Security Attacks and Challenges of Vanets: A Literature Survey
Security Attacks and Challenges of Vanets: A Literature Survey
Security Attacks and Challenges of Vanets: A Literature Survey
Abstract
This paper presented a brief introduction along with various wireless standards which provide an interactive way of interaction among the
vehicles and provides effective communication in VANET. Security issues such as confidentiality, authenticity, integrity, availability and
non-repudiation, which aims to secure communication between vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I). A detailed
discussion and analysis of various possible attacks based on security services are also presented that address security and privacy concern in
VANETs. Finally a general analysis of possible challenges is mentioned. This paper can serve as a source and reference in building the
new technique for VANETs.
Key Words: Security Attacks, Security Services, VANET.
Manuscript received December 02, 2019; Revised December 24, 2019; Accepted December 28, 2019. (ID No.JMIS-19M-12-046)
Corresponding Author (*): Abdul Qayoom, University of Jammu, India, quyoom12345@gmail.com
1,3
University of Jammu, India,
2
Shri Venkateshwara University U.P. India
45
Security Attacks and Challenges of VANETs: A Literature Survey
using traffic monitoring and management applications. II. STANDARDS FOR WIRELESS ACCESS
Non-safety applications, on the other hand, enable IN VALNET
passengers to access various services like Internet/World
Wide web, interactive communication, online games,
Vehicular environment supports different
payment services and information updates while vehicles
communication standards that relate to wireless accessing.
are on the move. The key difference between safety and
The standards are generally helpful for the development of
non-safety applications is that the safety applications are
product to reduce the cost and it also helps the users to
capable of sending and processing messages in real time [3].
compare competing products. These standards are as
The driver and passengers can access both kinds of services
follows:
from the nearby infrastructure seamlessly using wireless
access technologies [7].VANET and MANET have many
2.1 IEEE 1609-standards for Wireless Access in
similarities such as dynamic topology, multi-hop data
Vehicular Environments (WAVE)
transmission, distributed architecture and Omni-directional
It is also known as IEEE 802.11p. It supports the ITS
broadcast. In both networks, mobile nodes are able to route
applications, for a short range communications. In WAVE,
or relay datato the destination by itself [23]. However, there
V2V and V2R communication uses 5.85-5.925 GHz
are some notable differences between VANET and MANET.
frequency range. It provides real time traffic information
Since the vehicles are moving along the road, the mobility
improving performance of VANET. It also benefits the
of nodes in VANET is predictable unlike MANET [5].
transport sustainability. It contains the standard of IEEE
Furthermore, there is no limitation of storage and
1609 [7], [8], [9]. This is upper layer standard. It uses
processing capability and battery power of nodes in a
Orthogonal Frequency Division Multiplexing techniques
VANET. Due to the fast movement of nodes the topology of
to divide the signal into various narrow band channels.
network formed tends to become highly dynamic. In
This also helps to provide a data transferring rate of 3, 4.5,
addition, network density in VANET varies significantly
6, 9, 12, 18, 24 and 27 Mbps in10 MHz channels.
over time and location [8].
46
Journal of Multimedia Information System VOL. 7, NO. 1, March 2020 (pp. 45-54): ISSN 2383-7632 (Online)
http://doi.org/10.33851/JMIS.2020.7.1.45
node mobility and random speed of vehicles, the detection technique using group signature scheme has
position of node changes frequently. As a result of this, been introduced [5]. The scheme is focusing on
network topology in VANETs tends to change availability of exchanging the messages between vehicles
frequently. and RSUs. When the attack causes network unavailability,
the proposed technique still survives due to
• Unbounded network size: VANET can be interconnection using public and private keys between
implemented for one city, several cities or for RSUs and vehicles.
countries. This means that network size in VANET is
geographically unbounded. 4.2 Authentication
Authentication is the verification of the identity
• Frequent exchange of information: The ad hoc between vehicles and RSUs and the validation of integrity
nature of VANET motivates the nodes to gather of the information exchange. Additionally, it ensures that
information from the other vehicles and road side all vehicles are the right vehicle to communicate within
units. Hence the information exchange among node network. Public or private keys with CA are proposed to
becomes frequent. establish connection between vehicles, RSUs and AS [8],
[12]. On the other hand, password is used to access to the
• Wireless Communication: VANET is designed for RSUs and AS as authentication method [9].
the wireless environment. Nodes are connected and
exchange their information via wireless. Therefore 4.3 Integrity
some security measure must be considered in Data integrity is the assurance that the data received by
communication. nodes, RSUs and AS is the same as what has been
generated during the exchanges of the message. In order to
• Time Critical: The information in VANET must be protect the integrity of the message, digital signature
delivered to the nodes with in time limit so that a which is integrated with password access is used [10].
decision can be made by the node and perform action
accordingly. 4.4 Confidentiality
Confidentiality ensures that classified information in the
• Sufficient Energy: The VANET nodes have no issue network can never disclose to unidentified entities [14]. It
of energy and computation resources. This allows also prevents unauthorized access to confidential
VANET usage of demanding techniques such as RSA, information such as name, plate number and location. The
ECDSA implementation and also provides unlimited most popular technique, pseudonyms are used to
power. preserved privacy in vehicular networks [2], [3], [21].
Each vehicle node will have multiple key pairs with
• Better Physical Protection: The VANET nodes are encryption. Messages are encrypted or signed using
physically better protected. Thus, VANET nodes are different pseudo and these pseudo has not linked to the
more difficult to compromise physically and reduce vehicle node but relevant authority has access to it.
the effect of infrastructure attack [23]. Vehicle need to obtain new pseudo from RSUs before the
earlier pseudo expires.
IV. SECURITY SERVICES IN VANET
4.5 Non-Repudiation
Ensures that sending and receiving parties cannot deny
Security is an important issue for ad hoc networks,
ever sending and receiving the message such as accident
especially for security sensitive applications. To secure an
messages. In certain fields, non-repudiation is called audit
ad hoc network, we need to consider the following
ability whereby RSUs and vehicles can prove have been
attributes as criteria to measure security which includes
receive and sent respectively.
availability, confidentiality, integrity, authentication and
non-repudiation.
V. POSSIBLE ATTACKS IN VANETS
4.1 Availability
The availability deals with network services for all Even if there are advances in VANET but still it has
nodes comprises of bandwidth and connectivity [13]. In many challenges to be overcome. This challenge is attacks
order to encounter the availability issues, prevention and on VANET. Raya et al. [13] classifies attacker as having
47
Security Attacks and Challenges of VANETs: A Literature Survey
three dimensions: “insider versus outsider”, “malicious network services. The attacker attacks the communication
versus rational”, and “active versus passive”. The types of medium or network’s nodes to cause the channel or some
attacks against messages, can be described as follows: problem to networks or nodes. The vehicle is unable to
“Bogus Information”, “Cheating with Positioning access the networks and result in devastation and
Information”, “ID disclosure”, “Denial of Service”, and overtiredness of the nodes and network’s resources. None
“Masquerade”. Irshad Ahmed Sumra et al. [14] proposed of the researchers are focusing on DoS and DDoS attack
different classes of attacks like network, application, in VANETs as up to date.
timing, monitoring, and social. Each class describes
different type of attack, its threat level, and its priority. 5.1.4 Malware
Along with this model some new attacks are also proposed Malware is a malicious software whose aim to disrupt
by them. The aim of their model is to easily identify these the normal operation. This attack is carried out by insider.
attacks and their association to respective classes. The This attack is introduced in the network when the software
purpose of these attacks is to create problem for users to update is received by car’s VANET units and roadside
access the system or phishing some information. Attacks station.
in VANET [4], [15] are classified depending on the
Availability, Authentication / identification, 5.1.5 Black Hole Attack
Confidentiality, Privacy, Non-repudiation, and Data-trust. This is one of the security attack occur in VANET. In this
Some of them are discussed below [21]. attack the attacker node refuses to participate or even drop
the data packet [16]. Hence the effect of this type of attack
5.1 Attacks on availability is most dangerous to the vehicular network.
Availability in VANET means any information at any
time of communication. This security requirement is 5.1.6 Greedy Drivers
critical in time varying environment. Availability in Greedy drivers are those who try to attack for their own
VANET should be assured both in the communication benefit. These drivers cause overload problem for RSU.
channel and participating nodes. A classification of these This leads to delay in service to the authorized users. On
attacks, according to their target, is as follows: increasing number of such drivers the authorized users
faced slow services.
5.1.1 Spamming
Spamming are the messages which are of no use to the 5.2 Attacks on Authentication/identification
users like advertisements. The aim of such attack is to In these types of attack the affected area is
consume bandwidth and increase the transmission latency. identification/authentication. Whenever any vehicle in
Centralized administration control is difficult n such VANET needs secure communication its basic
attacks [23]. requirement is either identification or authentication of
nodes under consideration. When the receiving vehicle is
5.1.2 Broadcast Tampering identified or authenticated then only a trustworthy
In this type of attack the attackers introduces false transmitter vehicle is allowed to communicate amongst
safety messages into the network. This message sometime them. The different types of attack on
hides the traffic warnings [7]. This leads to the critical authentication/identification are discussed as follows.
situation like accidents and road congestions’.
5.2.1 Replay /Playback Attack
5.1.3 Denial of Service (DoS) and DDoS Attack It is a form of network attack, in which a valid data
Denial of Service (DOS) [14] is one of the most serious transmission is maliciously or fraudulently repeated or
level attacks in vehicular network. In DOS attack, the delayed. This attack happens when an attacker replays the
attacker jams the main communication medium and transmission of earlier information to take advantage of
network is no more available to legitimate users. The main the situation of the message at time of sending [6], [23].
aim of DOS attacker is to prevent the authentic users to
access the network services. DOS attack also causes the 5.2.2. Sybil Attacks
attacks like DDOS (Distributed Denial Of service) which Sybil attack is the creation of multiple fake nodes
is one of the sever attack in vehicular environment. The broadcasting false information. In Sybil attack, a vehicle
aim of this attack is to slow down the network. Jamming is install with On Board Unit (OBU) sends multiple copies
also one of the kinds of DOS attack which jams the of messages to other vehicle and each message contains a
channel, thus not allowing other users to access the different fabricated identity. The problem arises when
48
Journal of Multimedia Information System VOL. 7, NO. 1, March 2020 (pp. 45-54): ISSN 2383-7632 (Online)
http://doi.org/10.33851/JMIS.2020.7.1.45
malicious vehicle is able to pretend as multiple vehicles sends a malicious message such as virus to neighbor of
and reinforce false data. There are several technique targeted nodes. When the neighbors of the attacker are
proposed to encounter Sybil attack in VANETs such as attacked by virus, then they take the ID of the target nodes
statistical and probability, signal strength and session keys as well as target’s nodes current location [2], [7]. This
[1]-[6]. However, each of these schemes has advantageous tracked data is used for other purpose like car rental
and disadvantageous due to dynamic characteristics, companies to track their own cars [15]. F. Li et al. is used
weather conditions and system design. One of the pseudonyms as an exchange mechanism to encrypt and
interesting method proposed by [1] and [4] are based on hide vehicle’s unique identity such as driver’s name, plate
statistical and probability algorithm integrated with signal number and location [10]. The pseudonyms used the
strength as an input data. The different between received Public Key Infrastructure to sign the message and this
signal strength and estimate signal strength is claimed by make it difficult to track.
positioners calculated. It is analyzed by AS using
statistical and probability algorithm. A framework to 5.2.8. Sending False Information
detect Sybil attacks in nodes has been proposed using Sending False Information can be described as sending
Certificate Authority (CA) [2], [3]. Two main steps the wrong and fake information purposely by one node to
involve in the process are system initialization and attacks another to create chaos scenarios. This scenario may
detection where public key and private key are used create misinterpretation of the actual scenario. False
during system initialization to sign in the message. information is sent by attackers to vehicle for selfish
reasons. For example, attacker might send false report on
5.2.3 Masquerading congestion, accident or road block in order to clear the
This attack is a result of providing false identities while road. A scheme has been proposed to detect the
communication by an attacker. Masquerading [15] compromised nodes that may misbehave using different
involves message fabrication, alteration and replay. For kinds of technique [2], [3], [5], [12]. One of the schemes is
example, to slow down other vehicle speed an attacker a group signature which relies on password access. It can
tries to act as an emergency vehicle and hence defraud be applied to sign message so that when another vehicle
other vehicle. receives a message, it only check the authentication of the
message. This scheme is not practical since group
5.2.4 Global Positioning System (GPS) Spoofing members always will change frequently especially in a
The exact position on the earth can be easily known to city networks.
every vehicle by using GPS. In this attack an attacker
provide false information to other vehicle by producing 5.2.9 Node Impersonation
false readings in the GPS devices. This is done by an Node impersonation is an attempt by a node to send
attacker using GPS simulators that generate signals which modified version of message and claims that the message
are stronger than those generated by genuine satellite comes from originator for the unknown purpose. An
algorithm technique to detect and isolate node
5.2.5 Tunneling impersonation using greedy algorithm that is Detection of
This attack happens when an attacker connects two Malicious Vehicle(DMV) and Outlier Detection algorithm
distant parts of the Adhoc network using an extra has been proposed to overcome this problem [7]-[9]. The
communication channel as a tunnel. As a result, two schemes used RSU to detect and observe an abnormal
distant nodes assume they are neighbors and send data behavior of nodes. The proposed scheme increases the
using the tunnel [12]. The attacker has the possibility of trust value of the node if the vehicle is trusted. The
conducting a traffic analysis or selective forwarding attack identity (ID) of the vehicle will be reported to the relevant
Certificate Authority (CA) as malicious if distrust value is
5.2.6 Message Tampering higher than threshold value.
In this attack the valuable or even critical traffic safety
messages can be manipulated. This is done by attacker by 5.3 Attacks on confidentiality
modifying, dropping or corrupting the messages [7]. Confidentiality is one of the important security
requirement in vehicular communication, it assure that the
5.2.7 ID Disclosure message will only be read by authorized parties [16]. This
In this type of attack the ID of targeted nodes will get kind of security requirement is generally present in group
disclosed for tracking the current location of that node. A communications, in which only group members are
global observer monitors the target nodes and sometime allowed to read such information. The remaining VANET
49
Security Attacks and Challenges of VANETs: A Literature Survey
settings transmit public information. Because VANET Due to this, we can’t use structures like tree because these
mobility is higher than MANET, routing with capability of structures can’t be set up and maintained as rapidly as the
ensuring security in VANET is more problematic than topology changed.
Adhoc [13]. Confidentiality of messages exchanged
between the nodes of a vehicular network is particularly Congestion and collision Control: The unbounded
vulnerable with techniques such as unlawful collection of network size also creates a challenge. The traffic load is
messages through eavesdropping and gathering of location low in rural areas and night in even urban areas. Due to
information available through the transmission of this, the network partitions frequently occurs while in rush
broadcast messages. In case of eavesdropping, the attacker hours the traffic load is very high and hence network is
can collect information about existing users without their congested and collision occurs in the network.
permission and use the information at a time when the
user is unaware of the collection. Location privacy and Environmental Impact: VANETs use the
anonymity are important issues for vehicle users [21], [23]. electromagnetic waves for communication. These waves
are affected by the environment. Hence to deploy the
5.4 Attacks on privacy VANET the environmental impact must be considered.
This type of attack is related with unauthorized
accessing important information about vehicles. There is MAC Design: VANET generally use the shared medium
direct relation between driver and vehicle. If the attackers
to communicate hence the MAC design is the key issue.
illegally access some data this directly affect the driver’s
Many approaches have been given like TDMA, SDMA,
privacy [15]. Usually a vehicle owner is also its driver, so
and CSMA etc. IEEE 802.11 adopted the CSMA based
if an attacker is getting the owner’s identity then indirectly
Mac for VANET.
vehicle could put its privacy at risk; this type of privacy
attack is called as identity revealing. Location tracking is
Security: As VANET provides the road safety
also one of the well-known privacy attacks. In this attack
applications which are life critical therefore security of
the location of vehicle or the path followed by that vehicle
these messages must be satisfied.
at particular period of time is considered as a personal data.
Given the challenges and characteristics of VANETs, Key Distribution: All the security mechanisms
some future perspectives should be considered to design implemented in VANET dependent on keys. Each message
new efficient communication approaches, as follows: is encrypted and need to decrypt at receiver end either
with same key or different key. Also different
Network Management: Due to high mobility, the manufacturer can install keys in different ways and in
network topology and channel condition change rapidly. public key infrastructure trust on CA become major issue.
50
Journal of Multimedia Information System VOL. 7, NO. 1, March 2020 (pp. 45-54): ISSN 2383-7632 (Online)
http://doi.org/10.33851/JMIS.2020.7.1.45
Therefore distribution of keys among vehicles is a major carry-and forward technique, which further increases the
challenge in designing security protocols [22], [32]. information delivery time. Those problems may be
solved/minimized exploring new data communication
Incentives: Manufactures are interested to build approaches for Heterogeneous Vehicular Networks. As
applications that consumer likes most. Very few another alternative, the driver’s behavior can be
consumers are agree with a vehicle which automatically considered to improve the carry-and-forward method and
reports any traffic rule violation. Hence successful reduce the information delivery time.
deployment of vehicular networks will require incentives
for vehicle manufacturers, consumers & government is a Tracking a target: Communication is a fundamental
challenge to implement security in VANET. aspect in any network and, in VANETs, depends on the
physical location of vehicles. Therefore, tracking a target
Highly heterogeneous vehicular networks: many is a fundamental functionality in VANETs for
non-interoperable wireless networking technologies have communication protocols and also for applications and
emerged with the rapid development and availability of services that can benefit from this type of information [20].
mobile computing systems and environments, As a Tracking requires creating a mechanism to identify the
consequence, connectivity across different wireless path a node follows in the network and predict the next
networking technologies is very complex in terms of node positions if necessary. As pointed out before, privacy
addressing, quality of service, routing, security and billing. issues have to be observed in the devised solutions [22].
Thus, it is expected that the next generation of intelligent
transportation systems reflect a more holistic approach to VII. COMPARATIVE ANALYSIS OF
network solutions. This would require support to the
ECURITY ALGORITHMS FOR VANETS
coexistence of multiple different co-located wireless
networks to provide ubiquitous and universal access to Table 1 shows the comparative Analysis of Security
broadband services [11]. Algorithms for VANETS
Data management and storage: As outlined above, 7.1. Prevention Measures for Existing Attacks
we can expect to have large scale vehicular networks with
millions of vehicles, which will generate huge amounts of Table 2 shows the preventive measures for existing attacks.
distributed data that must be stored in some fashion and
distributed across the VANETs. Due to this feature, as Table 2. Preventive measures for existing Attacks.
pointed out in [17, 19], size of network and amount of
produced data is very large, it pose new and unique Property Attacks Preventive Measures
challenges to data management in this setting. Violated
Privacy Location ID based system
trailing
Localization systems: Critical safety applications in Availability Denial of IP Info. Handling
Service (DOS)
VANETs require more reliable and high accurate Routing Cryptography Hashing etc.
localization systems. A natural solution of a localization attacks
Integrity and Eavesdropping Creation of cipher
system for VANETs is to embed a navigation device in confidentiality Replay Time-stamping
each vehicle. But satellite-based positioning systems Bogus info. Hashing, Asymmetric
present some undesired problems such as not always being cryptography
Authenticity Sybil Radio resource testing,
available. Furthermore, satellite-based positioning systems Registration, Position
are vulnerable to several types of attacks such as spoofing verification, etc.
Impersonation Trust authority, PK1
and blocking. In addition, it has a localization error of 10 Timing attack Encryption solution (TPM)
to 30 m, which does not satisfy the requirements of critical Session Encryption, Random SID
applications for VANETs and implies the need for other hijacking generation
localization techniques.
51
Security Attacks and Challenges of VANETs: A Literature Survey
52
Journal of Multimedia Information System VOL. 7, NO. 1, March 2020 (pp. 45-54): ISSN 2383-7632 (Online)
http://doi.org/10.33851/JMIS.2020.7.1.45
Transactions on Intelligent Transportation Systems, of Future Generation Computer Systems, pp. 843-864,
vol. 20, no. 5, pp. 1621–1632, 2019. 2019.
[6] Saif Al-Sultan, Moath M. Al-Doori, Ali H. Al-Bayatti, [17] Kumar Mr Kamal, and Rahul Malhotra, “Analysis of
and HussienZedan, “A comprehensive survey on Sybil Attack Isolation Technique in VANET,”
vehicular ad hoc network,” Journal ofNetwork and International Journal of Computer Science and Mobile
Computer Applications, vol.37, no. 1, pp. 380–392, Computing (IJCSMC), vol. 8, no. 5, pp.187–192, May
2014. 2019.
[7]Z. Lu, G. Qu, and Z. Liu, “A survey on recent advances [18] Singh Avinash et al., “Implementing Security
in vehicular network security, trust, and privacy, Services in VANET Using Cryptography Based on
“IEEE Transactions on Intelligent Transportation Artificial Neural Network,” Journal of Computer and
Systems, vol. 20, no. 2, pp. 760–776, 2019. Mathematical Sciences,vol. 10, no. 9, pp. 1573-1584,
[8] Abdul Quyoom, Raja Ali and Devki Nandan Gouttam, 2019.
“A Novel Mechanism of Detection of Denial of [19] Karagiannis D. and Argyriou A., “Jamming attack
Service Attack (DoS) in VANET using Malicious and detection in a pair of RF communicating vehicles
Irrelevant Packet Detection Algorithm (MIPDA),” in using unsupervised machine learning,” Vehicular
Proceedings of the IEEE International Conference on Communications, vol.13,pp. 56-63, 2018.
Computing, Communication and Automation [20] Safi, Q.G.K., Luo, S., Wei, C., Pan, L. and Yan, G.,
(ICCCA2015), pp. 414-419, 2015. “Cloud-based security and privacy-aware information
[9] Jafer, Muhammad, et al., “Secure Communication in dissemination over ubiquitous VANETs,” Computer
VANET Broadcasting,” ICST Transaction on Security Standards and Interfaces, vol.56, pp. 107-115, 2018.
Safety, vol.5, no.17, 2019. [21]. J. Liu, Y. Yu, Y. Zhao et al., “An efficient privacy
[10] Karimireddy, T. and Bakshi, A., “A Hybrid Security preserving batch authentication scheme with deterable
Framework for the Vehicular Communications in function for VANETs,” in Proceedings of the
VANET,” in Proceedings of the International International Conference on Network and System
Conference on Wireless Communications, Signal Security, pp. 288–303, 2018.
Processing and Networking (WiSPNET), pp. 1929- [22] Usha M., Ramakrishnan B, “An enhanced MPR-
1934, 2016. OLSR protocol for efficient node selection process in
[11]. J. Cui, L. Wei, J. Zhang, Y. Xu, and H. Zhong, “An cognitive radio based VANET,”Wireless
efficient message authentication scheme based on edge pers. Commun. vol.106, no.2, pp. 763–787, 2019.
computing for vehicular ad hoc networks,” IEEE [23] Usha M., Ramakrishnan B, “A robust architecture of
Transactions on Intelligent Transportation Systems, the OLSR protocol for channel utilization and
vol. 20, no. 5, pp. 1621–1632, 2019. optimized transmission using minimal multi point
[12]Mishra R., Singh A. and Kumar R., “VANET Security: relay selection in VANET,” Wireless Pers. Commun.
Issues, Challenges and Solutions,” in Proceedings of Now, pp. 1–25, 2019.
International Conference on Electrical, Electronics, [24]. K. Bylykbashi, D. Elmazi, K. Matsuo, M. Ikeda, and
and Optimization Techniques (ICEEOT), pp. 1050- L. Barolli, “Effect of security and trustworthiness for a
1055, 2016. fuzzy cluster management system in VANETs,”
[13]Md Whaiduz-zaman, Mehdi Sookhak, Abdullah Gani, Cognitive Systems Research, vol. 55, pp. 153–163,
and Rajkumar Buyya, “A survey on vehicular cloud 2019.
computing,” Journal of Network and Computer [25]. A. Singh, R. Mishra and R. Kumar, “VANET
Applications, vol. 40, pp. 325–344, 2014. security: Issues, challenges and solutions,”
[14] Sumra, Irshad Ahmed, Iftikhar Ahmad, International Conference on Electrical, Electronics,
HalabiHasbullah, and J-L. bin Ab Manan, “Classes of and Optimization Techniques, pp. 1050-1055, 2016.
Attacks in VANET,” in Proceedings of Saudi [26]. A. Ribagorda, J. M. de Fuentes and A. I. Gonzalez-
International Electronics, Communications and Tablas “Overview of security issues in vehicular ad-
Photonics Conference (SIECPC), pp. 1-5, 2011. hoc networks,” Handbook of Research on Mobility
[15] A. Festag. “Cooperative intelligent transport systems and Computing, IGI Global, 2010.
standards in Europe,” Communications Magazine, [27] Horng S., Tzeng S., Li T., Wang X., and Huang P.,
IEEE, vol. 52, no.12, pp. 166–172, Dec. 2014. Khan M., “Enhancing Security and Privacy for
[16] Hussain Rasheed, Fatima Hussain, and Sherali Identity-based Batch Verification Scheme in
Zeadally, “Integration of VANET and 5G Security: A VANET,”IEEE Transactions on Vehicular Technology,
review of design and implementation issues,” Journal vol. 66, no. 4 (2015): 3235-3248.
53
Security Attacks and Challenges of VANETs: A Literature Survey
[28] A. S. Al Hasan, Md. Shohrab Hossain, and Technology with specialization in Deep Learning. He has three
Mohammed Atiq-uz-zaman, “Security threats in years of teaching experience in teaching and has also worked in
software industry. His research interests include artificial
vehicular ad hoc networks,” in Proceedings of the intelligence, medical image processing, intelligent image
Conference on Advances in Computing, segmentation, algorithm design, and deep learning.
Communications and Informatic, pp. 21-24, Sept.2016.
[29] Chen, L., Tang, H., and Wang, J., “Analysis of Dr. Abid Sarwar has been working
in the field of application of Artificial
VANET security based on routing protocol Intelligence in Medicine (especially in
information,” in Proceedings of the Fourth cervical cancer and diabetes) for the last
International Conference on Intelligent Control and 08 years. He did Masters in Computer
Applications from Department of
Information Processing, pp. 134-138, Jun. 2013.
Computer Sc. & IT, University of
[30] A. A. Wagan, Bittl, S., Gonzalez, A. A., Myrtus, M., Jammu in 2009. He obtained PhD
Beckmann, H., Sailer, S. and Eissfeller, B., “Emerging degree from Department of Computer
attacks on VANET security based on GPS Time Sc. & IT, University of Jammu in 2017.
Besides He has published more than 15 research articles in
Spoofing,”inProceedings ofthe IEEE Conference on leading journals, conference proceedings, he has created a
Communications and Network Security, pp. 344-352, database of 8,091 digitally calibrated cervical cells, which is the
2015. only research database available to work on cervical cancer
[31] G. Samara, Al-Salihy, W. A., and Sures, R, “Security based on Bethesda system of classification. His research interest
includes medical image processing, intelligent image
analysis of vehicular ad hoc networks (VANET),”in segmentation, and deep learning.
Proceedings of the Second International Conference
on Network Applications Protocols and Services, pp.
55-60 , Sep. 2010.
[32] Sung-Ki Kim, Byung-Gyu Kim, Byoung-Joon Min,
“Reducing Security Overhead to Enhance Service
Delivery in Jini IoT,” International Journal of
Distributed Sensor Networks, vol. 2015, Article ID.
205793, pp. 1-7, 2015.
[33] R. S. Raw, Kumar, M. and Singh, N., “Security
challenges, issues and their solutions for VANET,”
International Journal of Network Security & Its
Applications, vol. 5, no. 95, Sep.2013.
Authors
54