Security Attacks and Challenges of Vanets: A Literature Survey

Download as pdf or txt
Download as pdf or txt
You are on page 1of 10

Journal of Multimedia Information System VOL. 7, NO. 1, March 2020 (pp.

45-54): ISSN 2383-7632 (Online)


http://doi.org/10.33851/JMIS.2020.7.1.45

Security Attacks and Challenges of VANETs : A Literature Survey

Abdul Quyoom1*, Aftab Ahmad Mir2, Dr. Abid Sarwar3

Abstract

This paper presented a brief introduction along with various wireless standards which provide an interactive way of interaction among the
vehicles and provides effective communication in VANET. Security issues such as confidentiality, authenticity, integrity, availability and
non-repudiation, which aims to secure communication between vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I). A detailed
discussion and analysis of various possible attacks based on security services are also presented that address security and privacy concern in
VANETs. Finally a general analysis of possible challenges is mentioned. This paper can serve as a source and reference in building the
new technique for VANETs.
Key Words: Security Attacks, Security Services, VANET.

categories such as wireless mesh networks, wireless sensor


I. INTRODUCTION
networks and Mobile Ad-Hoc Networks (MANETs).
VANETs is a subset of MANETs with a unique
Vehicular networks are emerging as a new promising
characteristic of dynamic nature or node mobility, frequent
field of wireless technology. A VANET is a distinctive class
exchange information, real time processing, self-organizing,
of a MANET in which moving vehicles act as either a node
infrastructure less nature, low volatility and distance. It is
or a router to exchange messages between vehicles, or an
considered the first commercial vehicles of MANETs. In
Access Point (AP). Typically, it can connect to vehicles
VANETs, security and privacy are identified as major
within the range of 100 to 900 meters if using 802.11p. It is
challenge. This research discusses the security issues such
aimed to support both vehicle to vehicle (V2V) and vehicle
as confidentiality, authenticity, integrity, availability and
to infrastructure (V2I) communication over infrastructure-
non-repudiation aim to secure communication between
less network. It is essential to realize that the ITS aims to
V2V and V2I.The privacy issues are concerned with
improve road safety and provides a comfortable travel
protecting and disclosing drivers personal information such
experience to driver and passengers [1], [8]. There have
as name, location etc. [21].
been numerous research initiatives such as COOPERS,
This paper has discussed and analyzed the possible of
CVIS, SAFESPOT, PReVENT, Wireless Access in
security attacks from 13 researchers that address security
Vehicular Environments (WAVE) and Advanced Safety
and privacy concern in VANETs [21]. The analysis
Vehicle Program (ASV) carried out across Europe, US and
concludes that a research gap in the area of security in
Japan to turn ITS into a reality. VANET provides the ability
VANETs. In Section 3, a study on the relationship between
to a vehicle to communicate along with nearby vehicles and
securities services versus the technique proposed to
road-side unit (RSUs) as shown in Figure 1. When RSU
encounter the possible attacks is presented. VANETs are
receives a message from vehicle, it authenticates the
used to support safety critical applications and non-safety
message to ensure no malicious message. The Autonomous
infotainment or entertainment based applications. Safety
Server (AS) is responsible for security related issues
applications such as collision avoidance, pre-crash sensing
between vehicle and RSU. Based on wireless fundamental
or lane changing are aimed at minimizing road accidents by
concepts, Wireless Ad-Hoc Network (WANET) has many

Manuscript received December 02, 2019; Revised December 24, 2019; Accepted December 28, 2019. (ID No.JMIS-19M-12-046)
Corresponding Author (*): Abdul Qayoom, University of Jammu, India, quyoom12345@gmail.com
1,3
University of Jammu, India,
2
Shri Venkateshwara University U.P. India

45
Security Attacks and Challenges of VANETs: A Literature Survey

using traffic monitoring and management applications. II. STANDARDS FOR WIRELESS ACCESS
Non-safety applications, on the other hand, enable IN VALNET
passengers to access various services like Internet/World
Wide web, interactive communication, online games,
Vehicular environment supports different
payment services and information updates while vehicles
communication standards that relate to wireless accessing.
are on the move. The key difference between safety and
The standards are generally helpful for the development of
non-safety applications is that the safety applications are
product to reduce the cost and it also helps the users to
capable of sending and processing messages in real time [3].
compare competing products. These standards are as
The driver and passengers can access both kinds of services
follows:
from the nearby infrastructure seamlessly using wireless
access technologies [7].VANET and MANET have many
2.1 IEEE 1609-standards for Wireless Access in
similarities such as dynamic topology, multi-hop data
Vehicular Environments (WAVE)
transmission, distributed architecture and Omni-directional
It is also known as IEEE 802.11p. It supports the ITS
broadcast. In both networks, mobile nodes are able to route
applications, for a short range communications. In WAVE,
or relay datato the destination by itself [23]. However, there
V2V and V2R communication uses 5.85-5.925 GHz
are some notable differences between VANET and MANET.
frequency range. It provides real time traffic information
Since the vehicles are moving along the road, the mobility
improving performance of VANET. It also benefits the
of nodes in VANET is predictable unlike MANET [5].
transport sustainability. It contains the standard of IEEE
Furthermore, there is no limitation of storage and
1609 [7], [8], [9]. This is upper layer standard. It uses
processing capability and battery power of nodes in a
Orthogonal Frequency Division Multiplexing techniques
VANET. Due to the fast movement of nodes the topology of
to divide the signal into various narrow band channels.
network formed tends to become highly dynamic. In
This also helps to provide a data transferring rate of 3, 4.5,
addition, network density in VANET varies significantly
6, 9, 12, 18, 24 and 27 Mbps in10 MHz channels.
over time and location [8].

2.2 Dedicated Short Range Communication (DSRC)


It provides a communication range from 300m to 1Km.
The V2V and V2R communication takes place within this
range. DSRC [5], [6] uses 75MHz of spectrum at 5.9GHz,
which is allocated by United States Federal
Communications Commission (FCC). This provides half
duplex, 6-27 Mbps data transferring rate. DSRC is a free
but licensed spectrum. Free means FCC does not charge
for usage of that spectrum and licensed means it is more
restricted regarding of its usage. The DSRC spectrum is
organized into 7 channels each of which is 10 MHz wide.
Out of these 7 channels, one of the channel is reserved
only for safety communication. Two channels are used for
special purpose like critical safety of life and high power
public safety and rests of the channels are service channels.

III. CHARACTERISTICS OF VANET

VANET is an application of MANET but it has its own


distinct characteristics which can be summarized as:

• High Mobility: The nodes in VANETs usually are


moving at high speed. This makes harder to predict a
Fig 1: V2V and V2I communication.
node’s position and making protection of node
privacy [2], [21].

• Rapidly changing network topology: Due to high

46
Journal of Multimedia Information System VOL. 7, NO. 1, March 2020 (pp. 45-54): ISSN 2383-7632 (Online)
http://doi.org/10.33851/JMIS.2020.7.1.45

node mobility and random speed of vehicles, the detection technique using group signature scheme has
position of node changes frequently. As a result of this, been introduced [5]. The scheme is focusing on
network topology in VANETs tends to change availability of exchanging the messages between vehicles
frequently. and RSUs. When the attack causes network unavailability,
the proposed technique still survives due to
• Unbounded network size: VANET can be interconnection using public and private keys between
implemented for one city, several cities or for RSUs and vehicles.
countries. This means that network size in VANET is
geographically unbounded. 4.2 Authentication
Authentication is the verification of the identity
• Frequent exchange of information: The ad hoc between vehicles and RSUs and the validation of integrity
nature of VANET motivates the nodes to gather of the information exchange. Additionally, it ensures that
information from the other vehicles and road side all vehicles are the right vehicle to communicate within
units. Hence the information exchange among node network. Public or private keys with CA are proposed to
becomes frequent. establish connection between vehicles, RSUs and AS [8],
[12]. On the other hand, password is used to access to the
• Wireless Communication: VANET is designed for RSUs and AS as authentication method [9].
the wireless environment. Nodes are connected and
exchange their information via wireless. Therefore 4.3 Integrity
some security measure must be considered in Data integrity is the assurance that the data received by
communication. nodes, RSUs and AS is the same as what has been
generated during the exchanges of the message. In order to
• Time Critical: The information in VANET must be protect the integrity of the message, digital signature
delivered to the nodes with in time limit so that a which is integrated with password access is used [10].
decision can be made by the node and perform action
accordingly. 4.4 Confidentiality
Confidentiality ensures that classified information in the
• Sufficient Energy: The VANET nodes have no issue network can never disclose to unidentified entities [14]. It
of energy and computation resources. This allows also prevents unauthorized access to confidential
VANET usage of demanding techniques such as RSA, information such as name, plate number and location. The
ECDSA implementation and also provides unlimited most popular technique, pseudonyms are used to
power. preserved privacy in vehicular networks [2], [3], [21].
Each vehicle node will have multiple key pairs with
• Better Physical Protection: The VANET nodes are encryption. Messages are encrypted or signed using
physically better protected. Thus, VANET nodes are different pseudo and these pseudo has not linked to the
more difficult to compromise physically and reduce vehicle node but relevant authority has access to it.
the effect of infrastructure attack [23]. Vehicle need to obtain new pseudo from RSUs before the
earlier pseudo expires.
IV. SECURITY SERVICES IN VANET
4.5 Non-Repudiation
Ensures that sending and receiving parties cannot deny
Security is an important issue for ad hoc networks,
ever sending and receiving the message such as accident
especially for security sensitive applications. To secure an
messages. In certain fields, non-repudiation is called audit
ad hoc network, we need to consider the following
ability whereby RSUs and vehicles can prove have been
attributes as criteria to measure security which includes
receive and sent respectively.
availability, confidentiality, integrity, authentication and
non-repudiation.
V. POSSIBLE ATTACKS IN VANETS
4.1 Availability
The availability deals with network services for all Even if there are advances in VANET but still it has
nodes comprises of bandwidth and connectivity [13]. In many challenges to be overcome. This challenge is attacks
order to encounter the availability issues, prevention and on VANET. Raya et al. [13] classifies attacker as having

47
Security Attacks and Challenges of VANETs: A Literature Survey

three dimensions: “insider versus outsider”, “malicious network services. The attacker attacks the communication
versus rational”, and “active versus passive”. The types of medium or network’s nodes to cause the channel or some
attacks against messages, can be described as follows: problem to networks or nodes. The vehicle is unable to
“Bogus Information”, “Cheating with Positioning access the networks and result in devastation and
Information”, “ID disclosure”, “Denial of Service”, and overtiredness of the nodes and network’s resources. None
“Masquerade”. Irshad Ahmed Sumra et al. [14] proposed of the researchers are focusing on DoS and DDoS attack
different classes of attacks like network, application, in VANETs as up to date.
timing, monitoring, and social. Each class describes
different type of attack, its threat level, and its priority. 5.1.4 Malware
Along with this model some new attacks are also proposed Malware is a malicious software whose aim to disrupt
by them. The aim of their model is to easily identify these the normal operation. This attack is carried out by insider.
attacks and their association to respective classes. The This attack is introduced in the network when the software
purpose of these attacks is to create problem for users to update is received by car’s VANET units and roadside
access the system or phishing some information. Attacks station.
in VANET [4], [15] are classified depending on the
Availability, Authentication / identification, 5.1.5 Black Hole Attack
Confidentiality, Privacy, Non-repudiation, and Data-trust. This is one of the security attack occur in VANET. In this
Some of them are discussed below [21]. attack the attacker node refuses to participate or even drop
the data packet [16]. Hence the effect of this type of attack
5.1 Attacks on availability is most dangerous to the vehicular network.
Availability in VANET means any information at any
time of communication. This security requirement is 5.1.6 Greedy Drivers
critical in time varying environment. Availability in Greedy drivers are those who try to attack for their own
VANET should be assured both in the communication benefit. These drivers cause overload problem for RSU.
channel and participating nodes. A classification of these This leads to delay in service to the authorized users. On
attacks, according to their target, is as follows: increasing number of such drivers the authorized users
faced slow services.
5.1.1 Spamming
Spamming are the messages which are of no use to the 5.2 Attacks on Authentication/identification
users like advertisements. The aim of such attack is to In these types of attack the affected area is
consume bandwidth and increase the transmission latency. identification/authentication. Whenever any vehicle in
Centralized administration control is difficult n such VANET needs secure communication its basic
attacks [23]. requirement is either identification or authentication of
nodes under consideration. When the receiving vehicle is
5.1.2 Broadcast Tampering identified or authenticated then only a trustworthy
In this type of attack the attackers introduces false transmitter vehicle is allowed to communicate amongst
safety messages into the network. This message sometime them. The different types of attack on
hides the traffic warnings [7]. This leads to the critical authentication/identification are discussed as follows.
situation like accidents and road congestions’.
5.2.1 Replay /Playback Attack
5.1.3 Denial of Service (DoS) and DDoS Attack It is a form of network attack, in which a valid data
Denial of Service (DOS) [14] is one of the most serious transmission is maliciously or fraudulently repeated or
level attacks in vehicular network. In DOS attack, the delayed. This attack happens when an attacker replays the
attacker jams the main communication medium and transmission of earlier information to take advantage of
network is no more available to legitimate users. The main the situation of the message at time of sending [6], [23].
aim of DOS attacker is to prevent the authentic users to
access the network services. DOS attack also causes the 5.2.2. Sybil Attacks
attacks like DDOS (Distributed Denial Of service) which Sybil attack is the creation of multiple fake nodes
is one of the sever attack in vehicular environment. The broadcasting false information. In Sybil attack, a vehicle
aim of this attack is to slow down the network. Jamming is install with On Board Unit (OBU) sends multiple copies
also one of the kinds of DOS attack which jams the of messages to other vehicle and each message contains a
channel, thus not allowing other users to access the different fabricated identity. The problem arises when

48
Journal of Multimedia Information System VOL. 7, NO. 1, March 2020 (pp. 45-54): ISSN 2383-7632 (Online)
http://doi.org/10.33851/JMIS.2020.7.1.45

malicious vehicle is able to pretend as multiple vehicles sends a malicious message such as virus to neighbor of
and reinforce false data. There are several technique targeted nodes. When the neighbors of the attacker are
proposed to encounter Sybil attack in VANETs such as attacked by virus, then they take the ID of the target nodes
statistical and probability, signal strength and session keys as well as target’s nodes current location [2], [7]. This
[1]-[6]. However, each of these schemes has advantageous tracked data is used for other purpose like car rental
and disadvantageous due to dynamic characteristics, companies to track their own cars [15]. F. Li et al. is used
weather conditions and system design. One of the pseudonyms as an exchange mechanism to encrypt and
interesting method proposed by [1] and [4] are based on hide vehicle’s unique identity such as driver’s name, plate
statistical and probability algorithm integrated with signal number and location [10]. The pseudonyms used the
strength as an input data. The different between received Public Key Infrastructure to sign the message and this
signal strength and estimate signal strength is claimed by make it difficult to track.
positioners calculated. It is analyzed by AS using
statistical and probability algorithm. A framework to 5.2.8. Sending False Information
detect Sybil attacks in nodes has been proposed using Sending False Information can be described as sending
Certificate Authority (CA) [2], [3]. Two main steps the wrong and fake information purposely by one node to
involve in the process are system initialization and attacks another to create chaos scenarios. This scenario may
detection where public key and private key are used create misinterpretation of the actual scenario. False
during system initialization to sign in the message. information is sent by attackers to vehicle for selfish
reasons. For example, attacker might send false report on
5.2.3 Masquerading congestion, accident or road block in order to clear the
This attack is a result of providing false identities while road. A scheme has been proposed to detect the
communication by an attacker. Masquerading [15] compromised nodes that may misbehave using different
involves message fabrication, alteration and replay. For kinds of technique [2], [3], [5], [12]. One of the schemes is
example, to slow down other vehicle speed an attacker a group signature which relies on password access. It can
tries to act as an emergency vehicle and hence defraud be applied to sign message so that when another vehicle
other vehicle. receives a message, it only check the authentication of the
message. This scheme is not practical since group
5.2.4 Global Positioning System (GPS) Spoofing members always will change frequently especially in a
The exact position on the earth can be easily known to city networks.
every vehicle by using GPS. In this attack an attacker
provide false information to other vehicle by producing 5.2.9 Node Impersonation
false readings in the GPS devices. This is done by an Node impersonation is an attempt by a node to send
attacker using GPS simulators that generate signals which modified version of message and claims that the message
are stronger than those generated by genuine satellite comes from originator for the unknown purpose. An
algorithm technique to detect and isolate node
5.2.5 Tunneling impersonation using greedy algorithm that is Detection of
This attack happens when an attacker connects two Malicious Vehicle(DMV) and Outlier Detection algorithm
distant parts of the Adhoc network using an extra has been proposed to overcome this problem [7]-[9]. The
communication channel as a tunnel. As a result, two schemes used RSU to detect and observe an abnormal
distant nodes assume they are neighbors and send data behavior of nodes. The proposed scheme increases the
using the tunnel [12]. The attacker has the possibility of trust value of the node if the vehicle is trusted. The
conducting a traffic analysis or selective forwarding attack identity (ID) of the vehicle will be reported to the relevant
Certificate Authority (CA) as malicious if distrust value is
5.2.6 Message Tampering higher than threshold value.
In this attack the valuable or even critical traffic safety
messages can be manipulated. This is done by attacker by 5.3 Attacks on confidentiality
modifying, dropping or corrupting the messages [7]. Confidentiality is one of the important security
requirement in vehicular communication, it assure that the
5.2.7 ID Disclosure message will only be read by authorized parties [16]. This
In this type of attack the ID of targeted nodes will get kind of security requirement is generally present in group
disclosed for tracking the current location of that node. A communications, in which only group members are
global observer monitors the target nodes and sometime allowed to read such information. The remaining VANET
49
Security Attacks and Challenges of VANETs: A Literature Survey

settings transmit public information. Because VANET Due to this, we can’t use structures like tree because these
mobility is higher than MANET, routing with capability of structures can’t be set up and maintained as rapidly as the
ensuring security in VANET is more problematic than topology changed.
Adhoc [13]. Confidentiality of messages exchanged
between the nodes of a vehicular network is particularly Congestion and collision Control: The unbounded
vulnerable with techniques such as unlawful collection of network size also creates a challenge. The traffic load is
messages through eavesdropping and gathering of location low in rural areas and night in even urban areas. Due to
information available through the transmission of this, the network partitions frequently occurs while in rush
broadcast messages. In case of eavesdropping, the attacker hours the traffic load is very high and hence network is
can collect information about existing users without their congested and collision occurs in the network.
permission and use the information at a time when the
user is unaware of the collection. Location privacy and Environmental Impact: VANETs use the
anonymity are important issues for vehicle users [21], [23]. electromagnetic waves for communication. These waves
are affected by the environment. Hence to deploy the
5.4 Attacks on privacy VANET the environmental impact must be considered.
This type of attack is related with unauthorized
accessing important information about vehicles. There is MAC Design: VANET generally use the shared medium
direct relation between driver and vehicle. If the attackers
to communicate hence the MAC design is the key issue.
illegally access some data this directly affect the driver’s
Many approaches have been given like TDMA, SDMA,
privacy [15]. Usually a vehicle owner is also its driver, so
and CSMA etc. IEEE 802.11 adopted the CSMA based
if an attacker is getting the owner’s identity then indirectly
Mac for VANET.
vehicle could put its privacy at risk; this type of privacy
attack is called as identity revealing. Location tracking is
Security: As VANET provides the road safety
also one of the well-known privacy attacks. In this attack
applications which are life critical therefore security of
the location of vehicle or the path followed by that vehicle
these messages must be satisfied.
at particular period of time is considered as a personal data.

