0% found this document useful (0 votes)
15 views7 pages

Tyagi 2014

The document investigates security threats in Vehicular Ad hoc Networks (VANETs), highlighting vulnerabilities such as jamming, forgery, impersonation, and various attacks on routing protocols. It emphasizes the importance of securing vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications to ensure safety and efficiency in intelligent transportation systems. The paper also identifies gaps in current security frameworks and suggests areas for future improvement to enhance on-road safety and data integrity.

Uploaded by

minhsnst
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views7 pages

Tyagi 2014

The document investigates security threats in Vehicular Ad hoc Networks (VANETs), highlighting vulnerabilities such as jamming, forgery, impersonation, and various attacks on routing protocols. It emphasizes the importance of securing vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications to ensure safety and efficiency in intelligent transportation systems. The paper also identifies gaps in current security frameworks and suggests areas for future improvement to enhance on-road safety and data integrity.

Uploaded by

minhsnst
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

Investigating the Security Threats in Vehicular ad hoc

Networks (VANETs): Towards Security Engineering


for Safer on-road Transportation
Parul Tyagi Dr. Deepak Dembla
Research Scholar HoD, Dept. of IT, JECRC University
JECRC University Jaipur, India
Jaipur, India deepak.dembla@jecrcu.edu.in
tyagi.parul82@gmail.com

Abstract— The state-of-the-art improvements in cellular capabilities [2]. Of late, data transfer and information
communication and ubiquitous availability of internet have led to processing has emerged as a widespread phenomenon,
significant breakthroughs in intelligent transportation systems permeating almost every type of object. One such category of
where connectivity, autonomous driving and infotainment play a communication capable smart devices is intelligent vehicles,
pivotal role in the enhanced driving experience. The Vehicle ad
intelligent transportation systems (ITS) and communication
hoc Networks (VANET) have emerged as a distinguished branch
of wireless communication pertaining to transportation systems. capable roadside infrastructure. These smart vehicles function
VANET is intended to dispense on-road vehicle safety and to based on the principles of Vehicle ad hoc Networks (VANET),
boost the comfort experienced by drivers, passengers and other which is essentially a computer-to-computer network where
commuters. Whereas VANET offers exciting applications and mobile nodes, i.e. vehicles, behaving as computers, connect
explores unfamiliar dimensions in transportation, concerns directly to each other, rather than to a server or hub. The
regarding VANET security also continue to intensify. Security of vehicles themselves form a temporary network, and the
vehicular networks, the authenticity and integrity of data participating vehicles also serve as a wireless router, acting
dissemination remains a concern of utmost significance in over an approximate range of 100-300 meters of each other. As
VANET deployment. VANET architecture, by virtue of an
the nodes are mobile, they continuously fall out of the signal
abundance of networked vehicles, is susceptible to illegal use,
unauthorized access, protocol tunneling, eavesdropping, and range and drop out of a particular network, join in a
denial-of-service as the vehicles are unknowingly exposed to neighboring network, connecting vehicles to one another thus
illegitimate information from unidentified adversaries. maintaining a mobile internet [3]. The VANET architecture is
also extended to road side infrastructure, known as InfoStations
This paper investigates the security aspects of VANET and the
attacks and vulnerabilities the VANET architecture is prone to. (IS) and Road Side Units (RSU) as depicted in figure 1. As
The study of security features and flaws is expected to lead to vehicles tend to move in an organized fashion, therefore the
developed broadcasting and routing services, adding to the interactions with RSU is also characterized fairly accurately.
quality-of-service. Due to mobility of vehicles, large scale VANETs have succeeded in addressing a number of today's
networks, rapidly restructuring nodes and frequently changing traffic challenges and enable drivers to have better awareness
topological structure; a fundamental requirement of VANETs is of their driving environment and take timely and evasive
to ensure safe transmission of the time critical data. The paper actions in response to abnormal situations. VANETs lend a
examines various security threats in VANETs, analyses how they valuable contribution to solve many traffic and road-safety
are implemented and their impact on the VANET security
problems and in the recent years, the road transportation
architecture. A few gaps in the VANET security frameworks
have also been highlighted which can be worked upon in the system with the help of VANET is being evolved into a safer
future. and efficient establishment [4].
The growth of internet and its extension to vehicles has
Keywords: VANET, security, V2V, V2I, attacks,
vulnerabilities, safety. made our lives convenient, but it has also led to abuse of
technology and misuse through cyber crimes. With
advancements in technology and the advent of VANET, the
I. INTRODUCTION
prevalence of cybercrimes in the domain has augmented to
Regardless of a striking operational life of over 40 years, include cyber-espionage, eavesdropping, pranksters, and
the existence and applications of internet and cyber- phishing schemes. With maximum appreciation to the
infrastructure still continue to evolve. More than ever before, progressive bias, depth and scope of ceaseless internet utilities
the internet and wireless communication has affected our lives and VANET applications, it is equally necessary to envisage
by opening countless possibilities and opportunities [1]. The the security and data confidentiality challenges encountered in
recent trend in interdisciplinary research has been to embed the VANET architecture. Despite the advantages of VANET,
everyday objects with computers and communication there are many challenges, especially in the aspects of security

978-1-4799-3080-7/14/$31.00 2014
c IEEE 2084
and privacy. Inter-vehicle communication (IVC) continues to emergency vehicle and misleading other vehicles to
grow as an indispensable futuristic component, and this paper useless or harmful consequences is an impersonation
investigates a comprehensive overview of the security threats attack [7].
and vulnerabilities observed in VANET architecture. The focus • Privacy: Privacy is an issue in VANET, as the illegal
here is on the prevalent bottlenecks and security threats monitoring of driver’s personal data could violate
encountered in vehicle-to-vehicle (V2V) and vehicle-to- their privacy. Attacks on driver privacy are a severe
infrastructure (V2I) communication. Security requirements and vulnerability in VANET due to the periodic and
necessity in VANET architecture and security threats and frequent nature of vehicular traffic. Driver’s personal
attacks in VANET [5] [6] are discussed. data can be retrieved by means of illegal in-transit
This paper is structured in six sections: section I is the traffic tampering of safety and traffic related messages
introduction and the identified sources of attacks. Malicious sent by the driver, management messages, or even
exploitation in VANET is presented in section II. Section III from transaction based communications such as
elaborates attacks against routing protocols. Section IV automated payments [7].
demonstrates an execution of black hole attack, and outlines a Such frauds and deceptive scams have been on an increase
general methodology adopted by attackers. Conclusions are especially among networked devices as cyber criminals get an
given in section VI. opportunity to send spurious messages to any device on the
network [8]. Whereas VANET was initially intended to
integrate mobile connectivity amongst vehicles to expedite data
transfer while traveling, vehicles in VANET have been victims
to viruses, forged messages, phishing, identity thefts and many
other threats. An issue of paramount concern in vehicular
environment is security, where a wrong message may directly
affect human life, especially in the light of the public
acceptance of the technology [9]. Since the vehicular network
is open and accessible from everywhere in the given DSRC
range, it is expected to be an easy target for malicious users
[10]. Apart from network attacks, disabling or tinkering with
the vehicle on-board units, tampering with the road side
infrastructure, removing, dislocating or destroying them is
Figure 1. Extensive VANET communication architecture
another security issue in VANET. OBUs are tampered in a
manner similar to that of modifying an odometer in earlier
vehicles [11]. Use of magnets, electric fields and malicious
II. SOURCES OF ATTACKS AND MALICIOUS ACTIVITIES IN
software to damage OBUs is a source of concern that needs to
VANET
be addressed for safer and secure VANET communication.
VANET is prone to several vulnerabilities and attacks. Although the OBUs could be subject to periodic examinations
These vulnerabilities deteriorate the functioning of the and inspections for any signs of tampering, limitations exist in
network, stimulate severe problems in the network and pose relation to the frequency of inspection and the honesty of
potential security threats. The severity of attacks launched by technicians performing the inspections. To ensure reliable and
the attackers can vary based on the motive of the attack and the secure V2I communication, it is required that the roadside
potential impact on the victim. The following section gives a equipment is not damaged o purpose.
general overview of VANET vulnerabilities.
• Jamming: Interfering transmissions are deliberately III. ATTACKS AGAINST ROUTING
generated by jammer to prevent VANET VANET is a promising vehicular networking technology which
communication among vehicles in a given reception enhances road safety, traffic management and information
range [7]. dissemination for drivers and passengers. The success of
• Forgery: Forgery in VANET architecture VANET relies heavily on efficient dynamic routing protocols
compromises the correctness, validity and timely due to the rapidly and constantly changing network topology.
receipt of transmitted data. The transmission of false The routing protocol security is important to be considered as
hazard warnings and those being received and acted many of the VANET applications are safety-related. Routing is
upon by all vehicles leads to chaos in the driving zone the backbone of VANET communication and therefore routing
and is a major vulnerability [7]. is also the most vulnerable part of VANET, susceptible to
• Impersonation: Any vehicle owner deliberately and attacks and malicious operations [12]. Malicious nodes in
hideously taking on the identity of another vehicle and VANET can exploit the co-operative routing algorithms to
attributing it to his own vehicle or vice-versa is known launch routing attacks, similar to BH and rushing attacks.
as impersonation. It also involves fake message Attacks against routing in VANET are broadly classified into
fabrication, message alteration and message replay. two categories: attacks on routing protocols and attacks on
For e.g., an attacker appearing falsely as an packet delivery.

2014 International Conference on Advances in Computing,Communications and Informatics (ICACCI) 2085


• Impersonating: This attack involves taking on the depriving it of available parking resource [16]. Such
credentials of another vehicle to spoof route attacks can undermine the importance of comfort
messages. It also involves advertising of fake route- applications of VANET such as entertainment,
metrics to confuse the topology, forwarding a route automatic toll collection, map download, locating
message with false sequence numbers to restaurant and gas stations, parking availability etc.
suppress/delay other consistent messages. Flooding
the route discover unreasonably with DoS, modifying Timing Attack: In this attack, the attacker’s main
a RREQ message to implant false routes, generating objective is to delay an original message by adding an
bogus route error messages to disrupt a working route additional time slot to the original message. The other
or suppressing a valid route error to misinform other contents of a message are not disturbed, but the delay
vehicles is all further attacks that can be launched by causes the messages to be received after the requisite
the impersonator [13]. time, thus rendering them useless. VANET safety
applications are time critical applications, and even a
Application Attack: Safety and comfort related minor delay in message transmission could defeat the
applications mark potential VANET applications. objective of the message. figure. 3 depict a timing
Attacker target these application related messages to attack scenario where an attacker ‘C’ receives a
exploit these for their own benefits, at the expense of warning message ‘Warning! Accident at location Y’
other users [14]. Attackers tamper with the contents of from other vehicle ‘B’. Under normal operating
the actual messages and forward wrong, modified, conditions, this message would have been transmitted
incomplete, forged or fake messages to other vehicles to a nearby vehicle ‘D’ instantly, but the attacker ‘B’
leading to severe traffic congestions or even deliberately does so after some time, thus causing ‘D’
accidents. One of the most common types of not to evade the sight [17].
application attacks is the bogus information attack
where an attacker injects bogus information into the
network and these incorrect/fabricated messages
directly affect the behavior of vehicles on the road.
Another disastrous attack in this category is the
modification/alteration of warning messages, which
compromise the degree of truthfulness of a message in
the VANET architecture [15]. F
Figure 3. Attack on comfort application

The other aspect of VANET applications, i.e. the • Social Attack: Social attacks are a class of attack
comfort applications primarily aims at making driving where the attackers modify/aggravate the behavior of
a pleasant experience and to improve the traffic legitimate vehicles by sending immoral messages to
system. Locating a car-parking space is one of the them. This is a kind of emotional and social attack
most common comfort applications where the RSU that indirectly creates problems in the network by
communicates the information about parking enticing legitimate users to show angry behavior
availability to a vehicle OBU. In an attack on this when they receive such kind of derogatory messages.
aspect, figure. 2 depicts an authentic vehicle ‘C’ figure. 4 depict this scenario, where an attacker ‘B’
requesting for a parking space at a particular intentionally passes a message ‘You are Idiot’ to a
destination (say, near a shopping mall). nearby vehicle ‘C’.

Figure 2. Attack on safety application

The RSU searches for available parking zone and


relays a message ‘parking slot available’ near the Figure 4. Timing attack in VANET
shopping mall. As the vehicle ‘C’ is slightly out of the When ‘C’ receives this message, his driving behavior
radio range of the RSU, the RSU uses vehicles ‘A’ is aggravated which results in an increase in the speed
and ‘B’ as routers to send the message to vehicle ‘C’. of the vehicle.
The vehicle ‘B’ is actually an attacker who intercepts
reads and alters this message to ‘no empty parking The episode culminates in disturbing/distracting the
slot’ and passes this message to vehicle ‘C’, thus other users on the network.

2086 2014 International Conference on Advances in Computing,Communications and Informatics (ICACCI)


between the authentic VANET user, RSU and an attacker. The
• Monitoring Attack: Monitoring and tracking of the steps to launch an attack are described as follows [18]:
vehicles, illegally listening to the communication • An attacker initially launches an attack on other
between V2V and V2I and misusing any confidential vehicles in the network and also on the RSUs, based
information is the motive of this attack, figure.5 on the motive and the extent of damage intended.
depicts this scenario. • The attacker receives a valid message from another
vehicle/RSU expecting the attacker to forward/re-
route the message.
• The attacker alters/intercepts the contents of the
message and passes this message to other vehicles/
RSU.
• The attacker might also impersonate/masquerade as
another vehicle, launches timing attacks or other types
of attacks on other vehicles.
• Monitors the communication between the vehicles or
Figure 5. Depiction of Social Attack infrastructure and achieves his/her benefit

Table I lists different types of security attacks with


attacker types and respective security attributes.
IV. ATTACK-PROCESS MECHANISM AND AN ILLUSTRATION
OF NETWORK LAYER ATTACK
This section presents a detailed description of the attack
process in VANET. Figure. 6 represent the communication link
Table 1 Different types of security attacks in VANET with attacker types and respective security attributes .
Name of the Attack Adversary/Attacker type Security attributes and Requires Communicatio
requirements Physical n types
Access?
Bogus Information Insider Data Integrity/ No V2V
Authentication
Denial of Service Malicious, active, insider, Availability Yes/No V2V/V2I
(DoS) network attack
Masquerading Active, insider Authentication Yes V2V
Black Hole (BH) Passive, outsider Availability Yes V2V
Malware Malicious, insider Availability No V2V/V2I
Spamming Malicious, insider Availability Yes V2V
Timing Attack Malicious, insider Data Integrity No V2V/
V2I
GPS Spoofing Outsider Authentication No V2V
Man-in-the-middle Insider, monitoring attack Data integrity, Yes V2V
confidentiality, privacy
Sybil Insider, network attack Authentication, privacy Yes V2V
Wormhole/tunneli Outsider, malicious, Authentication, Yes/No V2V
ng monitoring attack confidentiality
Illusion attack Insider, Outsider Authenticity, data integrity Yes V2V/V2I
Impersonation Insider Privacy, confidentiality Yes V2V
attack
Social Attack Insider, e.g. “you are idiot” Data integrity, trust Yes/No V2V
Monitoring attack Monitoring the road activity Privacy, authenticity Yes/No V2V/V2I

2014 International Conference on Advances in Computing,Communications and Informatics (ICACCI) 2087


Figure 6. A simple attack mechanism adopted by attackers in VANET [12]

Black Hole Attack Illustration: Consider the network in figure


Figure 8. Network after an intruder generates a malicious RREQ fromV9 &V4
7 and illustrate how an intruder can launch a black hole or grey
hole attack. Suppose nodes v9 and v4 each need routes to
nodes v13 and v7 respectively. Therefore, nodes v9 and v4
broadcast RREQs and the initial ow of RREQs is shown in
figure 8. Now assume node v6 is an intruder and wants to
capture the routes in the network to cause either a black or grey
hole attack, by using false RREP packets in the following way
[19]:
The two RREQs from nodes v9 and v4 will be heard by node
v6, which then checks its current destination sequence numbers
for v13 and v7.
• Intruder v6 prepares RREP packets for these RREQs
with destination sequence numbers higher than the
current destination sequence number for nodes v13
and v7.
• V6 sends these false RREPs back to the source nodes
v9and v4 as shown in figure 9. Figure 9. Network without any attack:intruder sending false RREP
to source node V9 & V4
After receiving the false RREPs, source nodes v9 and v4 will
select the route through v6, since the received RREPs suggest
that v6 has the freshest routes. By repeating this process,
intruder v6 can successfully capture other routes in the network
and force most of the network trafc ow through itself. Now
the intruder v6 is in control of the network data trafc and can
drop data packets to cause either black hole or grey hole
attacks. For instance, source nodes v9 and v4 will send data
packets to their destination node which will reach node v6;
instead of forwarding these data packets, v6 can drop them all,
causing a black hole attack as shown in figure 10.

Figure 10. Node v6 drop all data packets to create black hole

V. RESULTS & INVESTIGATIONS


Despite a tremendous potential and application to enhance
road safety and to facilitate traffic management, VANET
suffers from a range of security and privacy issues that have
dramatically restricted their applications as yet. The research
confirms that whereas VANET has emerged as an active area
of research, standardization, and development due to its
Figure 7. Network initially without any attack tremendous potential to improve vehicle and road safety,

2088 2014 International Conference on Advances in Computing,Communications and Informatics (ICACCI)


improve traffic efficiency and enhance driving comfort, a coupled with installation of malware on the target
strong emphasis needs to be laid on designing novel VANET vehicle can lead to that vehicle being added on a
architectures and implementations. VANET suffers from botnet that caused the attack, causing it to grow even
considerable threats to security of the users, and therefore more powerful. These attacks can deactivate the
research needs to be focused on specific areas including encryption settings on the targeted device and also
routing, broadcasting, QoS and security. This paper describes manipulate sensitive information [20].
attack process mechanism and illustration of Black hole attack, • Loss of time: It can usually take a great deal of time to
which investigate how intruder capture the route and send a recover from security attacks in VANET, or even
false message to other nodes. It also compares different types from the suspicion of an attack. Data might be
of security attacks in VANET with attacker types and needed to be reframed, recovered or extensively
respective security attributes which shows the effect of reconstructed.
different types of attack in various environments. • Monetary loss: Theft of data is often accompanied by
monetary losses due to maligned intentions of the
VI. IMPACT OF THE ATTACKS ON THE VEHICULAR NETWORK
hackers and attackers.
ARCHITECTURE
• Disabled and crippled services: Protesters and some
As the network evolution is nudging towards a more governments may encourage discontinued use of the
wireless future, VANET devices (vehicles and RSUs) are technology, in case frequent cases of attacks and
characterised as resource-constrained devices that need highest information misuse are reported. This is possible
levels of security, connectivity, scalability and efficient data considering the extent of malicious intent of the
handling, among other things. As the fundamental element of hackers.
VANETs is internet, VANET opens a lot of insecure and
• Legal exposure: any of the above mentioned cases
vulnerable end-points. The smart vehicles and internet capable
might expose an enterprise (such as a taxi firm or a
RSUs generate a huge amount of data originating from
car rental company) to law suits for loss of data or
disparate sources. This offers the attackers and hackers with an
money entrusted to them.
opportunity to mine these rich resources and repositories of
The impact of VANET attacks is not restricted to vehicles
data to gain unauthorized insight into confidential data that can
and RSUs, but with the advent of smart cities, all the connected
have profound impact on the adoption of VANET technology.
devices that have a VANET device in one of the connected
The advanced VANET routing protocols such as context-aware
stages might suffer the consequences of a VANET attack. The
policy routing not only allow the VANET components
vehicular ad hoc networks can be seen as a crucial component
(vehicles and RSUs) to transmit data, but also to share certain
of the emerging field of Internet of Things (IoT) and the
links. As far as the genuine RSU and on-board unit (OBU)
disastrous impacts of security breach in VANET can adversely
messages are concerned, the VANET appears to be safe, but
affect the various connected devices. With IoT, more and more
sharing of links by malicious attackers is far more dangerous.
objects ranging from smart homes and smart cities to including
Linking and subsequently clicking of these links has changed
household gadgets, health monitors, palmtops and smart
the VANET landscape, and malware can be now spread more
phones, doors and safety systems etc. have digital
effectively using pervasive VANET devices. ‘Masquerading’
representations that allow them to be accessed and controlled
and ‘trust’ act as the social bait where a hacker, masquerading
from anywhere. These devices can be interconnected using the
as a known vehicle sends malicious links, trusting the
wireless LAN networks similar to VANET, or might have an
transmitter makes the victim to click on the posted information
interlinked VANET network. The VANET attacks discussed
links. The hacker can send links containing messages about
above can hamper the operation of the ‘device intelligence
popular topics, intended not for the driver but for other
everyday things’ architecture. With widespread ubiquity of
travellers in the cars, willing to access the infotainment
internet, the attackers are also finding innovative ways to break
services. Once the links are activated, they can disrupt the
into the network and harness the resources, and to maliciously
entire VANET network or disconnect that vehicle from the
corrupt the data and effective communication between various
network. Some malicious extensions can appear on the
elements of the integrated architecture. With increasing number
infotainment systems disabling the antivirus/ encryption
of vehicles being added to the VANET, it is important to
systems of the targeted vehicles.
approach security threats from a more comprehensive point of
Besides focusing on the network vulnerability protection,
view, analysing all the requirements that need to be met for a
making the VANET networks more resilient to security threats
secure network [21].
could prevent a lot of damages to the technology, as follows:
It is understood that attacks and incursions are going to
• Theft of data: This consists not only of driver happen. In the future work, we plan to outline a framework for
information or financial data related to parking slot network security resiliency, in order to detect, access, predict
reservations, but also consists of credit card numbers, and mitigate the damage from VANET attacks as they happen.
drivers’ sensitive information and in some cases The authors propose to gain an expert understanding of how
drivers’ intellectual property or marketing plans. The attacker work, how attackers think, and attacks are launched
attacks have the most profound impact on the and executed and which node in the network is the most
user/driver credentials. Stolen driver credentials vulnerable. NCTuns simulator will be used to create realistic

2014 International Conference on Advances in Computing,Communications and Informatics (ICACCI) 2089


scenarios that emulate real-world attack traffic. This would [5] C. Laurendeau and M. Barbeau, “Threats to security in
include vulnerability testing, where attacks will be mounted DSRC/WAVE”, In 5th Int. Conf. ADHOC-NOW, Springer
against the targeted node using databases of known malware, Berlin/Heidelberg, 2006.
incursions, intrusions and other attacks. [6] C. Marco, “Body, Personal and Local Ad Hoc Wireless
Networks”, in The Handbook of Ad Hoc Wireless Networks,
VII. CONCLUSION CRC Press LLC, 2003, Ch. 1.
It is concluded that regardless of the encryption and secure [7] F. Kargl et al., “Secure vehicular communication systems:
Implementation, performance, and research challenges”, IEEE
routing protocols, the VANET architecture continues to
Comm. Magazine, vol. 46, no. 11, pp. 110-118, Nov. 2008.
remain potentially insecure as the attacker can listen in even
[8] G. Karagiannis et al., “Vehicular Networking: A Survey and
without gaining traceable physical access. The investigation
Tutorial on Requirements, Architectures, Challenges, Standards
reveals a few practices and theoretical constructs employed to and Solutions”. In IEEE Communications Surveys & Tutorials,
mitigate the insecurities in VANET their drawbacks are pp. 584–616, 2011.
highlighted. Major security flaws in VANET and their [9] H. Lu, J. Li, and M. Guizani, “A novel ID-based authentication
adversaries are also presented in the paper. We arrive at a framework with adaptive privacy preservation for VANET”, In
conclusion that amidst the evolving network environment, IEEE Computing, Communications and Applications Conf.
VANET needs to be supported with more secure architecture, (ComComAp), pp. 345–350, 2012.
with privacy of the users being acknowledged as the foremost [10] I. Aad, J.P. Hubaux and E.W. Knightly, “Impact of Denial of
exponent of VANET requirements. The study of security Service attacks on Ad Hoc Networks”, IEEE/ACM Transactions
features and flaws is expected to lead to developed on Networking, 2008, pp. 16-24.
broadcasting and routing protocols, adding to the quality-of- [11] J. Cheambe, J. Tchouto and M. Gerlach, “Security in Active
service. Due to mobility of vehicles, large scale networks, Safety Applications” 2nd International workshop on Intelligent
rapidly restructuring nodes and frequently changing Transportation (WIT), Germany, 2005.
topological structure; a fundamental requirement of VANETs [12] J. Hubaux, S. Hapkun and J. Luo, “The Security and Privacy of
is to ensure safe transmission of the time critical data. This Smart Vehicles,” Magazine of IEEE Security and Privacy, June
paper examines various security threats in VANETs, analyses 2004.
how they are implemented and their impact on the VANET [13] J. Liu et al., “Privacy-Preserving Quick Authentication in Fast
security architecture. It also describe attack process Roaming Networks,” Proc. 31st IEEE conference on Local
mechanism , illustration of Black hole attack and compared Computer Networks, pp. 975-982, 2006.
different types of security attacks in VANET with attacker [14] J. Sun et al., “An Identity-Based Security System for User
types and respective security attributes. Safer on road Privacy in VANETs”, IEEE Trans.on Parallel and Distributed
transportation refers to methods and measures for reducing Systems, vol. 21, no. 9, pp. 1227-1239, 2010.
the risk of a person using the road network being killed or [15] K. Plößl, T. Nowey and C. Mletzko, “Towards a Security
seriously injured. The highest possible degree of safety shall Architecture for Vehicular Ad Hoc Networks,” Proc. First Int.
Conf. on Availability, Reliability and Security (ARES’06), 2006.
be ensured when transporting goods by road. It is of vital
importance to monitor and validate the road transportation [16] K.C. Lee and M. Gerla, “Survey of Routing Protocols in
Vehicular Ad Hoc Networks”, In Car2Car communication
safety, including comprehensive checks on drivers, vehicles
consortium, 2010.
and safety processes.
[17] Parul Tyagi and Deepak Dembla., “A Taxonomy of Security
ACKNOWLEDGMENT Attacks and Issues in Vehicular Ad-Hoc Networks (VANETs)”,
International Journal of Computer Applications,
We would like to express sincere gratitude to JECRC vol.91,no.7,pp.22-29, April 2014. Published by Foundation of
University for providing us with a platform to work on this Computer Science, New York, USA.
project. We are thankful to JU for granting us access to [18] M. Raya and J.P. Hubaux, “The security of VANETs, In
laboratories and library, which has been pivotal in Proceedings of the 2nd ACM International Workshop on
successfully carrying out this research. Vehicular Ad Hoc Networks, 2005.
[19] M. Raya et al., “On data-centric trust establishment in
REFERENCES ephemeral ad hoc networks”, In IEEE Conf. on Computer
[1] A. Aijaz, B. Bochow, F. Dotzer, A. Festag, M. Gerlach, R. Kroh Communications, pp. 1238–1246, 2008.
and T. Leinmuller, “Attacks on inter vehicle communication [20] M. Raya, P. Papadimitratos, and J.P. Hubaux, “Securing
systems - an analysis”, In 3rd International Workshop on vehicular communications”, IEEE Wireless Communications
Intelligent Transportation. WIT, 2006. Magazine, vol. 13, no. 5, pp.8-15, 2006.
[2] A.Weimerskirch et al., “Data security in vehicular [21] A. Gluhak, S. Krco, M. Nati, D. Pfisterer, N. Mitton, T.
communication networks”, Ch. 9, pp. 309-320. Razafindralambo, A survey on facilities for experimental
[3] B. Aslam and D. Turgut, “Defense Against Sybil attack in Internet of Things research, IEEE Communications Magazine,
vehicular ad hoc networks”, In IEEE Military Communications vol 49, pp.58–67, 2011.
Conference, MILCOM, pp. 1-7, 2009.
[4] B. Parno and A. Perrig, “Challenges in Securing Vehicular
Networks,” Proc. Workshop on Hot Topics in Networks
(HotNets-IV), 2005.

2090 2014 International Conference on Advances in Computing,Communications and Informatics (ICACCI)

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy