C (2014) Survey on various mechanisms for Secure and Efficient VANET communication. In: ICICE

    Google Scholar 

  20. Nam J (2016) Implementation of VANET simulator using Matlab. J Korea Inst Inf Commun Eng 20(6):1171–1176

    Article  Google Scholar 

  21. Diep PTN, Yeo CK (2016) A trust-privacy framework in vehicular ad hoc networks(VANET). In: Wireless telecommunications symposium

    Google Scholar 

  22. Donato EA, Maia G, Madeira ERM, Villas LA (2015) Impact of 802.11p channel hopping on VANET communication Protocols. IEEE Latin Am Trans 13(1):315–320

    Article  Google Scholar 

  23. Kaur H, Batish S, Kakaria A (2012) An approach to detect the wormhole attack in vehicular ad-hoc networks. IJSSAN 1(4)

    Google Scholar 

  24. Rahvari M, Jamali MAJ (2011) Efficient detection of sybil attack based on crytography in VANET. IJNSA 3(6)

    Google Scholar 

  25. Gandhi UD, Keerthana RVSM (2014) Request response detection algorithm for detecting DoS attack in VANET. In: International conference on reliability, optimization and information technology

    Google Scholar 

  26. RoselinMary S, Maheshwari M, Thamaraiselvan M (2013) Early detection of DoS attacks in VANET using attacked packet detection algorithm (APDA). In: 2013 international conference on information communication and embedded systems

    Google Scholar 

  27. Shukla N, Dinker AG, Srivastava N, Singh A (2016) Security in vehicular ad hoc network by using multiple operating channels. IEEE

    Google Scholar 

  28. Eritali M, El Ouahidi B (2013) A review and classification of various VANET instrusion detection systems. IEEE

    Google Scholar 

  29. Anjum F, Subhadrabandhu D, Sarkar S (2003) Signature intrusion detection for wireless ad hoc networks: a comparative study of various routing protocols

    Google Scholar 

  30. Kishore Raja PC, Suganthi M, Sunder MR (2006) Wireless node behavior based Intrusion detection using genetic algorithm. Ubiquit Comput Commun 7:143–148

    Google Scholar 

  31. Ping Y, Yichuan, Yiping Z, Shinyong Z (2005) Distributed instruction detection for mobile ad hoc networks. In: Processing of the 2005 IEEE symposium on application and the internet workshops AINT-W05

    Google Scholar 

  32. Singh A, Sharma P (2015) A novel mechanism for detecting DOS Attack in VANET using enhanced attacked packet detectioin algorithm (EAPDA). In: RAECS UIET

    Google Scholar 

  33. Grzybek A, Seredynski M, Danoy G, Bouvry P (2014) Detection of stable mobile communities in vehicular ad hoc networks. In: IEEE international conference on intelligent transportation systems

    Google Scholar 

  34. Raghavan UN, Albert R, Kumara S (2007) Near linear time algorithm to detect community structures in large-scale networks. Phys Rev E 76(3):036106

    Article  Google Scholar 

  35. Leung IX, Hui P, Lio P, Crowcroft J (2009) Towards real-time community detection in large networks. Phys Rev E 79(6):1–10

    Article  Google Scholar 

  36. Herbiet G, Bouvry P, Guinand F (2011) Social relevance of topological communities in ad hoc communication networks. In: IEEE computational aspects of social networks

    Google Scholar 

  37. Hussain R, Oh H (2014) A secure and privacy-aware route tracing and revocation mechanism in VANET-based clouds. J Korea Inst Inf Secur Cryptol 24(5):795–807

    Article  Google Scholar 

  38. Hussain R, Oh H (2014) Cooperation-aware VANET clouds: providing secure cloud services to vehicular ad hoc networks. In: Korea information processing society

    Google Scholar 

  39. Park J, Choi D (2015) A design of framework for secure communication in vehicular cloud environment. J Korea Inst Inf Commun Eng 19(9):2114–2120

    Article  Google Scholar 

  40. Park S, Kim N (2012) Design of MAC algorithm supporting adaptive transmission rate on VANET. J Korea Inst Electron Inf Eng 49(11):132–138

    Google Scholar 

  41. Qu F, Wu Z, Wang F, Cho W (2015) A security and privacy review of VANETs. IEEE Trans Intell Transp Syst 16(6):1–12

    Article  Google Scholar 

  42. Lee WY (2014) A performance enhancement of VANET warning message propagation on electric wave blind area problem in the urban environment. J Korea Multimed Soc 17(10):1220–1228

    Article  Google Scholar 

  43. Park H, Hwang T, Jo Y, chi J (2014) An intersection connectivity-based RSU allocation algorithm in VANET. Korea Inf Sci Soc 10(1)

    Google Scholar 

  44. Kim S-H, Lee I-Y (2012) A study on message authentication scheme based on efficient group signature in VANET. J Korea Inst Inf Secur Cryptol 22(2):239–248

    Google Scholar 

  45. Islam N (2016) Certificate revocation in vehicular ad hoc networks: a novel approach. In: International conference on networking

    Google Scholar 

  46. Perer C, Georgakopoulos D (2014) Context aware computing for the internet of things: a survey. IEEE Commun Surv Tutor 16(1):414–454

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to MinSu Kim .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Science+Business Media Singapore

About this paper

Cite this paper

Kim, M. (2018). A Survey of Vehicular Ad-Hoc Network Security. In: Kim, K., Joukov, N. (eds) Mobile and Wireless Technologies 2017. ICMWT 2017. Lecture Notes in Electrical Engineering, vol 425. Springer, Singapore. https://doi.org/10.1007/978-981-10-5281-1_35

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-5281-1_35

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-5280-4

  • Online ISBN: 978-981-10-5281-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics