Tyagi 2014
Tyagi 2014
Abstract— The state-of-the-art improvements in cellular capabilities [2]. Of late, data transfer and information
communication and ubiquitous availability of internet have led to processing has emerged as a widespread phenomenon,
significant breakthroughs in intelligent transportation systems permeating almost every type of object. One such category of
where connectivity, autonomous driving and infotainment play a communication capable smart devices is intelligent vehicles,
pivotal role in the enhanced driving experience. The Vehicle ad
intelligent transportation systems (ITS) and communication
hoc Networks (VANET) have emerged as a distinguished branch
of wireless communication pertaining to transportation systems. capable roadside infrastructure. These smart vehicles function
VANET is intended to dispense on-road vehicle safety and to based on the principles of Vehicle ad hoc Networks (VANET),
boost the comfort experienced by drivers, passengers and other which is essentially a computer-to-computer network where
commuters. Whereas VANET offers exciting applications and mobile nodes, i.e. vehicles, behaving as computers, connect
explores unfamiliar dimensions in transportation, concerns directly to each other, rather than to a server or hub. The
regarding VANET security also continue to intensify. Security of vehicles themselves form a temporary network, and the
vehicular networks, the authenticity and integrity of data participating vehicles also serve as a wireless router, acting
dissemination remains a concern of utmost significance in over an approximate range of 100-300 meters of each other. As
VANET deployment. VANET architecture, by virtue of an
the nodes are mobile, they continuously fall out of the signal
abundance of networked vehicles, is susceptible to illegal use,
unauthorized access, protocol tunneling, eavesdropping, and range and drop out of a particular network, join in a
denial-of-service as the vehicles are unknowingly exposed to neighboring network, connecting vehicles to one another thus
illegitimate information from unidentified adversaries. maintaining a mobile internet [3]. The VANET architecture is
also extended to road side infrastructure, known as InfoStations
This paper investigates the security aspects of VANET and the
attacks and vulnerabilities the VANET architecture is prone to. (IS) and Road Side Units (RSU) as depicted in figure 1. As
The study of security features and flaws is expected to lead to vehicles tend to move in an organized fashion, therefore the
developed broadcasting and routing services, adding to the interactions with RSU is also characterized fairly accurately.
quality-of-service. Due to mobility of vehicles, large scale VANETs have succeeded in addressing a number of today's
networks, rapidly restructuring nodes and frequently changing traffic challenges and enable drivers to have better awareness
topological structure; a fundamental requirement of VANETs is of their driving environment and take timely and evasive
to ensure safe transmission of the time critical data. The paper actions in response to abnormal situations. VANETs lend a
examines various security threats in VANETs, analyses how they valuable contribution to solve many traffic and road-safety
are implemented and their impact on the VANET security
problems and in the recent years, the road transportation
architecture. A few gaps in the VANET security frameworks
have also been highlighted which can be worked upon in the system with the help of VANET is being evolved into a safer
future. and efficient establishment [4].
The growth of internet and its extension to vehicles has
Keywords: VANET, security, V2V, V2I, attacks,
vulnerabilities, safety. made our lives convenient, but it has also led to abuse of
technology and misuse through cyber crimes. With
advancements in technology and the advent of VANET, the
I. INTRODUCTION
prevalence of cybercrimes in the domain has augmented to
Regardless of a striking operational life of over 40 years, include cyber-espionage, eavesdropping, pranksters, and
the existence and applications of internet and cyber- phishing schemes. With maximum appreciation to the
infrastructure still continue to evolve. More than ever before, progressive bias, depth and scope of ceaseless internet utilities
the internet and wireless communication has affected our lives and VANET applications, it is equally necessary to envisage
by opening countless possibilities and opportunities [1]. The the security and data confidentiality challenges encountered in
recent trend in interdisciplinary research has been to embed the VANET architecture. Despite the advantages of VANET,
everyday objects with computers and communication there are many challenges, especially in the aspects of security
978-1-4799-3080-7/14/$31.00 2014
c IEEE 2084
and privacy. Inter-vehicle communication (IVC) continues to emergency vehicle and misleading other vehicles to
grow as an indispensable futuristic component, and this paper useless or harmful consequences is an impersonation
investigates a comprehensive overview of the security threats attack [7].
and vulnerabilities observed in VANET architecture. The focus • Privacy: Privacy is an issue in VANET, as the illegal
here is on the prevalent bottlenecks and security threats monitoring of driver’s personal data could violate
encountered in vehicle-to-vehicle (V2V) and vehicle-to- their privacy. Attacks on driver privacy are a severe
infrastructure (V2I) communication. Security requirements and vulnerability in VANET due to the periodic and
necessity in VANET architecture and security threats and frequent nature of vehicular traffic. Driver’s personal
attacks in VANET [5] [6] are discussed. data can be retrieved by means of illegal in-transit
This paper is structured in six sections: section I is the traffic tampering of safety and traffic related messages
introduction and the identified sources of attacks. Malicious sent by the driver, management messages, or even
exploitation in VANET is presented in section II. Section III from transaction based communications such as
elaborates attacks against routing protocols. Section IV automated payments [7].
demonstrates an execution of black hole attack, and outlines a Such frauds and deceptive scams have been on an increase
general methodology adopted by attackers. Conclusions are especially among networked devices as cyber criminals get an
given in section VI. opportunity to send spurious messages to any device on the
network [8]. Whereas VANET was initially intended to
integrate mobile connectivity amongst vehicles to expedite data
transfer while traveling, vehicles in VANET have been victims
to viruses, forged messages, phishing, identity thefts and many
other threats. An issue of paramount concern in vehicular
environment is security, where a wrong message may directly
affect human life, especially in the light of the public
acceptance of the technology [9]. Since the vehicular network
is open and accessible from everywhere in the given DSRC
range, it is expected to be an easy target for malicious users
[10]. Apart from network attacks, disabling or tinkering with
the vehicle on-board units, tampering with the road side
infrastructure, removing, dislocating or destroying them is
Figure 1. Extensive VANET communication architecture
another security issue in VANET. OBUs are tampered in a
manner similar to that of modifying an odometer in earlier
vehicles [11]. Use of magnets, electric fields and malicious
II. SOURCES OF ATTACKS AND MALICIOUS ACTIVITIES IN
software to damage OBUs is a source of concern that needs to
VANET
be addressed for safer and secure VANET communication.
VANET is prone to several vulnerabilities and attacks. Although the OBUs could be subject to periodic examinations
These vulnerabilities deteriorate the functioning of the and inspections for any signs of tampering, limitations exist in
network, stimulate severe problems in the network and pose relation to the frequency of inspection and the honesty of
potential security threats. The severity of attacks launched by technicians performing the inspections. To ensure reliable and
the attackers can vary based on the motive of the attack and the secure V2I communication, it is required that the roadside
potential impact on the victim. The following section gives a equipment is not damaged o purpose.
general overview of VANET vulnerabilities.
• Jamming: Interfering transmissions are deliberately III. ATTACKS AGAINST ROUTING
generated by jammer to prevent VANET VANET is a promising vehicular networking technology which
communication among vehicles in a given reception enhances road safety, traffic management and information
range [7]. dissemination for drivers and passengers. The success of
• Forgery: Forgery in VANET architecture VANET relies heavily on efficient dynamic routing protocols
compromises the correctness, validity and timely due to the rapidly and constantly changing network topology.
receipt of transmitted data. The transmission of false The routing protocol security is important to be considered as
hazard warnings and those being received and acted many of the VANET applications are safety-related. Routing is
upon by all vehicles leads to chaos in the driving zone the backbone of VANET communication and therefore routing
and is a major vulnerability [7]. is also the most vulnerable part of VANET, susceptible to
• Impersonation: Any vehicle owner deliberately and attacks and malicious operations [12]. Malicious nodes in
hideously taking on the identity of another vehicle and VANET can exploit the co-operative routing algorithms to
attributing it to his own vehicle or vice-versa is known launch routing attacks, similar to BH and rushing attacks.
as impersonation. It also involves fake message Attacks against routing in VANET are broadly classified into
fabrication, message alteration and message replay. two categories: attacks on routing protocols and attacks on
For e.g., an attacker appearing falsely as an packet delivery.
The other aspect of VANET applications, i.e. the • Social Attack: Social attacks are a class of attack
comfort applications primarily aims at making driving where the attackers modify/aggravate the behavior of
a pleasant experience and to improve the traffic legitimate vehicles by sending immoral messages to
system. Locating a car-parking space is one of the them. This is a kind of emotional and social attack
most common comfort applications where the RSU that indirectly creates problems in the network by
communicates the information about parking enticing legitimate users to show angry behavior
availability to a vehicle OBU. In an attack on this when they receive such kind of derogatory messages.
aspect, figure. 2 depicts an authentic vehicle ‘C’ figure. 4 depict this scenario, where an attacker ‘B’
requesting for a parking space at a particular intentionally passes a message ‘You are Idiot’ to a
destination (say, near a shopping mall). nearby vehicle ‘C’.
Figure 10. Node v6 drop all data packets to create black hole