A Systematic Survey on VANET: Routing Protocols, Harmful Attacks, and Security
Ajay Kumar1 , Raj Shree2
Section:Research Paper, Product Type: Journal Paper
Volume-6 ,
Issue-7 , Page no. 1153-1168, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.11531168
Online published on Jul 31, 2018
Copyright © Ajay Kumar, Raj Shree . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Ajay Kumar, Raj Shree, “A Systematic Survey on VANET: Routing Protocols, Harmful Attacks, and Security,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1153-1168, 2018.
MLA Style Citation: Ajay Kumar, Raj Shree "A Systematic Survey on VANET: Routing Protocols, Harmful Attacks, and Security." International Journal of Computer Sciences and Engineering 6.7 (2018): 1153-1168.
APA Style Citation: Ajay Kumar, Raj Shree, (2018). A Systematic Survey on VANET: Routing Protocols, Harmful Attacks, and Security. International Journal of Computer Sciences and Engineering, 6(7), 1153-1168.
BibTex Style Citation:
@article{Kumar_2018,
author = {Ajay Kumar, Raj Shree},
title = {A Systematic Survey on VANET: Routing Protocols, Harmful Attacks, and Security},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {7 2018},
volume = {6},
Issue = {7},
month = {7},
year = {2018},
issn = {2347-2693},
pages = {1153-1168},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2576},
doi = {https://doi.org/10.26438/ijcse/v6i7.11531168}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i7.11531168}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2576
TI - A Systematic Survey on VANET: Routing Protocols, Harmful Attacks, and Security
T2 - International Journal of Computer Sciences and Engineering
AU - Ajay Kumar, Raj Shree
PY - 2018
DA - 2018/07/31
PB - IJCSE, Indore, INDIA
SP - 1153-1168
IS - 7
VL - 6
SN - 2347-2693
ER -
VIEWS | XML | |
431 | 325 downloads | 194 downloads |
Abstract
VANETs privacy and security have attracted a lot of attention over the last couple of years. VANETs are being used to boost road safety and empower a wide variety of services like internet, Emergency Message etc. The Vehicular Ad-hoc Network is a collection of smart devices with their vehicle interface. It can play a significant role in the routing process and provide better Security. An increased number of vehicles can raise a number of accidents. That can be part of life loss. So it is the need for smart vehicles that can establish interpersonal communication and warn each other for safety and security. On the other hand, many forms of attacks against VANETs have emerged recently that attempt to compromise the security of VANET networks. Such security attacks on VANETs might cause harmful results. Therefore, making VANETs security has become a key objective for VANET designers. To modify and deploy secure VANET infrastructures remains a significant challenge. The authors portray the different routing protocol by using Octopus diagram, number of attacks and its solution in VANET. With the help of safety and road traffic info among vehicles and related network attacks which improve security under possible attacks in VANETs.
Key-Words / Index Term
VANET, Attacks, Security, Routing Protocol, Authentication, RSU, and DSRC
References
[01] Sherali Zeadally, Ray Hunt, Yuh-Shyan Chen, Angela Irwin, Aamir Hassan, “Vehicular ad hoc networks (VANETS): status, results, and challenges”, Telecommun Syst 50: 217, 2012. doi:10.1007/s11235-010-9400-5.
[02] Duarte, P. B. F., Fadlullah, Z. M., Vasilakos, A. V., & Kato, N., “On the partially overlapped channel assignment on wireless mesh network backbone: A game theoretic approach”, IEEE Journal on Selected Areas in Communications, 30(1), 119–127, 2012.
[03] Shivaldova, V., Paier, A., Smely, D., & Mecklenbra´uker, C. F., “On roadside unit antenna measurements for vehicle-to-infrastructure communications”, In 23d IEEE international symposium on personal, indoor and mobile communications (PIMRC) 2012.
[04] J. Bernsen, D. Manivannan, “RIVER: A reliable inter-vehicular routing protocol for vehicular ad hoc networks”, Comput. Netw. 52 (17), 3795–3807, 2012.
[05] Liao, Cong, Jian Chang, Insup Lee, and Krishna K. Venkatasubramanian, “A trust model for vehicular network-based incident reports”, In Wireless Vehicular Communications (WiVeC), IEEE 5th International Symposium on, pp-1-5, 2013.
[06] Kumar, N., Chilamkurti, N., & Rodrigues, J. J. P. C., “Learning automata-based opportunistic data aggregation and forwarding scheme for alert generation in vehicular ad hoc networks”. Computer Communications, 39, 22–32, 2014.
[07] Xiang, X., Qin, W., & Xiang, B. “Research on a DSRC based rear-end collision warning model”, IEEE Transactions on Intelligent Transportation Systems, 15(3), 1054–1065, 2014.
[08] Sheng, Z., et al. “A survey on the IETF protocol suite for the internet of things: Standards, challenges, and opportunities.” IEEE Wireless Communications, 20(6), 91–98, 2013.
[09] Isaac, J.-T., Camara, J.-S., Zeadally, S., & Marquez, J.-T. “A Secure vehicle-to-roadside communication payment protocol in vehicular ad hoc networks”, Computer Communications, 31(10), 2478–2484, 2012.
[10] K.-Y. Ho, P.-C. Kang, C.-H. Hsu, C.-H. Lin, "Implementation of WAVE/DSRC Devices for vehicular communications", Int. Symp. Computer Communication, Control, and Automation, vol. 2, May 2010.
[11] Xiang, X., Qin, W., & Xiang, B. “Research on a DSRC based rear-end collision warning model”, IEEE Transactions on Intelligent Transportation Systems, 15(3), 1054–1065, 2014.
[12] Zhang, X. M., Zhang, Y., Yan, F., & Vasilakos, A. V., “Interference-based topology control algorithm for delay-constrained mobile Ad hoc networks”, IEEE Transactions on Mobile Computing, 14 (4), 742–754 2015.
[13] S.S. Wang, Y.S. Lin, “PassCAR: A passive clustering aided routing protocol for vehicular ad hoc networks”, Comput. Commun. 36 (2), 170–179, 2013.
[14] Xiao, Y., Peng, M., Gibson, J., Xie, G. G., Ding-Zhu, D., & Vasilakos, A. V., “Tight performance bounds of multihop fair access for MAC protocols in wireless sensor networks and underwater sensor networks”, IEEE Transactions on Mobile Computing, 11(10), 1538–1554, 2012.
[15] C. Ou, “A Roadside Unit-based Localization Scheme for Vehicular Ad Hoc Networks”, International Journal of Communication Systems, vol. 27, pp. 135-150, 2014.
[16] Dua, A., Kumar, N., & Bawa, S., “A systematic review on routing protocols for vehicular ad hoc networks”, Vehicular Communications, 1, 33–52, 2014.
[17] A.M. Malla, R.K. Sahu, “A review on vehicle to vehicle communication protocols in VANETs”, Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3 (2), February 2013.
[18] M.A. Rabayah, R. Malaney, “A new scalable hybrid routing protocol for VANETs”, IEEE Trans. Veh. Technol, 61 (6), 2625–2635, 2012.
[19] L.V. Minh, Y.M. Chuan, G. Qing, “End-to-End delay assessment and hybrid routing protocol for vehicular ad hoc network”, IERI Proc. 2, 727–733, 2012.
[20] Meng, T., Wu, F., Yang, Z., Chen, G., & Vasilakos, A. V., “Spatial reusability-aware routing in multi-hop wireless networks”, IEEE Transactions on Computers, PP (99), 1–13, 2015). doi:10.1109/ TC.2015.2417543.
[21] O.A. Wahab, A. Mourad, H. Otrok, J. Bentahar, “CEAP: SVM-based intelligent detection model for clustered vehicular ad hoc networks”, Expert Syst. Appl. 50, 40–54, 2016.
[22] Manju Bhardwaj, "Faulty Link Detection in Cluster based Energy Efficient Wireless Sensor Networks", International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.3, pp.1-8, 2017.
[23] Sandonis, V., Calderon, M., Soto, I., & Bernardos, C. J., “Design and performance evaluation of a PMIPv6 solution for geonetworking-based VANETs”, Ad Hoc Networks, 11, 2069–2082, 2013.
[24] A. Fonseca, T. Vazao, “Applicability of position based routing for VANET in highways and urban environment”, J. Netw. Comput. Appl. 36 (3),961–973, 2013.
[25] L. Zhang, D. Gao, W. Zhao, H.C. Chao, “A multilevel information fusion approach for road congestion detection in VANETs”, Math. Comput. Model. 58 (5–6), 1206–1221, 2013.
[26] Zhou, J., et al. “Secure and privacy-preserving protocol for cloud-based vehicular DTNs”, IEEE Transactions on Information Forensics and Security, 10(6), 1299–1314, 2015.
[27] Viriyasitavat, W., Boban, M., Tsai, H.-M., & Vasilakos, A. V., “Vehicular communications: Survey and challenges of channel and propagation models”, IEEE Vehicular Technology Magazine x, 10(2), 55–66, 2014.
[28] A.Vani, "Detection and Elimination of Wormhole Attacks in a MANET", International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.5, pp.35-40, 2017.
[29] J. Grover, M.S. Gaur, V. Laxmi, N.K. Prajapati, “A Sybil attack detection approach using neighboring vehicles in VANET, in Proceedings of the 4th International Conference on Security of Information and Networks, pp. 151–158, 2011.
[30] X. Feng, C. Li, D. Chen, J. Tang, “A method for defensing against multi-source Sybil attacks in VANET”, Peer-to-Peer Netw. Appl. 10 (2), 305–314, 2017.
[31] B. Yu, C.-Z. Xu, B. Xiao, “Detecting Sybil attacks in VANETs, J. Parallel Distrib”, Comput. 73 (6) 746–756, Jun 2013.
[32] U. Khan, S. Agrawal, S. Silakari, “Detection of malicious nodes in vehicular ad-hoc networks”, Procedia Comput. Sci. 46, 965–972, 2015.
[33] A. Daeinabi, A.G. Rahbar, “Detection of malicious vehicles (DMV) through monitoring in vehicular ad-hoc networks”, Multimed. Tools Appl. 66 (2), 325–338 2013.
[34] D. Kushwaha, P.K. Shukla, R. Baraskar, “A survey on Sybil attack in vehicular ad-hoc network”, Int. J. Comput. Appl. 98 (15), July 2014.
[35] Zeadally, Sherali, Ray Hunt, Yuh-Shyan Chen, Angela Irwin, and Aamir Hassan, “Vehicular ad hoc networks (VANETS): status, results, and challenges”, Telecommunication Systems 50, no- 4 pp- 217-241, 2012.
[36] H. Sedjelmaci, S.M. Senouci, “An accurate and efficient collaborative intrusion detection framework to secure vehicular networks”, Comput. Electr. Eng. 43, 33–47, 2015.
[37] Zeng, Y., Xiang, K., Li, D., & Vasilakos, A. V., “Directional routing and scheduling for green vehicular delay tolerant networks”, Wireless Networks, 19(2), 161–173, 2013.
[38] Y. Liu, J. Niu, J. Ma, L. Shu, T. Hara, W. Wang, “The insights of message delivery delay in VANETs with a bidirectional traffic model”, J. Netw. Comput. Appl. 36 (5), 1287–1294, 2013.
[39] N. Kumar, N. Chilamkurti, “Collaborative trust aware intelligent intrusion detection in VANETs”, Comput. Electr. Eng. 40 (6), 1981–1996, 2014.
[40] M.Ch. Chuang, J.F. Lee, “TEAM: trust-extended authentication mechanism for vehicular ad hoc networks”, IEEE Syst. J. 8 (3), 2013.
[41] Biswas, Subir, Jelena Misic, and Vojislav Misic, “ID-based safety message authentication for security and trust in vehicular networks”, In Distributed Computing Systems Workshops (ICDCSW), 31st International Conference on, pp- 323-331, 2011.
[42] K. Verma, H. Hasbullah, A. Kumar, “Prevention of DoS attacks in VANET”, Wireless Person. Commun. 73 (1),95–126, 2013.
[43] L. He, W.T. Zhu Mitigating, “DoS attacks against signature-based authentication in VANETs”, IEEE Int. Conf. Comput. Sci. Automat. Eng. (CSAE) 3, 261–265, 2012.
[44] Abubakar Bala and Yahya Osais, "Modelling and simulation of DDOS Attack using SimEvents", International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.2, pp.5-14, 2013.
[45] A.M. Malla, R.K. Sahu, “Security attacks with an effective solution for Dos attacks in VANET”, Int. J. Comput. Appl, (ISSN 0975-8887), 66 (22), 2013.
[46] S. Biswas, J. Misic, V. Misic, “DDoS attack on WAVE-enabled VANET through synchronization”, in: Global Communications Conference (GLOBECOM), pp. 1079-1084, 2012.
[47] J.T. Isaac, S. Zeadally, J.S. Cámara, “Security attacks and solutions for vehicular ad hoc networks”, IET Commun. 4 (7), 894, 2010.
[48] Shree, R., Khan, R., “Wormhole attack in wireless sensor network”, Int. J. Comput. Netw. Commun. Secur, 2(1), 22–26, 2014.
[49] V. La Hoa, A. Cavalli, “Security attacks and solutions in vehicular ad hoc networks: a survey”, Int. J. Netw. Syst. 4 (2), April, 2014.
[50] A. Kumar, R. Shree, “Study of Wireless Technologies Related to Vehicular Ad-hoc Sensor Network for Intelligent Control and Security”, International Journal of Innovations & Advancement in Computer Science, ISSN No. 2347 – 8616 Vol. 4, 2015.
[51] M. Joe, and B. Ramakrishnan, “Review of Vehicular Ad hoc Network Communication Models including WVANET (Web VANET) Model and WVANET Future Research Directions”, Wireless Networks, Springer, vol. 22, no. 7, pp. 2369-2386, 2015.
[52] M. Joe, and B. Ramakrishnan, “WVANET: Modelling a Novel Web-Based Communication Architecture for Vehicular Network”, Wireless Personal Communications, Springer, vol. 85, no. 4, pp. 1987-2001, 2015.
[53] V. Bibhu, R. Kumar, B.S. Kumar, D.K. Singh, “Performance analysis of black hole attack in VANET”, Int. J. Comput. Netw. Inf. Security 4 (11) 47, 2012.
[54] S.Sharma, Rajshree, R.P.Pandey, V.Shukla, “Bluff-Probe Based Black Hole Node Detection and Prevention”, IEEE International Advance Computing Conference (IACC), pp. 458-462, March 2009.
[55] S. Biswas, J. Misic, “A Cross-Layer Approach to Privacy-Preserving Authentication in WAVE-Enabled VANETs”, IEEE Trans. Veh. Technol. 62 (5), 2182–2192 Jun, 2013.
[56] Ram Shringar Raw, Manish Kumar, Nanhay Singh, “Security Challenges, Issues And Their Solutions For Vanet”, International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.5, pp- 95-105, September, 2013.
[57] K. Lim, D. Manivannan, “An efficient protocol for authenticated and secure message delivery in vehicular ad hoc networks”, Veh. Commun. 4, 30–37, 2016.
[58] R. Raiya, Sh. Gandhi, “Survey of various security techniques in VANET”, Int. J. Adv. Res. Comput. Sci. Softw. Eng. 4 (6), June 2014.
[59] J.-P. Hubaux, S. Capkun, J. Luo, “The security and privacy of smart vehicles”, IEEE Security Privacy Mag. 2, 49–55, 2004.
[60] U. Korupolu, S. Kartik, GK. Chakravarthi, "An Efficient Approach for Secure Data Aggregation Method in Wireless Sensor Networks with the impact of Collusion Attacks", International Journal of Scientific Research in Computer Science and Engineering, Vol.4, Issue.3, pp.26-29, 2016
[61] X. Zhu, S. Jiang, L. Wang, H. Li, “Efficient privacy-preserving authentication for vehicular ad hoc networks”, IEEE Trans. Veh. Technol. 63 (2), 907–919, 2014.
[62] P. Vijayakumar, M. Azees, A. Kannan, L. J. Deborah, "Dual authentication and key management techniques for secure data transmission in vehicular ad hoc networks", IEEE Trans. Intell. Transp. Syst., vol. 17, no. 4, pp. 1015-1028, Apr. 2016.
[63] Shen, W., Liu, L., Cao, X., Hao, Y., & Cheng, Y.. “Cooperative Message Authentication in Vehicular Cyber-Physical Systems”. IEEE Transactions on Emerging Topics in Computing, 1(1), 84-97, 2013.
[64] A. Perrig et al., “The TESLA Broadcast Authentication Protocol,“ RSA CryptoBytes, vol. 5, no. 2, pp. 2–13, 2002.
[65] Z. Li and C. Chigan, “On joint privacy and reputation assurance for vehicular ad hoc networks,” IEEE Transactions on Mobile Computing, vol. 13, no. 10, pp. 2334–2344, 2014.
[66] Jie Li et al., “ACPN: A Novel Authentication Framework with Conditional Privacy-Preservation and Non-Repudiation for VANETs”, IEEE Transactions on Parallel and Distributed Systems, Vol. 26, No. 4, pp.938-948, April 2015.