Real time Constraint: VANET is time critical where


5.5 Attacks on non-repudiation
safety related message should be delivered with 100ms
When two or more user shares the same key then non-
transmission delay. So to achieve real time constraint, fast
repudiation [15] is occurred. Due to this, two users are not
cryptographic algorithm should be used. Message and
distinguished from each other and hence their actions can
entity authentication must be done in time.
be repudiated. An identical key in different vehicle should
be avoided using a reliable storage.
Data Consistency Liability: In VANET even
5.6 Attacks on data trust authenticate node can perform malicious activities that can
Data trust can be compromised by simply inaccurate cause accidents or disturb the network. Hence a
data calculation and sending affected message, this can be mechanism should be designed to avoid this inconsistency.
done by manipulating sensors in vehicle, or by changing Correlation among the received data from different node
the sent information [15]. This affects the whole system on particular information may avoid this type of
reliability. And hence some mechanisms must be inconsistency.
developed to protect against such attacks in practice in
vehicular network. Low tolerance for error: Some protocols are designed
on the basis of probability. VANET uses life critical
information on which action is performed in very short
VI. CHALLENGES AND FUTURE
time. A small error in probabilistic algorithm may cause
PERSPECTIVES harm [22].

Given the challenges and characteristics of VANETs, Key Distribution: All the security mechanisms
some future perspectives should be considered to design implemented in VANET dependent on keys. Each message
new efficient communication approaches, as follows: is encrypted and need to decrypt at receiver end either
with same key or different key. Also different
Network Management: Due to high mobility, the manufacturer can install keys in different ways and in
network topology and channel condition change rapidly. public key infrastructure trust on CA become major issue.
50
Journal of Multimedia Information System VOL. 7, NO. 1, March 2020 (pp. 45-54): ISSN 2383-7632 (Online)
http://doi.org/10.33851/JMIS.2020.7.1.45

Therefore distribution of keys among vehicles is a major carry-and forward technique, which further increases the
challenge in designing security protocols [22], [32]. information delivery time. Those problems may be
solved/minimized exploring new data communication
Incentives: Manufactures are interested to build approaches for Heterogeneous Vehicular Networks. As
applications that consumer likes most. Very few another alternative, the driver’s behavior can be
consumers are agree with a vehicle which automatically considered to improve the carry-and-forward method and
reports any traffic rule violation. Hence successful reduce the information delivery time.
deployment of vehicular networks will require incentives
for vehicle manufacturers, consumers & government is a Tracking a target: Communication is a fundamental
challenge to implement security in VANET. aspect in any network and, in VANETs, depends on the
physical location of vehicles. Therefore, tracking a target
Highly heterogeneous vehicular networks: many is a fundamental functionality in VANETs for
non-interoperable wireless networking technologies have communication protocols and also for applications and
emerged with the rapid development and availability of services that can benefit from this type of information [20].
mobile computing systems and environments, As a Tracking requires creating a mechanism to identify the
consequence, connectivity across different wireless path a node follows in the network and predict the next
networking technologies is very complex in terms of node positions if necessary. As pointed out before, privacy
addressing, quality of service, routing, security and billing. issues have to be observed in the devised solutions [22].
Thus, it is expected that the next generation of intelligent
transportation systems reflect a more holistic approach to VII. COMPARATIVE ANALYSIS OF
network solutions. This would require support to the
ECURITY ALGORITHMS FOR VANETS
coexistence of multiple different co-located wireless
networks to provide ubiquitous and universal access to Table 1 shows the comparative Analysis of Security
broadband services [11]. Algorithms for VANETS

Data management and storage: As outlined above, 7.1. Prevention Measures for Existing Attacks
we can expect to have large scale vehicular networks with
millions of vehicles, which will generate huge amounts of Table 2 shows the preventive measures for existing attacks.
distributed data that must be stored in some fashion and
distributed across the VANETs. Due to this feature, as Table 2. Preventive measures for existing Attacks.
pointed out in [17, 19], size of network and amount of
produced data is very large, it pose new and unique Property Attacks Preventive Measures
challenges to data management in this setting. Violated
Privacy Location ID based system
trailing
Localization systems: Critical safety applications in Availability Denial of IP Info. Handling
Service (DOS)
VANETs require more reliable and high accurate Routing Cryptography Hashing etc.
localization systems. A natural solution of a localization attacks
Integrity and Eavesdropping Creation of cipher
system for VANETs is to embed a navigation device in confidentiality Replay Time-stamping
each vehicle. But satellite-based positioning systems Bogus info. Hashing, Asymmetric
present some undesired problems such as not always being cryptography
Authenticity Sybil Radio resource testing,
available. Furthermore, satellite-based positioning systems Registration, Position
are vulnerable to several types of attacks such as spoofing verification, etc.
Impersonation Trust authority, PK1
and blocking. In addition, it has a localization error of 10 Timing attack Encryption solution (TPM)
to 30 m, which does not satisfy the requirements of critical Session Encryption, Random SID
applications for VANETs and implies the need for other hijacking generation

localization techniques.

Disruptive tolerant communications: Current


problems, such as higher delay and lower reliability
delivery, are more constant in sparse networks. To increase
the delivery reliability, some solutions make use of the

51
Security Attacks and Challenges of VANETs: A Literature Survey

Table 2. Preventive measures for existing Attacks


Authors Title Techniques /technology Used Attacks Covered/ Limitations of used
Security dimensions technology
AkhileshSingh,et VANET security: Symmetric cryptography, Replay attack, DOS,
al.[25] (2016) Issues, challenges and digital signature, hash function, Routing attack, fake
solutions elliptical curve parameter and information attacks.
ID registration technique.
Arturo Ribagorda, Overview of security Vehicular public key Eavesdropping, These techniques
et al.[26] (2010) issues in vehicular infrastructure, certificate Identity revealing, hadn’t addressed the
ad-hoc networks validation, encryption, Location tracking, issues on privacy
plausibility check mechanisms. attribute- based DOS problems due to radio
attack frequency finger -
printing
Shiang-Feng Tzeng, Enhancing Security System initialization, Forgery attack Effective solution for
et al. [27] (2015) and Privacy for anonymous identity generation, forgery attacks only.
Identity-based Batch message signing, and message No solution for other
Verification Scheme verification. attacks.
in VANET.
Ahmed Shoeb Al Security threats in Public Key, Symmetric and Privacy and security Good privacy
Hasan, et vehicular ad hoc Hybrid, Certificate schemes with reduced
Al .[28] (2016). networks. Revocation , ID-based overhead but no
Cryptography. solution for attacks.
Lu Chen, et al. [29] Analysis of VANET Elliptic curve algorithm, digital Integrity, reliability
(2013) Security based on signature technology, Intrusion and confidentiality.
Routing protocol Detection.
Information.
Asif Ali Wagan, et Emerging attacks on Prevention of Time Stamp Denial of service No solution for other
al. [30] (2015) VANET security Jumps, short lived pseudonym attacks, sybil attack attacks.
based on GPS Time certificates and retrospective
Spoofing attack detection via logging.

Ghassan Samara, et Security Analysis of Vehicular Public Key DOS attack,


al.[31] (2010) Vehicular Ad-Hoc Infrastructure, group signature, Fabrication attack,
Network (VANETs) Certificate Authority, ECC, alteration attack,
replay attack, message
Ram Shringar Raw, Security challenges, ARAN, SEAD, SMT (Secure Replay Attack, Efficient privacy
et al. [33] (2013) Issues and their Message Transmission), NDM Impersonation, False solution but no
solutions on VANETs (Non-Disclosure Method), Warning, information solution for
ARIADNE disclosure, DOS, confidentiality.
routing attack
Systems (ICFNDS) ACM, pp. 1-12, July 1–2, 2019.
VIII. CONCLUSION [2] Abdul Quyoom, “Security Issues of Vehicular Ad Hoc
Networks in OSI layers,” International Journal of
Scientific Research in Computer Science, Engineering
This paper has briefly introduced various aspect of
and Information Technology, ISSN: 2456-3307, vol. 2,
VANET like its environment and standards, detailed
no. 4, 2017.
explanation of various possible attacks in VANET have
[3] Abu Talib, Manar, et al., “Systematic literature review
been classified depending on the availability,
on Internet-of-Vehicles communication
authentication, confidentiality, privacy, non-repudiation
security,” International Journal of Distributed Sensor
and data trust. Possible challenges associated with security
Networks, ISSN: 1550147718815054, vol. 14, no. 12,
attacks and security services are also highlighted. Since
2018.
attack creates a more severe condition, it is necessary to
[4]Abdul Quyoom, MohdSaleem, MudasserNazar, Yusera
analyze the effect of attack on routing protocols which
Farooq Khan, “VANETs Applications, Challenges and
makes more secure vehicular environment.
Possible Attacks: A Survey, “International Journal of
Advanced Research in Computer and Communication
REFERENCES
Engineering, ISO 3297:2007 Certified Vol. 6, Issue 7,
[1] Javed Muhammad Noman et al., “VANET's Security July 2017.
Concerns and Solutions: A Systematic Literature [5] J. Cui, L. Wei, J. Zhang, Y. Xu, and H. Zhong, “An
Review,” in Proceedings of the 3-rd International efficient message-authentication scheme based on
Conference on Future Networks and Distributed edge computing for vehicular ad hoc networks, “ IEEE

52
Journal of Multimedia Information System VOL. 7, NO. 1, March 2020 (pp. 45-54): ISSN 2383-7632 (Online)
http://doi.org/10.33851/JMIS.2020.7.1.45

Transactions on Intelligent Transportation Systems, of Future Generation Computer Systems, pp. 843-864,
vol. 20, no. 5, pp. 1621–1632, 2019. 2019.
[6] Saif Al-Sultan, Moath M. Al-Doori, Ali H. Al-Bayatti, [17] Kumar Mr Kamal, and Rahul Malhotra, “Analysis of
and HussienZedan, “A comprehensive survey on Sybil Attack Isolation Technique in VANET,”
vehicular ad hoc network,” Journal ofNetwork and International Journal of Computer Science and Mobile
Computer Applications, vol.37, no. 1, pp. 380–392, Computing (IJCSMC), vol. 8, no. 5, pp.187–192, May
2014. 2019.
[7]Z. Lu, G. Qu, and Z. Liu, “A survey on recent advances [18] Singh Avinash et al., “Implementing Security
in vehicular network security, trust, and privacy, Services in VANET Using Cryptography Based on
“IEEE Transactions on Intelligent Transportation Artificial Neural Network,” Journal of Computer and
Systems, vol. 20, no. 2, pp. 760–776, 2019. Mathematical Sciences,vol. 10, no. 9, pp. 1573-1584,
[8] Abdul Quyoom, Raja Ali and Devki Nandan Gouttam, 2019.
“A Novel Mechanism of Detection of Denial of [19] Karagiannis D. and Argyriou A., “Jamming attack
Service Attack (DoS) in VANET using Malicious and detection in a pair of RF communicating vehicles
Irrelevant Packet Detection Algorithm (MIPDA),” in using unsupervised machine learning,” Vehicular
Proceedings of the IEEE International Conference on Communications, vol.13,pp. 56-63, 2018.
Computing, Communication and Automation [20] Safi, Q.G.K., Luo, S., Wei, C., Pan, L. and Yan, G.,
(ICCCA2015), pp. 414-419, 2015. “Cloud-based security and privacy-aware information
[9] Jafer, Muhammad, et al., “Secure Communication in dissemination over ubiquitous VANETs,” Computer
VANET Broadcasting,” ICST Transaction on Security Standards and Interfaces, vol.56, pp. 107-115, 2018.
Safety, vol.5, no.17, 2019. [21]. J. Liu, Y. Yu, Y. Zhao et al., “An efficient privacy
[10] Karimireddy, T. and Bakshi, A., “A Hybrid Security preserving batch authentication scheme with deterable
Framework for the Vehicular Communications in function for VANETs,” in Proceedings of the
VANET,” in Proceedings of the International International Conference on Network and System
Conference on Wireless Communications, Signal Security, pp. 288–303, 2018.
Processing and Networking (WiSPNET), pp. 1929- [22] Usha M., Ramakrishnan B, “An enhanced MPR-
1934, 2016. OLSR protocol for efficient node selection process in
[11]. J. Cui, L. Wei, J. Zhang, Y. Xu, and H. Zhong, “An cognitive radio based VANET,”Wireless
efficient message authentication scheme based on edge pers. Commun. vol.106, no.2, pp. 763–787, 2019.
computing for vehicular ad hoc networks,” IEEE [23] Usha M., Ramakrishnan B, “A robust architecture of
Transactions on Intelligent Transportation Systems, the OLSR protocol for channel utilization and
vol. 20, no. 5, pp. 1621–1632, 2019. optimized transmission using minimal multi point
[12]Mishra R., Singh A. and Kumar R., “VANET Security: relay selection in VANET,” Wireless Pers. Commun.
Issues, Challenges and Solutions,” in Proceedings of Now, pp. 1–25, 2019.
International Conference on Electrical, Electronics, [24]. K. Bylykbashi, D. Elmazi, K. Matsuo, M. Ikeda, and
and Optimization Techniques (ICEEOT), pp. 1050- L. Barolli, “Effect of security and trustworthiness for a
1055, 2016. fuzzy cluster management system in VANETs,”
[13]Md Whaiduz-zaman, Mehdi Sookhak, Abdullah Gani, Cognitive Systems Research, vol. 55, pp. 153–163,
and Rajkumar Buyya, “A survey on vehicular cloud 2019.
computing,” Journal of Network and Computer [25]. A. Singh, R. Mishra and R. Kumar, “VANET
Applications, vol. 40, pp. 325–344, 2014. security: Issues, challenges and solutions,”
[14] Sumra, Irshad Ahmed, Iftikhar Ahmad, International Conference on Electrical, Electronics,
HalabiHasbullah, and J-L. bin Ab Manan, “Classes of and Optimization Techniques, pp. 1050-1055, 2016.
Attacks in VANET,” in Proceedings of Saudi [26]. A. Ribagorda, J. M. de Fuentes and A. I. Gonzalez-
International Electronics, Communications and Tablas “Overview of security issues in vehicular ad-
Photonics Conference (SIECPC), pp. 1-5, 2011. hoc networks,” Handbook of Research on Mobility
[15] A. Festag. “Cooperative intelligent transport systems and Computing, IGI Global, 2010.
standards in Europe,” Communications Magazine, [27] Horng S., Tzeng S., Li T., Wang X., and Huang P.,
IEEE, vol. 52, no.12, pp. 166–172, Dec. 2014. Khan M., “Enhancing Security and Privacy for
[16] Hussain Rasheed, Fatima Hussain, and Sherali Identity-based Batch Verification Scheme in
Zeadally, “Integration of VANET and 5G Security: A VANET,”IEEE Transactions on Vehicular Technology,
review of design and implementation issues,” Journal vol. 66, no. 4 (2015): 3235-3248.

53
Security Attacks and Challenges of VANETs: A Literature Survey

[28] A. S. Al Hasan, Md. Shohrab Hossain, and Technology with specialization in Deep Learning. He has three
Mohammed Atiq-uz-zaman, “Security threats in years of teaching experience in teaching and has also worked in
software industry. His research interests include artificial
vehicular ad hoc networks,” in Proceedings of the intelligence, medical image processing, intelligent image
Conference on Advances in Computing, segmentation, algorithm design, and deep learning.
Communications and Informatic, pp. 21-24, Sept.2016.
[29] Chen, L., Tang, H., and Wang, J., “Analysis of Dr. Abid Sarwar has been working
in the field of application of Artificial
VANET security based on routing protocol Intelligence in Medicine (especially in
information,” in Proceedings of the Fourth cervical cancer and diabetes) for the last
International Conference on Intelligent Control and 08 years. He did Masters in Computer
Applications from Department of
Information Processing, pp. 134-138, Jun. 2013.
Computer Sc. & IT, University of
[30] A. A. Wagan, Bittl, S., Gonzalez, A. A., Myrtus, M., Jammu in 2009. He obtained PhD
Beckmann, H., Sailer, S. and Eissfeller, B., “Emerging degree from Department of Computer
attacks on VANET security based on GPS Time Sc. & IT, University of Jammu in 2017.
Besides He has published more than 15 research articles in
Spoofing,”inProceedings ofthe IEEE Conference on leading journals, conference proceedings, he has created a
Communications and Network Security, pp. 344-352, database of 8,091 digitally calibrated cervical cells, which is the
2015. only research database available to work on cervical cancer
[31] G. Samara, Al-Salihy, W. A., and Sures, R, “Security based on Bethesda system of classification. His research interest
includes medical image processing, intelligent image
analysis of vehicular ad hoc networks (VANET),”in segmentation, and deep learning.
Proceedings of the Second International Conference
on Network Applications Protocols and Services, pp.
55-60 , Sep. 2010.
[32] Sung-Ki Kim, Byung-Gyu Kim, Byoung-Joon Min,
“Reducing Security Overhead to Enhance Service
Delivery in Jini IoT,” International Journal of
Distributed Sensor Networks, vol. 2015, Article ID.
205793, pp. 1-7, 2015.
[33] R. S. Raw, Kumar, M. and Singh, N., “Security
challenges, issues and their solutions for VANET,”
International Journal of Network Security & Its
Applications, vol. 5, no. 95, Sep.2013.

Authors

Abdul Quyoom has received B.Tech


from BGSBU Rajouri, J&K in 2013 and
he is awarded M.Tech from Central
University of Rajasthan specialized in
Information security in 2015 . He has five
Publications and attended various
National, international conferences and
workshops. He has worked as an
Assistant Professor in YCET Jammu and the department of
Computer Science in BGSBU Rajouri. Currently he is pursuing
Ph.D. from Department of Computer Sc. & IT, University of
Jammu and working on Artificial Intelligence and its application
in medical domain. His research interest includes medical image
processing, intelligent image segmentation, and deep learning.

Aftab Ahmad Mir has done Masters


in information Technology, with
specialization in Optimization techniques,
Artificial intelligence and machine
learning from Department Computer Sc.
& IT, University of Jammu. Now he is
pursuing Ph.D. in Information

54

You might also like