0% found this document useful (0 votes)
42 views8 pages

Reference Papers

The document discusses 11 papers related to security attacks in VANETs. The papers propose and evaluate various techniques for detecting and preventing attacks like gray hole attacks, Sybil attacks, and degradation of quality of service attacks. The techniques use tools and methods like blockchain, machine learning algorithms like ELM, and simulations in NS-2 and SUMO to analyze performance metrics like detection rates, packet delivery ratios, and end-to-end delays. Limitations of the approaches include detecting specific attack types and integrating additional data sources.

Uploaded by

samar shaikh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
42 views8 pages

Reference Papers

The document discusses 11 papers related to security attacks in VANETs. The papers propose and evaluate various techniques for detecting and preventing attacks like gray hole attacks, Sybil attacks, and degradation of quality of service attacks. The techniques use tools and methods like blockchain, machine learning algorithms like ELM, and simulations in NS-2 and SUMO to analyze performance metrics like detection rates, packet delivery ratios, and end-to-end delays. Limitations of the approaches include detecting specific attack types and integrating additional data sources.

Uploaded by

samar shaikh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

References Salient features Applications Results Tools Limitations

[1] detection and V2V increasing the NS-2 detecting and


prevention of a packet delivery ratio preventing
BHA (DPBHA) is (PDR) by 3.0%, gray hole
proposed throughput by security
6.15%, reducing the attacks
routing overhead by
3.69%, decreasing
the end-to-end
delay by 6.13%, and
achieving a
maximum detection
rate of 94.6
[2] blockchain blockchain-  BBAAS NA blockchain-
technology, based provides assisted
rapid anonymous high-level ownership
reauthenticatio authenticatio confidentiali exchange
n of vehicles is n scheme ty during protocols.
achieved in this against message
paper through various transmissio
secure harmful n in VANET.
authentication security  Blockchain
code transfer attacks diminish the
between the computatio
consecutive nal cost
RSUs compared
to
conventiona
l
authenticati
on schemes
[3] Stream Position Confict feld, Increases the NA investigate an
Performance Confict data performance of a additional
Analysis (SPPA) and Attack Distributed Denial layer of
approach signature of Service (DDoS) classifcation
sample rate attack detection in a after the
(CCA) VANET environment DDoS has
been
detected in
order to
identify the
impact level
of the attack.
[4] Emperor VANETS proposed method NS-2 developed
Penguin has a high delivery efficient
Optimization- ratio 0.96 value method to
based Routing compared with the improve the
protocol WOA, PSO, and FA detection
(EPORP) is methods rate and
developed for 0.94,0.92,0.90 reducing time
detecting the in sybil attack
Sybil attack detection
To enhance the
security of the
VANETs, the
Split XOR
(SXOR)
operation is
utilized
[5] lightweight Emergency This protocol has GNU Multiple V2V
authentication vehicles been proven to Precision authenticatio
protocol for EV VANETS reduce the Arithmetic n will be also
avoidance in computational (GMP) library considered to
VANETs. overhead of RSUs and pairing- improve the
The RSUs will and EVs through based current
broadcast simulation cryptography protocol
avoidance experiments. (PBC) library
information to
ordinary
vehicles in their
jurisdiction to
remind them to
clear a
temporary
emergency lane
for EVs in
advance.
[6] blockchain- Blockchain BARS is able to Python N/A
based VANETS establish a trust environment
anonymous model with c
reputation transparency,
system (BARS) conditional
to establish a anonymity,
privacy- efficiency, and
preserving trust robustness for
model for VANETs
VANETs
[7] use of V2V,V2I impact of these Eclipse Use Dataset
simulation for attacks, and MOSAIC for other
modelling provides an open simulation simulation
typical dataset to inform framework environment
communication the development of SUMO
scenarios which machine learning OMNET++
may be subject algorithms to
to malicious provide anomaly
attacks detection and
mitigation solutions
for enhancing
secure
communications
and safe
deployment of CAVs
on the road.
[8] -detecting Sybil Vehicles to scheme achieves Python N/A
attacks using roadside units high detection rate Openstreet
proofs of work V2R of Sybil attacks with Map
and location in low false negative SUMO
VANETs. and acceptable Raspberry pi
-Using the PoW communication and 3
can prevent the computation
vehicles from overhead
creating
multiple
trajectories in
case of low-
dense RSUs.
[9] -degradation- V2R The experimental MATLAB we will
of-QoS (DeQoS) results demonstrate implement
attack. that the attacker the distance-
-the attacker can easily find bounding
can relay the exploitable vehicles based
authentication and launch the defense
exchanges DeQoS attack with mechanism to
between an overwhelming explore its
roadside units probability (e.g., practicability.
(RSUs) and more than 0.98).
faraway
vehicles to
establish
connections but
will not relay
the service
afterwards,
which wastes
the limited
connection
resources of
RSUs.
-we have
proposed a new
cross-layer
authentication
protocol
combining an
authenticated
key exchange
process and a
distance-
bounding.
[10] SyDVELM, to Extreme -SyDVELM in -SUMO combine the
detect Sybil learning VANETS guarantees -Keras python ELM
attacks in Machine a high detection approach
VANETs. (ELM) rate with very low with others
error rates machine
learning
algorithms.
[11] The paper AI The performance of R Studio more efficient
proposes a the proposed hybrid
hybrid method has been algorithm can
algorithm that compared with SVM also be
is a kernels-based developed
combination of algorithms taken using other
two SVM kernel individually- SVM kernel
methods, AnovaDot and methods.
namely RBFDot. The
AnovaDot and proposed hybrid
RBFDot for model has shown
DDoS improved accuracy,
detection. The improved
proposed prediction, high
hybrid performance, and
algorithm produced minimum
works by error rate.
combining the
two algorithms.
Firstly, the
AnovaDot is
employed for
training the
model by using
a dataset that
contains the
mixed data of
both the
normal and
DDoS attacks.
The predictions
obtained from
this model are
then inserted
into the RBFDot
along with the
same dataset to
train the model.
The obtained
dual trained
model called as
hybrid model is
then used to
predict and
detect the
DDoS attacks
and VANETs.
blockchain-
[12] based handover V2I compare the NS3 we will
authentication Blockchain computational cost implement
protocol for and security the proposed
VANETs. In the features of the scheme and
proposed proposed protocol design an
protocol, with existing improved
vehicles only protocols to show scheme
perform that the proposed considering
lightweight protocol is more the overhead
computations in secure and efficient. in the RSU
handover proved the caused during
situations for correctness and the block
efficiency of the semantic security of consensus.
network the proposed
protocol using BAN
logic and ROR model
[13] -propose a IoT The numerical OMNET++
decentralized SDN simulation results crypto++
blockchain- Blockchain also show that library 5.6.2
based security malicious vehicular
framework for nodes or messages
vehicular IoT can be well
environment in detected while the
SDN-enabled overhead and
5G-VANETs. impact on the
-Implement a network
real-time video performance are
report service. acceptable for large-
- trust- scale scenarios
management
for the
vehicular
system in case
that malicious
nodes may
claim fake
messages or
messages may
be tempered.
[14] we propose a VANETS Simulation results -Fabric-iot Improving
trust Blockchain show that the -Hyperledger HMM model
management model is promising fabric
model of and feasible, -Docker
VANETs based effective in the -golang
on blockchain. aspects of trust
In this model, a evaluation and trust
hidden markov management.
model (HMM)
based vehicle
trust evaluation
method that
improve the
accuracy on the
detection of
malicious
behavior is
proposed.
[15] -blockchain, as VANET -Detection time and NS-3 As future
a reliable and detection overhead work
highly secure are reduced. proceeds, we
technology, to -This scheme will focus on
solve OLSR detects and isolates blockchain
security issues, 90% of the black revocation,
motivating hole nodes. when an
(rewarding) -All the nodes attacker
vehicles to increase their trust changes their
collaborate and value, except the attitude from
avoiding Blackhole nodes malicious to
repetitive which are isolated trustworthy.
detection from the
processes. communication.
[16] -investigate key VANETS DB-KMM has better -Crypto++ N/A
management Blockchain performance than -OMNeT++
based on the existing 4.7
blockchain. schemes in terms of -Veins
-(DB-KMM) to communication,
automatically storage,
realize the computation
registration, overhead and
update and latency
revocation of
user’s public
key.
-lightweight
mutual
authentication.
[17] RSA algorithm is WSN Attack (Sybil attack MATLAB we will
proposed to VANETS Black Hole) implement
detect sensor Collision Packet the proposed
nodes or (0.89) trust based
messages Throughput KB/sec approaches in
transmitted (345 322) a real time
from sensor Energy consumption event.
nodes to the (1 .2 1.1)
base station
and prevents
network from
being attacked
by the source
node.
[18]

References:

[1] A. Malik, M. Z. Khan, M. Faisal, F. Khan, and J. T. Seo, “An Efficient Dynamic Solution for the
Detection and Prevention of Black Hole Attack in VANETs,” Sensors (Basel)., vol. 22, no. 5, pp. 1–
27, 2022, doi: 10.3390/s22051897.
[2] A. Maria, V. Pandi, J. D. Lazarus, M. Karuppiah, and M. S. Christo, “BBAAS: Blockchain-Based
Anonymous Authentication Scheme for Providing Secure Communication in VANETs,” Secur.
Commun. Networks, vol. 2021, 2021, doi: 10.1155/2021/6679882.
[3] R. Kolandaisamy et al., “A stream position performance analysis model based on DDoS attack
detection for cluster-based routing in VANET,” J. Ambient Intell. Humaniz. Comput., vol. 12, no. 6,
pp. 6599–6612, 2021, doi: 10.1007/s12652-020-02279-2.
[4] N. C. Velayudhan, A. Anitha, and M. Madanan, “Sybil Attack with RSU Detection and Location
Privacy in Urban VANETs: An Efficient EPORP Technique,” Wirel. Pers. Commun., vol. 122, no. 4,
pp. 3573–3601, 2022, doi: 10.1007/s11277-021-09102-x.
[5] C. Wang, R. Huang, J. Shen, J. Liu, P. Vijayakumar, and N. Kumar, “A Novel Lightweight
Authentication Protocol for Emergency Vehicle Avoidance in VANETs,” IEEE Internet Things J., vol.
8, no. 18, pp. 14248–14257, 2021, doi: 10.1109/JIOT.2021.3068268.
[6] Z. Lu, W. Liu, Q. Wang, G. Qu, and Z. Liu, “A privacy-preserving trust model based on blockchain
for VANETs,” IEEE Access, vol. 6, pp. 45655–45664, 2018, doi: 10.1109/ACCESS.2018.2864189.
[7] S. Iqbal, P. Ball, M. H. Kamarudin, and A. Bradley, “Simulating Malicious Attacks on VANETs for
Connected and Autonomous Vehicle Cybersecurity: A Machine Learning Dataset,” 2022, [Online].
Available: http://arxiv.org/abs/2202.07704
[8] M. Baza et al., “Detecting Sybil Attacks Using Proofs of Work and Location in VANETs,” IEEE
Trans. Dependable Secur. Comput., vol. 19, no. 1, pp. 39–53, 2022, doi:
10.1109/TDSC.2020.2993769.
[9] A. Yang, J. Weng, N. Cheng, J. Ni, X. Lin, and X. Shen, “DeQoS Attack: Degrading Quality of Service
in VANETs and Its Mitigation,” IEEE Trans. Veh. Technol., vol. 68, no. 5, pp. 4834–4845, 2019, doi:
10.1109/TVT.2019.2905522.
[10] C. H. O. O. Quevedo, A. M. B. C. Quevedo, G. A. Campos, R. L. Gomes, J. Celestino, and A.
Serhrouchni, “An Intelligent Mechanism for Sybil Attacks Detection in VANETs,” IEEE Int. Conf.
Commun., vol. 2020-June, 2020, doi: 10.1109/ICC40277.2020.9149371.
[11] K. Adhikary, S. Bhushan, S. Kumar, and K. Dutta, “Hybrid Algorithm to Detect DDoS Attacks in
VANETs,” Wirel. Pers. Commun., vol. 114, no. 4, pp. 3613–3634, 2020, doi: 10.1007/s11277-020-
07549-y.
[12] S. Son, J. Lee, Y. Park, Y. Park, and A. K. Das, “Design of Blockchain-Based Lightweight V2I
Handover Authentication Protocol for VANET,” IEEE Trans. Netw. Sci. Eng., vol. 9, no. 3, pp. 1346–
1358, 2022, doi: 10.1109/TNSE.2022.3142287.
[13] L. Xie, Y. Ding, H. Yang, and X. Wang, “Blockchain-based secure and trustworthy internet of things
in SDN-enabled 5G-VANETs,” IEEE Access, vol. 7, pp. 56656–56666, 2019, doi:
10.1109/ACCESS.2019.2913682.
[14] H. Liu, D. Han, and D. Li, “Behavior analysis and blockchain based trust management in VANETs,”
J. Parallel Distrib. Comput., vol. 151, pp. 61–69, 2021, doi: 10.1016/j.jpdc.2021.02.011.
[15] Y. Inedjaren, M. Maachaoui, B. Zeddini, and J. P. Barbot, “Blockchain-based distributed
management system for trust in VANET,” Veh. Commun., vol. 30, p. 100350, 2021, doi:
10.1016/j.vehcom.2021.100350.
[16] Z. Ma, J. Zhang, Y. Guo, Y. Liu, X. Liu, and W. He, “An Efficient Decentralized Key Management
Mechanism for VANET with Blockchain,” IEEE Trans. Veh. Technol., vol. 69, no. 6, pp. 5836–5849,
2020, doi: 10.1109/TVT.2020.2972923.
[17] P. Shah and T. Kasbe, “Detecting Sybil Attack, Black Hole Attack and DoS Attack in VANET Using
RSA Algorithm,” 2021 IEEE Int. Conf. Emerg. Trends Ind. 4.0, ETI 4.0 2021, 2021, doi:
10.1109/ETI4.051663.2021.9619414.
[18] C. Wang, J. Shen, J. F. Lai, and J. Liu, “B-TSCA: Blockchain Assisted Trustworthiness Scalable
Computation for V2I Authentication in VANETs,” IEEE Trans. Emerg. Top. Comput., vol. 9, no. 3,
pp. 1386–1396, 2021, doi: 10.1109/TETC.2020.2978866.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy